10.07.2015 Views

The Illuminati Formula Used to Create an Undetectable Total Mind ...

The Illuminati Formula Used to Create an Undetectable Total Mind ...

The Illuminati Formula Used to Create an Undetectable Total Mind ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

TABLE OF CONTENTSIntroduction<strong>The</strong> 12 Major Sciences of Monarch <strong>Mind</strong> ControlI. <strong>The</strong> Selection & Preparation of the VictimA. Genetics & dissociative abilitiesB. AvailabilityC. Physical & Mental requirementsD. List of org<strong>an</strong>izations carrying out programmingE. 4 foundational steps for programmingF. Step 1. Spiritual requirements, Moon Child ceremonies,traumatization in vitroG. Step 2. Trauma by premature birthH. Step 3. Love bombing/love bondingI. Step 4. Severing the "core" of the mindJ. Further considerationsII. <strong>The</strong> Traumatization & Torture of the VictimA. A site for <strong>to</strong>rture of children, NOTS China LakeB. What trauma does, the creation of PTSD & DID (MPD)C. How the <strong>to</strong>rture is carried out, types of traumaD. How MPD worksE. <strong>The</strong> CoreF. <strong>The</strong> Anchoring ExperienceIII. <strong>The</strong> Use of DrugsA. A list of drugs usedB. A brief his<strong>to</strong>ry of useC. Applications for drugs <strong>to</strong> control a slaveIV. <strong>The</strong> Use of HypnosisA. Dissociation, tr<strong>an</strong>ce, & its his<strong>to</strong>rical useB. How <strong>to</strong> program with hypnosisC. How <strong>to</strong> boost creativity of victim with hypnosisD. Keeping the mind dissociative2


E. Keeping the mind in a programming stateF. Hypnotic triggers & cuesG. Hypnosis in programs & other usesV. <strong>The</strong> Skill of Lying, <strong>The</strong> Art of DeceitA. OverviewB. <strong>The</strong> use of fictionC. <strong>The</strong> use of lies externally, incl. covers <strong>an</strong>d frontsD. <strong>The</strong> use of internal deceptions, incl. the art of hiding things ina systemVI. <strong>The</strong> Use of Electricity & ElectronicsA. For <strong>to</strong>rtureB. For memory deletionC. For impl<strong>an</strong>ting thoughtsD. Electronic communication & controlVII. Engineering & Structuring Of An MPD SystemA. Structuring of MPD worldsB. <strong>The</strong> creation of rolesC. Building in layered defensesD. Building backup systemsVIII. Body M<strong>an</strong>ipulation & ProgrammingA. Scarring the brain stemB. Split brain workC. Medical technologiesD. HistaminesE. <strong>The</strong> use of body programsIX. <strong>Mind</strong> M<strong>an</strong>ipulation by Psychological ProgrammingMethods:Behavior Modification, Psychological Motivation & NLPA. Observing a sat<strong>an</strong>ic family conditioning their childrenB. Behavior modification, obedience trainingC. IsolationD. RepetitionE. Psychological motiva<strong>to</strong>rs, md. pride/needs/w<strong>an</strong>ts3


F. Neuro-linguistic programmingG. <strong>The</strong> inversion of pain & pleasureX. Spiritual Control Techniques, Possession, Tr<strong>an</strong>ces, Etc.A. Using spiritual principles against a personB. How the Monarch program miniturizes what is done on alarge scaleC. Dehum<strong>an</strong>izationD. FearE. <strong>The</strong> use of guilt, shame, ridicule & <strong>an</strong>gerF. Teaching that the master is GodG. Portals, Focal PointsH. Vows & oathsI. <strong>The</strong> use of demon possession, layering in, etc.J. <strong>The</strong> use of "<strong>an</strong>gel" altersK. <strong>The</strong> misuse of ScriptureL. <strong>The</strong>ta programmingXI. Internal ControlsA. Teaching occult philosophies & ideologiesB. Internal computersC. Internal hierarchiesXII. External ControlA. Moni<strong>to</strong>ring (Asset control)B. <strong>The</strong> art of blackmailC. BribesD. <strong>The</strong> Control of the Milieu E. Bonding & twinningF. Peer pressureAppendix I: <strong>The</strong> Programmers<strong>The</strong> Antichrist: <strong>The</strong> Chief H<strong>an</strong>dler/ProgrammerAppendix II: <strong>The</strong> Programming SitesBibliography4


WARNING, READ THIS FIRST BEFORE READING THE BOOK.IF THERE IS ANY CHANCE you the reader have had mind-control done<strong>to</strong> you, you must consider the following book <strong>to</strong> be DANGEROUS. If youare consulting a therapist for DID (also known as MPD), it isrecommended that you consult your therapist before reading thisbook. <strong>The</strong> complications that could result for those under mind controllearning the truth--could be fatal. <strong>The</strong> co-authors take no responsibilityfor those who read or misuse this information. <strong>The</strong> reader’s mind is like agarden. It may not be time <strong>to</strong> pl<strong>an</strong>t the truth in your mind. Perhaps youneed some weeding or ground preparation, before the garden of yourmind is ready. Perhaps the weather is <strong>to</strong>o s<strong>to</strong>rmy <strong>to</strong> pl<strong>an</strong>t the truth. Pray<strong>to</strong> the Lord of the Harvest. <strong>The</strong> blessings that flow from pl<strong>an</strong>ting theinformation of this book in your mind, will require the presence of livingwaters of love. If you do not have love in your heart, this book is not foryou. <strong>The</strong> information contained in this book is the biggest news-s<strong>to</strong>ry ofthe 20th century, <strong>an</strong>d still the biggest secret. It will challenge you, shockyou, horrify you <strong>an</strong>d hopefully motivate you <strong>to</strong> redouble your efforts <strong>to</strong>humble yourself <strong>an</strong>d seek strength from God Almighty.<strong>The</strong> programming procedures which are described in this book arebased on research <strong>an</strong>d consultation with deprogrammers, exprogrammers,therapists, counselors <strong>an</strong>d pertinent literature. To the bes<strong>to</strong>f our knowledge the statements made in this book are factual,although they may not reflect the latest or currently acceptedmethodology among each <strong>an</strong>d every faction of the New World Orderwhich carries out Monarch-type programming. This book tends <strong>to</strong>devote more emphasis <strong>to</strong> <strong>Illuminati</strong> programming, which is the highestlevel of programming. For individual application in underst<strong>an</strong>ding asurvivor of Monarch programming, therapists are admonished <strong>to</strong> usethis material with consideration for the Monarch victim’s personal case<strong>an</strong>d situation. <strong>The</strong> authors disclaim <strong>an</strong>y responsibility for therapeuticwork based upon this material.Fritz Springmeier <strong>an</strong>d Cisco Wheeler have co-authored <strong>The</strong>y Know NotWhat <strong>The</strong>y Do, An Illustrated Guidebook To Monarch <strong>Mind</strong> Control.Both Fritz <strong>an</strong>d Cisco bring years of experience in dealing with Monarchprogramming <strong>to</strong> bear on the writing of this book. Fritz has researchedthe <strong>Illuminati</strong>, while he has worked with victims of its programming. Hehas authored <strong>The</strong> Top 13 <strong>Illuminati</strong> Families, <strong>an</strong>d several other books.5


INTRODUCTION by Fritz<strong>The</strong>re are m<strong>an</strong>y d<strong>an</strong>gers <strong>to</strong> the hum<strong>an</strong> race, some real <strong>an</strong>d someimagined. I believe that the trauma-based mind control which thisbook exposes is the greatest d<strong>an</strong>ger <strong>to</strong> the hum<strong>an</strong> race. It gives evilmen the power <strong>to</strong> carry out <strong>an</strong>y evil deed <strong>to</strong>tally undetected. By thetime the astute reader finishes this book, they will be as familiar withhow <strong>to</strong> carry out trauma-based mind-control as some of theprogrammers. Ancient <strong>an</strong>d more recent secrets will no longer besecrets. Over the years, I have spent thous<strong>an</strong>ds of hours studying the<strong>Illuminati</strong>, the Intelligence agencies of the world, <strong>an</strong>d the occult worldin general. <strong>The</strong> centerpiece of these org<strong>an</strong>izations is the trauma-basedmind control that they carry out. Without the ability <strong>to</strong> carry out thissophisticated type of mind-control using MPD, drugs, hypnosis <strong>an</strong>delectronics <strong>an</strong>d other control methodologies, these org<strong>an</strong>izationswould fail <strong>to</strong> keep their dark evil deeds secret. When one of the mindcontrolprogrammers of the Church of Scien<strong>to</strong>logy, who has leftScien<strong>to</strong>logy, was asked about MPD, he said, “It’s the name of thegame of mind control.” Research in<strong>to</strong> this subject will never becomplete. This book has tried <strong>to</strong> give a comprehensive view of how theprogramming is done. <strong>The</strong> basic techniques were developed inGerm<strong>an</strong>, Scottish, Itali<strong>an</strong>, <strong>an</strong>d English <strong>Illuminati</strong> families <strong>an</strong>d have beendone for centuries. Some report that some of the techniques go back<strong>to</strong> <strong>an</strong>cient Egypt <strong>an</strong>d <strong>an</strong>cient Babylon <strong>to</strong> the <strong>an</strong>cient mystery religions.<strong>The</strong> Nazis are known <strong>to</strong> have studied <strong>an</strong>cient Egypti<strong>an</strong> texts in theirmind control research. <strong>The</strong> records <strong>an</strong>d secrets of the generational<strong>Illuminati</strong> bloodlines are very-well guarded secrets. Even when I’velearned about the location of secret deposi<strong>to</strong>ries of some of the<strong>Illuminati</strong>’s secrets in Europe, America, <strong>an</strong>d Asia, their records <strong>an</strong>dsecrets are <strong>to</strong>o well-guarded <strong>to</strong> be examined. <strong>The</strong> intelligenceagencies, such as MI-6 beg<strong>an</strong> investigating these mind-controltechniques early this century, but their records have been routinelydestroyed <strong>an</strong>d tampered with. <strong>The</strong>re are some survivors <strong>an</strong>dprofessionals who know that the British used programmed traumabasedMPD (DID) agents in W.W. I. In J<strong>an</strong>., 1987, Richard Kluft submitted<strong>an</strong> article <strong>to</strong> the Americ<strong>an</strong> Journal of Clinical Hypnosis about 8 MPDpatients who were between 60 <strong>an</strong>d 72 years of age. TraugottKonst<strong>an</strong>tin Oesterreich (1880-1949), who was professor of philosophy atTubingen University, Germ<strong>an</strong>y studied MPD <strong>an</strong>d demonic possession<strong>an</strong>d wrote a classic study of it in 1921 entitled Possession Demonical &Other, which was tr<strong>an</strong>slated in<strong>to</strong> english in 1930. His classic work on thissubject provides documented cases which reveal that the basictrauma-based mind-control was going on in Germ<strong>an</strong>y, Fr<strong>an</strong>ce &Belgium long before the 20th century. Although he is unable <strong>to</strong> put<strong>to</strong>gether all the pieces <strong>an</strong>d the clues for what they are, the reader ofthis book might enjoy reading the 1930 English tr<strong>an</strong>slation of his classicwork after they finish this book. Oesterreich’s research in early 1900s6


was the type of research that the Nazi mind-control programmers werevery aware of. In 1921, the Germ<strong>an</strong>s such as Oesterreich woulddescribe personality switches, by the term “somnambuliform [hypnoticstates] possession” or “demonical somnambulism” or what might becalled “Besessenheit von Hypnotismus und bösen Geistern.” <strong>The</strong> ability<strong>to</strong> study both the spiritual & psychological aspects of mind-controlphenomena, is often lacking <strong>to</strong>day. <strong>The</strong>re are exceptions such as Dr.Loreda Fox’s book <strong>The</strong> Spiritual Dimensions of MPD. In the 1920s, theGerm<strong>an</strong>s also were aware that the hum<strong>an</strong> mind has a variety of egopsycho-physiologicalstates rather th<strong>an</strong> one unified mind, which theytermed “Sub jecklose Psychologie” or the psychology of havingcorrelated psychological states rather th<strong>an</strong> the concept of a singleego. <strong>The</strong> Germ<strong>an</strong>s <strong>an</strong>d Itali<strong>an</strong>s under the Nazi <strong>an</strong>d Fascist governmentsbeg<strong>an</strong> <strong>to</strong> do serious scientific research in<strong>to</strong> trauma-based mindcontrol. Under the auspices of the Kaiser Wilhelm Medical Institute inBerlin, Joseph Mengele conducted mind-control research onthous<strong>an</strong>ds of twins, <strong>an</strong>d thous<strong>an</strong>ds of other hapless victims. Himmlersupervised genetic research. <strong>The</strong> Nazi research records wereconfiscated by the Allies <strong>an</strong>d are still classified. A trip c<strong>an</strong> be madefrom down<strong>to</strong>wn Washing<strong>to</strong>n D.C. on a gray-government v<strong>an</strong> whichserves as a shuttle <strong>to</strong> the Suitl<strong>an</strong>d Annex where the government’ssecrets are buried including research papers captured from the Nazi<strong>Mind</strong>-Control research. Most of Mengele’s concentration campresearch is still classified. Much of it dealt with mind control. Aresearcher c<strong>an</strong> visit the <strong>to</strong>p floor, but underground below the <strong>to</strong>p floorare the real secrets. <strong>The</strong> real secrets are lying in millions of sheets ofclassified documents hidden behind blast proof doors. <strong>The</strong>re they havevault after vault, <strong>an</strong>d row after row of <strong>to</strong>p-secret files that only a fewprivileged persons with security clear<strong>an</strong>ces above COSMIC--such aswith a “C3” or “MJ” security clear<strong>an</strong>ce c<strong>an</strong> visit. Everyone with thesehigh security clear<strong>an</strong>ces which I have identified is connected <strong>to</strong> the<strong>Illuminati</strong>. Each underground area at Suitl<strong>an</strong>d Annex has its own subse<strong>to</strong>f secret access words, known only <strong>to</strong> the initiated. Most of the OSSrecords have been destroyed, a few have been left, the import<strong>an</strong><strong>to</strong>nes have been misfiled or remade. (This is according <strong>to</strong> a reliableBritish intelligent agent.) Also according <strong>to</strong> reliable inside sources theCIA is working night <strong>an</strong>d day <strong>to</strong> remake old records, <strong>to</strong> expunge all thereal dirty secrets from their records. <strong>The</strong> basement of CIA HQ is knownas “the Pit,” In the Pit documents are being shredded <strong>an</strong>d burned on around the clock basis. <strong>The</strong> large remains of these secrets are sold forl<strong>an</strong>dfill. <strong>The</strong> <strong>Illuminati</strong> have developed secrecy <strong>to</strong> a fine art. <strong>The</strong>y traintheir people in the art of secrecy from the time they are born. Mosteverything they do, is done orally. <strong>The</strong>y are trained not <strong>to</strong> write rituals<strong>an</strong>d other things down. <strong>The</strong>re is very little paper trail left by the<strong>Illuminati</strong>. <strong>The</strong> creation of slaves with pho<strong>to</strong>graphic memories facilitatesthis secrecy. But this book is not about how they have m<strong>an</strong>aged <strong>to</strong>keep their trauma-based Monarch <strong>Mind</strong>-Control a secret. <strong>The</strong>y have7


m<strong>an</strong>aged only <strong>to</strong> keep it a secret <strong>to</strong> the general public. <strong>The</strong>y have notbeen able <strong>to</strong> completely cover-up the millions of wasted lives that theirprogramming has ruined. For m<strong>an</strong>y years, they were able <strong>to</strong> shut-up<strong>an</strong>d quietly discard their programmed multiples by labelling themPar<strong>an</strong>oid Schizophrenics. But therapists are now correctly identifyingthese people as programmed multiples <strong>an</strong>d are not only diagnosingthem better but giving them better treatment. After C<strong>an</strong>dy Jones’shusb<strong>an</strong>d deprogrammed her enough that she could participate inwriting a book exposing some of what had been done <strong>to</strong> her, thesecret was out. (See <strong>The</strong> Control of C<strong>an</strong>dy Jones Hypnotism <strong>an</strong>d theCIA by Donald Bain.) Ever since then, the intelligence agencies <strong>an</strong>dthe <strong>Illuminati</strong> have been carrying out damage control. <strong>The</strong>ir biggestdamage control campaign has enlisted the power of Hollywood <strong>an</strong>dthe controlled Media. This campaign is known as the False MemorySyndrome campaign, or as those of us who know the facts like <strong>to</strong> call it“the false memory spin-drome.” <strong>The</strong> headquarters of the False MemorySpin-drom Foundation is located at 3401 Market St., Suite 130,Philadelphia, PA 19104. Some of the original founders were doc<strong>to</strong>rs ofthe University of Pennslyv<strong>an</strong>nia. <strong>The</strong> inside s<strong>to</strong>ry about these early FMSdoc<strong>to</strong>rs of the University of Pennslyv<strong>an</strong>nia is that they practiced Sat<strong>an</strong>icRituals during their work days. What is unusual about this--is thatgenerally sat<strong>an</strong>ic rituals are performed at night, but these doc<strong>to</strong>rs didtheir coven work during the day. I know about these men. Now youc<strong>an</strong> see why these men started the FMS! <strong>The</strong>y started it <strong>to</strong> cover theirown sins, because m<strong>an</strong>y of them were abusers themselves. In otherwords m<strong>an</strong>y of the EMS people are abusers of trauma-based mindcontrolledslaves, or the victims of abuse who are in denial about theirown abuse from trauma-based mind-control. Martin T. Orn (the personcredited with founding the FMS) had ties <strong>to</strong> the CIA. Two members ofthe EMS advisory board, Ralph Underwager, Ph.D. <strong>an</strong>d theologi<strong>an</strong>,along with Hollida Wakefield, M.A. let the cat out of the bag when theypublicly supported pedophilia (that is adults having sex with children).<strong>The</strong>ir support of pedophilia came in <strong>an</strong> interview with a Dutchmagazine Paidika, <strong>The</strong> Journal of Paedophilia (Winter, 1993). Althoughthe False Memory Syndrome Foundation gets upset at <strong>an</strong>y mentionthat there might be a conspiracy by the perpetra<strong>to</strong>rs of mind-control,because conspiracies supposedly don’t <strong>an</strong>d c<strong>an</strong>’t happen, they w<strong>an</strong>tus <strong>to</strong> believe that all therapists are conspiring <strong>to</strong>gether <strong>to</strong> impl<strong>an</strong>t falsememories of abuse in<strong>to</strong> their clients, which could not be further fromthe truth. Monarch slaves typically run in<strong>to</strong> a great deal of denial bytheir therapists that <strong>an</strong>ything like this could be happening. <strong>The</strong> bot<strong>to</strong>mline is that Multiple Personality Disorder (now refered <strong>to</strong> as DissociativeIdentity Disorder) is a recognized bona fide diagnosis. False MemorySyndrome is not a recognized medical or psychological diagnosis <strong>an</strong>ddoes not appear in the Americ<strong>an</strong> Psychiatric Association’s Diagnostic<strong>an</strong>d Statistical M<strong>an</strong>ual III-R nor the recently released DSM-IV. Those whofollowed Fritz’s writings have learned about the close working8


elationship between the Mondavi’s <strong>an</strong>d the Rothschilds (see his articleabout the Mondavi/Rothschild Napa Valley winery). Guess who got thecourt precedence which gives the EMS some legal ground <strong>to</strong> attacktherapists? <strong>The</strong> precidence was supposedly a wife who went <strong>to</strong> adoc<strong>to</strong>r who <strong>to</strong>ld her she had syphilis. <strong>The</strong> wife assumes she got it fromher husb<strong>an</strong>d <strong>an</strong>d divorces him. <strong>The</strong>n she learns she doesn’t havesyphilis. <strong>The</strong> husb<strong>an</strong>d then sues the doc<strong>to</strong>r. Upon this bizarre case reststhe legal precedence for a third party <strong>to</strong> sue a person who givesadvice, such as family members suing a therapist. Upon this weakprecidence, <strong>an</strong> abusive father who worked for Monday in a winery inCalifornia successfully destroyed a legitimate therapist who was trying<strong>to</strong> save his daughter who was a programmed Monarch victim.Supposedly the therapist had impl<strong>an</strong>ted false memories of rape in hisdaughter, when the record shows that the daughter’s mother <strong>to</strong>ld thetherapist the girl had been raped by the father. When a valid case ofSRA <strong>an</strong>d repressed memories went <strong>to</strong> trial in Washing<strong>to</strong>n state involvinga police officer whose family was MPD, Dr. Richard Ofshe of the FalseMemory Spindrom showed up <strong>to</strong> cause mischief. And mischief he didwork. <strong>The</strong> case involved the children of a “Christi<strong>an</strong>” police officernamed Ingram who had sat<strong>an</strong>ically ritually abused his family for years.<strong>The</strong> daughter won in court, but Ofshe of the EMS was not above writinga book full of lies <strong>an</strong>d dis<strong>to</strong>rtions about the case. Lynn Crook, who wasthe abused daughter in the case wrote up a paper exposing what EMSperson Richard Ofshe did <strong>to</strong> her, <strong>The</strong> controlled media is giving fulllicense <strong>an</strong>d great coverage <strong>to</strong> the EMS people. Rather th<strong>an</strong> fightingthe government for scraps of declassified documents which have hadtheir secrets marked out, <strong>an</strong>d which may even be fake documentsm<strong>an</strong>ufactured by the CIA, I have decided that there is a much betterapproach <strong>to</strong> expose the Monarch <strong>Mind</strong> Control <strong>to</strong> the world. If aperson could never go <strong>to</strong> Nepal, he c<strong>an</strong> see pictures of it <strong>an</strong>d believe itexists. If a person c<strong>an</strong> not get in<strong>to</strong> the <strong>to</strong>p secret records of the CIA <strong>an</strong>dOffice of Naval Intelligence <strong>an</strong>d MI6, they c<strong>an</strong> be given the exactRECIPE for creating a Monarch slave. I believe that by giving the stepby step recipe, people will see that A. all the ingredients are available,B. it is possible <strong>to</strong> combine the ingredients, C. all it takes is the motive <strong>to</strong>do it, <strong>an</strong>d that motive is self-evident. We’ll even provide some of thenames <strong>an</strong>d places as we go along. This book will provide the step-bysteprecipe for making a Monarch <strong>Mind</strong>-Controlled slave, It is a traumabasedmind control which programs multiple personalities using everyknown technique of mind-control. Every type of mind-controltechnique has been combined in<strong>to</strong> a group package which makesthe <strong>to</strong>tal package almost impossible <strong>to</strong> break. It is this ability <strong>to</strong>synthesize all these methods in<strong>to</strong> a group package which is sopowerful. Edward Hunter, author of Brainwashing In Red China, testifiedin 1958 before a U.S. Congressional House Committee on Un-Americ<strong>an</strong>Activities: “Since m<strong>an</strong> beg<strong>an</strong>, he has tried <strong>to</strong> influence other men orwomen <strong>to</strong> his way of thinking. <strong>The</strong>re have always been these forms of9


pressure <strong>to</strong> ch<strong>an</strong>ge attitudes. We discovered in the past thirty years, atechnique <strong>to</strong> influence, by clinical, hospital procedures, the thinkingprocesses of hum<strong>an</strong> beings. Brainwashing is formed out of a set ofdifferent elements ... hunger, fatigue, tenseness, threats, violence, <strong>an</strong>din more intense cases...drugs <strong>an</strong>d hypnotism. No one of these elementsalone c<strong>an</strong> be regarded as brain washing, <strong>an</strong>y more th<strong>an</strong> <strong>an</strong> apple c<strong>an</strong>be called apple pie. Other ingredients have <strong>to</strong> be added, <strong>an</strong>d acooking process gone through. So it is with brainwashing...” Hunter saidbrainwashing was a Red Chinese threat. He said that the chinese werethe ones using these tactics. In reality, this mind control was being donein the U.S. <strong>an</strong>d Hunter was a pawn <strong>to</strong> help justify the criminal activitiesof the programmers should they ever be found out behind their coverof “National security.” <strong>The</strong> h<strong>an</strong>dlers of mind-controlled slaves carryaround a black or grey 3 ring notebook or a lap <strong>to</strong>p computer with theaccess codes <strong>an</strong>d triggers. Some of the programmers <strong>an</strong>d h<strong>an</strong>dlershave this all memorized. <strong>The</strong> deepest parts, core/gems/executivecommittee, false trinity etc. are charted in esoteric l<strong>an</strong>guage such asEnochi<strong>an</strong>, Hebrew (which is considered magical), <strong>an</strong>d Druid symbols. Ihave never gotten the opportunity <strong>to</strong> look at one of these, although <strong>an</strong>umber of the slaves who I’ve talked with have while they were beingprogrammed. <strong>The</strong>se notebooks have color-coded graphs showing thearr<strong>an</strong>gement of alters, the structure of the system, the training of thealters, the his<strong>to</strong>ry of the alters <strong>an</strong>d other details. All the primary <strong>to</strong>rturescarried out on a slave are coded using dates/no.s so that thememories c<strong>an</strong> be pulled up by the programmers. <strong>The</strong>re is a st<strong>an</strong>dardset of h<strong>an</strong>d signals, gestures, <strong>an</strong>d codes that allow a h<strong>an</strong>dler <strong>to</strong> workwith someone else’s slave, but the accepted code among theh<strong>an</strong>dlers is <strong>to</strong> leave <strong>an</strong>other m<strong>an</strong>’s slave alone. As one leadingpsychiatrist put it, “Different ideologies use the same methodologies ofmind control.” <strong>The</strong> <strong>Illuminati</strong> have secretly put in base programmingthat allows them ultimate control over m<strong>an</strong>y of the other groups’slaves. This will be described within this book. For both the ease ofreading <strong>an</strong>d the ease of writing, I have dispensed with most footnotes.To provide my sources would double the size of the book, <strong>an</strong>d m<strong>an</strong>y ofthem are confidential. (In the past, when I have attempted creditinginformation, some people have gotten bruised feelings for having beenpassed over or for being named. When information comes in fromseveral sources, it becomes difficult <strong>to</strong> pass out credit.) I have madeconservative judgement calls about what material I could use. Most ofthis information has been verified by several reliable sources.Confidential eyewitnesses are often the only source, when there is sucha powerful conspiracy <strong>to</strong> keep this vast NWO mind control secret.Paper trails were not left or are not available. Programmed slaves whohave worked for the military as mind-controlled slaves have witnessedtheir files expunged <strong>an</strong>d s<strong>an</strong>itized. <strong>The</strong> New World Order in 1981 madetraining films for their novice programmers. Monarch slave CathyO’Brien was used <strong>to</strong> make both the film “How <strong>to</strong> Divide a Personality”10


<strong>an</strong>d “How To <strong>Create</strong> a Sex Slave.” Two Huntsville porn pho<strong>to</strong>grapherswere used <strong>to</strong> help NASA <strong>an</strong>d the NWO create these training films.Undoubtedly, other porn training films exist <strong>to</strong>o. In others words, there isfilm evidence of the Monarch <strong>Total</strong> <strong>Mind</strong>-control but these porn filmsare kept in very secure sites. During the last few years, I have visitedwith ex-programmers, I have visited with hundreds of victims of theMonarch type programming. I have gone <strong>to</strong> programming sites, I havevisited with therapists who work with the victims of this mind-control,<strong>an</strong>d I have met several of the programmers of the CIA/<strong>Illuminati</strong> face<strong>to</strong> face in the adventures of trying <strong>to</strong> save people from theirprogramming. I hope that God gives me the strength <strong>an</strong>d theopportunity <strong>to</strong> get the information I have learned out <strong>to</strong> the world ingeneral. When this information gets out, hopefully it will help lift some ofthe secrecy of the Monarch Programming. <strong>The</strong> Monarch Programmingis a foundation rock of the New World Order that when pulled up, willreveal the most evil two-legged bugs <strong>an</strong>d slimy critters. When their rockis lifted, they will have <strong>to</strong> scurry <strong>to</strong> hide. Because the authors know whatthe programmers do, they must honestly record several areas ofprogramming that will be controversial. <strong>The</strong> programmers are verymuch in<strong>to</strong> demonology. Before therapists close their minds <strong>to</strong> thissubject, the authors would like <strong>to</strong> point out, that they personally knowof cases where Monarch slaves whose Christi<strong>an</strong> personalities & otheralters didn’t believe in demonology were talked in<strong>to</strong> participating inreal deliver<strong>an</strong>ce, <strong>an</strong>d the slaves discovered much <strong>to</strong> their surprise thatwork they had unsuccessfully tried <strong>to</strong> do for years with their therapistwas accomplished in a day or two. Some prestigious researchers havedecided the subconscious doesn’t exist because they c<strong>an</strong>’t find it--itsmysterious. To the m<strong>an</strong> in the street the concept “subconscious” is asmysterious as the concept “demon”. Both have been the objects ofintense research by U.S./Brit./Ger. Intelligence groups. In fact, m<strong>an</strong>y ofthe concepts in this book have been purposely obscurred by the<strong>Illuminati</strong>’s control over the media <strong>an</strong>d universities. <strong>The</strong>se obscurredconcepts include M.P.D. (DID), recovered memories, hypnosis,demonic possession, aliens, mind-control, the subconscious, aconspiracy <strong>to</strong> bring in a NWO, truth, etc. <strong>The</strong> smokescreens ofcontroversy will continue; but those who love the truth, if they seek it,will realize the import<strong>an</strong>ce of this book. It’s on public record that MKULTRA, the mind control research which CIA direc<strong>to</strong>r Admiral St<strong>an</strong>sfieldTurner admitted <strong>to</strong> in 1977 spent millions of dollars studing Voodoo,witchcraft, <strong>an</strong>d psychics. On August 3, 1977, at a Senate hearing thethen CIA direc<strong>to</strong>r Admiral St<strong>an</strong>sfield Turner disclosed that the CIA hadbeen conducting mind control on countless numbers of unsuspectingvictims for years, without their knowledge or consent. <strong>The</strong>se CIA mindcontroloperations were carried out with the participation of a least 185scientists <strong>an</strong>d at least 80 Americ<strong>an</strong> institutions, including prisons,pharmaceutical comp<strong>an</strong>ies, hospitals, <strong>an</strong>d 44 medical colleges &universities. M<strong>an</strong>y of America’s most prestigious institutes of medical11


esearch, had cooperated with the CIA. as well as numerous big namecorporations. Casey admitted that day that the CIA did mind-controlconsisting of drugs, hypnosis & electro-shock. A few of the victims of theMonarch Project were even awarded fin<strong>an</strong>cial compensation for theirmisery. But what was admitted was admitted in the spirit of covering upthe extent of the full truth. <strong>The</strong> compensation was actually hush money,because victims were given “gag orders” by judges not <strong>to</strong> talk aboutwhat had happened <strong>to</strong> them. It’s been a disaster for Monarch victimsthat so m<strong>an</strong>y ministers have ignored those words of their Scripture, “Forwe are not ignor<strong>an</strong>t of the devil’s devices.” 2 COR 2:11 This book is amust for those ministers who seriously believe “Having therefore thesepromises, dearly beloved, let us cle<strong>an</strong>se ourselves from all filthiness ofthe flesh <strong>an</strong>d spirit, perfecting holiness in the fear of God.” 2 COR 7:1. In2 TIM 2: 19-21, believers who “nameth the name of Christ” are asked <strong>to</strong>purge themselves of their uncle<strong>an</strong>liness ( uncle<strong>an</strong> spirits). <strong>The</strong>re arem<strong>an</strong>y <strong>to</strong>p notch Christi<strong>an</strong>s in the churches <strong>to</strong>day who are under mindcontrol,incl. m<strong>an</strong>y of the Christi<strong>an</strong> leadership. I would like <strong>to</strong> remindChristi<strong>an</strong> ministers that Isaiah the great prophet said, “<strong>The</strong> Lord GODhath given me the <strong>to</strong>ngue of the learned that I should know how <strong>to</strong>speak a word in season <strong>to</strong> him that is weary: he wakeneth morning bymorning; he wakeneth mine ear <strong>to</strong> hear as the learned.” Ignor<strong>an</strong>ce isnot godliness. Isaiah learned <strong>to</strong> speak with the great learned men of hisday, just as Paul the great apostle could speak <strong>to</strong> the learned men ofhis time. One of the character traits of God is that He is all-knowing.WHO says it is godly <strong>to</strong> be ignor<strong>an</strong>t? <strong>The</strong> prophet D<strong>an</strong>iel said YahwehGod “reveals the deep <strong>an</strong>d secret things.” (D<strong>an</strong>. 2:22a) God’sinstruments will do this revealing. Jesus’ advice <strong>to</strong> his disciples was ineffect <strong>to</strong> “Be wise as serpents, <strong>an</strong>d gentle as a lamb”. This advicecertainly applies in helping the victims of trauma-based mind-control.Paul in his letter <strong>to</strong> the <strong>The</strong>ssaloni<strong>an</strong>s (1 <strong>The</strong>s 5:14) says that in effect thatdifferent people need different counseling, but they all need <strong>to</strong> betreated with patience. <strong>The</strong> first step in suggesting a cure is <strong>to</strong> find outwhat happened. That is what this book is about. This book is about howthe Occult Network creates the problem that therapists <strong>an</strong>d a fewministers try <strong>to</strong> deal with. But the keys <strong>to</strong> open doors <strong>to</strong> healthy solutionsfor the victims of trauma-based <strong>to</strong>tal mind control will revealthemselves in this book for the reader as this book reveals the nitty-grittyof how the <strong>to</strong>tal mind-control happens. Christ came <strong>to</strong> free thecaptives (Isaiah 61:1). Sat<strong>an</strong>ic ritual abuse has a his<strong>to</strong>ry that is almost asold as his<strong>to</strong>ry itself. Good King Hezekiah was a victim as a child of SRA.(2 Chr. 29) who got free. Moses confronted the sat<strong>an</strong>ic magic ofPharoah’s magici<strong>an</strong>s who could create live snakes from sticks. <strong>The</strong>Apostle Paul had <strong>to</strong> deal with Simon Magus, a leader of what is nowknown as Sat<strong>an</strong>ism. Solomon, one of the greatest men of faith,backslide <strong>an</strong>d became one of the greatest sat<strong>an</strong>ists of all his<strong>to</strong>ry. Wehave “no fellowship with unfruitful works of darkness, but rather reprovethem” (as per EPH 5:11). While we have no fellowship with evil, the12


mind-control programmers are counting on us being so ignor<strong>an</strong>t oftheir devices that they c<strong>an</strong> hide their control devices behind perversion& filth that m<strong>an</strong>y people shy away from. We must be strong enough <strong>to</strong>face evil <strong>an</strong>d not shy away from it. <strong>The</strong> victims of mind-control mustlook evil in the face & not look away <strong>to</strong> gain their freedom. We, whow<strong>an</strong>t <strong>to</strong> help them, must be courageous & strong enough <strong>to</strong> do this<strong>to</strong>o. This book is written for that divine goal “till we all come in the unityof the faith, <strong>an</strong>d of the knowledge of the Son of God, un<strong>to</strong> a perfectm<strong>an</strong>, un<strong>to</strong> the measure of the stature of the fulness of Christ.” Eph. 4:13If the body of Christ is <strong>to</strong> attain fullness, we need this book <strong>to</strong> weed outthe hidden terrible c<strong>an</strong>cer that is consuming the body from within. Thisbook is written for ministers, secular <strong>an</strong>d Christi<strong>an</strong> therapists, <strong>an</strong>d truthlovers of all kinds. If you love the truth this book is for you. If you seesomething good in the hum<strong>an</strong> race so that our species should bepreserved as well as the spotted owl <strong>an</strong>d the s<strong>an</strong>d flea, then this bookis for you. IF YOU LOVE THE TRUTH, this BOOK is for YOU.GLOSSARY OF HOW BASIC TERMS ARE USED IN THIS BOOKFor those readers who are not familiar with these basic terms let usintroduce you <strong>to</strong> the definitions under which this book uses them.Alter - Our usage is trying <strong>to</strong> follow the programmers usage of this word.A dissociated part of the mind which has a seperate identity <strong>an</strong>d isgiven cue codes by the mind-control programmers <strong>to</strong> trigger thatdissociated part of the mind <strong>to</strong> come <strong>to</strong> the front of the mind. <strong>The</strong>alter’s identity may be a gem, rock, a tape recorder, a poodle, a whitekitten, a dove, a horse, or even think of itself as a person or a demon. Itall depends on its programming. An alter is different from <strong>an</strong> alterfragment in that the alter fragment is a dissociated part of the mindwhich serves only a single purpose. <strong>The</strong> programmers will give <strong>an</strong> altera his<strong>to</strong>ry, <strong>an</strong>d insure that shadow alters will provide a full r<strong>an</strong>ge ofaccessible emotions. Sometimes the distinctions between alters <strong>an</strong>dalter fragments is vague, but examples from the two ends of thespectrum are easy <strong>to</strong> tell apart. We use the word alter in this book <strong>to</strong>conform <strong>to</strong> what the programmers’ charts are encoding as alters. Atypical main Mengele-created grid would be a grid of 13x13 principalA-coded alters, which is 169 principle alter personalities. In <strong>Illuminati</strong>systems, ceremonial “alters will consist of 3 alters placed on a spinningpedistal <strong>to</strong>gether in<strong>to</strong> triad goddesses or gods. That me<strong>an</strong>s that <strong>an</strong> A-coded alter on some levels is actually 3 alters spinning <strong>to</strong>gether, whichmust be locked in place <strong>to</strong> communicate with, <strong>an</strong>d then rotated <strong>to</strong>communicate <strong>to</strong> the other two.13


Beta - This is the second Greek letter, <strong>an</strong>d it represents the sexualmodels <strong>an</strong>d sexual alters that the Programmers are creating. <strong>The</strong>primitive part of the brain is involved in this type of programming. Anearly sexual abuse event will be used <strong>to</strong> <strong>an</strong>chor this programming.<strong>The</strong>se sexual slaves will develop sexual abilities that are far beyondwhat the public is aware is even possible. <strong>The</strong>y also receive the worstkind of abuse far beyond what most people’s imagination c<strong>an</strong> picture.Beta alters generally see themselves as cats.Councils (llluminati) - <strong>The</strong> <strong>Illuminati</strong> has frequent meetings. Some ofthese meetings are org<strong>an</strong>ized <strong>to</strong> appear “acephalous” <strong>an</strong>d“accidential” in their meetings, when in reality they are structured <strong>an</strong>dpl<strong>an</strong>ned. One group, MJ-12 has gone by the following names: theGroup, the Special Study Group, the Wise Men, the OperationsCoordinating Board (OCB), 5412 Committee, 303 Committee, 40Committee, PI-40 Committee, <strong>an</strong>d Policy Pl<strong>an</strong>ning Group (PCG). Someof the formal policy <strong>an</strong>d ritual groups have names that all <strong>Illuminati</strong>members who have gotten high enough <strong>to</strong> learn, will recognize:<strong>The</strong> Council of 3, Council of 5, Council of 7, Council of 9, <strong>The</strong> Gr<strong>an</strong>dDruid Council, <strong>The</strong> Committee of 300, <strong>an</strong>d the Committee of 500(known as Fortune 500). M<strong>an</strong>y of the meetings are conclaves withoutformal names. <strong>The</strong> Gr<strong>an</strong>d Druid Council is not something fictional, but<strong>an</strong> actual body of people who formally meet <strong>an</strong>d whose membership,we have been trying <strong>to</strong> keep track of. <strong>The</strong> groups which makedecisions <strong>to</strong> control this pl<strong>an</strong>et are networked <strong>to</strong>gether. Each decisionhas its own origin <strong>an</strong>d route that it takes.Delta - This is a Greek letter shaped like a tri<strong>an</strong>gle which symbolizesch<strong>an</strong>ge in calculus. It has become a favorite word <strong>to</strong> use in namingthings for the occult elite. Delta teams are 4 person assassination teamswhich usually are secret teams. Delta Forces is <strong>an</strong> elite unit tha<strong>to</strong>perates under the Joint chiefs of staff that is made up of highly trained<strong>to</strong>tal mind-controlled slaves. Delta models are slaves whose solepurpose is assassination. Delta alters are alters within <strong>an</strong> <strong>Illuminati</strong> altersystem which are programmed <strong>to</strong> be assassins. <strong>The</strong>se alters are oftensome of the deepest in a system <strong>an</strong>d in a Genie bottle or with Umbrellaprogramming.Deliver<strong>an</strong>ce ministry - (This book is about HOW the mind-control isdone, it is not a textbook on solutions.) <strong>The</strong> use of the term deliver<strong>an</strong>ceministry in this book connotates <strong>an</strong>y person(s) who via faith in God isable <strong>to</strong> pray for divine help in a fashion that a victim is helped fromdemonic activity. A deliver<strong>an</strong>ce ministry is a natural outgrowth of a lifein harmony <strong>an</strong>d fellowship with Yahweh God. However, this is not <strong>to</strong> beconfused with Exorcism of the traditional Catholic or witchcraft naturein which certain spells <strong>an</strong>d inc<strong>an</strong>tations are used in a prescribed14


method. “Deliver<strong>an</strong>ce” connotates divinely inspired faith, exorcisminvolves ritual. A deliver<strong>an</strong>ce ministry might perhaps teach a personabout forgiveness, or how they c<strong>an</strong> renounce <strong>an</strong> oath, or how <strong>to</strong> applyJesus Christ’s a<strong>to</strong>ning blood <strong>to</strong> their life. In this fashion, the person findsdeliver<strong>an</strong>ce through biblical spiritual principles rather th<strong>an</strong> the efficacyof some ritual or hocus pocus spell. This book is in no way me<strong>an</strong>t as abl<strong>an</strong>ket endorsement of every spiritual warfare tactic. If <strong>an</strong>ything, thisbook suggests that ministers learn more about mind-control, as well asgrow stronger in their walk with Almighty God.<strong>Illuminati</strong> - <strong>The</strong> <strong>Illuminati</strong> are 13 elite bloodlines which havem<strong>an</strong>uevered themselves in<strong>to</strong> control over this pl<strong>an</strong>et. <strong>The</strong>y lead doublelives, one for society <strong>an</strong>d a hidden one which is based on a gnosticluciferi<strong>an</strong> philosophy which consists of lots of blood ritualsMonarch Programming - This was a specific Project carried out bysecret elements of the U.S. government <strong>an</strong>d intelligence groups. <strong>The</strong>rewere, according <strong>to</strong> someone a few years ago who had access <strong>to</strong> thecomputer(s) which contains all the names of active moni<strong>to</strong>red hum<strong>an</strong>slaves, 40,000 actively moni<strong>to</strong>red Monarch slaves. However, this bookuses the term generically <strong>to</strong> include all victims who have suffered thistype of trauma-based mind-control. In the same way, that a br<strong>an</strong>dname like “Hyster” is used <strong>to</strong> describe all lifts--when we use the term weuse it in its broadest sense. This is the only way it c<strong>an</strong> be used <strong>an</strong>dtechnically correct, because as of this date, the authors have not seenwho is on the active Monarch Program list of slaves.System - This term is used in several ways. It is frequently used <strong>to</strong> refer <strong>to</strong>a victim of <strong>to</strong>tal mind control because the victim consists of alters,programming, impl<strong>an</strong>t(s), internal computers, <strong>an</strong>d numerousdissociative states which function <strong>to</strong>gether as a system. <strong>The</strong> word is alsoused in this book <strong>to</strong> refer <strong>to</strong> the body’s functional physiological units,such as the respira<strong>to</strong>ry system. <strong>The</strong> word is also infrequently used <strong>to</strong>denote the established social-economic-political system controlling theworld, also known insiders as the Network. Other st<strong>an</strong>dard me<strong>an</strong>ingmay also occasionally be used for the word.Multiple Personality (DID) - Multiple personalities or MPD or DissociativeIdentity Disorder is the situation where different dissociative parts of asingle brain view themselves as separate persons. <strong>The</strong> DSM-IIIRdefinition of MPD is the guideline for determining MPD for this book.New World Order - <strong>The</strong> New World Order is the global design for a One-World-Government One-World-Dicta<strong>to</strong>r <strong>an</strong>d its constituents. Insiders callthemselves the “network” <strong>an</strong>d “the neighborhood”.15


Sat<strong>an</strong>ic Ritual Abuse (SRA) - This is used <strong>to</strong> represent all categories ofritual abuse which would be inspired by the desire <strong>to</strong> rob, kill, or destroysomething worthwhile in a person, especially their freedom of thought.M<strong>an</strong>y groups carrying out SRA do not mention Sat<strong>an</strong> by that name.<strong>The</strong>y may make Pacts <strong>to</strong> Baphomet, <strong>an</strong>d call upon Rex Mundi, orBelair, or Lucifer, or the Father of Light, God, or Kali or even “Jesus” or“Jesus Christ” (there are demons which call themselves “Jesus”, whoare not <strong>to</strong> be confused with Yeshua or Yehoshua ben Joseph who isknown as Jesus Christ of Nazareth.) SRA is not a value judgement bythe authors against some group, the victims themselves on some levelknow that he or she is being abused.Switching - This is when one part (fragment) of the mind takes over from<strong>an</strong>other, or in simple terms, this is when one alter personality (or alterfragment) takes the body from the alter which is holding the body.Switching c<strong>an</strong> occur via the Programmers’ codes for calling up alters,or by external or internal stimuli that trigger <strong>an</strong> alter <strong>to</strong> come out.Switching will usually cause at least a flicker of the eyes, <strong>an</strong>d for outsideobservers, who know the different personalities, they will observe<strong>an</strong>other personality take the body.16


CHAPTER 1.SCIENCE NO. 1. THE SELECTION & PREPARATION OF THE VICTIMA - SELECTION BASED ON GENETICS & DISSOCIATIVE ABILITIESB - AVAILABILITYC - MENTAL AND PHYSICAL FEATURESOne of the primary reasons that the Monarch mind-controlprogramming was named Monarch programming was because of theMonarch butterfly. <strong>The</strong> Monarch butterfly learns where it was born (itsroots) <strong>an</strong>d it passes this knowledge via genetics on <strong>to</strong> its offspring (fromgeneration <strong>to</strong> generation). This was one of the key <strong>an</strong>imals that tippedscientists off, that knowledge c<strong>an</strong> be passed genetically. <strong>The</strong> Monarchprogram is based upon <strong>Illuminati</strong> <strong>an</strong>d Nazi goals <strong>to</strong> create a Masterrace in part through genetics. If knowledge c<strong>an</strong> be passed genetically(which it is), then it is import<strong>an</strong>t that parents be found that c<strong>an</strong> pass thecorrect knowledge on<strong>to</strong> those victims selected for the Monarch mindcontrol.<strong>The</strong> primary import<strong>an</strong>t fac<strong>to</strong>r for the trauma-based mindcontrolis the ability <strong>to</strong> disassociate. It was discovered that this ability ispassed genetically from generation <strong>to</strong> generation. Americ<strong>an</strong> Indi<strong>an</strong>tribes (who had traumatic ritual d<strong>an</strong>ces <strong>an</strong>d who would waitmotionless for hours when hunting), children of Fakirs in India (whowould sleep on a bed of nails or walk on hot coals), children of Yogis(those skilled in Yoga, who would have <strong>to</strong>tal control over their body intr<strong>an</strong>ce), Tibet<strong>an</strong> buddhists, children of Vodoun, Biz<strong>an</strong>go <strong>an</strong>d othergroups have a good ability <strong>to</strong> disassociate. <strong>The</strong> children ofmultigenerational abuse are also good at dissociation. <strong>The</strong> <strong>Illuminati</strong>families <strong>an</strong>d Europe<strong>an</strong> occultists went <strong>to</strong> India, <strong>an</strong>d Tibet <strong>to</strong> studyoccultism <strong>an</strong>d eastern philosophy. <strong>The</strong>se Europe<strong>an</strong>s learned yoga,t<strong>an</strong>tric yoga, meditations, <strong>an</strong>d tr<strong>an</strong>ces <strong>an</strong>d other methods <strong>to</strong>disassociate. <strong>The</strong>se skills are passed on <strong>to</strong> their children via genetics. Atest is run when the children are about 18 months old <strong>to</strong> determine ifthey c<strong>an</strong> dissociate enough <strong>to</strong> be selected for programming or not.<strong>Mind</strong>-controlled slaves are created for different purposes, hierarchy ornon-hierarchy purposes. <strong>The</strong> <strong>Illuminati</strong> create mind-controlled slaveswho are <strong>to</strong> function within the <strong>Illuminati</strong> hierarchy. <strong>The</strong>se slaves willusually have their genealogies hidden, <strong>an</strong>d will be created <strong>to</strong> haveexcellent cover lives <strong>to</strong> insure that they are not detected. <strong>The</strong>y will begiven multifunctional programming, <strong>an</strong>d will usually be used <strong>to</strong> help17


program other slaves. <strong>The</strong> abuse will not be as physically visible as it willbe on the bodies of slaves who are not born <strong>to</strong> be part of the <strong>Illuminati</strong>elite. Members of Moriah’s (Moriah = the <strong>Illuminati</strong>) Luciferi<strong>an</strong> elite willhave undergone as much trauma as other slaves, however the <strong>to</strong>rturescars <strong>an</strong>d the control are better concealed. <strong>The</strong>se children will oftenreceive lavish experiences as well as talks <strong>to</strong> convince them that theyare part of the elite. (By the way, body scars will show up better underblack light, that is the same black light as used in clubs.) <strong>The</strong> <strong>Illuminati</strong><strong>an</strong>d other org<strong>an</strong>izations have also programmed individuals who aresimply expendable. <strong>The</strong>se are sex slaves who are used up <strong>an</strong>d killedvery early in life, one-time use saboteurs, breeders, soldiers, drugcouriers <strong>an</strong>d so forth. <strong>The</strong> bodies of these people will often show visible<strong>to</strong>rture scars. <strong>The</strong> expendable are the children of parents who wereblackmailed in<strong>to</strong> turning their children over <strong>to</strong> the CIA. This is all hiddenby the power of the National Security Act. <strong>The</strong>se are children, whohave been sold by pedophile fathers, or pornographic parents. <strong>The</strong>programmers/masters program them with the expectation that theywill be “thrown from the freedom train” when they get <strong>to</strong> age 30.(Freedom Train is the code word for the Monarch trauma-based mindcontrol.To be thrown from the Freedom Train me<strong>an</strong>s <strong>to</strong> be killed.) <strong>The</strong>CIA <strong>an</strong>d the <strong>Illuminati</strong> are skilled at blackmailing parents <strong>to</strong> give uptheir children. <strong>The</strong>y would watch the mail for porn. Pedophile <strong>an</strong>dmurderers who abuse their children are warned that they will go <strong>to</strong>prison for long lengths of time if they do not cooperate by selling theirchildren in<strong>to</strong> mind-controlled slavery. In return for the parent’scooperation, they provide rich fin<strong>an</strong>cial rewards <strong>to</strong> the parent(s). It’sclearly a case of “if you don’t cooperate you lose in life big time, if youdo cooperate you win big time.” Ministers are often set up with Betas(a sexual model) who then blackmail them. <strong>The</strong> ministers do not w<strong>an</strong>t<strong>to</strong> lose their status <strong>an</strong>d profession via sc<strong>an</strong>dals, so they agree <strong>to</strong> turntheir children over when young <strong>to</strong> the CIA <strong>to</strong> work with. <strong>The</strong> <strong>Illuminati</strong>like <strong>to</strong> blackmail these ministers when they are finished with theirSeminary schooling <strong>an</strong>d committed <strong>to</strong> the ministry at about 33 years ofage. <strong>The</strong> idea of having nothing <strong>to</strong> fall back on after they havecommitted their entire life <strong>to</strong> one profession is <strong>to</strong>o much for these weakwilled men, <strong>an</strong>d they buckle under the threats. If they don’t buckleunder, the resulting consequences will remove them from ministry. <strong>The</strong>type of father who is most preferred by the Programmers <strong>to</strong> offer uptheir children for programming is the pedophile. If a father will abuse hisown little baby girl, then the Programmers know that the m<strong>an</strong> has noconscience. This father’s involvement in criminal activity (<strong>an</strong>d therebyhis vulnerability) c<strong>an</strong> be continually increased. <strong>The</strong>y w<strong>an</strong>t men whothey believe will not develop <strong>an</strong>y qualms later on in life about whatthey have done. A m<strong>an</strong>, who waits until his daughter is a teenager <strong>to</strong>molest her, is usually esteemed <strong>to</strong> have <strong>to</strong>o much conscience for theprogrammers. A big distinction must be made between hierarchyMonarch slaves, <strong>an</strong>d non-hierarchy Monarch slaves. <strong>The</strong> reason there is18


house rafters. <strong>The</strong> best therapists will quietly admit that traditionaltherapy is inadequate. Unless God intervenes, people who are bornin<strong>to</strong> the <strong>Illuminati</strong> don’t escape it while alive. This book isn’t a mereexercise of academic thinking, but is written with the assur<strong>an</strong>ce thatfreedom is possible, there are viable <strong>an</strong>swers. Some children live infoster homes, or with adopted parents, or in orph<strong>an</strong>ages, or withcaretakers <strong>an</strong>d guardi<strong>an</strong>s. Because these children are at the mercy ofthe non-related adults, these types of children frequently are sold <strong>to</strong>become mind-controlled slaves of the intelligence agencies. In review,remember that because m<strong>an</strong>y of these org<strong>an</strong>izations are controlled bythe <strong>Illuminati</strong>; <strong>an</strong> <strong>Illuminati</strong> slave may often work for one of these frontgroups, while the <strong>Illuminati</strong> maintain control over the base-program.<strong>The</strong> intelligence networks were started by <strong>an</strong>d run by the <strong>Illuminati</strong>.<strong>The</strong>y are <strong>Illuminati</strong> fronts. <strong>The</strong> use of slaves crosses m<strong>an</strong>y org<strong>an</strong>izationalboundaries within the overall Network. If a slave is <strong>to</strong> be used as a Deltamodel (assassination), they may be selected for strength <strong>an</strong>d dexterity.<strong>The</strong> Delta Force is the army’s elite unit made up of Monarch slaves. Ifthey are <strong>to</strong> operate as a Beta model (sexual slave), they will be chosenif they c<strong>an</strong> master technique. Occassionaly they might in somecircumst<strong>an</strong>ces be selected for how pretty the programmers expect thechild <strong>to</strong> become. Some parents have produced good looking children<strong>an</strong>d are actually sought-after <strong>to</strong> bear children <strong>to</strong> sell in<strong>to</strong> the <strong>Mind</strong>Controlled Slavery “Freedom Train” System. However, vastly moreimport<strong>an</strong>t for Beta Sex Slaves are their ability <strong>to</strong> be programmed <strong>to</strong>have charm, seductive skills, charisma, <strong>an</strong>d creativity. Beauty is in theeye of the beholder, <strong>an</strong>d the programmers c<strong>an</strong> put almost <strong>an</strong>y kind ofbody <strong>to</strong> use as a sex slave. Almost <strong>an</strong>y sex slave c<strong>an</strong> fit somewhere in<strong>to</strong>the script of the <strong>Illuminati</strong>/New World Order/crime syndicate “porn”movies. (I place porn in quotation marks--because what they call porndoesn’t resemble what the public thinks of porn--we’re not talkingPlayboy type porn, we’re talking ghastly horrible atrocities that are assick as <strong>an</strong>ything done in the Nazi concentration camps). For inst<strong>an</strong>ce, ittakes little acting ability or beauty <strong>to</strong> have one’s head chopped offwhile having sex. <strong>The</strong>re are different types of sexual slaves, but the<strong>Illuminati</strong> w<strong>an</strong>ts <strong>to</strong> get Beta alters which are sharp, talented, skilled, <strong>an</strong>dresourceful. <strong>The</strong>y will use these Beta alters, such as the Black Widowalters, for espionage <strong>an</strong>d blackmail. To make sure that the child’s minddevelops properly, the baby will be interacted with so that those areasof the brain that are import<strong>an</strong>t <strong>to</strong> develop will develop <strong>to</strong> themaximum. It is a well-known fact, that areas of the brain growaccording <strong>to</strong> how much stimulation <strong>an</strong>d use that area of the brainreceives. For this reason, Gr<strong>an</strong>de Dames, who are involved inprogramming, will spend time drawing <strong>an</strong>d showing faces <strong>to</strong> the child<strong>an</strong>d seeing if the child c<strong>an</strong> recognize identical faces. Almost <strong>an</strong>y otheritem will be used, c<strong>an</strong>dy c<strong>an</strong>es with stripes (match the c<strong>an</strong>dyc<strong>an</strong>eswith the same no. of stripes), trees, or pencils. <strong>The</strong> child must learn <strong>to</strong>match identical items very early--even before they c<strong>an</strong> speak. This is so21


they will be able <strong>to</strong> build mirror images in<strong>to</strong> their mind. All the sensesare trained for building the mirror images; for inst<strong>an</strong>ce such as silks <strong>an</strong>dcot<strong>to</strong>ns c<strong>an</strong> be used for the sense of <strong>to</strong>uch. <strong>The</strong> child will have <strong>to</strong>match textures. <strong>The</strong> Programmer, the Gr<strong>an</strong>de Dame, <strong>an</strong>d Gr<strong>an</strong>deMothers will teach the child <strong>to</strong> have good abilities in copying,reflecting, repeating, echoing, or re-echoing, <strong>an</strong>d mirroring. <strong>The</strong>y willbe taught for hours how <strong>to</strong> re-echo something verbatim. Some of theseteaching methods are almost like games. For inst<strong>an</strong>ce, 20 pins will be ina box <strong>an</strong>d the small child is given a short time <strong>to</strong> decide how m<strong>an</strong>ypins are in the box. A certain level of intelligence <strong>an</strong>d creativity isneeded for time <strong>to</strong> be wasted on programming. You c<strong>an</strong> not programa mind which is weak. Most of the people programmed are veryintelligent. One study of multiples said that multiples were 130 or abovein 1.0. <strong>an</strong>d then mistakenly blamed their multiplicity on their 1.0.Attempts <strong>to</strong> program people with low intelligence or no creativity werediscovered <strong>to</strong> be a waste of time. Methods are used <strong>to</strong> greatlyenh<strong>an</strong>ce the victim’s intelligence <strong>an</strong>d creativity. <strong>The</strong> <strong>Illuminati</strong> will alsowork on enh<strong>an</strong>cing their psychic abilities such as telepathy <strong>an</strong>dcliarvoy<strong>an</strong>ce. <strong>The</strong> head programmers have their own little mot<strong>to</strong>sabout building solid structures which they like <strong>to</strong> express <strong>to</strong> newtrainees. <strong>The</strong>se include, “An unstructured house [mind of the slave] islike un<strong>to</strong> a house without walls”, “A house undisciplined is like un<strong>to</strong> ahouse without walls, it will crumble within itself’, <strong>an</strong>d “A house dividedagainst itself will not st<strong>an</strong>d.” Much of the structuring will be discussed inchapter 7, but the structuring begins at birth for the victim, so thischapter will discuss the first steps. In order <strong>to</strong> build a solid good house,one needs <strong>to</strong> have a solid foundation. In order <strong>to</strong> build a solidfoundation, one needs <strong>to</strong> know how the l<strong>an</strong>d lays <strong>an</strong>d what theweaknesses of the l<strong>an</strong>d are--if it is s<strong>an</strong>d or rock or clay, etc. One needs<strong>to</strong> design one’s house <strong>to</strong> take adv<strong>an</strong>tage of the natural lay of the l<strong>an</strong>d.Will s<strong>to</strong>rms come from this or that direction? Where will the house needextra protection? <strong>The</strong> very same principles pertain <strong>to</strong> programming--because a structure is being built. M<strong>an</strong>y evil geniuses within the<strong>Illuminati</strong> added their contributions <strong>to</strong> the Monarch programming. Oneof the most import<strong>an</strong>t was John Gittinger of Oklahoma, because hewas the genius who could underst<strong>an</strong>d how a little child’s mind waswhen it was in inf<strong>an</strong>cy. In order <strong>to</strong> work with something, you must knowwhat you are working with. John Gittinger, who is no longer alive,worked at programming for years. His contribution was in the mentalassessment area. John Gittinger (b. 1909) was the direc<strong>to</strong>r ofpsychological services at the state hospital in Norm<strong>an</strong>, Oklahoma. Hegot a master’s degree at age 30, <strong>an</strong>d joined the CIA’s MK Ultra <strong>Mind</strong>Control in 1950. He was a high school guid<strong>an</strong>ce counselor <strong>an</strong>d a Navylieuten<strong>an</strong>t comm<strong>an</strong>der during W.W.II. In the late 1970s, he moved back<strong>to</strong> Oklahoma. He was heavy set <strong>an</strong>d goateed. Its been said he lookedlike the ac<strong>to</strong>r Walter Slezak. He had <strong>an</strong> insatiable curiosity aboutunderst<strong>an</strong>ding hum<strong>an</strong> personality. When the <strong>Illuminati</strong> looked around22


for men skilled in personality assessment <strong>to</strong> assist the MonarchProgramming, John W. Gittinger was one of their men who theyselected. Gittinger was not the only researcher in<strong>to</strong> personality that theCIA hired, but he was their <strong>to</strong>p m<strong>an</strong> in terms of the programming ofchildren. From the end of W.W. II until he beg<strong>an</strong> with the CIA in 1950,Gittinger was studying how <strong>to</strong> assess personality. At the OklahomaState Hospital, he had large numbers of adults who could be studied.After Gittinger started doing personality assessment for the CIA. most ofhis work became highly classified. <strong>The</strong> Rolling S<strong>to</strong>ne article of July 18,1974 asked why years of research in<strong>to</strong> personality assessment should beso secret. In fact it was so secret, that Gittinger was not allowed <strong>to</strong> talk<strong>to</strong> journalists, even though it was public knowledge that Gittinger didpersonality assessment work/research. <strong>The</strong> reason that such <strong>an</strong>apparently benign science was kept secret is that it plays a major partin the success of the Monarch Programming. John Gittinger designedthe PAS (Personality Assessment System). This is <strong>an</strong> extraordinarymethod <strong>to</strong> evaluate hum<strong>an</strong> behavior <strong>an</strong>d predict their future behavior.As far as we know, most of the PAS is still classified SECRET. <strong>The</strong> PAS isbased on the ability <strong>to</strong> differentiate different types of people. <strong>The</strong>re are3 major differentiations (or dimensions). <strong>The</strong>y are called the E-Idimension, the R-F dimension, <strong>an</strong>d the A-U dimension. People are bornwith their original placement within each of these three spectrums. Inother words there are 3 axes that c<strong>an</strong> be graphed <strong>to</strong> describe ababy’s personality. <strong>The</strong> baby might be graphed-- I (Internalizer), F(Flexible), <strong>an</strong>d A (Role Adaptive). If the baby were graphed this way(i.e. I-F-A), then the Programmers would au<strong>to</strong>matically know this child’smind will become a social or religious reformer. <strong>The</strong> child’sprogramming charts would then be labelled some suitable occupationsuch as “Environmental Activist”, “Pentecostal church reformer”,“Consumer Advocate”, or “Activist against Narcotics”. <strong>The</strong>programming for that child then would follow 6 month goals <strong>to</strong>develop that mind-controlled slave in<strong>to</strong> one of the best in tha<strong>to</strong>ccupation. (In fact, one of the co-authors of this book, Fritz, is indeedI-F-A. which helps explain why he is trying <strong>to</strong> reform society <strong>an</strong>d religionwith this book. While it <strong>to</strong>ok Fritz m<strong>an</strong>y years <strong>to</strong> find his correct nitch inlife, programmed multiples are steered in the correct direction veryearly in life with all the breaks <strong>an</strong>d all the money needed from theNetwork <strong>to</strong> open opportunities.) <strong>The</strong>re are three possibilities for the childin regards <strong>to</strong> his original personality components. He c<strong>an</strong> express thecomponent, or suppress or repress it. As the child goes through life, hehas two periods within which he c<strong>an</strong> ch<strong>an</strong>ge (suppress or repress) hisbehavior/personality. In the PAS, the first period is called“compensation” <strong>an</strong>d the second is called “modification”. <strong>The</strong> amoun<strong>to</strong>f punishment for a personality trait <strong>an</strong>d pressure <strong>to</strong> ch<strong>an</strong>ge fromothers will determine the amount of ch<strong>an</strong>ge which the child’s mind willperform on its original personality. <strong>The</strong> activity level of a person at eachpoint in their life is also measured. <strong>The</strong> intensity of each of the scores is23


also rated. <strong>The</strong> actual PAS system is far more detailed th<strong>an</strong> theexample above, but it serves <strong>to</strong> give a simplified idea of how it works.<strong>The</strong> essential dynamics of <strong>an</strong> entire personality c<strong>an</strong> be written in a shortcode which might be written for example 12(E-uc Fcu + A+u+u)H+.However, even that code is shortened E-uc c<strong>an</strong> be written simply i’. <strong>The</strong>basic 3 dimensions <strong>to</strong> personality provide 8 basic types. However, thePAS allows for 6 basic positions in each of these 8 basic types whichyields 216 discrete basic types. Next, the person c<strong>an</strong> ch<strong>an</strong>ge theirpredisposed primitive personality initially 5 different ways, <strong>an</strong>d this thengives (30)³ or 27,000 different types. <strong>The</strong> second ch<strong>an</strong>ge c<strong>an</strong> be doneon 4 types of modification which makes for 1,728,000 types. <strong>The</strong>n theprogrammers c<strong>an</strong> fac<strong>to</strong>r in activity level, their “Normal” level(intelligence base), age, sex, <strong>an</strong>d education, <strong>an</strong>d life experiences. Inother words, what appears <strong>to</strong> be simple has a high degree ofcalibration <strong>to</strong> it. <strong>The</strong> person who was best with the PAS was itsbrainchild Gottinger himself. His intuition along with his PAS system,gave him <strong>an</strong> unc<strong>an</strong>ny idea of how a person's s mind works now, <strong>an</strong>dhow it would work in the future. He sadistically reveled in putting his skill<strong>to</strong> use programming children.<strong>The</strong> actual assessment codes that have appeared on programmingassessment charts which the Monarch child assessment teams haveused <strong>to</strong> evaluate, describe, & assess a child <strong>to</strong> be programmed followthe st<strong>an</strong>dard symbols created for PAS. Some about Gittinger’s work hasescaped the secrecy of the intelligence agencies. Concerning theGittinger Personality Assessment System see “An Introduction <strong>to</strong> thePersonality Assessment System” by John Winne <strong>an</strong>d John Gittinger,Journal of Community Psychology Monograph Supplement No. 38.Rutl<strong>an</strong>d, Vermont: Clinical Psychology Publishing Co., Inc. 1973. Seealso the Rolling S<strong>to</strong>ne magazine article, July 18, 1974, “<strong>The</strong> CIA Won’tGo public”. Because so little is known about the PAS test, it needs <strong>to</strong> beexplained some. Observations in relation <strong>to</strong> the Wechsler IntelligenceTest provided the initial ideas behind the PAS. <strong>The</strong> digit-sp<strong>an</strong> subtest ofthe Wechsler Intelligence Test, which rates the ability <strong>to</strong> remembernumbers forms the basic test used for the E-I dimension. What Gittingerdiscovered was that short order cooks had good number-memorywhich = Internalizer personality or “I”. A high digit sp<strong>an</strong> in <strong>an</strong>y persontells much about them. People who don’t separate themselves wellfrom their environment are Externalizers = E. <strong>The</strong> “I” personality was agood baby. <strong>The</strong> “E” type who prefers doing <strong>to</strong> thinking is a “<strong>to</strong>ocurious”baby, who will make dem<strong>an</strong>ds. I’s would often be pressured <strong>to</strong>become more outgoing, <strong>an</strong>d E’s are often pressured by parents <strong>to</strong> bemore self-sufficient, <strong>an</strong>d <strong>to</strong> progress from crawling (which they like) <strong>to</strong>learn <strong>to</strong> walk. Pure Internalizers become more withdrawn after severaldrinks, <strong>an</strong>d uncompensated E's are more likely <strong>to</strong> become sloppydrunks, garrulous. Based on the E-I dimension, predictions c<strong>an</strong> also bemade for how LSD will affect a person. This is the E-I dimension. <strong>The</strong>24


lock design subtest shows whether a person is a Regulated (R) or aFlexible (F) person. This is the R-F dimension. <strong>The</strong> regulated person hadno trouble learning by rote but didn’t underst<strong>an</strong>d what he learned. <strong>The</strong>Flexible person on the other h<strong>an</strong>d had <strong>to</strong> underst<strong>an</strong>d something beforehe learned it. R children could learn <strong>to</strong> play the pi<strong>an</strong>o easily, but thegreat concert pi<strong>an</strong>o players were F children who had persevered <strong>to</strong>master what they considered drudgery. <strong>The</strong> third dimension is the RoleAdaptive (A) or a Role Uniform (U) person. A could be defined asCharisma, while people tend <strong>to</strong> ignore the U. <strong>The</strong> CIA has 40 patternsthat a skilled observer looks for, <strong>an</strong>d these then are related <strong>to</strong> the PAS<strong>an</strong>d Wechsler subtests. <strong>Illuminati</strong> Mothers-of-Darkness alters trained inobservation chart what they see a child do. A child’s behavior withcertain <strong>to</strong>ys, certain h<strong>an</strong>d responses, <strong>an</strong>d certain social responses c<strong>an</strong>be observed <strong>an</strong>d used <strong>to</strong> assess how this child would score on the PAStest. EEG (Electroencephalogram) patterns co-relate <strong>to</strong> the PAS digitsp<strong>an</strong>test. This allowed them <strong>to</strong> use the EEG patterns <strong>to</strong> overcomecultural bias in the test. It also gave the Monarch programmers theperfect <strong>to</strong>ol <strong>to</strong> assess small children before they have verbal skills.David R. Saunders, at the Univ. of Col. working with the CIA. wrote apaper in 1961 showing the connection between alpha waves <strong>an</strong>d digitsp<strong>an</strong>. In 1960, Mundy-Castle wrote about the connections betweenEEG prin<strong>to</strong>uts <strong>an</strong>d Wechsler-Bellevue Test variables. Here is the tip of theiceberg that EEGs were being used <strong>to</strong> determine pre-verbal personalityin children. And Salva<strong>to</strong>re et al wrote at the Massachusetts MentalHealth Center, Bos<strong>to</strong>n, Mass, clear back in 1954 about the “predictivepotential of Gittinger’s theory” in <strong>an</strong> unpublished research paper. (<strong>The</strong>Massachusetts Mental Health Center was <strong>an</strong> early particip<strong>an</strong>t in allthis.) <strong>The</strong> child’s guardi<strong>an</strong>s must teach the small victim obedience. <strong>The</strong>ymust teach the child <strong>to</strong> keep its eyes open <strong>an</strong>d <strong>to</strong> hold still. <strong>The</strong>se skillsare import<strong>an</strong>t, because the child will be subjected <strong>to</strong> the EEGs in vastamounts. <strong>The</strong> hospital equipment would be something like <strong>an</strong> 11-ch<strong>an</strong>nel Grass EEG machine where 11 electrodes are placed on thechild’s head, <strong>an</strong>d brain wave patterns are printed out charting suchthings as background, variability, discharges, background suppressions,sharp waves, etc. <strong>The</strong> electrodes will have designations such as T3, T4etc. In special programming sites, a machine with electrodes will behooked up <strong>to</strong> the child’s head for repeated tests. <strong>The</strong> newer machinesaccomodate up <strong>to</strong> 30 1/2 diameter pads (electrodes) which areattached with electrode adhesive tape or small needled ends <strong>to</strong> thechild’s scalp. <strong>The</strong> child’s hair will be parted in <strong>an</strong> area, <strong>an</strong>d theelectrodes will be hooked <strong>to</strong> the skull. <strong>The</strong> attend<strong>an</strong>t will tell the child,“Don’t move. Keep your eyes open. Look at this point. Don’t blink.Don’t move your body.” <strong>The</strong>n this procedure will be repeated for 45minutes <strong>to</strong> <strong>an</strong> hour. Eventually hundreds of readout from electrodesclipped <strong>to</strong> the skull of the child will chart the brain waves of the child.From these brain waves, the programmers c<strong>an</strong> determine what type ofpersonality the child has. This personality assessment criteria <strong>an</strong>d ability25


is one of the guarded secrets of the programming. Should unexpectedbehavior crop up, the slave may be hauled in for more EEGs. <strong>The</strong> PAStests would reveal <strong>to</strong> Gittinger what a person’s weaknesses were. <strong>The</strong>PAS shows what a person w<strong>an</strong>ts. And these are called the soft spots ofa person’s personality. Also the PAS shows mental weaknesses, onwhere a person will be instable <strong>an</strong>d c<strong>an</strong> be broken down. Certaintypes of stresses will have a cumulative effect of hurting a person. Astress-producing campaign is run against CIA targets, <strong>an</strong>d by doing thisthey c<strong>an</strong> neutralize a potential enemy. This information collected fromchildren who are potential victims for the Monarch programming, isessential for knowing how <strong>to</strong> structure that child’s programming. Forinst<strong>an</strong>ce IFU children often are autistic, IRU are schizophrenic children,<strong>an</strong>d IR or IF are f<strong>an</strong>tasy prone. It will be further explained shortly howthis aids programming. An Internalizer personality would be import<strong>an</strong>tdeep inside <strong>an</strong> alter system, while <strong>an</strong> Externalizer would be useful for afront personality. (Internalizers are predisposed <strong>to</strong> the production ofmental f<strong>an</strong>tasy.) By knowing what the child was, the programmersknow what they already have, <strong>an</strong>d what they must add or build in<strong>to</strong>the thinking of the alters they will create. Likewise, some alters need <strong>to</strong>be R <strong>an</strong>d some F. And some need <strong>to</strong> be A <strong>an</strong>d some U. Regulated (R)personalities like <strong>to</strong> have narrow limitations on their activity. This makesthem suitable for programming. <strong>The</strong> R’s readily accept authority, <strong>an</strong>dwill not try <strong>to</strong> step out of the r<strong>an</strong>ge of their habits. <strong>The</strong> R has a markedability <strong>to</strong> learn without underst<strong>an</strong>ding. <strong>The</strong>y easily learn material byrote, because they do not need <strong>to</strong> underst<strong>an</strong>d it before they will learnit. This is <strong>an</strong>other asset they have that the programmers like. <strong>The</strong>programmers may or may not w<strong>an</strong>t <strong>an</strong> A (Role Adaptive personality). Afuture country singer needs charisma -- a future computer programmerdoesn’t. Without being able <strong>to</strong> finely determine what is there, theprogramming could not be fine tuned. If the child is good in math it willhave its programming scripts steered in that direction. If it has artisticbrainwaves, then the programmer will use art work in programming.<strong>The</strong> art work of the europe<strong>an</strong> artist M.C. Escher is exceptionally wellsuited for programming purposes. For inst<strong>an</strong>ce, in his 1947 drawing“Another World”, the rear pl<strong>an</strong>e in the center serves as a wall in relation<strong>to</strong> the horizon, a floor in connection with the view through the <strong>to</strong>popening <strong>an</strong>d a ceiling in regards <strong>to</strong> the view up <strong>to</strong>wards the starry sky.Reversals, mirror images, illusion, <strong>an</strong>d m<strong>an</strong>y other qualities appear inEscher’s art work which make all 76 or more of his major works excellentfor programming. <strong>The</strong> use of these kinds of elements will explainedlater. Five children each given the same Alice In Wonderl<strong>an</strong>d script willeach use the script differently during programming. <strong>The</strong> programmertakes the child’s own creativity <strong>an</strong>d works with that unique creativity.<strong>The</strong> child must create the images itself if the programming is <strong>to</strong> hold. Itwon’t work if the images are someone else’s. <strong>The</strong> child org<strong>an</strong>izes itsinternal world <strong>to</strong> suit his/her own experiences such as castles, boxes,rooms, <strong>an</strong>d dollhouses. <strong>The</strong> PAS type testing will continue during the26


early years of the slave’s life <strong>to</strong> make sure the programming has notdriven the child crazy or psycho. <strong>The</strong> child will move down the scriptdecided for it for its whole life, based on these early tests. More abouthow this works later. <strong>The</strong> EEG tests run frequently on children <strong>to</strong> beprogrammed also show brain tumors, <strong>an</strong>d medical problems besidejust the brain wave patterns. <strong>The</strong> PAS tests c<strong>an</strong> show how easy a personc<strong>an</strong> be hypnotized. If the testing by the EEG’s doesn’t reveal a childwho c<strong>an</strong> be easily hypnotized, they will be rejected for programming,even though modern drugs <strong>an</strong>d extreme <strong>to</strong>rture in some cases will beapplied <strong>to</strong> “salvage” children they really think they need <strong>to</strong> programbut are clearly not easily hypnotizable. EEG’s c<strong>an</strong> also be used <strong>to</strong> seewhat state of consciousness the brain is in. <strong>The</strong> Monarch Programmingis based on structuring MPD alter systems which is covered in Chapter7. <strong>The</strong> success of this structuring (its excellent finetuning) comes fromthe initial testing, which me<strong>an</strong>s programs are properly built onwhatever foundation the mind has. <strong>The</strong> CIA front Hum<strong>an</strong> EcologySociety tested the PAS. In 1962, the CIA moved Gittinger’s base ofoperations <strong>to</strong> <strong>an</strong>other CIA front on Connecticut Ave., Washing<strong>to</strong>n, D.C.called Psychological Assessment Associates. Because Gittingerbelieved genetic-based differences exist in people, which is one of thebases for the Monarch Programming, his work was not accepted bymain stream psychology. In 1974, Gottinger described the PAS system,“...the Personality Assessment System (PAS): (a) indicates the kinds ofinternal <strong>an</strong>d external cues <strong>to</strong> which the individual is most likely <strong>to</strong>respond; (b) suggests the types of stimuli that are most likely <strong>to</strong> producebehavioral ch<strong>an</strong>ge; (c) provides <strong>an</strong> underst<strong>an</strong>ding of the inter-, intra-,<strong>an</strong>d impersonal environments in which a person is most likely <strong>to</strong>function efficiently; <strong>an</strong>d (d) offers insight in<strong>to</strong> what constitutes stress <strong>an</strong>dpredicts probable behavioral response <strong>to</strong> such stress, includingmaladjustments, should they occur. “In the area of experience, the PASoffers a method for obtaining specific clues <strong>to</strong> personality structure <strong>an</strong>dfunctioning. Thus, the PAS: (a) allows for direct inferences concerning<strong>an</strong> individual’s primary response style: (b) suggests the quality of thecompensations <strong>an</strong>d modifications he has achieved in response <strong>to</strong>social <strong>an</strong>d environmental pressures; (c) provides <strong>an</strong> underst<strong>an</strong>ding ofpersonality development in terms of the interaction of primarystructure, environmental pressures, <strong>an</strong>d adaptive tendencies; (d) offersa procedure for evaluating the surface or contact personalitydeveloped over time; <strong>an</strong>d (c) makes possible the assessment of thefundamental discrep<strong>an</strong>cies between the surface personality <strong>an</strong>d theunderlying personality structure--discrep<strong>an</strong>cies that typically producetension, conflict <strong>an</strong>d <strong>an</strong>xiety.” Winne, John F. <strong>an</strong>d John W. Gittinger.“Journal of Community Psychology Monograph Supplement No. 38.Rutl<strong>an</strong>d, Vermont: Clinical Psychology Publishing Co., Inc. 1973, p. 99.Wow! Gottinger’s description of PAS is specifically the needs & goalsthat the programmers had when they initiate programming thepersonality splits in tiny 18-month old children! People associated with27


the following listed org<strong>an</strong>izations may assist the Network <strong>to</strong> use theirchild for trauma-based programming. Children from families where oneor both parents belong <strong>to</strong> the following org<strong>an</strong>izations are oftenroutinely sent off in early childhood for trauma-based mind control. Weare now in 3rd <strong>an</strong>d 4th generations of people who are programmedmultiples. (And even in<strong>to</strong> deeper generations in some <strong>Illuminati</strong>bloodlines.) What c<strong>an</strong>’t be covered here is the enormous secret dramainvolved in Moriah finding <strong>an</strong>d implementing control over parents viaprescribed or illegal drugs, fear, blackmail etc. so that they will assistthem in getting the children programmed. If the motherly instinct is <strong>to</strong>ostrong, the mom may be prescribed tr<strong>an</strong>quilizers, so that there is astable house for the child’s front alters <strong>to</strong> grow up in. Unreliable nonmultiplefathers are “debriefed” by Ilium, multiples who debrief & thenerase their memories of what is happening <strong>to</strong> their children. Parentsmay have only a limited view.ORGANIZATIONS PRACTICING TRAUMA-BASED MIND CONTROL (<strong>The</strong>segroups form what insiders call “the Network.” <strong>The</strong>y are the backbone ofwhat is known as the New World Order.)Air Force IntelligenceArmy Intelligence (such as CIC)A<strong>to</strong>mic Energy CommissionBoeingBritish Intelligence, in. MI-6, MI-5, & the Tavis<strong>to</strong>ck InstituteBureau of NarcoticsBureau of PrisonsCatholic Church (incl. Jesuits)Central Intelligence Agency, CIA (aka Agency, Comp<strong>an</strong>y, L<strong>an</strong>gley)Charismatic movementChurch of Sat<strong>an</strong>Church of Scien<strong>to</strong>logy28


CIRVISClub 12 & Club 41Country Music IndustryDefense Intelligence Agency, DIADepartment of JusticeFederal Bureau of Investigation, FBIFreemasonry (esp. the Palladium Rite, 33º <strong>an</strong>d abovedegrees,Quatuor Coronati Lodge, SRIA, <strong>an</strong>d other Masonic affiliatedorg<strong>an</strong>izations)GEPANGerm<strong>an</strong> Intelligence (Shaback)GHGHollywood<strong>The</strong> House of Saud in Saudi Arabia (which has un-programmedslaves <strong>to</strong>o)<strong>The</strong> <strong>Illuminati</strong> (also known as <strong>The</strong> Circle, Moriah, Moriah-conqueringwind,Gnostics, Luciferi<strong>an</strong>s etc.) at all levels is involved in trauma-basedmind control as perpetra<strong>to</strong>rs & victims, incl. Frat. Saturni-OrdenFraternitas Saturni, THFS, FOGO, Golden Dawn, AntiC.Lucif. Dyn, etc.INSKu Klux Kl<strong>an</strong> (different KKK groups)MafiaMasons (see Freemasonry)Modi'inMossad (Mossad le Aliyah Beth)Mormon ChurchNASA (National Space Admin.)29


National Security Agency (NSA)National Programs OfficeNational Science FoundationNaval Intelligence (ONI)Neo-nazi groupsOddfellowsOTO (there are 4 groups)P.4 (elite MI6 section)Palo MayombeProcess Church <strong>an</strong>d its offshoot Chingun etc.Professional Baseball, such as the L.A. DodgersRussi<strong>an</strong> government & intelligence groups (GRU & KGB & KGB’ssuccessor, his<strong>to</strong>rically <strong>an</strong> early group known as Spets Byuro #1 called“Kamera” in Russi<strong>an</strong> which me<strong>an</strong>s “Chamber” did drug/hypnosis mindcontrol research. <strong>The</strong> Spetsburo was responsible for assassinations.)S<strong>an</strong>tariaSat<strong>an</strong>ic Hubs, Soc. of Dk. Lily, Chdrn of Lucifer (UK)Temple of Power (previously known as Temple of Set)Umb<strong>an</strong>daUS Army -- esp. the Delta Forces & the 1st Earth Batt.USAFVeteren’s AdministrationWerewolf OrderSome Witchcraft groups besides Sat<strong>an</strong>ism & MoriahIf the <strong>Illuminati</strong>’s preferred pl<strong>an</strong> is followed, it has 4 beginning30


foundational stages <strong>to</strong> prepare the victim for programming. Let’s listthese, <strong>an</strong>d then afterwards explain in detail these first 4 stages. Oneprogrammer named the stages 2,3, 4 as stages 1, 2, 3, but the In uteropreparations <strong>an</strong>d preliminary ceremonies actually form <strong>an</strong> initial firststage. <strong>The</strong> first stage is the initial ceremonies & the In Uterotraumatization. <strong>The</strong> second stage is <strong>to</strong> have a premature birth, the thirdstage is <strong>to</strong> provide intense love for the child for the first 18 months by 2-3 selected <strong>Illuminati</strong> caregivers, <strong>an</strong>d the fourth stage is <strong>to</strong> pull that loveaway <strong>an</strong>d split the mind of the child perm<strong>an</strong>ently. Not every <strong>Illuminati</strong>child is born premature -- but m<strong>an</strong>y are, because that is the preferredmethod for programming.Foundation Step 1. PREPARATION OF THE CHILDREN by SPIRITUALPREPARATIONS & IN UTERO TRAUMATIZATION --<strong>The</strong> MOON CHILDREN<strong>The</strong> preparation for someone <strong>to</strong> be programmed also concerns theability of a person <strong>to</strong> be demonized. Generational sat<strong>an</strong>ic families aresold out <strong>to</strong> Sat<strong>an</strong>, <strong>an</strong>d their children belong <strong>to</strong> Sat<strong>an</strong> in a way that nongenerationalchildren do not. Because of the generational curses,because of the genetic bent <strong>to</strong>ward the occult, because of thegenerational demonic forces, the <strong>Illuminati</strong> children are very goodc<strong>an</strong>didates for Monarch programming. Part of the programmingincludes the layering in of demonic forces, <strong>an</strong>d the participation inblood rituals in order <strong>to</strong> draw in the most powerful of demons. Anindepth review about this import<strong>an</strong>t but controversial subject is inchapter 10. <strong>The</strong> Moonchild rituals are the rituals <strong>to</strong> demonize a fetus.However, the demons that are invoked are not the small ones but verypowerful ones. In working with victims of this programming, it is clearthat high level demons were placed within these people at very earlyages, m<strong>an</strong>y of them it is believed were demonized before they wereborn by rituals like the Moonchild rituals. Blood sacrifices <strong>an</strong>d hum<strong>an</strong>sacrifices are always required for this level of magic. Aleister Crowley(1875-1947) was a Sat<strong>an</strong>ist who was a 33rd degree Scottish RiteFreemason. He also was a leader in a number of other Masonic rites aswell as <strong>an</strong> OTO leader, a chief in Stella Matutina, <strong>an</strong>d a MI-6 (Br.overseas intelligence) agent. His writings have been import<strong>an</strong>t within20th century Sat<strong>an</strong>ism <strong>an</strong>d with black magici<strong>an</strong>s. He wrote Moonchildwhich was first published in 1917. <strong>The</strong> idea of the Moonchild is that viablack magic a perfect soul c<strong>an</strong> be captured. <strong>The</strong> belief inreincarnation, which is prevalent among the <strong>Illuminati</strong> <strong>an</strong>d Sat<strong>an</strong>icgroups, lends itself <strong>to</strong> the belief that souls compete for a particularembryo. On page 107- 108 of Moonchild the idea is expressed, “Toproduce a m<strong>an</strong> who should not be bound up in his heredity, <strong>an</strong>dshould have the environment which they desired for him.” This perfectsoul in a proper person is called Homunculus. <strong>The</strong> magical work upon31


which this is based is said <strong>to</strong> be derived from Bacon, Albertus Magnus<strong>an</strong>d Paracelsus who were all reported in occult circles <strong>to</strong> havecaptured souls <strong>an</strong>d placed them in<strong>to</strong> brass statues.<strong>The</strong> Hittites, the people of Asia Minor <strong>an</strong>d Syria have long sought theability <strong>to</strong> create a superm<strong>an</strong> <strong>an</strong>d a superwom<strong>an</strong>. <strong>The</strong> <strong>Illuminati</strong>’s insideoccult his<strong>to</strong>ry places the Hittites in their <strong>an</strong>cestry. Clear back in 1917,long before superm<strong>an</strong> appeared in comics <strong>an</strong>d movies, AleisterCrowley was writing about a Superm<strong>an</strong>. <strong>The</strong> magical idea is <strong>to</strong> capturea soul from the 4th dimension. In the book Moonchild, the villa used <strong>to</strong>produce a Moonchild was called “<strong>The</strong> Butter-fly-Net”. <strong>The</strong> MonarchProject then which is named after the Monarch butterfly is also <strong>an</strong>allusion <strong>to</strong> the Moonchild project where Butterflies are <strong>an</strong> allusion <strong>to</strong>souls (what Christi<strong>an</strong>s call demonic spirits). <strong>The</strong> actual rituals carried out<strong>to</strong> create a Moonchild are described in detail in three of Crowley’swritings. A vague description of the rituals c<strong>an</strong> be seen by reading thebook Moonchild. <strong>The</strong> ritual <strong>to</strong>ok place at a villa nicknamed <strong>The</strong>Butterfly Net. <strong>The</strong> villa was really <strong>an</strong> occult temple laid out in sacredgeometrics. It had figures of satyrs, fauns, <strong>an</strong>d nymphs. It had statues ofArtemis. Lots of silver objects <strong>an</strong>d crescents <strong>an</strong>d 9-pointed stars were atthe villa, because these objects all relate <strong>to</strong> the Moon in magic. <strong>The</strong>wom<strong>an</strong> who was pregn<strong>an</strong>t was surrounded by objects related <strong>to</strong> themoon. <strong>The</strong> moon’s influence was repeatedly invoked. A small tri<strong>an</strong>gularsilver altar <strong>to</strong> Artemis was used. <strong>The</strong>re was a sacred spring where thewom<strong>an</strong> was washed. <strong>The</strong> number 9 which is sacred <strong>to</strong> the moon wasused along with its square 81. Prayers were made <strong>to</strong> Artemis, <strong>an</strong>d therewas the reenactment of the capture of Di<strong>an</strong>a by P<strong>an</strong>. <strong>The</strong> wom<strong>an</strong> wascoached <strong>to</strong> identify herself with what is known as Gr<strong>an</strong>dmother Moon(in the book she simply is called the Moon or Di<strong>an</strong>a) by identifying herthoughts <strong>an</strong>d actions with the deities one is w<strong>an</strong>ting <strong>to</strong> invoke. <strong>The</strong>creation of the Moonchildren within the Monarch Project involves highlevel magic by the circle of <strong>Illuminati</strong> black magici<strong>an</strong>s involved with aparticular individual’s programming. It should be noted that Gr<strong>an</strong>deMaster <strong>an</strong>d Gr<strong>an</strong>de Dame alters will underst<strong>an</strong>d demonology, but thesections (levels) of alter above them, are not informed. One of thebiggest secrets kept from most of the slave’s alters is that their Systemwas demonized while a fetus. First, this would give religious front altersthe information they need <strong>to</strong> get them on the right track <strong>to</strong>wardshealing, <strong>an</strong>d it could also adversely affect the programming lies ofsome of the front alters who don’t realize how premeditated all thetrauma <strong>an</strong>d <strong>to</strong>rture is. <strong>The</strong> front alters of victims themselves rememberthe cover s<strong>to</strong>ry that the moon children were produced via <strong>to</strong>rture inthe cages as little children. <strong>The</strong> <strong>Illuminati</strong> have also pl<strong>an</strong>ned that everyone of the ten comm<strong>an</strong>dments of God will be violated in their favorwith the child. <strong>The</strong>y prefer the child <strong>to</strong> be born out of wedlock so that itis a bastard. This breaks God’s comm<strong>an</strong>dment on adultery, <strong>an</strong>d alsogives them more leverage <strong>to</strong> destroy the child’s self-esteem. This entire32


pl<strong>an</strong> involves generational curses which are spoken <strong>an</strong>d unspoken.During <strong>Illuminati</strong> ceremonies, Ceremonial pacts which concern havingthe child out of wedlock <strong>to</strong> mock God are made. While the <strong>Illuminati</strong>destroy <strong>an</strong>y godly spiritual foundation, they are creating a solid rockhard foundation of “love” (adoration or idolatry) within the new bornupon which they will build the programming. <strong>The</strong> secondcomm<strong>an</strong>dment is “Do not take the Lord’s name in vain”. In the BlackMass, the names of God are invoked <strong>to</strong> get spirits with blasphemousnames such as Yahweh Elohim. Most parts of the little child will nevereven hear the Lord’s name--he will only hear the name of his master,who will someday be presented <strong>to</strong> him as “God”. <strong>The</strong> h<strong>an</strong>d that rocksthe cradle rules the world. <strong>The</strong> child is being bonded <strong>to</strong> his futureprogrammers. Much later, great attention will be given <strong>to</strong> set upstaged events <strong>to</strong> insure that the victim being programmed hates God.IN UTHRO TRAUMATIZATION<strong>The</strong> formal Monarch <strong>Mind</strong>-Control project was developed fromobservations of high level Sat<strong>an</strong>ic families. <strong>The</strong>se families had noqualms about the concept of traumatizing the fetus. Itali<strong>an</strong>generational witchcraft is called the Ways of the Strega. <strong>The</strong>segenerational occult bloodlines, esp. in Tusc<strong>an</strong>y <strong>an</strong>d Naples, are verymuch in<strong>to</strong> generational <strong>an</strong>ces<strong>to</strong>r spirits. <strong>The</strong>se were the ones thatAleister Crowley went <strong>to</strong> learn how <strong>to</strong> create Moon Children.Remember, that Itali<strong>an</strong> <strong>an</strong>d Germ<strong>an</strong> generational <strong>Illuminati</strong> familieswere studied by the Itali<strong>an</strong> fascists <strong>an</strong>d the Germ<strong>an</strong> Nazis <strong>to</strong> develop ascientific underst<strong>an</strong>ding of mind control. <strong>The</strong> <strong>Illuminati</strong> families inGerm<strong>an</strong>y were secretly <strong>an</strong>d scientifically studied in the 1920s <strong>to</strong>determine what exactly was happening <strong>an</strong>d how <strong>to</strong> systematicallyimprove the <strong>Illuminati</strong>’s control over the people they were alreadyprogramming. Discipline <strong>an</strong>d training has been lavished for centuriesupon the children of these elite bloodlines. <strong>The</strong> contribution of the 20thcentury was the systematic collection <strong>an</strong>d scientific study of all thevarious methodologies in<strong>to</strong> one cohesive programming package. Thisresearch was begun on a large scale in 1940s, <strong>an</strong>d has beensystematically added <strong>to</strong> since then. Families who w<strong>an</strong>ted dissociativechildren learned that dissociative babies could be born if the child inthe womb is <strong>to</strong>rtured. Thin needles are inserted through the mother in<strong>to</strong>the fetus <strong>to</strong> prick the preborn child. Mothers, who are pregn<strong>an</strong>t withchildren <strong>to</strong> be programmed, are also severely traumatized during theirpregn<strong>an</strong>cy with a whole assortment of traumas, which simult<strong>an</strong>eouslytraumatizes the babies which they carry. For inst<strong>an</strong>ce, the father maypurposely ab<strong>an</strong>don the pregn<strong>an</strong>t mother in the middle of a forest, orblast the mother with loud frightening music, <strong>an</strong>d then follow this upwith love.33


FOUNDATION STEP 2. <strong>The</strong> TRAUMA OF A PREMATURE BIRTHA premature birth is import<strong>an</strong>t because the naturally occurring eventsaround a premature birth insure that the child is naturally traumatized.Studies (such as Fenaroff, 1972) have found that only 7-8% of the livebirths were premature, but 25 <strong>to</strong> 40% (about a third) of all batteredchildren were born premature. It appears that the sat<strong>an</strong>ic cultinvolvement with causing premature births may be reflected in thistype of statistic. Some of the <strong>Illuminati</strong>-induced premature births havemade the newspapers, because the preemies set records for beingborn so small. Premature labor is induced-the fact that a prematurebirth happens is not natural, but the traumas that occur <strong>to</strong> the preemieare. Specialized drugs (not just the exogenous oxy<strong>to</strong>cins normally used<strong>to</strong> induce labor) are used on a mother <strong>to</strong> place her in a deeper tr<strong>an</strong>ceth<strong>an</strong> a twilight sleep. (Remember, that the underdeveloped liver &kidneys of the preemie make it difficult <strong>to</strong> naturally purge meds fromthe preemie’s body.) <strong>The</strong> mother will begin the process of delivery atthis time. However, the mother must be brought out of this deep sleepin order <strong>to</strong> push the baby through the birth c<strong>an</strong>al. <strong>The</strong> baby is <strong>to</strong>o weak<strong>to</strong> help with the birthing process. This is the hardest type of birth thatthere is, because the baby is not able <strong>to</strong> help the mother in the smallways that a full term baby would. <strong>The</strong> strain on the heart of the motheris extreme. <strong>The</strong> <strong>Illuminati</strong> have learned that a mother c<strong>an</strong> usually give 2or 3 preemie births like this before she risks death <strong>to</strong> try it again. If thistype of birth is repeated <strong>to</strong>o often the wom<strong>an</strong>’s heart will fail. This is whythe <strong>Illuminati</strong> will have their breeders give 2 or 3 preemies forprogramming, <strong>an</strong>d then have their breeders switch <strong>to</strong> full term babieswhich are used for sacrifice. If we describe how breeders <strong>an</strong>d babiesare used we must speak in general terms, because each bloodline,each baby, each mother is a separate case. However, there are somepatterns that should be pointed out. A bloodline will often w<strong>an</strong>t afemale’s first born male <strong>to</strong> be sacrificed <strong>to</strong> their belief system <strong>an</strong>d theLilith programming which is given the alters who function within theKabballistic Tree of Life which is built in during Mengele’s programmingfor the deeper sections (levels) of alters which are trained in <strong>Illuminati</strong>black magic. (This subject will be dealt with later.) <strong>The</strong> <strong>Illuminati</strong>breeders may be women who were preemies themselves. Sometimesthey skip a generation with the trauma of a premature birth <strong>to</strong> get amother with a good sound heart. Some of these breeders haveexcellent bloodlines, but during their own preemie birth their brainswere damaged <strong>an</strong>d they don’t have the super-intelligence the<strong>Illuminati</strong> w<strong>an</strong>ts for programming. However, they still need <strong>to</strong> have hadenough creativity <strong>to</strong> have allowed themselves <strong>to</strong> become aprogrammed multiple. When breeders are used by the <strong>Illuminati</strong> <strong>to</strong>obtain babies for programming, the <strong>Illuminati</strong> selects women who arethemselves programmed multiples. <strong>The</strong>y are used for breeders,because genetically they have genes for intelligence, even though34


they aren’t brilli<strong>an</strong>t. <strong>The</strong>se women of lesser intelligence will only makethe beginning Priestess level of the women <strong>an</strong>d might obtain a r<strong>an</strong>k inthat level of High Priestess. All these women, no matter theircircumst<strong>an</strong>ces have been made <strong>to</strong> believe that offering their babies <strong>to</strong>Sat<strong>an</strong> is the highest honor, so m<strong>an</strong>y of them do not have normalqualms about their job. It is import<strong>an</strong>t <strong>to</strong> interject that the <strong>Illuminati</strong> areLuciferi<strong>an</strong>s, but worship Lucifer/Sat<strong>an</strong>. Sat<strong>an</strong>ists are org<strong>an</strong>izationally aseparate set up, with a separate his<strong>to</strong>ry, but both groups have m<strong>an</strong>ycommon practices, including child sacrifice. (<strong>The</strong>re is a science in howthe <strong>Illuminati</strong> hides bloodlines, sometimes families are used as broodersfor other import<strong>an</strong>t bloodlines. It will only be mentioned in passing here,because it is relev<strong>an</strong>t <strong>to</strong> the selection process of how children areslated <strong>to</strong> be programmed. <strong>The</strong> <strong>Illuminati</strong> is fully aware of rarebloodtypes <strong>an</strong>d other genetic properties that run in bloodlines, <strong>an</strong>dbreed individuals <strong>to</strong> get certain traits, <strong>an</strong>d they also take in<strong>to</strong>consideration that certain weaknesses such as weak hearts or ABnegativeblood with no RH fac<strong>to</strong>r will call for special attention.) <strong>The</strong>criteria for non-<strong>Illuminati</strong> cults for their breeders is much lower. Oftenthese are the cults’ lef<strong>to</strong>vers. That is the difference between the goodbreeding of the <strong>Illuminati</strong>, <strong>an</strong>d the degenerate thinking of the openlysat<strong>an</strong>ic groups. <strong>The</strong> Sat<strong>an</strong>ic groups which are org<strong>an</strong>ized in<strong>to</strong> hubs, <strong>an</strong>dsome of the lesser occult groups like the KKK., have women which arekept under lock <strong>an</strong>d key <strong>to</strong> serve as breeders. Breeders are kept fromhaving outside talents that would help them function in the outsideworld. Some are not allowed <strong>to</strong> have driver’s licenses <strong>an</strong>d other basics.How does the occult world m<strong>an</strong>age <strong>to</strong> work things out within a hospitalsetting? <strong>The</strong> independent sat<strong>an</strong>ic cults may not use hospitals. I haveworked with enough first h<strong>an</strong>d information <strong>to</strong> be familiar with some ofthe cults which have home births attended by their own midwives. Anexample is the Sat<strong>an</strong>ic cult in Seminole & Garvin counties of Oklahomawhere their section houses in the countryside have had unrecordedhome births for years. First h<strong>an</strong>d information also confirms that hospitalsin Tacoma, V<strong>an</strong>couver, Portl<strong>an</strong>d, <strong>an</strong>d S<strong>an</strong> Fr<strong>an</strong>cisco are used by the<strong>Illuminati</strong> for premature births. By extension, it c<strong>an</strong> be unders<strong>to</strong>od thatm<strong>an</strong>y hospitals across the United States are now staffed with a largenumber of nurses <strong>an</strong>d doc<strong>to</strong>rs who are loyal <strong>to</strong> the occult world (calledby insiders the “Network”) headed by the <strong>Illuminati</strong>. <strong>The</strong> preemies areattended <strong>to</strong> by sat<strong>an</strong>ic witches who are nurses, m<strong>an</strong>y of them multiplesthemselves. Further on in this book, we will cover how the <strong>Illuminati</strong> isturning out a great number of pediatrici<strong>an</strong>s via programming <strong>to</strong> insurecontrol over the preliminary programming stages. If the occult worldw<strong>an</strong>ts a mother <strong>to</strong> see her preemie, the occult nurses on night shifts willquietly let cult mothers in <strong>to</strong> bond with their preemies. <strong>The</strong>re is a lot ofcorruption that goes on unnoticed <strong>to</strong>o. <strong>The</strong>se doc<strong>to</strong>rs <strong>an</strong>d nurses havetaken lots of preemies for the Network <strong>to</strong> use for programmingexperiments. If the mother is a low income mother, the Freemasons willlet them use their network of hospitals for free. Some of these35


premature children are described as dead <strong>an</strong>d taken with the excusethat “they c<strong>an</strong>’t breathe”. <strong>The</strong>y then are used for programmingexperimentation. <strong>The</strong> <strong>Illuminati</strong>, working in conjunction with otheroccult groups, schemes up methods by which they c<strong>an</strong> get otherpeople’s babies. This gives them additional children <strong>to</strong> work on. Bygiving low income mothers free births at Masonic hospitals, the occultworld c<strong>an</strong> later contrive some reason for stripping a low incomemother who is on drugs of her guardi<strong>an</strong>ship of her baby. <strong>The</strong>y takethese children, some of them drug babies, for programming uses. <strong>The</strong>mothers of different <strong>an</strong>imals are examples of how import<strong>an</strong>t <strong>to</strong>uch is <strong>to</strong><strong>an</strong>y baby. A mother cow, or dog will nudge its offspring soon after it isborn. <strong>The</strong>y will also begin <strong>to</strong> teach the baby immediately after it is born.Studies have learned that most mammals lick their newborn, which hasbeen observed <strong>to</strong> be critical for the healthy physical development ofthe baby <strong>an</strong>imal. <strong>The</strong> <strong>Illuminati</strong> w<strong>an</strong>t the same development for theiroffspring. Research showed that rocking <strong>an</strong>d stroking preemies helpsthem develop mo<strong>to</strong>r skills <strong>an</strong>d respira<strong>to</strong>ry functions. It takes the placeof the licking <strong>an</strong>imals give their offspring. <strong>The</strong> stroking even helpscardiac (heart) functions during the preemies sleep. Giving stimulus <strong>to</strong>a part of the brain will cause that part of the brain <strong>to</strong> grow. Althoughthe premature child c<strong>an</strong>not speak, it still craves attention. Even if ithurts, the child w<strong>an</strong>ts -- even needs -- <strong>to</strong> be held. <strong>The</strong> child c<strong>an</strong> be<strong>to</strong>uched, <strong>an</strong>d it will crave that <strong>to</strong>uching even if it hurts. Already themixing of love <strong>an</strong>d pain is beginning. <strong>The</strong>ir skin will be thin <strong>an</strong>d sensitive<strong>to</strong> <strong>to</strong>uch. It will hurt <strong>to</strong> be <strong>to</strong>uched <strong>an</strong>d preemies c<strong>an</strong> even have theirskin bruised by a sheet.A premature birth will create a fighter spirit within the child. If the childdoes not have a strong instinct for survival, <strong>an</strong>d does not fight <strong>to</strong> survivethe premature birth, then it will not fight <strong>to</strong> survive during the <strong>to</strong>rtures ofthe programming. By having a premature birth, the selection processhas already started. Which child will be a fighter? <strong>The</strong> preemie will beemotionally deprived of getting <strong>to</strong> suck on a real mother’s breast, butwill be fed with <strong>an</strong> eye-dropper or bottle. Often a tr<strong>an</strong>sdisciplinaryteam will be created at the hospital <strong>to</strong> take charge of the preemie.<strong>The</strong>y will run one of the various st<strong>an</strong>dard assessments, perhaps theNeonatal Behavioral Assessment Scale (NBAS) or the Bayley Scale ofInf<strong>an</strong>t Development. Objectives will then be developed for the short<strong>an</strong>d the long term based on each inf<strong>an</strong>t’s identified needs. <strong>The</strong> NBASwill look at a. the ability <strong>to</strong> shut out disturbing stimuli, b. responsiveness<strong>to</strong> audi<strong>to</strong>ry & visual stimuli, c. muscle <strong>to</strong>ne & mo<strong>to</strong>r skills, d. irritability, e.capacity <strong>to</strong> cuddle, f. skin color, g. reflexes.Every part of the preemie’s body will be violated. A Catheter will likelybe put in the little baby’s bladder, because preemies’ urinary tractstend <strong>to</strong> close up, <strong>an</strong>d bed sores must be avoided <strong>to</strong>o. <strong>The</strong>y will alsousually be given I.V.s. This will give them more fluid <strong>to</strong> eliminate. This is36


healthy for the Preemie <strong>to</strong> keep their kidneys well. However, it alsoserves as part of the natural traumatic process. Some will be givenoxygen. <strong>The</strong> preemie will be adjusting <strong>to</strong> the light, temperature, sound,humidity <strong>an</strong>d gravity of the new world it has been thrust in<strong>to</strong>. <strong>The</strong>irhearts will have problems (some of these like Mitro-valve prolapse maystay with the child for a life-time), <strong>an</strong>d also often difficulties with theirlungs. Studies on preemies have shown that they tend <strong>to</strong> have a soberaffect with few smiles, <strong>an</strong>d then the smiles come only if their eyes areaverted from who is in front of them. <strong>The</strong>y are less social <strong>an</strong>d theydepend upon the primary person (usually a caretaker at the hospital)<strong>to</strong> give them assist<strong>an</strong>ce <strong>an</strong>d encouragement <strong>to</strong> interact socially. (Als &Brazel<strong>to</strong>n, 1981) When the child is born, the <strong>Illuminati</strong> make sure that itsfirst view is of one of the people who will help program it. Often this is aGr<strong>an</strong>de Dame within the hierarchy, but it might also be a maleprogrammer. Over the following months, the programmer figure willrepeatedly talk <strong>to</strong> the child in loving cooing <strong>to</strong>nes. <strong>The</strong> most lovingsoothing words are all that is permitted at this stage. <strong>The</strong> child is beingnaturally bonded <strong>to</strong> the programmer. Mengele was the best of expertsat this type of bonding. <strong>The</strong> programmers talk <strong>to</strong> each other in termslike, “this child is a piece of clay.” <strong>The</strong>y view themselves as the potters<strong>to</strong> that clay. When the Preemie is born it copes with the pain by beingdissociative. <strong>The</strong> soothing voice of the programmer is said <strong>an</strong>d heard inhypnotic <strong>to</strong>nes. <strong>The</strong> hypnotic voice of the programmer is takingadv<strong>an</strong>tage of the dissociative tr<strong>an</strong>ce-like state of the child in pain. <strong>The</strong>hypnotic voice is grooming the child from the womb. Hypnotic cuesare placed in<strong>to</strong> the child’s mind even at this young age. Hypnotic cuesuse all the senses. In reality, the programmers are even hypnotizing thelittle babies. Soon the preemie’s eyes will open when the preemiesenses the presence of the programmer in the room. <strong>The</strong> preemie’seyes will follow the programmer around as he or she walks around thechild’s room. <strong>The</strong> child’s eyes are following the voice of theprogrammer.Ronald Shor, a respected researcher in<strong>to</strong> hypnotism, wrote in the Amer.Journal of Psychotherapy, Vol. 13, 1959, pp. 582-602, “Only in the fetusc<strong>an</strong> one conceive of <strong>an</strong> ideally pure tr<strong>an</strong>ce state, that is, a state inwhich there is a <strong>to</strong>tal absence of a functioning reality-orientation. In thedeveloping org<strong>an</strong>ism in utero the first momentary experiences existconcretely, independent of <strong>an</strong>y structured background of experience.<strong>The</strong> only org<strong>an</strong>ization that c<strong>an</strong> take place at first is that which isgenetically given. But except for this natural, on<strong>to</strong>geneticallyundeveloped state there is always some degree of structuring.” Inother words, if you w<strong>an</strong>t <strong>to</strong> hypnotize someone, the ideal is when theyare a fetus, because the baby soon begins <strong>to</strong> get a grasp of reality--that reality gives the child something <strong>to</strong> compare with what thehypnotist is w<strong>an</strong>ting <strong>to</strong> program in. Notice, also the awareness on Shor’spart, that there is some structuring of the mind done naturally via37


genetics. This again underscores the import<strong>an</strong>ce of why theprogrammers like multi-generational victims--because they pass viagenetics some of the mental structuring needed for the smoothprogramming of the next generation. By looking in<strong>to</strong> the preemie’seyes <strong>an</strong>d talking, the programmer begins <strong>to</strong> teach the baby. <strong>The</strong>preemie learns that its primary caretaker is its controller. <strong>The</strong> controllercontrols its access <strong>to</strong> its bottle <strong>an</strong>d everything else in its life. <strong>The</strong><strong>Illuminati</strong> are teaching the child <strong>to</strong> view its controller as God from thefirst second it is born. <strong>The</strong>y w<strong>an</strong>t the child <strong>to</strong> worship the programmer.<strong>The</strong> programmer is literally saving the preemie’s life. By talking & cooing<strong>to</strong> the child, the programmer’s voice becomes more real <strong>to</strong> the childth<strong>an</strong> itself.<strong>The</strong> controllers begin stretching the mind of the child as soon as it isborn. <strong>The</strong> two or three people who control the early baby’s life beginteaching it with hypnotic voices as soon as it is born. Subliminal tapesare used <strong>to</strong> teach the baby immediately. <strong>The</strong> goal is <strong>to</strong> teach the child<strong>to</strong> read <strong>an</strong>d speak much earlier th<strong>an</strong> other children. In the MonarchProgram’s controlled setting, children who c<strong>an</strong> read at six months, c<strong>an</strong>still be programmed for social skills. In <strong>an</strong> uncontrolled setting, childrentaught this earlier tend <strong>to</strong> have their intellectual skills outstrip their socialskills, <strong>an</strong>d they develop serious problems with their peers <strong>an</strong>d schools.Children c<strong>an</strong> be hypnotized easier th<strong>an</strong> adults, but it has <strong>to</strong> be donedifferently, especially if the child is preverbal. Rubbing the child,stroking its head, <strong>an</strong>d patting the child help soothe the child in<strong>to</strong>relaxing. <strong>The</strong> hypnotist must not make rapid <strong>to</strong>nal ch<strong>an</strong>ges in his voice.<strong>The</strong>se are reasons why gentle <strong>Illuminati</strong> women programmers are such<strong>an</strong> asset at this stage. <strong>The</strong> newborn child is taught obedience. It isallowed <strong>to</strong> cry <strong>to</strong> develop its lungs, but at some early point it is taughtnot <strong>to</strong> cry. Tape is placed over the child’s mouth, <strong>an</strong>d it is <strong>to</strong>ld over <strong>an</strong>dover “no” with the index finger gesturing. <strong>The</strong>y get approval if theydon’t cry. This type of programming is called behavior modification,<strong>an</strong>d will be further covered in a later chapter. <strong>The</strong> baby is rigidly taught<strong>to</strong>tal obedience. In review of step 3, one tried <strong>an</strong>d often usedtechnique is <strong>to</strong> have the baby born premature. <strong>The</strong> baby mustundergo lots of trauma, <strong>an</strong>d must learn <strong>to</strong> be a fighter <strong>to</strong> survive.Babies have been taken by induced labor or C-Section at prematureages intentionally <strong>to</strong> insure that the baby will suffer trauma. When thepremature baby leaves the comfort of the womb it experiencestrauma. By taking the baby prematurely, it also gives the programmers<strong>an</strong> adv<strong>an</strong>ced start on the programming.38


FOUNDATION STEP 3. LOVE BOMBING THE CHILD UNTIL ABOUT 18MONTHS<strong>The</strong> third stage is smothering the child in love. <strong>The</strong> love is given so that itc<strong>an</strong> be taken away in the fourth stage. Unless love is given so that itc<strong>an</strong> be taken away, there is no trauma. <strong>Illuminati</strong> children are neversp<strong>an</strong>ked in the first year <strong>an</strong>d a half. <strong>The</strong>y are very lovingly controlled.(This pattern of smothering new converts in love called “love bombing”in preparation for removing that love <strong>an</strong>d accept<strong>an</strong>ce <strong>to</strong> ge<strong>to</strong>bedience is done by some cults <strong>to</strong> new members <strong>to</strong>o.) <strong>The</strong> <strong>Illuminati</strong>child learns about their body. <strong>The</strong>ir bowels are allowed <strong>to</strong> functionproperly <strong>an</strong>d they are kept meticulously cle<strong>an</strong>. <strong>The</strong>y must be taught <strong>to</strong>appreciate their body, before the trauma of stripping them ofeverything they value. Dissociation does not have <strong>to</strong> be taught <strong>to</strong> thechild, because they have a genetic le<strong>an</strong>ing <strong>to</strong>ward it, <strong>an</strong>d thepremature birth has taught them <strong>to</strong> dissociate. All in all, the child hasbeen allowed only <strong>to</strong> build a relationship with its programmer(s). <strong>The</strong>child has learned <strong>to</strong> trust, obey <strong>an</strong>d adore the programmer during thefirst 18 months of its life. Its mind is lining up with hypnotic suggestions,cues, <strong>an</strong>d is being obedient.FOUNDATION STEP 4. FRACTURING the MIND<strong>The</strong> fourth stage is built upon the foundation of dissociation created inthe first & second stages, <strong>an</strong>d the love created in the third stage. (<strong>The</strong>demonology of the first step also helps pull in demons associated withprogramming, tunneling in the mind, <strong>an</strong>d multiplicity, which are used inthe fourth foundational step.) Often in the fourth step, the child’s mindwill fracture along the same dissociation fracture lines that the traumaof the premature birth created. If the child is not a premature baby, itwill need some additional help <strong>to</strong> w<strong>an</strong>t <strong>to</strong> dissociate. <strong>The</strong> child c<strong>an</strong>have its senses overwhelmed repeatedly <strong>to</strong> the point that it learns <strong>to</strong>react <strong>to</strong> its surroundings by what appears on the outside as <strong>an</strong>umbness, <strong>an</strong>d mentally is simply dissociation. Everything imaginablec<strong>an</strong> be used <strong>to</strong> overwhelm the caged little child’s senses <strong>an</strong>d createdissociation. Rotten faul odors of the child’s excrement, of amnonia,<strong>an</strong>d rotten food while it huddles in its cage will overwhelm the child’ssense of smell. Being fed blood overwhelms the sense of taste. <strong>The</strong>ch<strong>an</strong>ting of the Programmers dressed in Sat<strong>an</strong>ic garb, b<strong>an</strong>ging noises,rock music <strong>an</strong>d the electric hum, <strong>an</strong>d ultrasonic stimulation overwhelmsthe child’s sense of hearing. <strong>The</strong> child’s natural developing sense ofshapes is taken adv<strong>an</strong>tage of by spinning the child <strong>an</strong>d making it feellike it is going <strong>to</strong> fall. <strong>The</strong> child will also be deprived of sleep <strong>an</strong>ddrugged. Together all this will provide the dissociative base for splittingthe core. <strong>The</strong> fourth stage is <strong>to</strong> strip the child of everything nice <strong>an</strong>d39


lovely in the world. <strong>The</strong> child is caged <strong>an</strong>d <strong>to</strong>rmented by electric shock.<strong>The</strong> child’s senses will be overloaded <strong>an</strong>d they will become numb.Eyewitnesses have described these hundreds of numbed children as“zombies”. This stage <strong>an</strong>d the programming put in after thefoundational dissociation is created will form the next chapter.In the fourth step, the child is starved, cold <strong>an</strong>d naked. When theyfinally see their beloved master or beloved adult caretaker appearafter suffering from 42 <strong>to</strong> 72 hours, they are excited <strong>an</strong>d they dissociatethe pain of the previous hours of deprivation. Help appears <strong>to</strong> be onthe scene. At that point the programmer/beloved adult shows his/hermost vicious side, <strong>an</strong>d the child in order <strong>to</strong> deal with how this lovingcaretaker has not only rejected them but is now hurting themdissociates along the same fractures of dissociation created by thetrauma of the premature birth. <strong>The</strong> details of how the mind is split willbe dealt with further in the next chapter. In review of steps 3 <strong>an</strong>d 4,part of the programming is <strong>to</strong> have the primary initial abuser bond withthe child. A close loving bond is needed between a child <strong>an</strong>d the initialabuser so that a cle<strong>an</strong> split is created when the initial mind-splittingtrauma is carried out. <strong>The</strong> cle<strong>an</strong> split occurs when the child isconfronted with two irreconcilable opposing viewpoints of someonewho is import<strong>an</strong>t <strong>to</strong> them. <strong>The</strong> child c<strong>an</strong>’t reconcile the two extremelyopposite views of the same person, one being a loving caretaker, <strong>an</strong>dthe other being the worst kind of abuser. <strong>The</strong> person the child trustedthe most is the person the child fears the most. Some professionaltherapists have come <strong>to</strong> realize that this is how the core is split. JodyLienhart, a multiple herself, in her Ph.d dissertation correctly identifiesthe double bind of having two extremely opposite views of the mostimport<strong>an</strong>t person in the child’s life as the fundamental splittingmech<strong>an</strong>ism. She writes in her 1983 dissertation on p. 6-7, “Implicit ineach of the studies of childhood trauma is the pervasive nature ofparadoxical communication. Frequently, this double bindcommunication style appears during the formative, preverbal stages ofchildhood in which the interpretation of these messages is confused.This results in insufficient experimental learning which would allowtr<strong>an</strong>slation of the confused appropriate messages... “This study presentsthe theoretical assumption that multiple personality is developedthrough early childhood state-dependent learning. [That me<strong>an</strong>s thatlearning is linked <strong>to</strong> a state of mind.] Furthermore, it is hypothesized thatthis learning occurs as a result of the hypnoidal effects of childhoodtrauma such as abuse <strong>an</strong>d sexual molestation. <strong>The</strong> child, unable <strong>to</strong>tr<strong>an</strong>slate the paradoxical nature of the messages he receives,fragments in<strong>to</strong> a tr<strong>an</strong>ce state. Furthermore, it is suggested thatmemories incorporated during each of these hypnoidal experiencesare similar <strong>to</strong> knowledge acquired during state-dependent learning.Lienhart used her own memories as the basis for the type of traumathat suggests in her dissertation could create MPD. That trauma for her40


was her uncle forcing his penis in<strong>to</strong> her mouth <strong>an</strong>d almost choking her.<strong>The</strong> child is not in a position <strong>to</strong> flee, so the mind dissociates. Shehappened <strong>to</strong> have experienced a common trauma used <strong>to</strong> split acore. In order <strong>to</strong> split the core, the mind has <strong>to</strong> be trained <strong>to</strong> dissociate.<strong>The</strong> ability <strong>to</strong> dissociate is obtained by being genetically bred fromdissociative parents, by having a premature birth/traumatic birth ifpossible, <strong>an</strong>d by the conditioning done at the original programmingcenter (between 18 mo. & 3 years) where intermittent electric shockalong with the all the senses being overwhelmed, along with sleepdeprivation <strong>an</strong>d drugs create a dissociative base <strong>to</strong> split the core. <strong>The</strong>initial sadistic abuse <strong>to</strong> split the mind, is called “severing the core.”Each person’s original mind is like <strong>an</strong> open computer. <strong>The</strong> originalcomputerlike mind in order <strong>to</strong> continue working, when confronted withoverwhelming trauma, splits a part of the mind off <strong>an</strong>d walls it up withamnesia barriers. From this area further splits c<strong>an</strong> be made. One of themajor technical feats <strong>to</strong> make computers useable was <strong>to</strong> figure outhow <strong>to</strong> be able <strong>to</strong> wall off <strong>an</strong>d protect memory in the computer frombeing accessed <strong>an</strong>d used. When they succeeded in engineeringisolated memory the other problems were minor. When someone hasbeen traumatized from the fetus on up--there is no single core such astherapists usually look for. <strong>The</strong> Core for the programmers is the unsplitessence of the mind which drives or provides energy for the System. ThisCore is not <strong>an</strong> alter, but is <strong>an</strong> essence that the programmers hide. <strong>The</strong>Core is not <strong>an</strong> alter. <strong>The</strong> programmers do not <strong>to</strong>uch the core in thefashion they do alters. <strong>The</strong>y hide the core. Part of the drama that iscarried out during the entire victim’s life, is that their mind tries <strong>to</strong>protect this un<strong>to</strong>uched core essense of their mind from being <strong>to</strong>uched.If they think <strong>an</strong>yone, the therapist or the abuser are going <strong>to</strong> tamperwith it, the mind <strong>an</strong>d its parts will protect that core. As str<strong>an</strong>ge as it mayseem, when a therapist talks about integration, they often scare thevictim’s mind that the integrity of the core <strong>an</strong>d its innocence will beviolated, <strong>an</strong>d the victim’s mind does everything it c<strong>an</strong> <strong>to</strong> avoidcontaminating the integrity of their core, i.e. they sabotage therapy<strong>an</strong>d return <strong>to</strong> their programmer who underst<strong>an</strong>ds their safety issue.Initially, in the 1940s, the <strong>Illuminati</strong> researched what would happen ifthe Core was allowed <strong>to</strong> meet up with the alters, <strong>an</strong>d they discoveredthat the brain’s essence or energy will work <strong>to</strong> pull the mind back<strong>to</strong>gether. <strong>The</strong>refore, the Core is separated <strong>an</strong>d hidden from all thealters. In <strong>Illuminati</strong> systems, it is usually placed in the middle of its firstsplits, which are also sources of energy <strong>an</strong>d which are well hidden.<strong>The</strong>y are dehum<strong>an</strong>ized parts which function as gems, which areprogrammed as in the Alice In Wonderl<strong>an</strong>d s<strong>to</strong>ry <strong>to</strong> ch<strong>an</strong>ge shape <strong>an</strong>dcolor if they are approached, which rarely happens. <strong>The</strong>se parts will bediscussed in other chapters including how a system is structured. Adissociative carousel is also attached around the core. After the core ishidden, the rest of the alters will be programmed not <strong>to</strong> look for theenergy/synthesizing part of the system. <strong>The</strong> real “core” or primal part of41


the unconscious will have <strong>an</strong> adult representative of it in a MonarchSystem. This primal part has a Toddler switch upon which all theprogramming is built. An event(s) in the child’s life is used <strong>to</strong> build theprogramming upon. <strong>The</strong> <strong>Illuminati</strong> know about the various baseprograms <strong>an</strong>d the foundational traumas, <strong>an</strong>d some of this is kept secretfrom programmers who come from front org<strong>an</strong>izations of the <strong>Illuminati</strong>.<strong>The</strong>re are a number of parts which will be called “cores”--simplybecause they were early parts, but there is no intact single person whorepresents all of the mind. All that is left are fragments of the mind,each segment walled off with amnesia. <strong>The</strong> alters who perceivethemselves <strong>to</strong> be “cores” are alters who have been programmed <strong>to</strong>think they are the core alter. <strong>The</strong> mind has a way of knowing the truth,<strong>an</strong>d these alters may realize that their programmed s<strong>to</strong>ry line issuspicious, but they won’t know what is “fishy” about it, so they tend <strong>to</strong>be in denial about their identity. <strong>The</strong>se substitute or mock cores willoften be in denial that they are even MPD. In some cases, whereScripture was used <strong>to</strong> program with, the core was <strong>to</strong>ld that it would be“blessed by multiplying as the seeds in the stars of heaven <strong>an</strong>d thes<strong>an</strong>ds of the sea” if “thou hast obeyed my voice”, which is misuse ofGen. 22:17-18. Alters which represent the “s<strong>an</strong>ds of the sea” pop up if<strong>an</strong> alter tries <strong>to</strong> get <strong>to</strong> the core. (See chapter 10k about scriptures usedin programming.)THE INITIAL SPLITS<strong>The</strong> initial part of a person’s mind before splitting occurs is called thecore. <strong>The</strong>oretically, the core makes parts <strong>to</strong> protect itself. <strong>The</strong> initialsplitting is called “splitting the core” <strong>an</strong>d there is <strong>an</strong> art or science inknowing how <strong>to</strong> split a core. However, I disagree with the st<strong>an</strong>dardcore model”. I believe it is more accurate <strong>to</strong> say that the initial splits arestronger because they somehow are integrated closer <strong>to</strong> the mind.Later splits made from later splits, are in a sense less connected <strong>to</strong> thefull mind. During a <strong>to</strong>rture session, the initial splits are always thestrongest. So when they <strong>to</strong>rture someone <strong>an</strong>d get 20 personality splits,they will use perhaps the first 13 <strong>an</strong>d discard the rest or use them forsingle task jobs. Discard areas are created in the mind---these arevariously called concentration camps, garbage dumps, or whatever.<strong>The</strong> victim’s mind is trained <strong>to</strong> create these dumping grounds for thesplits that the programmers don’t w<strong>an</strong>t <strong>to</strong> use. As the programming gotrefined, so did the methods for discarding unw<strong>an</strong>ted splits.In children, who receive programming at a very early age, the initialsplits may be done in the womb. If the fourth step is carried out in atimely fashion at 18 months after the in utero trauma <strong>an</strong>d a prematurebirth, then during the first 18 months the mind will never have a ch<strong>an</strong>ce42


<strong>to</strong> pull itself <strong>to</strong>gether. If however, the fourth step is not done at around18 months <strong>an</strong>d no further trauma is maintained, the child’s mind will pullback <strong>to</strong>gether by the age of two <strong>an</strong>d a half. <strong>The</strong> initial splits are themost energetic <strong>an</strong>d the easiest <strong>to</strong> m<strong>an</strong>ipulate. In <strong>Illuminati</strong> systemsthese early parts are dehum<strong>an</strong>ized in<strong>to</strong> thinking they are gems <strong>an</strong>dcrystals. <strong>The</strong>se gems <strong>an</strong>d crystals then “power” the entire mind-controlsystem that is programmed over the following years in<strong>to</strong> the child’smind. <strong>The</strong> gems are not perceived as alters, so the proxy core wouldn’tintegrate with what is perceived as <strong>an</strong> in<strong>an</strong>imate object. <strong>The</strong> proxycore is allowed <strong>to</strong> w<strong>an</strong>t <strong>to</strong> move <strong>to</strong>ward health with a therapist, it isprogrammed <strong>to</strong> move <strong>to</strong>ward healing, but <strong>to</strong> lead the therapist awayfrom the true core. She or he is programmed <strong>to</strong> believe it is the truecore. <strong>The</strong> real core & its first splits, which are the gems, are placedhypnotically at the mind’s deepest levels--in <strong>an</strong> area of the mind fewtherapists ever search. As outlined above, other initial splits are led <strong>to</strong>believe they are cores. Part of the reason there is a illusive search onthe part of therapists for a core, is that people have not accepted thereality that there is no one person (personality) in charge of a MonarchSystem who c<strong>an</strong> simply decide <strong>to</strong> quit coping with life by s<strong>to</strong>pping theirMPD. M<strong>an</strong>y therapists w<strong>an</strong>t <strong>to</strong> believe that some person is the “real”person <strong>an</strong>d the rest are simply subordinate alters created <strong>to</strong> h<strong>an</strong>dle thecore’s trauma. I believe this is <strong>an</strong> inadequate underst<strong>an</strong>ding of what ishappening. <strong>The</strong> elements that make up who a person is--i.e. personalityelements such as memories, are fractured. <strong>The</strong>se fragments have inturn often been built up in<strong>to</strong> full-blown personalities with all theelements of full-blown personalities. <strong>The</strong>re is no “real” person, just as ifyou smash a mirror in<strong>to</strong> a thous<strong>an</strong>d pieces, there is no single piece thatis the “real” original mirror but rather simply fragments that c<strong>an</strong> in turnoperate as mirrors. However, there is still a primal self. Early splits are led<strong>to</strong> believe they are the core. <strong>The</strong> cult will hide the initial splits beyondrecognition. Some of the third wave of splits will be created in<strong>to</strong> whatare named Silence alters. <strong>The</strong>y are trained never <strong>to</strong> talk. (At least some<strong>Illuminati</strong> alter systems call these early splits “Silences”.) <strong>The</strong>se early splitsare then hidden <strong>an</strong>d used <strong>to</strong> blackmail other alters who were createdlater. <strong>The</strong> other alters, who are formed after the Silences (who are prel<strong>an</strong>guagealters) are convinced that if they don’t behave the Silenceswill have something drastic happen <strong>to</strong> them. Some of the pre-talkingSilence alters are then placed in places such as Moloch’s Temple <strong>to</strong>keep as hostages. Alters are created down the road <strong>to</strong> guard theSilences. <strong>The</strong>y guard in the full sense, controlling the Silences, <strong>an</strong>d <strong>an</strong>yaccess <strong>to</strong> the Silences. Since the Silences are early splits they are moreimport<strong>an</strong>t for the full integration of the mind, which the programmersw<strong>an</strong>t <strong>to</strong> insure doesn’t happen. Probes are pushed in<strong>to</strong> the brain at thebase of the skull, in a very precise <strong>an</strong>d methodical way during the initialcore trauma. This is done <strong>to</strong> create guards for the carousel. For moreabout the early primal splits see the section on Carousel in Chapt. 7 onstructuring, <strong>an</strong>d the next chapter on how the trauma is done. Because43


the Programmers will tamper with the alters so much <strong>to</strong> get the sat<strong>an</strong>icalters <strong>an</strong>d the special purpose alters which they w<strong>an</strong>t, they need <strong>to</strong> usesome of the first splits as front alters. <strong>The</strong>y need strong front alters whohave a sense of who they are. If they waited until later <strong>to</strong> get frontalters, the alters wouldn’t be as strong <strong>an</strong>d would have already losttheir identity. <strong>The</strong> 3rd wave of alters created often will in turn be split <strong>to</strong>provide alters <strong>to</strong> build the front section of a System. <strong>The</strong> front “cores”which are decoys will be set up with opposites, one alter will love theprogrammer the other will hate him. One alter will trust theprogrammer, the other will fear the programmer. <strong>The</strong>rapists spend alltheir time trying <strong>to</strong> reconcile this conflict which is placed out front as adecoy <strong>to</strong> keep them busy. Me<strong>an</strong>while, the gems along with the rest ofthe loyal cult alters will have the ability <strong>to</strong> create whatever is neededwithin the System. <strong>The</strong> entire system of alters is always shifting <strong>an</strong>d m<strong>an</strong>yof the true alters are in hiding. <strong>The</strong> person is made <strong>to</strong> feel like he or shehas been sliced like meat much as a bolagna slicer makes slices ofbologni. This layering program is very d<strong>an</strong>gerous <strong>an</strong>d severe. Overlaysof all kinds, demonic, hypnotic illusion, etc. are layered over real altersso that even the identity of what is a real alter is hidden. <strong>The</strong> point isthat decoys which keep therapists busy are created, while the entirestructure shifts <strong>an</strong>d rearr<strong>an</strong>ges <strong>an</strong>d restructures itself <strong>to</strong> keep itselfhidden. Often the <strong>Illuminati</strong> encourages early front splits <strong>to</strong> learn aboutChrist <strong>an</strong>d legitimately accept Him at a very early age. Thisaccept<strong>an</strong>ce will be used as the basis of the trauma <strong>to</strong> create strongsat<strong>an</strong>ic alters. Just as the h<strong>an</strong>dler will bond with the child <strong>to</strong> split it, theh<strong>an</strong>dler will allow some early parts of the System <strong>to</strong> bond with Christ inorder <strong>to</strong> enh<strong>an</strong>ce the trauma that “God” will do <strong>to</strong> the System. This alsoallows the h<strong>an</strong>dlers <strong>to</strong> have a bal<strong>an</strong>cing point. Without the full r<strong>an</strong>ge ofcapabilities within a Slave alter system-- a d<strong>an</strong>gerous imbal<strong>an</strong>ce<strong>to</strong>ward evil could propel the slave in<strong>to</strong> situations where they don’thave the ability <strong>to</strong> succeed. In m<strong>an</strong>y ways, the slave’s world becomesa microcosm of the real world, having a mixture of adult <strong>an</strong>d childalters, Christi<strong>an</strong>, secular, <strong>an</strong>d Sat<strong>an</strong>ic alters. Another thing whichhappens with the first splits is the creation of mirror images. Some of thetime, in the early splitting procedures, the child creates extra splits. Inthe early stages, these strong extra splits are made in<strong>to</strong> mirror images ofregular alters. Some of these mirror images are known <strong>to</strong> be placedin<strong>to</strong> the mind before <strong>an</strong>y splitting occurs. As long as the victim’sdissociation exists, the potential for mischief exists for the programmers.This is why integration c<strong>an</strong> be a positive goal for a Monarch multiple ifthe deprogrammer knows what he is doing. After suffering decades ofthe most horrible traumas imaginable <strong>an</strong>d the most severe abuse asslaves, most slaves have minds which are habitually dissociative. <strong>The</strong>seolder minds of slaves require a miracle <strong>to</strong> cease remainingperm<strong>an</strong>ently dissociative. It does take a great deal of brain energy <strong>to</strong>maintain the amnesic walls, <strong>an</strong>d the minds of people in their 70’s <strong>an</strong>d80’s will s<strong>to</strong>p maintaining those walls <strong>an</strong>d these elderly will begin <strong>to</strong>44


emember. But by that time, they are considered senile, <strong>an</strong>d theirmemories are discontented.FURTHER SELECTION CONSIDERATIONS<strong>The</strong> <strong>Illuminati</strong> have their own criteria as <strong>to</strong> who they select. <strong>The</strong>preference is that they be blue-eyed blond Caucasi<strong>an</strong>s <strong>an</strong>d not <strong>to</strong>have obvious physical defects or visible scars. <strong>The</strong> Freemasons alsoreject physically defective c<strong>an</strong>didates. After they test the child for itsintelligence, creativity, <strong>an</strong>d dissociative skills, they will bring the childrenbefore the Gr<strong>an</strong>de Druid Council.Formal approval of girls <strong>an</strong>d boys in<strong>to</strong> the <strong>Illuminati</strong> is done at apresentation by the Queen Mother <strong>an</strong>d the Gr<strong>an</strong>d Druid Council atage three. However, the children have already been inspected by theQueen Mother before a formal physical inspection. Sexuality is <strong>an</strong>import<strong>an</strong>t issue for the physical part of the <strong>Illuminati</strong> inspection of littleboys <strong>an</strong>d girls. This is part of the physical criteria, as well as the physicalhealth of the child. Creativity, strength, bloodlines, <strong>an</strong>d intelligence willalso be taken in<strong>to</strong> consideration. <strong>The</strong> st<strong>an</strong>dard Trauma-based mindcontrol which produces programmed multiple personalities is startedon children before the age of 6. After the age of 6, it is difficult <strong>to</strong> followthis type of MPD/DID programming. However, this does not me<strong>an</strong>people aren’t programmed after age 6. Trauma-based personalitysplits remain isolated in the mind better th<strong>an</strong> hypnotic-basedpersonality splits, but most people c<strong>an</strong> be hypnotized <strong>to</strong> create alterpersonalities. Some SRA survivors have programming but don’t havealter systems. A rare few do not have systems, but only a fewdissociative states, such as a night self, <strong>an</strong>d a day self. A wide variety ofapproaches have been experimented <strong>an</strong>d operationally carried out.This book will concentrate more on the Monarch Systems which arecreated by programming inf<strong>an</strong>ts. This is usually the most devastating,traumatic, controlling, effective approach. <strong>The</strong> Catholic Church haslong said give me a child by the age of 5 <strong>an</strong>d they will be Catholic. <strong>The</strong>Catholic Church is one of the largest parts of the network that carriesout Monarch <strong>Mind</strong> Control. It is a fact, that if the Jesuits c<strong>an</strong> place intheir programming--what they call the “Keys <strong>to</strong> the Kingdom” Monarch<strong>Mind</strong> Control within a child, they will control his destiny. One Jesuitpriest is on record as stating that there is nothing he c<strong>an</strong>’t make<strong>an</strong>yone do with <strong>to</strong>rture. <strong>The</strong> Jesuits developed <strong>to</strong>rture <strong>to</strong> a fine art inthe inquisition. Imagine the expertise they have brought <strong>to</strong> theMonarch Program which begins <strong>to</strong>rturing children at 18 months onwardwith every sophisticated <strong>to</strong>rture device invented. If the Jesuits brag thatthey c<strong>an</strong> convince adults <strong>to</strong> do <strong>an</strong>ything via <strong>to</strong>rture, what about babychildren? While the Monarch programming is done with children, one45


variety of it is done on adults. Adults who are selected are also chosenon the basis of the ability <strong>to</strong> disassociate <strong>an</strong>d their availability. <strong>The</strong>reare certain tests given by the br<strong>an</strong>ches of the military which identifypeople who disassociate well. <strong>The</strong>ir “Cumes” --that is theiraccumulated school records are also examined. This type of personmay be singled out <strong>an</strong>d sent <strong>to</strong> get programming. Some of thesepersons end up in the various intelligence agencies, where they aretrapped for their entire lifetimes. Some of the victims of theprogramming are war vets, Americ<strong>an</strong>s who were POWs, people inmental hospitals, people who just happened <strong>to</strong> work for <strong>Illuminati</strong>connected comp<strong>an</strong>ies, <strong>an</strong>d people going in<strong>to</strong> acting. <strong>The</strong> intelligenceagencies often begin mind-control on adult individuals when <strong>an</strong>individual joins their org<strong>an</strong>ization. If <strong>an</strong> intelligence or military group c<strong>an</strong>exercise a high level of external control over <strong>an</strong> individual, they maynot need the level of programming that some of the occult cults <strong>an</strong>dthe <strong>Illuminati</strong> need. <strong>The</strong> <strong>Illuminati</strong> place their membership among theworld at large, <strong>an</strong>d with the requirement that centuries of secrecy bemaintained. This secrecy c<strong>an</strong> only be maintained by insuring thatstrong early programming is done <strong>to</strong> create fail safe systems with largenumber of dark alters <strong>an</strong>d heavy layers of demonic forces. (M<strong>an</strong>y willscoff at the concept of demons being layered in, but whatever nameone w<strong>an</strong>ts <strong>to</strong> call these forces, they are being layered in, <strong>an</strong>d exert apowerful force behind the programming. <strong>The</strong> programming will breakdown if memories are recovered, so demonic imps are layered in <strong>to</strong>protect the memories from coming out. <strong>The</strong> entire phenomena will begone in<strong>to</strong> great detail <strong>an</strong>d explained in rational terms in the course ofthis book. No matter how a therapist explains these demonic imps, theyneed <strong>to</strong> be dealt with if the memories are not <strong>to</strong> be protected. <strong>The</strong>reare various methods for controlled memory retrieval--journaling,hypnosis, safe rooms with screens, deliver<strong>an</strong>ce etc. which we will notgo in<strong>to</strong> at this point, because we are providing the recipe, not thesolution. While most <strong>Illuminati</strong> victims are in-house from their own occultbloodlines, a certain renegade group of <strong>Illuminati</strong> programmers haveproved <strong>to</strong> the <strong>Illuminati</strong> that they c<strong>an</strong> adequately program non-<strong>Illuminati</strong> children. I am familiar with some of the people involved in this,but will not mention names. What we have covered in this chapter ishow premeditated, deliberate, <strong>an</strong>d precise the pl<strong>an</strong>s are by theprogrammers for the lives of these <strong>Mind</strong>-controlled slaves. <strong>The</strong>programming places their lives on very rigid scripts. <strong>The</strong>re are differentuses for mind-controlled slaves. What applies <strong>to</strong> one slave may notapply <strong>to</strong> <strong>an</strong>other one. Not everyone is a good c<strong>an</strong>didate forprogramming. Sometimes only part of a family will be programmed.Whatever the particulars about the programming, it will be sufficient <strong>to</strong>place the individual’s mind <strong>to</strong>tally under the control of the h<strong>an</strong>dler. Wehave also given the details of how the c<strong>an</strong>didates are selected, tested,prepared <strong>an</strong>d the programming initiated.46


CHAPTER 2. SCIENCE NO. 2THE TRAUMATIZATION & TORTURE OF THE VICTIM<strong>The</strong> basis for the success of the Monarch mind-control programming isthat different personalities or personality parts called alters c<strong>an</strong> becreated who do not know each other, but who c<strong>an</strong> take the body atdifferent times. <strong>The</strong> amnesia walls that are built by traumas, form aprotective shield of secrecy that protects the abusers from being foundout, <strong>an</strong>d prevents the front personalities who hold the body much ofthe time <strong>to</strong> know how their System of alters is being used. <strong>The</strong> shield ofsecrecy allows cult members <strong>to</strong> live <strong>an</strong>d work around other people<strong>an</strong>d remain <strong>to</strong>tally undetected. <strong>The</strong> front alters c<strong>an</strong> be wonderfulChristi<strong>an</strong>s, <strong>an</strong>d the deeper alters c<strong>an</strong> be the worst type of Sat<strong>an</strong>icmonster imaginable--a Dr. Jekyll/Mr. Hyde effect. A great deal is atstake in maintaining the secrecy of the intelligence agency or theoccult group which is controlling the slave. <strong>The</strong> success rate of this typeof programming is high but when it fails, the failures are discardedthrough death. Each trauma <strong>an</strong>d <strong>to</strong>rture serves a purpose. A greatdeal of experimentation <strong>an</strong>d research went in<strong>to</strong> finding out what c<strong>an</strong><strong>an</strong>d c<strong>an</strong>’t be done. Charts were made showing how much <strong>to</strong>rture a47


given body weight at a given age c<strong>an</strong> h<strong>an</strong>dle without death. Now thisis why the Nazis did all those str<strong>an</strong>ge concentration camp experiments,where they tested how quickly people would freeze or die from varioustraumas. It was for mind control! <strong>The</strong> abusers are very specific <strong>an</strong>dscientific in their <strong>to</strong>rture. A lab technici<strong>an</strong> with a clip board walksaround moni<strong>to</strong>ring the e for the children when they receive their initialtraumas. Heart moni<strong>to</strong>rs are closely watched. Still m<strong>an</strong>y children diedfrom the programming. <strong>The</strong> programmers learned that when a childrolled up in a fetal position it had given up the will <strong>to</strong> live. <strong>The</strong>y learned<strong>to</strong> time how fast this would occur <strong>to</strong> get <strong>an</strong> idea how far <strong>to</strong> push thechild. Parents in eastern United States were taken <strong>to</strong> Harvard Universityfor training <strong>to</strong> teach them how much trauma they could give theirchildren at home before they would die. After the children got backfrom their initial programming they were <strong>to</strong> receive daily traumas <strong>to</strong>keep them dissociative.THE INITIAL SPLITS & INITIAL PROGRAMMING DONE AT CHINA LAKE, CA.<strong>The</strong> primary or initial <strong>to</strong>rture for m<strong>an</strong>y children in western U.S. was doneat China Lake which officially has gone under the designations NavalOrdin<strong>an</strong>ce Test Station (pronounced in short as NOTS), Naval WeaponsCenter, NWC, Ridgecrest (the <strong>to</strong>wn nearby), <strong>an</strong>d Inyo-kern (the area).the address of Nimitz Hospital is the code “232 Naval Air WeaponsStation”. <strong>The</strong> base was set up <strong>to</strong> test “new weapons”. Evidently, theNavy decided that mind controlled people were <strong>an</strong> import<strong>an</strong>tweapon <strong>to</strong> test. Most of the “new weapons” created at China Lakewere for the most part hum<strong>an</strong> robots turned out in large numbers. <strong>The</strong>Monarch <strong>Mind</strong> Control was carried out in large airpl<strong>an</strong>e h<strong>an</strong>gers on thebase which have been able <strong>to</strong> house thous<strong>an</strong>ds of tiny cages just largeenough for hum<strong>an</strong> babies. Lots of 1,000 babies was a small batch.According <strong>to</strong> people who worked in the h<strong>an</strong>gers helping program,m<strong>an</strong>y batches were 2,000 or 3,000 babies. M<strong>an</strong>y survivors rememberthe thous<strong>an</strong>ds of cages housing little children from ceiling <strong>to</strong> floor. <strong>The</strong>cages were hot wired (electrified on the ceiling, bot<strong>to</strong>m <strong>an</strong>d sides) sothat the children who are locked inside c<strong>an</strong> receive horrific electricshocks <strong>to</strong> their bodies <strong>to</strong> groom their minds <strong>to</strong> split in<strong>to</strong> multiplepersonalities. <strong>The</strong>se cages are called Woodpecker Grids. <strong>The</strong> victimsees a flash of light when high D.C. voltage is applied. Later, this flash oflight is used with hypnotic induction <strong>to</strong> make the person think they aregoing in<strong>to</strong> <strong>an</strong>other dimension when they are blasted with high voltage.In the Peter P<strong>an</strong> programming, the Programmers tell the slaves that thisis “riding the light.” One of the popular traumas after the small child hasendured the Woodpecker Grid cages for days is <strong>to</strong> rape it. <strong>The</strong> rape isintentionally brutal so that it will be as traumatic as possible. M<strong>an</strong>y ofthe technical people on the base are civili<strong>an</strong>s. This is in part because48


part of the research involves mind-control, <strong>an</strong>d <strong>Illuminati</strong> civili<strong>an</strong> mindcontrolexperts have come <strong>an</strong>d gone from the base. <strong>The</strong> CaliforniaInstitute of Technology at Pasadena is intimately connected <strong>to</strong> ChinaLake’s research (<strong>an</strong>d by the way <strong>to</strong> the <strong>Illuminati</strong>). Also much of thework at the facility is for the intelligence agencies <strong>an</strong>d not the military.Intelligence assets are often civili<strong>an</strong>s. One of the things developed inthe California Universities <strong>an</strong>d then implemented at China Lake wascolor programming, which will be covered later in this book. Red <strong>an</strong>dgreen were discovered <strong>to</strong> be the most visible colors for programming.Various colored flashing lights were used in programming at NOTS.Survivors of the programming all remember flashing lights. <strong>The</strong> use offlashing lights has been introduced in<strong>to</strong> Americ<strong>an</strong> culture by the CIA. Ifa person goes in<strong>to</strong> bars <strong>an</strong>d places where b<strong>an</strong>ds play, you will noticemulti-colored lights flashing. <strong>The</strong> flashing lights create disassociation,especially in people who are programmed.HOW CHILDREN ARE TRANSPORTED TO A MAJOR PROGRAMMING SITEA list of major programming centers is given in <strong>an</strong> appendix, along witheach site’s programming specialties. In this chapter, <strong>an</strong> example of jus<strong>to</strong>ne of the bases used for early programming is given, the large <strong>an</strong>dvery secret China Lake facility in California near Death Valley. <strong>The</strong>children are brought in<strong>to</strong> the China Lake NWC (aka NOTS) base bytrains, pl<strong>an</strong>es <strong>an</strong>d cars. A number of the small airfields which fly thesechildren in<strong>to</strong> China Lake have been identified. One, which is no longerin use for moving children, was a private air strip at Sherid<strong>an</strong>, OR whichwas beside a large lumber mill. <strong>The</strong> lumber mill had <strong>an</strong> agreement <strong>to</strong>secretly house the children who had their mouths tapped. Neighbors inthe area were bought off, <strong>an</strong>d warned that if they talked they wouldbe in trouble for broaching national security. <strong>The</strong> area has lots of millsjoined by train tracks, which were used <strong>to</strong> shuttle the children around.Tied in<strong>to</strong> this network was a Catholic Monastery which lies betweenSherid<strong>an</strong> <strong>an</strong>d McMinnville, close <strong>to</strong> the rail network. <strong>The</strong> Union TrainStation in Portl<strong>an</strong>d, OR has underground tunnels where children weretemporarily warehoused in cages before continuing on their journey.<strong>The</strong> Jesuits were active in this part of the child procurement. Catholicadoption agencies (which are m<strong>an</strong>y), nuns who get pregn<strong>an</strong>t, thirdworld parents, <strong>an</strong>d parents who will sell their children were all sourcesof children for programming. When one thinks about how m<strong>an</strong>y corruptpeople there are <strong>an</strong>d how m<strong>an</strong>y <strong>to</strong>wns <strong>an</strong>d cities are on the WestCoast, <strong>an</strong>d how m<strong>an</strong>y children are produced by Sat<strong>an</strong>ic breeders,illegal aliens <strong>an</strong>d other parents who’d rather have the money th<strong>an</strong>children <strong>an</strong>d the reader begins <strong>to</strong> realize how procuring batches of1,000 or 2,000 children was no problem for the <strong>Illuminati</strong> workingthrough intelligence agencies such as the CIA, NIS, DIA, FBI, <strong>an</strong>d FEMA.49


<strong>The</strong> Finders, a joint CIA/FBI group procured children for the Network foryears. Some of the children needed for programming are <strong>to</strong> be usedfor sacrifices <strong>to</strong> traumatize those being programmed. (<strong>The</strong> names ofsome of the people who work at procuring children forprogramming/sacrifice have been released in Fritz Springmeier’smonthly newsletter.)<strong>The</strong> secret FEMA airstrip at S<strong>an</strong>ta Rosa has pl<strong>an</strong>es l<strong>an</strong>ding <strong>an</strong>d leavingall night. Some of these flights go east <strong>an</strong>d then l<strong>an</strong>d at the secret1800-square-mile China Lake Naval Research Base, <strong>an</strong>d are believed<strong>to</strong> carry children for programming. This airstrip is called the SANTA ROSAAIR CENTER. When I tried <strong>to</strong> get FAA information on this airstrip theyplayed stupid as if it didn’t exist, yet it is in operation.Near S<strong>an</strong>ta Rosa is the Bohemi<strong>an</strong> Grove. Southwest of S<strong>an</strong>ta Rosa is thisair center which is not used by the public. This airport was recently usedby private pilots as a F.B.O. It was built during W.W. II as a training basefor P-32 pilots, <strong>an</strong>d deactivated in 1952. After the war, it was leased <strong>to</strong>private comp<strong>an</strong>ies (such as the CIA). <strong>The</strong> paved areas are 4’ ofconcrete <strong>an</strong>d c<strong>an</strong> l<strong>an</strong>d the heaviest pl<strong>an</strong>es in use. <strong>The</strong>re are nobuildings over two s<strong>to</strong>ries in the entire area, <strong>an</strong>d no control <strong>to</strong>wer. <strong>The</strong>FBI have a contingent in the Federal building down<strong>to</strong>wn S<strong>an</strong>ta Rosa,<strong>an</strong>d “FEMA” has a radio station at the airport. <strong>The</strong> Army reserve alsohas some buildings in the area. However, there is some highly secretactivity going on underground at the airport. 6-7 small pl<strong>an</strong>es sneak ou<strong>to</strong>f the closed base a day, <strong>an</strong>d for a base of its description that isclosed, that is very interesting. <strong>The</strong> pl<strong>an</strong>es take off in the evening <strong>an</strong>ddo not turn their lights on until hundreds of feet in<strong>to</strong> the air. <strong>The</strong> PressDemocrat of S<strong>an</strong>ta Rosa r<strong>an</strong> <strong>an</strong> article on Thurs., Apr. 22, 1993 aboutthe Federal government selling 70 acres of property just <strong>to</strong> the east ofthe airport. However, when one reads closely, the l<strong>an</strong>d is going <strong>to</strong> beoffered <strong>to</strong> a host of Federal agencies. <strong>The</strong> property was “being used byFEMA” (707-542-4534). If one thinks about it, it is unlikely that the radiostation is a FEMA tr<strong>an</strong>smitter station. <strong>The</strong> close vicinity of this secretactivity <strong>to</strong> the elite’s Bohemi<strong>an</strong> Grove makes this <strong>an</strong> interesting site forstudy. <strong>The</strong> airport used for the Bohemi<strong>an</strong> Grove visi<strong>to</strong>rs is north of S<strong>an</strong>taRosa on hwy 101, the Sonoma County Airport. United Express <strong>an</strong>dAmeric<strong>an</strong> Eagle (which flies <strong>to</strong> <strong>an</strong>d from S<strong>an</strong> Jose) fly in<strong>to</strong> this airport,which has a control <strong>to</strong>wer. In 1964, the airport was reported <strong>to</strong> havealso carried about 600 military operations (either a takeoff or l<strong>an</strong>ding)per year. It was around this time that the Federal government made <strong>an</strong>agreement with Sonoma County Airport <strong>to</strong> help pay for the runway <strong>to</strong>be extended, the runway <strong>to</strong> be strengthened <strong>an</strong>d the airport <strong>to</strong> beupgraded in numerous ways. <strong>The</strong> elite from around the world fly in<strong>to</strong>here <strong>to</strong> go <strong>to</strong> the Bohemi<strong>an</strong> Grove, which is in the Monte Rio area.Monarch slaves are regularly abused at the Grove for theentertainment of Bohemi<strong>an</strong> Grove members in kinky sex theme rooms,50


such as the dark room <strong>an</strong>d the necrophilia room. Secret NWO orderbusiness is conducted in the small, dark lounge with a wooden signnaming it U.N.DERGROUND. Slaves are hunted in the woods for sport,<strong>an</strong>d occult rituals, including inf<strong>an</strong>t sacrifice, are held outdoors in theGrove. <strong>The</strong>se airfields are described in detail so that the reader c<strong>an</strong>begin <strong>to</strong> catch on <strong>to</strong> the network of small pl<strong>an</strong>es <strong>an</strong>d airfields theMonarch system uses <strong>to</strong> tr<strong>an</strong>sport children. <strong>The</strong> children are trickled infrom various collection points <strong>to</strong> China Lake. Monarch slaves, m<strong>an</strong>y ofthem children themselves are used in this extensive child procurementsystem. Children are also used <strong>to</strong> entice <strong>an</strong>d kidnap other children.Teenage slaves are used <strong>to</strong> escort <strong>an</strong>d tr<strong>an</strong>sport little children on trains,buses, <strong>an</strong>d pl<strong>an</strong>es. <strong>The</strong> tri<strong>an</strong>gular-shaped airfield at China Lake hastraditionally begun very early in the morning with lots of activity. <strong>The</strong>night flights from FEMA’s S<strong>an</strong>ta Rosa airfield being <strong>an</strong> example ofincoming flights. <strong>The</strong> airfield connects <strong>to</strong> the main base area viaS<strong>an</strong>dquist Road. Children are l<strong>an</strong>ded at this field, while others aredriven through the gates guarded by marines, <strong>an</strong>d others comethrough via the east-west rail line. <strong>The</strong> fact that children are drivingthrough the gates is not alarming because inside the military perimeteris a high school, a junior high school <strong>an</strong>d 3 other schools. Some of theadults of the children being programmed stay in military barracks(Quonset huts <strong>an</strong>d one s<strong>to</strong>ry buildings) while they wait.A male Monarch victim remembers a large h<strong>an</strong>ger building at ChinaLake with a concrete floor <strong>an</strong>d row after row of cages suspended fromthe ceiling filling the large building. One of the Programmers wasdressed similar <strong>to</strong> a Catholic Priest. <strong>The</strong> electric current that r<strong>an</strong> <strong>to</strong> thecages made a hum, like <strong>an</strong> electric fence. <strong>The</strong>re was a marble slabthat served as <strong>an</strong> altar where black-hooded robed people would takea bone h<strong>an</strong>dled knife <strong>an</strong>d sacrifice little children in front of the otherchildren in the cages. (Memories from other survivors about the placewill be mentioned later.)MORE ABOUT THE SECRET CHINA LAKE BASECharles M<strong>an</strong>son, a programmed Monarch slave who received initialprogramming at China Lake, lived with his cult only 45 miles north-wes<strong>to</strong>f China Lake at the remote Myers <strong>an</strong>d Barker r<strong>an</strong>ches. Scotty’s Castlein Death Valley, Bakersfield, Edwards AFB, <strong>an</strong>d Papa Ludo’s S<strong>to</strong>re &Tavern (with its secret underground programming center) are all in thevicinity of China Lake <strong>an</strong>d have all been programming sites <strong>to</strong>o. Oldroute 66 went by China Lake, which now is just off U.S. 395. <strong>The</strong> area’stavern has been named the Hideaway. <strong>The</strong> building was low, awayfrom the highway, with a large unlit parking lot. Only people who knewhow <strong>to</strong> enter it by the obscure entr<strong>an</strong>ce on the side could get in. <strong>The</strong>51


Hideaway Tavern has been a local h<strong>an</strong>gout for the CIA men in ChinaLake. It has served them excellent steaks. <strong>The</strong> base headquarters isknown as the White House, <strong>an</strong>d it looks somewhat like a yachtclubhouse. Northwest of the airfield, at 39-64 & 4-33 E on the quadmaps, the government has built a large magical seal of Solomon(hexagram) with each leg 1/4 mile long on the ground. What was it likefor a victim in the early 1950’s in a NOTS area programming center?One of the buildings in the area used for programming was describedas having a flat roof <strong>an</strong>d a t<strong>an</strong> exterior. A fence r<strong>an</strong> around thebuilding. Inside the front door was <strong>an</strong> old oak reception type desk. Aseries of 3 doors connected by tunnels were gone through. Oneentered in<strong>to</strong> a hallway, <strong>an</strong>d then <strong>to</strong>ok a left in<strong>to</strong> the programmingroom. Tunnels connected the different hallways. <strong>The</strong> programmingroom was painted a good dissociative color white. In the middle of theroom, cages were suspended with chimps. <strong>The</strong> examining table wasmetal, which was cold for the victim, but easy <strong>to</strong> wash for theattend<strong>an</strong>ts. <strong>The</strong> victim was placed in cages <strong>an</strong>d could observe whitedots light up in different dot patterns over the door on a p<strong>an</strong>el of lights.<strong>The</strong> low level shocks <strong>to</strong> the victim were coordinated with the dotpatterns. (Some of this relates <strong>to</strong> domino programming.) An attend<strong>an</strong>tmoni<strong>to</strong>red the entire scenario on charts, while the child was repeatedlytraumatized with low-voltage shocks. Needles were poked in the child,the room was made dark <strong>an</strong>d then lit. Voices said, “Love me, love menot.” This was part of the love me, don’t love me part of programming.“Good girls ride the silvery wings.” This was <strong>to</strong> build the ability <strong>to</strong>condition tr<strong>an</strong>cing by the victim upon electro-shock. Germ<strong>an</strong> & Britishscientists/mind control programmers came <strong>to</strong> NOTS after W.W. II,including Joseph Mengele (known as Dr. Green, or Greenbaum, <strong>an</strong>dother pseudonyms). <strong>The</strong> <strong>Illuminati</strong>’s Dr. Black worked out of China Lakealso. Dr. White (Dr. Ewin Cameron) worked on the east coast, althoughhe did fly in every so often <strong>to</strong> the west coast <strong>to</strong> meet with the other <strong>to</strong>pprogrammers. Dr. Blue was <strong>an</strong>other of the import<strong>an</strong>t leading <strong>Illuminati</strong>programmers. <strong>The</strong>se <strong>to</strong>p programmers supervised other lesserprogrammers. If something went wrong, they might fly a child from aprogramming location <strong>to</strong> a specialist <strong>to</strong> get it special help for itsprogramming. <strong>The</strong> men <strong>an</strong>d women of the <strong>Illuminati</strong> helped the <strong>to</strong>pprogrammers out. <strong>The</strong> Gr<strong>an</strong>de Mothers, <strong>an</strong>d the Gr<strong>an</strong>de Masters of the<strong>Illuminati</strong> participated in helping with the programming. As a child ofthe <strong>Illuminati</strong> progressed through its programming, three people hadoversight over its programming: its Gr<strong>an</strong>de Mother, its Gr<strong>an</strong>de Dame,<strong>an</strong>d the Programmer. <strong>The</strong> <strong>Illuminati</strong> functions off a chain of comm<strong>an</strong>dsimilar <strong>to</strong> the military. (In fact a big secret is that Sat<strong>an</strong>’s realm actuallyserved as the model for military <strong>an</strong>d political structures.) As a childbegins its programming, it is moni<strong>to</strong>red in a fashion similar <strong>to</strong> hospitalswhere charts are filled <strong>an</strong>d then these charts are filed. Tests <strong>an</strong>devaluations are done regularly. Goals are set which are six monthprogramming goals. <strong>The</strong>se will say in effect, we need <strong>to</strong> accomplish this52


y doing a, b, c, d in the next six months. This is somewhat similar <strong>to</strong> <strong>an</strong>I.E.P. (individual education pl<strong>an</strong>) which the special-ed teachers inOregon set up for each student. At some point, the strong points <strong>an</strong>dthe weaknesses of the child will be identified, <strong>an</strong>d then a decision willbe made as <strong>to</strong> what occupation the <strong>Illuminati</strong> w<strong>an</strong>t <strong>to</strong> program theperson <strong>to</strong> become. If the young boy is aggressive <strong>an</strong>d has sadistictendencies, the <strong>Illuminati</strong> call it “a war monger” <strong>an</strong>d label its chart “Thischild will be a general.” <strong>The</strong>n they proceed <strong>to</strong> program it <strong>to</strong> become ageneral. Nurses, teachers, <strong>an</strong>d child physici<strong>an</strong>s must be programmedwith a gentleness <strong>to</strong> their System. Other occupations, such as lawyersc<strong>an</strong> be allowed <strong>to</strong> be ruthless. M<strong>an</strong>y of the children have religiousfronts labelled for their programming, <strong>an</strong>d a very popular occupationfor <strong>Illuminati</strong> men is <strong>to</strong> become clergymen. Religious leaders make upthe majority of fathers of Monarch survivors that have sought help. Most<strong>Illuminati</strong> victims have parents who are import<strong>an</strong>t religious leaders,m<strong>an</strong>y of them <strong>to</strong>p clergymen in the established churches. As thereader might expect, some <strong>to</strong>rtures require that the child victim’stemperature, respiration, pulse <strong>an</strong>d blood pressure be closelymoni<strong>to</strong>red.WHAT TRAUMA DOESIn recent times, the military <strong>an</strong>d the science of psychology is payingattention <strong>to</strong> what they call PTSD (post-traumatic stress disorder). PTSDare the psycho-pathic debilitating effects of trauma <strong>an</strong>d chronicnature of reactions <strong>to</strong> trauma. Intrusive flashbacks of the trauma willoccur if the mind doesn’t protect itself from reminders of the trauma.<strong>The</strong> mind creates avoid<strong>an</strong>ce patterns <strong>to</strong> protect itself from thinkingabout the trauma. P<strong>an</strong>ic symp<strong>to</strong>ms occur when the person undergoesphysiological arousal <strong>to</strong> traumatic cues. A trauma will create a certain“shatteredness” within the victim. <strong>The</strong> victim will develop lifeassumptions about being vulnerable, about having little personalworth, <strong>an</strong>d that life is not fair. <strong>The</strong>y may develop phobias <strong>to</strong> const<strong>an</strong>tlycheck their environment for safety <strong>an</strong>d const<strong>an</strong>tly moni<strong>to</strong>r others <strong>to</strong>make sure they are not mistreated. For centuries warfare has takenplace, <strong>an</strong>d military men have experienced PTSD. However, a fulldescription <strong>an</strong>d investigation in<strong>to</strong> the disorder has been done only inrecent his<strong>to</strong>ry. <strong>The</strong> U.S. military has prevented <strong>an</strong>y serious counseling fortheir troops suffering from this. Peer “counselors” <strong>an</strong>d rap groups wereallowed, <strong>an</strong>d misled by the army <strong>to</strong> believe that they would beadequate. PTSD will often lead <strong>to</strong> outbursts of rage, chronic depression,or borderline dysfunctions. <strong>The</strong> PTSD in Monarch victims is masked bythe MPD/DID <strong>an</strong>d the programming. <strong>The</strong>n in turn, the programmingmasks the MPD. When the programming is complete, front alters havebeen created which c<strong>an</strong> function with smiles <strong>an</strong>d cheerful attitudes,53


while underneath, the mind is full of shattered hurting alters, who theslave is unaware of. Self-punishment <strong>an</strong>d social withdrawal are naturalsymp<strong>to</strong>ms of PTSD, <strong>an</strong>d the programmers have no trouble enh<strong>an</strong>cing<strong>an</strong>d programming these functions in<strong>to</strong> their alter systems. Certain altersend up holding the <strong>an</strong>ger, the fear, the social withdrawal, the guilt,<strong>an</strong>d the desire for self-punishment. <strong>The</strong>se are held in check by theprogramming, <strong>an</strong>d take the body when the slave steps outside of theprogrammed path. <strong>The</strong> bad memories in the minds of men who sufferfrom PSTD have been noted <strong>to</strong> re-cycle <strong>an</strong>d self-perpetuatethemselves as they lie unresolved in the memory cells. Bad memoriesfor the victims of Monarch programming are used <strong>to</strong> hold the MPD, theprogramming in place <strong>an</strong>d also <strong>to</strong> keep the victim in compli<strong>an</strong>ce. In1954, Maslow published his hierarchy of needs, which when applied <strong>to</strong>Monarchs <strong>an</strong>d PSTD victims me<strong>an</strong>s that they c<strong>an</strong> not progress intherapy until their survival <strong>an</strong>d safety needs are met. However, theProgrammers/abusers know that it is import<strong>an</strong>t <strong>to</strong> keep the slave awayfrom safety. To this end, the Programmers employ people externally <strong>to</strong>moni<strong>to</strong>r slaves, <strong>an</strong>d internal alters in the victim’s mind <strong>to</strong> be moni<strong>to</strong>ringalters <strong>an</strong>d reporting alters. Reporting alters c<strong>an</strong> always reach theNetwork of abusers via 1-800 telephone numbers which ch<strong>an</strong>ge every2 weeks. <strong>The</strong>y c<strong>an</strong> also call their h<strong>an</strong>dler. Reporting alters are veryunemotional <strong>an</strong>d serve as tape recorders which mech<strong>an</strong>ically report<strong>an</strong>y developments that might threaten the programming <strong>to</strong> theirh<strong>an</strong>dler. Alters programmed <strong>to</strong> commit suicide are also built in<strong>to</strong> theSystems. For inst<strong>an</strong>ce, for a system hacker--<strong>an</strong> outsider-- <strong>to</strong> work withthe alters of <strong>an</strong> internal Gr<strong>an</strong>d Druid Council (aka Executive committeealters, or judge alters) or a System almost insures 99% of the time suicideof the Monarch slave.In at least 99% of the cases where Monarchs who have come in fortherapy, they still lack safety, which is a higher need th<strong>an</strong> trying <strong>to</strong> goagainst their programming. This is why so few people have really gottenfree. To undo the programming, the victim needs safety. <strong>The</strong>programmers know this, <strong>an</strong>d have set up almost fail safe methodswhere the victim is not even safe from their own system of alters, letalone Big Brother. <strong>The</strong>rapists call their Monarch victims “survivors” amisnomer, because in reality they are still in the middle of ongoingabuse. Some therapists may mistakenly think that it is helpful <strong>to</strong> tell thevictim, “<strong>The</strong>se fears you are having are from the past.” Deliver<strong>an</strong>ceministries may also try <strong>to</strong> s<strong>to</strong>p the victim’s fears, without underst<strong>an</strong>dingthe reasons behind the ongoing fear. Other chapters will deal with theextensive back up methodologies. At this point, it is mentioned in thecontext of this chapter <strong>to</strong> establish <strong>to</strong> the reader that the abuse <strong>an</strong>d<strong>to</strong>rture continue non-s<strong>to</strong>p. Some of this would naturally occur <strong>an</strong>yway,but the Programmers enh<strong>an</strong>ce this naturally occurring phenomenam<strong>an</strong>y-fold <strong>to</strong> insure that the slave will continually abuse themselves. Thisme<strong>an</strong>s as time progresses, some Monarch systems are timed <strong>to</strong> shatter54


certain levels & <strong>to</strong> create new levels. If the Programmers w<strong>an</strong>t, theyc<strong>an</strong> shatter a front Christi<strong>an</strong> alter level <strong>an</strong>d create a new level of NewAge believing alters <strong>to</strong> replace the original front. <strong>The</strong> abuse c<strong>an</strong> bedone by the victim themselves <strong>to</strong> themselves, because programmingalters are given the ability <strong>to</strong> pull up horrific memories via codes. Thosetraumatic memories, which shattered the mind the first time, are stillcapable of doing it again when they are abreacted (that is relived bythe body & mind). More <strong>an</strong>d more people are experiencing workingwith someone with multiple personalities. However, very few multiplesever discover more th<strong>an</strong> the front parts of their systems. Very fewpeople, outside of the programmers, have much idea of what <strong>an</strong>entire system of alters is like, therefore some of the things that this bookwill describe will seem foreign <strong>to</strong> those people who have learned a littleabout multiplicity. <strong>The</strong>re are several models <strong>to</strong> describe what happensinside a multiple’s brain as it develops multiple personalities. <strong>The</strong> brain isvery complex. Recent brain research confirms that the brain was farmore complex th<strong>an</strong> imagined. In <strong>an</strong> average brain there are10,000,000,000 individual neuron (nerve cells). Each of these has 10 with100 zeros following it worth of interconnections. In other words, <strong>an</strong>average brain has vastly more interconnections th<strong>an</strong> the <strong>to</strong>tal numberof a<strong>to</strong>ms in the universe! Often about 1/2 million different chemicalreactions take place every minute in the average brain, <strong>an</strong>d thenumber c<strong>an</strong> be several times that during intense activity. A Monarch’sbrain has been worked on <strong>to</strong> be even more active th<strong>an</strong> a normalperson’s brain. <strong>The</strong> left & the right side of the Monarch’s brain bothwork simult<strong>an</strong>eously, <strong>an</strong>d the various personalities are all busy workingsimult<strong>an</strong>eously on different tracks. To describe the complexity of what ishappening with someone’s mind which has been messed with sodramatically for years, me<strong>an</strong>s that at times only <strong>an</strong> approximate modelis presentable. <strong>The</strong>re are several terms which are used in speakingabout multiples, which have developed several me<strong>an</strong>ings. Unless theseterms are correctly defined, misconceptions about them c<strong>an</strong> cloud <strong>an</strong>underst<strong>an</strong>ding of what happens during Monarch programming. First,researchers have discovered that deep within a person, the brain trulyunderst<strong>an</strong>ds in a pure awareness all about itself. This is true foreveryone. This pure awareness has been named various names,including Hidden Observer. If a m<strong>an</strong> is obnoxious <strong>an</strong>d seems <strong>to</strong> have a<strong>to</strong>tal lack of awareness that he irritates people; just know that deepdown <strong>an</strong> awareness realizes exactly what he is <strong>an</strong>d what he does. <strong>The</strong>multiple’s brain at some deep awareness knows what has happened<strong>to</strong> it. <strong>The</strong> term Hidden Observer is fraught with d<strong>an</strong>ger though. Ademonic entity called the Hidden Observer works h<strong>an</strong>d in glove withthe programmer <strong>to</strong> program the individual. <strong>The</strong> Hidden Observer isable <strong>to</strong> see everything the System does. <strong>The</strong> people who control asslave frequently call up the Hidden Observer <strong>to</strong> ask questions. In thiscase, it is a demonic entity, <strong>an</strong>d yet it is this Hidden Observer, whicheach System has, that some therapists are trying <strong>to</strong> access <strong>to</strong>55


underst<strong>an</strong>d the System. This Hidden Observer only tells the truth <strong>to</strong> itsMaster, because it is demonic. <strong>The</strong> next term which is misunders<strong>to</strong>od isthe term “the core”. <strong>The</strong> programmers set up various alters <strong>to</strong> pretend<strong>to</strong> be the core, <strong>an</strong>d the core’s protec<strong>to</strong>r. <strong>The</strong> real core is quite hidden,<strong>an</strong>d not placed within the regular grid of the alter system’s chart. It willtake some explaining <strong>to</strong> convey what happens <strong>to</strong> the mind, <strong>an</strong>d whatthe real core is.THE TYPES OF TRAUMAOne thing discovered by research in<strong>to</strong> the genetic tr<strong>an</strong>smission oflearned knowledge by hum<strong>an</strong>s <strong>to</strong> their children was that people areborn with certain fears. Snakes, blood, seeing internal body parts, <strong>an</strong>dspiders are all things that people are born fearing. <strong>The</strong> phobias <strong>to</strong>wardthese things are passed down genetically from one generation <strong>to</strong><strong>an</strong>other. In searching for traumas <strong>to</strong> apply <strong>to</strong> little children, theProgrammers found that these natural phobias which occur in mostpeople from birth will work “wonderful” <strong>to</strong> split the mind. Along this line,the following are samples of traumas done <strong>to</strong> program slaves:a. being locked in a small confined spot, a pit or cage with spiders <strong>an</strong>dsnakes. b. being forced <strong>to</strong> kill, <strong>an</strong>d cut up <strong>an</strong>d eat innocent victims, c.Immersion in<strong>to</strong> feces, urine <strong>an</strong>d containers of blood. <strong>The</strong>n being made<strong>to</strong> eat these things. <strong>The</strong>se are st<strong>an</strong>dard traumas. Often a slave willexperience not only all of the above but m<strong>an</strong>y others before theyreach 4 or 5 years of age. It is import<strong>an</strong>t <strong>to</strong> traumatize the child earlybefore it has a ch<strong>an</strong>ce <strong>to</strong> develop its ego states. By the way, when thechild is placed in<strong>to</strong> a small box with spiders or snakes, they will often be<strong>to</strong>ld that if they play dead the snake will not bite them. This carries outtwo things for the programmers, it lays the basis for suicide programs(i.e. “if-you-are-dead, then you-are-safe” thinking) <strong>an</strong>d it teaches thechild <strong>to</strong> dissociate. Traumas <strong>to</strong> split the mind are not just high voltage,or natural phobias, but encompass the full r<strong>an</strong>ge of the emotional <strong>an</strong>dspiritual being of the victim. <strong>The</strong> victim is eventually stripped of everyspiritual or emotional resource by a variety of traumas, such as “bloodorgies” where male <strong>an</strong>d female genitals are cut, <strong>to</strong>rture sessions on alltypes of medieval <strong>to</strong>rture machines, staged events where ac<strong>to</strong>rsimitating God, Jesus Christ, police, <strong>an</strong>d therapists curse the victim,reject the victim, <strong>an</strong>d even “kill” the victim in simulated drug deaths.Children are placed in hospitals in captive abusive conditions. Childrenare tied <strong>to</strong> innocent children which are systematically <strong>an</strong>d brutallykilled while the children are made <strong>to</strong> believe that they are guilty for thechild’s punishment. Near death experiences such as drowning havebecome <strong>an</strong> art with these abusers. Trained dogs, monkeys <strong>an</strong>d other<strong>an</strong>imals are used <strong>to</strong> further traumatize the victims. An <strong>Illuminati</strong> slave will56


most likely have experienced all of the last few paragraphs above, plusmuch more. (Toby, was one of the trained NOTS chimp<strong>an</strong>zees. He wastrained <strong>to</strong> be sadistic. <strong>The</strong> other trained chimp<strong>an</strong>zees at China Lakeincluded “Gabie” or Gabriel, who tickled the victim while they weretied up; Rastice, who had a <strong>to</strong>y chest with diamonds, bracelets, & ascepter which electroshocked; Zoro, who could do <strong>an</strong>ything me<strong>an</strong>;Elmore, who cuddled as a mother but ate raw flesh; plus others. Anexample of something said during programming with the chimps is,“THREE LITTLE MONKEYS IN A CAGE, DO, RE, ME, FA, SO, LA, TE, DO”.)Joseph Mengele, aka Dr. Green, was skilled at using Germ<strong>an</strong>shepherds <strong>to</strong> attack people. Mengele got a reputation in the Naziconcentration camps for using Germ<strong>an</strong> shepherds, before he wasbrought over <strong>to</strong> America. He used dogs <strong>to</strong> help program Americ<strong>an</strong>children. (<strong>The</strong> Process Church often uses Germ<strong>an</strong> Shepherds <strong>to</strong>o.) Hewas also skilled in abortions, <strong>an</strong>d was involved in weird traumasinvolved with babies being born, or the simulated births of dead rats (orother gross things) from the vaginas of girls being programmed. Whenthe Sat<strong>an</strong>ic cults tie their victims with wire for rituals, some of thesepeople will lose their <strong>to</strong>es or fingers from the wire. At times little fingers<strong>an</strong>d the <strong>to</strong>p part of ring fingers are lost in Sat<strong>an</strong>ic cult rituals <strong>to</strong>o. M<strong>an</strong>yof the traumas <strong>an</strong>d <strong>to</strong>rtures are carried out by alters or persons who aresadistic. How does the Network get sadistic men <strong>to</strong> <strong>to</strong>rture littlechildren? Three different respectable studies (Harrower, 1976/ Milgram,1974/ & Gibson 1990) show that essentially all hum<strong>an</strong> males c<strong>an</strong> betaught <strong>to</strong> engage in sadistic behavior. <strong>The</strong>re may be a few exceptions,but the point is that sadistic people are not in short supply forprogramming. Some of the alter systems have extremely brutal sadisticalters. In fact, the Mothers of Darkness alters are <strong>an</strong> import<strong>an</strong>tbal<strong>an</strong>cing point <strong>to</strong> prevent the sadistic male programmers from killingmore of the children they are working on. <strong>The</strong>se sadists get a laugh athurting little children. <strong>The</strong> more pain, the more charge <strong>an</strong>d excitementthey get out of it. Sadists enjoy gaining <strong>to</strong>tal control over a person. Inorder <strong>to</strong> do this, they take charge over the little child’s basic bodyfunctions, such as sleep, eating, <strong>an</strong>d pooping. <strong>The</strong>y enjoy terrorizing thelittle child, so Monarch slaves end up watching hours of sadisticbehavior done <strong>to</strong> others before they are even 5 years old. <strong>The</strong> worsethe trauma, the more the sadistic programmers enjoy it. Sensorydeprivation, forced labor, poisoning, <strong>an</strong>d rape of every orifice of thechild are popular <strong>to</strong>rtures by the programmers. <strong>The</strong> child soon learnsthat he is at the mercy of crazy people who c<strong>an</strong> only be satisfied by<strong>to</strong>tal submission, <strong>an</strong>d the willingness <strong>to</strong> allow someone else <strong>to</strong> think foryou. <strong>The</strong> child will be made <strong>to</strong> eat faeces, blood, other disgustingthings, while the programmer eats good meals.Some of this sadistic behavior is <strong>to</strong>ward a goal. Cutting a person’s<strong>to</strong>ngue <strong>an</strong>d putting salt on it reinforces the no-talk programming.Making someone throw up <strong>to</strong> cause eating disorder programming.57


Dislocating shoulders <strong>to</strong> cause dissociation. When the child victim’scrying is heard, they immediately apply <strong>to</strong>rture so the child thinks it willsuffocate. This is behavior modification, & is covered later in chapter 9.This trains the child not <strong>to</strong> cry. Around age 3, a Black Mass, a sick evilcommunion, is performed which is so ugly, that the child hides indissociation by creating a “locked-up”/or “obscure” child. This early flipprovides a base for dark side programming. This locked up child c<strong>an</strong>have a powerful healing (with system wide effects) by being part of apositive love-filled commumon. <strong>The</strong>re are m<strong>an</strong>y traumas which c<strong>an</strong> becarried out, which leave no physical scars, but do leave the child withthe deepest emotional <strong>an</strong>d spiritual scars. This is often necessary whenprogramming young children who the outside world will see soon aftertheir programming session. Holding one’s arms out is a simple <strong>to</strong>rture.Tickling <strong>an</strong>d sensory deprivation are two <strong>to</strong>rtures that leave no marks.Burial caskets, some outside <strong>an</strong>d some at inside locations are oftenused on slaves. That is why m<strong>an</strong>y slaves fear being buried alive. <strong>The</strong>Programmers place all types of creepy insects in the caskets when theybury the person alive. Another type of sensory deprivation is done byplacing the victim in salt water (for buoy<strong>an</strong>cy <strong>an</strong>d weightlessness).<strong>The</strong>n the victim is fitted with sensitive sensors that shock the person if thevictim moves. <strong>The</strong> shock puts the person back in<strong>to</strong> unconsciousness.<strong>The</strong> brain is trained <strong>to</strong> s<strong>to</strong>p all external body movement from theconscious mind. This type of sensory deprivation is used <strong>to</strong> place in theposthypnotic comm<strong>an</strong>ds <strong>to</strong> do something at some future date far in<strong>to</strong>the future. <strong>The</strong> program is placed in<strong>to</strong> the mind at the same primallevel that the mind uses <strong>to</strong> tell the heart <strong>to</strong> beat. One of the“appropriate” <strong>to</strong>rtures is <strong>to</strong> place a bar between a little girl’s legs whichspreads the girl’s loins for rape. <strong>The</strong>n the bent spread legs are flapped,while the victim is specifically <strong>to</strong>ld she is a “Monarch butterfly”. M<strong>an</strong>yvictims have created butterflies in their minds while being raped. <strong>The</strong>programmers may tell some of their victims that out of caterpillarwormscome beautiful butterflies. While raping the child, theProgrammers will describe their sperm fluid as “honey comb”, <strong>an</strong>d willcry out “hallelujah” when they come. It doesn’t take long for the child<strong>to</strong> realize it has no ability <strong>to</strong> resist what is being done <strong>to</strong> it. <strong>The</strong> will of thechild victim is destroyed, <strong>an</strong>d in its place remains a pliable slave. If theslave doesn’t learn correctly they receive more pain. A fish hook in thevagina is a popular one. Older males have their genitals hurt duringadditional or reprogramming sessions. <strong>The</strong>y may have <strong>to</strong> eat the skintaken from their genitals. <strong>The</strong> mind of the victim is not only divided fromitself, but the very process of <strong>to</strong>rture, makes the victim distrustful ofhum<strong>an</strong>s in general. On <strong>to</strong>p of this distrust, the programmers will layer inprogramming <strong>to</strong> isolate the person from healthy relationships, which inturn increases the victim’s feeling of helplessness. <strong>The</strong>y are divided fromtheir own parts (their own self) <strong>an</strong>d the world in general. For inst<strong>an</strong>ce,the water, cave <strong>an</strong>d s<strong>an</strong>d <strong>to</strong>rtures make the survivor fearful of oce<strong>an</strong>s.<strong>The</strong> victim may be traumatized by being lowered on ropes or a cage58


on ropes in<strong>to</strong> the water from a cliff, or may end up being buried alive ins<strong>an</strong>d <strong>an</strong>d watching the tide come in, or simply being <strong>to</strong>tally buriedalive in s<strong>an</strong>d <strong>an</strong>d ab<strong>an</strong>doned. For a while, the <strong>Illuminati</strong> was big onwater <strong>to</strong>rture because they had built in<strong>to</strong> their systems a weakness thatwater would destroy the clone armies that protected programming,<strong>an</strong>d they needed their slave systems <strong>to</strong> be fearful of water. Slaves arefrequently lowered in<strong>to</strong> black holes, or pits containing the most scariestthings possible. This is a frequent trauma, because the victim when leftin a dark hole for hours or days without <strong>an</strong>y contact with the world orwater & food will develop deep emotional scars & dissociation ratherth<strong>an</strong> tale-telling signs of physical abuse. This <strong>to</strong>rture is used essentiallyon all Monarch slaves. Some of the traumas are done for specificmedical reasons. For inst<strong>an</strong>ce, the person is starved by only allowing forinst<strong>an</strong>ce 300 calories per day for say a small wom<strong>an</strong> of 125 lbs. Sugar &proteins are severely limited, so that the brain is starved in<strong>to</strong> submission.Water deprivation, which is taught <strong>to</strong> parents who raise Monarchslaves, is used from time <strong>to</strong> time on slaves <strong>to</strong> raise the brain’stemperature which happens when the brain swells from lack of water.When the brain gets woozy & overheated it hallucinates <strong>an</strong>d has ahard time remembering events. If water deprivation is combined withelectroshock it makes it harder yet for the victim <strong>to</strong> remember<strong>an</strong>ything. Heavy exercise along with long periods of little sleep (2-3hours/day) causes <strong>an</strong> overproduction of endorphins in the brain <strong>an</strong>dvictims begin <strong>to</strong> robotically respond <strong>to</strong> comm<strong>an</strong>ds. This was done <strong>to</strong>co-author Fritz under the pretense of military “training”. <strong>The</strong> otherauthor, Cisco, experienced it as part of her mind-control. <strong>The</strong> brainunder such stress may flip its functions from right <strong>to</strong> left & vice-versa.Hypnosis is easier when a brain is tired. Most victims remember beingsuspended upside down. This was honed <strong>to</strong> a fine art by Mengele withconcentration camp victims, while records were made of how fastblood drained from a child or adult’s s<strong>to</strong>mach when they were dunkedupside down in<strong>to</strong> a t<strong>an</strong>k of ice cold water. <strong>The</strong> cold water testssupplied the data on temperature levels as consciousness faded. Thisinformation then was used later on in America <strong>to</strong> help the survival rateof children given the same trauma. Simply h<strong>an</strong>ging a person upsidedown for one or two hours will begin <strong>to</strong> play tricks on the mind. <strong>The</strong>mind will begin <strong>to</strong> dissociate, <strong>an</strong>d will begin <strong>to</strong> reverse the primordialbrain functions such as pain is pleasure. <strong>The</strong> person’s mind rearr<strong>an</strong>ges.This is often done with Beta alters or Beta models <strong>to</strong> get them <strong>to</strong> thinkthat the pain of sadistic rape is a pleasure. After this reversal in the mindthat “PAIN IS LOVE”, the S&M kitten alters will beg their h<strong>an</strong>dler <strong>to</strong> slapthem, tie them up, hurt them, etc. <strong>The</strong>y will tease their h<strong>an</strong>dler, <strong>an</strong>d tellhim he is not a real m<strong>an</strong> if he shows <strong>an</strong>y mercy in how the pain isinflicted. Fire/burning <strong>to</strong>rture is used in the porcelain faceprogramming. <strong>The</strong> charismatic br<strong>an</strong>ch of the sat<strong>an</strong>ic Network (such asthe Assembly of God churches) uses porcelain face programming. Thisis done by using wax masks upon the victim, <strong>an</strong>d giving them fire59


<strong>to</strong>rture. <strong>The</strong> person actually thinks that their face has melted. At thatpoint, the programmer pretends <strong>to</strong> be a god & a hero, <strong>an</strong>d tells theperson he will give them a new face, a porcelain mask. <strong>The</strong>se newfaces by the way, look like the ones sold in so m<strong>an</strong>y s<strong>to</strong>res. <strong>The</strong>memories of abuse are then hypnotically hid behind the masks. To takeoff the masks is <strong>to</strong> abreact & burn again. If <strong>an</strong>yone <strong>to</strong>uches the facesof alters with porcelain face programming, the alters will feel a burningsensation because their masks are not <strong>to</strong> be tampered with. This me<strong>an</strong>sthat these alters have via <strong>to</strong>rture & hypnosis lost their own faces! This ispart of the dehum<strong>an</strong>ization process which chapter 10 part C talksabout. As long as these alters stay in denial of what has happened <strong>to</strong>them, they do not have <strong>to</strong> face the burn <strong>to</strong>rture memories. Some altersare <strong>to</strong>rtured in a fashion that the eye area is traumatized <strong>an</strong>d theysquint the left eye. <strong>The</strong>y look like Baron Guy de Rothschild of Fr<strong>an</strong>ce’sleft eye looks. Guy de Rothschild is a major h<strong>an</strong>dler/programmer, butthe reason for his drooping eye is not known. Perhaps it was <strong>to</strong>rture. <strong>The</strong>ritual aspect of trauma needs <strong>to</strong> be covered. By traumatizing someoneon a specific day--say, repeatedly traumatizing them on their birthday--is far more damaging th<strong>an</strong> just simply traumatizing them. <strong>The</strong> reason isthat every time that person’s birthdate recycles they are put back in<strong>to</strong>their memories of abuse. Sexual abuse of a child is more powerful whenit is put in<strong>to</strong> the context of demonic magic. <strong>The</strong> abuser’s semen ismagic <strong>an</strong>d seals the programming. <strong>The</strong> ritual aspect of it, <strong>an</strong>d therepetitive nature of the abuse creates several dynamics thataccomp<strong>an</strong>y the abuse that wouldn’t occur in non-ritual abuse. <strong>The</strong> liethat accomp<strong>an</strong>ies such abuse is that this institutionalized abuse is <strong>an</strong>obligation for both the abuser <strong>an</strong>d the victim. For inst<strong>an</strong>ce, the mindcontrolof the Beast Barracks experience at West Point, USMA is <strong>an</strong>institutionalized abuse that allows the abuser <strong>to</strong> side step responsibilityfor sadistic behavior, <strong>an</strong>d sets the stage for the abuse <strong>to</strong> be continuedunder the disguise of tradition. Finally, there is one more category oftrauma--those <strong>to</strong> produce cosmetic looks, for inst<strong>an</strong>ce, breast impl<strong>an</strong>ts,or electro-shock <strong>to</strong> create moles at certain locations for either as a signtelling other h<strong>an</strong>dlers the extent of the programming or for a MarilynMonroe look. A “stage trick” is <strong>to</strong> use a multi-needle device <strong>to</strong> scar thetissue. <strong>The</strong> scar which is made in a pattern, a popular one is the sat<strong>an</strong>icGoat’s head of Mendes, c<strong>an</strong> be made visible by hypnotic comm<strong>an</strong>d.This allows the h<strong>an</strong>dler <strong>to</strong> look powerful <strong>to</strong> uninformed viewers. (This isfurther discussed in chapter 8.) This stage trick has been done by theoccult world for centuries.60


WHAT OCCURS WHEN THE MIND SPLITSDuring battles soldiers have been known <strong>to</strong> wall off horrible events withamnesia walls. Just like the soldier who walls off a traumatic battlescene where he sees his buddy disembowelled by a grenade, so thechild walls off trauma. However, the soldier must only endure arelatively small amount of trauma compared <strong>to</strong> the children who areprogrammed under the Monarch trauma-based mind control. A soldiermay remember his trauma, by being triggered by something thatreminds him of the trauma. Likewise, the child victim will have thingsthat trigger it <strong>to</strong>o. One way of describing the split, is <strong>to</strong> say that thechild’s mind is saying, “This isn’t happening <strong>to</strong> me, its happening <strong>to</strong>some one else” <strong>an</strong>d a split in the personality occurs. <strong>The</strong> new split willhave the characteristics of what it split from. <strong>The</strong> programmer will askthe alter being <strong>to</strong>rtured <strong>to</strong> create something in the mind when the splitis created--such as “I w<strong>an</strong>t 12 white fluffy kittens.” <strong>The</strong> programmer,demons, <strong>an</strong>d the child’s creativity work <strong>to</strong>gether with the dissociation<strong>to</strong> create alters. Those 12 white fluffy kittens will have the characteristics<strong>an</strong>d memories of what they were made from. However, they areseparated from each other by dissociation, <strong>an</strong>d they will be given theirown script <strong>an</strong>d own separate identity by the programmer. <strong>The</strong>dissociation between some alters who are co-conscious is not fullblown amnesia. After the Programmer has instructed the child whatalters he w<strong>an</strong>ts made when he <strong>to</strong>rtures the child, the Programmer willinject a truth serum <strong>to</strong> determine whether the correct alters were made<strong>an</strong>d the correct amount. <strong>The</strong> child’s creativity is being guided by<strong>to</strong>rture. <strong>The</strong> Programmer will often also call up the Hidden Observer<strong>an</strong>d ask it what has happened internally in the mind of the victim.Another better way of looking at what happens is <strong>to</strong> underst<strong>an</strong>d thatthe part of the brain that records personal memory--that is the personalhis<strong>to</strong>ry memory section, is divided up in<strong>to</strong> little pieces by amnesia wallsbuilt <strong>to</strong> protect itself from the repeated traumas. Each section is walledoff from <strong>an</strong>other section by amnesia. Each trauma has <strong>an</strong> amnesia wallbuilt around it. Each trauma memory is sectioned off. That walled offsection is a piece of memory that will be identified, <strong>an</strong>d a hypnotic cueattached by the programmers that will pull it up <strong>to</strong> the conscious mind.And further, if the programmers so desire, it c<strong>an</strong> be given a his<strong>to</strong>ry, <strong>an</strong>ame, a job, <strong>an</strong>d developed in<strong>to</strong> a full-blown personality. It’s import<strong>an</strong>t<strong>to</strong> grasp that the entire mind is not sectioned off in<strong>to</strong> parts. Some areasof the mind, such as the area that holds skills & talents, is available <strong>to</strong> allthe alters who w<strong>an</strong>t <strong>to</strong> access that talent. <strong>The</strong> talent doesn’t belong <strong>to</strong>that alter but <strong>to</strong> the System. Au<strong>to</strong>biographical memory is remembereddifferently th<strong>an</strong> simple facts & skills involving primitive parts of the brain.A sense of time & a sense of self are attached <strong>to</strong> au<strong>to</strong>biographicalmemories--these things are stripped of <strong>an</strong> alter as it functions within theprogramming. Memory s<strong>to</strong>rage is also linked <strong>to</strong> the brain’s state ofmind at the time. Hormones released at the time of <strong>an</strong> experience will61


modulate the strength of the memory of that experience. <strong>The</strong> limbichypothalamicsystem of the brain (which consists of the amygdala,hippocampus, cingulate gyrus, fornix, septum, certain nuclei of thethalamus, <strong>an</strong>d the Papez circuit) has a central modulating part whichinteracts with peripheral hormones. Peripheral epinephrine will bereleased if the amygdala is electrically stimulated. <strong>The</strong> adrenal medullareleases epinephrine that is vital for memory s<strong>to</strong>rage. In other words,there are hormones which help the brain remember or not. A particulartalent is not used by every alter. A non-sexual alter (<strong>an</strong> alter with <strong>an</strong>asexual identity) is not going <strong>to</strong> access talents involved in sexualforeplay. This is because memories are both occurrent states & alsodispositions, <strong>an</strong>d when a disposition is dissociated, the alter mustmaintain a different set of dispositions. A three year child alter is notgoing <strong>to</strong> access abilities <strong>to</strong> write. To do so for these alters would me<strong>an</strong>attacking the amnesia walls which hold horrible memories. <strong>The</strong>y wouldme<strong>an</strong> going against the programming with its penalties, <strong>an</strong>d their ownunderst<strong>an</strong>ding of “reality” which is the programmed s<strong>to</strong>ry line that thealter has been convinced of under penalty of losing its life. Todissociate a memory <strong>an</strong>d <strong>to</strong> take on a particular role <strong>an</strong>d identityinvolves a const<strong>an</strong>t re-interpretation of past events. It may also me<strong>an</strong>that the alter must contrive <strong>an</strong> interpretation of present events. <strong>The</strong> 3year old may, for inst<strong>an</strong>ce, see breasts but decide they belong <strong>to</strong>someone else in the system who they share the body with. This is in partdictated by the necessity of obscuring the pain of the trauma thatseparates the alter from the rest. Each day that the alter confrontsreality, they will face the threat that old memories will not agree withthe s<strong>to</strong>ry line created. For inst<strong>an</strong>ce, the h<strong>an</strong>dler’s sexual adv<strong>an</strong>cescarried out in front of that asexual (nonsexual) alter must bemisconstrued so that the illusion of not having been raped is continued.This is why normal life has a way of breaking down the multitude of lies<strong>an</strong>d programming of the deeper alters, which live in a f<strong>an</strong>tasy worldcreated during the programming. <strong>The</strong> deeper alters have never hadthe ch<strong>an</strong>ce <strong>to</strong> experience life outside of their programming, since theyhold the body only at infrequent specialized moments which aredisjointed in time. <strong>The</strong> alters created <strong>to</strong> be fronts <strong>to</strong> normally hold thebody will be given lots of programming <strong>to</strong> help them hold on<strong>to</strong> certaindenials, so that they will find it necessary <strong>to</strong> ignore or reinterpretdreaded associations linked with dissociated memories. For inst<strong>an</strong>ce, aChristi<strong>an</strong> front alter is sincerely very righteous <strong>an</strong>d holy. <strong>The</strong> thought thatthis person (technically the alter’s System of persons) could have donethe most horrible savage demonic activities is inconceivable. <strong>The</strong>memories of ritual are safely ignored, because the reality wouldundermine everything the person is. This phenomena is not just seen inmemory dissociation, but also under hypnosis when a person accepts asuggestion which flies in the face of the reality they c<strong>an</strong> see. If a personaccepts the suggestion that there is no dog in the room, they willstruggle internally <strong>to</strong> maintain that illusion. If asked <strong>to</strong> walk on a collision62


course with the dog, they will unconsciously move around it, <strong>an</strong>d ifasked why they stumbled around the dog, they will construct <strong>an</strong>artificial excuse, which is accepted even though it is tr<strong>an</strong>sparentlyimplausible. One of the Monarch Programmers Orne called this “tr<strong>an</strong>celogic. Tr<strong>an</strong>ce logic are those ploys <strong>an</strong>d strategies <strong>to</strong> maintain adissociative or hypnotic hallucination. <strong>The</strong> frontal lobes of the cerebralcortex which are called the Brodm<strong>an</strong>n areas no. 9-12 are responsiblefor a person’s own responses <strong>to</strong> circumst<strong>an</strong>ce--i.e. what some call“personality”. When the mind is split, this natural personality is noterased but rather is a collected pool upon which various responsesfrom it are attached <strong>to</strong> various personalities”. Damage <strong>to</strong> theseBrodm<strong>an</strong>n areas tends <strong>to</strong> give <strong>an</strong> overall effect of making the personpassive. <strong>The</strong> programming is not designed <strong>to</strong> damage these areas, only<strong>to</strong> control what emotions they contain are linked in memory <strong>to</strong> thevarious memory fragments that will be made in<strong>to</strong> personalities. <strong>The</strong>reticular formation is the location of the brain’s mech<strong>an</strong>ism whichdetermines the state of consciousness all the way from alert, <strong>to</strong>hypnotic tr<strong>an</strong>ce, <strong>to</strong> sleep, <strong>to</strong> coma. It interacts with the frontal lobes<strong>an</strong>d the rest of the brain. Each memory is a function of several parts ofthe brain working <strong>to</strong>gether. Memory is a function of alertness/state ofconsciousness (reticular formation), the emotions (Brodm<strong>an</strong>n Areas 9-12), the Thalami (priorities given <strong>to</strong> memories), <strong>an</strong>d severalcomplicated processes where the brain categorizes <strong>an</strong>d interfiles theinfo with other remembered data. By building in amnesia wallsbetween Event (personal his<strong>to</strong>ry) memories, <strong>an</strong>d by producing alteredstates of consciousness, the memories of a slave c<strong>an</strong> be “nested” asthe Programmers call it. “Nested” me<strong>an</strong>s that it is hidden behindseveral “locked doors” when the mind files the memory. Sometimes theperson must go back <strong>to</strong> the altered state <strong>to</strong> recover a memory. <strong>The</strong>electro-shock also scrambles the brain’s filing of a memory, so that it isfiled in bits <strong>an</strong>d pieces. Because of the use of electro-shock, ifmemories do start surfacing they surface in pieces. Sometimes acomplete memory will be held by thous<strong>an</strong>ds of parts who the mindmust bring <strong>to</strong>gether <strong>to</strong> recover the full memory. It has been discoveredthat memory retrieval is best when the environment is identical <strong>to</strong> whenthe memory <strong>to</strong>ok place. If we memorize numbers underwater, we willrecall them better underwater. Another thing discovered about traumamemories is that they are s<strong>to</strong>red in the sensory mo<strong>to</strong>r processes, ratherth<strong>an</strong> just in the normal memory sites of the brain. <strong>The</strong>se memories arecalled body memories, <strong>an</strong>d they do not lie. <strong>The</strong> False MemorySpindrome is way off base on their attacks, but then all of us who knowthe real s<strong>to</strong>ry realize that they are just a coverup damage controlscheme of the CIA.63


THE CORELet’s return <strong>to</strong> describing the “core” or that part of the brain which isintact at the beginning. If we pause <strong>to</strong> consider that a non-multipleperson will experience struggles in their mind when simult<strong>an</strong>eous,overlapping but conflicting desires meet in conflict--i.e. “should I lay inbed, go <strong>to</strong> work, or go fishing <strong>to</strong>day?” A particular part of the brain (aSynthesizing Self) is capable of ordering such a conflict--it tr<strong>an</strong>scends allthese conflicting ego states. A single Synthesizing Self in the brain islikewise responsible for the de-synthesizing of the ego states. <strong>The</strong> victimin order <strong>to</strong> appease the programmers sets up different <strong>an</strong>d oppositealters relative <strong>to</strong> a single System’s needs. <strong>The</strong> formation of alters issystematically <strong>an</strong>d intelligently guided by the programmers, especiallyin the early stages. <strong>The</strong> alters are created <strong>to</strong> meet the needs of theSystem that the programmers impose upon it, <strong>an</strong>d not <strong>to</strong> adapt <strong>to</strong> <strong>an</strong>abusive parent. Some therapists have failed <strong>to</strong> see that alter formationis not natural, but a maladaptive practice that is guided by the victim’sdesire <strong>to</strong> please, <strong>an</strong>d its fear of the programmers. <strong>The</strong> pool of abilitieswill be shared in different combinations among the various alters. Analter may have <strong>an</strong> unique ability that consists of subsidiary traits whichmay not be unique but are shared by other alters. As a child developsif certain areas of the brain are stimulated, then those areas grow. Ifthey are not stimulated, then the brain will not grow brain cells in thearea. In other words, experience shapes the way parts of our brainsdevelop. <strong>The</strong> way brain cells grow--that is how they make theirconnections is believed by researchers <strong>to</strong> be the actual place thatmemory is held. <strong>The</strong> growth in connections in their me<strong>an</strong>ingful wayscreates me<strong>an</strong>ingful patterns that make up memory. When memorys<strong>to</strong>rage occurs, ch<strong>an</strong>ges in terminals of axons ending on the dendritesoccurs. Dendrite spines (which look like trees) develop. One tree(dendrite spine) might look like <strong>an</strong> oak in winter -- <strong>an</strong>other might looklike a mass of seaweed. For various reasons, as the brain of a multiplegrows--it physically grows different th<strong>an</strong> a normal person’s brain. <strong>The</strong>brain c<strong>an</strong> get around what has been done <strong>to</strong> it in some ways, but itneeds <strong>to</strong> be borne in mind that we are not dealing with just badmemories--but brains which have had their physical makeup &functioning altered. It is interesting <strong>to</strong> see how each different alter hasa different EEG profile. One of the primary brain areas affected by the<strong>to</strong>rture <strong>an</strong>d programming are the areas which s<strong>to</strong>re event (personalhis<strong>to</strong>ry) memory. <strong>The</strong>se areas are the hippocampus <strong>an</strong>d the cortex ofthe frontal brain lobes which work with the two thalamus. Generalknowledge is s<strong>to</strong>red in the neocortex (the grey area of the brain or theouter thin layer. <strong>The</strong> brain has practically no limit <strong>to</strong> memory. However,it will select what it w<strong>an</strong>ts <strong>to</strong> remember, <strong>an</strong>d it will decide how it will filewhat it remembers. Hypnotic suggestions <strong>to</strong> “forget” something oftensimply me<strong>an</strong>s the person remembers the event--but labels the file“forgotten”. Slaves are always under hypnotic suggestions <strong>to</strong> forget64


what they have experienced--however, usually the brain in actualityonly appears <strong>to</strong> comply <strong>an</strong>d then secretly records the event. Hypnosiswill be dealt with in chap. 4.How PROGRAMMING is ANCHORED.All the programming of each & every slave is <strong>an</strong>chored upon sometype of trauma. One of the first fundamental traumas will be watched,filmed, coded & used as <strong>an</strong> <strong>an</strong>chor. For inst<strong>an</strong>ce, the most brutal rapeof a girl by her father will be used as <strong>an</strong> <strong>an</strong>chor upon which <strong>to</strong> build theBeta programming. In chap. 1 it was discussed how the primarysevering of the core was incest. Extreme psychosis is created within achild trying <strong>to</strong> deal with the issues created by the incest from the child’smost import<strong>an</strong>t figure--their father figure. In Moriah’s slaves, this is thest<strong>an</strong>dard method <strong>to</strong> sever the core, & create <strong>an</strong> <strong>an</strong>choring trauma.When Mayer Amschel Rothschild (orig. named Bauer) was on hisdeathbed, he dem<strong>an</strong>ded from his sons, that they protect the power ofthe House of Rothschild through incest. Electroshock c<strong>an</strong> cause pain,but this is nothing compared <strong>to</strong> the confusion in the mind caused byincest issues. Entire worlds of loyal alters whose only function is loyalty <strong>to</strong>the biological incestual father are created in the slave. This world ofloyal alters may be the Daisy world. <strong>The</strong> hardest bonding <strong>to</strong> breakwithin <strong>Illuminati</strong> slaves is this bond <strong>to</strong> their incestual father. Non-<strong>Illuminati</strong>mind-controlled slaves are bonded <strong>to</strong> other people--the cult leader orprogrammer. Whatever fundamental trauma is decided upon, all therest of the programming will be built upon that <strong>an</strong>chor in the victim’smind. (See chapts. 7 <strong>to</strong> 9 for further information on how theprogramming is layered in.) This fundamental trauma is not the bot<strong>to</strong>mBEAST computer which sets at the bot<strong>to</strong>m of the subconscious mind.Internal computers are complex. This is simply <strong>an</strong> <strong>an</strong>choring memorythat the programmers begin with. In large systems, the programmerswill choose <strong>an</strong> experience that all of the alters are familiar with. Whenlarge programmed alter systems come in for a major rehaul, theProgrammers will call up section by section with the correct codewords until they are all at the front of the mind. When this is done,thous<strong>an</strong>ds of alters are pulled up co-conscious & worked on all<strong>to</strong>gether. When this occurs it is <strong>an</strong> exceptionally big surprise for mostalters who have lived their entire existence in dissociated isolation fromother alters in their system. Why would the programmers do this? Forseveral reasons, speed <strong>an</strong>d the desire <strong>to</strong> have common <strong>an</strong>choringexperiences, & common programming imagery.65


HOW the OLFACTORY NERVES are TRAUMATIZEDBlood <strong>an</strong>d perfume have been linked <strong>to</strong>gether in magic for thous<strong>an</strong>dsof years. <strong>The</strong> magical writing are full of the different concoctionscreated for ritual smells. Some of these over the centuries were smellswhich were discovered caused people <strong>to</strong> go in<strong>to</strong> tr<strong>an</strong>ce or dissociate.A common wretched smell at Sat<strong>an</strong>ic/<strong>Illuminati</strong> rituals is the smell ofhum<strong>an</strong> flesh, as flesh is heated <strong>to</strong> make c<strong>an</strong>dles in wooden ritual cups.It is reported that the stench of hum<strong>an</strong> flesh burning c<strong>an</strong> causedissociation. <strong>The</strong> power of scents was noticed in <strong>an</strong>cient China by Li Po.<strong>The</strong> alchemists studied scents very carefully. <strong>The</strong> case at Loudon, Fr.(written about inChapt. 10, pp. 295-296), had nuns going in<strong>to</strong> differentdissociative states at the smell of different flowers. Cinnamon is awidespread scent used in programming deeper parts in a system. <strong>The</strong>smell of faeces & urine is a trauma <strong>to</strong> a small caged child. Interestingly,urine also contains An-alpha which is the scent element which triggersthe hum<strong>an</strong> mind sexually. Moriah knows how <strong>to</strong> use the various scents,incenses etc. Astral magic uses various perfumes.WHEN MOONCHILD TRAUMAS MISCARRYAc cording <strong>to</strong> someone who has helped with the programming <strong>an</strong>dMoon Child ceremonies, occasionally the child while in the wombwhen traumatized by the Moon Child rituals, retreats in<strong>to</strong> its mind like acocoon, <strong>an</strong>d develops autism. Autism is <strong>an</strong> emotional problem wherethe child withdrawals from reality <strong>an</strong>d goes in<strong>to</strong> its own private world ofaltered states. <strong>The</strong> programmers for m<strong>an</strong>y years did not know whysome children developed autism from the trauma rather MPD (DID),but in some cases it seems related <strong>to</strong> high 1.0. <strong>an</strong>d genetics. <strong>The</strong>programmers are not able <strong>to</strong> reach such children, <strong>an</strong>d essentially allwere discarded in<strong>to</strong> mental hospitals or used in rituals, until about 20years ago when more <strong>an</strong>d more of them were allowed <strong>to</strong> survive inpublic. An article “Altered States”, based on the Donna William’sau<strong>to</strong>biographical book Somebody Somewhere seems <strong>to</strong> buttress thatautism c<strong>an</strong> be mind-control duds. Williams is both autistic & MPD. Herbook reveals that autistic children have acute sensory perception(intelligence) rather th<strong>an</strong> retardation. <strong>The</strong>re are different types ofautism, <strong>an</strong>d the authors do not underst<strong>an</strong>d the <strong>to</strong>pic well enough <strong>to</strong>write much more th<strong>an</strong> this. It is quite possible autism may have severalcauses, some which do not relate <strong>to</strong> the failure <strong>to</strong> become MPD (DID),but may be the result of some other cause. However, the increase inautistic children is believed by the authors <strong>to</strong> be the result of increasedtrauma-based mind control. MS (multiple sclerosis) is <strong>an</strong>other sideeffect, which c<strong>an</strong> stem from brain stem scarring.66


RITUAL TORTURE DEVICESeveral victims of <strong>Illuminati</strong> trauma, remember a special ritual <strong>to</strong>rturedevice that is put inside a person <strong>an</strong>d causes excruciating pain. It ismade from oniy one kind of wood, a special wood, possibly myrtle. Ithas a painted spider on it, between two sat<strong>an</strong>ic symbols.REVIEWIn review, the elements that make up a single whole personality--familyhis<strong>to</strong>ry, personal his<strong>to</strong>ry <strong>an</strong>d memories of abilities, talents <strong>an</strong>d one’s selfimagehave all been stripped from the child when the mind dividesitself up in<strong>to</strong> sections walled off by amnesia walls. When theprogrammers work with each memory part, they have the option <strong>to</strong>give it all the elements of whatever personality they w<strong>an</strong>t it <strong>to</strong> have.<strong>The</strong>y c<strong>an</strong> even make it in<strong>to</strong> <strong>an</strong> <strong>an</strong>imal or <strong>an</strong> in<strong>an</strong>imate object, becausethat little fragment has no ch<strong>an</strong>ce <strong>to</strong> contradict what it is beingprogrammed <strong>to</strong> believe. Although the memory part of the brain (whichprovides a person’s personality) is divided, other parts of the brainfunction intact. Much of the elements of Monarch <strong>Mind</strong> Control arebased on things that are observed in normal life--dissociation, mental &chemical dependence, denial, charisma, discipline, personality <strong>an</strong>d<strong>to</strong>rture which have been refined in<strong>to</strong> skilled methodologies forcontrolling a person <strong>an</strong>d then combined in<strong>to</strong> a GROUP PACKAGE.UNDERSTANDING THE RITUALS & TRAUMA. <strong>Illuminati</strong> rituals are basedupon the most <strong>an</strong>cient Mystery religions. <strong>The</strong> Rothschilds like the<strong>an</strong>cient C<strong>an</strong>a<strong>an</strong>ite Mystery rituals, <strong>an</strong>d use Akkadi<strong>an</strong>-Hittite-C<strong>an</strong>a<strong>an</strong>ite-Babyloni<strong>an</strong> rituals. <strong>The</strong> rituals from <strong>an</strong>cient Egypt are also heavily usedby the <strong>Illuminati</strong>. <strong>The</strong> Collins -Sinclairs-type <strong>Illuminati</strong> bloodlines <strong>an</strong>dsome of the other <strong>Illuminati</strong> families with a northern Europe<strong>an</strong>/celticbackground, are very much in<strong>to</strong> Druid rituals. Underst<strong>an</strong>d thathis<strong>to</strong>rically, the Druids gave up pag<strong>an</strong>ism for the truth of Christ, but thatnow neo-pag<strong>an</strong>ism would have people return <strong>to</strong> what the Celticleadership gave up about two thous<strong>an</strong>d years ago. <strong>The</strong> drawings67


elow were done by particip<strong>an</strong>ts in high level sat<strong>an</strong>ic ritual. <strong>The</strong> oneparticip<strong>an</strong>t drew several pictures of hearts which her coven placedin<strong>to</strong> jars. Some illustrations from the Egypti<strong>an</strong> Book of the Dead areincluded <strong>to</strong> show that the rituals of keeping hearts in a jar is straightfrom the Egypti<strong>an</strong> Book of the Dead. <strong>The</strong> heart was placed in a jar forweighing it for judgment. <strong>The</strong> twin (mirror-image) goddess Maat attimes st<strong>an</strong>ds beside the scales, <strong>an</strong>d at the same time Maat is alsoplaced on<strong>to</strong> one side of the scale. This is similar <strong>to</strong> Christ judging aperson, while also being the st<strong>an</strong>dard against which a person is judgedagainst. In the Papyrus of Qenna the head of Anubis is on the beam<strong>an</strong>d the ape, wearing disk <strong>an</strong>d crescent, is seated upon a pylonshapedpedestal beside the bal<strong>an</strong>ce. Another picture shows Horusholding Maat in his h<strong>an</strong>d, weighing the heart in the presence of theMaat goddesses, <strong>an</strong>d <strong>an</strong>ubis, who is holding the deceased by theh<strong>an</strong>d, is presenting the heart <strong>to</strong> Osirus while Isis <strong>an</strong>d Nephthys in theforms of apes sit nearby. <strong>The</strong> drawing of the ritual stick shows what onetype of stick used in Sat<strong>an</strong>ic rituals looks like.68


CHAPTER 3. SCIENCE NO. 3THE USE OF DRUGS<strong>The</strong> science of Pharmacology (drugs) has given the Programmers avast array of mind-altering <strong>an</strong>d body-altering drugs. Some of the drugsare not used <strong>to</strong> directly alter the mind, but <strong>to</strong> ch<strong>an</strong>ge the body(makethe skin burn), or make the person vomit, or some other reactionthat c<strong>an</strong> be harnessed <strong>to</strong> further their nefarious programming goals. Ifthey w<strong>an</strong>t a little girl <strong>to</strong> develop breasts they might give her hormones.Neuroscientists are now familiar with chemicals which causepersonality traits. If one w<strong>an</strong>ts <strong>to</strong> create raving par<strong>an</strong>oia, simply providethe brain with <strong>to</strong>o much dopamine in the emotional centers of thebrain <strong>an</strong>d <strong>to</strong>o little dopamine in the seat of reasoning area of the brain.Reduce sero<strong>to</strong>nin in the person <strong>an</strong>d the person will be unable <strong>to</strong>connect disagreeable consequences with what provoked them. Inother words, they c<strong>an</strong>’t protect themselves from d<strong>an</strong>ger. Thorazine wasused regularly at the CIA’s Jones<strong>to</strong>wn, Guy<strong>an</strong>a group controlexperiment. Survivors of Jones<strong>to</strong>wn have testified as <strong>to</strong> its effectiveness.After this gruesome experiment in mind control came <strong>to</strong> its end with amassacre, large amounts of drugs were discovered. Just one footlockerat Jones<strong>to</strong>wn alone contained 11,000 doses. <strong>The</strong> authorities preventedchemical au<strong>to</strong>psies of the bodies <strong>to</strong> insure secrecy of this sophisticatedconcentration camp which was used for medical <strong>an</strong>d psychiatricexperimentation by the CIA. An examination of the drugs that are usedin mental hospitals <strong>to</strong> alter the minds of patients offers a clearindication of what is being used in the Monarch <strong>Mind</strong> Controlprogramming.DRUGS USED FOR MIND CONTROL<strong>The</strong> CIA/<strong>Illuminati</strong> programming centers have more th<strong>an</strong> 600-700different drugs at their disposal. <strong>The</strong> following is a partial list of the drugsavailable for their mind-control (aka MK-Ultra Programming). <strong>The</strong>y c<strong>an</strong>make a person feel like he is in heaven, or burning in hell. <strong>The</strong> drugs areat times used with elaborate light, sound <strong>an</strong>d motion shows thatproduce whatever effect the programmer w<strong>an</strong>ts <strong>to</strong> produce. <strong>The</strong>y c<strong>an</strong>make a person believe he is shrinking, or that he is double (with mirrors),or that he is dying. Before describing how drugs are used forprogramming & control, let us list a few which we know have beenused. This list comes from CIA documents obtained from the Freedomof Information Act <strong>an</strong>d from what Multiples used as Programmers70


emember. M<strong>an</strong>y of the new synthetic drugs are known only <strong>to</strong> the<strong>Illuminati</strong>/Intelligence community.:2-GB (aka CBR, this is a strong hallucinogenic which also helpstelepathic communication)2-CT2 (produces dark, earthy visual patterns)Acetylcholine (for EEOM, EDOM, <strong>an</strong>d for blocking memory)AdrenalinAktetronAlcoholAmbienAminazinAmobarbital (hypnotic sedative)Amobarbital sodium (hypnotic sedative)Amphetamine (addictive)Amphetamine sulphateAnalasineAnectine (succinylcholine, a strong muscle relax<strong>an</strong>t that makes onefeel suffocated <strong>an</strong>d drowning. <strong>The</strong> person feels terror at thinking he isdying.)AnhalamineAnhalidineAnhalineAnhalonidineAnhalonineAnhalonium71


Aphrodisiacs (sexual m<strong>an</strong>ipulation by programmers)AphyllidineAphyllinAprobarbital (hypnotic sedative)Atropine (speeds heart rate given with l.V.) AtrosineBZ (designer drug ten times more powerful that LSD, producesamnesia)BambusaB<strong>an</strong>isterineBarad<strong>an</strong>ga (truth serum which makes people willing <strong>to</strong> follow <strong>an</strong>ycomm<strong>an</strong>d)BarbiturateBelladonna (a traditional drug of witches since the middle ages).Benzidrene (Benzedrene, stimul<strong>an</strong>t used w/ other drugs)BenzocaineBromoharmineBulbocapnine (causes a cata<strong>to</strong>nia <strong>an</strong>d stupors)Butabarbital sodium (hypnotic sedative)Butyl-bromallyl-barbituric acidCaffeineCaffeine sodiumCalcium ChlorideC<strong>an</strong>nabidiolC<strong>an</strong>nabinolC<strong>an</strong>nabis (aka Mariju<strong>an</strong>a, a sedative, ch<strong>an</strong>ge in perception, colors<strong>an</strong>d sounds more distinct, time dis<strong>to</strong>rted. This drug is not used much in72


Monarch Programming because it IMPEDES mind control. It has beenexperimented with in combination with other drugs as <strong>an</strong> interrogation<strong>to</strong>ol. <strong>The</strong> CIA listed it as being used in MK-Ultra, but it served as <strong>an</strong>experimental drug rather for programming.)C<strong>an</strong>nabolCaramineCarbolineCarbritalCaroegineChloral hydrate (a hypnotic sedative, the active sedative ingredientis the metabolite trichloroeth<strong>an</strong>ol, goes <strong>to</strong> work in about 30-60 minutes,aka Noctec)Cocaine (addictive, blackmail, the availability of cocaine may pullup certain alters who are addicted <strong>to</strong> it)CoffeeCoramineCurare (<strong>to</strong> paralyze the body)Delvinyl sodiumDemerol (a hypnotic, also given as a reward for good learning after<strong>an</strong> induced headache, is used in the Scramble programming wherethe victim must overcome its effect <strong>to</strong> concentrate on what is beingsaid)Desoxyn (used with Sodium Pen<strong>to</strong>thal for hypnotic tr<strong>an</strong>ce)Dexedrine (amphetamine)Di benzo pyr<strong>an</strong> derivativesDicainDoralDramamine (aka dimenhydrinate, s<strong>to</strong>ps motion sickness)Drobinal (for quick access)73


Ecstasy (aka XTC, Adam, MDMA, this is <strong>an</strong> illegal designer drug, butit’s used by the government & cult programmers. Empathogens, likeEcstasy, enh<strong>an</strong>ce trust between the recipient & the programmer. It’seffect lasts for several hours.)Ephedrine (s<strong>to</strong>ps hypotension)EphetamineEpinephrine (adrenaline)ErgotErgotamineEth<strong>an</strong>ol (<strong>to</strong> inebriate the victim <strong>to</strong> induce certain behavior)Ethchlorvynol (hypnotic sedative)Ethyl harmolEpic<strong>an</strong>eEscrineEstazolam (hypnotic sedative)Ethclorvynol (hypnotic sedative, effect begins 30 mm. afterdigestion, addictive, aka Placidyl)EtherEthinamate (hypnotic sedative, aka Valmid)EucaineEucodalEukotalEunacronEvipalEvip<strong>an</strong>Evip<strong>an</strong> sodium74


Flurazepam hydrochloride (hypnotic sedative)GenoscopolomineGlutethimide (hypnotic sedative, has withdrawal symp<strong>to</strong>ms, akaDoriden)Halcyn (blocks explicit memory by impairing hippocampalprocessing)Haliopareael (tr<strong>an</strong>quilizer)HarmalineHarmalolHarm<strong>an</strong>HarmineHarmine methiodideHarmolHeroinHexacolHistadylHistamine (causes ch<strong>an</strong>ges in the skin)Hydractine (or Hydrastine)Hypoloid soluble hexabarbi<strong>to</strong>neIcoralIndoleIndole methyllarmineInsulin (shock for amnesia)Ipecac (<strong>to</strong> induce vomiting for eating disorder programming)Largatil (a powerful tr<strong>an</strong>quilizer)75


Lophop-nineLorazepam (sleep induction, may destroy memory of previous day)LSD-25 (<strong>Used</strong> <strong>to</strong> program alters <strong>to</strong> cut their veins; they w<strong>an</strong>t <strong>to</strong> endtheir nightmare by cutting what seem like white rivers w/ black threadsor other scary delusions. C<strong>an</strong> cause psychosis & other effects. It’s usedin small amounts for interrogations. Its active ingredient is psilocybinwhich c<strong>an</strong> create <strong>an</strong>xiety & a fear of death.)Lyscorbic acidMDA (this is a cross between mescaline <strong>an</strong>d amphetamine speed)MDMA (also known as Adam, this is Ecstasy, see under Ecstasy formore information)MDE (aka Eve, puts someone in<strong>to</strong> a strictly intellectual head trip)M<strong>an</strong>g<strong>an</strong>ese chlorideMellaril (mood ch<strong>an</strong>ger)Methaqualone (hypnotic sedative)Methotrimeprazine hydrochloride (hypnotic sedative)Methy-cocaineMethy-prylon (aka Noludar, helpful for hypnosis, side effects are ah<strong>an</strong>gover & skin rashes.)Metra-olMidazolam hydrochloride (hypnovel, versed, hypnotic sedativewhich c<strong>an</strong> cause amnesia)MorphineMorphine hydrochlorideNarco-imalNembutalNiacin (helpful <strong>to</strong> s<strong>to</strong>p <strong>an</strong> LSD trip)Nicotine76


Nicotinic acid (s<strong>to</strong>ps LSD drug effect)NikthemineNitrous oxideNovacaineNupercaineP<strong>an</strong><strong>to</strong>caineP<strong>an</strong><strong>to</strong>poneParahyxParaldehyde (hypnotic sedative, produces sleep in 15 mm., has astrong odor & disagreeable taste)PellotinePen<strong>to</strong>barbital (hypnotic sedative)Pen<strong>to</strong>barbital sodium (hypnotic sedative, if mixed with dextroamphetamine sulfate it will half the stage 1 dream time when REMsleep ocurs)Pen<strong>to</strong>thal acid (helpful for hypnosis)Pen<strong>to</strong>thal sodiumPercainePernos<strong>to</strong>nPeyotl (interrogation, hallucinations)PheactinPhenaminePhenolic acid (injected in<strong>to</strong> expendable children’s hearts <strong>to</strong> killthem)Pehyl-thio-ureth<strong>an</strong>esPicrate77


Picro<strong>to</strong>xinProcainePropr<strong>an</strong>olol (calms the mind so it c<strong>an</strong> function better)Pulegone-orcinolPulegone-olive<strong>to</strong>lPyrahexylPyramidonQuazepam (hypnotic sedative)QuinineReserpineSalsolineScapalomine S. (good amnesia drug)Scopolomine (truth serum that makes people willing <strong>to</strong> do whateverthey are <strong>to</strong>ld)Scopolomine aminoxide hydrobromideScopolomine-phetamine-eukotalSecobarbital sodium (hypnotic sedative)Sodium Amytal (hypnotic sedative that reduces REM sleep time)Sodium barbitalSodium dielvinalSodium evipalSodium pen<strong>to</strong>barbital (nembutal)Sodium Pen<strong>to</strong>thal (truth serum for interrogation, c<strong>an</strong> be used withhypnosis, c<strong>an</strong> be used with Desoxyn, given in <strong>an</strong> IV)Sodium phenobarbital78


Sodium rhod<strong>an</strong>ateSodium sonerylSodium succinateSodium thioethamylSomnifenS<strong>to</strong>vaineStrychnineStyphnic acidSulfazinSympa<strong>to</strong>lSynhexylTelepathineTetra-hydro-c<strong>an</strong>nabinol acetateTetra-hydro-harm<strong>an</strong>Tetra-hydro-harmineTropacocaineTropenoneTemazepam (hypnotic sedative)Thallium (confuses thinking)Thorazine (helps bring one out of <strong>an</strong> LSD trip)Tr<strong>an</strong>quility (a designer drug for programming that makes the victimcompli<strong>an</strong>t, like Barad<strong>an</strong>ga)Triazolam (hypnotic sedative, somewhat rapid)YageineYohimbine sulphate79


Zolpidem tartrate (hypnotic sedative)HERBSWhen the victim’s body is saturated with all the drugs they c<strong>an</strong>assimilate, they will receive herbs, which often have a drug effect.Ayahuasca (a vine of Brazil whose alkaloids such as Telapatin aresaid <strong>to</strong> produce a telepathic state where the recipient c<strong>an</strong> seethrough people like glass <strong>an</strong>d read their minds.)Bayberry (hemorrhaging)Calamas (part of a cerebral <strong>to</strong>nic)Cayenne Pepper (stimul<strong>an</strong>t)Charcoal (absorbent cle<strong>an</strong>ser)Caladium sequinum (injected in<strong>to</strong> body parts <strong>to</strong> cause excruciatingpain)Clove Oil (placed in nose for relief from the pain of dental <strong>to</strong>rtures)Hemlock (a poison, used more <strong>to</strong> kill th<strong>an</strong> for programming)Hops (sleep aid aka Beerflower)Lady’s Slipper (relax<strong>an</strong>t)Kava Kava (sedative)Mistle<strong>to</strong>e (for dizziness, <strong>an</strong>d lower blood pressure)Narcissus (<strong>an</strong>aphrodisiac for males)Opium (ench<strong>an</strong>ting trip)Potions (made from roots, powders, dried blood <strong>an</strong>d <strong>an</strong>imal partsare given.)Rosemary (mild heart <strong>to</strong>nic)Saffron (sedative)Sage (part of a cerebral <strong>to</strong>nic)80


S<strong>an</strong>dlewood & henb<strong>an</strong>e (when burned the fumes causeconvulsions & temp. ins<strong>an</strong>ity)Skullcap (relax<strong>an</strong>t)Sunflower Seed Oil (this may be used <strong>to</strong> help with brain stemscarring)Valarium Root (works just like Valarium, also helps cramps)Witch Hazel (hemorrhaging)Yerba Mate (part of a cerebral <strong>to</strong>nic)A BRIEF HISTORY OF THE USEReligious groups, sham<strong>an</strong>s, medicine men, witches <strong>an</strong>d cults havebeen using mind altering drugs throughout his<strong>to</strong>ry. <strong>The</strong> medievalwitches used potions of hemlock <strong>an</strong>d aconite for their flying ointments.<strong>The</strong>se are herbs (natural drugs) which will create delirium.Contemporary witnesses reported that covens during the medievalages would apply the potion of hemlock <strong>an</strong>d aconite <strong>to</strong> cause theirnew witch <strong>to</strong> go delirious, <strong>an</strong>d then would tr<strong>an</strong>sport the person <strong>to</strong> theSabbat, where they would be <strong>to</strong>ld they flew there. <strong>The</strong> Haiti<strong>an</strong> sat<strong>an</strong>icVodoun cult, which has been m<strong>an</strong>ipulated by the CIA/<strong>Illuminati</strong>, hassorcerers called bokors. <strong>The</strong> Vodoun cult in Haiti is being used fortrauma-based mind control. One of the items of the cult is <strong>to</strong> take thepl<strong>an</strong>t Datura stramonium <strong>an</strong>d add this pl<strong>an</strong>t with other things. <strong>The</strong> pl<strong>an</strong>tis the active ingredient of a potent psychoactive drug, the “zombicucumber” which produces amnesia <strong>an</strong>d a pseudo-death of thevictim. <strong>The</strong> brain doesn’t die, but the mind is shut off. <strong>The</strong> victim isbrought back <strong>to</strong> life as a zombie--a slave of the bokor. <strong>The</strong> powder <strong>to</strong>create a zombi is called zombific<strong>an</strong>t in French-creole. <strong>The</strong> ceremonies<strong>to</strong> kill <strong>an</strong>d resurrect the zombie are full of magic <strong>an</strong>d demonology also.Magic, drugs <strong>an</strong>d demonology have always gone h<strong>an</strong>d in h<strong>an</strong>d. Drugsremove the part of the will that prevents demonic possession. Drugs areconsidered powerful demonizing subst<strong>an</strong>ces by the those skilled inDemonology. If demonic possession is seen as part of mind-control,then cocaine, hashish, crack, <strong>an</strong>d some of the other drugs are part ofthe effort <strong>to</strong> enslave people. (<strong>The</strong> power of magic <strong>to</strong> kill, just as thepower of faith c<strong>an</strong> heal, will be discussed in chapter 10.) In Basu<strong>to</strong>l<strong>an</strong>din Drakersbergs, the Zulu witchdoc<strong>to</strong>rs use drugs <strong>an</strong>d trauma <strong>to</strong> create<strong>to</strong>koloshes (mind-controlled zombie slaves). It is said that in recentyears, they are using less children <strong>an</strong>d more baboons <strong>an</strong>d monkeys <strong>to</strong>81


get <strong>to</strong>koloshes. <strong>The</strong> point is that drugs have been <strong>an</strong>d continue <strong>to</strong> beused by the occult world for controlling people.<strong>The</strong> intelligence agencies working through the U.S. governmentfin<strong>an</strong>ced drug research. An example is that Dr. Beecher of HarvardUniversity was given via the U.S. Army Surgeon General’s Office$150,000 <strong>to</strong> investigate “the development <strong>an</strong>d application of drugswhich will aid in the establishment of psychological control.” Researchin<strong>to</strong> drugs for mind-control beg<strong>an</strong> in 1947 at Bethesada Naval Hospitalin Maryl<strong>an</strong>d. A CIA report described this research as <strong>to</strong> “isolate <strong>an</strong>dsynthesize pure drugs for use in effecting psychological entry <strong>an</strong>dcontrol of the individual.” At the California Medical Facility at Vacaville,Dr. Arthur Nugent, conducted research in<strong>to</strong> drugs for mind controlunder the auspices of the CIA. <strong>The</strong> Bureau of Narcotics worked with theCIA <strong>to</strong> establish “safe houses” where drugs which were seized weregiven <strong>to</strong> victims. Some other hospitals which beg<strong>an</strong> working with theintelligence agencies with dispensing drugs for mind control includeMount Sinai Hospital, Bos<strong>to</strong>n Psychopathic Hospital, University of Illinois,University of Michig<strong>an</strong>, University of Minnesota, Valley Forge GeneralHospital, Detroit Psychopathic Clinic, Mayo Clinic, the National Instituteof Health, <strong>an</strong>d Letterm<strong>an</strong> Hospital in the Presideo, CA. <strong>The</strong> military diddrug research/programming at the Army Chemical School in Ft.McClell<strong>an</strong>, AL <strong>an</strong>d at the Edgewood Chemical Center. In 1958, Dr.Louis Gottschalk, working for the CIA suggested that addictive drugsbe used <strong>to</strong> control people. Some GIs who became addicted <strong>to</strong> painkilling drugs were subsequently blackmailed by withholding thepainkillers until they complied with the dem<strong>an</strong>ds asked of them.Cocaine has been frequently given <strong>to</strong> Monarch slaves <strong>to</strong> get themaddicted <strong>an</strong>d give their h<strong>an</strong>dlers more control over them. <strong>The</strong>re isspray cocaine, <strong>an</strong>d powdered cocaine, etc. Because the Monarchslaves are used <strong>to</strong> haul drugs <strong>an</strong>d <strong>to</strong> launder the drug money, they areright in the middle of large supplies of drugs. If you hear the expression“<strong>The</strong> snow is falling” it is the Network’s lingo for cocaine. Cocaine isreported <strong>to</strong> give people a feeling of power <strong>an</strong>d <strong>to</strong> act as <strong>an</strong>aphrodisiac.APPLICATIONS FOR DRUGS IN PROGRAMMINGDrugs are used during programming. Although drugs used <strong>to</strong> assistprogramming me<strong>an</strong> nothing <strong>to</strong> the common person, they each have aspecific purpose within a certain type of programming. Some specificuses for drugs during programming include:Putting people in<strong>to</strong> tr<strong>an</strong>ce82


Eaching alters <strong>to</strong> go deeper in<strong>to</strong> tr<strong>an</strong>ce <strong>to</strong> escape drug effectsEnh<strong>an</strong>cing the traumaEroducing out of body experiences e. creating painCreating blood vessels that hurt, a pulsating pain, that runs throughthe bodyControlling histamine productionHelping create illusions such as no h<strong>an</strong>ds, no feet, no face, no headetc.Teaching alters <strong>to</strong> stay in positionTo assist other programming modalities, such as high tech harmonicmachines, which impl<strong>an</strong>t thoughts. (<strong>The</strong> machines are used inconjunction with designer drugs.)Hormones, for inst<strong>an</strong>ce GnRH, which regulates the physiology of thesexual growth, <strong>an</strong>d is given <strong>to</strong> speed up sexual growth. Other bodydevelopments may also be m<strong>an</strong>ipulated.To enh<strong>an</strong>ce or reduce memoryTo build the image of the programmer’s powerAt this point, it is appropriate <strong>to</strong> point out that the personalities of amultiple do not respond uniformly <strong>to</strong> the same dose of the same drug.Underst<strong>an</strong>ding how a drug will effect particular alters is a science initself. If <strong>an</strong> alter is holding the body, it will receive more of the effect ofa drug. Let’s say Paraldehyde is given <strong>to</strong> a multiple. A possible reactionwould be that some alters will feel no effect, some will be sedated <strong>to</strong> adrunken stupor, <strong>an</strong>d child alters may be unconscious or hyperactive.Chloral hydrate might put some alters <strong>to</strong> sleep while others remainwide awake. Sometimes the personality holding the body may fight theinfluence of a drug <strong>to</strong> keep the body. Prochlorperazine is sometimesgiven by therapists <strong>to</strong> help alters cope with nausea <strong>an</strong>d vomiting. Mostalters will be programmed not <strong>to</strong> accept drugs except from theirmaster. Lithium suppresses alter switching in some systems. An alter <strong>to</strong>“protect” the system from the therapist’s helpful medications maydevelop “allergic” responses. Alcohol is a drug. <strong>The</strong> reaction of <strong>an</strong> alterSystem <strong>to</strong> it will again be varied. Child alters may becomeunconscious, while the adult alters don’t even become inebriated bylarge qu<strong>an</strong>tities of hard liquor. Within males, d<strong>an</strong>gerous violent83


personalities may take the body. Within the medical world, often <strong>an</strong>approximate correct dosage will work. However, with theprogramming the doses must be extremely fine tuned. Some of thebest skilled medical doc<strong>to</strong>rs <strong>an</strong>d assist<strong>an</strong>ts help with the programming.<strong>The</strong> <strong>Illuminati</strong> will initially give the small child a small dose of a drug.<strong>The</strong>y will chart its effect, give it a urinalysis <strong>to</strong> see how long it stays in thebody etc. This is just the testing stage, they are not doing <strong>an</strong>yprogramming. A number of drugs will be tested, but only one at a time.<strong>The</strong>y clear a child’s body of a drug before they give it <strong>an</strong>other one.<strong>The</strong>y prefer not <strong>to</strong> mix meds. <strong>The</strong>y will start small <strong>to</strong> insure they don’<strong>to</strong>verdose <strong>an</strong>d then increase the dosage until they notice the correctbehavior pattern. This will be charted in detail on the slave’s chart.Each child’s body chemistry is different, so the suggested dosages areonly ball park figures which are not precise enough. If <strong>to</strong>o much of adrug is given, the programmers c<strong>an</strong> easily turn a child in<strong>to</strong> a psychoticbasket case. One of the secrets of the <strong>Illuminati</strong>/Intelligence agenciesis that they have secret <strong>an</strong>tidotes for most medications, which, if theyhave <strong>to</strong> give them <strong>to</strong> a child, then they will. <strong>The</strong>y will use <strong>an</strong> <strong>an</strong>tidote,for inst<strong>an</strong>ce, <strong>to</strong> keep a child from going in<strong>to</strong> heart failure. <strong>The</strong>Programmers will have some helpful drugs <strong>an</strong>d herbs on s<strong>to</strong>ck <strong>to</strong>o. It isreported that Glutamic Acid (1000 mg. 3 times/day) will take care ofthe intense headaches that alters get from lots of switching. Witchhazel leaves <strong>an</strong>d comfrey root will help internal bleeding.Putting people in<strong>to</strong> tr<strong>an</strong>ceAbout 90% of the population c<strong>an</strong> be placed in<strong>to</strong> the somnambulistic(the deepest) hypnotic tr<strong>an</strong>ce possible simply by giving them hypnoticdrugs. <strong>The</strong> prior list on pages 47-50 gives over 2 dozen drugs that c<strong>an</strong>be used <strong>to</strong> assist taking someone in hypnotic tr<strong>an</strong>ce. Special drugshave been designed which will place someone in<strong>to</strong> a deep tr<strong>an</strong>cevery quickly. If <strong>an</strong> alter is not being cooperative when they areaccessed, they c<strong>an</strong> be locked in place mentally <strong>an</strong>d given a quickshot of a fast-acting hypnotic-inducing drug. One drug which waspopular for programming was demerol, which would be administeredintravenously (<strong>an</strong> IV). It takes about 5-7 minutes <strong>to</strong> take full effect afteradministration via <strong>an</strong> I.V. <strong>The</strong> dosage c<strong>an</strong> be administered so that theeffect remains until the programming session is over. It may beadministered about every half hour if appropriate. Children will receive1 <strong>to</strong> 2.2 mg/kg dose. Another drug, a truth serum, also consistentlyworks on people making them <strong>to</strong>tally compli<strong>an</strong>t <strong>to</strong> <strong>an</strong>y directive. UnderBarad<strong>an</strong>ga people will give their b<strong>an</strong>k account numbers <strong>an</strong>d <strong>an</strong>ythingelse a person might w<strong>an</strong>t. <strong>The</strong>se type of drugs are almost sufficient inthemselves <strong>to</strong> get compli<strong>an</strong>ce out of a person. If one realizes thatthese drugs are used in conjunction <strong>to</strong> <strong>to</strong>rture, elaborate systems of lies84


<strong>an</strong>d deception, trauma-bonds, <strong>an</strong>d all the rest of the sciences of mindcontrolused in the programming, it is easy <strong>to</strong> see how they areproducing <strong>to</strong>tally compli<strong>an</strong>t hum<strong>an</strong> robots.Teaching alters <strong>to</strong> go deeper in<strong>to</strong> tr<strong>an</strong>ce <strong>to</strong> escape drug effects <strong>an</strong>dpainMuch of the training in this area is based upon the child’s horror <strong>an</strong>dfear <strong>to</strong>ward the all powerful master programmer. When theprogrammer w<strong>an</strong>ts the child’s alters <strong>to</strong> learn <strong>to</strong> tr<strong>an</strong>ce deeper, he willgive a drug that the alter doesn’t like. <strong>The</strong> child’s alter will then be <strong>to</strong>ld<strong>to</strong> go deeper in<strong>to</strong> the mind if they w<strong>an</strong>t <strong>to</strong> escape the effect of thedrug. This enforces the dissociative state being trained for the alter. <strong>The</strong>suggestion or s<strong>to</strong>ry line that is given <strong>to</strong> the alter is frequently the pictureof a train. <strong>The</strong> child is <strong>to</strong>ld that the conduc<strong>to</strong>r is at the front of the train,but he must move <strong>to</strong> the back of the train through the train cars. <strong>The</strong>child is taught <strong>to</strong> count cars when they go by as if they were steps inthe mind. This is training the child <strong>to</strong> descend in<strong>to</strong> deeper levels of thesubconscious. <strong>The</strong> train illustration has been used by programmerswhen they w<strong>an</strong>t the child <strong>to</strong> remember the drug experience. <strong>The</strong>programmer w<strong>an</strong>ts this experience remembered--at least for a whilebecause it helps increase the child’s fear. If the programmer w<strong>an</strong>ts thechild <strong>to</strong> forget the drug experience while learning tr<strong>an</strong>ce depths, thenthe imagery of a pl<strong>an</strong>e taking off <strong>an</strong>d disappearing in the cloudsworks.Enh<strong>an</strong>cing the traumaDrugs will be used <strong>to</strong> enh<strong>an</strong>ce the spinning effect when the mind isbeing programmed <strong>to</strong> have vortexes <strong>an</strong>d <strong>to</strong> set up traps within theslave’s mind. One particular drug enh<strong>an</strong>ces the trauma by 100 times.Drugs c<strong>an</strong> be useful for inst<strong>an</strong>ce, <strong>to</strong> enh<strong>an</strong>ce a child’s terror of theexperience of this child being placed in a small box in the fetal positionfor 24 hours. This helps shorten the programming time, <strong>an</strong>d it also makethe programming more intense. <strong>The</strong> programmers know what <strong>an</strong>tidotes<strong>to</strong> give <strong>to</strong> pull the child out of the enh<strong>an</strong>cement. Mariju<strong>an</strong>a enh<strong>an</strong>cesperception of color <strong>an</strong>d noise, but it is not used <strong>to</strong> enh<strong>an</strong>ce trauma.<strong>The</strong> mind does not program well under mariju<strong>an</strong>a. That is why there hasbeen such a big campaign <strong>to</strong> keep it illegal, even though m<strong>an</strong>y studiesshow it <strong>to</strong> be safer th<strong>an</strong> alcohol.Producing out of body experiences85


Various hallucinogenic drugs, LSD included, will produce <strong>an</strong> out ofbody experience for the victim, if the drugs are administered correctly.<strong>The</strong> Programmer will prepare the victim with various information <strong>an</strong>ds<strong>to</strong>ry lines during the administration of the drug. Monarch slaves arebeing deprogrammed, they may have a memory where their skin feelsinflamed <strong>an</strong>d itchy, like a bad mosqui<strong>to</strong> bite. <strong>The</strong> experience may alsohave the sensation of floating in <strong>an</strong> unreal world. This may well be <strong>an</strong>LSD trip given the slave during experimentation <strong>an</strong>d programming. <strong>The</strong>CIA was using LSD beginning in the very early part of the 1950s. Severalvictims report that some type of potion causes a person <strong>to</strong> dream whilethey are awake. PCP which is “<strong>an</strong>gel dust” is one way <strong>to</strong> disconnectthe cortex from the limbic system <strong>an</strong>d go in<strong>to</strong> <strong>an</strong> altered state.Creating painThis is done with a long list of drugs. Drops of salt water <strong>an</strong>d pepperwater are applied <strong>to</strong> the eyes of victims <strong>to</strong> make their eyes sting.Another pain in the eye takes place when lights are flashed signalling,“I love you, I love you not.” <strong>The</strong> child is pulled two ways by thismessage. Dr. Green (Mengele) enjoyed pulling daisy petals whilesaying these words. If the last petal was “I love you not.” the childwould be put <strong>to</strong> death. Surviving children were left traumatized.Creating blood vessels that hurtBlood pressure is raised by drugs <strong>an</strong>d then certain drugs are addedwhich make the veins burn. <strong>The</strong> alter is taught <strong>to</strong> cut the burning veins.This is programming which is laid in <strong>to</strong> control the slave from strayingfrom the script he or she is given. If they stray, then a cutting program isactivated which was laid in via a combination of drugs in the methodjust stated.Controlling histamine production<strong>The</strong> control of histamine production is <strong>an</strong> import<strong>an</strong>t secret ingredient <strong>to</strong>the Monarch <strong>Mind</strong> Control. <strong>The</strong> breast impl<strong>an</strong>ts placed in<strong>to</strong> womenhelp stimulate histamine production, which is used in conjunction withdrug-assisted programming (See Chapter 8.)86


Helping create illusions such as no h<strong>an</strong>ds, no feet, no face, no headetcA programmer working with a hallucinogenic drug c<strong>an</strong> make <strong>an</strong> alterbelieve that it has lost a particular body part. Because most of thesealters have little memory or no memory <strong>an</strong>d little frame of reference,what they are <strong>to</strong>ld while under the influence of drugs seems very real<strong>to</strong> them.Teaching alters <strong>to</strong> stay in positionSome alters don’t like <strong>to</strong> stay in position. But through the use of drugs,<strong>an</strong>d the side effect of drugs, they soon learn the import<strong>an</strong>ce of stayingin position. If they are disobedient, the memory of the bad side effectsfrom not staying in position in the mind c<strong>an</strong> be pulled up by a code<strong>an</strong>d the alter c<strong>an</strong> relive the pain from having disobediently movedfrom position. This is very effective in teaching alters <strong>to</strong> stay in their littleposition that is assigned them in the mind.To assist other programming modalities, such as high tech harmonicmachines, which impl<strong>an</strong>t thoughts. (<strong>The</strong> machines are used inconjunction with designer drugs.) An example of how drugs c<strong>an</strong> beimport<strong>an</strong>t is as follows. <strong>The</strong> neurons in the hippocampus which is part ofthe memory process use acetylcholine. Drugs that block acetylcholineinterfere with memory. <strong>The</strong> neurons <strong>an</strong>d the chemical neuraltr<strong>an</strong>smitters are unders<strong>to</strong>od much better <strong>to</strong>day. Where <strong>an</strong>d how athought is created in the brain is unders<strong>to</strong>od by the programmers indetail. No one is in a position <strong>to</strong> physically prevent the <strong>Illuminati</strong> <strong>an</strong>dothers from taking their children <strong>an</strong>d others <strong>to</strong> labs where chemicals<strong>an</strong>d harmonics c<strong>an</strong> be used in sophisticated computer guided ways <strong>to</strong>impl<strong>an</strong>t thoughts in<strong>to</strong> the children’s minds. As the child’s brain isshaped according <strong>to</strong> its environment, the level of everyday brainchemicals <strong>an</strong>d the shape of the various areas of the brain c<strong>an</strong> bedetermined by the programmers. This is why a recent article on Prozac(Newsweek, Feb. 7, 1994) uses a quote from Alice In Wonderl<strong>an</strong>d for itstitle, “One pill makes you larger, <strong>an</strong>d one pill makes you small”. Thisarticle (on page 38) quotes brain researcher Restak, “For the first time,we will be in a position <strong>to</strong> design our own brain.” On the previous pagein big letters it reads, “Scientific insights in<strong>to</strong> the brain are raising theprospect of made-<strong>to</strong>-order, off-the-shelf personalities.”Another programming modality assisted by drugs is behaviormodification. Aversion therapy using a vomit-inducing drug is used on87


children. Another example of drugs helping assist programming is <strong>to</strong>give someone [SD <strong>an</strong>d then interview the child while it is hallucinating.<strong>The</strong> hallucinations are then used as programming building blocks byusing hypnotic techniques. One way <strong>to</strong> build on a LSD trip is <strong>to</strong> tell thechild if they ever do a particular thing (such as <strong>to</strong>uch programming,remember programming, <strong>an</strong>d integrate parts, etc.) the victim is <strong>to</strong> gocrazy <strong>an</strong>d hallucinate like they are presently doing. This me<strong>an</strong>s thatthey will be locked up in a crazy house for the rest of their life. Ratherth<strong>an</strong> be put in straight-jackets with other crazy people it would bebetter for the person <strong>to</strong> commit suicide. By const<strong>an</strong>tly reinforcing thismessage, some alters will adopt the script “that they are doing thebody good <strong>to</strong> kill it if <strong>an</strong>y alter personality <strong>to</strong>uches the programming,”because otherwise the body will be locked up in a crazy house.Drugs are used in programming <strong>to</strong> establish a pattern or a script. <strong>The</strong>remust be a pattern of dissociation. Parts c<strong>an</strong>’t just dissociate in<strong>to</strong>nothing, otherwise there would be nothing <strong>to</strong> build on. Drugs will play amajor role in the structuring of the alter system, which is covered inchapter 7.<strong>The</strong> child doesn’t know where the effect of the drug is coming from.<strong>The</strong> programmer will take credit for the power of the drug. Whoeveradministers the drug has power in the child’s mind. <strong>The</strong> mind w<strong>an</strong>ts <strong>to</strong>be safe. I am familiar with a recent example here in Oregon ofsomeone who escaped from being sacrificed at a Sat<strong>an</strong>ic Ritual. <strong>The</strong>legal system <strong>to</strong>ld the wom<strong>an</strong> she was crazy when she reported <strong>to</strong> thepolice that she had escaped from a Sat<strong>an</strong>ic Ritual where they weregoing <strong>to</strong> sacrifice her. To control her, the judge ordered 3 types of<strong>an</strong>tipsychotics, twice the normal dose of two kinds of lithium carbonate<strong>to</strong> put her in<strong>to</strong> a lethargic stupor, Paxil as <strong>an</strong> <strong>an</strong>tidepress<strong>an</strong>t, <strong>an</strong>dBenztropine mesylate as <strong>an</strong> <strong>an</strong>tiparkinsoni<strong>an</strong> agent. <strong>The</strong> <strong>an</strong>tipsychoticswere Thiothixene, Thioridazine hydrochloride, <strong>an</strong>d Perphenazine whichare all addictive. This wom<strong>an</strong> may or may not be a multiple. But thisclearly shows the type of mental control via drugs that could beslapped on<strong>to</strong> someone who dares report Sat<strong>an</strong>ic activity <strong>to</strong> <strong>an</strong>establishment which has been sadly corrupted from <strong>to</strong>p <strong>to</strong> bot<strong>to</strong>m.One victim of government mind control tried <strong>to</strong> get free. <strong>The</strong> firstpsychiatrist the person tried <strong>to</strong> go <strong>to</strong> was cooperating with U.S.Intelligence <strong>an</strong>d gave her Stelazine, which aggravated the victim’ssituation. When the victim spied a general’s uniform in the closet of thispsychiatrist, she got <strong>an</strong>other psychiatrist, who unfortunately turned out<strong>to</strong> be <strong>an</strong> ex-DoD employee. He placed her on Haldol Dec<strong>an</strong>oate,Klonopin, <strong>an</strong>d Benzatropine. <strong>The</strong> combined effect of these drugs is <strong>to</strong>erase memory, <strong>an</strong>d create a dissociative disorder. All of the drugs werehighly addicted. Another fleeing victim was given Trazodone by aphysici<strong>an</strong> who was cooperating with the Intelligence agencies. Thisalmost gave the victim a heart attack because it aggravated her88


heart condition. And yet <strong>an</strong>other escaping victim apparently also fellprey <strong>to</strong> dirty CIA doc<strong>to</strong>rs who were practicing in public without warningpeople of their intelligence connections. This victim was given acombination of Compazine <strong>an</strong>d X<strong>an</strong>ax, in dosages that the Physici<strong>an</strong>sDesk Reference warns against. <strong>The</strong> doc<strong>to</strong>r, who prescribed this, workedout of <strong>an</strong> office named after <strong>an</strong> MK Ultra programmer. <strong>The</strong>re are otherimport<strong>an</strong>t things <strong>to</strong> mention about when drugs are used in Monarchprogramming. Some of the cautions that the programmers are alert <strong>to</strong>include:a. watching the heart so that it doesn’t s<strong>to</strong>p. M<strong>an</strong>y of the children whohave been programmed have died from heart failure. <strong>The</strong>programmers are very careful <strong>to</strong> have heart mom<strong>to</strong>rs on the victim,<strong>an</strong>d <strong>to</strong> have paddles ready <strong>to</strong> revive the body. Because so much oftheir drugging affects the heart, they accept that they will lose a few <strong>to</strong>heart failure.b. making sure that drugs aren’t given <strong>to</strong> children who are allergic <strong>to</strong>them. <strong>The</strong> programmers take the time <strong>to</strong> insure that they have thefamily his<strong>to</strong>ries of allergies <strong>to</strong> drugs, <strong>an</strong>d they will test the children <strong>to</strong>o,before proceeding with drugs. <strong>The</strong>y not oniy learn the family &individual responses <strong>to</strong> drugs, but they c<strong>an</strong> test during programming <strong>to</strong>determine a drug’s blood level in a child. For inst<strong>an</strong>ce, pen<strong>to</strong>barbital ata blood level of 5 mcg/ml aids hypnosis, at 15 makes the victimcoma<strong>to</strong>se with reflexes, <strong>an</strong>d at 30 makes the person coma<strong>to</strong>se w/extreme difficulty in breathing. In everyday life, 30 mcg/ml would killthe child. Pen<strong>to</strong>barbital blood levels c<strong>an</strong> be tested by <strong>an</strong> enzymemultiplied immunoassay technique. For longer-acting Phenobarbitalgas chroma<strong>to</strong>graphy is used. TCA’s are tested by radioimmunoassay,high-perf. liquid chroma<strong>to</strong>graphy & thin layer chroma<strong>to</strong>graphy. Somehypnotics are tested by colorimetry, pho<strong>to</strong>metry, & spectropho<strong>to</strong>metry.c. switching <strong>to</strong> herbs when the body is saturated with drugs. When thechild’s body has had all the m<strong>an</strong>ufactured drugs it c<strong>an</strong> absorb, theprogrammers switch <strong>to</strong> a vast collection of natural herbs.d. providing the <strong>an</strong>tidote for AIDS. Monarch slaves are routinely giventhe <strong>an</strong>tidote for AIDS <strong>an</strong>d have been since the 1960s-1970s.e. knowing how much of a drug each part c<strong>an</strong> take, small young altersc<strong>an</strong>’t take as much. Multiples within a single system have varying levelsof <strong>to</strong>ler<strong>an</strong>ce <strong>to</strong>ward drugs. A small child alter may be killed by <strong>an</strong> adultdosage, even though the age of the body is that of <strong>an</strong> adult. <strong>The</strong>programmers are acutely aware of how <strong>to</strong> deal with multiplepersonalities.f. providing salt <strong>to</strong> bal<strong>an</strong>ce the electrolytes in the mind of a89


programmed multiple personality. An electrolyte imbal<strong>an</strong>ce c<strong>an</strong> causea multiple personality’s mind <strong>to</strong> go wacky <strong>an</strong>d start spinning. <strong>The</strong>Multiple could possibly go in<strong>to</strong> shock <strong>an</strong>d die. <strong>The</strong> programmers arevery experienced in underst<strong>an</strong>ding the unique requirements of amultiple personality.g. An import<strong>an</strong>t pl<strong>an</strong>t extract for watching brain wave activity is thelarge pl<strong>an</strong>t enzyme horseradish peroxidase (HRP).Perhaps it would be worthwhile <strong>to</strong> briefly mention that all the majorchemical <strong>an</strong>d drug comp<strong>an</strong>ies are run by the <strong>Illuminati</strong>. It would take abook <strong>to</strong> explain who controls what <strong>an</strong>d how they connect in, <strong>an</strong>d thisauthor could write it. Instead, we will try <strong>to</strong> give a quick over view.Rather th<strong>an</strong> cover 2 dozen large drug comp<strong>an</strong>ies, three major drugcomp<strong>an</strong>ies have been r<strong>an</strong>domly selected <strong>to</strong> show a quick view of howall the drug comp<strong>an</strong>ies are deeply involved with Monarch mindcontrolprogramming. Since the purpose of this book is <strong>to</strong> show how themind control is done--this sample of names is given only <strong>to</strong> convey <strong>to</strong>the reader that the drugs that the <strong>Illuminati</strong>/Intelligence agencies needare never in short supply. And the labs <strong>to</strong> develop designer drugs formind-control are not in short supply either.ELI LILLY CO. -- Trustee of Eli Lilly Endowment Walter William Wilson -<strong>Illuminati</strong>, married <strong>to</strong> Helen Scudder (of the wealthy powerful Scudderfamily), prominent partner of Morg<strong>an</strong>, St<strong>an</strong>ley & Co. controlled byHenry Morg<strong>an</strong> also a member of the <strong>Illuminati</strong>. Executive Vice-pres. ofEli Lilly L<strong>an</strong>drum Bolling, represented Eli Lilly at the secret <strong>an</strong>nualDartmouth conferences, overseen by the <strong>Illuminati</strong>. Chairm<strong>an</strong> of Eli LillyRichard D. Wood, dir, of the Rockefeller’s St<strong>an</strong>dard Oil, Chemical B<strong>an</strong>kof NY, <strong>an</strong>d the Amer. Enterprise Inst. for Public Policy Research. Dir. EliLilly C. William Verity, Jr., dir. Chase M<strong>an</strong>hatt<strong>an</strong> B<strong>an</strong>k <strong>an</strong>d assoc. withU.S. intelligence, <strong>an</strong>d works with Mrs. Rockefeller as a member ofUSTEC. D<strong>an</strong> Quayle <strong>an</strong>d George Bush (CIA direc<strong>to</strong>r <strong>an</strong>d Monarchh<strong>an</strong>dler) have been part of Eli Lilly m<strong>an</strong>agement <strong>to</strong>o.MANSANTO CHEMICAL COMPANY -- President Earle H. Harbison, Jr.-CIA.<strong>an</strong>d direc<strong>to</strong>r of Bethesada General Hospital where they programMonarch slaves. He is also the president of the Mental HealthAssociation.90


STERLING DRUG CO. (<strong>an</strong> I.G. Farben spinoff) -- connected <strong>to</strong> the Krupp<strong>Illuminati</strong> family. Chairm<strong>an</strong> W. Clark Wescoe, dir of the super secretTinker Foundation which is a CIA foundation. Dir. Gordon T. Wallis,<strong>Illuminati</strong>, dir, of the Fed. Reserve B<strong>an</strong>k of NY, CFR, Direc<strong>to</strong>r Martha T.Muse, CIA, pres. of the Tinker Foundation, dir. of the Order of St. John ofJerusalem (Knights of Malta), <strong>an</strong>d dir. of George<strong>to</strong>wn Center forStrategic StudiesSUMMARYAs the reader c<strong>an</strong> see, the use of drugs in the Monarch Trauma-based<strong>Mind</strong> Control is extensive <strong>an</strong>d requires skilled technici<strong>an</strong>s, nurses, <strong>an</strong>ddoc<strong>to</strong>rs. Because of the long-held control by the <strong>Illuminati</strong> families overnarcotics <strong>an</strong>d drug m<strong>an</strong>ufacture/sales, there is no difficulty for theprogrammers <strong>to</strong> get large qu<strong>an</strong>tities of secret designer drugs. <strong>The</strong> minoroccult cults have <strong>to</strong> get by with a more limited supply of mind alteringdrugs, unless they directly connect in with the bigger picture. <strong>The</strong>power of drugs <strong>to</strong> control a person’s life is not absolute--althoughsomeone who lives with a cocaine addict or alcoholic might disagree--but when coupled with all the other methods in a sophisticated systemof mind-control, drugs just further reinforce the absolute power of the<strong>Illuminati</strong> over <strong>an</strong> individual.91


CHAPTER 4. SCIENCE NO.4 -HYPNOSISUNDERSTANDING THE BASICS ABOUT HYPNOSISA. DISSOCIATION, TRANCE, AND HISTORY OF HYPNOSIS FORPROGRAMMINGDissociation is used as a defense <strong>to</strong> protect a person fromoverwhelming pain <strong>an</strong>d trauma. It is a natural ability of the brain.Hypnosis or hypnotic tr<strong>an</strong>ce is a form of dissociation. <strong>The</strong>re are <strong>an</strong>umber of types of dissociation: amnesia, somnambulistic states,localized paralyses, <strong>an</strong>aesthesias, <strong>an</strong>d hallucinations. Hypnosis c<strong>an</strong>reproduce all of these dissociative states. <strong>The</strong> mind naturally hypnotizesitself under various conditions. Perhaps the reader has been drivingalong a familiar road <strong>an</strong>d the next thing you knew you were arrivinghome, having driven in a tr<strong>an</strong>ce. Now let’s suppose you are driving <strong>to</strong> amovie <strong>an</strong>d you are discussing next week’s pl<strong>an</strong>s with your wife. <strong>The</strong>complex thinking required <strong>to</strong> drive just happens. You are awake talking<strong>to</strong> your wife, <strong>an</strong>d yet on <strong>an</strong>other level you were in tr<strong>an</strong>ce driving thecar. You as a subject were both in hypnotic tr<strong>an</strong>ce (driving) <strong>an</strong>dawake (talking about pl<strong>an</strong>s). <strong>The</strong>re are 5 levels <strong>to</strong> the subconsciousthat the mind will naturally dissociate <strong>to</strong>. <strong>The</strong> other deeper levelsrequire help <strong>to</strong> access. People naturally c<strong>an</strong> think on two levels.Because people’s minds function on multilevels <strong>an</strong>d there is a continuaon a spectrum that runs from conscious <strong>to</strong> unconscious, it is oftendifficult <strong>to</strong> pinpoint just exactly what state of mind the brain is in at acertain point, because there is no single <strong>an</strong>swer. A light tr<strong>an</strong>ce is wherea person is daydreaming about his girlfriend. A moderate tr<strong>an</strong>ce iswhere he imagines he is in bed. A deep tr<strong>an</strong>ce is where he physicallyfeels he is in bed with his girlfriend. Sleep is where one dreams of beingin bed. Behavior modification is carried out in the light <strong>to</strong> deep tr<strong>an</strong>ces.<strong>The</strong> deep tr<strong>an</strong>ce is a very creative level. Hypnosis appears <strong>to</strong> affectseveral areas of the brain--the brain stem is modified in<strong>to</strong> the hypnoticstate, <strong>an</strong>d the midbrain centers are inhibited so that other areas--themo<strong>to</strong>r, sensory <strong>an</strong>d memory areas c<strong>an</strong> be m<strong>an</strong>ipulated. Further not allhypnosis works the same way. Hypnosis c<strong>an</strong> be used on the intellectualpart of the mind, the social-spiritual part of the mind, <strong>an</strong>d the primitivereproductive part of the mind. <strong>The</strong> skilled hypnotist will decide whicharea he w<strong>an</strong>ts <strong>an</strong>d how <strong>to</strong> work with that area. Both Christi<strong>an</strong>s <strong>an</strong>d<strong>Illuminati</strong> members who are skilled in underst<strong>an</strong>ding demonology,92


elieve that there is a demonic side <strong>to</strong> hypnosis also. It should come asno shock <strong>to</strong> people that in the World Book Encyclopedia hypnosis islisted under Magic as a related article, but not under Medicine. SomeChristi<strong>an</strong>s class hypnosis as a form of divination <strong>an</strong>d ench<strong>an</strong>tment. Itcertainly c<strong>an</strong> be a form of control. In occultist W.B. Crow’s bookWitchcraft, Magic & Occultism, it lists hypnotism as <strong>an</strong> occult science.<strong>The</strong>re is open debate whether hypnotism is simply part of the brain’snatural abilities or if supernatural elements are part of the process.<strong>The</strong>re is no debate that his<strong>to</strong>rically, hypnosis for centuries has been theguarded secret of the occult world. During shock or stress, the body’slimbic-hypothalamic-pituitary-adrenal system, releases subst<strong>an</strong>ceswhich encode all the internal <strong>an</strong>d external pieces of information beingsensed in<strong>to</strong> a deep level of consciousness. <strong>The</strong>se memories oftenbecome dissociated from normal states of consciousness. In otherwords, when the mind-body returns <strong>to</strong> this state (where it was in duringshock/stress) the mind c<strong>an</strong> reaccess those memories. However, untilthe mind returns <strong>to</strong> this shocked state, it doesn’t pick up the informationit has embedded. <strong>The</strong> Monarch programmers are acutely aware ofhow the mind functions, <strong>an</strong>d how information <strong>an</strong>d memories c<strong>an</strong> betrapped in the mind. <strong>The</strong>re are different neurophysiological states. Alsothere are said <strong>to</strong> be 12 levels <strong>to</strong> the subconscious mind. <strong>The</strong>n on <strong>to</strong>p ofthis the mind has the ability <strong>to</strong> create amnesia barriers. Hypnosis is avaluable <strong>to</strong>ol <strong>to</strong> move the mind <strong>to</strong> different neurophysiological states<strong>an</strong>d <strong>to</strong> get the mind <strong>to</strong> different levels of the subconscious mind.Hypnosis c<strong>an</strong> also play a role in working around amnesia, since bothare types of dissociation. Hyperventilation helps a person induct in<strong>to</strong> ahypnotic tr<strong>an</strong>ce. Torture, depersonalization, fear <strong>an</strong>d acute <strong>an</strong>xietystimulate the body <strong>to</strong> hyperventilate. So the fear, <strong>to</strong>rture <strong>an</strong>ddepersonalization are aids for the hypnotist <strong>to</strong> help induct a person in<strong>to</strong>a hypnotic tr<strong>an</strong>ce. Hypnotic cues c<strong>an</strong> be given <strong>to</strong> cause the body <strong>to</strong>go in<strong>to</strong> various dissociative states. This could be a post-hypnoticsuggestion that causes hyperventilation <strong>an</strong>d <strong>an</strong> accomp<strong>an</strong>ying tr<strong>an</strong>cestate. Hypnotic cues that are tied <strong>to</strong> every day objects enh<strong>an</strong>ce theprogramming. Everything in life becomes a cue <strong>to</strong> reinforce theprogramming. That may seem on the surface <strong>to</strong> be <strong>an</strong> exaggeration,but it is only slightly enlarged from the truth. <strong>The</strong> programmers do in factexamine a person’s life, <strong>an</strong>d then tailor their cues <strong>to</strong> what the personwill be around. For inst<strong>an</strong>ce, the programmer may force the child <strong>to</strong>smoke <strong>an</strong>d then tell it that every time they blow out smoke they willthink about their master. <strong>The</strong> programmed alters don’t dare not <strong>to</strong>smoke on fear that they will be punished. <strong>The</strong> smoking in turn reinforcesthe power of the hypnotist/master. Much of the good that therapy c<strong>an</strong>do is in effect <strong>to</strong> de-tr<strong>an</strong>ce or dehypnotize clients. Most of the alters ofa Monarch system go their entire lives in tr<strong>an</strong>ce. Common objects in aperson’s life that c<strong>an</strong> be hypnotically given a programming me<strong>an</strong>inginclude music, <strong>to</strong>nes, colors, the sight of a book or Bible, the pyramidon the back of a dollar bill, pictures of God, silk scarfs, jewelry, lights,93


sounds, TV programs, <strong>an</strong>d countless other things. <strong>The</strong> limit <strong>to</strong> this issimply the programmer’s creativity. <strong>The</strong> power of hypnosis is oftenunderrated because the power of the mind is underrated. <strong>The</strong> mindc<strong>an</strong> decide <strong>to</strong> control its breathing, heart beat, blood pressure <strong>an</strong>dother things that were once thought <strong>to</strong> be involuntary. <strong>The</strong> brainproduces a subst<strong>an</strong>ce which is a tiny peptide molecule calledenkephalin which acts just like morphine <strong>an</strong>d reduces pain. <strong>The</strong> brainc<strong>an</strong> be hypnotically trained <strong>to</strong> release enkephalin so that the braindoesn’t perceive pain. A common hypnotic device for washing awaypain is running water. <strong>The</strong> victim is hypnotically <strong>to</strong>ld <strong>to</strong> go <strong>to</strong> a waterfall<strong>an</strong>d wash their pain away. (According <strong>to</strong> a programmer the averagehealing rate is 3 times quicker under hypnosis th<strong>an</strong> without.) <strong>The</strong>f<strong>an</strong>tastic abilities of the mind <strong>to</strong> control what happens <strong>to</strong> it are veryremarkable (such as its natural healing abilities), but most of this isbeing kept a National Secret so that it c<strong>an</strong> be used against hum<strong>an</strong>ity<strong>to</strong> enslave us <strong>to</strong> demonic-empowered power hungry monsters, ratherth<strong>an</strong> <strong>to</strong> benefit hum<strong>an</strong>ity. Several people in intelligence agenciesquietly bemo<strong>an</strong> the fact that secret research could be helpinghum<strong>an</strong>ity instead of controlling it. <strong>The</strong> hum<strong>an</strong> mind has been found <strong>to</strong>be like <strong>an</strong> immense symphony orchestra, each part doing what it doesbest under the guid<strong>an</strong>ce of a direc<strong>to</strong>r part similar <strong>to</strong> the conduc<strong>to</strong>r of<strong>an</strong> orchestra. A non-multiple’s brain delegates responsibility <strong>to</strong> parts ofhis brain yet retains control over the process. His mind will shift from oneego state <strong>to</strong> <strong>an</strong>other, & still retain its identity. In contrast, the multiple’sbrain also delegates responsibility <strong>an</strong>d shifts from one ego state <strong>to</strong><strong>an</strong>other, BUT doesn’t retain a “cohesive selfhood or self-identity. <strong>The</strong>mental mech<strong>an</strong>isms are similar, but the experience is vastly different.Rather th<strong>an</strong> <strong>an</strong> orchestra playing <strong>to</strong>gether, the multiple’s brain is full ofcompeting isolated parts (instruments so <strong>to</strong> speak) that are playing inisolation. Out of the chaos of all these independent amnesic parts, theprogrammer through hypnosis/& fear then becomes the conduc<strong>to</strong>r <strong>to</strong>help bring order out of chaos. If the multiple is <strong>to</strong> regain a ch<strong>an</strong>ce <strong>to</strong>orchestrate their own life again, they must re-establish communicationbetween the different parts of what should have been their ownorchestra, <strong>an</strong>d get internal people <strong>to</strong> harmonize their music of life.Good programmers do not need <strong>to</strong> formally induct their victim in<strong>to</strong>hypnosis. However, if they need <strong>to</strong>, the Monarch slaves are wellconditioned <strong>to</strong> respond <strong>to</strong> numbers being counted <strong>an</strong>d fingers beingsnapped. Hypnosis was a well developed art by the early 20th century.And testing <strong>an</strong>d refining continued all along. For inst<strong>an</strong>ce, the. U.S.military was conducting extensive tests of subjects under hypnosisduring W.W. II. In spite of all this, the CIA was still seeking better rapidinduction techniques for their slaves during the 1950s. MK UltraSubproject 128 dealt with rapid induction techniques, especiallySubproject 128-1. Some of their drug testing was done at Lexing<strong>to</strong>n, KTDetention Hospital. <strong>The</strong> ability <strong>to</strong> distinguish between magic <strong>an</strong>d94


hypnotism may not exist for the child in situations where they arewitnesses <strong>to</strong> the power of hypnotism exercised by a programmer. Thismakes the adult programmer, who is a big person look all powerful.Another d<strong>an</strong>ger inherent in hypnosis are complications (side effects)that hit a percentage of those who are subjected <strong>to</strong> it. Hilgard (1974)discovered 31% of the 120 university students participating in a study ofhypnosis had complications that lasted from 5 mm. <strong>to</strong> 3 hours aftertr<strong>an</strong>ce, which included headaches, dizziness, nausea <strong>an</strong>d stiff necks.Fritz is aware of one wom<strong>an</strong> who, after the one & only hypnotic sessionshe was the subject of, developed the complication of havingnightmares of snakes crawling all over her. (For further study the readermay w<strong>an</strong>t <strong>to</strong> read MacHovec, Fr<strong>an</strong>k. “Hypnosis Complications, RiskFac<strong>to</strong>rs, <strong>an</strong>d Prevention” Americ<strong>an</strong> Journal of Clinical Hypnosis. Vol. 31,No.1, July, ’88, p. 40+. Regular gentle electrical stimulation in m<strong>an</strong>yparts of the brain including the lower part of the reticular formation c<strong>an</strong>ch<strong>an</strong>ge the state of consciousness from alert <strong>to</strong> sleepy. An electricalb<strong>an</strong>d attached <strong>to</strong> a box is sometimes placed on the victim <strong>to</strong> producea hypnotic state. <strong>The</strong>re are several ways <strong>to</strong> alter a person’s state ofconsciousness, but the most popular one by Monarch h<strong>an</strong>dlers is <strong>to</strong> usea combination of drugs <strong>an</strong>d hypnosis. Drugs are used <strong>to</strong> facilitatehypnosis. Modern drugs do almost all the work for the hypnotist. <strong>The</strong>yplace the person in <strong>an</strong> altered state <strong>an</strong>d make them willing <strong>to</strong> take <strong>an</strong>yorder. Often survivors remember or<strong>an</strong>ge or grape drinks, or somethingelse which they were given, which were used <strong>to</strong> give the child drugs.One Monarch slave (Cathy O’Brien) wrote about having been givenhypnotic drugs via a Grasshopper ice cream drink. Occasionally,hypnosis must be carried out by the programmers on unwilling subjects.<strong>The</strong>y have 3 major ways <strong>to</strong> get around this. <strong>The</strong>y c<strong>an</strong> induce hypnosisby disguising what the hypnotist is doing, they c<strong>an</strong> wait until the personis asleep <strong>an</strong>d talk <strong>to</strong> him while asleep, or they c<strong>an</strong> administer drugs.Also the Network has some high-tech equipment which stimulates theorgiastic state (sexual ecstasy) part of the brain. By moving the bodyin<strong>to</strong> this state, the mind opens up all the unconscious states. <strong>The</strong>nsophisticated brain wave machines program thoughts in<strong>to</strong> the person.A computer disk is put in<strong>to</strong> the electric shock machine <strong>an</strong>d it runs aprogram that sends electric jolts down six nodes. <strong>The</strong> brain’s reticularformation serves as the brain’s mech<strong>an</strong>ism involved in regulatingalertness <strong>an</strong>d awareness. Various kinds of stimuli will enter the brainthrough its various methods of sensing <strong>an</strong>d learning. With <strong>to</strong>tal sensorydeprivation (done by placing the victim in a salt water t<strong>an</strong>k withelectrodes that shock the body until it s<strong>to</strong>ps all movement) the reticularformation will place the mind in<strong>to</strong> a primitive state of consciousnesswhere the programmers c<strong>an</strong> place in post-hypnotic comm<strong>an</strong>ds <strong>to</strong> dosomething on a certain date. <strong>The</strong> end time programming, that hasMonarch slaves doing something at a specific date <strong>to</strong> create <strong>an</strong>archyor <strong>to</strong> help the Anti-Christ come <strong>to</strong> power has been put in at this level.As previously mentioned, this level achieved by <strong>to</strong>tal sensory95


deprivation of the Monarch slave is same primitive level as the brain’scomm<strong>an</strong>ds <strong>to</strong> keep the heart beating. Depending on what type ofsignals are coming in <strong>to</strong> it from the various sensing agents of the brain,the reticular formation will then make a decision what state ofconsciousness <strong>to</strong> place the mind in. If the reticular formation does notsend out “alert” signals, then the brain will get sleepy. Damage <strong>to</strong> thereticular formation c<strong>an</strong> cause a coma. <strong>The</strong> two thalamus lie just abovethe brain stem. <strong>The</strong> right <strong>an</strong>d left thalamus are the brain’s selectiveattention mech<strong>an</strong>ism. That is <strong>to</strong> say, they decide what it is import<strong>an</strong>t forthe brain <strong>to</strong> focus its attention on. <strong>The</strong> right thalamus is connected <strong>to</strong>attention <strong>to</strong> visual shapes <strong>an</strong>d the left <strong>to</strong> our attention <strong>to</strong> thingsdescribable in words. Ten <strong>to</strong> fifteen repetitions at one second intervalsare enough <strong>to</strong> cause the brain <strong>to</strong> lose interest in something. At thispoint the neuron’s in the reticular formation quit paying attention <strong>to</strong>whatever it is. For inst<strong>an</strong>ce, your brain will listen <strong>to</strong> a clock tick for only15 intervals before it quits listening <strong>to</strong> a clock in the room. But thebrain’s alertness c<strong>an</strong> be reactivated by a strong <strong>an</strong>d sudden stimuluslike a loud sound or a flash of light. This is why 3 gunshots or 3 flashes oflight are used as st<strong>an</strong>dard access triggers for Monarch slaves. Threewas also found <strong>to</strong> be the best number <strong>to</strong> get the job done.THE HISTORY OF HYPNOSIS FOR PROGRAMMINGA masonic magazine for higher masonic rites where sex magic isperformed entitled Freemasonry Universal, Vol. 5, 1929, p. 58 states,“Certain Forces are sent through the c<strong>an</strong>didate’s body during theceremony, especially at the moment when he is created, received<strong>an</strong>d constituted <strong>an</strong> Entered Apprentice Freemason. Certain parts ofthe Lodge have been heavily charged with magnetic force especiallyin order that the C<strong>an</strong>didate may absorb as much as possible of thisforce. <strong>The</strong> first object of this curious method of preparation is <strong>to</strong> expose<strong>to</strong> this influence those various parts of the body which are especiallyused in the ceremony. In <strong>an</strong>cient Egypt, there was <strong>an</strong>other reason forthese preparations, for a weak current of physical electricity was sentthrough the c<strong>an</strong>didate by me<strong>an</strong>s of a rod or sword with which he was<strong>to</strong>uched at certain points. It is partly on this account that at this firstinitiation the c<strong>an</strong>didate is deprived of all metals since they may veryeasily interfere with the flow of currents.” Long s<strong>to</strong>ry short, the Masoniclodges have been using hypnotism <strong>an</strong>d electric shock in their initiationrituals for a long time. <strong>The</strong> combination of fear <strong>an</strong>d hypnotism combine<strong>to</strong> help seal the lips of <strong>an</strong> initiate from telling what in some lodges aresecrets of criminal activity. <strong>The</strong> Brahmin caste in India practice yoga,<strong>an</strong>d other meditations where they regularly go in<strong>to</strong> altered states ofconsciousness. Centuries ago, the Brahmin fakirs learned about drugs,<strong>to</strong>rtures, <strong>an</strong>d magical methodologies <strong>to</strong> produce hallucinations <strong>an</strong>d96


altered states of consciousness. <strong>The</strong> worship of Bacchus in the west <strong>an</strong>dShiva in the east were similar, as were the bloodthirsty rites of Kali <strong>an</strong>dMoloch. Occultists in India have also gone <strong>to</strong> cemeteries for centuries,like the <strong>Illuminati</strong> <strong>to</strong> draw spiritual power from graves. When eastern<strong>an</strong>d western occultists linked up they realized they had a great deal incommon. <strong>The</strong> <strong>an</strong>cient egypti<strong>an</strong> writings m<strong>an</strong>y centuries B.C. talk aboutthe third eye <strong>an</strong>d temple tr<strong>an</strong>ces. Hypnosis appears <strong>to</strong> have beenpracticed in these <strong>an</strong>cient temples. All over the world, altered states ofconsciousness have been used. <strong>The</strong> feared Sc<strong>an</strong>dinavi<strong>an</strong> warriorscalled Beserkers were in a mildly-programmed altered state ofconsciousness which made them fearless.B. HOW TO PROGRAM WITH HYPNOSISGeorge Estabrooks was the first major hypnotist <strong>to</strong> publicly recognizethe potential for hypnosis. He contacted MI-6 <strong>an</strong>d other military <strong>an</strong>dintelligence groups in hopes he could interest them in the militaryintelligencepotentials of hypnosis. What was George Estabrooksconnection <strong>to</strong> the <strong>Illuminati</strong>? George Estabrooks was a Rhodes Scholar,which is <strong>an</strong> entry-level group for the <strong>Illuminati</strong>. For those who haven’tstudied this, it would be appropriate <strong>to</strong> give a brief expl<strong>an</strong>ation ofthese things. <strong>The</strong> <strong>Illuminati</strong> in 1919 created the Royal Institute ofInternational Affairs (RIIA). <strong>The</strong> As<strong>to</strong>r <strong>Illuminati</strong> family were majorfin<strong>an</strong>cial backers of the RIIA. Waldorf As<strong>to</strong>r was appointed <strong>to</strong> the RIIA.<strong>The</strong> Americ<strong>an</strong> equivalent <strong>to</strong> the RIIA is the CFR. <strong>The</strong> RIIA <strong>an</strong>d CFR set upRound Table Groups (based on the King Arthur myths) which wereinitially named by Cecil Rhodes “Association of Helpers”. High r<strong>an</strong>kingMason/Illuminatus Cecil Rhodes also created the Rhodes Scholarship <strong>to</strong>bring select men from several the English speaking world <strong>an</strong>d Germ<strong>an</strong>y<strong>to</strong> learn how <strong>to</strong> bring in the One World Government that the <strong>Illuminati</strong>has long had pl<strong>an</strong>ned. <strong>The</strong> Cliveden Estate of the Cliveden As<strong>to</strong>rs (ofthe <strong>Illuminati</strong>) has played <strong>an</strong> import<strong>an</strong>t role in the preparation ofRhodes Scholars. Bill Clin<strong>to</strong>n <strong>an</strong>d Fred Fr<strong>an</strong>z, the late president of theWatch<strong>to</strong>wer Society, are two examples of men selected for RhodesScholarships. Bill Clin<strong>to</strong>n went through the program. However, Fr<strong>an</strong>zdecided not <strong>to</strong> go <strong>to</strong> London in order <strong>to</strong> help lead C.T. Russell’s cult as“oracle” after WT Pres. C.T. Russell was ritually killed on Halloween, 1916<strong>an</strong>d his remains buried under a pyramid. He later served as Presidenthimself from 1977-1994. <strong>The</strong> Watch<strong>to</strong>wer Society leadership is a front fora part of the <strong>Illuminati</strong> which practices Enochi<strong>an</strong> Magic. <strong>The</strong> power ofEnochi<strong>an</strong> magic is the Watch<strong>to</strong>wers. A powerful part of Bethelheadquarter workers are Multiple Personalities, <strong>an</strong>d have cult alterswho speak in Enochi<strong>an</strong>. Some multiples work in the art department <strong>an</strong>dhave been secretly placing hidden occult symbology in<strong>to</strong> Watch<strong>to</strong>wer& Awake! magazines. Now back <strong>to</strong> Estabrooks, who was also himself97


part of the <strong>Illuminati</strong>. In his book Hypnotism, which came out in 1946, hewrote in his chapter Hypnotism in Warfare (again bear in mind thatEstabrooks writes this in 1946 <strong>an</strong>d has been advocating what he writesfor perhaps the 15 previous years!) This chapter is not taken from amystery novel. <strong>The</strong> facts <strong>an</strong>d the ideas presented are, so <strong>to</strong> speak, <strong>to</strong>otrue <strong>to</strong> be good, but no psychologist of st<strong>an</strong>ding would deny thevalidity of the basic ideas involved. He might, of course, be somewhatstartled at our proposed use of these basic ideas <strong>an</strong>d techniques, forhe has never given this matter much thought.... <strong>The</strong> use of hypnotism inwarfare represents the cloak <strong>an</strong>d dagger idea at its best--or worst.Even if we did know the <strong>an</strong>swers <strong>to</strong> some of the weird proposals in thischapter, those <strong>an</strong>swers could never be given for obvious reasons. <strong>The</strong>reader must use his imagination for specific outcomes in specific caseshave not been made public--probably never will be made public. Any<strong>to</strong>pflight physicist is familiar with the basic laws of a<strong>to</strong>mic fission <strong>an</strong>d heis quite free <strong>to</strong> discuss those laws. But he may or may not know what ishappening on some government research project in this field. If hedoes know, he is not shouting it from the house<strong>to</strong>ps, probably not evenwhispering it <strong>to</strong> his best friend. <strong>The</strong> same applies <strong>to</strong> hypnotism in thefield of warfare. Our interest here lies in some of the more unfamiliarsides of hypnotism which may make it of use in warfare. Again, nopsychologist would deny the existence of such phenomena....<strong>The</strong> only possible way of determining whether or not a subject willcommit a murder in hypnotism is literally <strong>to</strong> have him commit one.... Butwarfare...undoubtedly will, <strong>an</strong>swer m<strong>an</strong>y of these questions. A nationfighting with its back <strong>to</strong> the wall is not worried over the niceties of ethics[like Nazi Germ<strong>an</strong>y]. If hypnotism c<strong>an</strong> be used <strong>to</strong> adv<strong>an</strong>tage, we mayrest assured that it will be so employed. Any “accidents” which mayoccur during the experiments will simply be charged <strong>to</strong> profit <strong>an</strong>d loss,a very trifling portion of that enormous wastage in hum<strong>an</strong> life which ispart <strong>an</strong>d parcel of war.... One in every five adult hum<strong>an</strong>s c<strong>an</strong> bethrown in<strong>to</strong> the hypnotic tr<strong>an</strong>ce--somnambulism--of which they willhave no memory whatsoever when they awaken. From the militaryviewpoint there are a few facts which are of great interest. C<strong>an</strong> thisprospective subject, -- this ‘one-in-five” individual -- be hypnotizedagainst his will? Obviously, no prisoner of war will be co-operative if heknows that the hypnotist is looking for military information, nor will <strong>an</strong>yordinary citizen if he suspects that the opera<strong>to</strong>r will use him <strong>to</strong> blow upa munitions pl<strong>an</strong>t. <strong>The</strong> <strong>an</strong>swer <strong>to</strong> this very vital question is “yes”, thoughwe prefer <strong>to</strong> say “without his consent” instead of “against his will.” Wedo not need the subject’s consent when we wish <strong>to</strong> hypnotize him, forwe use a ‘disguised” technique. <strong>The</strong> st<strong>an</strong>dard way <strong>to</strong> producehypnotism in the labora<strong>to</strong>ry is with the so-called sleep technique. <strong>The</strong>opera<strong>to</strong>r “talks sleep” <strong>to</strong> the subject, who eventually relaxes <strong>an</strong>d goesin<strong>to</strong> a tr<strong>an</strong>ce, talking in his sleep <strong>an</strong>d <strong>an</strong>swering questions. Nowsuppose...we attach a blood pressure gauge <strong>to</strong> the subject’s right arm98


<strong>an</strong>d the psychogalv<strong>an</strong>ic reflex <strong>to</strong> the palm of his h<strong>an</strong>d, just <strong>to</strong> makeeverything look shipshape. <strong>The</strong>se devices are for measuring his ability <strong>to</strong>relax. We also point out that, of course, the very highest state ofrelaxation will be his ability actually <strong>to</strong> fall in<strong>to</strong> a deep sleep while weare talking <strong>to</strong> him. We also stress the great import<strong>an</strong>ce of the ability <strong>to</strong>relax in this modern world of rush <strong>an</strong>d worry, promising <strong>to</strong> show him how<strong>to</strong> get results as one end of these experiments. All this is by way ofbuildup. Probably not one of our readers, if exposed <strong>to</strong> this procedure,would realize that this was preparation for hypnotism, but would cooperatewillingly in this very interesting psychological experiment. Wethen proceed <strong>to</strong> “talk sleep,” much the same as in ordinary hypnosis,carefully avoiding <strong>an</strong>y reference <strong>to</strong> a tr<strong>an</strong>ce or making <strong>an</strong>y tests withwhich the subject might be familiar, all the while checking on bloodpressure <strong>an</strong>d psychogalv<strong>an</strong>ic reflex <strong>to</strong> keep up the front. Finally wemake the test of somnambulism, or deep hypnotism. We see if thesubject will talk <strong>to</strong> us in his sleep without awakening. If this does notsucceed, the subject wakes up completely, <strong>an</strong>d in this case we simplyrepeat the experiment, hoping for better luck next time. But if we dosucceed, if the individual belongs <strong>to</strong> the “one-in-five” club, the subjectis just as truly hypnotized as by <strong>an</strong>y other method, <strong>an</strong>d from now oneverything is plain sailing. By use of the posthypnotic suggestion...wesimply say, “Listen carefully. After you wake up I will tap three times onthe table with my pencil. You will then have <strong>an</strong> irresistible impulse <strong>to</strong> gosound asleep.” <strong>The</strong> next tr<strong>an</strong>ce is just that easy <strong>to</strong> get, <strong>an</strong>d the subjecthas no idea that it is the pencil which has sent him off.”... But we mustgo even further th<strong>an</strong> this. Once a person has become accus<strong>to</strong>med <strong>to</strong>hypnotism, has been repeatedly hypnotized, it becomes very easy for<strong>an</strong>y opera<strong>to</strong>r <strong>to</strong> throw him in<strong>to</strong> the tr<strong>an</strong>ce. Obviously this will not do ifwe are <strong>to</strong> use hypnotism in warfare. So we plug this gap again bysuggestion in the somnambulistic state. We assure the subject that inthe future no one will be able <strong>to</strong> hypnotize him except with the specialconsent of the opera<strong>to</strong>r. This takes care of things very nicely....We sitdown with the subject...We are talking about the latest boxing matchwhen the opera<strong>to</strong>r taps three times on the table with his pencil.Inst<strong>an</strong>tly--<strong>an</strong>d we me<strong>an</strong> inst<strong>an</strong>tly--the subject’s eyes close <strong>an</strong>d he’ssound “asleep.” While in tr<strong>an</strong>ce he sees a black dog come in<strong>to</strong> theroom, feels the dog, goes <strong>to</strong> the telephone <strong>an</strong>d tells its owner <strong>to</strong> comeget it. <strong>The</strong> dog is of course purely imaginary. We give him electric shockwhich would be <strong>to</strong>rture <strong>to</strong> a normal person, but he does not evennotice it. We straighten him out between two chairs <strong>an</strong>d sit on his chestwhile he recites poetry. <strong>The</strong>n we wake him up. He immediately startstalking about that boxing match! A visi<strong>to</strong>r <strong>to</strong> the labora<strong>to</strong>ry interruptshim.“What do you know of hypnotism?”<strong>The</strong> subject looks surprised, “Why, nothing.”99


“When were you hypnotized last?”“I have never been hypnotized.”“Do you realize that you were in a tr<strong>an</strong>ce just ten minutes ago?”“Don’t be silly! No one has hypnotized me <strong>an</strong>d no one ever c<strong>an</strong>.’’“Do you mind if I try?”“Not at all. If you w<strong>an</strong>t <strong>to</strong> waste your time it’s all right with me.”So the visi<strong>to</strong>r, a good hypnotist, tries, but at every test the subject simplyopens his eyes with a bored grin. Finally he gives up the attempt <strong>an</strong>deveryone is seated as before. <strong>The</strong>n the original opera<strong>to</strong>r taps on thetable with his pencil. Immediately the subject is in deep hypnotism. Wenow add <strong>an</strong>other concept. We c<strong>an</strong> coach the subject so that in thetr<strong>an</strong>ce he will behave exactly as in the waking state. Under thesecircumst<strong>an</strong>ces we could defy <strong>an</strong>yone, even a skilled psychologist, <strong>to</strong>tell whether the subject was “asleep” or “awake.” <strong>The</strong>re are tests whichwill tell the s<strong>to</strong>ry but in warfare we c<strong>an</strong>not run around sticking pins in<strong>to</strong>everyone we meet just <strong>to</strong> see if he is normal. So rapid c<strong>an</strong> this shift befrom normal <strong>to</strong> tr<strong>an</strong>ce state [the programming state], <strong>an</strong>d so “normal”will the subject appear in tr<strong>an</strong>ce, that the writer has used such asubject as a bridge partner. He plays one h<strong>an</strong>d in tr<strong>an</strong>ce <strong>an</strong>d oneh<strong>an</strong>d “awake” with no one <strong>an</strong>y the wiser. [This happens with Monarchslaves all the time. Few people ever catch on that alters are undertr<strong>an</strong>ce.]Suppose we deliberately set up that condition of multiple personality <strong>to</strong>further the ends of military intelligence. Let us start with a very simpleillustration. For example, we c<strong>an</strong> hypnotize a m<strong>an</strong> in <strong>an</strong> hotel in, say,Rochester. We then explain <strong>to</strong> him in hypnotism that we wish thenumbers <strong>an</strong>d state names of all out-of-state cars parked in the blocksurrounding the hotel. He is <strong>to</strong> note these very carefully in hisunconscious mind but will have no conscious memory of having doneso. <strong>The</strong>n we awaken him <strong>an</strong>d ask him, in the waking state <strong>to</strong> go out<strong>an</strong>d get us a tube of <strong>to</strong>othpaste. He leaves the hotel <strong>an</strong>d w<strong>an</strong>dersaround the block in search of that tube. Finally, he returns, apologizingfor his delay, saying that it was necessary for him <strong>to</strong> go entirely aroundthe block before he noticed a drugs<strong>to</strong>re in the very building itself. This,he says, was very stupid of him but apparently men are made thatway. Did he notice <strong>an</strong>ything of interest as he made his walk? “Nothing!Oh, yes, there was a dog fight down at the corner.” And he describedthe battle in detail. We now hypnotize him. He knows what we areseeking <strong>an</strong>d at once proceeds <strong>to</strong> give us numbers <strong>an</strong>d states ofstr<strong>an</strong>ge cars, very pleased with the fact that he c<strong>an</strong> recall thirteen. He100


evidently enjoys the game immensely <strong>an</strong>d is quite proud of his memory.<strong>The</strong>n we awaken him <strong>an</strong>d see what he knows in the conscious state.“How m<strong>an</strong>y cars are there around the building?”“I don’t know.” “What are the numbers of the out-of-state licensesaround the building?” “Good heavens, I have no idea. I think there is aCalifornia car near the front entr<strong>an</strong>ce, but I have no idea as <strong>to</strong> itsnumber.” A friend tries his h<strong>an</strong>d. “Now look here. You were hypnotizedhalf <strong>an</strong> hour ago <strong>an</strong>d you left this room under posthypnoticsuggestion.” <strong>The</strong> subject gets irritated. “Look here yourself. I’m gettingtired of that silly joke. This is the third time <strong>to</strong>day you’ve pulled it. Allright. I was hypnotized <strong>an</strong>d saw pink eleph<strong>an</strong>ts all over the lobby. Haveit your way.” And the subject sits down <strong>to</strong> a magazine, obviously <strong>an</strong>grythat this m<strong>an</strong> c<strong>an</strong>not find something more amusing <strong>to</strong> say. Often thehypnotic subject will react in this m<strong>an</strong>ner. Push him just a little <strong>to</strong>o far<strong>an</strong>d he becomes irritated, obviously a trick of the unconscious <strong>to</strong> endthe argument <strong>an</strong>d avoid <strong>an</strong>y d<strong>an</strong>ger of being found out.... <strong>The</strong>reader’s very natural reaction is, “Why all this rigmarole?”... <strong>The</strong>re arecertain safeguards if we use hypnotism. First, there is no d<strong>an</strong>ger of theagent’s selling out. More import<strong>an</strong>t would be the conviction ofinnocence which the m<strong>an</strong> himself had, <strong>an</strong>d this is a great aid in m<strong>an</strong>ysituations. He would never “act guilty” <strong>an</strong>d if ever accused of seekinginformation would be quite honestly indign<strong>an</strong>t. This conviction ofinnocence on the part of a criminal is perhaps his greatest safeguardunder questioning by the authorities. Finally, it would be impossible <strong>to</strong>“third degree” him <strong>an</strong>d so pick up the links of a chain. This is veryimport<strong>an</strong>t, for the most hardened culprit is always liable <strong>to</strong> “talk” if thequestioners are ruthless enough.<strong>The</strong> Super SpyIn the inst<strong>an</strong>ce we are about <strong>to</strong> outline, we may or may not be dealingwith multiple personality.... <strong>The</strong> little experiment I have just cited couldbe successful with <strong>an</strong>y good somnambulist <strong>an</strong>d would require aboutten hours preparation. <strong>The</strong> example I now cite would work only with acertain number of the very best somnambulists <strong>an</strong>d instead of tenhours preparation, we had better allow ten months....Perhaps we had better start by defending our position. Is it unethical?Perhaps, but science merely states the facts.... Now let us return <strong>to</strong> ourpresentation. We start with <strong>an</strong> excellent subject, <strong>an</strong>d he must be justthat, one of those rare individuals who accepts <strong>an</strong>d who carriesthrough every suggestion without hesitation. In addition, we need am<strong>an</strong> or a wom<strong>an</strong> who is highly intelligent <strong>an</strong>d physically <strong>to</strong>ugh. <strong>The</strong>nwe start <strong>to</strong> develop a case of multiple personality through the use of101


hypnotism. In his normal waking state, which we will call Personality A,or PA, this individual will become a rapid communist. He will join theparty, follow the party line <strong>an</strong>d make himself as objectionable aspossible <strong>to</strong> the authorities. Note that he will be acting in good faith. Heis a communist, or rather his PA is a communist <strong>an</strong>d will behave as such.<strong>The</strong>n we develop Personality B (PB), the secondary personality, theunconscious personality, if you wish, although this is somewhat of acontradiction in terms. This personality is rabidly Americ<strong>an</strong> <strong>an</strong>d <strong>an</strong>ticommunist.It has all the information possessed by PA, the normalpersonality, whereas PA does not have this adv<strong>an</strong>tage.... <strong>The</strong> propertraining of a person for this role would be long <strong>an</strong>d tedious, but oncehe was trained, you would have a super spy compared <strong>to</strong> which <strong>an</strong>ycreation in a mystery s<strong>to</strong>ry is just plain weak. This is what the <strong>Illuminati</strong>have done. <strong>The</strong>y create good Christi<strong>an</strong> fronts, with <strong>Illuminati</strong> dark alterswho c<strong>an</strong> see what the Christi<strong>an</strong>s are doing.] My super spy plays his roleas a communist in his waking state, aggressively, consistently, fearlessly.But his PB is a loyal Americ<strong>an</strong>, <strong>an</strong>d PB has all the memories of PA. As aloyal Americ<strong>an</strong>, he will not hesitate <strong>to</strong> divulge those memories, <strong>an</strong>dneedless <strong>to</strong> say we will make sure he has the opportunity <strong>to</strong> do so whenoccasion dem<strong>an</strong>ds. Here is how this technique would work .... [skippingthis s<strong>to</strong>ry <strong>an</strong>d several others, we come <strong>to</strong>:] We choose a good subject<strong>an</strong>d then let him in on the plot. We disclose <strong>to</strong> him that he is <strong>an</strong>excellent hypnotic subject <strong>an</strong>d we wish <strong>to</strong> use him forcounterespionage. We suspect that in the near future someone isgoing <strong>to</strong> try hypnosis on him. He is <strong>to</strong> bluff, <strong>to</strong> co-operate <strong>to</strong> the verybest of his ability, fake every test that is made <strong>an</strong>d stay wide awake allthe time. <strong>The</strong> test we fear most is that of <strong>an</strong> <strong>an</strong>algesia--insensitivity <strong>to</strong>pain. So we coach him carefully with posthypnotic suggestions <strong>to</strong> theeffect that even when wide awake <strong>an</strong>d bluffing he will be able <strong>to</strong>meet every test which may be made here, be it with ammonia underthe nose, a needle, or worst of all, the use of electricity, which c<strong>an</strong> bemade extremely painful <strong>an</strong>d is easy <strong>to</strong> use. Under these circumst<strong>an</strong>cesit will be virtually impossible <strong>to</strong> tell whether this m<strong>an</strong> is bluffing or really intr<strong>an</strong>ce. [<strong>The</strong> s<strong>to</strong>ry continues that the master hypnotist thinks he has gota good subject <strong>an</strong>d has hypnotized him deep. <strong>The</strong>n the subject tellshim that he was only bluffing. <strong>The</strong> whole affair provides a nightmare for<strong>an</strong>y counterintelligence group using hypnotism. <strong>The</strong>y c<strong>an</strong> be <strong>to</strong>tallybluffed, unless they turn <strong>to</strong> high tech equipment <strong>to</strong> see what is reallyhappening.]Estabrooks also explains how a m<strong>an</strong> c<strong>an</strong> be hypnotized <strong>an</strong>d <strong>to</strong>ld he isonly testing the preparedness of security. He is <strong>to</strong>ld he has a fakebomb, but is really given a real bomb. <strong>The</strong> subject is sent <strong>to</strong> a location,<strong>an</strong>d blows up with the real bomb. <strong>The</strong> subject blows up with the bombso the evidence of the hypnotic lie is lost.Hypnosis ch<strong>an</strong>ges the threshold of the how the senses perceive.102


Sensitivity c<strong>an</strong> be increased or decreased, hallucinations c<strong>an</strong> beperceived even though there is the absence of <strong>an</strong>y appropriate stimuli,<strong>an</strong>d things that exist c<strong>an</strong> go unperceived by the mind. For inst<strong>an</strong>ce,alters who are used for porn are hypnotized not <strong>to</strong> see the camera.Alters used for <strong>an</strong>y type of sexual service are hypnotized repeatedly <strong>to</strong>not see faces. <strong>The</strong> slave will actually see blurs where people’s facesare. <strong>The</strong> Programmers like <strong>to</strong> m<strong>an</strong>ipulate. Children are set in front ofcircus mirrors that make them taller or smaller for programming. <strong>The</strong>yare set in front of mirrors which duplicate their image. Here in Oregon,there is a site with a magnetic <strong>an</strong>omaly which bends light. It is calledthe Oregon Vortex. <strong>The</strong> Programmers take small children there forprogramming. Anything that creates <strong>an</strong> illusion, seems <strong>to</strong> be noticedby the Programmers <strong>an</strong>d is put <strong>to</strong> use somehow. <strong>The</strong> CIA has employedmagici<strong>an</strong>s like John Mulholl<strong>an</strong>d <strong>to</strong> help them create illusions. Magici<strong>an</strong>John Mulholl<strong>an</strong>d wrote a m<strong>an</strong>ual for the CIA on how <strong>to</strong> deceiveunwitting subjects. Under drugs <strong>an</strong>d hypnosis, when a small child is setin front of a mirror that elongates its body <strong>an</strong>d or then shortens, thereality of the programming script seems real. <strong>The</strong> programmer c<strong>an</strong>hypnotically call upon the child’s mind <strong>to</strong> <strong>to</strong>tally hallucinate seeingsomething, or he c<strong>an</strong> support the illusion by h<strong>an</strong>ding the child a doll<strong>an</strong>d telling it that it is a child, or h<strong>an</strong>ding the child a pencil <strong>an</strong>d tellingthe child it is a flower. A great deal of acting <strong>an</strong>d props are used duringthe programming. What child c<strong>an</strong> tell fool’s gold from real gold? <strong>The</strong>bot<strong>to</strong>m line is that generally, no matter which way the Programmers doit, whether by <strong>an</strong> illusion or <strong>an</strong> outright hypnotic-suggestedhallucination, the event for the child is real. <strong>The</strong> majority of traumas arereal events, but the scripts that are given are after the trauma arefictional.C. HYPNOSIS CAN BOOST THE CREATIVITY OF THE VICTIM TO ADOPTSCRIPTSCreativity is a function of attentiveness, playfulness, <strong>an</strong>xiety, limitations,relaxation, the tr<strong>an</strong>ce state, responsiveness <strong>an</strong>d absorption. A goodprogrammer c<strong>an</strong> assist or boost the creativity of the child. <strong>The</strong>programmer c<strong>an</strong> tell s<strong>to</strong>ries <strong>an</strong>d programming scripts in a vivid way, sothat the sensory pictures are bold <strong>an</strong>d strong. <strong>The</strong> child c<strong>an</strong> taste <strong>an</strong>dfeel <strong>an</strong>d <strong>to</strong>uch in their minds the script being given them. Besides thel<strong>an</strong>guage of the programmer other aids such as fear <strong>an</strong>d drugs c<strong>an</strong>enh<strong>an</strong>ce a victim’s attentiveness. Playfulness comes naturally <strong>to</strong>children. <strong>The</strong>y naturally pretend <strong>an</strong>d use f<strong>an</strong>tasy in their play. Becausechildren are innately creative they are far easier <strong>to</strong> program.Researchers have also discovered that creativity needs <strong>an</strong> element of<strong>an</strong>xiety <strong>an</strong>d chaos in the person’s life. If everything is orderly <strong>an</strong>d inperfect harmony, the creative juices will not flow. <strong>The</strong> conscious mind103


<strong>an</strong>d the subconscious mind need <strong>to</strong> grapple. For creativity <strong>to</strong> beproductive it must occur within limits. For inst<strong>an</strong>ce, the concer<strong>to</strong> iscreated within the limits of a pi<strong>an</strong>o keyboard. <strong>The</strong> programmer, <strong>an</strong>dthe Gr<strong>an</strong>de Dame <strong>an</strong>d the Gr<strong>an</strong>de Mother of the <strong>Illuminati</strong> victimcarefully guide the child’s creativity <strong>an</strong>d set limits. <strong>The</strong> spark ofcreativity occurs when there is <strong>an</strong> alternation of intense concentration<strong>an</strong>d relaxation. <strong>The</strong> programmers must work back <strong>an</strong>d forth between<strong>to</strong>rture <strong>an</strong>d kindness. A light tr<strong>an</strong>ce will allow the mind <strong>to</strong> surface -creative ideas. That is why writers <strong>an</strong>d composers get ideas when theyare in a light tr<strong>an</strong>ce driving, in a light sleep, or shaving or some otherplace where a light tr<strong>an</strong>ce occurs. Receptivity is the willingness <strong>to</strong>accept a creative idea when it comes. <strong>The</strong> final part of creativity isone’s absorption in<strong>to</strong> the process of creativity. <strong>The</strong> artist may get soimmersed in<strong>to</strong> the portrait that he is painting that the portrait seemsalive <strong>an</strong>d real--the actual person. This immersion, where thingsimagined become real, is import<strong>an</strong>t <strong>to</strong> keep the creative juicesflowing. <strong>The</strong> hypnotist/programmer c<strong>an</strong> enh<strong>an</strong>ce the creative processby giving the child positive encouragement <strong>to</strong> reduce their fears <strong>an</strong>dinhibitions <strong>to</strong> creativity. <strong>The</strong> programmer could say <strong>to</strong> the older child (ayounger child might be <strong>to</strong>ld something else), “You take all of your fearof not being creative <strong>an</strong>d put them in<strong>to</strong> a sack. <strong>The</strong> sack nowbecomes a bundle of energy. Now imagine you are opening the sack<strong>an</strong>d out of the sack comes a rainbow of energy. It is powerful, it ispositive. You are now full of new ideas. You c<strong>an</strong> feel this power surgethrough your body. Your mind is now clear <strong>an</strong>d focused, focused, youfeel confident, sure of your talent <strong>an</strong>d eager <strong>to</strong> set your new ideas in<strong>to</strong>motion, <strong>an</strong>d you control the energy in your life, you are very successfulin controlling the energy in your life...you take a few breaths <strong>an</strong>d relax.You notice the neighborhood around you, there is a beautiful park, youbegin <strong>to</strong> notice how beautiful the day is, <strong>an</strong>d you begin <strong>to</strong> feel a freshnew energy flowing through your body...the more calm you becomethe more enthusiastic <strong>an</strong>d creative you become...you will feel free <strong>to</strong>create, <strong>to</strong> enjoy your creative talent, <strong>to</strong> invent, <strong>to</strong> shape, <strong>an</strong>d form new<strong>an</strong>d wonderful ideas.” This is not <strong>to</strong> say that the <strong>Illuminati</strong> programmeror Mother of Darkness assist<strong>an</strong>t will use this type of hypnoticsuggestions, but sometimes it does become necessary <strong>to</strong> teach somechildren how <strong>to</strong> dissociate, <strong>an</strong>d how <strong>to</strong> become creative. If they donot develop these abilities, they may lose their life <strong>to</strong> the <strong>to</strong>rture.THE VITAL ROLE OF MOVIES FOR HYPNOTISING SMALL CHILDRENAs mentioned before, the hypnotist will find children easier <strong>to</strong> hypnotizeif they know how <strong>to</strong> do it with small children. One method that iseffective is <strong>to</strong> say <strong>to</strong> the small children, “Imagine you are watching afavorite television show.” This is why the Disney movies <strong>an</strong>d the other104


shows are so import<strong>an</strong>t <strong>to</strong> the programmers. <strong>The</strong>y are the perfecthypnotic <strong>to</strong>ol <strong>to</strong> get the child’s mind <strong>to</strong> dissociate in the right direction.<strong>The</strong> programmers have been using movies since almost day one <strong>to</strong>help children learn the hypnotic scripts. For children they need <strong>to</strong> bepart of the hypnotic process. If the hypnotist allows the child <strong>to</strong> makeup his own imagery, the hypnotic suggestions will be stronger. Ratherth<strong>an</strong> telling the child the color of a dog, the programmer c<strong>an</strong> ask thechild. This is where the books <strong>an</strong>d films shown the child assist in steeringits mind in the right direction. If the hypnotist talks <strong>to</strong> a child, he musttake extra precaution not <strong>to</strong> ch<strong>an</strong>ge the <strong>to</strong>ne of his voice <strong>an</strong>d <strong>to</strong> havesmooth tr<strong>an</strong>sitions. Most of the Disney films are used for programmingpurposes. Some of them are specifically designed for mind-control.SPINNING TOPSOne method for inducting children in<strong>to</strong> a dissociative state is <strong>to</strong> havethem look at a large spinning <strong>to</strong>p, as the colors whirl around. Carouselrides have also been popular <strong>to</strong> induce tr<strong>an</strong>ces. A good sampling ofoptical illusions c<strong>an</strong> be found in Katherine Joyce’s book As<strong>to</strong>undingOptical Illusions. NY: Sterling Pub. Co., 1994. <strong>The</strong> illusion <strong>The</strong> Templemakes one feel they are in a passageway leading <strong>to</strong> a small door. <strong>The</strong>Escala<strong>to</strong>r makes one feel they are going up <strong>an</strong>d down, <strong>an</strong>d could beused for building in <strong>an</strong> internal eleva<strong>to</strong>r. We know that optical illusionshave been used, but we are not saying that these particular ones havebeen. For a programmer <strong>to</strong> use <strong>an</strong> optical illusion, he would firstsubmerge the victim in<strong>to</strong> a drugged state with the appropriate mindaltering music <strong>an</strong>d sounds <strong>an</strong>d then flash the illusion on<strong>to</strong> the wall thatthe victim was facing. With virtual reality the child c<strong>an</strong> really beimmersed in<strong>to</strong> a weird head trip.105


THE HYPNOTIC VOISE OF THE PROGRAMMERProgrammers will adopt either <strong>an</strong> authoritari<strong>an</strong> voice, which iscomm<strong>an</strong>ding <strong>an</strong>d direct or a permissive soft <strong>to</strong>ne. Bear in mind theslave who has the authoritari<strong>an</strong> voice used on it, sees the programmeras God with the authority of life or death over its (his or her) body <strong>an</strong>dsoul. <strong>The</strong> heightened expectation from the comm<strong>an</strong>ding <strong>to</strong>ne, willincrease the suggestions ch<strong>an</strong>ce for success. However a softer <strong>to</strong>ne,will relax the victim, <strong>an</strong>d the hypnotist <strong>an</strong>d the programming victimbecome partners in the hypnotic process. <strong>The</strong> adv<strong>an</strong>tage of the softer<strong>to</strong>ne, is that the creativity of the victim is enh<strong>an</strong>ced <strong>an</strong>d participatesmore in the process. <strong>The</strong> hypnotic induction become more real whenthe victim participates more in the process. <strong>The</strong> Monarch programmerwill either use a mono<strong>to</strong>ne voice or a rhythmic voice. Remember, theprofessor who could lull his students <strong>to</strong> sleep. He had a hypnotic voice,without knowing it. A singsong or rhythmic voice is comforting. It c<strong>an</strong>also be used by the Programmer. One continuous thread of wordsstrung <strong>to</strong>gether are used <strong>to</strong> close out distractions. After a suggestion orcomm<strong>an</strong>d is given, a pause is made by the programmer in talking sothat the suggestion is taken in<strong>to</strong> the mind. Otherwise <strong>an</strong>xiety isexperienced by the victim’s mind, <strong>an</strong>d the suggestion will not beaccepted as well. Cisco, the co-author provides <strong>an</strong> example of how ahypnotic script c<strong>an</strong> go with music, “Close your eyes for your eyes willonly tell the truth. And the truth isn’t what you w<strong>an</strong>t <strong>to</strong> see. In the dark itis easy <strong>to</strong> pretend that the truth is what it ought <strong>to</strong> be. “Softly, deftly,106


music shall caress you. Hear it, feel it secretly possess you. Open up yourmind, let your f<strong>an</strong>tasies unwind in this darkness which you know youc<strong>an</strong>not fight. <strong>The</strong> darkness of the music of the night. “Close your eyes,start a journey through a str<strong>an</strong>ge new world. Leave all thoughts of theworld you knew before. Close your eyes <strong>an</strong>d let music set you free.Only then c<strong>an</strong> you belong <strong>to</strong> me. “Floating, falling, sweet in<strong>to</strong>xication.Touch me, trust me, savor each sensation. Let the dream begin, letyour darker side give in <strong>to</strong> the power of the music I write. You alonec<strong>an</strong> make my song take flight. Help me make the music of the night.“Helpless <strong>to</strong> resist the notes I write, For I compose the music of the night.Hearing is believing, music is deceiving. Hot as lightening, soft asc<strong>an</strong>dle light. Dare you trust the music of the night?”When the authors have bumped in<strong>to</strong> men who are programmers <strong>an</strong>dh<strong>an</strong>dlers for the CIA, they have noticed that m<strong>an</strong>y of these men havewarm personalities <strong>an</strong>d have a certain trained hypnotic voice whichthey use even when not programming. During rituals, the variousmagical l<strong>an</strong>guages used in witchcraft employ repetition, alliteration,nonsense syllables, newly coined words, <strong>an</strong>d <strong>an</strong>cient words that arech<strong>an</strong>ted or sung in a limited-r<strong>an</strong>ge that makes the sounds becomehypnotic. Sounds like the m<strong>an</strong>tra “a-u-u-in-in” are ch<strong>an</strong>ted. Gesturesduring rituals are also made which intensify the effects. Rituals c<strong>an</strong> notbe classified as having nothing <strong>to</strong> do with programming. <strong>The</strong>re is such agreat attempt <strong>to</strong> secularize <strong>an</strong>d make clinical what the victimexperiences, <strong>an</strong>d the idea that witchcraft is part of the programming is<strong>an</strong> unpopular notion with some. Combining witchcraft with hypnoticl<strong>an</strong>guage c<strong>an</strong> be powerful with group dynamics. Repetitive sounds,such as a drum beating influences the locus coeruleus part of thebrain. Drums c<strong>an</strong> help induce tr<strong>an</strong>ce.D. KEEPING THE MIND DISSOCIATIVEIlluininati parents (as well as other adults who care for a Monarchchild) are given special instructions on how <strong>to</strong> raise the child <strong>to</strong> bedissociative. <strong>The</strong> parents are admonished that their child will have asuccessful future <strong>an</strong>d so will they if they follow the instructions. if theydon’t follow the instructions, they are minded their child’s life could beforfeited. ere are some of the types of instructions that e given:Spend 15 minutes/day teaching the child <strong>to</strong> write backwards <strong>to</strong>develop the brain in a particular fashion.b. Giving daily doses of prolonged isolation, such as dark closets, darkcellars, the corners of dark rooms. During the prolonged isolation, thechild c<strong>an</strong>not turn on the lights, go <strong>to</strong> the bathroom, make a noise or107


<strong>an</strong>ything else. <strong>The</strong> child will learn <strong>to</strong> dissociate. <strong>The</strong> child is also traumabonded <strong>to</strong> the abuser because each time the child is let out, it isgrateful <strong>to</strong> the abuser. <strong>The</strong> child c<strong>an</strong> be drowned in a pool <strong>an</strong>d thenresuscitated--<strong>an</strong>d the exact amount of time <strong>to</strong> keep the child under willbe given. <strong>The</strong> child c<strong>an</strong> be placed in a freezer, <strong>an</strong>d again the exactamount of time c<strong>an</strong> be given <strong>to</strong> the parent. <strong>The</strong> child is not <strong>to</strong> roamabout the house freely. <strong>The</strong> adults’ area is off-limits. <strong>The</strong> child mustmove with permission.c. Systematic punishment without provocation with the message--keepsecrets. Hear no evil, see no evil, do no evil. This needs <strong>to</strong> be doneseveral times a week <strong>to</strong> reinforce the codes of silence <strong>an</strong>d theprogramming for silence.d. A needle which is gripped halfway up is stuck in<strong>to</strong> the child a quarterinch deep on the child’s muscles, but<strong>to</strong>cks or thigh <strong>to</strong> help continuedissociative behavior. On special occasions (birthdays, holidays) theh<strong>an</strong>ds <strong>an</strong>d feet which are most sensitive <strong>to</strong> pain are stuck. When thefeet or h<strong>an</strong>ds are stuck, they will often stick the needles under the nails.<strong>The</strong> ears are also on occasion stuck with needles. It also conditions thechild <strong>to</strong> obey the comm<strong>an</strong>ds of her h<strong>an</strong>dlers, who will use needles <strong>to</strong>access the minds various personalities. Various spots on the body whenstuck with needles along with certain codes become access points forcertain alters.e. Anytime a child argues, has a temper t<strong>an</strong>trum, or gets <strong>an</strong>gry thechild is <strong>to</strong> be slapped in the face. This is a quick trauma. It is <strong>to</strong> befollowed with a lighted cigarette applied <strong>to</strong> the child <strong>to</strong> burn the skinthe second the child gets submissive from the slap. If a cigarette c<strong>an</strong>’tbe found, a s<strong>to</strong>ve <strong>to</strong>p or some other hot item is <strong>to</strong> be found. At fouryears of age, the child begins programming <strong>to</strong> burn itself. If there are<strong>an</strong>y bruises showing, the child c<strong>an</strong> be kept home for a day or two.f. Anytime the child becomes willful it is <strong>to</strong> have its mouth washed outwith soap. <strong>The</strong> child should be made <strong>to</strong> chew off a piece <strong>an</strong>d swallowthe foam.g. <strong>The</strong> child should be raped daily <strong>an</strong>d then <strong>to</strong>rtured. This helps with thesexual programming later, <strong>an</strong>d begins a reversal in the mind that pain islove, <strong>an</strong>d pain is pleasure.Some of the first memories that female Monarchs recover are theirmemories of their fathers raping them. This is because the programmersallow these memories <strong>to</strong> be less dissociated th<strong>an</strong> the later ones wherethe slave may be sexually servicing <strong>an</strong> import<strong>an</strong>t Monarch slave108


h<strong>an</strong>dler like the Rev. Billy Graham. (Graham is covered in full in chapter5.) In later situations like that, the kitten alters which do the sexualservicing will be electro-shocked <strong>to</strong> block their memory as well as givenhypnotic cues. <strong>The</strong> fathers or step-fathers are often not the person whowill be their master when they grow up. <strong>The</strong> abuse of this person willserve as a cover for the programming. If the person’s front altersdiscover they are MPD, the will initially blame their multiplicity on thefirst abuser they remember, which then serves as a cover.E. KEEPING THE MIND IN ALPHA STATE<strong>The</strong> entire alter system of a Monarch slave has their sleep patternscontrolled. M<strong>an</strong>y alters are programmed not <strong>to</strong> sleep. <strong>The</strong>y stay awake24 hours a day internally. Someone has <strong>to</strong> take the body <strong>an</strong>d sleep--but whichever alters are set up <strong>to</strong> do it, they are hypnoticallycomm<strong>an</strong>ded <strong>to</strong> only sleep three hours, <strong>to</strong> insure that the mind stays in<strong>an</strong> alpha state easy <strong>to</strong> program. Because alters which do not hold thebody “rest” mentally in a sense--when they take the body they arefresh. In this way, a multiple c<strong>an</strong> function without as much sleep as <strong>an</strong>ormal person, but the price they pay is that their mind stays in <strong>an</strong>easy-<strong>to</strong>-program easy-<strong>to</strong>-hypnotize state. REM sleep allows the person<strong>to</strong> harmonize the mind’s inner world with its outer environment. <strong>The</strong>periods of REM sleep lengthen as the hours of sleep progress. Bypreventing long periods of sleep, long periods of REM sleep areprevented from occurring, <strong>an</strong>d the victim remains in a morecontrollable state of mind.F. HYPNOTIC CODES, CUES AND TRIGGERSWhen a Programmer creates something, it will be a reflection of himself<strong>to</strong> some degree. Just like h<strong>an</strong>dwriting <strong>an</strong>d art are a reflection of theperson who makes them. Underst<strong>an</strong>ding the connections between aProgrammer <strong>an</strong>d his creation could take a book in itself. <strong>The</strong> following isextracted from the his<strong>to</strong>ry of <strong>an</strong> <strong>an</strong>cient occult sect, still functioning<strong>to</strong>day. It is the type of thing, that the programmers feed their minds on,which in turn provides them the patterns which show up inprogramming. Here it is: In the <strong>an</strong>cient occult world, at the gates ofpalaces the doorkeeper had <strong>to</strong> be shown “the seals”--the secretnames of God or pictures with magical power, <strong>an</strong>d the words “RAkiva”. When the person passed this entr<strong>an</strong>ce, he comes <strong>to</strong> thepalace of pure marble s<strong>to</strong>nes, do not say, “water, water.” <strong>The</strong>n theperson will enter in<strong>to</strong> the world or the celestial Garden of Eden or theRealm of the Heavenly Palaces. <strong>The</strong> S<strong>to</strong>ry of Sinbad, the golden lamp109


<strong>an</strong>d genie would be <strong>an</strong>other example of <strong>an</strong> occult s<strong>to</strong>ry that could beused.Within the <strong>Illuminati</strong>, Gematria (which is the cabalistic teachings aboutnumbers) is very import<strong>an</strong>t for knowing the codes of the deep darkeralters. <strong>The</strong>re are several reasons for why Monarch slaves have lots ofcodes <strong>an</strong>d structures which come from witchcraft,a. their programmers are witches <strong>an</strong>d witchcraft is the world view onthe mind of the programmerb. the slaves are reminded of their entrapment <strong>to</strong> Sat<strong>an</strong> <strong>an</strong>d their cultwhenever they hear their codesc. the alters internally will work magic, even while they don’t hold thebody, <strong>an</strong>d placing magical structures inside facilitates this internalmagicd. using magical words makes the programming look like magicke. the internal alters are being inculcated in<strong>to</strong> occult underworld life<strong>an</strong>d doctrineA rather remarkable book is Aleister Crowley’s book 777 <strong>an</strong>d OtherQabalistic Writings of Aleister Crowley. It is remarkable for thedeprogrammer <strong>to</strong> underst<strong>an</strong>d m<strong>an</strong>y of the programming code linksthat the programmers may have used. In 777’s forward,. AleisterCrowley wrote “777 is a qabalistic dictionary of ceremonial magic,oriental mysticism, comparative religion <strong>an</strong>d symbology. It is also ah<strong>an</strong>dbook for ceremonial invocation <strong>an</strong>d for checking the validity ofdreams <strong>an</strong>d visions. It is indispensable <strong>to</strong> those who wish <strong>to</strong> correlatethese apparently diverse studies.” (Crowley, 777, p. vii) Later he writes,“<strong>The</strong> book 777 has for its primary object the construction of a magicalalphabet.” (p. xvii) For inst<strong>an</strong>ce, Crowley gives the Officers in theMasonic Lodges <strong>an</strong>d the hebrew passwords of their grades. In <strong>an</strong>otherexample of the book, Crowley gives a list of the Hindu chakra points(which is well known), with the Buddhist names, <strong>an</strong>d their <strong>an</strong>cientEgypti<strong>an</strong> names. This is the type of occult knowledge that is hard <strong>to</strong>come by. Crowley’s List of Correspondences are perhaps the best onewill find printed in the occult world. <strong>The</strong>y show the correspondencesthat occultists make between things. For inst<strong>an</strong>ce, if we w<strong>an</strong>t <strong>to</strong> knowwhat corresponds <strong>to</strong> the Hebrew letter Dalath. <strong>The</strong> letter me<strong>an</strong>s door.Door corresponds <strong>to</strong> the letter 14, the Cabalistic Tree of Life pathwaybetween the two <strong>to</strong>p circles on each side of “the crown”, sky blue onthe Queen scale of color, Aphrodite, Venus <strong>an</strong>d Freya, <strong>an</strong>d the gems110


Emerald <strong>an</strong>d Turquoise, <strong>an</strong>d the perfume s<strong>an</strong>dlewood. All these thingscorrespond within Cabalistic magic. For someone trying <strong>to</strong> underst<strong>an</strong>dwhy a particular color, <strong>an</strong>d name is given <strong>to</strong> <strong>an</strong> deep darkside alterCrowley’s book is helpful in some Monarch systems. <strong>The</strong> Mother-of-Darkness alters (<strong>an</strong>d Supreme Master alters in males) of the <strong>Illuminati</strong>must do pathworking rituals when they hold the body <strong>an</strong>d participatein <strong>Illuminati</strong> activities. <strong>The</strong>se Mother-of-Darkness alters are placedinternally in the Cabalistic Tree of Life. Crowley’s book provides themystic number that goes <strong>to</strong> each part (pl<strong>an</strong>e, or circle) of the Tree ofLife <strong>an</strong>d its Snake positional number. <strong>The</strong> mystic number of theSephiroth that corresponds <strong>to</strong> the number <strong>to</strong> each of the 22 paths thatmust be worked is also given. <strong>The</strong> occult concept is that <strong>to</strong> achievedivinity one must go on the Tree of Life from being Malkuth <strong>to</strong> becomeKether. Although it is not the intent <strong>to</strong> propagate occult doctrine, forthose who w<strong>an</strong>t <strong>to</strong> know how <strong>Illuminati</strong> Monarch slaves get <strong>to</strong> wherethey are as adults, <strong>an</strong>d what the codes are in their System, then weneed <strong>to</strong> cover briefly the Kabblalistic Tree of Life. (More will be writtenabout this in chapter 10 on spiritual control.) Let the reader picture 3circles in a line. <strong>The</strong>se three circles sit at the <strong>to</strong>p of the Cabalistic Tree ofLife. <strong>The</strong>y are the <strong>to</strong>p 3 circles of ten circles which all have nameswithin <strong>an</strong> <strong>Illuminati</strong> Monarch slave. <strong>The</strong> center circle is “the crown” <strong>an</strong>dholds the honored alter who actually is the Bride of the AntiChrist. <strong>The</strong>AntiChrist is also known as Black Saturn, <strong>an</strong>d other names. Sat<strong>an</strong> himselfis known within a Monarch system often by the name Bilair, Bilar, or Bilidwhich are his cabalistic names. <strong>The</strong> honored alter who is married <strong>to</strong> himsits on a pedestal revolving with 2 other alters. In the occult world,goddesses are triune: maiden, mother <strong>an</strong>d crone. <strong>The</strong> one <strong>to</strong> the left ofcenter is Midnight (the Mother figure), <strong>an</strong>d the other is Morning Star(the maiden). Morning Star (Stella Matutina) may be a very youngalter, rather th<strong>an</strong> a teenager. On <strong>to</strong>p of the Cabalistic Tree of Life will sita pyramid. Each of the ten circles (rooms for the alters who live inthem) of the Tree of Life is created with a different <strong>Illuminati</strong> ceremony.Before a Mother-of-Darkness Monarch slave is 16, they will have gonethrough all the ceremonies involved in the creation of the alters whichcorrespond <strong>to</strong> the 10 rooms of the Tree of Life. At age 16, the system’sdemons will then guide the system on a personalized pathway <strong>an</strong>d ababy (the firstborn) will be sacrificed by the System. <strong>The</strong> blood of thisfirst born is spiritually placed in a box under the Tree of Life. This is inaccord with the Lilith s<strong>to</strong>ry. <strong>The</strong> spirit Lilith (sometimes with <strong>an</strong> alter Lilith)will work with the spirits of Zerodieth <strong>an</strong>d Lucifer. <strong>The</strong>re are several treeswhich c<strong>an</strong> be placed within a Monarch slave, including the ash, theoak, the ygdrassil, the willow, <strong>an</strong>d the Tree of Evil, which is <strong>an</strong> evilcounterpart <strong>to</strong> the Tree of Life. <strong>The</strong>se will be dealt with under thechapter on structures. This chapter will provide the hypnotic codes,cues, triggers or whatever one w<strong>an</strong>ts <strong>to</strong> call these words, noises, <strong>an</strong>dsensory inputs that m<strong>an</strong>ipulate these poor victims turned in<strong>to</strong> Monarchrobots. Other chapters will explain about the structures these codes go111


<strong>to</strong>, <strong>an</strong>d also the spiritual dimensions of these codes <strong>an</strong>d structures.Another way <strong>to</strong> see things is <strong>to</strong> recognize that the programmers havecreated “power words” <strong>to</strong> which they have attached memory <strong>an</strong>dprogramming. If a de-programmer observes closely the word usage ofthe victim, you will begin <strong>to</strong> spot power words of the abuser, forinst<strong>an</strong>ce, “white rabbit”. A cipher is when symbols are used <strong>to</strong>represent letters. One c<strong>an</strong> used letter frequencies <strong>to</strong> break ciphers.Likewise, there are frequencies <strong>to</strong> codewords. <strong>The</strong> <strong>Illuminati</strong>’sintelligence agencies have programmed thous<strong>an</strong>ds upon thous<strong>an</strong>ds ofslaves. <strong>The</strong>re are only so m<strong>an</strong>y code words <strong>to</strong> pick from <strong>an</strong>d some ofthese code words are favorites. From the co-author Fritz Springmeier’sexperience, the following are favorite code words that have beenused <strong>to</strong> program slaves with:CHARLOTTE, CHECKMATE, CHRISTMAS, CLARA, CLOVERLEAF, COURIER,CRAYON, CRYSTAL, DAISY, DAVY, DELLA, DELTA, DEMON, DIANA,DINAH, DIRTY, DIME, DOT, DOVE, DRAGON, DUCK, DUMBO, EAGLE,EASY, ECHO, ELAINE, ELEPHANT, ELLEN, EMERALD, EMPIRE, ESTER,EUREKA, EVERGREEN, FAITH, FALCON, FARMER, FELIX, FIREFLY, FIVEBROTHERS, FIVE SISTERS, FLASHLIGHT, FLOSSY, FLYING + [other word],FOX, FREEZE, FRIENDSHIP, FULL HOUSE, GALAHAD, GAMMA, GARGOYLE,GEMINI, GEORGE, GIPSY, GOLEM, GOLDEN + [other word], GOOSE,GRACE, GRANNY, GREEN DIAMOND, GULL, GWEN, HADES, HALF-MOON, HAMMER, HARRIET, HAWK, HAZEL, HELENE, HELIOS, HEN,HERMES, HIGH BALL, HIGH CARD, HOLE-IN-THE-WALL, HOPE, HOPI,HOUNDDOG, HOURGLASS, HUSThER, HYDRA, ICEBERG, IDA, IMP,INCUBUS, INSECT, IRIS, IROQUOIS, ITEM, JACKASS, JAGUAR, JANET,JANICE, JASON, JASPER, JAVELIN, JENNY, JEZEBEL, JIG, JULIET, JOAN,JOSHUA, JUDY, JUPITER, KANGAROO, KANSAS, KATY, KING, KILO, KITTY,KOMET, LACE, LADY + [other word], LAMP, LAURA, LEAP FROG,LEOPARD, LIGHTNING, LILY, LION, LITTLE + [other word], LOVE, LUCKY +[other word], MAE WEST, MAGIC, MAJESTIC, MAMIE, MANDREL, MARIE,MARK, MARTHA, MAX, MEADOWS, MERCURY, MIGHTY MOUSE, MILLIONDOLLAR, MINNIE MOUSE, MONA LISA, MONTE CARLO, MOTHER,MUMMY, NANCY, NAOMI, NAVAJO, NIMROD, NOAH, NORA,NUTCRACKER, OBOE, OCTOPUS, OLD FAITHFUL, OLIVE, OPAL, OPHELIA,ORION, OSCAR, OWL, OZMA, PACKAGE, PAMELA, PANDORA, PANTHER,PAPERCLIP, PAPA, PAT, PATSY, PEGASUS, PENTHOUSE, PHANTOM,PHOENIX, PINECONE, PISTOL PETE, PLATO, PLUTO, POLLY, PYTHON,QUAIL, QUEBEC, QUEEN, QUEEN BEE, QUEENIE, QUEST, QUICK SILVER,RACHEL, RAINBOW, RAM, RANGER, RASCAL, RAT, RAVEN, REBECCA,RED DIAMOND, RED HILL, RENO, REX, RHUBARB, RITA, ROBOT, ROMEO,ROOSTER, ROSIE, ROVER, RUBY, RUTH, SABRE, SAINT, SAINT + [<strong>an</strong>otherword], SALLY, SAN ANTONIO, SAPPHIRE, SARAH, SATURN, SCAMPER,SCOUT, SEA GULL, SEAL, SERGEANT, SERGEANT-DELTA, SHADOW, SHARK,SHENANDOAH, SHO, SICKLE, SIGMA, SILVER, SNOW + (other word),ZEBRA, ZENITH, ZERO, ZYPPER, ZOMBIE, ZULU, ZUNI.”112


<strong>The</strong> word FOX is <strong>an</strong> example of a signific<strong>an</strong>t occult code word. F-o-xconsists of the 6th, 15th (1+5), & the 24th (2+ 4) letters of the alphabet,which yield 666. <strong>The</strong> reader needs <strong>to</strong> bear several things in mind. First,the programmers generally have intelligent, well sounding codes, thatdo form patterns. For inst<strong>an</strong>ce, a wom<strong>an</strong>’s name from the Bible will beused as a code, with subparts or subcodes having other female namesfrom the Bible. Deeper <strong>Illuminati</strong> parts will have goddess <strong>an</strong>d godnames, <strong>an</strong>d king <strong>an</strong>d queen names for cult alters. <strong>The</strong>se are the namesthe h<strong>an</strong>dler or cult uses--NOT their access codes. <strong>The</strong> codes for slavesfollow patterns. <strong>The</strong>re are st<strong>an</strong>dard <strong>an</strong>d unique codes. <strong>The</strong> internalprogramming alters have the power <strong>to</strong> ch<strong>an</strong>ge codes if they need <strong>to</strong>protect the programming. <strong>The</strong>y will have <strong>to</strong> hypnotically work withalters when they tr<strong>an</strong>ce out at night. In other words, most of theirprogramming of front alters will be done when a System lies down for“sleep”--more accurately described as “for tr<strong>an</strong>ce.” If the internal altersch<strong>an</strong>ge m<strong>an</strong>y codes, in their efforts <strong>to</strong> protect the system, they willeven make it difficult for the h<strong>an</strong>dler/programmer <strong>to</strong> get in<strong>to</strong> thesystem. Ciphers developed ro<strong>to</strong>rs that require lines <strong>to</strong> line up. Somesimple schemes using this principle appear in some Monarch systems.This is part of the science of structuring. Intelligence codes often comefrom the Bible or popular fiction books. <strong>The</strong> deeper codes are occultwords, often in foreign l<strong>an</strong>guages such as Arabic, which is <strong>an</strong> import<strong>an</strong>tl<strong>an</strong>guage in the upper occult world. Slaves will be given COVER NAMESfor ops, <strong>an</strong>d often males receive female names <strong>an</strong>d vice versa. Veryshortly, we will provide the Monarch hypnotic cues (codes) for themultitude of functions that a Monarch’s mind must carry out. <strong>The</strong> typeof programming which is placed in a slave varies. For intelligenceoperations the slave will have <strong>to</strong> have BONA FIDES, which are codes <strong>to</strong>allow two people <strong>to</strong> meet. All slaves are given CONTROL SIGNS whichallow them <strong>to</strong> indicate via a code that they are in trouble. ARECOGNITION signal allows two people <strong>to</strong> make contact. For inst<strong>an</strong>ce,the h<strong>an</strong>dler might fly his distinctive sounding pl<strong>an</strong>e over a slave’s housein a pre-arr<strong>an</strong>ged signal. It might also be a particular colored scarf,<strong>an</strong>d a particular set of phrases. A GO-AWAY code is a prearr<strong>an</strong>gedsignal that me<strong>an</strong>s it is unwise <strong>to</strong> make contact. <strong>The</strong> go-away signalmay be simply placing one’s h<strong>an</strong>ds in one’s pocket or turning theporch lights off. A “GO TO GROUND” signal me<strong>an</strong>s <strong>to</strong> go in<strong>to</strong> hiding. AMAYDAY BOOK exists for <strong>Illuminati</strong> <strong>an</strong>d Intelligence slaves which allowsthem <strong>to</strong> call if they are about <strong>to</strong> be arrested. A telephone number isleft open for just this purpose. Also common universal <strong>Illuminati</strong> codesc<strong>an</strong> be used by the slave <strong>to</strong> get set free from police <strong>an</strong>d judges. Withinthe Jehovah’s Witnesses, especially their headquarters, the <strong>Illuminati</strong>uses Enochi<strong>an</strong> l<strong>an</strong>guage <strong>to</strong> program with. With Druidic br<strong>an</strong>chesDruidic symbols are used. With the Jewish groups, Hebrew is used.Other l<strong>an</strong>guages are also used. An <strong>Illuminati</strong> System c<strong>an</strong> easily have 6different l<strong>an</strong>guages used as programming codes. <strong>The</strong> foreignl<strong>an</strong>guage codes will be for small parts of the System only. Special113


artificial l<strong>an</strong>guages are also employed, as well as sign l<strong>an</strong>guage.MONARCH MIND-CONTROL CODEScontents:A. ALPHA (basic)B. BETA (sexual)C. CHI (return <strong>to</strong> cult)D. DELTA (assassination)E. EPSILON (<strong>an</strong>imal alters)F. OMEGA (internal computers)G. GAMMA (demonology)H. HYPNOTIC INDUCTIONSI. JANUS-ALEX CALL BACKS (end-times)J. THETA (psychic warfare)K. TINKERBELLE (never grow up/alien)L. TWINNING (teams)M. SOLEMETRIC MILITARYN. SONGS (reminders)0. ZETA (snuff films)P. Sample alter system codesQ. Catholic programmingR. MENSA programmingS. HAND SIGNALST. Programming site codes (used for slave model codes, etc.)114


a. ALPHA (basic)Basic Comm<strong>an</strong>ds (these basic comm<strong>an</strong>ds are also found used inm<strong>an</strong>y slaves, although there will be exceptions <strong>to</strong> everything.)“GET ON YOUR TOES. STAY ON YOUR TOES.” me<strong>an</strong>s “attention slave”get ready for a comm<strong>an</strong>d.“ON YOUR TOES” -- is a prepara<strong>to</strong>ry comm<strong>an</strong>d that will be usedthroughout <strong>an</strong> entire system.“IF YOU PLEASE SIR” -- From Wizard of Oz, slave says this like “yes, sir.”3-tap code for access“FOLLOW THE SNAPS”, “LISTEN AND OBEY OUR COMMANDS”, “THIS ISFOR YOUR OWN GOOD”“FIDDLER” = code <strong>to</strong> take one <strong>to</strong> Never Never L<strong>an</strong>d“PUPPET MASTER” -name of master for Marionette or Puppet program“DADDY” -master “DADDY’S FRIEND” -- a user of slave approved bymaster “PAPA” - master, “WHITE RABBIT -- master“YOU’LL SPEAK MY WORDS WHEN I PULL YOUR STRINGS.” Puppetprogramming control of what slave will say.“SPILL IT” -- trigger comm<strong>an</strong>d ordering slave <strong>to</strong> speak“SILENCE” -- order me<strong>an</strong>s keep quietMr. Rogers Neighborhood’s “L<strong>an</strong>d of Make Believe” was used for theprogramming code script:“I AM MR. ROGERSAND I HAVE PUPPETS, TOO115


I PULL ALL THE STRINGSAND I PULL STRINGS ON YOU.”Twinkling of the nose -- Bewitched programming <strong>to</strong> cast spell or orderon slave.“(name of alter), YOU WILL COME FORTH AND OBEY.” or “...OBEY ANDCOME FORTH.” Another basic way of getting <strong>an</strong> alter would be simply<strong>to</strong> spin the person <strong>an</strong>d call out the alter’s name, or <strong>to</strong> snap the fingers<strong>an</strong>d call out the name of a front alter.Access is accomplished for a number of <strong>Illuminati</strong> slaves by amessage via phone or letter, then a looking glass person takes thesystem <strong>to</strong> a location outside of the house, maybe simply <strong>to</strong> thesidewalk, there the person is picked up. <strong>The</strong> left h<strong>an</strong>d is then grasp onthe soft part of the h<strong>an</strong>d between the thumb <strong>an</strong>d forefinger by twofingers very tightly. This pulls up <strong>an</strong>d alter with <strong>an</strong> egg in its lap. <strong>The</strong> eggis then opened via a code <strong>an</strong>d the imps inside the egg <strong>to</strong>communicate <strong>to</strong> the ribbons <strong>an</strong>d the computer.Access phone calls <strong>to</strong> slaves may have high-speed codestr<strong>an</strong>smitted that trigger the slave subliminally without their consciousawareness.Access <strong>to</strong> some people is done with computer like jargon “ON LINE”“ACCESS, (then identification), (then color code), (then name)” “,“ENTER”, “RUN”. Some Systems have their triggers all in computer lingosuch as COMMAND MODE--ALL DISK DRIVES AND HARD DRIVES...ERASE.. .FORMAT DRIVE...COPY....UNDELETE PURGED MEMORY DRIVE...”Where some of the newer slave programmers are also computerprogrammers they enjoy tr<strong>an</strong>sferring their computer lingo <strong>to</strong> use incontrolling their programmed slaves. <strong>The</strong>y may even throw in some FAXlingo such as “DIAL ALL REMOTES. . . INITIALIZATION - ATSO -OHOaM(HANDSHAKE BETWEEN ALL REMOTES), HANDSHAKE COMPLETED.”<strong>The</strong> color of the car <strong>to</strong> pick up a System may relate <strong>to</strong> the colorcoding of the alters <strong>to</strong> be picked up, such as white exterior, blueinterior for a white alter-then blue alter access sequence.116


Basic Internal Emergency Color Codes for a System, there are severaldifferent “CODE RED’s, etc. not just one in a slave, what follows is notthe complete information about the Codes, although it is possiblesome slaves have a simplified version like this:“CODE GREEN” -- Dr. Green’s suicide programming, tied <strong>to</strong> “no-talk”programming. “CODE BLUE” --Victim’s body freezes in motion <strong>an</strong>dc<strong>an</strong>’t move until <strong>an</strong>other code is given.“CODE RED” -- Victim gets <strong>an</strong>gry <strong>an</strong>d violent “CODE RED” -AnotherCode Red has the st<strong>an</strong>dard Monarch me<strong>an</strong>ing, “serious self-destruct”program“CODE YELLOW” -- Victim gets jealous, <strong>an</strong>gry <strong>an</strong>d w<strong>an</strong>ts <strong>to</strong> violently geteven“CODE BLACK” -- <strong>Used</strong> <strong>to</strong> get victim’s <strong>to</strong> get on their ritual clothes.“CODE WHITE” -- Code <strong>to</strong> protect the cult members from arrest. Whenpolice see the Code White they treat the people as un<strong>to</strong>uchable.<strong>The</strong>re are code words for <strong>Illuminati</strong> members <strong>to</strong> tell police <strong>an</strong>d judgesthat will au<strong>to</strong>matically get them set free. Masonic h<strong>an</strong>dshakes <strong>an</strong>dcodes also work well with judges, police & govt. workers.“CODE 911” -- To activate the slave for <strong>an</strong> emergency calling forsuperhum<strong>an</strong> strength. Certain alters will have extra strength.“CODE 911” -- Also used with st<strong>an</strong>dard Monarch me<strong>an</strong>ing of “Call yourprogrammer/h<strong>an</strong>dler”.“DISARM” (3x) -- <strong>to</strong> get rid of a d<strong>an</strong>gerous alter two snaps +“SHUTDOWN” -- <strong>to</strong> shutdown <strong>an</strong> alter.“LET THE KINGS BE KINGS, LET THE BANKERS BE BANKERS, LET THE PRIESTSBE PRIESTS -- saying <strong>to</strong> justify their Master-slave relationship <strong>to</strong> the massesof hum<strong>an</strong>ity.<strong>The</strong> Sun setting the following day was used as a trigger for slave <strong>to</strong>forget events. For the cat alters a certain word is given <strong>to</strong> trigger them<strong>to</strong> go “over the rainbow” after <strong>an</strong> event in order for them <strong>to</strong> forget it.“FROM THE RISING OF THE SUN TIL THE GOING DOWN OF THE SAME” --programmed in by using the scripture. “GO INTO THE SEA OFFORGETFULNESS” --a hypnotic structure in the mind <strong>to</strong> forget. Waterfallsare also used as a hypnotic image <strong>to</strong> forget pain <strong>an</strong>d memory.117


“RETYPE A LETTER” -reprogram, “JEWELS” = programs. “THE CATS & THEFIDDLE NEED TUNED UP--Slave <strong>to</strong> h<strong>an</strong>dler, I need reprogrammed.<strong>The</strong>re are three words <strong>to</strong> trigger a suicide program - 1. Bait, 2.[intentionally left out], 3. hook Another suicide program trigger is whenthe dominoes fall. “GO OVER THE BLUFF” (3X)- causes suicide in somealters SACRED HEART = Catholic/Jesuit suicide program Some suicideprograms are set off with a long <strong>to</strong>ne over the phone along with acode no.“KERMIT THE FROG” --a type of access code. “KERMIT” may be a coderelating <strong>to</strong> computers, because Kermit is the universal l<strong>an</strong>guage forconnecting computers <strong>to</strong>gether. It is a single st<strong>an</strong>dard <strong>to</strong> exch<strong>an</strong>gefiles between <strong>an</strong>y two systems.All memories, traumas, <strong>an</strong>d <strong>to</strong>rtures are coded. Body programs arecoded. One set of body programs uses Hebrew, Greek, <strong>an</strong>d Druidicletters.A clone program creates clones of <strong>an</strong> alter (also called lollipop orlobster program) imagery is that sesame seeds fall off of a hamburgerbun <strong>an</strong>d becomes <strong>an</strong>other hamburger.Codes <strong>to</strong> all the various basic systemsCarousel 532342223Castle System 221435321Communication 311146623Double Helix 432443321Level 211343231Mensa System 323542321Pentagram 421136113Pool of Death 231134421118


Puppet 341124321Sole metric 665421134Spider Web 321654321Stairwell 432111132Quabala 423454334Tornado 332146444Umbrella System 314321014Alice In Wonderl<strong>an</strong>d<strong>The</strong> White Rabbit is a programming figure for Alice In Wonderl<strong>an</strong>dProgramming who will allow you <strong>to</strong> go <strong>to</strong> otherwise inaccessible placesfor adventure. He represents the master. <strong>The</strong> White Rabbit is <strong>an</strong>import<strong>an</strong>t figure <strong>to</strong> the slave.White rabbit gives a wafer (coke-sugar-cocaine) <strong>to</strong> Alice <strong>an</strong>d says “EATME” or “EAT IT AND I’LL TAKE YOU THROUGH THE DOOR” -- takes masterin<strong>to</strong> closed part of System, or perhaps over the rainbow.<strong>The</strong> Queen of Hearts is also <strong>an</strong> import<strong>an</strong>t figure for comm<strong>an</strong>ds in theLooking Glass World which the slave enters upon comm<strong>an</strong>d. When adeep slave alter is needed <strong>to</strong> perform they are sent in<strong>to</strong> the lookingglass world where a looking glass person carries out the comm<strong>an</strong>d--butin a way that reality is thought <strong>to</strong> be a dream. In other words, this is aprepara<strong>to</strong>ry comm<strong>an</strong>d <strong>to</strong> get the slave ready for abuse.“USE THE KEY. PUT IT IN THE LOCK. TURN. OPEN THE DOOR...AND STEPTHROUGH A WINDOW [or MIRROR] INTO NEVER NEVER LAND.”“SOMETHING IN LIGHTENING TO TRANSPORT YOU FASTER THAN THE OL’RUBY SLIPPERS. CLICK YOUR HEELS TOGETHER AND BE THERE IN A SNAP.(SLAVE CLICKS HEELS) ELECTRIFYING .... WITH THE RUMBLE OF THUNDER.BOLTING THROUGH TIME ... SO YOU WON’T BE LATE ... FOR A VERYIMPORTANT DATE.” (Alice in Wonderl<strong>an</strong>d Programming) (This is thewording <strong>to</strong> use deep alters.)119


Cinderella Program. <strong>The</strong> code word involves something said aboutthe stroke of midnight.<strong>The</strong> Melting Pot Program. A very powerful program is activated bymelting the slave in<strong>to</strong> his master. <strong>The</strong> slave will do <strong>an</strong>ything for themaster with this program. <strong>The</strong> melting is the ecstasy that is occasionallyexperienced when lovers having sex seem <strong>to</strong> melt in<strong>to</strong> each other. Thisfeeling of ecstasy-melting is programmed <strong>to</strong> release when the mastersays these words, “MELT INTO YOUR MELTED MIRROR FOR ANELECTRIFYING RIDE. LOOK DEEP INTO THE BLACK OF MY MELTINGMIRROR EYES. SEE YOU REFLECTING ME, REFLECTING YOU, REFLECTINGME, REFLECTING YOU, REFLECTING ME, REFLECTING YOU, REFLECTINGME, REFLECTING YOU ... (cont. this several times) UNTIL WE MELTTOGETHER AND SINK DEEP... [words omitted] INTO THE OTHER SIDE.”“MELT INTO MY MIRROR, YOU LOOSE YOURSELF INTO THE POOL OFLIQUID MIRROR, STEP INTO THE LOOKING GLASS, SINK DEEP WITHIN ITSPOOL, AND STRADDLE THE DIMENSIONS IN TIME. I’LL SEE YOU THERE ...ALONG WITH MY FRIENDS”“SEE IT THROUGH THE LOOKING GLASS” -- infinity mirror programminginvolving mirror image people (alters)“LOSE YOURSELF IN THE INFINITY MIRRORS.”Wizard of Oz<strong>The</strong> Yellow Brick Road is the script or programmed set of instructionsone must follow. It also serves as a runway for alters <strong>to</strong> take off fromtheir internal world <strong>an</strong>d take the body. “FOLLOW THE YELLOW BRICKROAD”<strong>The</strong>re is a code <strong>to</strong> get through the poppy field (tr<strong>an</strong>ce state). Somealters <strong>to</strong> get through the poppy field need <strong>to</strong> put on a new dress <strong>an</strong>d <strong>an</strong>ew image. <strong>The</strong> poppy field may be called “the field of forget-menot”.In this way it is linked <strong>to</strong> the daisies of Dr. Green. To get in<strong>to</strong> thepoppy field is easy, it is “SLEEP, SLEEP, SLEEP”, see other inductionmethods on <strong>an</strong>other page.“THERE’S A PAIR OF MAGIC SHOES TO WEAR WITH YOUR DRESS...SOMETHING IN LIGHTNING...TO TRANSPORT YOU FASTER THAN THE OL’120


FURRY SLIPPERS.”When the slave is finished being used they return from Never NeverL<strong>an</strong>d <strong>to</strong> K<strong>an</strong>sas. To do this they are <strong>to</strong>ld: “CLICK YOUR HEELS ... THERE’SNO PLACE LIKE HOME.” <strong>The</strong>y might be reminded “YOU’RE NOW GOINGOVER THE RAINBOW TO THE OTHER WORLD.”Tin M<strong>an</strong> programming -- <strong>The</strong> Tin M<strong>an</strong> programming is all purposeversatile program for what ever the master needs done, it me<strong>an</strong>s thatthe slave is a well oiled machine. Sometimes the slave is reluct<strong>an</strong>t <strong>to</strong> doa job but he is being <strong>to</strong>ld that he is a well oiled machine. <strong>The</strong> exactwords may vary with the mission, but the following are exact words,“LEAVE YOUR SHELL. ACTIVATE: MACHINE. COUNT DOWN ONE TOTIN....” “SOON WE’LL HAVE YOU PURRING LIKE A WELL OILED MACHINE.ALL OF YOUR MOVING PARTS ARE PIVOTAL AND GLIDING WITH EASE.MELT INTO MY HANDS. TAKE MY COMMANDS. I’LL HOLD YOUR JAW TOKEEP IT FROM SLIPPING WHILE YOU SLIP THROUGH A WINDOW IN TIME.”Program code for slave <strong>to</strong> shatter their memory of <strong>an</strong> event (used withelectroshock): “MIRROR MIRROR ALL AROUND ON THE CEILING ON THEGROUND, SPINNING FASTER ROUND AND ROUND. ARE YOU UP OR AREYOU DOWN? ARE YOU DOWN OR ARE YOU UP? IT REALLY DOESN’TMATTER. BECAUSE WHEN THIS MIRROR BUBBLE BURSTS, EVERYTHING WILLSHATTER.”“GO KEY WEST IS KEY -- several slaves have this code, related <strong>to</strong> Sen.Byrd & Oz prgmg. GALAXY programming (for the end times) is alsoconnected <strong>to</strong> the Oz programming.In upper level <strong>Illuminati</strong> slaves Dorothy in the Oz s<strong>to</strong>ry will represent theMother of Darkness alters, Ozma will represent the Ruler of the Castle,<strong>an</strong>d Glinda will have the Great Book of Records. <strong>The</strong> ring of Glinda(from Glinda of Oz, p. 16) gives protection.Body Programs· Control program. See Omega Programming- Universal FunctionCodes for internal system codes for body programs. Sometimes thesebody programs are filed with a combination of hebrew <strong>an</strong>d zodiacsigns. Greek letters are also file no.s of at times of body programs. Riversof blood -circulation control program. This program <strong>to</strong>tally controls the121


circula<strong>to</strong>ry system. <strong>The</strong> victim may think they are losing lots of blood &go in<strong>to</strong> heart failure. Oc<strong>to</strong>pus- str<strong>an</strong>gulation suicide program <strong>The</strong>internal defenses consists in part of body programs that are triggered ifthe <strong>Mind</strong>-controlled slave steps out of line. Here is a good list of some ofthese body programs each of which has its own codes:Audi<strong>to</strong>ry problems, Blood flow/circulation, Burning as if on fire, Digestivefailure, Headaches-split brain, Heart failure, Histamine production,Optic problems, Respira<strong>to</strong>ry failure, Sleep deprivation, Sleepingprogram, <strong>an</strong>d Temperature ch<strong>an</strong>ge. <strong>The</strong> suicide programs that c<strong>an</strong> gooff include Armageddon, Clowns cutting, Cutter program “Pain isLove”, Disembowelment, Drug overdose, Gethsem<strong>an</strong>e, “Hypnosleep”,Injection of bleach (poison), Oc<strong>to</strong>pus, Red Sea, Shooting Programs(shotgun, russi<strong>an</strong> roulette, shooting family, etc.), War in the Heavens &Wrecking the car. Along with the suicide programs that c<strong>an</strong> betriggered are programs that jerk the victim’s mind every which way,which include: Bee Stinging Program (put in by placing the druggedvictim being near large swarms of bees humming & then letting abee(s) sting the victim), Busy Cle<strong>an</strong>ing Program, Crazy program,Flooding (from Atl<strong>an</strong>tis), Isolate & Hibernate Program, Memory ErasureProgram, Pain Programming, Paper Doll Program, Protection by tr<strong>an</strong>ce,Revolving switching, Scrambling Program, <strong>an</strong>d re-StructuringProgramming, Tumbleweed program, Waterjar Shaking program (Ahabs<strong>to</strong>mping the grapes Bible-based program making mush out of thebrain.)Cutting programs are often hidden behind the Bee Swarming program.Alpha <strong>an</strong>d Omega is a strong program. Sometimes saying “ALPHA &OMEGA” helps alleviate headaches.DNA (This uses a lot of number codes.) This is a double-helix which isused as <strong>an</strong> eleva<strong>to</strong>r shaft running down through a system. Numbers areused <strong>an</strong>d the names of cities <strong>to</strong> go down the eleva<strong>to</strong>r shafts. Thisprogramming is said <strong>to</strong> be done in hospitals.Card Codes -- Regular playing cards have developed from theoccult Tarot cards. <strong>The</strong> four suits correspond <strong>to</strong> magick, the spadesme<strong>an</strong> the power from the spear of destruction, the diamond me<strong>an</strong>s isa double pyramid or demonic power of wealth, <strong>an</strong>d the club is aclover me<strong>an</strong>ing fortune <strong>an</strong>d fate, <strong>an</strong>d the heart me<strong>an</strong>s devotion <strong>an</strong>dloyalty. <strong>The</strong> four suits work well in programming because <strong>an</strong>ything thatis broken down in 4’s or a multiple of 4 c<strong>an</strong> be coded with cards.Anything that c<strong>an</strong> be broken down in<strong>to</strong> 12’s or 13’s c<strong>an</strong> be given cards<strong>to</strong>o. Since clocks work off of 12’s, card codes work well with clocks. <strong>The</strong>suits c<strong>an</strong> denote seasons. With Jokers one gets 13 cards per suit withfour suits gives 365 unique symbols <strong>to</strong> denote the days of the year.122


Dominos c<strong>an</strong> also be used on a base 13 code system. <strong>The</strong> bl<strong>an</strong>k willequal 13.Carousel System. <strong>The</strong>re is a back side <strong>to</strong> enter the Carousel.Carrier Pigeon (slave’s who send coded or uncoded messages)<strong>an</strong>d their contact codesBirds used for contacts. That is birds in cages are often used as a sign ofa meeting place. <strong>The</strong> contact would say “What did the bird say?” or“A little bird <strong>to</strong>ld me ...,<strong>The</strong>n the courier pigeon delivers her message.‘‘I’ve come a long long way <strong>to</strong> see you. words <strong>to</strong> say by System <strong>to</strong>John or <strong>to</strong> person <strong>to</strong> be met. <strong>The</strong>re is <strong>an</strong> endless variety of contactphrases <strong>to</strong> indicate that the right person has met the right person.Sample Code for passing drugs-“RHINESTONE COWBOY” <strong>to</strong> which theresponse from the slave would be “I’M NOT A COWBOY, I’M ACOWGIRL.”Emerald ear rings have been the visual signal <strong>to</strong> cus<strong>to</strong>ms agents <strong>to</strong>allow a person carrying drugs through cus<strong>to</strong>ms. (SEE D. DELTA fordeeper Carrier Pigeon codes.)Castle System.May need a special ring worn by <strong>an</strong>d turned by the h<strong>an</strong>dler.Flower’s Program.CSP94OYP587 -- code <strong>to</strong> designate a flower tieing 3 generations.UMBRELLA PROGRAM CODE -- “R x 4 x 5Y58876”Sample correspondences of Gem codes:1 - Aries - diamond2 - Gemini - <strong>to</strong>paz3 - C<strong>an</strong>cer - cat’s eye4 - Leo - ruby5 - Virgo - emerald123


6 - Libra - opal7 - Scorpio - amethyst8 - Sagittarius - turquoise9 - Capricorn - black onyx10 - Aquarius - crystal11 - Pisces - sapphirePotter’s Wheel“STAND IN ORDER ACCORDING TO RANK AND SERIAL NO.”- part of astacking comm<strong>an</strong>d <strong>to</strong> get alters in sequence <strong>to</strong>gether <strong>to</strong> work onthem. Dominoes <strong>an</strong>d cards are used as part of the stacking cues.Dr. Star’s Programming which places Pentegrams in<strong>to</strong> people uses Sigilsas codes--the occult symbols for the various demons, along with acolor, a gate, <strong>an</strong>d a number form a complete code.For example, 1st Gate is the god N<strong>an</strong>na, #30, color-SILVER, LADDER OFLIGHTS, GOD OF THE MOON. (see Illustration)To access a System the abusers often have <strong>an</strong> object as part of thepickup code, such as a set of car keys, a special coin <strong>to</strong>ken, a businesscard, jewelry, or certain clothes or packages. A Popper liquor drink isknocked 3 times on the table when it is served. (Who would be thewiser that three knocks is <strong>an</strong> access code?)124


WORD MATRICESA word-matrix code is where the victim is given two lists of words <strong>an</strong>dthen each word on the left list is paired with a word on the right list <strong>to</strong>form a code.R<strong>an</strong>dy Noblitt, a therapist, gave <strong>an</strong> example of a basic pattern for aWord-Matrix. And this is simply quoted from his example <strong>to</strong> give thereader <strong>an</strong> idea.startedxenophobebetween thoughtsendlessbeginningthroughout foreverget outtrepidationoverbeneathfunexecutewinlosefirstthenformbenignbeginningend<strong>to</strong>night last morningthoroughthe endB. BETA (sexual)SEXUAL ALTERS -- most of the following codes are for deep sexualalters. In <strong>Illuminati</strong> Systems these are called Beta alters, in CIA systemsthey create Beta models whose primary function is <strong>to</strong> provide sex,usually perverted sex <strong>an</strong>d S&M for the perverts who run our secretgovernment <strong>an</strong>d visible government. BETA models are those who areprimary job is sexual, such as service as a Presidential Model (sex slavefor a President). <strong>The</strong>se System models are numbered BETA 1, BETA2...BETA 601, etcDomino codes for spinners c<strong>an</strong> be 6-3, 6-4, 8-4, 8-5, 10-5, 10-6, 12-7,12-8. <strong>The</strong> 13th kitten then would be left bl<strong>an</strong>k. Spinner dominos havespinner kittens off of them, when a spinner domino code is used. In thiscase 6-2 could take you <strong>to</strong> the Beta level.125


“10 LITTLE INDIANS, 9 LITTLE INDIANS...”, “1 LITTLE, 2 LITTLE.. .“--assoc. w/morse code-call back telephone no.s. “3 LITTLE KITTENS HAVE LOST THEIRMITTENS...” -<strong>The</strong> Kitten alters have stepped outside of theirprogramming <strong>an</strong>d need fixed by the Master.“Hotel California” me<strong>an</strong>s a place <strong>to</strong> have sexual gratification.Stroking under chin along with “HAVE A BALL TON IGHT” (Cinderellaprogramming) Stroking under the chin along with “PURR FOR MEKITTEN.” Magic shoes or red slippers are used <strong>to</strong> switch <strong>to</strong> get specificsexual alters. <strong>The</strong> slippers are clicked 3x <strong>to</strong> get deeper sexual alters.“COME HERE MY KITTEN, AND LET ME PET YOU. PURR FOR ME NOW...THAT’S A FLUFFY KITTEN. PURR DEEP.” “COME HERE LITTLE ONE.”--call foryoung sexual alter“PASSION” used 3x with other words as a sexual trigger, such as “SHOWME YOUR PASSION.” Passion is a strong program word for sex.“RED DOT, SPIN SPIN SPIN, BECOME ANOTHER PERSON.” this is said <strong>to</strong> amother kitten before she is <strong>to</strong>ld which spin kitten <strong>to</strong> get from her litter. Itis a prepara<strong>to</strong>ry comm<strong>an</strong>d me<strong>an</strong>ing “call your spinner”.Spin Kittens “WE GOTTA GET DRESSED.. .IN 5 MINUTES” along with beingspun produces specific sexual kitten.9 lives of kittens -- me<strong>an</strong>s 9 sexual alters taken in sequence. When spunin a counterclockwise fashion, the sexual menu is from 1 <strong>to</strong> 9. With 3 & 5being oral sex. “Heat of hell” are used as trigger words in thisprogramming. <strong>The</strong> 10th revolution is <strong>to</strong> beg <strong>to</strong> be whipped. “TURNAROUND 10” “SPIN FOR ME.” <strong>The</strong> heat of hell ignites after the 6th spin.“RIDE PONIES”--me<strong>an</strong>s <strong>to</strong> do sex for both eng. & ger. slaves; “PLAYHORSEY--sexual games; “MOUNTING A HORSE”--[obvious] “CAT NAP” --sex; “CAT NIP -- cocaineTweedle Dee <strong>an</strong>d Tweedle Dum --S&M programs involving mirror imagealters. Not <strong>to</strong> be confused with Humpty Dumpty self-destruct program.“SIX IS SEX. SEVEN IS HEAVEN. EIGHT IS GREAT. NINE YOUR MINE.”--Thisme<strong>an</strong>s <strong>to</strong> fall under the master submission, has sexual over<strong>to</strong>nes.“ITSY BITSY BOOB” -- access code pertaining <strong>to</strong> Betty Boobprogramming (which is a certain type of female behavior).For Beta alters the codes may be:126


“BETA ONE MARY A=1, B=2, C=3, D=4”“BETA TWO MARY A=4, B=3, C=2, D=1”“BETA THREE MARY A=3, B=4, C=1, D=2”<strong>The</strong>n these might be said in combination “3412 4321 1234” (x3)An amer. sys. used w/ Latin Amer. may have a Beta alter activated bythe movement of 2 small Mexic<strong>an</strong> flags & a code word in sp<strong>an</strong>ish“USTA CA-NATA” (cream).C. CHI (return <strong>to</strong> cult)Chi programming uses a lot of idiosyncratic phrases, <strong>an</strong>d little ditties.Some of the nursery rhymes listed in the song section will be Chiprogramming. Some of the Chi programming has been listed in theAlpha programming section.D. Delta (assassination)Delta alters --are activated <strong>to</strong> kill by the following three things: seeingspecific clothing, items held in a persons h<strong>an</strong>d, <strong>an</strong>d particular words.Since these items would specific for a particular murder there is noparticular specifics that c<strong>an</strong> be given.Courier Pigeon -- Alters (In <strong>Illuminati</strong> systems--these are Delta-Betaalters). “FLOCK” --word me<strong>an</strong>ing the stable of carrier pigeons of DIATo turn a Genie free, pop a cork: “TURN YOUR GENIE FREE...POP ACORK.” An internal controller must activate the umbrella or geniebottle pop the cork program <strong>to</strong> release a delta or delta-beta alter.“YOUR WISH IS MY COMMAND” I Dream of Je<strong>an</strong>nie Programming“YOU-ARE-WHAT-YOU-READ” passbook program. Programming <strong>to</strong>127


emember b<strong>an</strong>k numbers <strong>an</strong>d other specific numbers.“I SENT A MESSAGE IN A BOTTLE.”Distinctive jewelry & clothes. Emerald ear rings used as a signal <strong>to</strong>others that a message was being carried. Emeralds me<strong>an</strong> drugs, rubiesme<strong>an</strong> prostitution, diamonds (rhines<strong>to</strong>nes) presidential model work.Red, White & Blue worn sometimes by presidential models. High levelreporting alters forget their messages with “REFILE # #, (name of alter).”Some Systems have one name w/ several different numbers attached<strong>to</strong> indicate alters within one area <strong>an</strong>d purpose. Serge<strong>an</strong>t 1, up <strong>to</strong>Serge<strong>an</strong>t 60. Or say “Access 1143 Marcy” & then other Marcys arenumbered with other numbers. Spaceships & flags are assoc. w/Sarge<strong>an</strong>t alters.Delta Black Widow alters have a web, f<strong>an</strong>gs, poison, eggs, <strong>an</strong>d silkstr<strong>an</strong>d connec<strong>to</strong>rs. Viper is the demon associated with Black Widows,<strong>an</strong>d they are programmed <strong>to</strong> re-connect their str<strong>an</strong>ds if all of theconnec<strong>to</strong>rs are not taken out.Index finger pointed at head me<strong>an</strong>s russi<strong>an</strong> roulette.E. EPSILON (<strong>an</strong>imal alters)<strong>The</strong>se codes aren’t known. One method that may be used, forinst<strong>an</strong>ce, is for the Raven alters who are <strong>to</strong> tear the body’s flesh, thes<strong>to</strong>ry of Noah’s ark where he sent the Raven out will be paired with theword TWIG, <strong>an</strong>d a code formed from TWIG. <strong>The</strong>re are some alterswhich are <strong>to</strong> actually act like <strong>an</strong>imals, <strong>an</strong>d their codes somehow tie inwith what they are.F. OMEGA (internal computers)<strong>The</strong> Omega programming works along with <strong>an</strong> Executive Control Board(or Gr<strong>an</strong>d Druid Council) <strong>an</strong>d Internal programmers. <strong>The</strong> ExecutiveControl Board is associated with both numbers of the clock, <strong>an</strong>dprecious gems <strong>an</strong>d metals such as “9 O’CLOCK GOLD”. <strong>The</strong> Beastcomputer c<strong>an</strong> be accessed with Scripture triggers associated with theVision of D<strong>an</strong>iel of the Beast, <strong>an</strong>d its ten <strong>to</strong>es. <strong>The</strong> Ten Toes are128


import<strong>an</strong>t part of the code in some models.UNIVERSAL CODE FOR ACCESS TO INTERNAL COMPUTERSKey m<strong>an</strong>ual -- 33123113211Program computer -- 22133113332 function computer 11123132221Ren computer -- 13321321332-55434232312 L\S 55434232312 reenlistReprogram no.s -- 2231231; 4432312; 33231223An input code is 666fff666fff666 the reverse of this code isF6F6F6F6F6F6F6F6F6F6F6. One victim’s computer r<strong>an</strong> on code “WARGAME”. Some Beast computers have 666 666 666 as <strong>an</strong> access code<strong>an</strong>d 999 999 999 as a beast back out <strong>an</strong>d close out code. <strong>The</strong>re arevarious computers--one on each level. <strong>The</strong>se have some st<strong>an</strong>dardcodes <strong>an</strong>d some individual codes.UNIVERSAL FUNCTION CODES -- COMPUTER CODE -- 5543423231 2 whichhold the following codes:abduction 4511321<strong>an</strong>ger 4213261assignment coordina<strong>to</strong>r 1613212assassination 5332135b<strong>an</strong>k of lies 3124532blindness 2566553brain disorder 6325512body gesture 1332221body functions 4311322call back ritual 6664113129


child control 3214441circle in fields 3332241confusion 6643252control 4321341deaf 3324553death 1451621denial 2311444despair 3223412dis<strong>to</strong>rtion 6233322disorder of bones 4561321disorder of breathing 5532111disorder of eating 3342136division 3211652false memories 3314532fear 2665132fleeing 5613354game playing 1561321guilt 4321231hatefulness 5331241hopelessness 1112364illness 1566432infiltration 2231335ins<strong>an</strong>ity 2144312inside reporters 1133265130


loyalty <strong>to</strong> group 3364112mute 2213541murder 3221456nonsense 2665443outside reporters 1132256reprogram others 4555643reprogram self 1133432respond <strong>to</strong> triggers 4441221retardation s- 1314555m- 1314556sabotage 1135461seduction 2134121self body harm 3321343sex 2116652shame 3122115suicide 3113246trigger 1324652trigger others 4442211zombie 3321556Under each of these codes, other codes may be attached. Forinst<strong>an</strong>ce, under Body Gestures, the following functions are coded <strong>an</strong>da sample coding scheme would look like this:talk verbally 3456343131


<strong>to</strong>uch chest 2322132<strong>to</strong>uch hair 3323221<strong>to</strong>uch mouth 5434232<strong>to</strong>uch nose 5443232Rainbow <strong>an</strong> alter which speaks only in rhymes. Ribbons are in a boxwith Rainbow. A ribbon might be accessed by several slaps on theface <strong>an</strong>d “Rubicon 2,4,6,8...” (3x)Hickory Dickory Dock rhyme is associated with the vortex which istied <strong>to</strong> turning the system <strong>an</strong>d also <strong>to</strong> some death alters.Dominoes set off flooding programs <strong>to</strong> overload the person.Program numbers on some slaves are put in by <strong>to</strong>uching the thirdeye with the index finger <strong>an</strong>d speaking the number.G. GAMMA (demonology)In Sat<strong>an</strong>’s realm, demons are fathered or split off in families like altersare. <strong>The</strong>re will be a Moloch number 101, <strong>an</strong>d a Moloch 10,321. <strong>The</strong>victim has alters which are numbered such as Sally 1 <strong>an</strong>d Sally 10. For abetter underst<strong>an</strong>ding of this area of programming see Chapter 10section I. Gamma Programming includes all the demonic activity. Inthis section one c<strong>an</strong> add the Kabballa’s Tree of Life which hasalphabet codes, back up programs <strong>to</strong> regenerate, associated withGreenbaum or Greentree. In the <strong>Illuminati</strong> slaves, the deeper parts oftheir system are ritual <strong>an</strong>d the demonology pertains <strong>to</strong> the variousrituals that are done. <strong>The</strong> following is a sampling of <strong>Illuminati</strong> rituals. <strong>The</strong>blood rituals are used <strong>to</strong> attach demons <strong>to</strong> possess alters in a particularway. <strong>The</strong>se rituals c<strong>an</strong>’t be separated from the programming. <strong>The</strong>y arepart of the programming.132


Ceremonies:Assembling of the Quarter RegentsBeltaine -- with hunts of slaves, fire festivals, <strong>an</strong>d blood ritualsBride of Sat<strong>an</strong> Ceremony -- (Mar. 24)Demon revelsDrawing down the moonDruid Feast Day -- on J<strong>an</strong>. 1Duels <strong>to</strong> the death -- like gladia<strong>to</strong>rs where the heart is cut out <strong>an</strong>deaten<strong>The</strong> Grail MassGr<strong>an</strong>d Climax -- hum<strong>an</strong> sacrifice & sex ritualsInvocation of Hecate as CroneLammas sabbat -- where a female is sacrificedPathworking -- (done before 16 with Cabalistic Tree of Lifepathways.)Rite of DeificationRod of Light ceremony -- (consists of text from Cabala, blackc<strong>an</strong>dles, ram’s horn blown, <strong>an</strong>d victim’s mother’s name sounded)Sealing ceremony -- at 19 yrs. for Mothers of Darkness levelSecrethalf white.ceremony -- where people paint their faces half black <strong>an</strong>dSister of Light rebirthing water ceremony -- (victim is bound <strong>an</strong>d thenpulled from water <strong>an</strong>d wrapped up in linen, <strong>an</strong>d a green br<strong>an</strong>ch isplace on the chest)St. Agnes EveSt. Bartholomew’s DaySt. Walpurgis133


Summer Soltstice OrgyFor those who are not familiar with occult terms the following are ritualitems: Paten (the holy dish), Athame or Glaive (the knife used <strong>to</strong>sacrifice with), the w<strong>an</strong>d or sceptre (a ornamental staff whichrepresents authority & usually has <strong>an</strong> electric shock), <strong>an</strong>d the censer (<strong>to</strong>distribute burning fragr<strong>an</strong>ce).H. HYPNOTIC INDUCTIONS‘‘Kaleidoscope eyes’’ -- used in hypnotic induction <strong>an</strong>d spinning“20, 19, 18, 17, 16, 15, 14, 13,...1”For m<strong>an</strong>y slaves the sign of sat<strong>an</strong> done with the fingers puts them in<strong>to</strong> atr<strong>an</strong>ce, <strong>an</strong>d deeper alters come out.“100, 91, 82, 73, 64, 55, 46, 37, 28, 19, 10, 1”Touching the head in a particular fashion is done. ‘‘DEEPER ANDDEEPER AND DEEPER DEEPER AND DEEPER AND DEEPER, DOWN, DOWN,DOWN, INTO THE DEEP, DARK VELVETY MIST, DEEPER AND DEEPER ANDDEEPER.”“DEEP, DEEP, DEEP, SLEEP, SLEEP, SHEEP, SHEEP, SHEEP” SLEEP,“YOU’RE BEAUTY WARMS MY EMBERS. SEE THEM GLOWING DEEP WITHINTHE DARKNESS OF MY EYES... IGNITING INTO FLAME... BLACK FLAME.”Seeing a H<strong>an</strong>d of Glory (severed left h<strong>an</strong>d) will induct people in<strong>to</strong> PeterP<strong>an</strong> programming. (Books describing the occult use of the H<strong>an</strong>d ofGlory in Irel<strong>an</strong>d go back <strong>to</strong> 1830. It is <strong>an</strong> <strong>an</strong>cient practice. BaringGould’s book Curious Myths of the Middle Ages describes the recipefor using the h<strong>an</strong>d of glory as a gruesome l<strong>an</strong>tern during the witchcraf<strong>to</strong>f the Middle Ages.)“I AM THE SAND MAN, AND BLOWSAND IN YOUR EYES” said whilesimult<strong>an</strong>eously moving the h<strong>an</strong>d over the face <strong>to</strong> create the illusion ofplacing s<strong>an</strong>d in the eyes.134


“3-2-1, 3-2-1, 2-1-1, 1-2, 1, You are now relaxed.”Lights, in certain colors <strong>an</strong>d sequences, have been used <strong>to</strong> tr<strong>an</strong>cealters out, for inst<strong>an</strong>ce a flashing red light may tr<strong>an</strong>ce certain alters out.Tunnels were used as a powerful hypnotic suggestion. Bear in mind,that people induct a. when phys. or mentally relaxed, b. when theirsenses are overloaded or sens. deprivation, c. when their equilibrium isdisturbed, d. their motion is restricted or e. their eyes are fixated onsomething.I. JANUS-ALEX CALL BACKS (end-times)Main link <strong>to</strong> a System’s programs <strong>to</strong> ALEX coded 44334223112.Scramble code <strong>to</strong> ALEX is 34424313221. Individual code <strong>to</strong> ALEX =55434232312. Link <strong>to</strong> JANUS coded 3323432123. Report back- X441062FMain JANUS tracking/reprogramming code-JAN US 934100569XXY99632 [x3]; its back up code X44420-61F. (<strong>The</strong>re is a J<strong>an</strong>is 2computer at 666 Connecticut Ave. Washing<strong>to</strong>n, D.C. Disinformation bythe Network is that the PACER computer equipment is calledJ<strong>an</strong>us/J<strong>an</strong>is). Main AMBASSADOR code 67302986ZZ9861 (suicide/fire)sub codes- Fire 97643F4200L; Cut 97642C42DIL L ; Suicide 9762354202L;<strong>to</strong>wards violence 97613V4203LMain EMPEROR - [dot, dot, dot] 79622109MM861 1END-TIME ACTIVATION CODESMost slaves have end-time programming. When a slave is called in withend-time programming they have pages upon pages of codedmessages. A number of Monarch slaves have been de-programmedenough that they beg<strong>an</strong> accessing <strong>an</strong>d spewing out pages <strong>an</strong>d pagesof these activation codes. Part of a sample of one of these is as follows:“ISRAEL IS RISINGACTIVATE 366 UNITED NATIONS900 BLUE BIRD PILOTS RISENATIONS IN PLACERED CHINA CALL BACK135


COUNT DOWN, ACTIVATE ALEX3.7 LC94CIRCLE FARMS AROUND THE SQUAREBRITISH SOLDIERS RISEMOUNTAIN GOAT COMEEASTSIDE OF PEAK39 ACTIVATE52 ACTIVATE42 ACTIVATERED CHINA RISE1.7 ACTIVATETHE HOUR COMES, A. C. SONACTIVATE AFRICAARISE IN NUMBERS OF 90...”A team leader will have a down line of around 4 people--which arecoded red ray, yellow ray, green ray, blue ray. When the activationcode hits a slave team leader during the end times, they will in turnactivate their people, who in turn will have people who are teamleaders <strong>an</strong>d have a down line. At least two false callback alarms willbe sounded (tested) before the real one.J. THETA (psychic warfare)136


K. TINKERBELLE PROGRAMMING (never grow up/alien)Capt’n or Cap’n (captain) represents the programmer in Peter P<strong>an</strong>programming. Tinkerbelle is a young alter created under Peter P<strong>an</strong>programming.‘TRANCE DIMENSIONAL TRAVEL RIGHT FROM YOUR OWN BACKYARD.THE DIMENSIONS OF YOUR PYRAMID ARE TO BE 9 BYE 9 BYE 9 BYE.”Alien programming by NWO (also involves Peter P<strong>an</strong> programming)“RIDE THE LIGHT” -Peter P<strong>an</strong> programming me<strong>an</strong>ing <strong>to</strong> go in<strong>to</strong> hypnoticinduction attached <strong>to</strong> a light that is seen when given a high voltageshock. This is given <strong>to</strong> make experiences seem like in <strong>an</strong>otherdimension.L TWINNING (teams)CROSS PROGRAMMING -- (With for inst<strong>an</strong>ce a mother <strong>an</strong>d a daughterteam)Two seals are placed on this cross programming, a “seal of cover” <strong>an</strong>da “seal of rain”Code: mother - [minus] mother = 3/4 -- daughter holds 1/4daughter - [minus] mother 1/4 -- daughter holds 3/4Teams will be given code words for each alter who is part of a 2-Systemteam. One System may serve as a father figure <strong>to</strong> the other System.Teams will be trauma <strong>an</strong>d sexually bonded, as well as having mirrorimages with each others names. A leader will have <strong>an</strong> upline <strong>an</strong>d adownline for the colored rays. A leader will call the different coloredrays, <strong>to</strong> activate their programming.An <strong>Illuminati</strong> team ritual <strong>to</strong> create oneness & open their team boxes up<strong>to</strong> work <strong>to</strong>gether (<strong>Illuminati</strong> twinning ritual): the team kneels face <strong>to</strong>face, draws a magical circle on the ground, joins Delta team h<strong>an</strong>dsforming a clasp ring. (Blue is associated with this.) then they all say,“Star within a star, Circle within a circle, <strong>Mind</strong> within a mind, body withina body, Soul within a soul.” <strong>The</strong>n the team places Palm, their h<strong>an</strong>ds137


Palm <strong>to</strong> Palm, <strong>an</strong>d then speaks 4 times, “Bone <strong>to</strong> Bone, flesh <strong>to</strong> flesh,Spirit <strong>to</strong> Spirit, Forever <strong>to</strong>gether - never apart.”<strong>The</strong>n a 5 pointed star is traced in the air. To close the Delta teamtwinning box, the reverse is done. <strong>The</strong>n other things are <strong>to</strong> be said in thejoining <strong>an</strong>d opening ritual. A double deck of cards is used <strong>to</strong> program<strong>an</strong> <strong>Illuminati</strong> team of “twins”. One type of Criss-cross programminginvolves 1. a flower, 2. the stem, & 3 the root. <strong>The</strong> root involves bloodsacrifices. This programming ties two generations <strong>to</strong>gether such asmother -[minus] daughter.M. SOLEMETRIC MILITARYN. SONGS & NURSERY RHYMESSongs & Nursery Rhymes <strong>Used</strong> As Triggers (note all of these songs havebeen used on other slaves <strong>to</strong>o.) Songs with Monarch programmingme<strong>an</strong>ing & access parts soliciting behavior or thinking include:NURSERY RHYMESBrahm’s LullabyHickory, Dickory Dock (flips the system)“Hickory, Dickory Dock, <strong>The</strong> Mouse R<strong>an</strong> up the Clock [computer],the clock struck one [time for system rotation], <strong>The</strong> Mouse r<strong>an</strong> down,Hickory Dickory Dock.” “INTO THE MOUTH [vortex] RUNS THE MOUSE,AND FLIPS THE HOUSE [turns the system over).Froggy Went a Courtin’ He did RideHickory, Dickory DockI had a little ponyI’m in Love With a Big Blue FrogJack <strong>an</strong>d JillMary Had a Little Lamb (call <strong>to</strong> ritual connotation)138


Tones of “Mary had a little Iamb” or other telephone created <strong>to</strong>nes,such as high pitched noises <strong>to</strong> call people <strong>to</strong> meetings.Mary Mary Quite Contrary (reminds the slave that abusers are allseeing)Old King Cole (Old King Cole was a merry old soul, ... he’d call forhis masters 3 [the 3 programmers])Peter, Peter Pumpkin EaterPussin Boots (this s<strong>to</strong>ry is porn programming)Ring Around the RosyTen Little Monkeys Jumping on the BedThreeglass)Blind Mice (omega programming connotation with hourTwinkle, Twinkle Little Star (Sometimes associated with “I’m dead.”)SONGS (Most of the Beatles’ songs were used for programming.Charles M<strong>an</strong>son was programmed with Beatles’ music. <strong>The</strong>programmers know ahead of time what are going <strong>to</strong> be the next hits,<strong>an</strong>d they regularly call in slaves <strong>an</strong>d hypnotically make the lyrics <strong>to</strong> becues for the slaves before the music comes out. For inst<strong>an</strong>ce, the lyricsof “Ain’t that a Shame” will make certain alters <strong>an</strong>gry. For <strong>an</strong>other slavethe lyrics “Everything is relative, in its own way” reminds the person ofthe cult family & obedience.) --Angie (popular song for programming)A Mighty Fortress is Our GodBack in Black Blue VelvetButterfly<strong>The</strong> C<strong>an</strong>dym<strong>an</strong> C<strong>an</strong> (C<strong>an</strong>dym<strong>an</strong> represents drug use for Monarchs,plus other things.)CHRISTMAS CAROLS (Christmas carols were used a lot onMonarchs.)Country Roads song with the programmed me<strong>an</strong>ing take me [the139


slave] “home” <strong>to</strong> a meeting site.Crazy (<strong>to</strong> reaffirm loyalty <strong>to</strong> the master)Deja VuDie WalkureFire <strong>an</strong>d RainFrere Jacques (Catholic “Father John”, sexual abuse connotation)Get Me A Ticket on a Fast Train (substitute “master” for “baby” insong)Gr<strong>an</strong>dma’s Feather BedGhost RidersGreen Green Grass of Home (go home program, slave is not happy'til they go home <strong>to</strong> green fieldsGreenslevesHallelujah chorus (m<strong>an</strong>y Christi<strong>an</strong> songs like this one are playedwhile the victim is <strong>to</strong>rtured.)H<strong>an</strong>del’s MessiahHave Thine Own Way Lord (“thou art the potter, I am the clay, moldme & make me...” III. Charismatic slave programming.)Heartache Tonight (song used <strong>to</strong> <strong>an</strong>nounce a ritual over the radio)Hotel California (sexual/ritual connotation, the song says, “go <strong>to</strong> thechamber of the Master’s Feast, We are programmed <strong>to</strong> receive.” Thissong also tells the s<strong>to</strong>ry of how LaVey started the Church of Sat<strong>an</strong> in1966.)I Surrender AllImagine (John Lennon presents the New Age script for people <strong>to</strong> be“nowhere people.”)John Brown’s BodyLucy In the Sky with Diamonds140


Little Red Riding Hood (song played with hunts of slaves)Mary was <strong>an</strong> only child (from Art Garfunkel’s Angel Claire album)Moon RiverOver the Rainbow (obvious Wizard of Oz programming)“Playing with the Queen of Hearts, knowing that it really smarts, theJoker is the only fool who’ll do <strong>an</strong>ything with you” (reinforces thewarning not <strong>to</strong> play (tamper) with the programming. <strong>The</strong> Queen ofHearts is the emergency Mayday signal <strong>to</strong> a h<strong>an</strong>dler. To play with thiswill really smart-hurt.National AnthemNo More Mr. Nice GuyRevolution 9Rivers of Dreams (by Billy Joel. words are about “walking in the dark,going through a river.. .turn on the light on your internal world.”Satin SheetsShe’s Leaving HomeSins of the FathersSouthern Nights (loyalty <strong>to</strong> the programs -- the leaves <strong>an</strong>d trees)Stairway <strong>to</strong> HeavenTeddyBear (Programmer, helpless teddy bear slave connotation)Tennessee Waltz (h<strong>an</strong>dler is “forced” <strong>to</strong> prostitute slave)<strong>The</strong> Blood Will Never Lose Its PowerTom Dooley (suicide, “h<strong>an</strong>g down your head Tom Dooley, h<strong>an</strong>gdown your <strong>an</strong>d...)Victim of Love“Whenyou wish upon a star” song used for programming.White Rabbit (Alice In Wonderl<strong>an</strong>d <strong>The</strong>me -- made in<strong>to</strong> a triggeringKaraoke CD.)141


Wooden HeartYellow Submarine (drug connotation)O. ZETA (snuff films)Zeta is the sixth letter, <strong>an</strong>d it’s <strong>an</strong>cient me<strong>an</strong>ing was a sacrifice.P. SAMPLE CODES FOR ALTERS OF A HYPOTHETICAL SYSTEM NAMEDMARY<strong>The</strong>se codes are purely a representative model-not <strong>an</strong>y particular realsystem. <strong>The</strong> overall system code at times consists of [birthdate +programming site codes + birth order + number of generations familywas in the <strong>Illuminati</strong>.] For our hypothetical system Mary we have thehypothetical system code of: 6-13-51- 14 -02- 12. In order <strong>to</strong> give thecodes for a hypothetical alter system we will have <strong>to</strong> explain somethings as we go. <strong>The</strong> Programmers have for each slave both medicalprogramming files, <strong>an</strong>d a grey or black binder with the programmedaccess, trigger, codes & cues, & structure. A typical <strong>Illuminati</strong> system willbe a cube (although spheres <strong>an</strong>d pyramids are also used). <strong>The</strong>principle alters will be the “a” alters. A typical section of alters willconsist of a 13 x 13 grid of alters. <strong>The</strong>se are alters who live in a world<strong>to</strong>gether <strong>an</strong>d must function <strong>to</strong>gether. A 13 x 13 section will have 13families of “a” through “in” alters. <strong>The</strong> “a” alters will be the primaryalters that the Programmers will interact with. <strong>The</strong> Programmer may callup <strong>an</strong> “a” alter <strong>an</strong>d ask it <strong>to</strong> go get the “c” alter in its family, ratherth<strong>an</strong> directly asking for it. This initial page of alter codes will be theprimary or “a” alters. If we are dealing with a 13 x 13 x 13 cube of alters,then the initial page has 13 “a” alters of each section. Each of thesealters will have <strong>an</strong> access code which will often include the followingcomponents: AN ASSIGNED COLOR + AN ALPHA NUMERIC CODE + APERSONALIZED MAGICAL NAME. This will equal 1/3 their access code.<strong>The</strong>se code words must be repeated three times <strong>to</strong> pull the alter up.However, if <strong>an</strong> alter is trained well, <strong>an</strong>d hears his master’s voice, <strong>an</strong>alpha-numeric code c<strong>an</strong> pull the alter up. For m<strong>an</strong>y of the alters, thereversal of their access code puts them back <strong>to</strong> sleep. This is <strong>an</strong>import<strong>an</strong>t point, because some alters would be d<strong>an</strong>gerous <strong>to</strong> leave incontrol of the body. <strong>The</strong> “a” alters are regular alters. M<strong>an</strong>y of themhave been hypnotically age adv<strong>an</strong>ced <strong>to</strong> see themselves asteenagers or adults. Sometimes “b” <strong>an</strong>d “c” alters are also aged. <strong>The</strong>142


“d” through “in” alters are generally left as they were split <strong>an</strong>d most ofthem are inf<strong>an</strong>tile, with little concept of how old they are. <strong>The</strong> little oneswill be the ones who often remember the programming very well, <strong>an</strong>dknow things about the system. <strong>The</strong> <strong>to</strong>p alters will also sometimesreceive personal names from their h<strong>an</strong>dler. This is in addition <strong>to</strong> all theircodes. If the alter is responsive <strong>to</strong> its master, the personal name mightpull the alter up <strong>to</strong>o. Do all of the alters get charted? <strong>The</strong>re are severalgroups of alters which get charted separate from the rest or don’t getcharted at all. Because of the competition <strong>an</strong>d distrust between thedifferent programmers, they often place in secret back doors in<strong>to</strong> theperson’s mind that only they know about. Worlds of secret alters loyal<strong>an</strong>d devoted <strong>to</strong> the programmer may be built in<strong>to</strong> the system <strong>an</strong>d notappear on the regular charts. <strong>The</strong> core, <strong>an</strong>d some of the primal splitsfrom the core will not appear on the regular grids. <strong>The</strong>y will be placedon a separate sheet, <strong>an</strong>d their codes will be in some magicall<strong>an</strong>guage. <strong>The</strong> <strong>Illuminati</strong> commonly employs 20 magical l<strong>an</strong>guages,<strong>an</strong>d Hebrew, Latin <strong>an</strong>d Greek are also often used for charting the core<strong>an</strong>d its primal splits. Enochi<strong>an</strong> is a good example of a magicall<strong>an</strong>guage used by the <strong>Illuminati</strong>. Some alters will be created solely bythe slave in order <strong>to</strong> cope with life. For inst<strong>an</strong>ce, say the slave istravelling with someone who is not a h<strong>an</strong>dler, but who is a d<strong>an</strong>gerousperson. This d<strong>an</strong>gerous person murders several people <strong>an</strong>d forces theslave <strong>to</strong> help. <strong>The</strong> slave is likely going <strong>to</strong> have front alters out, <strong>an</strong>d theyare simply going <strong>to</strong> have <strong>to</strong> create new alters <strong>to</strong> meet the dem<strong>an</strong>ds ofthe situation. <strong>The</strong>se alters made <strong>to</strong> deal with one-time emergency willjust slip in<strong>to</strong> cracks in the system. Lots of odds <strong>an</strong>d ends alters end up inthe nooks <strong>an</strong>d cr<strong>an</strong>nies within a system just detached <strong>an</strong>d floating. <strong>The</strong>programmers <strong>an</strong>d the victim work hard at structuring <strong>an</strong>d cle<strong>an</strong>ing upthings--but the honest truth is that trauma-based mind-control is messy.Any time you shatter someone’s mind in<strong>to</strong> thous<strong>an</strong>ds of pieces withhorrendous <strong>to</strong>rture, you have a shattered mess, in spite of the goodfronts that the programmers are able <strong>to</strong> construct. Some of the moreelaborate access methods are for alters that are not on the “a” chart.Hour glass alters have entire sentence access codes. Deaf & blindalters need their access code signed on their h<strong>an</strong>ds by moving theirfingers up <strong>an</strong>d down, etc. End time alters may have access codes thatmay entail reading <strong>an</strong> entire page. Reporting alters are often smallchildren, that are hidden in each section, <strong>an</strong>d may require slaps <strong>to</strong> theface or jabs with a needle <strong>to</strong> pull them up. Spinner kittens will beaccessed via their mama cat, who acts like a Madam in a “cathouse”. <strong>The</strong> codes for this was given in the Beta section codes. <strong>The</strong>reader will be given the hypothetical codes (which resemble closelythe actual codes of <strong>an</strong> actual scenario) for our hypothetical Mary. ASample Chart of the “A” alters--these are the primary alters-- has beenprepared in the same fashion as it would appear in the h<strong>an</strong>dler’s 3-ringbinder.143


Mary’s Core Protec<strong>to</strong>r 1 will have a shutdown code of “REVERSAL 1BEGINNING” <strong>an</strong>d the second Core Protec<strong>to</strong>r will have the shutdowncode of “REVERSAL 2 CREATION”. Of course, these codes are said 3times. <strong>The</strong> first three alters on the far left section at the <strong>to</strong>p of the chartare Silences who c<strong>an</strong> be woken up by singing. Also at least one ofthese, will wake up by a kiss from the prince (programmer) <strong>to</strong> the thirdeye area. <strong>The</strong> first alter c<strong>an</strong> be shut down by “COSMOS 15 31 06 2BABPINK”. One of the groups of alters attached <strong>to</strong> one of these early altersis “MA.C3.10-53 Rejects (7) 10-53”. To shut this alter(s) down just say thereverse of the access code. A mirror image of each of these altersexists <strong>to</strong>o. <strong>The</strong> mirror images c<strong>an</strong> be pulled up via a three step process.<strong>The</strong> birth memory in our example will be coded as A5 10 79. <strong>The</strong> spider<strong>to</strong>rture memories that are attached <strong>to</strong> these alters is A5 10 79. <strong>The</strong>reader will notice the following on the hypothetical chart on theprevious page for the first Section (which is numbered 6 <strong>to</strong> bedeceptive): This section is front alters. Basic code pattern = color +Genesis + no. [1 thru 13] + letter [a thru m]. Individual codes 1st sectiongeneral-”N.I.F.6”, 1st section mother Eve “EV.E5 10 51 ACE” (Eve is thebal<strong>an</strong>cing point & the ace code is high or low). <strong>The</strong> alter Explorer is“EI.G7”, Mammy “MI.H8”, Angel “Red, AI.19 Jack Genesis 4” (or it couldbe done “red, AI.J10 Genesis 4”), George “Silver, GI.K11 ”, Zsa Zsa“gold, ZI.L.12”, <strong>an</strong>d Shadow “Clear SI.M13”. You won’t find on the mainchart codes such as: Eve’s memory “EI.D5.2.1952 ACE” or the Inf<strong>an</strong>talters -- “1-000 10-49 REJECTS 3-9” <strong>The</strong> master may say for example:“Green GENESIS 1-A” (3 times) <strong>to</strong> get this alter which is the bal<strong>an</strong>cingpoint. Fragments/dead alters were dumped in<strong>to</strong> areas namedconcentration camps <strong>an</strong>d given the names of the famous germ<strong>an</strong>concentration camps. <strong>The</strong> camps were placed under the Mt. of Olives.Fire or Bomb children are found throughout the system <strong>an</strong>d aretriggered <strong>to</strong> come up by programming. <strong>The</strong>y come up behind otheralters <strong>an</strong>d make them burn. Some of this level c<strong>an</strong> be woken up bysaying, “It’s time <strong>to</strong> wake up in the morning” (7 times), which is incontrast with most codes which are said 3x. Another way <strong>to</strong> look at it, isthat the alters are on 4 dimensional structure <strong>an</strong>d they require a 4-dimensional access code. Height, depth, width, <strong>an</strong>d color are the fourdimensions. This breaks down for this 1st section as: COLOR (4thdimension) + Genesis (Section code) +1 (level) + “a” (depth). <strong>The</strong>following message will be used on the phone for this System’s recordingmachine, this example has been used nationally. “IF YOU WOULD LIKETO MAKE A CALL PLEASE HANG UP AND TRY YOUR CALL AGAIN. IF YOUNEED ASSISTANCE, PLEASE DIAL YOUR OPERATOR. CODE 911.” This willcause section 1 or section 2, etc. <strong>to</strong> call their master. Also, st<strong>an</strong>dard<strong>Illuminati</strong> H<strong>an</strong>d signals work with Mary. “ALONE AND CRYING (3X)”- is acode for a few special parts not on the first grid.Section 2 gatekeeper alters. Basic code pattern color + Revelation +no.[1 thru 13] + letter [a thru m] In our hypothetical example: “ORANGE144


REVELATION 4-A” (3X) However a shortcut is “REVELATION 4” <strong>an</strong>d theprimary Revelation 4 alter will come up. “ORANGE REVELATION 4 B”would get a small child on the pedestal with Revelation 4a. At timesthe h<strong>an</strong>dler will say “THE DECK IS DOUBLE-DECKED” in order <strong>to</strong> activatethe clone doubles of all alters in a particular area--such as the frontarea of the system. <strong>The</strong> clones are tied <strong>to</strong> the Pink Room of thedollhouse-looking computer. Since alters are also coded <strong>to</strong> cards, aFLUSH will pull up <strong>an</strong> entire section. Special alters who skinned menalive are kept in black holes in Section 2. <strong>The</strong>y are special trauma alterscreated solely by the victim as a safety measure. Section 2 computer(like all levels) is empowered by <strong>an</strong> emerald blue light. This powersource was deactivated by unscrewing the light <strong>to</strong> the left (which <strong>to</strong>okit physically out so <strong>to</strong> speak) <strong>an</strong>d then saying “PEACE BE STILL” (3X). If“PEACE BE STILL” is not said three times then the War in the heavensprogram kicks in. Also “DAD WEEPS OVER HIS CITY” must be said whendeactivating the computer otherwise the “children” (alters) becomesick <strong>an</strong>d everything kicks back in--which it does eventually <strong>an</strong>yway ifthe deeper computers are not deactivated or taken out. Section 3 hasprogrammer alters & fragment armies, not <strong>to</strong> be confused with theclones which hide everywhere. <strong>The</strong> clones, by the way, c<strong>an</strong> beidentified with serial no.s at base of head gear such as 151.00 [systembirth date]. This sections has 3 faceless Programmers called the 3adepts of Atl<strong>an</strong>tis. Each of them has a different color of hair. <strong>The</strong>y mayalso be the comm<strong>an</strong>ders of armies--the comm<strong>an</strong>ders of the Egypti<strong>an</strong>armies have names Ra, Horus, <strong>an</strong>d Set. Section 4 alters areEntertainment alters. Basic code pattern = Color + double number + <strong>an</strong>ame of a one of the 13 tribes of Israel + the number of the alter again(3x)Example: BLUE 2001-13A REUBEN 1 (3X) However, the color doesn’talways need <strong>to</strong> be said it is a sufficient shortcut <strong>to</strong> call thealph<strong>an</strong>umeric code three times. Second example 2002-12A SIMEON 1(3X). <strong>The</strong> numbers of the 2000 code go up while the correspondingnumber 13 <strong>to</strong> 1 go down. In other words it is a double code. <strong>The</strong> Tribalnames are arr<strong>an</strong>ged according <strong>to</strong> their Biblical birth order.Mother Kitten 8,10 <strong>an</strong>d 12 have ten spinner kittens under neath each ofthem. To get a spinner kitten, one gets the mother kitten <strong>an</strong>d then hasher in the proper position which is the over-the-rainbow mode. <strong>The</strong>choice of what spin kitten <strong>to</strong> get is “WE GOTTA GET DRESSED ... IN 3MINUTES.” 3 minutes me<strong>an</strong>s spinner no. 3. Specific instructions such as“PURR FOR ME KITTEN” gives the abuser fellatio. Tweedle Dee &Tweedle Dum is a S&M program. “5 FIDDLE” <strong>an</strong>d “FOLLOW THE YELLOWBRICK ROAD” are import<strong>an</strong>t for the slave <strong>to</strong> follow instructions. <strong>The</strong>alters will be sent <strong>to</strong> never-never l<strong>an</strong>d where what they do is unreal.Some kitten alters are keyed <strong>to</strong> pop out if certain areas of the body are<strong>to</strong>uched, such as the space beside the big <strong>to</strong>e, or the thighs. A h<strong>an</strong>dler145


will also have st<strong>an</strong>dard h<strong>an</strong>d signals for things, such as putting his h<strong>an</strong>dson his thighs <strong>to</strong> me<strong>an</strong> “Come here <strong>an</strong>d take care of me, Kitten.”“COME KITTEN, TO PAPA COME” “BLUE TOPAZ” serves as 4 keys. Pisces isassociated with Blue Topaz. <strong>The</strong>re are also 4 keys which are: silvershoes, sun bright, birds singing, <strong>an</strong>d yellow road. Section 2 & 1.Reprogramming sections. At this point, the computer codes givenpreviously apply, SEE OMEGA CODES on previous pages. <strong>The</strong> first majorcomputer services the <strong>to</strong>p 6 sections <strong>an</strong>d has a red room, a closet, apink room, as well as other rooms. Actually the computer should be setin at Section 0, which would break up the grid evenly, but since ourMary is hypothetical we put the front main computer at section 1. Asystem like this will have 13 computers/1 per section <strong>an</strong>d 5 computerswhich set between pairs of sections, which join a pair of sections<strong>to</strong>gether, <strong>an</strong>d then 2 main computers. This me<strong>an</strong>s a System like Mary’swill have 20 internal computers. With all the codes <strong>an</strong>d a fairunderst<strong>an</strong>ding of the alters in a section, it is a good day’s work <strong>to</strong> shutdown a computer. Before one could possibly get all the sectioncomputers shut off, they would reprogram (reboot) themselves backup. Computer erasure codes include: “FULL HOUSE ACES HIGH. ALLTRUMP. FULL HOUSE ACES LOW.” <strong>The</strong> drawers in the dollhouse c<strong>an</strong> bepulled out with “ROYAL FLUSH”(3X). Another code is “PINK SECTION 5.FULL HOUSE. ACES HIGH. 2 DEEP.” A partial code <strong>to</strong> a computer is “ ......8-9 RED.” Our hypothetical Mary might be accessed by a wom<strong>an</strong> whotaps on the shoulder <strong>an</strong>d says, “PHOENIX 360 [tel. area code], OUT OFORDER”. <strong>The</strong> library alter has <strong>an</strong> import<strong>an</strong>t access ring. A “But<strong>to</strong>nBright” alter type works with the librari<strong>an</strong>. <strong>The</strong> dwarfs are accessed by“ISOLATION + no.” Judges which sit on the council give warnings <strong>to</strong>alters “CAT EYE AT THE DOOR.” This reflects the programmers’ control.<strong>The</strong> judges have the “Keys <strong>to</strong> the Kingdom.” “MR POSTMAN WAIT ANDSEE” indicates a message from the master. Ribbon alters have thenames of arch<strong>an</strong>gels. Silver cords are attached <strong>to</strong> the ribbons. Section0. Mothers of Darkness alters. basic code pattern = SILVER + LEHTEB[which is bethel or house of God spelled backwards] + [who knowswhat else] + a blue <strong>to</strong>paz ring being turned on the master’s finger acertain way. Green is a sensitive color for this System. Some alters maybe accessed from certain areas in the System via 4 <strong>to</strong>nes, <strong>an</strong>d othersby pin pricks at certain locations in the body, along with their verbalcode. <strong>The</strong> Reporting alter c<strong>an</strong> be accessed by repeated slaps acrossthe face. <strong>The</strong>re is Ultra Green Section tied <strong>to</strong> the Cabala (Green tree).<strong>The</strong> Library in the big castle, which is guarded by lions <strong>an</strong>d other bigcats, has a passage way in it <strong>to</strong> a second world. Codes with theCabalistic Tree of Life involve Cabalistic magic <strong>an</strong>d its symbols. Thissection is guarded by a hostile entity. Certain rings, <strong>to</strong>paz, quartz,diamond, ruby, black onyx etc. are used for triggers. Certain rings areneeded <strong>to</strong> get in<strong>to</strong> certain parts of a System, such as the castle. Toaccess the Mothers, the Black Onyx ring must be rotated. <strong>The</strong>programming of a ring may go something like this, “This ring fills146


Daddy’s house with stars.. .Catch a falling star, put it in your pocket.”Section 9. Delta-Beta alters. Kept in a genie bottle. Obviouslysomething is rubbed <strong>to</strong> get them out. “BUTTON BUTTON, WHO’S GOTTHE BUTTON, BUT ITS THE KISS OF DEATH” this code is involved with the“good witch” who kisses upon the forehead. But<strong>to</strong>ns are on the boxesof Programmer Green <strong>an</strong>d are constructed on<strong>to</strong> the boxes so they c<strong>an</strong>be used <strong>to</strong> open the boxes up.Section 7. This hypothetical system also has a series of codes based ongems--ruby, diamond, etc. which have numbers attached <strong>to</strong> thecodes. An Hour glass w/ 12 disciples like grains of s<strong>an</strong>d tied <strong>to</strong> JollyGreen Gi<strong>an</strong>t programming which have sentence access codes. Eachsentence is a phrase of sat<strong>an</strong>ic philosophy. <strong>The</strong> bot<strong>to</strong>m level is calledthe Hell Pit <strong>an</strong>d contains the City of Petra. <strong>The</strong> City of Petra has <strong>an</strong>erasure code. “YELLOW - CUTTER ROOM 7 SECTION 7---ROYAL FLUSH--LACUTTER EGGS” Invisible field section 7. Room 7 --cards has eggs withdemons. Lacutters are like imps <strong>an</strong>d are invisible. <strong>The</strong>y are assigned <strong>to</strong>guard various things in the system including the cutting programs.“Dad” “Catch a falling star”.Main computer protected by deaf <strong>an</strong>d dumb alter using a signl<strong>an</strong>guage equation as its access code <strong>an</strong>d the reversal of its accesscode is its shut down code. <strong>The</strong> Brack Master is a Master Programmer.Each of the 13 sections of 169 alters (a section is a 13 x 13 grid of alters)will then have a computer assigned <strong>to</strong> it. <strong>The</strong> computer is made up ofdissociated parts of the mind--which are like alters, but have not beengiven his<strong>to</strong>ries or names. Each section has a computer which makes 13section computers. Section 1 <strong>an</strong>d section 7 are main computers. <strong>The</strong>first is the main computer for the <strong>to</strong>p half, <strong>an</strong>d the second is the maincomputer for the bot<strong>to</strong>m half of the System. <strong>The</strong> second maincomputer is in the hell pit, <strong>an</strong>d has been put in at the lowest level of themind. Section 6&5 computers are connected by a connectingcomputer, as well as 4&3, 2&1, 0&12, 10&9. This makes 5 connectingcomputers. In <strong>to</strong>tal then we have 13 section computers, 2 maincomputers, <strong>an</strong>d 5 connecting computers, for a sub<strong>to</strong>tal of 20computers. Since things are being built on the basis of the magicalnumber 13, six more computers are installed which are decoy or falsecomputers for therapists <strong>to</strong> work on. This makes a <strong>to</strong>tal of 26 computers(or 2x13). Since there are 26 letters of the alphabet, this lends itself well,<strong>an</strong>d each computer is assigned a letter of the alphabet. Since thecomputers are put in<strong>to</strong> the slave when it is a young child, the child hasjust learned how <strong>to</strong> count <strong>an</strong>d say the alphabet. <strong>The</strong> <strong>Illuminati</strong> hasbeen using a large dollhouse with 26 rooms using 13 colors of paint,giving two rooms per color. Each room is a computer. In accord withthe practice of double coding, each letter of the alphabet is given its147


sequence number, so the names for the computers are Al, B2, C3, D4,E5, F6, G7, H8, 19, J10, K11, L12, M13--the thirteenth is assigned the 1stmain computer. N1, O2, P3, Q4, R5, S6, T7, U8, V9, W10, X11, Y12, Z13.Rather, th<strong>an</strong> use the number 13, the number 0 will be assigned, thusch<strong>an</strong>ging things <strong>to</strong> M0, <strong>an</strong>d Z0. This is simple enough for a child’slearning mind, but difficult enough that it serves as a viable code. Ascodes are assigned, the bot<strong>to</strong>m of the alphabet is assigned the <strong>to</strong>p(front side) of the system. <strong>The</strong> middle point MO, is the normal accesspoint for all the computers for the h<strong>an</strong>dler. <strong>The</strong> code for this isassociated with the name of <strong>an</strong> airpl<strong>an</strong>e h<strong>an</strong>ger, so that the concep<strong>to</strong>f taking off in<strong>to</strong> the sky (tr<strong>an</strong>cing c<strong>an</strong> be associated with it.) Eachcomputer needs <strong>an</strong> access code <strong>to</strong> go along with its alpha-numericname. A deck of cards lends itself well <strong>to</strong> a code of 13. Bear in mindeach computer has a color assigned <strong>to</strong> it. Colored scarfs <strong>an</strong>ddollhouse rooms were used with electroshock <strong>to</strong> teach the child hiscolor coding. When the programming is going on tr<strong>an</strong>ce depths <strong>an</strong>drunways(mental image for flying off in<strong>to</strong> a tr<strong>an</strong>ce) <strong>an</strong>d the structure ofthe System will all be tied <strong>to</strong>gether in one neat package. Everything isbuilt on its own x-y axis. Each 13x13 grid has the middle rows bothvertically <strong>an</strong>d horizontally set up as runways. <strong>The</strong> x-y axis also makes upthe hourglass lines or the butterfly wings. Both images are used withslaves. Because thing are set up in thirteens in Mary’s system, <strong>an</strong>d thingsare double coded, thirteen becomes 13-1 <strong>an</strong>d one is 1-13. This allowsus also <strong>to</strong> link 13-1 <strong>an</strong>d 1-13, so that everything becomes a circle. <strong>The</strong>circle within a circle, box within a box concept, tri<strong>an</strong>gle within atri<strong>an</strong>gle situations makes the slave feel he is trapped in <strong>an</strong> infinity loopof programming that has no end <strong>an</strong>d no beginning. 13 <strong>an</strong>d 1 make 14.An entire deck of cards c<strong>an</strong> be used in a double code that also adds<strong>to</strong> 14, such as the 8 of spades <strong>an</strong>d the 6 of diamonds, or the Ace ofspades <strong>an</strong>d the King of Diamonds. Here then is the codes for Mary’scomputers. Two cards from opposite suits that add <strong>to</strong> 14. Since a deckof regular playing cards came originally from Tarot cards, the playingcard used as a code also carry some occult signific<strong>an</strong>ce <strong>to</strong> the codes.It is also training the child who is programmed this way <strong>to</strong> be interestedin cards. And everytime the child plays cards they will reinforce at <strong>an</strong>unconscious level their computer coding. <strong>The</strong> computers will then haveprograms set in on 13 x 13 quadr<strong>an</strong>ts. Quadr<strong>an</strong>t 6.6 will have aprogram such hopelessness. Other quadr<strong>an</strong>ts may hold aloneness,recycling, cold, heat, burning, cutting oneself, pulsating loud heartbeat, <strong>an</strong>d hundreds of other programs. <strong>The</strong>se programs have the typeof codes assigned them that are given in the Universal Function Codes.M<strong>an</strong>y of the functions c<strong>an</strong> receive a st<strong>an</strong>dard code, but other itemsrequire individual codes. Telephone <strong>to</strong>nes are frequently used <strong>to</strong> beable <strong>to</strong> key in (that is access or trigger) parts of the computer programmatrix. Dominoes also are used for the computer programming. <strong>The</strong>dominoes are put in so that the programmers c<strong>an</strong> get a dominoeeffect, if they w<strong>an</strong>t <strong>to</strong> set off a series of programs. Dominoes <strong>an</strong>d148


flashing sequences of lights were used <strong>to</strong> train the child <strong>to</strong>au<strong>to</strong>matically respond <strong>to</strong> a certain pattern of dots. Our hypotheticalMary will also have hundreds of other codes for all kinds ofmiscell<strong>an</strong>eous things such as the following r<strong>an</strong>dom codes: “RUBY REDLIPS” “TO HAVE POWER” AND “TO BE THE POWER”, which are also foundin the Tall Book of Make Believe in the Shut Eye Town. Dominoes helpwith the code: “2-4-6-8 WHO DO YOU APPRECIATE?”. More examplesare, “I LOVE DADDY.” “JACK BE NIMBLE JACK BE QUICK 13-1 12-2...”“PUMPKIN HEAD--<strong>an</strong> access code. To go away- “Ta RA RA BOOM-DE-AYE”,”CRYING OVER YOU (3X)”, “SILKEN GIRDLE”-- a golden caterpillarplays a bittersweet tune. A gold pocket watch with Rom<strong>an</strong> numerals isassociated with the words “Eagle on it.” When Mary gets scared <strong>an</strong>dbegins <strong>to</strong> get in<strong>to</strong> revolving switching, sometimes spinning c<strong>an</strong> be slowdown by saying, “10--YOU ARE SLOWING DOWN 9--YOU ARE SLOWINGDOWN 8--YOU ARE GETTING SLOWER AND SLOWER...” A system’scoding is a reflection of their programmer. If the programmer is a pilotwhich m<strong>an</strong>y of them are, then they may have pilot lingo in their codes,such as the system may be turned by pitch & degrees. If theprogrammer is a sailor the system may have nautical codes, such as“RED RETURN RUNNING’’ , ‘‘SAFE HARBOR’’ (for ‘‘Home’’), <strong>an</strong>d DOWNRIVER (away from “Papa”).Q. Catholic Programming (by Jesuits etc.)KEYS TO THE KINGDOM = world domination by mind control. VOW OFSILENCE is a keep quiet program activated by “THE WALLS HAVE EARS& THE PLANTS HAVE EYES SO YOUR SILENCE IS TANTAMOUNT TOSUCCESS.” This is explained <strong>to</strong> the victim that the sea shells <strong>an</strong>d thepl<strong>an</strong>ts have the ability <strong>to</strong> hear, <strong>an</strong>d that a sensitive occultist(programmer) c<strong>an</strong> psychically pick up what the pl<strong>an</strong>ts <strong>an</strong>d sea shellshear. “MAINTAIN IT” --is a comm<strong>an</strong>d <strong>to</strong> maintain the Vow of Silence“MAINTAIN IT & LISTEN.”-- a comm<strong>an</strong>d <strong>to</strong> keep silent <strong>an</strong>d listen <strong>to</strong> acomm<strong>an</strong>d.“ENTER INTER INNER DIMENSION TWO” - this is a st<strong>an</strong>dard Jesuit infinityprogram (2 is a sacred voodoo no.)149


R. Mensa Programming (by MENSA)“17 21 13 46” is <strong>an</strong> <strong>Illuminati</strong> code me<strong>an</strong>ing a MENSA layerSample Mensa codes:“727 + E=MC SQUARED + 3.141 5962 + PI”“A+B=C, B+C=A, C+A= B” “TIC TAC TOE + C CROSS, PI CROSS”<strong>The</strong> MENSA codes are sequences of 6 numbers.S. HAND SIGNALS misc. common signalsFinger <strong>to</strong> forehead--One ring finger bent at 90° -- access wave Rotated pencil--withcertain words--rotates the systemFinger swung the counterclockwise way closes portals.Right Fist <strong>to</strong> forehead -- OBEYFist with right h<strong>an</strong>d cupping left h<strong>an</strong>d, the left is like the letter c, <strong>an</strong>dthe thumb is outward <strong>an</strong>d the fist inside, the left h<strong>an</strong>d then moves 3times over the knuckle -- access signalLeft h<strong>an</strong>d of slave laid on <strong>to</strong>p of h<strong>an</strong>dler’s h<strong>an</strong>d - sign of submissionH<strong>an</strong>ds behind back of head -- I’m masterRight H<strong>an</strong>d with thumb & index finger making <strong>an</strong> L shape onchin/checkH<strong>an</strong>ds on inside of thighs by h<strong>an</strong>dler -- come <strong>to</strong> me Kitten <strong>an</strong>dservice me.H<strong>an</strong>ds locked folded interwoven backward -- you c<strong>an</strong>’t break “thecircle”H<strong>an</strong>dshake with index <strong>an</strong>d middle finger held straight out -- ”Youare one of us.”150


Grip called the lion’s paw -- access greeting opening <strong>an</strong>d closingthe h<strong>an</strong>ds or large circles with index finger opens portals. Palms rubbed<strong>to</strong>gether counterclockwiseKiss on center of head -- kiss of submission of slave <strong>to</strong> h<strong>an</strong>dlerPalm of h<strong>an</strong>d <strong>to</strong>uched -- sexual access point for some modelsSign of Sat<strong>an</strong> -- Hail Sat<strong>an</strong>! used for Monarch & <strong>Illuminati</strong> <strong>Mind</strong>controlledslaves as <strong>an</strong> induction. <strong>The</strong> alter who is holding the bodygoes in<strong>to</strong> tr<strong>an</strong>ce, & a deeper one replaces it.Thumb twiddle -- rotating the thumbs around with the two h<strong>an</strong>dsclasp -- S&MTouch of center of forehead -- access pointVulc<strong>an</strong> Peace Sign -- llluminati/occult greeting Wave with Finger<strong>an</strong>d thumb <strong>to</strong>gether - other digits extendedWinks at the system were used <strong>to</strong> convey me<strong>an</strong>ing.--- LIFE “OVER THE RAINBOw” --- After indexing & rereading this book,the co-authors realized that we had not explained “over the rainbow.”Some alters live “over the rainbow” <strong>an</strong>d some do not. Both types willuse the term “over the rainbow”, but with different me<strong>an</strong>ings attached.For those who live “over the rainbow”, they serve their masters in such adeep hypnotic tr<strong>an</strong>ce that they perceive reality like it’s a dream. Whentheir memories surface they are so unlike normal memories that asystem in therapy may not know what <strong>to</strong> do with them. <strong>The</strong>y havebeen described as similar <strong>to</strong> the pictures in the old T.V.s when thevertical hold would go out of control. Deeper alters, who live “over therainbow” experience memories/life in the following fashion: faces &porn cameras are airbrushed out of their memory, distinctive marks inthe perpetra<strong>to</strong>rs such as scars & wrinkles are airbrushed out, colors &lights are very bright due <strong>to</strong> the <strong>to</strong>tal dilation of the pupils while in deeptr<strong>an</strong>ce, <strong>an</strong>d there is no sense of time for these alters. <strong>The</strong>se alters aretrained <strong>to</strong> “TRANCE SEND FORWARD THROUGH TIME”. By underst<strong>an</strong>dingthe programming, the codes, & triggers, those alters who lived “overthe rainbow” c<strong>an</strong> recover from the mind the full memory, without thedis<strong>to</strong>rtions created by dissociation.151


T. PARTIALLY CORRECT PROGRAMMING SITE CODES<strong>The</strong> following site codes are not <strong>to</strong>tally accurate. Also, the Intelligencegroups use that what are called Cryp<strong>to</strong>nyms, which are two-letterdigraphs such as the "MK" of MK-ULTRA. <strong>The</strong> digraph c<strong>an</strong> indicate atype of operation or even a location. An operation may have CODES.<strong>The</strong> following site codes are not <strong>to</strong>tally accurate. Also, the Intelligencegroups use what are called Cryp<strong>to</strong>nyms, which are two-letter digraphssuch as the “MK” of MK-ULTRA. <strong>The</strong> digraph c<strong>an</strong> indicate a type ofoperation or even a location. An operation may have its cryp<strong>to</strong>nymch<strong>an</strong>ged in the middle of its operation.Programmer Programming Zone Area/CodeArmstrong 63 94XCCDAs<strong>to</strong>r 36 Florida 59XCBBBournell-High<strong>to</strong>wer19Brown 30 59XBMNBurcham 329 Texas 92XBMMGas<strong>to</strong>n 61 Colorado 1XCDFHaggin 743 Kentucky 47XB0Harrick 263 Colorado SpringsJohnson 95M<strong>an</strong>assMen<strong>to</strong>r 21 Colorado 61XBXXNath<strong>an</strong> 56 New MexicoOwens 963 106XbJKP<strong>an</strong>tu 71 K<strong>an</strong>sas 011XOEG152


Patterson 117 K<strong>an</strong>sasSavior 49MajorStr<strong>an</strong>ge14 1Z440x72080020366Strong 52 81XCBCSuttenfuss 103ColonelTaylor16 KentuckyWeir 561 Texas 33XBCBG. HYPNOSIS IN PROGRAMS, & OTHER USES<strong>The</strong> programmers will begin their programming by extreme <strong>to</strong>rture.After a certain amount of <strong>to</strong>rture the victim is willing <strong>to</strong> say or believe<strong>an</strong>ything <strong>to</strong> s<strong>to</strong>p the <strong>to</strong>rture. At this point a thought will pl<strong>an</strong>ted in<strong>to</strong> thevictim’s mind. This thought will be linked <strong>to</strong> a false memory put in viahypnosis or movies, or other method, <strong>an</strong>d it will be linked <strong>to</strong> acomm<strong>an</strong>d put in by hypnosis etc. <strong>an</strong>d the original thought, thecomm<strong>an</strong>d, the false memory will be linked by a single emotion whichwill link them all <strong>to</strong>gether. <strong>The</strong> result will something like this: it is twoweeks before Halloween (thought), I must get ready for Halloweenrituals (comm<strong>an</strong>d) because I have always had a habit of going <strong>to</strong>Halloween rituals (false memory). If I don’t I will have a heart attack<strong>an</strong>d die (memory of <strong>to</strong>rture linked <strong>to</strong> thoughts). Programming is layeredin. Layer after layer of programming is put in. Each alter (personality) ofthe victim is used as if it is a component of a large system. <strong>The</strong> result isthat no alter (personality) is the whole, but only a cog in a greatmachine. C<strong>an</strong> a single cog rebel against the whole machine? It is verydifficult for a single component of thous<strong>an</strong>ds of components <strong>to</strong> rebel153


against the abusers.Alice In Wonderl<strong>an</strong>d Programming--going down the tree, goingthrough the mirror, going under neath something or growing tallALICE IN WONDERLAND PROGRAMMING AS IT PERTAINS TO AN ALTERGOING DOWN IN TRANCE FOR INTERNAL PROGRAMMING<strong>The</strong> internal programmers (<strong>an</strong>d some other alters) have the ability <strong>to</strong>send other alters in<strong>to</strong> deep tr<strong>an</strong>ces. One of the programs for doing thisis based on the Alice In Wonderl<strong>an</strong>d <strong>The</strong>me <strong>an</strong>d it was experiencedlike this for a level 2 alter who m<strong>an</strong>aged <strong>to</strong> stay in communication withher deprogrammer:When the alter went down in her mind she went down on the inside ofthe trunk of a tree (like Alice In Wonderl<strong>an</strong>d). At the bot<strong>to</strong>m she saw akeyhole, a table, <strong>an</strong>d on the table was love potion #9. Sheau<strong>to</strong>matically dr<strong>an</strong>k the love potion which shrinks her <strong>to</strong> a dot <strong>an</strong>dthen she goes through the keyhole. So normally this process me<strong>an</strong>s shegoes through the keyhole. She m<strong>an</strong>aged <strong>to</strong> stay in contact with herdeprogrammer during this deep tr<strong>an</strong>ce. After the key hole she sawthous<strong>an</strong>ds of looking glass mirrors. Everything got smaller as she wentdown the tree. She became a dot. She drinks love potion no. 9 <strong>an</strong>dcomes back with it. A tree comes <strong>an</strong>d wraps itself around her <strong>an</strong>dloves her. As she ascends (comes up in tr<strong>an</strong>ce) she stretches up <strong>an</strong>denlarges. In coming up out of tr<strong>an</strong>ce she gets stuck at level 8 due <strong>to</strong>some interference from deeper alters. She, in accord with herprogramming, senses her Master’s love. (Normally she would havesimply tr<strong>an</strong>ced out, <strong>an</strong>d <strong>an</strong>other alter would have taken her place <strong>an</strong>dshe would have no recollection of the entire process. <strong>The</strong> alter hasbeen programmed <strong>to</strong> have backup amnesia. Backup amnesia me<strong>an</strong>sthat one doesn’t remember that one lost time, one doesn’t rememberthat one forgot, etc. In short it me<strong>an</strong>s you don’t remember that youdon’t remember.) This is <strong>an</strong> example of hypnosis used internally by theprogramming <strong>an</strong>d the Programming alters <strong>to</strong> control other alters. <strong>The</strong>deepening of the tr<strong>an</strong>ce was given the imagery of Alice falling downthe tree. In the various s<strong>to</strong>ries used in programming, there is some par<strong>to</strong>f the s<strong>to</strong>ry that c<strong>an</strong> be used as the s<strong>to</strong>ry line for tr<strong>an</strong>ce induction,these include:Wizard of Oz -- going in<strong>to</strong> the poppies,Star Wars -- time warp, riding the lightStar Trek -- being beamed, replica<strong>to</strong>rs etc.154


Hypnosis is used <strong>to</strong> <strong>an</strong>chor suggestions about sleep patterns, p<strong>an</strong>icprograms, phobias, health healing programs <strong>an</strong>d health problemsprograms, pain control <strong>an</strong>d pain programs, motivation programs, asuicide program called “hypnosleep”, <strong>an</strong> ins<strong>an</strong>ity program, <strong>an</strong>dcountless other uses. Hypnosis is used <strong>to</strong> steer a person’s mind in thedirection that they have been labeled. For inst<strong>an</strong>ce, if they have beenselected <strong>to</strong> become a doc<strong>to</strong>r, they will be programmed for success asa doc<strong>to</strong>r. New patterns of thought, feeling <strong>an</strong>d behavior are inserted<strong>to</strong> build confidence in the goals of the <strong>Illuminati</strong>. Positive experiencesare used <strong>to</strong> help boost the person’s feelings, <strong>an</strong>d then the newmessages are <strong>an</strong>chored “imagine these messages taking root. Yournew messages are growing stronger <strong>an</strong>d stronger.” <strong>The</strong> Alice InWonderl<strong>an</strong>d programming theme is used in air-water programs <strong>an</strong>dmirror programs which the <strong>Illuminati</strong>, the CIA, NASA, the Jesuits <strong>an</strong>dothers like so well. <strong>The</strong> idea is that there exists a mirror world which is areversal. Along with it is attached the idea that the slave c<strong>an</strong> enter in<strong>to</strong>a timeless dimension of time, or as some refer <strong>to</strong> it “interdimensionaltime travel.” Later, the victim will be further brought under the spell ofthis mirror programming by going <strong>to</strong> locations around the nation, likethe Magic Time Machine restaur<strong>an</strong>ts in S<strong>an</strong> An<strong>to</strong>nio <strong>an</strong>d Dallas, TXwhere mirrors are placed on doors, ceilings, walls, <strong>an</strong>d restrooms of theestablishment <strong>an</strong>d programming themes are part of the everything atthese restaur<strong>an</strong>ts. <strong>The</strong> h<strong>an</strong>dler may tell the slave, “LOSE YOURSELF INTHE INFINITY MIRRORS.” When hypnotically programming in programs,the Programmers place in m<strong>an</strong>y types of images <strong>an</strong>d programs. Someexamples would be having the concept of obedience equal thefountain of youth. <strong>The</strong> fountain of youth flows in the victim’s mind unlessthey step out side of their orders. This c<strong>an</strong> be linked <strong>to</strong> the Sh<strong>an</strong>gri-las<strong>to</strong>ry, where a wom<strong>an</strong> ages as soon as she leaves her place in Sh<strong>an</strong>grila.Another example, is the hypnotic imagery involving the formation of<strong>an</strong> isl<strong>an</strong>d from a volc<strong>an</strong>o. <strong>The</strong> s<strong>to</strong>ry is turned in<strong>to</strong> a programming script<strong>to</strong> allow the System <strong>to</strong> be radically restructured. This Volc<strong>an</strong>oprogramming is a System’s turning program. A volc<strong>an</strong>o erupts fromdeep down, <strong>an</strong>d lava pours in<strong>to</strong> the sea. Mountains are pushing upfrom deep in the mind. To survive people must cross from the old <strong>to</strong> thenew isl<strong>an</strong>d on a bridge that naturally forms. Fire births the new terri<strong>to</strong>ry<strong>an</strong>d destroys the old. <strong>The</strong> new mountains develop trees which becomesafe places for the alters <strong>to</strong> roost upon.HYPNOTICALLY BUILDING IN STRUCTURESLater in the book, the art of building structures internally in the mind ofthe victim will be covered. However, since the process involveshypnotism it would be appropriate <strong>to</strong> discuss briefly how hypnosis c<strong>an</strong>begin <strong>to</strong> work a tree structure in<strong>to</strong> the mind of the child. First, the155


programmer hypnotically suggests that his penis is a growing tree.Later, the programmer might begin, “You know those big trees in thepark that look so big <strong>an</strong>d straight <strong>an</strong>d stretch way up <strong>to</strong>ward the sky?St<strong>an</strong>d up <strong>an</strong>d be one of those trees. St<strong>an</strong>d up really straight <strong>an</strong>d tall astall as you c<strong>an</strong> be, <strong>an</strong>d stretch your arms out <strong>to</strong>ward the sky likebr<strong>an</strong>ches on that big oak tree. Now those big trees have long, deeproots that keep them from falling over. Feel your feet go down downthrough the floor, just like roots on the big strong oak tree.”Final note: there is no way that this book could give every last song ors<strong>to</strong>ry that has been used for programming, nor was it the intention <strong>to</strong>do so. We have w<strong>an</strong>ted <strong>to</strong> point out the popular s<strong>to</strong>ry lines used,although we have missed some such as the Chronicles of Narnia <strong>an</strong>dLittle Red Riding Hood (which is used in several ways along the lines ofyou think you’re going <strong>to</strong> Papa’s, or Gr<strong>an</strong>dma’s house & you end upwith a wolf). Our list left out m<strong>an</strong>y programming songs--all the RollingS<strong>to</strong>ne’s songs, Alabama’s Old Flame, etc.156


CHAPTER 5 SCIENCE NO. 5THE SKILL OF LYING, THE ART OF DECEIT<strong>The</strong> rule of thumb that the programmers/h<strong>an</strong>dlers go by is that they willsay <strong>an</strong>ything <strong>to</strong> get the job done. A CIA h<strong>an</strong>dler will tell his agent in thefield whatever will work <strong>to</strong> get the field agent’s cooperation on amission. <strong>The</strong>re is no height nor breadth nor length <strong>to</strong> these people’sdeception. <strong>The</strong>y have successfully kept some deceptions active fordecades, if not for centuries.THE USE OF FICTION<strong>The</strong> his<strong>to</strong>ry behind the Wizard of Oz programming is interesting. Itsuggests that the Wizard of Oz has had <strong>an</strong> import<strong>an</strong>t part in the occultworld all along. One of the secrets of the Mystery Religions, especiallythe Egypti<strong>an</strong> Isis mystery religion was the ability <strong>to</strong> use drugs <strong>an</strong>d <strong>to</strong>rture<strong>to</strong> create multiple personalities. <strong>The</strong> word Oz is known <strong>to</strong> have beenused by its author as <strong>an</strong> abbreviation for Osirus. Monarch victims havethe “golden penis of Osirus” placed in<strong>to</strong> them. <strong>The</strong> Grimm brothers,who were cabalistic jews, gathered the folk occult s<strong>to</strong>ries <strong>to</strong>gether.<strong>The</strong>ir s<strong>to</strong>ries are full of spells, tr<strong>an</strong>ces, <strong>an</strong>d drugs. Sleeping Beauty is put<strong>to</strong> sleep, <strong>an</strong>d the trigger <strong>to</strong> wake her is a kiss on the lips. <strong>The</strong>se areserious hints that the occult world didn’t s<strong>to</strong>p programming people withdissociative states <strong>an</strong>d triggers when the <strong>an</strong>cient Egypti<strong>an</strong> empires fell.Instead of using modern lingo such as “hypnotize”, they would say“cast a spell.” Later in Freemasonry, the Right Worshipful Master would“charge” (me<strong>an</strong>ing hypnotize) <strong>an</strong> initiate. <strong>The</strong> occultist Baum, amember of the <strong>The</strong>osophical Society, was inspired by some spirit whogave him the “magic key” <strong>to</strong> write the Wizard of Oz book, which cameout in 1900. <strong>The</strong> book’s s<strong>to</strong>ry is full of sat<strong>an</strong>ic activity <strong>an</strong>d sat<strong>an</strong>icthinking. <strong>The</strong> s<strong>to</strong>ry was chosen in the late 1940s <strong>to</strong> be the basis for the<strong>Illuminati</strong>/Intelligence community’s trauma-based <strong>to</strong>tal mind controlprogramming. As a way of enh<strong>an</strong>cing the effect of the programming,Monarch slaves are conditioned <strong>to</strong> place trigger items in<strong>to</strong> their lives.When the movie was made, Judy Garl<strong>an</strong>d, who had lived a life<strong>to</strong>uched by the occult world’s abuse, was chosen <strong>to</strong> act as Dorothy.Judy’s later husb<strong>an</strong>d, Mickey De Vinko was a sat<strong>an</strong>ist <strong>an</strong>d the chiefassist<strong>an</strong>t <strong>to</strong> Roy Radin, a rich sat<strong>an</strong>ist who worked with the <strong>Illuminati</strong>,<strong>an</strong>d who controlled the “Process church” covens which had asmembers mass murderers Berkowitz <strong>an</strong>d Monarch slave CharlieM<strong>an</strong>son. <strong>The</strong>re are several members of the Carr family, who are also157


tied in<strong>to</strong> both De Vinko <strong>an</strong>d Radin’s Process Church <strong>an</strong>d the <strong>Illuminati</strong>.With the numerous long term connections between the Wizard of Ozbooks, <strong>an</strong>d movie <strong>to</strong> the highest levels of the occult world, it is notwithout reason that one c<strong>an</strong> theorize that the original series of 14 Ozbooks had <strong>an</strong> ulterior motive behind them. <strong>The</strong> 14 books of the Ozseries are: 1) <strong>The</strong> Wizard of Oz, 2) <strong>The</strong> L<strong>an</strong>d of Oz, 3) Ozma of Oz, 4)Dorothy <strong>an</strong>d the Wizard in Oz, 5) <strong>The</strong> Road <strong>to</strong> Oz, 6) <strong>The</strong> Emerald City ofOz, 7) <strong>The</strong> Patchwork Girl of Oz, 8) Tik-<strong>to</strong>k of Oz, 9) <strong>The</strong> Scarecrow of Oz,10) Rinkitink in Oz, 11) <strong>The</strong> Lost Princess of Oz, 12) <strong>The</strong> Tinm<strong>an</strong>Woodsm<strong>an</strong> of Oz, 13) <strong>The</strong> Magic of Oz, 14) Glinda of Oz. <strong>The</strong>se booksare still being sold, <strong>an</strong>d are being read <strong>to</strong> children who are beingprogrammed with trauma-based <strong>to</strong>tal mind control. <strong>The</strong> 14 bookscame out in various editions. <strong>The</strong> originals came out in 1900 <strong>an</strong>d shortlythereafter. In the 1930s, the 1940’s, <strong>an</strong>d the 1950’s the words wereretype set <strong>an</strong>d given different pages. (When working with a survivor itmight help <strong>to</strong> identify what decade the edition the slave wasprogrammed with, because the pictures <strong>an</strong>d the page numbers variedfrom edition <strong>to</strong> edition.) Of course, having good pictures is <strong>an</strong> asset inprogramming, because the child will visualize off of the pictures whenbuilding its internal world. In addition <strong>to</strong> this, large Wizard of Oz themeparks are being built by the <strong>Illuminati</strong> <strong>to</strong> provide places <strong>to</strong> carry outprogramming <strong>an</strong>d <strong>to</strong> reinforce the programming which traps the mindsof Monarch slaves. <strong>The</strong> best example of this, is the audacious MGMGr<strong>an</strong>d complex in Las Vegas, although other theme parks aroundAmerica also use a Wizard of Oz theme. If you have read FritzSpringmeier’s Be Wise As Serpents you will know how the <strong>The</strong>osophicalSociety ties in with Freemasonry, Sat<strong>an</strong>ism, <strong>an</strong>d Lucis Trust. Severalfamous members of the <strong>The</strong>osophical Society include:Adolf Hitler (a Sat<strong>an</strong>ist who practiced hum<strong>an</strong> sacrifice, & whohad HPB’s book at his side.)Mahatma G<strong>an</strong>dhi (a Hindu guru considered a god by some of hisfollowers. G<strong>an</strong>dhi was successful with the British in part because of the<strong>The</strong>osophical Society.)H.P. Blavatsky (<strong>The</strong> founder of the <strong>The</strong>osophical Society. She referred<strong>to</strong> herself as HPB. She was initiated by Illuminatus Mazzini in<strong>to</strong>Carbonarism , a form of Freemasonry, illumined by the Great WhiteLodge in 1856, was part of the Hermetic Brotherhood of Luxor, <strong>an</strong>dspent lots of time with the Eddy <strong>Illuminati</strong> family in Vermont, who werewell known mediums. She also was a member of the occult fraternitiesthe Order of the Druses, the Adoptive br<strong>an</strong>ch of the Ancient & PrimitiveRite of Freemasonry, & the hermetic masonic rites of Memphis <strong>an</strong>dMizraim. She was trained <strong>to</strong> h<strong>an</strong>dle live snakes by Sheik Yusuf benMakerzi, the chief of the Serpent H<strong>an</strong>dlers, <strong>an</strong>d she was hypnotized byoccultist Vic<strong>to</strong>r Michal <strong>an</strong>d <strong>to</strong> some degree from 1866 under his158


influence.)Alice Bailey (head of Lucis Trust)Henry Steel Olcott (<strong>an</strong> import<strong>an</strong>t occultist)Elvis Presley (a Monarch slave)M<strong>an</strong>ly P. Hall (<strong>an</strong> <strong>Illuminati</strong> <strong>The</strong>ta Programmer, <strong>an</strong>d at least a Gr<strong>an</strong>dMaster within the <strong>Illuminati</strong> who sat on the Gr<strong>an</strong>d Druid Council.)Fr<strong>an</strong>k Baum<strong>The</strong> m<strong>an</strong> who wrote the book <strong>The</strong> Wizard of Oz was a member of the<strong>The</strong>osophical Society. L. Fr<strong>an</strong>k Baum lived in South Dakota <strong>an</strong>d created<strong>The</strong> Wizard of Oz book as a theosophical fairy tale incorporating the“<strong>an</strong>cient wisdom” of the Mystery Religions. <strong>The</strong> books have so muchmaterial from inside the secret world of the <strong>Illuminati</strong>, that the few whounderst<strong>an</strong>d the <strong>Illuminati</strong> wonder if Baum wasn’t <strong>an</strong> insider. <strong>The</strong> moralof the book is that we must rely upon ourselves, for we alone have thepower <strong>to</strong> save ourselves. This was part of the original lie of Sat<strong>an</strong> in thegarden. Sat<strong>an</strong> has simply dressed up the same original lie in<strong>to</strong> differentpackaging <strong>an</strong>d is distributing it worldwide as the most popularAmeric<strong>an</strong> fairy tale. L. Fr<strong>an</strong>k Baum explained how he came <strong>to</strong> write thebook, “It was pure inspiration....It came <strong>to</strong> me right out of the blue. Ithink that sometimes the Great Author has a message <strong>to</strong> get across<strong>an</strong>d He has <strong>to</strong> use the instrument at h<strong>an</strong>d. I happened <strong>to</strong> be thatmedium, <strong>an</strong>d I believe the magic key was given me <strong>to</strong> open the doors<strong>to</strong> sympathy <strong>an</strong>d underst<strong>an</strong>ding, joy, peace <strong>an</strong>d happiness.” (Hearn,Michael P. ed., <strong>The</strong> Annotated Wizard of Oz. NY: Clarkson N. Potter,1973, p. 73.) In Baum’s time, the head of the <strong>The</strong>osophical Society, H.P.Blavastsky had been putting out her journal called Lucifer. In otherwords, I highly suspect Baum knew what the <strong>The</strong>osophical Society wasall about, <strong>an</strong>d that he himself was deeply in<strong>to</strong> the occult. <strong>The</strong> book <strong>The</strong>Wizard of Oz came out in 1900. (It wasn’t until 1939 that the movie wasmade.) This next section will cover the numerous parallels between theWizard of Oz material <strong>an</strong>d the occult world <strong>an</strong>d the occult world’sprogramming. This is broken up in<strong>to</strong> 3 sections:159


PARALLELS BETWEEN:A. THE WIZARD OF OZ BOOK & OCCULTISMB. THE WIZARD OF OZ MOVIE & ILLUMINATI RITUALSC. THE WIZARD OF OZ SERIES OF BOOKS AND MONARCHPROGRAMMINGFor those readers who are unfamiliar with the occult world, some ofthese parallels at first may seem stretched. When one sees how m<strong>an</strong>yparallels there are, then occult nature of the books begins <strong>to</strong> sink in.<strong>The</strong> authors could provide the reader with more parallels betweenSat<strong>an</strong>ism <strong>an</strong>d <strong>The</strong> Wizard of Oz book, but we believe the following willsuffice. (Some parallels may also apply <strong>to</strong> the movie.)A.THE WIZARD OF OZ BOOK & OCCULTISMAuntie Em represents HP Blavastsky’s “Mulaprakriti” <strong>an</strong>d Uncle Henryrepresents HPB’s “Unm<strong>an</strong>ifested Logos”.<strong>The</strong> carnival huckster (later seen as the Wizard) is advertised as beingconnected <strong>to</strong> the royal families of Europe. <strong>The</strong> Royal families of Europeare secret Sat<strong>an</strong>ists, from powerful occult bloodlines.Dorothy is brought <strong>to</strong> Oz by a cyclone. <strong>The</strong> word cyclone originallywas the greek word cyclone which me<strong>an</strong>s both a circle or the coil of asnake. In other words, the snake takes Dorothy <strong>to</strong> Oz.Dorothy’s three comp<strong>an</strong>ions represent the mental, emotional, <strong>an</strong>dphysical bodies that HPB wrote about. Dorothy acquired these threecomp<strong>an</strong>ions just as <strong>The</strong>osophy says we will when we come in<strong>to</strong>incarnation. To quote HPB “<strong>The</strong>re is no d<strong>an</strong>ger that dauntless couragec<strong>an</strong>not conquer; there is not trial that spotless purity c<strong>an</strong>not passthrough; there is no difficulty that strong intellect c<strong>an</strong>not surmount.”(Algeo, John. “<strong>The</strong> Wizard of Oz: <strong>The</strong> Perilous Journey”, <strong>The</strong> Quest,Summer 1993. Whea<strong>to</strong>n, Il.: <strong>The</strong>osophical Society in Amer.,p. 53.)In the book, the Tin Woodsm<strong>an</strong> was <strong>an</strong> ordinary being of flesh, but awicked witch casts a spell on him. He kept chopping off parts of hisbody, which were then replaced by a tinsmith, until he became the firstbionic m<strong>an</strong>, with a completely mech<strong>an</strong>ic body. Boy, hasn’t the160


<strong>Illuminati</strong> been trying <strong>to</strong> do this one!?In step with Wizard of Oz mind-control programming, the wickedwitch & naughty children c<strong>an</strong>not st<strong>an</strong>d water but dissolve. Roboticclones are created in the minds of Monarch slaves which c<strong>an</strong> only bementally dissolved by mentally placing water on them.Dorothy goes questing in Oz. <strong>The</strong>osophists (New Agers, Sat<strong>an</strong>ists,etc.) go on quests.Oz is shaped like a M<strong>an</strong>dala with Emerald City in the center, <strong>an</strong>impassable barrier, four-sidedness, 4 symbolic colors, the circle <strong>an</strong>d thecenter. <strong>The</strong> colors <strong>an</strong>d directions given in Oz may also have othersymbolic me<strong>an</strong>ings in the occult. For inst<strong>an</strong>ce, Emerald City is green<strong>an</strong>d green is the fourth point of the Eastern Star (women’sFreemasonry) & Sat<strong>an</strong>’s color. A <strong>The</strong> route that Dorothy follows in Ozhas the shape of a T with its 3 points defining <strong>an</strong> inverted tri<strong>an</strong>gle.<strong>The</strong> Yellow Brick Road suggests gold, the perfect metal. Gold isconsidered <strong>to</strong> be divine & the source of wisdom by the <strong>Illuminati</strong>. HPBhad written “<strong>The</strong>re is a Road, steep <strong>an</strong>d thorny, beset with perils ofevery kind, but yet a Road, <strong>an</strong>d it leads <strong>to</strong> the very heart of theuniverse.” This was the yellow brick road that Baum the <strong>The</strong>osophistsought <strong>to</strong> portray in his fairy tale. <strong>The</strong> book contains a great deal moreperils <strong>an</strong>d adventures on the road th<strong>an</strong> the movie.<strong>The</strong> article shows that the great teacher is a humbug but Dorothy<strong>an</strong>d her own comp<strong>an</strong>ions have the abilities <strong>to</strong> help themselves if theyonly will realize their own powers through the help of the good witch ofthe south. This is in line with the <strong>The</strong>osophical Society’s, the Church ofSat<strong>an</strong>’s, <strong>an</strong>d other occult groups teachings which teach that theindividual has the capabilities within themselves <strong>to</strong> achieve <strong>an</strong>ything.One of the <strong>The</strong>osophical Society’s publications states, “Prepare thyself,for thou wilt have <strong>to</strong> travel on alone. <strong>The</strong> teacher c<strong>an</strong> but point theway.” (“<strong>The</strong> Voice of Silence” as quoted in “<strong>The</strong> Wizard of Oz” article,Quest, Summer, 1993 p. 54.) Part of the mind set of Sat<strong>an</strong>ism is thatreality <strong>an</strong>d f<strong>an</strong>tasy become blurred. This blurring has been part of thebrainwashing that is being systematically given <strong>to</strong> Americ<strong>an</strong> children.Within Monarch slaves they have <strong>an</strong> incredibly difficult time trying <strong>to</strong>differentiate between reality <strong>an</strong>d f<strong>an</strong>tasy because of all the mindprogramming they have been subjected <strong>to</strong>o. <strong>The</strong>re are severaltechniques which will determine for Monarch survivors if their memoriesare real. In the board game called <strong>Illuminati</strong>!, put out by peopleconnected <strong>to</strong> the <strong>Illuminati</strong>, the game states, “Don’t believe <strong>an</strong>y ofthis, it is all true.” <strong>The</strong>se are the type of double-bind self contradic<strong>to</strong>rystatements that Sat<strong>an</strong>ists love <strong>to</strong> spew out. Monarch slaves areprogrammed full of double-binds. With the Sat<strong>an</strong>ist’s pench<strong>an</strong>t for161


lurring reality in mind, read the following quote where the President ofthe <strong>The</strong>osophical Society admiringly describes the Wizard of Oz, “Par<strong>to</strong>f Baum’s joke is that things are never what they seem. Dorothy seems<strong>to</strong> be a simple <strong>an</strong>d harmless little girl, but it is she who kills the wickedwitches of both East <strong>an</strong>d West. <strong>The</strong> Scarecrow seems <strong>to</strong> lack brains, buthe has all the ideas in the comp<strong>an</strong>y. <strong>The</strong> Tin Woodm<strong>an</strong> seems <strong>to</strong> lack aheart, but he is so full of sentiment that he is always weeping. <strong>The</strong>Cowardly Lion seems <strong>to</strong> be a coward, but he takes brave actionwhenever it is called for. <strong>The</strong> Wizard seems <strong>to</strong> be great <strong>an</strong>d powerful,but he is actually a humbug. Oz seems <strong>to</strong> be a glorious <strong>an</strong>d delightfull<strong>an</strong>d <strong>an</strong>d K<strong>an</strong>sas <strong>to</strong> be dry, gray, <strong>an</strong>d dull--but Oz is a world of illusion<strong>an</strong>d K<strong>an</strong>sas is really home. Things are not what they seem, in Oz orK<strong>an</strong>sas.”B. RELATIONSHIPS BETWEEN THE MOVIE & ILLUMINATI RITUAL<strong>The</strong> close relationship between Dorothy <strong>an</strong>d her dog is a very subtleconnection between the sat<strong>an</strong>ic cults use of <strong>an</strong>imals (familiars). Thosewho read Vol. 1, may remember the example written about on how<strong>Illuminati</strong> Kingpin Alfred I. du Pont’s dog Mummy served as Alfred’sfamiliar spirit. Animals are very often used in ritual. This connection isvery subtle, perhaps <strong>to</strong>o subtle for it <strong>to</strong> be worthy of mention, exceptthat those in Sat<strong>an</strong>ism will see the signific<strong>an</strong>ce, even though otherswon’t. What is trivial <strong>to</strong> one person may not be <strong>to</strong> the next. A Monarchslave as a child will be allowed <strong>to</strong> bond with a pet. <strong>The</strong> child will w<strong>an</strong>t<strong>to</strong> bond with a pet <strong>an</strong>yway because people are terrifying by this point.<strong>The</strong>n the pet is killed in porn <strong>to</strong> traumatize the child. This happens quitefrequently.<strong>The</strong> Rainbow--with its seven colors have long had <strong>an</strong> occultsignific<strong>an</strong>ce of being a great spiritual hypnotic device. Const<strong>an</strong>ceCumbey, in her book <strong>The</strong> Hidden D<strong>an</strong>gers of the Rainbow, whichexposes the New Age Occult Movement, correctly writes, “<strong>The</strong>Rainbow (also called the Antahkar<strong>an</strong>a or Rainbow Bridge). This is usedas a hypnotic device.,, (p.261) <strong>The</strong> Supreme Council of the 33rd 0 ofFreemasonry has used the rainbow on the cover of their magazine. In abook teaching Druidism (as in <strong>Illuminati</strong> Druidism), <strong>The</strong> 21 Lessons ofMeryln, the Rainbow is described as “A true sign of Magic...it exists inboth worlds at once!”Elvira Gulch is a wom<strong>an</strong> who owns 1/2 of the county where Dorothylives in K<strong>an</strong>sas. She is shown later in the L<strong>an</strong>d of Oz tr<strong>an</strong>sformed as awitch. M<strong>an</strong>y of the <strong>Illuminati</strong> elite are rich <strong>an</strong>d lead double lives. Peoplewho meet them at a ritual will see the dark side of these rich people. Atthe rituals, people are tr<strong>an</strong>ced from drugs, ch<strong>an</strong>ting, <strong>an</strong>d mind control;162


they are “over the rainbow.”Professor Marvel uses a crystal ball which he claims was used by thePriests of Isis. Isis <strong>an</strong>d Osirus are both part of the Ancient Egypti<strong>an</strong>Mystery religion <strong>an</strong>d modern Sat<strong>an</strong>ism.K<strong>an</strong>sas is black & white, Oz is in color. Reality is downplayed inwitchcraft <strong>an</strong>d sat<strong>an</strong>ism. Make believe is considered more colorfulth<strong>an</strong> reality. Also as <strong>an</strong> escape from this world, Sat<strong>an</strong>ists use drugs <strong>to</strong>enh<strong>an</strong>ce their perception of colors. Some of the famous writers <strong>to</strong>okdrugs which put them in<strong>to</strong> altered states of consciousness in order <strong>to</strong>release their creativity.Both good <strong>an</strong>d bad witches in Oz carry staffs. In Sat<strong>an</strong>ism & the<strong>Illuminati</strong>, Priestesses also carry similar staffs. Also the idea that there aregood <strong>an</strong>d evil witches -- white <strong>an</strong>d black magic is straight from theoccult, <strong>an</strong>d follows the <strong>Illuminati</strong>’s gnostic beliefs.Several scenes involve tr<strong>an</strong>sference of power via tr<strong>an</strong>sference ofslippers from a witch. In <strong>Illuminati</strong> ritual, <strong>to</strong> tr<strong>an</strong>sfer power, a Matriarch,or Mother of Darkness will kill the person in a position of authority with astrike on the forehead with a special mace like staff, <strong>an</strong>d then put ontheir slippers. Ruby colored slippers are actually used as a symbol ofauthority at the Matriarch level in the <strong>Illuminati</strong>. <strong>The</strong> shoes are said <strong>to</strong>be golden at the Mothers of Darkness level in the <strong>Illuminati</strong>.<strong>The</strong> bad witch uses poison, poisoned apples <strong>an</strong>d poisoned brew.Sat<strong>an</strong>ic covens in real life do this same thing.<strong>The</strong> wizard is portrayed as someone who rules <strong>an</strong>d is benevolent. Inwitchcraft, wizards do rule (even though in some groups wizards aresimply called witches.)Winged monkeys in the haunted forest, harken back <strong>to</strong> the pag<strong>an</strong>cultures which placed wings on various <strong>an</strong>imal idols.<strong>The</strong> trees are alive like <strong>an</strong>imals in the film. <strong>The</strong> <strong>Illuminati</strong> believe thatthe trees have spirits. In one of the Oz films, even the s<strong>to</strong>nes havepersonality <strong>an</strong>d talk. This comes straight out of Druidism.<strong>The</strong> Tin M<strong>an</strong> is a person which has been part of <strong>Illuminati</strong>ceremonies. <strong>The</strong> first initial ceremony that children of the <strong>Illuminati</strong> mayremember is where a Tin M<strong>an</strong> with <strong>an</strong> ax watches over theirpresentation <strong>to</strong> the coven.If the parent presents the child, nothing is done, but if the parentrefuses <strong>to</strong> present the children, then the Tin M<strong>an</strong> in the ritual will use his163


ax <strong>to</strong> sever the child’s head on a chopping block. (<strong>The</strong> Tin M<strong>an</strong> will alsoappear in Tin M<strong>an</strong> programming, <strong>an</strong>d a Tin M<strong>an</strong>’s Castle may well bebuilt in the Monarch slave’s head, but the point here is that the Tin M<strong>an</strong>is also part of ritual.)Dorothy kills the wicked witch of the west by a sharp blow <strong>to</strong> theforehead with the witch’s staff. This is what is done in the <strong>Illuminati</strong>,when <strong>an</strong> elderly witch is being replaced. In both cases, whether in themovie or in real life in the <strong>Illuminati</strong>, when a witch is killed the peoplehave a ceremony. In real life in the secret world of the <strong>Illuminati</strong>, a scrollis used <strong>to</strong> certify that the witch is dead both physically <strong>an</strong>d spiritually.(<strong>The</strong> movie had this in it.) Just one example of the thous<strong>an</strong>ds of<strong>Illuminati</strong> Gr<strong>an</strong>de Dames killed in ritual like this is the recent billionairessDorris Duke, who was ritually killed in 1993 on Halloween, also called AllHallows Eve, in the Beverly Hills, CA area. <strong>The</strong> <strong>Illuminati</strong> method for killinga Gr<strong>an</strong>de Dame <strong>an</strong>d passing her spiritual power on is done withreverence. No blood is <strong>to</strong> be spilt out of respect for the elderly wom<strong>an</strong>who gives up her life willingly. At death, the last breath is inhaled by thereplacement <strong>to</strong> tr<strong>an</strong>sfer the power. <strong>The</strong>re may be as m<strong>an</strong>y as 2,197Gr<strong>an</strong>de Dames at such a coronation. <strong>The</strong> Gr<strong>an</strong>de Mothers (whoseSystems are mistresses for Sat<strong>an</strong> <strong>an</strong>d hierarchy leaders) <strong>an</strong>d the nextr<strong>an</strong>k, the Gr<strong>an</strong>de Dames, are often veiled in ritual <strong>an</strong>d would wearrobes with different colored lining. <strong>The</strong> different colors of linings showthe different grades. A typical Gr<strong>an</strong>de Mother vestment or robe is ablack satin & velvet dress with a draped neckline, <strong>an</strong>d ritual symbolsdown the center of the robe. After someone like Dorris Duke willinglygives her (their) life, her head is served on a silver platter at a b<strong>an</strong>quet.For the deeper alters of a high level slave, this is part of their way of life;they are <strong>to</strong>ld it is their birthright <strong>an</strong>d heritage. Such alters will not beable <strong>to</strong> identify with the culture at large. To give up their programming,me<strong>an</strong>s giving up their magickal powers <strong>an</strong>d their culture, which theyhave had <strong>to</strong> work hard for. To leave they would need <strong>to</strong> see somethingthat they perceive as better. <strong>The</strong>y are locked in<strong>to</strong> their slavery due do<strong>to</strong> their exposure <strong>to</strong> only a secret <strong>Illuminati</strong> culture <strong>an</strong>d value system.Because of their dissociation with the rest of their own System of alters,they don’t perceive a need <strong>to</strong> ch<strong>an</strong>ge their lifestyle <strong>an</strong>ymore th<strong>an</strong> aBushm<strong>an</strong> would be able <strong>to</strong> feel a need <strong>to</strong> wear shoes. Why should theBushm<strong>an</strong> w<strong>an</strong>t shoes, if he has gotten along without them? Why shoulda high level slave w<strong>an</strong>t ch<strong>an</strong>ge, when they have gotten along withoutit? Experience shows that during deprogramming most of the lowerlevel alters will w<strong>an</strong>t <strong>to</strong> escape their abuse, but the higher level ritualalters are so separated from the abuse they don’t w<strong>an</strong>t <strong>to</strong> give up theirstatus <strong>an</strong>d culture.Throughout the movie, scrolls are used. As stated, Moriah continues<strong>to</strong> use scrolls for their official ritual functions.164


<strong>The</strong> wicked witch of the west says that her question was not “<strong>to</strong> kill ornot <strong>to</strong> kill” Dorothy?, but rather HOW <strong>to</strong> kill Dorothy for “these thingsmust be done delicately.” This is exactly the attitude displayed withinthe <strong>Illuminati</strong>.<strong>The</strong> film has occult items such as crystal balls in several scenes,haunted castles, magic <strong>an</strong>d a benevolent wizard.At one point the Lion says, “I do believe in spooks [ghosts], I do, I do, Ido, I do.” (Today, intelligence agents are also called spooks.)<strong>The</strong> Lion, Tinm<strong>an</strong>, Dorothy <strong>an</strong>d the Scarecrow must provethemselves worthy <strong>to</strong> receive the benevolence from Oz. <strong>The</strong> occult isfull of rituals where the particip<strong>an</strong>t must prove himself worthy.<strong>The</strong> phrase “seeds of learning” is used in <strong>Illuminati</strong> ceremonies. Staffslike the movie has are used by various occult groups. <strong>The</strong>se staffs oftenserve as stun guns, so that shocks c<strong>an</strong> be applied during ceremonies.<strong>The</strong> shocks may be applied so that the victim doesn’t remember theceremony.C. PARALLELS BETWEEN THE WIZARD OF OZ SERIES OF BOOKS ANDMONARCH PROGRAMMING<strong>The</strong> following are parts of the Wizard of Oz Monarch Programming,which is a base programming put in when the child is very young.Some of the slaves know portions of the Wizard of Oz script word-forword.Dorothy is <strong>to</strong>ld she doesn’t have a brain if she has gotten in<strong>to</strong>trouble.Dorothy is looking for a place where there is no trouble which is aplace “over the rainbow.” To escape pain, alters go over the rainbow.(This is a.k.a. in Alice In Wonderl<strong>an</strong>d Programming as “going throughthe looking glass”.Dorothy becomes unconscious, the world begins spinning, <strong>an</strong>d thenshe see disjointed pictures. This also happens <strong>to</strong> Monarch slaves. Laterin the film, Dorothy states, “My! people come <strong>an</strong>d go so quickly.” This isexactly what happens <strong>to</strong> the Monarch slave whose multiplepersonalities come <strong>an</strong>d go. When the multiple personalities switch in<strong>an</strong>d out very fast a spinning process c<strong>an</strong> start which c<strong>an</strong> be d<strong>an</strong>gerousif it doesn’t s<strong>to</strong>p. Just like most hiccuping s<strong>to</strong>ps on its own, the rapiduncontrolled switching (which c<strong>an</strong> be triggered by stress) usually s<strong>to</strong>ps165


on its own. Systems which subconsciously know they are going <strong>to</strong> be<strong>to</strong>rtured <strong>an</strong>d used may out of a subconscious fear begin this revolvingswitching. It is said that the Monarch victim will become coma<strong>to</strong>se ifthe rapid spinning goes on <strong>to</strong>o long. Personalities are switched in whatare called “<strong>to</strong>rnado spins” or “<strong>to</strong>rnado spinning” <strong>an</strong>d personalitiescalled “spin off’ personalities come up according <strong>to</strong> the number ofrevolutions the slave is comm<strong>an</strong>ded <strong>to</strong> spin. By spinning the slave, themaster c<strong>an</strong> choose what sexual perversion he w<strong>an</strong>ts as each “spin off’personality has been trained <strong>to</strong> carry out a different perversion.Over the rainbow in Oz is for the Monarch slave <strong>to</strong> be in a tr<strong>an</strong>ce,<strong>an</strong>d in<strong>to</strong> a certain area of the programming. To be fluctuating at bothends as <strong>an</strong> observer <strong>an</strong>d not a particip<strong>an</strong>t or <strong>to</strong> go <strong>to</strong> the otherextreme <strong>an</strong>d become a particip<strong>an</strong>t. <strong>The</strong> theme song of the moviegoes, “Somewhere over the Rainbow...there’s a l<strong>an</strong>d where thedreams that you dare <strong>to</strong> dream really come true.” <strong>The</strong>se lyrics are amethod <strong>to</strong> hypnotically confuse the brain <strong>to</strong> perceive that the “overthe Rainbow experience” (which is usually horrible abuse) is a “dream”.<strong>The</strong> dissociative mind is only <strong>to</strong>o happy <strong>to</strong> call the trauma a dream,which is lived as a reality for a moment, but is nevertheless recorded bythe mind as a f<strong>an</strong>tasy. <strong>The</strong> term for this is cryp<strong>to</strong>amnesia, which me<strong>an</strong>sthe process where the proper functioning of memory is hypnoticallymessed up. <strong>The</strong> slave’s internal world becomes “reality” <strong>an</strong>d theexternal real world becomes the L<strong>an</strong>d of Oz which is perceived asmake-believe.Dwarfs are used in the internal programming. (Hollywood hired alarge number of them for the movie’s cast. <strong>The</strong>y are called Munchkinsin the movie.) Mengele, known as the programmer Dr. Green, wasespecially interested in experimenting traumas on dwarfs.For bona-fides & recognition signals, the Monarch slaves weardiamonds <strong>to</strong> signify they are presidential models, rubies <strong>to</strong> signify theirOz programming for prostitution, <strong>an</strong>d emeralds <strong>to</strong> signify theirprogramming <strong>to</strong> do drug business. Rings are also used <strong>to</strong> signify whatactivity the slave is doing, <strong>an</strong>d what r<strong>an</strong>k or level they are in the occult.Monarch slaves are taught <strong>to</strong> “follow the yellow brick road.” Nomatter what fearful things lie ahead, the Monarch slave must follow theYellow Brick Road which is set out before them by their master. Forsome slaves used as track stars, their Yellow Brick Road was the trackthey had <strong>to</strong> run. <strong>The</strong> Yellow Brick Road is the runway in which alterswere trained <strong>to</strong> fly off from <strong>to</strong> exit their internal world <strong>an</strong>d take thebody. <strong>The</strong> Yellow Brick Road also pertains <strong>to</strong> the assignment that <strong>an</strong>alter is given. To follow the Yellow Brick Road is <strong>to</strong> go down the roadthat has been assigned by comm<strong>an</strong>d. <strong>The</strong> Yellow Brick Roadprogramming is placed in<strong>to</strong> the child’s mind via the Yellow Brick Road166


of the Wizard of Oz s<strong>to</strong>ry. Remember the key words, “Follow the YellowBrick Road.” To get someone on<strong>to</strong> the Yellow Brick Road you mustknow the access code <strong>to</strong> get them through the poppy field. <strong>The</strong> colorcodes are import<strong>an</strong>t <strong>to</strong> get <strong>an</strong> alter through the field of poppies.“Fiddler” is import<strong>an</strong>t word <strong>to</strong> get <strong>to</strong> the yellow brick road (it signifiesthe programmer in the context of “the programmer is here, go over therainbow”) <strong>an</strong>d then the alters eat what is variously called MUSIC or aSCRIPT or A LETTER which are words me<strong>an</strong>ing “instructions.” In the 1900edition of the book on page 3 1-32 says (programming cues are incaps), “She closed the door, locked it, <strong>an</strong>d put the KEY carefully in thepocket of her dress. And so, with To<strong>to</strong> trotting along soberly behind her,SHE STARTED ON HER JOURNEY. THERE WERE SEVERAL ROADS NEAR BY,BUT IT DID NOT TAKE HER LONG TO FIND THE ONE PAVED WITH YELLOWBRICK. Within a short time she was walking briskly <strong>to</strong>ward the EMERALDCITY, HER SILVER SHOES tinkling merrily on the hard, YELLOW ROADBED.<strong>The</strong> sun shone BRIGHT AND THE BIRDS SANG SWEET <strong>an</strong>d Dorothy did notfeel nearly as bad as you might think a little girl would who had beenSUDDENLY WHISKED AWAY FROM HER OWN COUNTRY AND SET DOWNIN THE MIDST OF A STRANGE LAND....<strong>The</strong> houses of the Munchkins wereodd-looking dwellings,...ALL WERE PAINTED BLUE, for in this country ofthe EAST BLUE WAS THE FAVORITE COLOR.. .FIVE LITTLE FIDDLERS PLAYEDAS LOUDLY AS POSSIBLE AND THE PEOPLE WERE LAUGHING ANDSINGING, while a big table nearby was loaded with DELICIOUS FRUITS[the programs] <strong>an</strong>d NUTS, PIES, <strong>an</strong>d cakes, <strong>an</strong>d m<strong>an</strong>y OTHER GOODTHINGS TO EAT [scripts <strong>to</strong> ingest].”Monarch slaves are threatened with fire, like the Scarecrow. <strong>The</strong>yalso see people dismembered like the Scarecrow was dismembered.For them it is not <strong>an</strong> idle threat. <strong>The</strong> front alters also have hearts full ofpain like Scarecrow.Certain alters are not given courage <strong>an</strong>d most have their heartstaken from them. <strong>The</strong> alters who are programmed not <strong>to</strong> have heartsare hypnotically <strong>to</strong>ld the same thing the Tin M<strong>an</strong> says, “I could behum<strong>an</strong> if I only had a heart.” (See Chapter 4, where it discusseshypnosurgery.)Some alters are taught they are stupid <strong>an</strong>d have no brain.Scarecrow is asked the question, “How c<strong>an</strong> you talk without a brain?Scarecrow <strong>an</strong>swers, “Some people without a brain c<strong>an</strong> do a lot oftalking.”Emerald City is used in programming. Emerald City in theprogramming will be well guarded <strong>an</strong>d hard <strong>to</strong> reach. Severalimport<strong>an</strong>t things will be placed inside the Emerald City, including thedeeper <strong>Illuminati</strong> alters.167


Castles are used in the programming. Lots of castles, either in themind’s imagery or purely demoniac are placed in<strong>to</strong> the slave’s mind.Winged monkeys are able <strong>to</strong> watch in the movies somewhat as spysatellites. Winged monkeys are used in the programming <strong>to</strong> create afear of always being watched.<strong>The</strong> Flowers used in the movie <strong>an</strong>d books, are also used in theprogramming. <strong>The</strong> witch uses poppy flowers <strong>to</strong> put the lion <strong>an</strong>d Dorothy<strong>to</strong> sleep. Opium <strong>an</strong>d cocaine are used <strong>to</strong> tr<strong>an</strong>quilize Monarch slaves.An alter of a slave will get tr<strong>an</strong>cy when they enter the poppy field.(Heroin <strong>an</strong>d cocaine come from poppies.) In the film, Dorothy says,“What is happening? I’m so sleepy.” She <strong>an</strong>d the lion get sleepy for noapparent reason very quickly. Monarch slaves do the same thing.Waking up with snow in the movie is nothing less th<strong>an</strong> <strong>an</strong> allusion <strong>to</strong>cocaine which is a common subst<strong>an</strong>ce given <strong>to</strong> Monarch slaves <strong>to</strong>help make them dependent.Dorothy states at one point in the movie that she “doesn’tremember”. She then follows this up with “I guess it doesn’t matter.”Hour glasses appear in the movie in several spots, <strong>an</strong>d they alsooccur in various contexts in people who have been programmed bythe Monarch programming. Some victims of the programming havehour glass configurations each created around a separate axis. <strong>The</strong>hour glasses have the ability <strong>to</strong> be rotated which causes certain alters<strong>to</strong> be brought forward. Monarch slave masters have also used hourglasses <strong>to</strong> indicate <strong>to</strong> their slaves that death was imminent <strong>an</strong>d thattime was running out. This is the way the wicked witch used the hourglass on Dorothy, who happens <strong>to</strong> be saved just as the hour glass runsout. Some Monarch slave masters actually have large hour glasses(sometimes 3’ high) like in the movie. (In Cathy O’Brien’sau<strong>to</strong>biography of her life as a Monarch slave Tr<strong>an</strong>sformation ofAmerica she has a pho<strong>to</strong>graph of Sec. of Defense Cheney’s hour glasson his desk with him seated. This hour glass was used <strong>to</strong> threaten her asa slave.) When a Monarch slave sees <strong>an</strong> hour glass they may switch,but basically it is a reminder that the slave masters have the power <strong>to</strong>run a person’s time out. One slave was <strong>to</strong>ld, “<strong>The</strong> s<strong>an</strong>d that sifts throughthe hourglass is a measure of your worthiness <strong>to</strong> live or die.” <strong>The</strong> hourglass shape is basically two tri<strong>an</strong>gles which <strong>to</strong>uch at their peaks, or <strong>an</strong> Xconfiguration with the <strong>to</strong>ps of the X having lines. <strong>The</strong> child’s mind is <strong>to</strong>visualize this configuration as a compass, as the four points N, 5, E, W,they are <strong>to</strong> see the X configuration also as <strong>an</strong> x, y axis upon which acity is structured upon. <strong>The</strong> hour glass then is tied <strong>to</strong> several otherconcepts which integrate themselves well with the basic X shape ofthe hour glass. Circles with X’s are stacked on <strong>to</strong>p of each other <strong>to</strong> formthe different worlds which contain the alters. <strong>The</strong> two pie shaped168


pieces of the hour glass will hold one world, while the hour glassconfiguration made by the other two adjacent pieces hold the lookingglass mirror images of each alter. Each hour glass is called 2 quadr<strong>an</strong>ts.To remove 4 quadr<strong>an</strong>ts would of course take both alters <strong>an</strong>d mirrorimages with it. In mathematics, it could be stated that regular alters arein quadr<strong>an</strong>t x,y <strong>an</strong>d -x, -y. And that the looking glass people--the mirrorimages, early splits made from each alter as a copy, are in quadr<strong>an</strong>ts -x, y <strong>an</strong>d x, -y. (See the chapter on how <strong>to</strong> structure a System)“Click your heel <strong>to</strong>gether <strong>an</strong>d be there in a snap” is both in themovie <strong>an</strong>d in the programming cues. Military Monarch slave modelsare especially taught <strong>to</strong> click their heels <strong>to</strong>gether. (Joseph Mengele, Dr.Black, Michael Aquino <strong>an</strong>d others also liked <strong>to</strong> click their Nazi boots<strong>to</strong>gether while they programmed children.)“SILENCE!” is both in the movie <strong>an</strong>d a comm<strong>an</strong>d of the OzProgramming. This word SILENCE st<strong>an</strong>ds for a code of “no talk” whichruns deep in the mind of the slave.As in the movie, certain slave alters will talk <strong>to</strong> their masters asDorothy did, “If you please, Sir...”<strong>The</strong> keys (<strong>an</strong>d triggers) <strong>to</strong> control the switching of personalities <strong>an</strong>d<strong>to</strong> give orders are frequently based on Wizard of Oz material. AMonarch slave owner might use cues based on the Wizard of Oz suchas“THERE’S A PAIR OF MAGIC SHOES TO WEAR WITH YOURDRESS...SOMETHING IN LIGHTENING...TO TRANSPORT YOU FASTER THANTHE OL’ RUBY SLIPPERS.” (Quote from O’Brien, Cathy. “Operation CarrierPigeon”, Monograph, pg. 2.) A cryptic death threat given <strong>to</strong> Cathy asa slave by h<strong>an</strong>dler Sec. of Defense Cheney <strong>to</strong> kill her daughter bytaking off her daughter’s ears was then backed up by the hypnoticcomm<strong>an</strong>d based on Wizard of Oz programming, “I’LL GET HER, MYPRETTY. . .YOUR LITTLE GIRL.”<strong>The</strong> programming that is related <strong>to</strong> the Tin M<strong>an</strong> produces amonarch slave which isdescribed as “A WELL OILED MACHINE” by the h<strong>an</strong>dlers. U.S. Sen. AllenSimpson, one of the perpetra<strong>to</strong>rs of the Monarch Program, referred <strong>to</strong>the Tin M<strong>an</strong> programming when he <strong>to</strong>ld a slave “THESE ARE BUT EMPTYSHELLS OF THE LIFE THEY WERE ONCE POSSESSED. LIKE YOU ARE--EMPTYAND VOID OF LIFE.”Phrases like “troubles melt” c<strong>an</strong> be found in both the movie <strong>an</strong>d inthe programming.169


Let’s now cover what programming is based on the Oz books, that isn’tfound in the movie. A great deal of the Oz programming comes fromthe books, of which only the first book was used for the movie. <strong>The</strong>public is familiar with the movie which is based on the first one, but ingeneral doesn’t know the other books exist. We will not go through thescripts of all 14 books--there isn’t room for that, but by going through afew of the books, the reader will begin <strong>to</strong> see the massive amount ofmaterial which was used for programming scripts in the Oz books. It isone thing <strong>to</strong> say, the Wizard of Oz was used as a mind-controlprogramming script, but that doesn’t convey the extent of it. Largesections of the 14 books are almost perfect for mind-control. If you takethe trouble <strong>to</strong> read these quotes, you may find yourself startled at whatyou thought at first gl<strong>an</strong>ce was a nice child s<strong>to</strong>ry!pg. 38 Book 1 <strong>The</strong> Wizard of Oz, “That is true,” said the Scarecrow. “Yousee,” he continued, confidently, “I DON’T MIND MY LEGS AND ARMSAND BODY BEING STUFFED, BECAUSE I CANNOT GET HURT. IF ANYONETREADS ON MY TOES OR STICKS A PIN INTO ME, IT DOESN’T MATTER, FORI CAN’T FEEL IT.” This is teaching dissociation. <strong>The</strong> slaves actually dohave pins & needles stuck in<strong>to</strong> them, or <strong>to</strong>othpicks under theirfingernails, etc. If <strong>an</strong>yone asks the slave a question they c<strong>an</strong> sayaccording <strong>to</strong> the script, “I don’t know <strong>an</strong>ything.” <strong>The</strong> inf<strong>an</strong>t slave will betaught words like this “STICKS & STONES MAY BREAK MY BACK, BUTWORDS WILL NEVER HURT ME, BECAUSE I’M NOT HERE.”pg. 41 Book 1 <strong>The</strong> Wizard of Oz, “It never hurt him, however, <strong>an</strong>dDorothy would pick him up <strong>an</strong>d set him upon his feet again, while hejoined her in laughing merrily at his own mishap.” This is teaching theprogramming “IT’S O.K., IT DOESN’T MATTER, NOTHING WRONG HERE”that the slave is taught <strong>to</strong> tell the world.pg. 40 Book 1 <strong>The</strong> Wizard of Oz, “nest of rats in the straw, ...at thescarecrow.” <strong>The</strong> mice in a Monarch System which control the turning ofthe quadr<strong>an</strong>t’s clock, hide from the scarecrow. pg. 42 Book 1 <strong>The</strong>Wizard of Oz, “fewer fruit trees...” If the slave eats the fruit [code forprograms] without permission, the dwarf munchkins will beat the alterwith their clubs. Also on this page HOME is called KANSAS, <strong>an</strong>d it isdescribed as “how gray everything was there.” In other words, realityisn’t as great <strong>an</strong>d colorful as the make believe internal world you c<strong>an</strong>build in your mind <strong>to</strong> escape this hell we’re giving you.pg. 43 Book 1 <strong>The</strong> Wizard of Oz, <strong>The</strong> Scarecrow looked at herreproachfully, <strong>an</strong>d <strong>an</strong>swered, “My life has been so short that I reallyknow nothing whatever. I was only made day before yesterday. Whathappened in the world before that time is all unknown <strong>to</strong> me. Luckily,170


when the farmer made my head, one of the first things he did was <strong>to</strong>paint my ears, so that I heard what was going on.” This is the script read<strong>to</strong> new alters, <strong>to</strong> help them have a cle<strong>an</strong> slate before programmingthem with <strong>an</strong>other new script. This is coupled with the Wizard of Oztheme that the Wizard gives brains (what <strong>to</strong> think) <strong>to</strong> the Scarecrow.<strong>The</strong> alters are hypnotically programmed that if they think on their own--then they are empty headed like the Scarecrow. <strong>The</strong>y c<strong>an</strong> only havesomething in their head if they let the Wizard give them what <strong>to</strong> think.pg. 45 Book 1 <strong>The</strong> Wizard of Oz, “It was a lonely life <strong>to</strong> lead, for I hadnothing <strong>to</strong> think of, having been made such a little while before.” This ispart of the script read a new alter.pg. 48 Book 1 <strong>The</strong> Wizard of Oz, “So the Scarecrow led her through thetrees until they reached the cottage, <strong>an</strong>d Dorothy entered <strong>an</strong>d founda bed of dried leaves in one corner. She lay down at once, <strong>an</strong>d withTo<strong>to</strong> beside her, soon fell in<strong>to</strong> a sound sleep. the Scarecrow who wasnever tired, s<strong>to</strong>od up in <strong>an</strong>other corner <strong>an</strong>d waited...” This was used <strong>to</strong>program part of a script for <strong>an</strong> <strong>Illuminati</strong> ceremony.pg. 57 Book 1 <strong>The</strong> Wizard of Oz, “So the old wom<strong>an</strong> went <strong>to</strong> the wickedWitch of the East, <strong>an</strong>d promised her two sheep <strong>an</strong>d a cow if she wouldprevent the marriage. <strong>The</strong>refore, upon the wicked Witch ench<strong>an</strong>tedmy axe, <strong>an</strong>d when I was chopping away...the axe slipped all at once<strong>an</strong>d cut off my left leg. “This at first seemed a great misfortune, for Iknew a one-legged m<strong>an</strong> could not do very well as a woodchopper. SoI went <strong>to</strong> a tinsmith <strong>an</strong>d had him make me a new leg out of tin. <strong>The</strong> legworked very well, once I was used <strong>to</strong> it; but my action <strong>an</strong>gered thewicked Witch of the East, for she had promised the old wom<strong>an</strong> I shouldnot marry the pretty Munchkin girl. When I beg<strong>an</strong> chopping again myaxe slipped <strong>an</strong>d cut off my right leg. Again I went <strong>to</strong> the tinner, <strong>an</strong>dagain he made me a leg out of tin. After this the ench<strong>an</strong>ted axe cu<strong>to</strong>ff my arms, one after the other; but, nothing daunted, I had themreplaced with tin ones. <strong>The</strong> wicked Witch then made the axe slip <strong>an</strong>dcut off my head, <strong>an</strong>d at first I thought that was the end of me. But thetinner happened <strong>to</strong> come along, <strong>an</strong>d he made me a new head out oftin.” This is <strong>an</strong> <strong>Illuminati</strong> ceremony script done by Dr. Mengele withchildren at a very young age. It was a blood oath <strong>to</strong> “Green” that ifthey let <strong>an</strong>yone <strong>to</strong>uch the programming they would cut themselves.pg. 58 Book 1 <strong>The</strong> Wizard of Oz, “...splitting me in<strong>to</strong> two halves. Oncemore the tinner came <strong>to</strong> my help <strong>an</strong>d made me a body of tin,fastening my tin arms...But alas! I had now no heart, so that I lost all mylove for the Munchkin girl... I had known was the loss of my heart. WhileI was in love I was the happiest m<strong>an</strong> on earth; but no one c<strong>an</strong> lovewho has not a heart, <strong>an</strong>d so I am resolved <strong>to</strong> ask Oz <strong>to</strong> give me one.”171


pg. 66 Book 1 <strong>The</strong> Wizard of Oz, <strong>The</strong> Scarecrow, the Tin Woodsm<strong>an</strong> <strong>an</strong>dDorothy expect that the Wizard of Oz c<strong>an</strong> give a brain, a heart, <strong>an</strong>dsend Dorothy back <strong>to</strong> K<strong>an</strong>sas. Under programming the Master as theWizard c<strong>an</strong> give alters what he w<strong>an</strong>ts including sending them back <strong>to</strong>K<strong>an</strong>sas (their internal reality). pg. 77 Book 1 <strong>The</strong> Wizard of Oz, “...theycould see the road of yellow brick running through a beautiful country,with green meadows dotted with bright flowers <strong>an</strong>d all the roadbordered with trees h<strong>an</strong>ging full of delicious fruits.” This is used for theimagery of the yellow brick road.pg. 87 Book 1 <strong>The</strong> Wizard of Oz, “Scarlet poppies...their odor is sopowerful that <strong>an</strong>yone who breathes it falls asleep, <strong>an</strong>d if the sleeper isnot carried away from the scent of the flowers he sleeps on <strong>an</strong>d onforever. But Dorothy did not know this, nor could she get away from thebright red flowers that were everywhere about; so presently her eyesgrew heavy <strong>an</strong>d she felt she must sit down <strong>to</strong> rest <strong>an</strong>d <strong>to</strong> sleep.” This is<strong>an</strong> import<strong>an</strong>t part of the programming. This is the s<strong>to</strong>ry line for tr<strong>an</strong>cingdeep. pg. 112 Book 1 <strong>The</strong> Wizard of Oz, “<strong>The</strong>n the Guardi<strong>an</strong> of theGates put on his own glasses <strong>an</strong>d <strong>to</strong>ld them he was ready <strong>to</strong> showthem <strong>to</strong> the palace. Taking a big golden key from a peg on the wall heopened <strong>an</strong>other gate, <strong>an</strong>d they all followed him through the portalin<strong>to</strong> the streets of the Emerald City.” This is helpful imagery in setting upthe internal Emerald City <strong>an</strong>d its guards.BOOK 3. OZMA OF OZpg. 20 Book 3 Ozma of Oz, “But the wind, as if satisfied at last with itsmischievous pr<strong>an</strong>ks, s<strong>to</strong>pped blowing this oce<strong>an</strong> <strong>an</strong>d hurried away <strong>to</strong><strong>an</strong>other part of the world <strong>to</strong> blow something else; so that the waves,not being joggled <strong>an</strong>y more, beg<strong>an</strong> <strong>to</strong> quiet down <strong>an</strong>d behavethemselves.” <strong>Used</strong> <strong>to</strong> create protective programming, notice how thewind is personified.pg. 23 Book 3 Ozma of Oz, “So she sat down in a corner of the coop,le<strong>an</strong>ed her back against the slats, nodded at the friendly stars beforeshe closed her eyes, <strong>an</strong>d was asleep in half a minute.” Alters may betrained <strong>to</strong> tr<strong>an</strong>ce when placed in a corner.pg. 27 Book 3 Ozma of Oz, “No, indeed; I never care <strong>to</strong> hatch eggsunless I’ve a nice snug nest, in some quiet place, with a baker’s dozenof eggs under me. That’s thirteen, you know, <strong>an</strong>d it’s a lucky number forhens. So you may as well eat this egg.” This has been used often <strong>to</strong> get13 splits when <strong>to</strong>rturing. M<strong>an</strong>y <strong>Illuminati</strong> Systems were set up on 13 grids.pg. 30 Book 3 Ozma of Oz, “Next <strong>to</strong> the water [programming cue <strong>to</strong>172


uild Atl<strong>an</strong>tis] was a broad beach of white s<strong>an</strong>d <strong>an</strong>d gravel[programming cue <strong>to</strong> build Troy], <strong>an</strong>d farther back were several rockyhills, while beyond these appeared a strip of green trees [programmingcue <strong>to</strong> build a green forest] that marked the edge of a forest. But therewere no houses <strong>to</strong> be seen, nor <strong>an</strong>y sign of people [programming cuefor alters <strong>to</strong> be invisible] who might inhabit this unknown l<strong>an</strong>d.” Thispage along with others near it, have been used <strong>to</strong> build the structuresin the internal world of <strong>Illuminati</strong> slaves. In brackets are a sample of howit could be used when building <strong>an</strong> internal world.pg. 34 Book 3 Ozma of Oz, “Why eating live things....You ought <strong>to</strong> beashamed of yourself!” “Goodness me!” returned the hen, in a puzzled<strong>to</strong>ne; how queer you are, Dorothy! Live things are much fresher <strong>an</strong>dmore wholesome th<strong>an</strong> dead ones, <strong>an</strong>d you hum<strong>an</strong>s eat all sorts ofdead creatures.” This is used <strong>to</strong> encourage c<strong>an</strong>nabalism.pg. 35 Book 3 Ozma of Oz, “...a large sized golden key.” To encouragethe imagery of golden keys, which are used frequently in the internalsystem. <strong>The</strong> next chapter “Letter in the S<strong>an</strong>d” has singing trees in it,which have been popular items for the <strong>Illuminati</strong> due <strong>to</strong> their druidbeliefs.pg. 39 Book 3 Ozma of Oz, “Bye, bye, <strong>an</strong>d bye, when she was almost indespair, the little girl came upon two trees that promised <strong>to</strong> furnish herwith plenty of food. One was quite full of square paper boxes, whichgrew in clusters on all the limbs, <strong>an</strong>d upon the biggest <strong>an</strong>d ripest boxesthe word ‘Lunch’ could be read, in neat letters. <strong>The</strong> tree seemed <strong>to</strong>bear all the year around, for there were lunch-box blossoms on some ofthe br<strong>an</strong>ches, <strong>an</strong>d on others tiny little lunch-boxes that were as yetquite green, <strong>an</strong>d evidently not fit <strong>to</strong> eat.” Boxes are built internally inthe slave’s mind <strong>an</strong>d a box will contain a program. <strong>The</strong> food is theprogramming that the slave is <strong>to</strong> eat <strong>an</strong>d digest. <strong>The</strong> programming inthe box might be songs, nursery rhymes, or a poem or <strong>an</strong>ything. (Onpage 41, there is a full page picture of a girl picking a lunch-pail from atree limb <strong>to</strong> eat it.)pg. 40 Book 3 Ozma of Oz, “<strong>The</strong> little girl s<strong>to</strong>od on tip-<strong>to</strong>e <strong>an</strong>d pickedone of the nicest <strong>an</strong>d biggest lunch-boxes, <strong>an</strong>d then she sat downupon the ground <strong>an</strong>d eagerly opened it. Inside she found, nicelywrapped in white papers, a ham s<strong>an</strong>dwich, a piece of sponge-cake, apickle, a slice of new cheese <strong>an</strong>d <strong>an</strong> apple. Each thing had a separatestem,...” <strong>The</strong> lunch-boxes on the tree are the programs which theprogrammers put in. <strong>The</strong> stems are what link the programming s<strong>to</strong>ries<strong>to</strong>gether in the child’s mind.pg. 42 Book 3 Ozma of Oz, “I had a pair of silver shoes, that carried methrough the air. ..said Dorothy.” In the programming silver shoes are173


used as cues <strong>to</strong> go in<strong>to</strong> altered states (i.e. through the air.)pg. 44 Book 3 Ozma of Oz, “embroidered garments of m<strong>an</strong>y colors”Color programming for the ribbons.pg. 47 Book 3 Ozma of Oz, “We’ll get you in time, never fear! And whenwe do get you, we’ll tear you in<strong>to</strong> little bits.” “Why are you so cruel <strong>to</strong>me? asked Dorothy. “I’m a str<strong>an</strong>ger in your country, <strong>an</strong>d have doneyou no harm.” “No harm!” cried one who seemed <strong>to</strong> be their leader.“Did you not pick our lunch-boxes <strong>an</strong>d dinner pails? Have you not as<strong>to</strong>len dinner-pail still in your h<strong>an</strong>d?...it is the law here that whoeverpicks a dinner-pail without our permission must die immediately.” <strong>The</strong>programming message <strong>to</strong> all of this is that no one had better <strong>to</strong>uch thedinner-pails which represent the programs or they are <strong>to</strong> dieimmediately. Armies like in the s<strong>to</strong>ry guard the internal programming ofthe slave.pg. 51 Book 3 Ozma of Oz, these pages describe a crack in rocks that isa door. This is used for Petra programming.pg. 52 Book 3 Ozma of Oz, “golden key”...”within the narrow chamberof rock was the form of a m<strong>an</strong>--or, at least, it seemed like a m<strong>an</strong>...hishead <strong>an</strong>d limbs were copper. Also his head <strong>an</strong>d limbs were copper,<strong>an</strong>d these were jointed or hinged <strong>to</strong> his body in a peculiar way, withmetal caps over the joints, like the armor worn by knights in days ofold.” <strong>The</strong>se are a System’s robots which are said by the programmers <strong>to</strong>be friends, <strong>an</strong>d which are invisible. You c<strong>an</strong> see other people’s robotsbut not one’s own internal robots.pg. 53 Book 3 Ozma of Oz, “This copper m<strong>an</strong> is not alive at all.” <strong>The</strong>clone robots are made <strong>to</strong> think they are not alive, but just robots. Inreality they are little child alters suited up <strong>to</strong> think they are robots.pg. 55 Book 3 Ozma of Oz, “...back view of the copper m<strong>an</strong>, <strong>an</strong>d in thisway discovered a printed card that hung between his shoulders, itbeing suspended from a small copper peg at the back of his neck.”<strong>The</strong> robots are put in by a combination of several s<strong>to</strong>ries. <strong>The</strong> deep seadivers of 20,000 Leagues Under the Sea, <strong>an</strong>d the Wizard of Oz’s CopperM<strong>an</strong> reinforce each other. “Extra Responsive Mech<strong>an</strong>ical m<strong>an</strong> fittedwith our special clock-work attachment. Thinks, Speaks, Acts, <strong>an</strong>d DoesEverything but Live. M<strong>an</strong>ufactured only at our Works at Evna, L<strong>an</strong>d ofEv. All infringements will be promptly Prosecuted according <strong>to</strong> Law.”This huge sign is part of the robotic programming the clone robotsreceive. Notice that they are drilled in<strong>to</strong> <strong>to</strong>tal obedience--allinfringements will be promptly Prosecuted. Obey the law that yourMaster gives you.174


pg. 56 Book 3 Ozma of Oz, “DIRECTIONS FOR USINGFor THINKING: --Wind the Clock-work M<strong>an</strong> under his left arm, (markedNo. 1)For SPEAKING: --Wind the Clock-work M<strong>an</strong> under his right arm, (markedNo. 2)For WALKING: --Wind Clock-work in the -middle of his back, (markedNo. 3)N.B.--This Mech<strong>an</strong>ism is guar<strong>an</strong>teed <strong>to</strong> work perfectly for a thous<strong>an</strong>dyears.” <strong>The</strong>se instructions were used <strong>to</strong> build Dr. Green’s (Mengele’s)boxes <strong>an</strong>d the robots.pg. 58 Book 3 Ozma of Oz, “<strong>The</strong> words sounded a little hoarse <strong>an</strong>dcreakey, <strong>an</strong>d they were uttered all in the same <strong>to</strong>ne, without <strong>an</strong>ych<strong>an</strong>ge of expression whatever; but both Dorothy <strong>an</strong>d Billinaunders<strong>to</strong>od them perfectly.” This was used <strong>to</strong> program the internalrobots <strong>to</strong> speak in unison <strong>an</strong>d <strong>to</strong> repeat themselves.pg. 60 Book 3 Ozma of Oz, “Af-ter that I re-mem-ber noth-ing until youwound me up a-gain.” <strong>The</strong> internal robots forget <strong>an</strong>d then areprepared again for war.pg. 62 Book 3 Ozma of Oz, “From this time forth I am your o-be-di-entserv<strong>an</strong>t. What-ev-er you com-m<strong>an</strong>d, that I will do will-ing-ly--if you keepme wound up.” This is used <strong>to</strong> teach the internal robots obedience <strong>to</strong>their programming.pg. 67 Book 3 Ozma of Oz, “Within the pail were three slice of turkey,two slices of cold <strong>to</strong>ngue, some lobster salad, four slices of bread <strong>an</strong>dbutter, a small custard pie, <strong>an</strong> or<strong>an</strong>ge <strong>an</strong>d nine large strawberries <strong>an</strong>dsome nuts <strong>an</strong>d raisins. Singularly enough, the nuts in thisdinner-pail grew already cracked, so that Dorothy had no trouble inpicking out their meats <strong>to</strong> eat.” This is given <strong>to</strong> front alters as the frontprogramming so that they see the programs as only “fruit”.pg. 68 Book 3 Ozma of Oz, “Do the lunch-box trees <strong>an</strong>d the dinner-pailtrees belong <strong>to</strong> the Wheelers? the child asked Tik<strong>to</strong>k, while engaged ineating her meal.‘Of course not,’ he <strong>an</strong>swered. ‘<strong>The</strong>y belong <strong>to</strong> the roy-al fam-il-y of Ev,on-ly of course there is no roy-al fam-il-y just now be-cause King Ev-oldojumped in-<strong>to</strong> the sea <strong>an</strong>d his wife <strong>an</strong>d ten children have been tr<strong>an</strong>sformedby the Nome King...you will find the roy-al ‘E’ stamped up-on175


the bot<strong>to</strong>m of ev-er-y din-ner pail.” <strong>The</strong> Nome King in the programmingbecame the ruler of the demons/system within the Monarch system.Several s<strong>to</strong>ry lines from a number of sources are overlapped <strong>to</strong>reinforce the programming scripts. <strong>The</strong> programmers will use others<strong>to</strong>ries <strong>to</strong> introduce themselves in<strong>to</strong> the system <strong>to</strong>o. In case readersdon’t know, a Monarch system will have hidden powerful alters thatare made in the image of their programmers, that serve as personalrepresentatives of the programmers.pg. 79 Book 3 Ozma of Oz, “I am only a ma-chine, <strong>an</strong>d c<strong>an</strong>-not feelsor-row or joy, no mat-ter what hap-pens.” This is teaching mech<strong>an</strong>icaldissociation, <strong>an</strong>d coincides with Tin M<strong>an</strong> programming.pg. 83 Book 3 Ozma of Oz, “For the Princess L<strong>an</strong>gwidere is a differentperson every time I see her, <strong>an</strong>d the only way her subjects c<strong>an</strong>recognize her at all is by me<strong>an</strong>s of a beautiful ruby key which shealways wears on a chain attached <strong>to</strong> her left wrist. When we see thekey we know we are beholding the Princess.” “That is str<strong>an</strong>ge,” saidDorothy, in as<strong>to</strong>nishment. “Do you me<strong>an</strong> <strong>to</strong> say that so m<strong>an</strong>y differentprincesses are one <strong>an</strong>d the same person?” “Not exactly,” <strong>an</strong>sweredthe Wheeler. “<strong>The</strong>re is, of course, but one princess; but she appears <strong>to</strong>us in m<strong>an</strong>y forms, which are all more or less beautiful.” Doesn’t thissound like MPD! Did Fr<strong>an</strong>k Baum know about MPD?pg. 90 Book 3 Ozma of Oz, “Princess L<strong>an</strong>gwidere’s sitting-room wasp<strong>an</strong>elled with great mirrors, which reached from the ceiling <strong>to</strong> the floor;also the ceiling was composed of mirrors, <strong>an</strong>d the floor was of polishedsilver that reflected every object upon it. So when L<strong>an</strong>gwidere sat inher easy chair <strong>an</strong>d played soft melodies upon her m<strong>an</strong>dolin, her formwas mirrored hundreds of times, in walls, <strong>an</strong>d ceilings <strong>an</strong>d floor, <strong>an</strong>dwhichever way...” This is the mirror programming that has been done <strong>to</strong>so m<strong>an</strong>y victims!pg. 91 Book 3 Ozma of Oz, “Now I must explain <strong>to</strong> you that the PrincessL<strong>an</strong>gwidere had thirty heads.” Isn’t this s<strong>to</strong>ry line convenient forprogramming?pg. 94 Book 3 Ozma of Oz, ...L<strong>an</strong>gwidere <strong>to</strong> a position in front ofcupboard No. 17, the Princess unlocked the door with her ruby key <strong>an</strong>dafter h<strong>an</strong>ding head No.9, which she had been wearing, <strong>to</strong> the maid,she <strong>to</strong>ok No. 17 from its shelf <strong>an</strong>d fitted it <strong>to</strong> her neck....<strong>The</strong>re was onetrouble with No. 17; the temper that went with it (<strong>an</strong>d which washidden...)was fiery, harsh <strong>an</strong>d haughty in the extreme, <strong>an</strong>d it often ledthe Princess <strong>to</strong> do unpleas<strong>an</strong>t things which she regretted when shecame <strong>to</strong> wear her other heads.” Does the reader see how this isprogramming <strong>to</strong> switch personalities. And personality No. 17 is lockedup--which is a common programming methodology. <strong>The</strong> fiery, harsh176


<strong>an</strong>ger--those are the demonic imps that the victim is coached <strong>to</strong>accept as normal which are layered in. (See chapter 10).pg. 98 Book 3 Ozma of Oz, “‘To hear is <strong>to</strong> obey,’ <strong>an</strong>swered the big redcolonel, <strong>an</strong>d caught the child by the arm.”pg. 99 Book 3 Ozma of Oz, “...the colonel had by this time m<strong>an</strong>aged <strong>to</strong>get upon his feet again, so he grabbed fast hold of the girl <strong>an</strong>d shewas helpless <strong>to</strong> escape.”pg. 102 Book 3 Ozma of Oz, “Once a cyclone had carried her across it,<strong>an</strong>d a magical pair of silver shoes had carried her back again.”pg. 103 Book 3 Ozma of Oz, “Fist came a magnificent golden chariot,drawn by a great Lion <strong>an</strong>d <strong>an</strong> immense Tiger, who s<strong>to</strong>od shoulder <strong>to</strong>shoulder <strong>an</strong>d trotted along as gracefully as a well-matched team ofthoroughbred horses. And st<strong>an</strong>ding upright within the chariot was abeautiful girl clothed in flowing robes of silver gauze <strong>an</strong>d wearing ajeweled diadem upon her dainty head. She held in one h<strong>an</strong>d the satinribbons that guided her as<strong>to</strong>nishing team, <strong>an</strong>d in the other <strong>an</strong> ivoryw<strong>an</strong>d that separated at the <strong>to</strong>p in<strong>to</strong> two prongs, the prongs beingtipped by the letters ‘0’ <strong>an</strong>d ‘Z’, made of glistening diamonds setclosely <strong>to</strong>gether.” <strong>The</strong> way this was used for programming is that guardalters are made out of kittens, who believe they are fierce tigers <strong>an</strong>dlions <strong>an</strong>d other wild cats. Ozma, represents the <strong>Illuminati</strong> Queen Motherwith her crown <strong>an</strong>d scepter.pg. 104 Book 3 Ozma of Oz, On this page we see Ozma of Oz, theScarecrow, the Saw-Horse, the Tin Woodm<strong>an</strong>, <strong>an</strong>d soldiers. <strong>The</strong>secharacters were used in the programming. Toward the bot<strong>to</strong>m of thepage is something that was built in<strong>to</strong> the Systems so that alters wouldstay in place in their internal world, “...the green carpet rolled itself upagain...In order that their feet might not come in contact with thedeadly, life-destroying s<strong>an</strong>ds of the desert.”pg. 117 Book 3 Ozma of Oz, “Dorothy <strong>to</strong>ok the key <strong>to</strong> Tik<strong>to</strong>k from herpocket <strong>an</strong>d wound up the machine m<strong>an</strong>’s action, so that he couldbow properly when introduced <strong>to</strong> the rest of the comp<strong>an</strong>y.”pg. 119-120 Book 3 Ozma of Oz,” ‘Let me introduce <strong>to</strong> you a new friendof mine, the Hungry Tiger.”...he displayed two rows of terrible teeth <strong>an</strong>da mouth big enough <strong>to</strong> startle <strong>an</strong>yone.’‘Dreadfully hungry,” <strong>an</strong>swered the Tiger, snapping his jaws <strong>to</strong>getherwith a fierce click.”’ This is programming for deeper cats in <strong>an</strong> altersystem. <strong>The</strong> next page tells how this is used <strong>to</strong> teach the child alterc<strong>an</strong>nibalism. “...the tiger. “For my part, I’m a savage beast, <strong>an</strong>d have177


<strong>an</strong> appetite for all sorts of poor living creatures, from a chipmonk <strong>to</strong> fatbabies.’ ‘How dreadful!’ said Dorothy. ‘Isn’t it, though?’ returned theHungry Tiger licking his lips with his long red <strong>to</strong>ngue. ‘Fat babies! Don’tthey sound delicious? ...If I had no conscience I would probably eatthe babies <strong>an</strong>d then get hungry again, which would me<strong>an</strong> that I hadsacrificed the poor babies for nothing....For it is the nature of tigers <strong>to</strong>be cruel <strong>an</strong>d ferocious, <strong>an</strong>d in refusing <strong>to</strong> eat harmless living creatures Iam acting as no good tiger has ever before acted.” This part of thebook is used <strong>to</strong> help teach the child alters which think they are tigers <strong>to</strong>be c<strong>an</strong>nibalistic <strong>an</strong>d actually participate in eating babies. This is allfilmed <strong>to</strong> be used against the mind-controlled slave.pg. 130-3 1 Book 3 Ozma of Oz, “ ‘No one knows, exactly,’ replied thePrincess. ‘For the King, whose name is Roquat of the Rocks, owns asplendid palace underneath the great mountain which is at the northend of this kingdom, <strong>an</strong>d he has tr<strong>an</strong>sformed the queen <strong>an</strong>d herchildren in<strong>to</strong> ornaments <strong>an</strong>d bric-a-brac with which <strong>to</strong> decorate hisrooms.’” ‘I’d like <strong>to</strong> know,” said Dorothy, ‘Who this Nome King is?’”‘I will tell you, replied Ozma. ‘He is said <strong>to</strong> be the Ruler of theUnderground World, <strong>an</strong>d comm<strong>an</strong>ds the rocks <strong>an</strong>d all that the rockscontain. Under his rule are m<strong>an</strong>y thous<strong>an</strong>ds of the Nomes, who arequeerly shaped but powerful sprites that labor at the furnaces <strong>an</strong>dforges of their king, making gold <strong>an</strong>d silver <strong>an</strong>d other metals which theyconceal in the crevices of the rocks, so that those living upon theearth’s surface c<strong>an</strong> only find them with great difficulty. Also they makediamonds <strong>an</strong>d rubies <strong>an</strong>d emeralds, which they hide in the ground; sothat the kingdom of Nomes is wonderfully rich, <strong>an</strong>d all we have ofprecious s<strong>to</strong>nes <strong>an</strong>d silver <strong>an</strong>d gold is what we take from the earth <strong>an</strong>drocks where the Nome King has hidden them....the Ruler of theUnderground World is not fond of those who live upon the earth’ssurface, <strong>an</strong>d never appears among us. If we wish <strong>to</strong> see King Roquat ofthe Rocks, we must visit his won country, where he is all powerful, <strong>an</strong>dtherefore it will be a d<strong>an</strong>gerous undertaking....the furnaces of theNome King....a single spark of fire might destroy me entirely.’ ‘<strong>The</strong>furnaces may also melt my tin,’ said the Tin Woodm<strong>an</strong>; but I amgoing.”’ ‘I c<strong>an</strong>’t bear heat,’ remarked the Princess... This is used <strong>to</strong>program in the dwarfs who mine the jewels (programs). <strong>The</strong> dwarfs areoften demonic imps or gnomes, rather th<strong>an</strong> being real alters. Noticethat the s<strong>to</strong>ry line fits in beautifully with the Hell Pit that the- Programmers so often put at the basement of people’s minds. <strong>The</strong>Hell Pit would have programming <strong>to</strong> make someone burn. If someoneapproaches where the Dwarfs live (which is deep underground--deepin the mind) they will burn. Notice again the words diamonds, rubies,emeralds, silver <strong>an</strong>d gold which are all parts of programming codes.178


pg. 139 Book 3 Ozma of Oz, “ ‘But I know enough <strong>to</strong> obey my masters,<strong>an</strong>d <strong>to</strong> gid-dup, or whoa, when I’m <strong>to</strong>ld <strong>to</strong>.” This is teachingobedience. “Lower down the table were the twenty-seven warriors ofOz.” This was used <strong>to</strong> create alters within the internal world.pg. 147-148 Book 3 Ozma of Oz, <strong>The</strong> form was that of a gig<strong>an</strong>tic m<strong>an</strong>built out of plates of cast iron, <strong>an</strong>d it s<strong>to</strong>od with one foot on either sideof the narror road <strong>an</strong>d swung over its right shoulder <strong>an</strong> immense ironmallet, with which it const<strong>an</strong>tly pounded the earth. <strong>The</strong>se resoundingblows explained the thumping sounds they had heard, for the malletwas much bigger th<strong>an</strong> a barrel, <strong>an</strong>d where it struck the path betweenthe rocky sides of the mountain it filled all the space through which ourtravelers would be obliged <strong>to</strong> pass.Of course they at once halted, a safe dist<strong>an</strong>ce away from the terribleiron mallet. <strong>The</strong> magic carpet would do them no good in this case, forit was only me<strong>an</strong>t <strong>to</strong> protect them from <strong>an</strong>y d<strong>an</strong>gers upon the groundbeneath their feet, <strong>an</strong>d not from d<strong>an</strong>gers that appeared in the airabove them. “Wow!” said the Cowardly Lion, with a shudder. “It makesme dreadfully nervous <strong>to</strong> see that big hammer pounding so near myhead. One blow would crush me in<strong>to</strong> a door-mat.”“<strong>The</strong> ir-on gi-<strong>an</strong>t is a fine fellow,” said Tik<strong>to</strong>k, “<strong>an</strong>d works as stead-i-ly asa clock. He was made for the Nome King by Smith & Tin-ker, who mademe, <strong>an</strong>d his du-ty is <strong>to</strong> keep folks from find-ing the un-der-ground palace.Is he not a great work of art?”... “No,” replied the machine; “he isonly made <strong>to</strong> pound the road, <strong>an</strong>d has no think-ing or speak-ing attach-ment.But he pounds ve-ry well, I think.”...“Is there no way <strong>to</strong> s<strong>to</strong>p his machinery?” “On-ly the Nome King, whohas the key, c<strong>an</strong> do that,” <strong>an</strong>swered Tik<strong>to</strong>k....Me<strong>an</strong>while the gi<strong>an</strong>tcontinued <strong>to</strong> raise his iron mallet high in the air <strong>an</strong>d <strong>to</strong> strike the pathterrific blows that echoed through the mountains like the roar ofc<strong>an</strong>non.” This was used as the script <strong>to</strong> place in Thor, a gi<strong>an</strong>t whoprotects the programming. Very severe split brain headaches areprogrammed <strong>to</strong> occur <strong>to</strong> the victim, whenever the internal Thor poundshis hammer. If the programming is threatened, Thor <strong>an</strong>d the imps(demons) appear, <strong>to</strong> protect it. <strong>The</strong>re are <strong>an</strong> entire series of eventsusing programming <strong>an</strong>d obedient alters that takes place <strong>to</strong> protect theprogramming, if it is ever threatened.pg. 159 Book 3 Ozma of Oz, “<strong>The</strong>re was no reply, except that theshifting Nomes upon the mountain laughed in derision. ‘You must notcomm<strong>an</strong>d the Nome King.’ said Tik<strong>to</strong>k, ‘for you do not rule him, as youdo your own people.’ <strong>The</strong> purpose of this part is <strong>to</strong> prepare the child’salters <strong>to</strong> accept that internal Queens <strong>an</strong>d other leading alters do notrule the demons that are placed in<strong>to</strong> their system, <strong>an</strong>d are not <strong>to</strong> order179


them around.pg. 163 Book 3 Ozma of Oz, “In the center of this room was a thronecarved out of a solid boulder of rock, rude <strong>an</strong>d rugged in shape butglittering with great rubies <strong>an</strong>d diamonds <strong>an</strong>d emeralds on every par<strong>to</strong>f its surface. And upon the throne sat the Nome King.pg. 167 Book 3 Ozma of Oz, on this page is a picture of the Nome Kingtelling Dorothy <strong>an</strong>d Ozma that, “<strong>The</strong>y belong <strong>to</strong> me <strong>an</strong>d I shall keepthem.” In other words, the imps <strong>an</strong>d their jewells belong <strong>to</strong> the king ofthe demons. Around his throne are steps with gems, <strong>an</strong>d this imagerywas used <strong>to</strong> build the internal gems in a system, with Sat<strong>an</strong>/theAntiChrist’s throne at the <strong>to</strong>p of the stairs.pg. 170 Book 3 Ozma of Oz, “Although this army consisted of rockcoloredNomes, all squat <strong>an</strong>d fat, they were clothed in glittering armorof polished steel, inlaid with beautiful gems. Upon his brow each worea brilli<strong>an</strong>t electric light, <strong>an</strong>d they bore sharp spears <strong>an</strong>d swords <strong>an</strong>dbattle-axes if solid bronze. It was evident they were perfectly trained,for they s<strong>to</strong>od in straight rows, r<strong>an</strong>k after r<strong>an</strong>k, with their weapons helderect <strong>an</strong>d true, as if awaiting but the word of comm<strong>an</strong>d <strong>to</strong> level themupon their foes.” ‘This,’ siad the Nome King, ‘is but a small part of myarmy. No ruler upon Earth has ever dared <strong>to</strong> fight me, <strong>an</strong>d no ruler everwill, for I am <strong>to</strong>o powerful <strong>to</strong> oppose.’ This was <strong>to</strong> help buildaccept<strong>an</strong>ce within the child of the layering of armies of demons.pg. 180, Book 3 Ozma of Oz, “For upon the edge of the table rested apretty grasshopper, that seemed <strong>to</strong> have been formed from a singleemerald.” <strong>The</strong> next page has a picture of a grasshopper wearing a hat<strong>an</strong>d m<strong>an</strong>y shoes. This was used <strong>to</strong> help the victim take the hypnoticsuggestion that their programmer was a grasshopper, a cricket.Mengele used a clicker which helped with this hypnotic suggestion <strong>to</strong>o.pg. 182-183 Book 3 Ozma of Oz, “...the King returned <strong>to</strong> his throne....they were greatly disheartened by...the knowledge that she was now<strong>an</strong> ornament in the Nome King’s palace -- a dreadful, creepy place inspite of all its magnific<strong>an</strong>ce. Without their little leader theydid not know what <strong>to</strong> do next, <strong>an</strong>d each one, down <strong>to</strong> the tremblingprivate of the army, beg<strong>an</strong> <strong>to</strong> fear he would soon be more ornamentalth<strong>an</strong> useful....’Never mind,’ said the jolly monarch. ‘If he doesn’t care<strong>to</strong> enter the palace...I’ll throw him in<strong>to</strong> one of my fiery furnaces.’pg. 184 Book 3 Ozma of Oz, “...twenty-six officers filed in<strong>to</strong> the palace<strong>an</strong>d made their guesses---<strong>an</strong>d became ornaments.” S<strong>to</strong>ry line used <strong>to</strong>program parts <strong>to</strong> become useful ornaments. “...he wore a heavy goldchain around his neck <strong>to</strong> show that he was the Chief Steward of the180


Nome King...” M<strong>an</strong>y of the abusers signify their power <strong>to</strong> the slaves, bywearing a gold chain around their neck.pg. 186 Book 3 Ozma of Oz, on this page it states that some magicalpower gave the King the ability <strong>to</strong> know all that <strong>to</strong>ok place in hispalace. By crediting their abilities <strong>to</strong> <strong>an</strong> occult magical dimension, theprogrammers enh<strong>an</strong>ced their appear<strong>an</strong>ce of power <strong>to</strong> the childvictim. pg. 192 Book 3 Ozma of Oz, on this page <strong>an</strong>d the surroundingpages, the people who have become ornaments are also assignedcolors. <strong>The</strong> Queen of Ev “are all ornaments of a royal purple color.” <strong>an</strong>d“all those people from Oz in<strong>to</strong> green ornaments.”pg. 194 Book 3 Ozma of Oz, ‘If I wore the magic belt which enables you<strong>to</strong> work all your tr<strong>an</strong>sformations, <strong>an</strong>d gives you so much otherpower....What color will you make the K<strong>an</strong>sas girl? asked the Steward.‘Gray, I think,’ said his Majesty. ‘And the Scarecrow <strong>an</strong>d the machinem<strong>an</strong>?’ ‘Oh, they shall be of solid gold, because they are so ugly in reallife.’ This was the script <strong>to</strong> bring in the color programming. Colorprogramming is discussed in the Structuring chapter (7) <strong>an</strong>d the InternalControls chapter (11) dealing with the internal computers, <strong>an</strong>d inchapter 4 where the codes are given.pg. 192 Book 3 Ozma of Oz, ‘What more do you w<strong>an</strong>t?’ dem<strong>an</strong>ded theKing. ‘A fat baby. I w<strong>an</strong>t a fat baby,’ said the Hungry Tiger. ‘A nice,plump, juicy, tender, fat baby.’ When the alters are forced <strong>to</strong> acceptthat they are tigers <strong>an</strong>d other cats, then they are encouraged (forced)in<strong>to</strong> c<strong>an</strong>nibalism.pg. 200 Book 3 Ozma of Oz, “So Tik<strong>to</strong>k <strong>to</strong>uched a yellow glass vase thathad daisies painted on one side, <strong>an</strong>d he spoke at the same time theword ‘Ev.’ .... In a flash the machine m<strong>an</strong> had disappeared,...” This waspart of the programming <strong>to</strong> introduce daisies <strong>an</strong>d switching.pg. 201 Book 3 Ozma of Oz, “Next she <strong>to</strong>uched the image of a purplekitten that s<strong>to</strong>od on the corner of a m<strong>an</strong>tel, <strong>an</strong>d as she pronouncedthe word ‘Ev’ the kitten disappeared, <strong>an</strong>d a pretty, fair-haired boys<strong>to</strong>od beside her.” This is teaching the switching of alters <strong>an</strong>d their colorprogramming.**We will s<strong>to</strong>p our coverage of the Ozma of Oz book here. We haveonly partially covered only two of the 14 Oz books, all of which wereused as programming scripts. <strong>The</strong>re are m<strong>an</strong>y more sections in thisseries of 14 books that served as programming scripts, but the readerhas got the basic idea. It is still import<strong>an</strong>t <strong>to</strong> go over how some of theother books were used in programming, so that the reader begins <strong>to</strong>181


see how the s<strong>to</strong>ry lines assist in programming, <strong>an</strong>d how the s<strong>to</strong>ry linesare so frequently tied <strong>to</strong>gether from perhaps 12 different s<strong>to</strong>ries <strong>to</strong>reinforce one alter’s programming.ALICE IN WONDERLANDAlice Through the Looking Glass‘I c<strong>an</strong>’t believe that!’ said Alice. ‘C<strong>an</strong>’t you?’ the Queen said in apitying <strong>to</strong>ne. ‘Try again: draw a long breath, <strong>an</strong>d shut your eyes.’ Alicelaughed. ‘<strong>The</strong>re’s no use trying,’ she said. ‘One c<strong>an</strong>’t believeimpossible things.’ ‘I dare say you haven’t had much practice,’ saidthe Queen. ‘When I was your age, I always did it for half <strong>an</strong> hour a day.Why, sometimes I’ve believed as m<strong>an</strong>y as six impossible things beforebreakfast.” <strong>The</strong> chapter “Which Dreamed It” in Alice Through theLooking Glass has sexual programming, the Red Queen is purring. <strong>The</strong>s<strong>to</strong>ry where Walruses make believe it is oysters is used for programming.Other sexual programming occurs in the chapter “It’s my owninvention” where the Knight In Crimson (& White) Armor are prisonerswhich dual for her. Tweedle Dee & Tweedle Dum is used for S&Mprogramming, which has a h<strong>an</strong>d signal involving rotating the thumbs ofa clasp h<strong>an</strong>d. Alters go through the looking glass, <strong>an</strong>d fall down <strong>an</strong> oaktree by falling in<strong>to</strong> a deeper <strong>an</strong>d deeper tr<strong>an</strong>ce. Monarchprogramming is a reflection of how Sat<strong>an</strong>’s mind works. Lewis Carroll’sbQok with its inversion themes fits in with this type of thinking. LewisCarroll loved the humor of logical contradictions. In the book, Alicewonders if cats eat bats or bats eat cats, <strong>an</strong>d she is <strong>to</strong>ld that <strong>to</strong> saywhat she me<strong>an</strong>s is not the same as me<strong>an</strong>ing what she says. When sheeats the left side of the mushroom, she grows large; the right side hasthe reverse effect. <strong>The</strong>se ch<strong>an</strong>ges in size are in themselves reversals. Alarge girl <strong>an</strong>d small puppy end up <strong>to</strong> be a large puppy <strong>an</strong>d a small girl.In Sylvia <strong>an</strong>d Bruno, we are presented with <strong>an</strong> <strong>an</strong>tigravity wool that c<strong>an</strong>be placed in<strong>to</strong> a parcel <strong>to</strong> make it weigh less th<strong>an</strong> nothing, a watchthat reverses time, a black light, <strong>an</strong>d a projective pl<strong>an</strong>e with outsideinside <strong>an</strong>d inside outside. <strong>The</strong> slave learns that E-V-I-L is simply L-I-V-Ebackwards. In the looking glass world, the Red Queen knows of a hill solarge that compared <strong>to</strong> it the hill in question is a valley. Also she knowsof dry biscuits which quench thirst, a messenger who whispers byshouting, <strong>an</strong>d Alice who runs as fast as she c<strong>an</strong> <strong>to</strong> stay in one place.(Sometimes it seems we really do have <strong>to</strong> run fast <strong>to</strong> stay in place.) <strong>The</strong>King of Hearts thinks its not unusual <strong>to</strong> write letters <strong>to</strong> nobody, <strong>an</strong>d theWhite King compliments Alice on having keen enough eyesight <strong>to</strong> seenobody at a great dist<strong>an</strong>ce down the road. C<strong>an</strong> you see why this bookwas so good <strong>to</strong> program us? In the book Through the Looking Glass allasymmetrical objects (that me<strong>an</strong>s all objects which c<strong>an</strong>’t besuperimposed on their mirrored image) “go the other way.” <strong>The</strong>re areleft-right reversals. Tweedledee <strong>an</strong>d Tweedledum are mirror image182


twins. <strong>The</strong> White Knight sings about squeezing his right foot in<strong>to</strong> a leftshoe, <strong>an</strong>d there are several mentions of corkscrews. A Helix (acorkscrew) is <strong>an</strong> asymmetric structure with distinct left <strong>an</strong>d right forms.<strong>The</strong> book’s type of thinking was extended beyond asymmetricalobjects <strong>to</strong> asymmetrical relations of all types. For example, Alice walksbackward, in the railway carriage the guard tells her she is traveling thewrong way. <strong>The</strong> king has two messengers, “one <strong>to</strong> come <strong>an</strong>d one <strong>to</strong>go.” <strong>The</strong> White Queen explains the adv<strong>an</strong>tages of living backward intime, the looking glass cake is h<strong>an</strong>ded around first, then sliced. Odd<strong>an</strong>d even numbers, which are equivalent <strong>to</strong> left <strong>an</strong>d right or on <strong>an</strong>d offare worked in<strong>to</strong> the s<strong>to</strong>ry at several points. For inst<strong>an</strong>ce, the WhiteQueen requests jam every other day. Going through the looking glasstakes us <strong>to</strong> a world where the ordinary world is turned upside down <strong>an</strong>dbackward. Things go every which way except the way they aresupposed <strong>to</strong> go. Anti-matter is a mirror image. Anti-matter milk willexplode Alice, but <strong>an</strong> Anti-matter Alice on the other side of the lookingglass c<strong>an</strong> drink the <strong>an</strong>ti-matter milk. In Chapter 11 Alice captures theRed Queen. It results in a legitimate checkmate of the Red King, whohas slept through the entire live size chess game without moving. <strong>The</strong>checkmate ends the dream, but leaves open in the s<strong>to</strong>ry the questionof whether the dream was Alice’s or the Red King’s. <strong>The</strong> programminghas so often been only a dream <strong>to</strong> us. <strong>The</strong> outside world was so oftenjust <strong>an</strong> unreal dream <strong>to</strong> us. What was real <strong>an</strong>d what was not real? <strong>The</strong>real world (for other people) was full of contradictions, <strong>an</strong>d the unrealworld (our internal world) was consistent. Everything was upside down,forwards <strong>an</strong>d backwards. In the Looking Glass book, one shuttles back<strong>an</strong>d forth mysteriously between real <strong>an</strong>d dream worlds. “So, either I’vebeen dreaming about life or I only dream that life is but a dream.’’ As aslave breaks away from the programming, life becomes a bewilderingconfusion as the slave is pulled between two worlds. <strong>The</strong> internal worldhas everything the alter needs, the external world is a harsh cold realitythat doesn’t have much <strong>to</strong> offer. People in the external world c<strong>an</strong> helpmake it real for a slave. <strong>The</strong> h<strong>an</strong>dlers will never do this. Alters will need areason <strong>to</strong> w<strong>an</strong>t <strong>to</strong> come out of the internal reality which they areprogrammed <strong>to</strong>. believe in. For so long much of life was seen as adream. It will be hard <strong>to</strong> get a grasp on what was real <strong>an</strong>d what wasthe lie. M<strong>an</strong>y of the lies are more real th<strong>an</strong> the truth. Life was sometimeslike the parallel dreams of the Red King <strong>an</strong>d Alice, like two mirrorsfacing each other.<strong>The</strong> TALL Book of MAKE BELIEVE.This book was published by Harper & Row in 1950 <strong>an</strong>d was indeed tall,the pages being 4” x 9 1/2”. On page 14, the programmer would readthe first paragraph of the poem <strong>an</strong>d then say “sleep, sleep, sleep.”183


“Have you ever heard of the Sugar-Plum Tree? ‘Tis a marvel of greatrenown! It blooms on the shore of the Lollypop Sea in the garden ofShut-Eye Town; <strong>The</strong> fruit that it bears is so wondrously sweet (As thosewho have tasted it say) That good little children have only <strong>to</strong> eat ofthat fruit <strong>to</strong> be happy next day. Sleep, Sleep, Sleep.”On page 16-17, there is a s<strong>to</strong>ry about how a child is dragged under thekitchen door <strong>an</strong>d becomes flat. <strong>The</strong>re is a picture of a child beingpulled under a door <strong>an</strong>d coming out flat on page 17. This was used aspart of the script <strong>to</strong> make the ribbons for the slaves. <strong>The</strong> ribbons in asystem c<strong>an</strong> go under doors <strong>an</strong>d through the entire system. On page 23,Rosa the flat person (p<strong>an</strong>cake person) is shown again. This is ribbon.<strong>The</strong> <strong>to</strong>p of the page has a large cricket like creature that was said <strong>to</strong>the child <strong>to</strong> be the programmer (Dr. Mengele). All of the s<strong>to</strong>ries in <strong>The</strong>Tall Book of Make Believe were used one way or the other inprogramming. We will just <strong>to</strong>uch on some notable points. On page 38 isa poem about a Mr. Nobody. <strong>The</strong> programmers like <strong>to</strong> have altersidentify themselves as “nobody”. On page 39 is a poem/s<strong>to</strong>ry about“someone” who comes tapping...but it is “only the cricket whistling”.This was used <strong>to</strong> help program in that the 3 taps were the cricket (thecover image for the programmer.) On page 50, is the s<strong>to</strong>ry of a girl whowhen she lays down becomes a different person Mrs. Brown. On page67 is a poem Foreign L<strong>an</strong>ds, where the child sees “the sky’s blue lookingglass” <strong>an</strong>d then ends up “<strong>to</strong> where the roads on either h<strong>an</strong>d leadonward in<strong>to</strong> fairyl<strong>an</strong>d.. .<strong>an</strong>d all the playthings come alive.” In otherwords, what is in effect being communicated is: take the hypnoticimage of flying in<strong>to</strong> the sky in Papa’s silver pl<strong>an</strong>e (as the pl<strong>an</strong>e goes upthe tr<strong>an</strong>ce goes higher -deeper) <strong>an</strong>d then go in<strong>to</strong> a f<strong>an</strong>tasy l<strong>an</strong>dwhere all your wishes c<strong>an</strong> come true--so that you c<strong>an</strong> escape the hellus programmers are giving you. On page 79 is the s<strong>to</strong>ry of a ghostnamed Georgie who would run home <strong>an</strong>d warn people at home whenthings were broken. This was part of the “fix me” programming--so thatghost-like alters, known as reporting alters, call “HOME” <strong>to</strong> “PAPA” if theprogramming is <strong>to</strong>uched. On page 84 is the s<strong>to</strong>ry “How they bring back<strong>The</strong> Village of Cream Puffs When the Wind Blows it away.” This s<strong>to</strong>ry hasseveral programming words in it, these words <strong>an</strong>d their me<strong>an</strong>ings areas follows: In programming the “Village of Liver-<strong>an</strong>d-Onions” is a codeword for “the coven. “Prairie” me<strong>an</strong>s “ceremony site”, <strong>an</strong>d in <strong>an</strong>others<strong>to</strong>ry “picnic” me<strong>an</strong>s “ritual”. It’s doubtful that most alters wouldremember these me<strong>an</strong>ings, but they helped the abusers confuse thechild. Imagine the victim trying <strong>to</strong> describe a ritual <strong>an</strong>d telling someonethat a village of liver & onions had a picnic.184


ALIEN PROGRAMMING SCRIPTS<strong>The</strong>re are numerous scripts for the Alien programming. Recent novels<strong>an</strong>d Hollywood movies provide a non-ending pool of programmingresources for the Programmers. Visual reality headgear <strong>an</strong>d other hightechmethods c<strong>an</strong> easily be incorporated in<strong>to</strong> <strong>an</strong> alien abductiontheme. <strong>The</strong> following are samples of some of the people who theauthor Fritz has spent time with, who on one level knew they neededhelp, but didn t know just what they felt uneasy about.PERSON 1. Had been abducted by aliens since she was a small child.Different types of aliens <strong>to</strong>ok her. Her mother worked for the CIA atArea 51. Her mother was abusive <strong>to</strong> her. One of her best friends is aMonarch slave. When the aliens come a bright light appears <strong>an</strong>d thenthey abduct her. <strong>The</strong> aliens she works with the most look exactly likepeople, <strong>an</strong>d in their h<strong>an</strong>dwriting show severe abuse. <strong>The</strong>se benevolentaliens have taken her fetusus several times. She has time-travelled <strong>to</strong>their pl<strong>an</strong>et. She is dissociative. <strong>The</strong> government authorities areconst<strong>an</strong>tly moni<strong>to</strong>ring <strong>an</strong>d tracking her, <strong>an</strong>d have made <strong>an</strong> effort <strong>to</strong>besmudge her record, so that it appears like she is looney tunes. This isthe type of cases that this book s co-author has spent time workingwith. Doesn t this sound more like hum<strong>an</strong> mind-control th<strong>an</strong> real aliens?PERSON 2. This person hears aliens within his head (which whendescribed sounds like a case of MPD (DID). <strong>The</strong> aliens would take him<strong>an</strong>d force him <strong>to</strong> have homosexual activities even though he didn tw<strong>an</strong>t <strong>to</strong> participate. But that was O.K. <strong>to</strong> him, because they were asuperior race <strong>an</strong>d if these benevolent aliens which are so faradv<strong>an</strong>ced beyond us, w<strong>an</strong>t <strong>to</strong> have sex with him, that is theirperogative. This person has a lot of depression. This person wonderswhy the authorities seem <strong>to</strong> keep track of him.PERSON 3. This person worked at Area 51. Has a pho<strong>to</strong>graphic memorythroughout his entire MPD system. He realizes that he is MPD. His bestfriend claims <strong>to</strong> be <strong>an</strong> alien, a god of sorts, <strong>an</strong>d is known by both thisperson & Fritz <strong>to</strong> be part of Naval Intelligence. This best friend acts morelike a h<strong>an</strong>dler th<strong>an</strong> <strong>an</strong> alien, <strong>an</strong>d this Area 51 worker gives his bestfriend <strong>to</strong>tal alligi<strong>an</strong>ce. This m<strong>an</strong> has all kinds of alien type s<strong>to</strong>ries, whichsound in m<strong>an</strong>y cases like programming. This person admits that hisfamily is <strong>Illuminati</strong>, <strong>an</strong>d the front alters say he has watched <strong>Illuminati</strong>rituals as <strong>an</strong> adult, but hasn t participated . He shows signs of severeabuse. He is afraid <strong>to</strong> talk about trauma-based mind-control, but loves<strong>to</strong> talk about aliens. In fact, all three of the persons discussed on thispage shied away from talking about Monarch mind-control, as if itwere something not import<strong>an</strong>t, but they all love <strong>to</strong> talk about aliens.185


And the list of interesting people like this could go on. When <strong>Mind</strong>controlledslaves who have alien programming are being abducted bythe intelligence agencies for their use <strong>an</strong>d for programming here aresome of the details of how <strong>an</strong>d what occurs: A bright light is shined in<strong>to</strong>their house. <strong>The</strong>y have been hypnotically conditioned <strong>to</strong> view this lightas a Flying Saucer, whether it is a helicopter or something else. As theNWO does have Flying Saucers, sometimes the real thing is used. Menin Black (just like in SRA cases) are often associated with theabductions. And the slaves frequently speak about "shadows in themind." <strong>The</strong> slaves are taken <strong>to</strong> rooms where examining tables withwhite sheets <strong>an</strong>d X-ray machines, Headgear <strong>an</strong>d medical equipment isin place. (<strong>The</strong> alien equipment has gotten more high-tech over the last40 years. <strong>The</strong> aliens wear suits that are full of occult symbology. <strong>The</strong>people are restrained with clamps <strong>an</strong>d electrical shock <strong>an</strong>d energy isused on them. <strong>The</strong>y are <strong>to</strong>ld that they are receiving information. <strong>The</strong>yare given tracking impl<strong>an</strong>ts <strong>an</strong>d other impl<strong>an</strong>ts. All of the 3 abovepersons, receive information from the aliens regularly. Almost all of theelements of Monarch trauma-based mind-control appear in theseabduction accounts, especially in the psychological features of thevictim. <strong>The</strong> victims of alien abduction programming feel suicidal afterthey talk <strong>to</strong>o much. <strong>The</strong>y have headaches, sleep difficulties,nightmares, obsessive thoughts, a fear of hypnosis, trapped feelings,<strong>an</strong>d par<strong>an</strong>oia. During their abductions the aliens use drugs, thoughttr<strong>an</strong>sfers, <strong>an</strong>d painful medical procedures. <strong>The</strong> aliens use l<strong>an</strong>guagethat parallels the messages given <strong>to</strong> SRA victims, just ch<strong>an</strong>ge thel<strong>an</strong>guage from Sat<strong>an</strong> is in charge <strong>to</strong> the Aliens are in charge . Cattlemutilations where the blood has been drain are associated withabductions. <strong>The</strong>re is documented accounts where cattle mutilationshave been connected <strong>to</strong> Sat<strong>an</strong>ic cults using helicopters. <strong>The</strong> victims ofaliens are forced <strong>to</strong> be impregnated <strong>an</strong>d then the fetus is repeatedlytaken. <strong>The</strong> aliens are repeatedly telling these victims that a holocaustis soon <strong>to</strong> come. Another str<strong>an</strong>ge phenomena, that others <strong>an</strong>d thisauthor have noticed is that these victims of alien abduction seen <strong>to</strong>know each other, much in the same way that victims of <strong>Illuminati</strong> mindcontrolseem <strong>to</strong> know each other. And the aliens seem <strong>to</strong> knoweverything about the victims. <strong>The</strong> victims have amnesia of theirabductions. <strong>The</strong> memories of their abductions are hidden in alteredstates of consciousness, that hypnosis sometimes c<strong>an</strong> pull up. Mostvictims are afraid of hypnosis or c<strong>an</strong> t be hypnotized (they have beenhypnotized not <strong>to</strong> allow <strong>an</strong>yone else <strong>to</strong> hypnotize them.)To give credit where due, Bowart s Operation <strong>Mind</strong> Control Researchers edition, (1994) has <strong>an</strong> excellent appendix with charts which compareSRA mind-control victims <strong>an</strong>d alien abduction victims. <strong>The</strong> charts revealhow similar the two groups are. In preparing these paragraphs, wehave used his charts as as a basis for how we wrote these last twoparagraphs up. However, the co-authors experiences in working with186


abduction victims match the findings of Bowart. Do aliens from <strong>an</strong>otherpl<strong>an</strong>et exist? <strong>The</strong>y may or may not. It is not a real issue, we have <strong>to</strong>face what is already on this pl<strong>an</strong>et. Fritz has several tapes of aliens ofdifferent types talking (which were obtained from abduction survivors)<strong>an</strong>d their voices sound demonic <strong>an</strong>d they are saying that they havebeen alive on this pl<strong>an</strong>et for m<strong>an</strong>y years. One said something like he sbeen here on earth 500,000 years. If <strong>an</strong> alien has lived on this pl<strong>an</strong>et for1/2 million years, when does he get residence status. My! If that is true,he is no alien--we are! But one thing is certain, this pl<strong>an</strong>et containssome very slimy evil creatures who are either real non-hum<strong>an</strong>s or verydeceptive dark hum<strong>an</strong>s. <strong>The</strong> Bible calls them demons <strong>an</strong>d reprobatemen. <strong>The</strong> four most popular origins of supposed aliens on earth are allstar groups relatively close <strong>to</strong> our solar system. <strong>The</strong>y are: the Piciades,known as the 7 or 9 sisters, because their are 9 stars of which 7 arevisible; Sirius, the dog constellation; the Orion constellation; <strong>an</strong>d thetwin stars of Zeta Reticulli, which twin stars were amazingly charted byChinese astrologers in 3,000 B.C.! Fritz, the co-author of this book kept<strong>an</strong> open mind on the issue, could there be <strong>an</strong>y benevolent aliens ?Some abductees believed that their aliens were benevolent, but whenthey are debriefed the admit that mind-control <strong>an</strong>d sexual molestationis carried out by the aliens. Fritz, has concluded with other investiga<strong>to</strong>rson this question, there are no benevolent aliens , in fact the only aliensthat may be around are what have been known as demons. Peoplewho have participated in high level <strong>Illuminati</strong> ceremonies report thepresence of creatures that look like the various aliens . (This wholesubject is dealt with in <strong>an</strong>other book by Fritz Springmeier.) Some pointsmight be briefly brought out. Fritz has amassed a great deal ofevidence that the elite have hum<strong>an</strong>-built Flying Saucers.Notice how the controlled media always link aliens with Flying Saucers<strong>an</strong>d UFOs? This is <strong>an</strong> entire book in itself, however, the bot<strong>to</strong>m line isthat at least most (if not all) of the alien abductions are simply part ofthe NWO s mind-control. It is obvious that for various reasons (includingthe goals set down in the secret Iron Mountain government report), thegovernment (including cooperating agencies like NASA) decided <strong>to</strong>use <strong>an</strong> alien abduction theme rather th<strong>an</strong> a Sat<strong>an</strong>ic Ritual Abusetheme <strong>to</strong> their mind-control programming. <strong>The</strong> major differences in theprogramming methodology is that the blood rituals of the SRA are nolonger used. <strong>The</strong> reason why blood rituals are no longer needed is thatthe high-tech harmonic machines (which impl<strong>an</strong>t thoughts-see chap.6) <strong>an</strong>d other high-tech methods eliminate the need for the bloodtraumas. <strong>The</strong> victims of alien abductions are taken at r<strong>an</strong>dom, wherethe <strong>Illuminati</strong> victims are abducted more frequently around ritual dates.<strong>The</strong> person who believes in UFOs <strong>an</strong>d aliens is going <strong>to</strong> receive thesame type of treatment as those who believe in Sat<strong>an</strong>ic Ritual Abuse.<strong>The</strong> legal system <strong>an</strong>d society at large are conditioned <strong>to</strong> treat them asnuts. This protects their abusers. An <strong>Illuminati</strong> hierarchy member187


described their magic goal of pursuing a spiritual path through thefiner frequencies of outer time. <strong>The</strong> alien programming is one way <strong>to</strong>experience this.ISLAND OF THE BLUE DOLPHINSThis is a child s book by Scott O Dell. <strong>The</strong> people of <strong>an</strong> isl<strong>an</strong>d have both<strong>an</strong> everyday name <strong>an</strong>d a magical name. When the chief gives hismagical name <strong>to</strong> a Russi<strong>an</strong> captain named Orlov, he <strong>an</strong>d his warriorsend up being killed in battle. <strong>The</strong> alters of Monarch slaves have namesthey c<strong>an</strong> give outsiders <strong>an</strong>d then their access code names which mustbe kept secret. Part of the s<strong>to</strong>ry is <strong>to</strong> stay in line with what one s<strong>an</strong>ces<strong>to</strong>rs have done. Other items in the book, such as the four windsfrom the four directions fit in with programming <strong>to</strong>o. <strong>The</strong> book is just oneof m<strong>an</strong>y that the programmers w<strong>an</strong>t the children <strong>to</strong> hear so that theynaturally adopt the correct programming scripts.THE LORD OF THE RINGSSome <strong>Illuminati</strong> survivors are always looking for a ring. Rings play asignific<strong>an</strong>t part in the lives <strong>an</strong>d programming of slaves. One sectionthat is coding/programming found in J.R.R. Tolkien s Lord of the Rings isOne Ring <strong>to</strong> rule them all, One Ring <strong>to</strong> find them, One Ring <strong>to</strong> bringthem all <strong>an</strong>d in the darkness bind them.THE MOST IMPORTANT PROGRAMMING SCRIPT -- THE LESSER KEYOne of the most import<strong>an</strong>t scripts for the <strong>Illuminati</strong> <strong>Mind</strong>-controlProgrammers is the Lesser Key of Solomon Goetia, <strong>The</strong> Book of EvilSpirits. <strong>The</strong> <strong>Illuminati</strong> Doc<strong>to</strong>rs Green, Black, White <strong>an</strong>d Blue (that isMengele, Wheeler, Cameron, <strong>an</strong>d Mueller) were fully knowledgeableabout <strong>The</strong> Lesser Key of Solomon Goetia. In fact, all those who gobeyond the initial levels in the <strong>Illuminati</strong> are required <strong>to</strong> study the entirebook. It s <strong>an</strong> import<strong>an</strong>t ritual book.It is very out of fashion <strong>to</strong> believe in demons. It is in fashion <strong>to</strong> believe inaliens, in ghosts, in the internal psychological wizard that guides you ,<strong>an</strong>d other things which <strong>to</strong> those high in demonology secretly know aresimply covers for what used <strong>to</strong> be called demons. Both the high level<strong>Illuminati</strong> <strong>an</strong>d the alert Christi<strong>an</strong>s are saying m<strong>an</strong>y of the same thingsconcerning demons. Is “magical” phenonmena real? Do the188


programmers really believe in it? In the Lesser Key of Solomon Goetia it<strong>an</strong>swers, “I am not concerned <strong>to</strong> deny the objective reality of all‘magical’ phenonmena; if they are illusions, they are at least as real asm<strong>an</strong>y unquestioned facts of daily life; <strong>an</strong>d...they are at least evidenceof some cause.” (p.10) <strong>The</strong> author of the Lesser Key of Solomon Goetiathen points out that all our sense impressions of the universe aredependent upon ch<strong>an</strong>ges in the brain. Reality is a perception of themind. So the author states, “...we must include illusions, which are afterall sense impressions as much as realities’ are, in the class of‘phenomena dependent on brain ch<strong>an</strong>ges.’ Magical phenomena,however, come under a special subclass, since they are willed, <strong>an</strong>dtheir cause is the series of ‘real’ phenomena called the operations ofceremonial magic.” In other words, when the <strong>Illuminati</strong> practiceceremonial magic, their magic <strong>to</strong> them is as real as life, but they do notfeel a need <strong>to</strong> defend its reality. People in the occult encouragechildren <strong>to</strong> f<strong>an</strong>tasize. F<strong>an</strong>tasy is looked at with favor. Whether thepower <strong>an</strong>d healing <strong>an</strong>d mind-control of demonology stems from illusionor Jung’s au<strong>to</strong>nomous power of the hum<strong>an</strong> psyche <strong>to</strong> attract &m<strong>an</strong>ifest archetypes through the hum<strong>an</strong> soul or some other source isnot <strong>an</strong> issue for Sat<strong>an</strong>ists. <strong>The</strong>y are seeing results, power, healings <strong>an</strong>dthe destruction of their enemies by demonology. Within the <strong>Illuminati</strong>illusion, myth, <strong>an</strong>d perception are all esteemed. Are they alone? Arethey alone? No, they are not alone. <strong>The</strong> myth that the United States is ademocracy is probably a far stronger “reality” in the minds ofAmeric<strong>an</strong>s th<strong>an</strong> the actual reality that it is a tightly controlled secre<strong>to</strong>ligarchy with a republic<strong>an</strong> front. But in this case, which is the greaterreal reality? <strong>The</strong> Americ<strong>an</strong> believes his myth enough that he dies for it.He fights the “war <strong>to</strong> end all wars” <strong>an</strong>d then the “war <strong>to</strong> save the worldFOR DEMOCRACY” (<strong>to</strong> quote some popular world war slog<strong>an</strong>s). In theAmeric<strong>an</strong> mind, he achieves vic<strong>to</strong>ry even though he has fought <strong>an</strong>ddied for a myth. And even when the mythical goals he fought foraren’t even achieved, he believes he has achieved a vic<strong>to</strong>ry. <strong>The</strong> firstworld war never brought everlasting peace <strong>an</strong>d the war <strong>to</strong> save theworld for democracy ended after “vic<strong>to</strong>ry” with more of the worldunder stronger <strong>to</strong>talitari<strong>an</strong> rule th<strong>an</strong> before the war beg<strong>an</strong>. <strong>The</strong> bot<strong>to</strong>mline is that myths <strong>an</strong>d illusions make up a large part of the reality ofmost people’s lives. Movie ac<strong>to</strong>rs have repeatedly found out that theyincur their f<strong>an</strong>’s wrath if they try <strong>to</strong> reveal their real selves <strong>to</strong> the public.<strong>The</strong> point also is that the person practicing ceremonial magic will notbe impressed by the average person, even if he be a minister, who hasstructured his life on myths <strong>an</strong>d illusions, who will tell him that hisceremonial magic is not real. <strong>The</strong> magici<strong>an</strong> will naturally ask, “Who ISliving in a world of reality?” Ceremonial magic is a very strong “reality”<strong>to</strong> the <strong>Illuminati</strong>’s mind-controlled slaves, because the programmersmake great efforts <strong>to</strong> develop the five “impressions” listed on page 11of <strong>The</strong> Lesser Key, which are:189


(1) Sight. <strong>The</strong> circle, square, tri<strong>an</strong>gle, vessels, lamps, robes, implements,etc.(2) Sound. <strong>The</strong> invocations.(3) Smell. <strong>The</strong> perfumes.(4) Taste. <strong>The</strong> Sacrements.(5) Touch. As under (1).<strong>The</strong>se are reflected upon by the person, <strong>an</strong>d these 5 produce unusualbrain-ch<strong>an</strong>ges. Later two more senses are also highly developed.Programmed multiple-slaves have visual <strong>an</strong>d audi<strong>to</strong>ry aucuity farbeyond the normal person. <strong>The</strong> Lesser Keys of Solomon Goetia goes on<strong>to</strong> say, “<strong>The</strong> Spirits of the Goetia are portions of the hum<strong>an</strong> brain. <strong>The</strong>irseals therefore represent methods of stimulating or regulating thoseparticular spots (through the eye).”“<strong>The</strong> names of God are vibrations calculated <strong>to</strong> establish:(a) General control of the brain....(b) Control over the brain in detail. (R<strong>an</strong>k or type of the Spirit)(c) Control of one special portion. (Name of Spirit.)<strong>The</strong> perfumes aid this through smell. Usually the perfume will only tend<strong>to</strong> control a large area; but there is <strong>an</strong> attribution of perfumes <strong>to</strong> lettersof the alphabet enabling one, by a Qabalistic formula, <strong>to</strong> spell out theSpirit’s name.” (p. 12)Did the reader grasp that? <strong>The</strong> most import<strong>an</strong>t script for theprogrammers is <strong>to</strong> use ceremonial magic which uses the names of God<strong>to</strong> establish GENERAL, & SPECIFIC CONTROL (via a hierarchialarr<strong>an</strong>gement of demons) over a person’s mind. More will be coveredabout this in Chapter 10. But while we are on the subject let’s go just alittle bit farther. “If, then, I say, with Solomon: ‘<strong>The</strong> Spirit Cimieriesteaches logic,’ what I me<strong>an</strong> is: Those portions of my brain whichsubserve the logical faculty may be stimulated <strong>an</strong>d developed byfollowing out the processes called ‘<strong>The</strong> Invocation of Cimieries.’And this is exactly what the programmers do. <strong>The</strong>y invoke via m<strong>an</strong>yrituals all types of specific demon (or demonic energy) <strong>to</strong> enh<strong>an</strong>ce theparticular mental functions they w<strong>an</strong>t. For inst<strong>an</strong>ce, Typhon <strong>an</strong>dChoronzon (also Horonzon) are demons who are essential in building190


the structure of a programmed multiple. <strong>The</strong>y must be invoked beforethe early start of dividing the mind. Michael Bertieaux heads up theHoronzon Club, <strong>an</strong> unofficial part of Kenneth Gr<strong>an</strong>t’s OTO. <strong>The</strong> demonHoronzon (or Choronzon) looks like a grey alien, <strong>an</strong>d was conjured upby Sir John Dee, who was Queen Elizabeth I’s genius advisor <strong>an</strong>d courtsorcerer. Tr<strong>an</strong>syuggothi<strong>an</strong> magic is carried out in order <strong>to</strong> reachTr<strong>an</strong>syuggothi<strong>an</strong> Space (also known as Tr<strong>an</strong>s-Plu<strong>to</strong>ni<strong>an</strong> Space <strong>an</strong>dUniverse B). <strong>The</strong>se existence of these dimensions are kept very secret.<strong>The</strong> <strong>an</strong>cient cult of the Star Sirius, from which supposedly we are nowgetting aliens, had rituals <strong>to</strong> get one in<strong>to</strong> the celebrated Universe B.Sirius B (the binary twin star that exists with the actual Sirius A star)represented the god Ra Hoor Khuit. Sirius A represented the Egypti<strong>an</strong>devil. Let’s reflect on all this demonic “illusion”. As stated, <strong>an</strong> Americ<strong>an</strong>will die for the myth that America is saving the world for democracy.This made sense <strong>to</strong> psychologists at the time. However, if a slave diesfor what he sees as the reality of voodoo magic, the psychologistdismisses it as unimport<strong>an</strong>t--a mere coincidence. Since voodoo magicdoesn’t exist in the psychologist’s mind, the psychologist believes thatmagic carries no threat <strong>to</strong> its intended victim. Likewise, because thepsychologist doesn’t believe in demons, demons supposedly pose nothreat <strong>to</strong> the mind-controlled slave. <strong>The</strong> psychologist is really projectinghis perception of reality upon someone else, <strong>an</strong>d it doesn’t work. <strong>The</strong><strong>Illuminati</strong> programmers are counting on the therapists ignoringdemonology. In Bowart’s in-most-respects excellent book Operation<strong>Mind</strong> Control, (Researcher Edition, Ft. Bragg, CA: Flatl<strong>an</strong>d, 1994, p. 249.)asks the reader <strong>to</strong> self-hypnotize himself by several times “looking in<strong>to</strong>your mind’s eye”. To Bowart, he sees the tr<strong>an</strong>ce state as merely lookingin<strong>to</strong> your mind’s eye. He does not attribute <strong>an</strong>y demonic activity <strong>to</strong> beinvolved with such things. No wonder, Bowart writes very disparagingly<strong>an</strong>d critically about Christi<strong>an</strong>s who are trying <strong>to</strong> do demonicdeliver<strong>an</strong>ces <strong>to</strong> slaves. But then as far as I know Bowart hasn’t freed<strong>an</strong>yone of their mind-control either, he is just a reporter. Both ministers<strong>an</strong>d psychologists have contempt for each other’s excesses. We mustbear in mind that the victims of this <strong>to</strong>tal mind-control have theirbodies, minds, <strong>an</strong>d spirits enslaved. <strong>The</strong> body, mind <strong>an</strong>d spirit need <strong>to</strong>be simult<strong>an</strong>eously liberated. A great deal of the success of theProgrammers is that ministers have rejected the study of the mind(psychology) <strong>an</strong>d therapists have rejected spiritual things. <strong>The</strong> victim isleft without a way <strong>to</strong> heal both spirit <strong>an</strong>d mind. Partial freedom is stillslavery. And not only that but both therapists <strong>an</strong>d ministers seem <strong>to</strong> feelthe actual physical threats <strong>to</strong> the slave’s body <strong>to</strong> be outside of theirjurisdiction, <strong>an</strong>d by default it is left up <strong>to</strong> the victim <strong>to</strong> provide. Whichagain without the body safe <strong>an</strong>d healed, the mind <strong>an</strong>d spirit are notfully free. <strong>The</strong>re are therapists <strong>an</strong>d others who pontificate about howevil Christi<strong>an</strong> ministers are for trying <strong>to</strong> deliver mind-controlled slavesfrom their demonic possession. This is not the problem. <strong>The</strong> problem isthat the <strong>Illuminati</strong> have skillfully separated the various therapeutic191


elements both functionally <strong>an</strong>d legally. <strong>The</strong> <strong>an</strong>swer <strong>to</strong> the enslavemen<strong>to</strong>f body, soul, mind <strong>an</strong>d spirit is a team of people who will address allthe issues <strong>to</strong>gether. Both the psychologists <strong>an</strong>d ministers see theexcesses of each other, but a little humility would go a long way, forboth sides <strong>to</strong> recognize each other’s value. God works through allpeople, even those who resist Him. That is why he c<strong>an</strong> rightly be calledAlmighty God.THE USE OF LIES EXTERNALLY & INTERNALLY, THE USE OF COVERS ANDFRONTS, & THE ART OF HIDING THINGS IN A SYSTEMEXTERNAL DECEPTIONS<strong>The</strong>re seems <strong>to</strong> be no end <strong>to</strong> the lies that are involved with theMonarch programming. <strong>The</strong> old adage that nothing is as it appears, isgenerally the rule. However, once one catches on <strong>to</strong> the commontactics of deceptions, the tactics themselves become red flags whichc<strong>an</strong> alert a thinking person <strong>to</strong> what is hidden. This is similar <strong>to</strong> thoseRussi<strong>an</strong>s who could read between the lines when reading communistpropag<strong>an</strong>da <strong>an</strong>d figure Out the truth. <strong>The</strong> deception begins withcovering up the identity of the slave. Within the <strong>Illuminati</strong>, the art ofhiding genealogies is a fine art. Children are swapped <strong>an</strong>d placed withfoster parents. Mothers all of a sudden have babies, when no one hasnoticed them being pregn<strong>an</strong>t. Investiga<strong>to</strong>rs like Fritz Springmeier, whohave been investigating court house records <strong>an</strong>d other primarydocuments have seen court house records altered overnight, <strong>to</strong> coverup genealogical <strong>an</strong>d fin<strong>an</strong>cial information.COVERS FOR INDIVIDUAL SLAVES<strong>The</strong> individual slave is usually given a good cover. A good cover will beone that c<strong>an</strong>not be seen through, <strong>an</strong>d still allows the person thefreedom <strong>to</strong> get their job done. When building a cover, the followingquestions will be asked: how much will this cover allow this person <strong>to</strong>spend? what kind of people c<strong>an</strong> this person associate with? where c<strong>an</strong>this person go? <strong>an</strong>d what kind of hobby c<strong>an</strong> he or she have? By now,the <strong>Illuminati</strong> have their secret slaves in so m<strong>an</strong>y places that they havetheir bases covered in all fields. True life examples include: a Monarchprogrammer who appears <strong>to</strong> be simply a middle class housewife. AMonarch computer programmer who appears <strong>to</strong> be a deaf <strong>an</strong>d dumbmute when in the presence of the public, but the deeper brilli<strong>an</strong>t alters192


work secretly at programming computers during the day. Aninternational spy, who is a programmed multiple, who has a <strong>to</strong>tallydifferent set of I.D. <strong>an</strong>d wigs, so that when they switch <strong>to</strong> certain altersused for the intelligence agencies--they not only act different, theylook different, <strong>an</strong>d have different valid I.D. An apparently dumb blondmay be a very intelligent highly trained Monarch slave. Within theintelligence world Monarch slaves will function as Agent Provocateurs,which are people who join groups with the purpose of leading thegroup <strong>to</strong> do things that will cause it harm. <strong>The</strong> neo-Nazis are full ofAgent Provocateurs as are some of the Patriot groups. Some Monarchslaves are what is called “cle<strong>an</strong> agents” -- that is they have never beenused in intelligence work, so they have no record of use. Monarchs aregreat for being used by this or that group on a limited basis without<strong>an</strong>yone suspecting <strong>an</strong>y connection. <strong>The</strong> Intelligence term for theelaborate cover his<strong>to</strong>ries they give one of their Monarch slaves <strong>to</strong>operate as <strong>an</strong> agent is called a “legend”. Supporting documents willbe placed in<strong>to</strong> the appropriate government files <strong>to</strong> support thelegend. <strong>The</strong> intelligence agencies may have several intact “legends”for different personalities of a slave. <strong>The</strong> intelligence term is NOTIONAL.It roughly me<strong>an</strong>s “a fictional entity for the sake of <strong>an</strong> intelligenceoperation.” Notional org<strong>an</strong>izations are created <strong>to</strong> steal strength awayfrom sincere org<strong>an</strong>izations. If a church (or non-CIA KKK group etc.) gets<strong>to</strong>o sincere <strong>an</strong>d powerful, a well-fin<strong>an</strong>ced notional rival will start up,<strong>an</strong>d then later fold under sc<strong>an</strong>dal. <strong>The</strong> net effect is <strong>to</strong> destroy the entirecause. At least half of the therapists helping Monarch slaves in theauthors’ area are programmed multiples themselves! <strong>The</strong> therapeuticcommunity is heavily infiltrated. <strong>The</strong> help lines for women in crisis are alldirty. Some of the Christi<strong>an</strong> groups that claim <strong>to</strong> help SRA victims arereally fronts.One recovering Monarch slave tells about how her father was themayor of <strong>an</strong> import<strong>an</strong>t city in Pennslyv<strong>an</strong>nia. He was part of the<strong>Illuminati</strong> <strong>an</strong>d he introduced drugs in<strong>to</strong> his area, <strong>an</strong>d had a monopolyon illegal drugs in the area. As mayor he established the first drug hotline, so that people could inform authorities about drug trafficking. Hestaffed the drug hot line with his own people <strong>an</strong>d this allowed him <strong>to</strong>get tips <strong>to</strong> eliminate his competition. <strong>The</strong> intelligence agencies whichare using mind-control are hiding their drug trafficking <strong>an</strong>d criminalactivities. One of the ways they do this is the so-called War on Drugs.<strong>The</strong> situation is so bad <strong>an</strong>d widespread that even the controlled mediahas had news where they reported CIA agents smuggling drugs seizedin South America in<strong>to</strong> the U.S. using government ch<strong>an</strong>nels.When a slave is being programmed, the abusers will use schools,churches, Big Brothers, Boy Scouts <strong>an</strong>d other activities <strong>to</strong> carry out theabuse <strong>an</strong>d programming. Children pulled from classes will be givenback-up amnesia so that they forget that they forgot. In other words,193


they are <strong>to</strong>tally unaware that they have lost time when they werepulled out of the classroom. <strong>The</strong> teacher gives them a test score, <strong>an</strong>dthey are <strong>to</strong>ld they <strong>to</strong>ok a test during the missing time. How c<strong>an</strong> thefront alters deny it, when they have been hypnotized <strong>to</strong> believe it <strong>an</strong>dthey c<strong>an</strong> see the test scores? Alter boys <strong>an</strong>d boys at catholicorph<strong>an</strong>ages have a record of being used by dirty priests. Recently,numerous priests have been discovered molesting children, <strong>an</strong>dhundreds of lawsuits are underway, but it is still not coming out that thisabuse is connected <strong>to</strong> trauma-based mind-control. In the past, if theparents who were part of the <strong>Illuminati</strong> elite, but were not religiousw<strong>an</strong>ted their boy programmed, they could send him off <strong>to</strong> a militaryschool run under the cooperation of the Catholic church <strong>an</strong>d unitssuch as the 6th U.S. Army, which became one of the primary infiltratedunits. <strong>The</strong> 6th army uses the magical hexagram as its logo. This wouldprovide the programmed child with a religious front. He could say, “Iwent <strong>to</strong> catholic school.” <strong>The</strong> programming could be disguised asdiscipline, etc.<strong>The</strong> establishment media have worked propag<strong>an</strong>da wonders for theabusers of the Monarch <strong>Mind</strong>-control. Britain is extremely repressive intheir information control. If <strong>an</strong>y news medium tries <strong>to</strong> leak the mostsimplist of information a secret document called a notice” will be sentat <strong>an</strong>y time of day <strong>to</strong> them from a D-notice committee, <strong>an</strong>d the mediawill have <strong>to</strong> s<strong>to</strong>p whatever reference is deemed a secret. In the U.S. it ineffect works as tight, it just is not officially as tight. <strong>The</strong> abusers knowthat they also have <strong>an</strong> Incredulous Fac<strong>to</strong>r that c<strong>an</strong> assist them. Whowould believe that a sweet child drinks blood <strong>an</strong>d is c<strong>an</strong>nabalistic? <strong>The</strong>more that they c<strong>an</strong> do that is far fetched, the less credibility the childhas if they do talk. Some children do try <strong>to</strong> talk. One Monarch slavetalked at age five, <strong>an</strong>d her entire family came down hard on her <strong>an</strong>dblamed the child’s talking for the death of one of the abusers. Whatkind of proof c<strong>an</strong> a child bring that adults will accept? In the McMartinPreschool case about 800 children were witnesses whose s<strong>to</strong>riescolloborated the SRA <strong>an</strong>d programming that was done, but the media,<strong>an</strong>d the judicial system were able <strong>to</strong> cover up the abuse <strong>an</strong>d make itlook on television that the abusers were the victims! It wasn’t until afterthe case was over <strong>an</strong>d the property sold, that the t<strong>an</strong>gible proof (thesecret tunnels with paraphenalia) were found, <strong>an</strong>d then the newsmedia has covered that up <strong>to</strong>o. <strong>The</strong> abusers will often wear masks <strong>an</strong>dcostumes. Let’s say a programmer wears a Mickey Mouse outfit, <strong>an</strong>dthe child would remember <strong>an</strong>d tell, “Mickey Mouse hurt me.” Now whois going <strong>to</strong> believe the child? <strong>The</strong> child has <strong>to</strong>ld the truth, but will bereprim<strong>an</strong>ded for telling the truth. It doesn’t take long for a severelyabused child, who has been programmed <strong>to</strong> keep silent, <strong>to</strong> learn thatno one w<strong>an</strong>ts <strong>to</strong> hear the truth <strong>an</strong>yway.194


THE USE OF RELIGIOUS FRONTSA great deal of Monarch programming <strong>an</strong>d slave abuse, (as well asthe drug trade) is done under three major covers or fronts:Religious Fronts, the Front of National Security <strong>an</strong>d the Military, <strong>an</strong>d theEntertainment fields, especially the Country Western Industry, the RockMusic Industry <strong>an</strong>d Hollywood. <strong>The</strong> religious fronts were popular forcenturies, especially when groups like the Jesuits, the Assassins, <strong>an</strong>dother groups held immense power. Religious fronts are still being usedsuch as J.Z. Knight, Elizabeth Claire Prophet’s CUT church, the Churchof Scien<strong>to</strong>logy, the Charismatic movement, Jim Jones & Jones<strong>to</strong>wn,<strong>an</strong>d David Koresh’s group etc. Billy Ray Moore’s Lord’s Chapel isentirely a mind-control operation. <strong>The</strong>re is a nondenominationPentecostal church is southern Washing<strong>to</strong>n whose entire membership isSat<strong>an</strong>ists under mind-control. Various overseas “missionary” groups arecovers for the CIA & mind-control. It would take a book <strong>to</strong> explain howthese religious fronts are part of the <strong>to</strong>tal trauma-based mind-control<strong>an</strong>d how they operate <strong>to</strong> protect mind-control, however there arepublications which go in<strong>to</strong> some of the CIA connections <strong>to</strong> thesegroups. It is suggested that interested persons read these publications.Some of the deceptions such as the lone assassin idea have been usedfor centuries as a cover for assassinations pl<strong>an</strong>ned by the occulthierarchy. If we are going <strong>to</strong> really reveal how the Monarch <strong>Mind</strong>controlis done, we will have <strong>to</strong> explain how the deception is done. Ifone describes a chameleon only by saying “it is like a lizard”, withoutmentioning the camouflage, then the most import<strong>an</strong>t part has beenoverlooked. Religious fronts are <strong>an</strong> import<strong>an</strong>t part of the <strong>Illuminati</strong>program for making slaves. In fact, due <strong>to</strong> their gnostic philosophy ofbal<strong>an</strong>cing their good deeds with their bad deeds, it is almost essential<strong>to</strong> have a religious front through which one c<strong>an</strong> do good deeds. Eventhough adding this section <strong>to</strong> the book will spur some <strong>to</strong> blindly lash outat the book, still the whole s<strong>to</strong>ry needs <strong>to</strong> come out. When we, theauthors of this book, write that the Monarch-type <strong>to</strong>tal mind-controlthreatens everything this nation st<strong>an</strong>ds for, we are not exaggerating.<strong>The</strong> Monarch <strong>Mind</strong>-control program has not been used just <strong>to</strong> programslaves--but it has been part of a much bigger deception. When thisdeception is realized by this nation, it will shatter the very fabric of trustthat Americ<strong>an</strong>s have in their institutions. If Americ<strong>an</strong>s will begin <strong>to</strong>underst<strong>an</strong>d the power structure behind their institutions, <strong>an</strong>d whocontrols this structure, they will begin <strong>to</strong> see the lies in the scripts thatthey have been fed since inf<strong>an</strong>cy. And YOU, the reader of this nextsection in this book, if you love the truth, c<strong>an</strong> help begin the healingprocess <strong>to</strong> overcome some of the devastation that is going <strong>to</strong> rock thisnation when the truth comes out. This next section will help bothChristi<strong>an</strong> <strong>an</strong>d non-Christi<strong>an</strong> reader. <strong>The</strong> therapist c<strong>an</strong> learn about whatis happening so that they c<strong>an</strong> better deal with what the SRA survivors195


are beginning <strong>to</strong> reveal. <strong>The</strong> grooming of the Americ<strong>an</strong> people <strong>to</strong>believe massive amounts of lies did work, UNTIL a few loving therapists,ministers, <strong>an</strong>d doc<strong>to</strong>rs beg<strong>an</strong> <strong>to</strong> liberate victims of the Monarchtrauma-based mind-control. <strong>The</strong>se programmed multiples beg<strong>an</strong>revealing a horror s<strong>to</strong>ry of deception unparalleled in his<strong>to</strong>ry. For thereader <strong>to</strong> deal with the next section me<strong>an</strong>s courage. It me<strong>an</strong>s that thereader will have <strong>to</strong> muster up some of the same type of love of truththat the mind-control survivors must muster <strong>to</strong> free themselves of the liesof their sat<strong>an</strong>ic programming. What we see <strong>an</strong>d hear c<strong>an</strong> beprogramming, in the same way SRA victims are deceived. Everyone inthe <strong>Illuminati</strong> of <strong>an</strong>y signific<strong>an</strong>ce has participated in grooming thepublic <strong>to</strong> believe that Billy Graham is a great m<strong>an</strong> of God. Graham hass<strong>to</strong>od beside each of the Presidents <strong>an</strong>d the Pope. <strong>The</strong> <strong>Illuminati</strong> don’tjust program individuals, they program whole nations. <strong>The</strong> public hasbeen led <strong>to</strong> believe in a television image. But what if the secularmedia’s image of Billy Graham is not real? For Christi<strong>an</strong>s it me<strong>an</strong>s thatthey c<strong>an</strong> quit trusting in a m<strong>an</strong>, <strong>an</strong>d place their trust fully on God. Forsecular readers, they c<strong>an</strong> begin <strong>to</strong> see the extent of how America’sinstitutions have been corrupted by the horrible trauma-based mindcontrol.<strong>The</strong> heart-beat of the Body of Christ is crying out thatsomething is terribly wrong. We will address that. All of us, whetherChristi<strong>an</strong> or not, must step out of the lies <strong>an</strong>d look clearly out in<strong>to</strong> thedarkness <strong>an</strong>d see every facet of this evil mind-control. When men whoworship the god of this world place “In God We Trust” on the FederalReserve b<strong>an</strong>k notes, we who know the truth must step out of our dreamworld <strong>an</strong>d realize that they me<strong>an</strong> Lucifer. (By the way, the FederalReserve is not a government agency, but a private b<strong>an</strong>king institutionof the <strong>Illuminati</strong>. This has been documented in a number of writings.)<strong>The</strong> issue at h<strong>an</strong>d in this next section is <strong>to</strong> show how the institutioncalled “the Christi<strong>an</strong> church”, <strong>an</strong>d the world in general has beendeceived by a programmed multiple <strong>an</strong>d this trauma-based mindcontrol.Secular readers will be shown that the doctrines that Christi<strong>an</strong>sw<strong>an</strong>t <strong>to</strong> believe in, have been subtly destroyed under the disguise ofbuilding them up. This is no different th<strong>an</strong> the destruction of the positivevalues which hold <strong>an</strong>y group <strong>to</strong>gether. (After the repeatedcolloboration by essentially all the Christi<strong>an</strong> churches worldwide inm<strong>an</strong>y activities as the NCC, the Billy Graham Crusades, the PromiseKeepers <strong>an</strong>d other programs, the Christi<strong>an</strong> churches, Orthodox,Catholic, Protest<strong>an</strong>t & non-denominational c<strong>an</strong> be considered oneinstitution.) <strong>The</strong> infiltration <strong>an</strong>d control of the Christi<strong>an</strong> religion has beenone of the easiest tasks of the <strong>Illuminati</strong>. <strong>The</strong> Christi<strong>an</strong> churches arewhat the intelligence agencies called “SOFT TARGETS.”196


THE DECEPTION OF BILLY GRAHAM, A MIND-CONTROL FRONTIn 1992, Billy Graham broadcast all over the U.S. his radio show calledEmbrace America 2000. In the Louisi<strong>an</strong>a area, it came over the KJAMLafayette Station. During the show, Billy Graham <strong>to</strong>ld the Americ<strong>an</strong>people we need <strong>to</strong> embrace the New World Order. Billy Graham is alsoon record stating that people c<strong>an</strong> have salvation through pag<strong>an</strong>ism(<strong>an</strong>other name for witchcraft). For inst<strong>an</strong>ce, in McCall Magazine (J<strong>an</strong>.1987) Graham stated, "I used <strong>to</strong> believe that pag<strong>an</strong>s in far-off countrieswere lost--were going <strong>to</strong> hell. I no longer believe that. I believe thatthere are other ways of recognizing the existence of God--throughnature, for inst<strong>an</strong>ce." Pag<strong>an</strong>s believe that salvation c<strong>an</strong> be obtainedthrough nature. This is not a pleas<strong>an</strong>t s<strong>to</strong>ry. Billy Graham has been builtup <strong>to</strong> be the most respected popular person in America, Who w<strong>an</strong>ts <strong>to</strong>find out they have been deceived? We will try <strong>to</strong> give you the facts, orevidence, <strong>an</strong>d may God gr<strong>an</strong>t you wisdom as you read this. Thissection is not propag<strong>an</strong>da for our own personal views. Years ago,when Fritz set out on his search, he had no final outcome in mind. Fritzisn’t concerned with concealing facts one way or the other. <strong>The</strong>re is nodesire <strong>to</strong> stampede our readers <strong>an</strong>y where. We do w<strong>an</strong>t <strong>to</strong> clarifym<strong>an</strong>y issues. We do w<strong>an</strong>t <strong>to</strong> help the truth seeker. But the co-authorspersonally have no battle <strong>to</strong> win, except that truth be brought forth.<strong>The</strong> issues at stake are not trivial. His<strong>to</strong>rically, Billy Graham’s deception isone of the ,,greatest" deceptions that has ever been perpetrated.Some might argue the greatest, making Benedict Arnold, Quisling, <strong>an</strong>dthe Troj<strong>an</strong> Horse pale in<strong>to</strong> insignific<strong>an</strong>ce. Allow us <strong>to</strong> introduce you justbriefly in<strong>to</strong> the world of the <strong>Illuminati</strong>, All <strong>to</strong>p hierarchy Sat<strong>an</strong>ists arerequired <strong>to</strong> have covers, <strong>The</strong> Illuminatus will have multiple personalities,<strong>an</strong>d he or she will have one personality that is particularly shown <strong>to</strong> theoutside world. <strong>The</strong>y (the Programmers, h<strong>an</strong>dlers <strong>an</strong>d the <strong>Illuminati</strong>councils) try <strong>to</strong> get the best covers that they c<strong>an</strong>. <strong>The</strong>y like <strong>to</strong> beclergymen, but they are also mayors of big cities, lawyers, doc<strong>to</strong>rs, etc.A Christi<strong>an</strong> psychiatrist who has worked with numerous victims ofSat<strong>an</strong>ism <strong>an</strong>d Multiple Personality Disorder wrote this observation afterhaving worked with a large number of ex-multi-generationalprogrammed Sat<strong>an</strong>ic multiples, "Some sat<strong>an</strong>ists have invaded thechurch as it is the perfect cover for them. <strong>The</strong>y masquerade as <strong>an</strong>gelsof light <strong>an</strong>d gravitate <strong>to</strong>wards positions of leadership in order <strong>to</strong> havemore influence. Because much of what they say is sound doctrinally,they are rarely detected. Most survivors whom I have worked with hadsat<strong>an</strong>ist parents who were in high positions in churches; m<strong>an</strong>y werepas<strong>to</strong>rs." (Dr. Fox, Loreda. <strong>The</strong> Spiritual <strong>an</strong>d Clinical Dimensions ofMultiple Personality Disorder. Salida, CO: Books of S<strong>an</strong>gre de Cris<strong>to</strong>, p.196.) Let us repeat what Dr. Loreda Fox said, "Most survivors whom Ihave worked with had sat<strong>an</strong>ist parents who were in high positions inchurches; m<strong>an</strong>y were pas<strong>to</strong>rs." She didn’t say "some," she said MOST.Independently, we have discovered the very same thing. People don’t197


grasp that just because a preacher c<strong>an</strong> sincerely preach what seemsa "perfect sermon," doesn’t me<strong>an</strong> that he c<strong>an</strong>’t also be part of theSat<strong>an</strong>ic hierarchy. What is happening with the <strong>Illuminati</strong>’s ability <strong>to</strong>create programmed multiples is that we are getting perfect preacherswho are secret hierarchy members. Some of their "perfect sermons" arefull of slides, such as "the Christi<strong>an</strong> people need <strong>to</strong> get involved in thevoting process. Christi<strong>an</strong>s love <strong>to</strong> hear such things, it tickles their ears,but the truth is that the entire voting process has been captured <strong>an</strong>dcorrupted. Voting machines have repeatedly been exposed <strong>to</strong> havebeen rigged, <strong>an</strong>d the controlled media <strong>an</strong>d public denial haveprevented Americ<strong>an</strong>s from giving up their myth that the commonm<strong>an</strong>’s votes run this nation. (<strong>The</strong> subject of election corruption is dealtwith in Fritz’s newsletters, etc.) In Fritz’s Be Wise As Serpents book (whichexposed Billy Graham as a Luciferi<strong>an</strong> in 1991), it is explained that highlevel Sat<strong>an</strong>ism is Gnosticism which requires that "the Force" of thesegreat sat<strong>an</strong>ic magici<strong>an</strong>s be bal<strong>an</strong>ced. In other words, in high levelSat<strong>an</strong>ism your good deeds must bal<strong>an</strong>ce your evil deeds. People donot realize that unless someone does "good" deeds they c<strong>an</strong>not be ahigh level Sat<strong>an</strong>ist. That is why some of the greatest phil<strong>an</strong>thropists arealso our leading national sat<strong>an</strong>ists, To see Billy Graham do somethingcommendable does not disqualify him from sat<strong>an</strong>ism. In fact, it is arequirement if he’s been part of the <strong>Illuminati</strong>, such as exinsiders/witnessessay he was. In fact, it wasn’t until working on this bookthat <strong>an</strong> eyewitness <strong>to</strong> the mind-control abuse of at the h<strong>an</strong>ds of BillyGraham offered <strong>to</strong> help contribute <strong>to</strong> this section of the book. In otherwords, <strong>an</strong> eyewitness helped write this. This eyewitness account by theCo-author matches what the list of eyewitnesses that Fritz assembled in1993 have said, But the eyewitness went further <strong>an</strong>d exposed B.G.crusades’ skillful use of Monarch slaves <strong>to</strong> launder drug money. Severalpolice officers have stated that <strong>to</strong>day, there is for all practical purposesno police training helping police <strong>to</strong> underst<strong>an</strong>d Sat<strong>an</strong>ism. <strong>The</strong>y arehighly trained in m<strong>an</strong>y areas, but Sat<strong>an</strong>ism is avoided. When <strong>an</strong> SRAcase involving multiplicity in Olympia, WA recently happened, thepolice who investigated the case found that they were treated asinternational experts in sat<strong>an</strong>ism by other policemen. <strong>The</strong>y themselvesknew that they knew very little. Where are the experts <strong>to</strong> teach usabout how the <strong>Illuminati</strong> functions? Where are the experts who knowwho are in the <strong>Illuminati</strong>? <strong>The</strong>re is no college open <strong>to</strong> the public thatteaches Adv<strong>an</strong>ced <strong>Illuminati</strong> Studies 401, <strong>an</strong>d gives degrees inSat<strong>an</strong>ism. <strong>The</strong> expert witnesses are those who have m<strong>an</strong>aged <strong>to</strong> leavethe <strong>Illuminati</strong> <strong>an</strong>d Sat<strong>an</strong>ism, <strong>an</strong>d stay alive long enough <strong>to</strong> talk. But theother side will argue, how c<strong>an</strong> we verify the testimony of your witnessesFritz? Remember what happened <strong>to</strong> over 100 people who had sometype of knowledge about the Kennedy assassination? Jim Marrs in hisbook Crossfire on the Kennedy Assassination lists 103 people who werekey figures in knowing about the assassination who have died, m<strong>an</strong>y incircumst<strong>an</strong>ces that indicate assassination. <strong>The</strong> s<strong>to</strong>ry we are dealing198


with here is just as sensitive <strong>to</strong> the elite as Kennedy’s assassination,because it involves their preparations for the creation of a false Christ,called by Christi<strong>an</strong>s the AntiChrist, who will be the masterh<strong>an</strong>dler/programmer. <strong>The</strong> LIST OF known & credible WITNESSES If theauthors were <strong>to</strong> call my list of witnesses up <strong>to</strong> the witness st<strong>an</strong>d--which Ic<strong>an</strong>’t for it would be a death sentence <strong>to</strong> m<strong>an</strong>y of them, the list wouldinclude:1 Council of Foreign Relations member, who is secretly against the NewWorld Order1 National Security Agency person, who is against the New World Order1 CIA high level administra<strong>to</strong>r2 Sat<strong>an</strong>ists, still in covens, but unhappy enough with the situation <strong>to</strong> talk4 ex-Sat<strong>an</strong>ists, 3 of which are eyewitnesses, all Christi<strong>an</strong>s now2 ex-New Age leaders who worked with the Conspiracy, both becameChristi<strong>an</strong>s1 ex-33° Mason, now a Christi<strong>an</strong>Various Christi<strong>an</strong>s who have worked with Billy Graham, Pas<strong>to</strong>rs, etc.Various therapists working with SRA victims <strong>The</strong> m<strong>an</strong> who r<strong>an</strong> Security atthe Sacramen<strong>to</strong> CrusadeAlice Braemer, a wom<strong>an</strong> who worked as a secretary for Je<strong>an</strong>ne DixonNone, except for a couple of exceptions, none of these people knew<strong>an</strong>ything about what the other witnesses (sources) had said. <strong>The</strong> highdegree of validation <strong>an</strong>d collaboration that separate testimony bywitnesses who have never seen each other <strong>an</strong>d live in different parts ofthe country is very powerful. <strong>The</strong>re are several questions that pop upin<strong>to</strong> people’s minds who are not familiar with who Fritz is, <strong>an</strong>d are notfamiliar with these witnesses. <strong>The</strong> type of worries some readers could benaturally having might be: But how are we, the readers, <strong>to</strong> know howaccurate these people are? Are they trustworthy? Do they have areputation for honesty? Could they possibly be giving false information<strong>to</strong> discredit a great m<strong>an</strong> of God? <strong>The</strong>se kind of questions c<strong>an</strong> benatural questions for people unfamiliar with how this information wasobtained. But we assure you, that what we pass on from theseeyewitnesses c<strong>an</strong> be relied upon. None of these worries have <strong>an</strong>ysubst<strong>an</strong>ce <strong>to</strong> them, because the m<strong>an</strong>ner in which Fritz came <strong>to</strong> find outabout Billy Graham has generally been while he was researching otherthings related <strong>to</strong> the <strong>Illuminati</strong>. <strong>The</strong> author has not been out <strong>to</strong> build acase, the case has built itself from numerous detached witnesses whohave nothing <strong>to</strong> gain by telling what they know. <strong>The</strong>se witnesses havenot come <strong>to</strong> Fritz <strong>to</strong> feed him bogus information. Just the paper trail onBilly Graham is very revealing in itself. Generally the information of thesewitnesses has been confided by these witnesses <strong>to</strong> their trusted friends.Initially, these witness have had no idea that the information theyconfided in their trusted close associates would go beyond their most199


trusted friends. <strong>The</strong>se trusted friends then have had permission <strong>to</strong> let mecontact them or find out their information. <strong>The</strong> reason why thesepeople are believable is that the information they reveal could getthem killed, <strong>an</strong>d second, the m<strong>an</strong>ner <strong>an</strong>d circumst<strong>an</strong>ces of how theinformation has originally unfolded has never been in <strong>an</strong>y fashion ormethod that could be construed as <strong>an</strong> attempt <strong>to</strong> give falseinformation.CLARIFYING WHAT IS LOOKED FOR IN PROOF?Too m<strong>an</strong>y people are considered guilty unless proven innocent--whichme<strong>an</strong>s that a legitimate search for truth has NOT taken place. On theflip side, we must bear in mind that hidden information that has laiddorm<strong>an</strong>t for years may <strong>to</strong>tally reverse our underst<strong>an</strong>ding of something.Exceptional circumst<strong>an</strong>ces may surprise us, If some item does not lenditself <strong>to</strong> <strong>to</strong>tally irrefutable, <strong>to</strong>tally unqualified claims, then knowing this,the proper investiga<strong>to</strong>r uses words like "almost certainly" <strong>an</strong>d ,,mostlikely". If the investiga<strong>to</strong>r feels strongly that everything is <strong>to</strong>tally clear, hemay declare that something is correct "without qualification." This is thenature of proof. We need <strong>to</strong> underst<strong>an</strong>d the qualifications <strong>an</strong>dreservations that often are attached <strong>to</strong> evidence or conclusions. Butwe certainly do w<strong>an</strong>t <strong>to</strong> press our investigations as far as possible <strong>to</strong> getas m<strong>an</strong>y "unqualified" conclusions as possible. Of course, by the timewe write this, we have already done our investigating, <strong>an</strong>d have oneconclusion without <strong>an</strong>y qualification: Billy Graham is working for theSat<strong>an</strong>ic Hierarchy. We w<strong>an</strong>t <strong>to</strong> try <strong>to</strong> introduce the material in such away that you will get some sense of the search, so that you will notsimply accept our conclusion but will make rational spirit-led criticallythought-outdecisions about Billy Graham. So for the sake of thereader’s investigation, please, let us unshackle ourselves from ourprejudices <strong>an</strong>d preconceived labels. Let us suspend our judgmentabout Billy Graham one way or the other, until we have thoroughlystudied, prayed <strong>an</strong>d gained discernment about this. It might beinteresting <strong>to</strong> get some of the Masons, who casually without realizingwhat they were saying, have talked about Billy Graham’s membership,or other aspects of his Masonic involvement. It’s doubtful that suchmen would be of <strong>an</strong>y value on the witness st<strong>an</strong>d. <strong>The</strong>ir numerousMasonic oaths <strong>to</strong> lie <strong>an</strong>d conceal Freemasonry under penalties ofgruesome death would tend <strong>to</strong> have more influence on them th<strong>an</strong>swearing on a Bible. (See Dunc<strong>an</strong>’s Masonic Ritual book, p. 30 for the1st Degree oath.) This type of witness, because they talked accidently<strong>an</strong>d casually are very valuable witnesses <strong>to</strong> whoever accidently hearsthem, but unfortunately they must be assumed <strong>to</strong> be still loyal <strong>to</strong> theMasonic Lodge <strong>an</strong>d would be hostile witnesses that will not cooperate.200


If this were <strong>an</strong> actual court of law, depositions of Billy Graham’ s staffcould be taken, so that it could be revealed <strong>to</strong> the court how m<strong>an</strong>ytimes they have lied. By showing their lies, their testimony would beimpeached <strong>an</strong>d Christi<strong>an</strong>s would realize that Billy Graham’s staff haveplayed a major role in the deception. This article will put forth evidencethat impeaches the testimony of Billy Graham’s staff. We must referreaders <strong>to</strong> the Be Wise As Serpents book <strong>an</strong>d other writings of Fritz formore information. Also some other books will be named <strong>to</strong>o. Becausethese leaders are corrupt, they have been participating in the massdeception of the world about what Billy Graham does <strong>an</strong>d who he is. Infact, if this were a court of law all types of people could besubpoenaed <strong>to</strong> take depositions, <strong>an</strong>d we might find out m<strong>an</strong>y morethings th<strong>an</strong> we already know.THE MOTIVATION OF THE CO-AUTHORSM<strong>an</strong>y people, who like Billy Graham, have imputed evil motives <strong>to</strong><strong>an</strong>yone exposing Billy Graham. As the Scripture say at one point, "Am I<strong>to</strong> become your enemy because I tell you the truth?" <strong>The</strong> s<strong>to</strong>ry aboutBilly Graham <strong>an</strong>d his life-long career for the <strong>Illuminati</strong> is not <strong>an</strong> easything for us <strong>to</strong> write. We do not enjoy speaking negative things againstpeople. We do enjoy speaking positive things about people. And yetno m<strong>an</strong>, no serv<strong>an</strong>t of God is above reproach. We c<strong>an</strong> personallyhave <strong>an</strong> inner peace that what we have done was what we shouldhave done. Something needs <strong>to</strong> be done <strong>to</strong> wake m<strong>an</strong>kind up beforeits <strong>to</strong>o late.CLARIFYING WHAT IS ACCEPTABLE TESTIMONYIn some subjects, going <strong>to</strong> the encyclopedia or alm<strong>an</strong>ac will settlequestions. In dealing with the <strong>Illuminati</strong> <strong>an</strong>d high levels of the occultworld -- unless the investiga<strong>to</strong>r is willing <strong>to</strong> listen <strong>to</strong> eye-witnesstestimony, he or she will get nowhere. <strong>The</strong>re is rarely <strong>an</strong>y written recordof their secret activities. But how much s<strong>to</strong>ck c<strong>an</strong> be put in eyewitnesses?M<strong>an</strong>y people up <strong>to</strong> now have criticized Fritz for using eyewitnesses.But remember that if we did m<strong>an</strong>age <strong>to</strong> get some paper trailor books on the subject, that book paper trail would not beacceptable in court, or even if allowed would not be as import<strong>an</strong>t asour eyewitnesses. In court, the written records c<strong>an</strong> be introduced alongwith the person who recorded them. In other words, the personalwitness is still import<strong>an</strong>t even with written documents. <strong>The</strong> testimony ofour eyewitnesses expose Billy Graham’s mind-control activities. Still, wew<strong>an</strong>t <strong>to</strong> bear in mind that witnesses have varying degrees of credibility<strong>an</strong>d knowledge. <strong>The</strong> qualifications of witness in relation <strong>to</strong> what they201


are testifying is import<strong>an</strong>t. But <strong>to</strong> simply dismiss all these witnessesbecause they are not paper is simply <strong>to</strong> cut ourselves off from m<strong>an</strong>yvaluable sources of information. In accumulating evidence, theresearcher will come upon two types of information. One isprearr<strong>an</strong>ged evidence <strong>an</strong>d the other is called casual evidence.Casual evidence is evidence that has just happened <strong>to</strong> appear byaccident. An actual example is when friends of mine met a <strong>to</strong>talstr<strong>an</strong>ger who happens <strong>to</strong> be a Mason <strong>an</strong>d he offh<strong>an</strong>dedly talks aboutBilly Graham being a Freemason. Casual evidence is simply evidencethat happens without the interested party having <strong>an</strong>ything <strong>to</strong> do with itsurfacing. Finding casual evidence is generally "luck"’, In this case, Fritzhas bumped in<strong>to</strong> a great deal of casual evidence, simply because hehad his eyes open <strong>an</strong>d has been investigating this area for severalyears. Because of the situation <strong>to</strong>day in this nation, there is little ch<strong>an</strong>ce<strong>to</strong> get a proper hearing of this information. In terms of the future,indeed, the backlash from this book may silence us. <strong>The</strong> truth will stillremain, even if we <strong>an</strong>d the other witnesses don’t. We c<strong>an</strong> drawconclusions about ducks from studying various types of ducks. I c<strong>an</strong> notdraw conclusions about radios from studying ducks, I c<strong>an</strong> generalizeabout Americ<strong>an</strong> made cars, but I c<strong>an</strong>’t include in my generalizationabout Americ<strong>an</strong> cars <strong>an</strong> ox-cart in India. This may sound basic, <strong>an</strong>d it is,yet people try <strong>to</strong> generalize by lumping the generational Sat<strong>an</strong>ists inwith everybody else, <strong>an</strong>d it just doesn’t work. <strong>The</strong>y also try <strong>to</strong> drawconclusions about the Freemasons on the basis of what the RotaryClub they belong <strong>to</strong> is like <strong>an</strong>d it just doesn’t work. In terms of trying <strong>to</strong>get a proper hearing <strong>to</strong>day, one of the barriers is that people use theirown experiences <strong>to</strong> draw conclusions. People have nothing in theirexperience <strong>to</strong> allow them <strong>to</strong> draw conclusions about the <strong>Illuminati</strong>programmers/h<strong>an</strong>dlers who are moral degenerates <strong>an</strong>d programmedmultiples, who will do <strong>an</strong>ything, in spite of their nice fronts.<strong>The</strong> policies of DECEPTION by the Billy Graham Crusade staffIn 1992, a Christi<strong>an</strong> named Richard Bennett, a friend of Fritz’sconfronted the Billy Graham Crusade staff. What he was concernedabout was the Billy Graham crusade policy (that has been in placesince the 50’s) of sending Catholics that come forward back <strong>to</strong>Catholic churches. Documentation shows that the deception is worseth<strong>an</strong> that, new believers that have never gone <strong>to</strong> <strong>an</strong>y church aresometimes referred by the Billy Graham counsellors <strong>to</strong> the CatholicChurch. Now, why would Richard <strong>an</strong>d Fritz be concerned about theCatholic Church? Richard Bennett was a priest from Irel<strong>an</strong>d whoworked at the Vatic<strong>an</strong>, before giving his life <strong>to</strong> Christ. He knows howthe Catholic hierarchy prevents people from realizing what they havein Christ. For those who have read Fritz’s Be Wise As Serpents book202


chapter 2.2 you know that Fritz is very concerned when <strong>an</strong>yone givestheir allegi<strong>an</strong>ce <strong>to</strong> a power structure that is part of the NWO <strong>an</strong>d par<strong>to</strong>f its Monarch trauma-based <strong>to</strong>tal mind control. Not everything aboutthe Catholic church is wrong. Yet, the Billy Graham Crusade couldnever get the support it gets from conservative Christi<strong>an</strong>s if BillyGraham’s staff didn’t lie about where Crusade converts are sent. WhatRichard <strong>an</strong>d Fritz were concerned about was that new Christi<strong>an</strong>s wouldbe sent <strong>to</strong> Catholic churches, which now are teaching Zen Buddhism,New Age things, not the salvation by grace that these new Christi<strong>an</strong>sneed. Gr<strong>an</strong>ted the enthusiasm of these new Christi<strong>an</strong>s might infusesome life in<strong>to</strong> the Catholic church, but a babe in Christ is defenseless.He needs nurture, <strong>an</strong>d the ch<strong>an</strong>ce <strong>to</strong> grow. It isn’t me<strong>an</strong>t for newChristi<strong>an</strong>s <strong>to</strong> be thrown <strong>to</strong> the wolves. Anyway, last Spring <strong>an</strong>d Summer,the Billy Graham Crusade Executive committee was confronted face<strong>to</strong> face with the evidence of what the Billy Graham Crusade in Sept.’93 was going <strong>to</strong> do. Actually, more people th<strong>an</strong> Richard did confrontthem, but Richard is one of the most knowledgeable ministries <strong>to</strong> theCatholics in this area. What the Billy Graham Crusade ExecutiveCommittee <strong>to</strong>ld Richard Bennett was that he had nothing <strong>to</strong> worryabout. That the crusade would never send <strong>an</strong>yone <strong>to</strong> a Catholicchurch, but that if new converts w<strong>an</strong>ted <strong>to</strong> go there on their own, thatwas their own choice. Four Catholic leaders sat on the ExecutiveCommittee for the ’92 Portl<strong>an</strong>d Crusade -- Ch<strong>an</strong>cellor Mary Joe Telly, adeacon <strong>an</strong>d two priests. On the Catholic radio station,(<strong>an</strong>d we have itrecorded,) Mary Joe Telly of the Billy Graham Executive Committeealong with <strong>an</strong>other Bishop Wall Schmidt <strong>to</strong>ld the Catholic listeners not<strong>to</strong> worry that if they came forward they would be guar<strong>an</strong>teed thatthey would be referred back <strong>to</strong> a Catholic church. <strong>The</strong>y gave theassur<strong>an</strong>ce four times in that talk show. <strong>The</strong>y said that the decision <strong>to</strong>send people who came forward <strong>to</strong> Catholic churches was firmbecause it had come right from the very <strong>to</strong>p. This was 6 p.m KVDMPortl<strong>an</strong>d station. Our recording of this is a record of just one ofthous<strong>an</strong>ds of lies that the Billy Graham Crusade people have <strong>to</strong>ldChristi<strong>an</strong>s over the years. In fact, from the evidence it appears the BillyGraham Crusade people say whatever they have <strong>to</strong>, regardless of thetruth. In the North Star Baptist, Nov. 1964 there was article by JaphethPerez, who as a convert in the NY 1957 Billy Graham Crusade <strong>an</strong>d abr<strong>an</strong>d-new Christi<strong>an</strong>, was sent <strong>to</strong> a Catholic church by the Billy GrahamCrusade. I<strong>an</strong> Paisley wrote this comment about Billy Graham’s staff: "Dr.Graham did not reply. He never does reply <strong>to</strong> letters like this. He stateshe never defends himself. He does have a staff, however, who arepaid <strong>to</strong> defend him <strong>an</strong>d who are never hampered by facts orbothered by ethics or logic in carrying out their duties. One of thegroup, George L. Edstrom, replied. <strong>The</strong> Jesuits themselves could notgive a finer example of casuistry th<strong>an</strong> his. It is thoroughly dishonest <strong>an</strong>ddeceitful, ... However, since this technique of deceit by misdirection,this failure <strong>to</strong> face up <strong>to</strong> the issues, this disregard of fact, <strong>an</strong>d this203


lasphemous attempt <strong>to</strong> identify Dr. Graham’s official connection withinfidels <strong>an</strong>d his flattery <strong>an</strong>d endorsement of them with our Lord’sministry <strong>to</strong> public<strong>an</strong>s <strong>an</strong>d sinners is so typical of the Grahamorg<strong>an</strong>ization..." In Fritz’s June ’93 Newsletter From A Christi<strong>an</strong> Ministry, aletter from Graham’ s staff was reproduced with a point by pointexposure of its lies. Christi<strong>an</strong>s are really not well aware of what the BillyGraham Crusade does. We quote a paragraph from a letter sent <strong>to</strong>Billy Graham clear back in the 1950s by a Pas<strong>to</strong>r who, grieved by whatBilly Graham was doing <strong>to</strong> the harvest field, said: "Some people saythat if you have just one convert in <strong>an</strong> ev<strong>an</strong>gelistic campaign, it isworth the meeting. That is not true. <strong>The</strong> ev<strong>an</strong>gelist, as the pas<strong>to</strong>r <strong>an</strong>dteacher, is given <strong>to</strong> the Body of Christ. <strong>The</strong> real test of <strong>an</strong> ev<strong>an</strong>gelisticcampaign is not how m<strong>an</strong>y people are converted but what kind of aspiritual condition does it leave in a community. Billy Graham is not onlyfailing in the number of people he leads <strong>to</strong> the Lord Jesus Christ in thisday when hearts are hungry <strong>an</strong>d most people are afraid of what mayhappen in the world <strong>an</strong>d when it is easier <strong>to</strong> get people convertedth<strong>an</strong> it ever has been in my lifetime, but Billy Graham is pulling the limbsoff of the ev<strong>an</strong>gelistic trees <strong>an</strong>d the orchard is being left in badcondition. As we have often said, the real test of <strong>an</strong> ev<strong>an</strong>gelist is notjust how m<strong>an</strong>y converts he has but does he leave the orchard incondition so it will keep bearing fruit."BILLY GRAHAM’S ACTIVE ROLE IN SATANIC RITUAL ABUSEBefore we get in<strong>to</strong> the details, we’ll take <strong>an</strong> overview. Sat<strong>an</strong>ists thriveon power. Sat<strong>an</strong> loves <strong>to</strong> give his followers power. Sat<strong>an</strong> <strong>to</strong>ok Christ <strong>to</strong>the mountain<strong>to</strong>p <strong>an</strong>d <strong>to</strong>ld Christ that he’d have a "crusade" <strong>an</strong>d bringevery one <strong>to</strong> follow Christ, if Christ would just bow down <strong>an</strong>d worshiphim. Christ refused. Billy Graham accepted it. We know a great dealhow the Sat<strong>an</strong>ists <strong>to</strong>ok Billy Graham, the brush salesm<strong>an</strong> <strong>an</strong>d made himin<strong>to</strong> the famous ev<strong>an</strong>gelist that he has become. Additionally, we alsoknow from victims of Sat<strong>an</strong>ism, that have come out of it, that BillyGraham has been a Sat<strong>an</strong>ist himself. How c<strong>an</strong> this be? <strong>an</strong>d how c<strong>an</strong>we know this? One of the best witnesses is a Monarch program survivor,who has escaped from being a high-level Pentagon slave. This survivorwitnessed Billy Graham working for the <strong>Illuminati</strong>. This survivor alsocarried messages for the Sat<strong>an</strong>ic hierarchy <strong>an</strong>d personally knows thatBilly Graham has been carrying messages from the <strong>to</strong>p secret <strong>Illuminati</strong><strong>to</strong> Presidents <strong>an</strong>d heads of state. This person’s information has beenbacked up by independent witnesses. A second ex-Sat<strong>an</strong>ist alsoremembers Billy Graham as a Sat<strong>an</strong>ist. Still <strong>an</strong>other person, <strong>an</strong> ex-<strong>Illuminati</strong> person, who has MPD s<strong>to</strong>od in front of Billy Graham <strong>an</strong>dwatched his eyes. This person said that it was very clear that BillyGraham has MPD <strong>an</strong>d that he switches personalities. Byhappench<strong>an</strong>ce or God’s will, Fritz received a report from one of thewomen who went <strong>to</strong> church with Billy Graham’s wife Ruth. <strong>The</strong> wom<strong>an</strong>was <strong>to</strong>ld by Ruth in conversation that her husb<strong>an</strong>d Billy Graham is204


str<strong>an</strong>ge in that he always sleeps with his eyes open. It is characteristic ofpeople who have MPD <strong>to</strong> sleep with their eyes open. People who haveMPD may have a devout Christi<strong>an</strong> personality <strong>an</strong>d a devout Sat<strong>an</strong>icpersonality all within a single body. This is not uncommon. In BillyGraham’s case, he is fully aware of what he is doing for the enemy inall his personalities, although his Christi<strong>an</strong> personality may not beecstatic about it all. Billy Graham’s Decision magazine has on its frontpage caption is "‘Ch<strong>an</strong>ged From the Inside Out," <strong>an</strong>d displays <strong>an</strong>infinity loop on the cover (see picture below). M<strong>an</strong>y Monarch slaveshave had lots of programming around the infinity loop. This is <strong>an</strong>import<strong>an</strong>t trigger <strong>to</strong> remind them how they are captured by theunending repeating rebuilding programming. <strong>The</strong>re are countless littlethings like this, which are evidence that Billy Graham is playing a role inthe sat<strong>an</strong>ic mind-control of the <strong>Illuminati</strong>. Dr. Schefflin, a mind-controlexpert, <strong>to</strong>ld me that he saw internal documents from the 1950steaching Billy Graham’s people on how <strong>to</strong> have a successful revival.<strong>The</strong>se documents instructed crusade counselors on things which wereelements of mind-control, such as delaying people from comingforward <strong>to</strong> confess Christ until the "right" time. If you’ve ever wonderedhow much Billy Graham knows--if the <strong>Illuminati</strong> haven’t <strong>to</strong>ld him, aconcerned Christi<strong>an</strong> named David Hill, who was <strong>an</strong> ex-Mafia/ex-NewAger/ex-Mason did. <strong>The</strong> concerned Christi<strong>an</strong> was a friend of Fr<strong>an</strong>klinGraham (Billy’s son) <strong>an</strong>d he had lived for two years at Billy Graham’shouse. He didn’t realize that Graham had been sucked in<strong>to</strong> the NewWorld Order until he had confronted Billy Graham. David Hill, who wasa ex-Mason turned Christi<strong>an</strong>, who had worked with m<strong>an</strong>y of the world’selite, spent 18 hours in a hotel room warning Billy Graham about theNew World Order. Billy Graham <strong>to</strong>ld David Hill at the end of their twodays of talking in this eastern U.S. hotel room that he was "a captive ofthat [NWO] org<strong>an</strong>ization." In other words, after placing himself underthe <strong>Illuminati</strong>’s sponsorship in the late ‘40s, Billy Graham has had thechoice of continuing <strong>to</strong> do his job for them, or being destroyed. Sincethey created who he is, they c<strong>an</strong> destroy him. And he knows it. DavidHill went on <strong>to</strong> try <strong>to</strong> expose the New World Order <strong>an</strong>d lost (wasmurdered) his life just as he finished a m<strong>an</strong>uscript exposing it. Even awell-informed Christi<strong>an</strong> like David Hill, who tried <strong>to</strong> warn Billy Grahamabout the NWO, was unaware of the extent of the deception of the<strong>Illuminati</strong>’s mind control. David didn’t know about programmedmultiples. David Hill, who was a high r<strong>an</strong>king Scottish Rite Freemason<strong>an</strong>d <strong>an</strong> import<strong>an</strong>t Mafia figure before he came <strong>to</strong> Christ, had evenbeen the go between for Billy Graham <strong>an</strong>d Joe B<strong>an</strong><strong>an</strong>a, a Mafiakingpin. It was David Hill, who innocently believing in Billy Graham,arr<strong>an</strong>ged the meeting for the two men. David Hill knew that WilliamR<strong>an</strong>dolph Hearst was part of the <strong>Illuminati</strong>, He was part of the br<strong>an</strong>ch<strong>Illuminati</strong> -- at what could be termed the 6th degree. William R<strong>an</strong>dolphHearst was <strong>to</strong>tally in<strong>to</strong> pag<strong>an</strong>ism. That is very obvious by a <strong>to</strong>ur of hism<strong>an</strong>sion in California which has been turned in<strong>to</strong> a museum. It was205


William R<strong>an</strong>dolph Hearst who fin<strong>an</strong>ced the first three years of BillyGraham’s Crusades. Stu PAK is associated with the Stewart TitleComp<strong>an</strong>y. Stu Pak provides funds for Billy Graham <strong>an</strong>d others. <strong>The</strong>head of Stu Pak is friends with Billy Graham <strong>an</strong>d George Bush. <strong>The</strong>comp<strong>an</strong>y has a lot of relatives running it. <strong>The</strong> Morris family is also tied <strong>to</strong>it. <strong>The</strong> people of Stewart Title Comp<strong>an</strong>y are ruthless. <strong>The</strong> V<strong>an</strong> Duyn<strong>Illuminati</strong> family in California also helped Billy Graham’s ministry getstarted.206


One of the ways the <strong>Illuminati</strong> funnelled money <strong>to</strong> Billy Graham wasthrough a monthly check delivered <strong>to</strong> Je<strong>an</strong>ne Dixon’s office, whichwas picked up every month by Billy Graham’s staff. After Dixon’ssecretary came <strong>to</strong> Christ she tried <strong>to</strong> expose Billy Graham’s connection<strong>to</strong> Je<strong>an</strong>ne Dixon. Je<strong>an</strong>ne Dixon sells crystal balls with snakes. She is par<strong>to</strong>f the <strong>Illuminati</strong>. Billy Graham wrote her a letter calling her "a wom<strong>an</strong> ofGod." Dixon’s secretary had a copy of this letter with Billy Graham’ssignature on it, after she became a Christi<strong>an</strong>. In 1952, in Paris, BillyGraham <strong>an</strong>d <strong>an</strong>other ev<strong>an</strong>gelist had dinner with two prostitutes <strong>an</strong>deach one <strong>to</strong>ok one of them home. Billy Graham had a wife <strong>an</strong>dchildren at home, so the whole affair was <strong>to</strong>tally improper for <strong>an</strong>ev<strong>an</strong>gelist even if Billy Graham didn’t have sex with the wom<strong>an</strong>. He<strong>to</strong>ld his friend only that the prostitute had taken off her clothes <strong>an</strong>dhe’d gotten scared <strong>an</strong>d come back <strong>to</strong> their hotel room. See Frady,Marshall. Billy Graham, A Parable of Americ<strong>an</strong> righteousness. Bos<strong>to</strong>n:Little, Brown & Co., p.169-170. In 1954, the m<strong>an</strong> who r<strong>an</strong> security for theSacramen<strong>to</strong> Crusade saw a high-priced hooker sneak in<strong>to</strong> BillyGraham’s room prior <strong>to</strong> him going out for the Crusade. Billy Graham<strong>an</strong>d this high priced hooker were alone <strong>to</strong>gether in the room, It is thistype of thing that has opened Billy Graham up <strong>to</strong> blackmail. ShouldGraham ever try <strong>to</strong> stray from the proper course set for him by the<strong>Illuminati</strong>, they have plenty of ammunition <strong>to</strong> blackmail him. (You mayask why would the Sat<strong>an</strong>ists from generational sat<strong>an</strong>ic families w<strong>an</strong>t <strong>to</strong>intimidate Billy Graham with fear? Why, isn’t he from a generationalsat<strong>an</strong>ic family? <strong>The</strong> <strong>an</strong>swer is that the whole Sat<strong>an</strong>ic system operatesoff of fear. Intimidation & fear are st<strong>an</strong>dard everyday parts of theirmakeup <strong>an</strong>d actions. Sort of the counterpart <strong>to</strong> the saying there is nohonor among thieves. <strong>The</strong> Sat<strong>an</strong>ic hierarchy are in const<strong>an</strong>tintimidation <strong>an</strong>d power struggles.) When Billy Graham w<strong>an</strong>ted <strong>to</strong>, hecould call up Henry Kissinger <strong>an</strong>d say, "Tell him <strong>to</strong> call me the minute hecomes in." (Frady, p. 451) Henry Kissinger is right in the middle of whatthe <strong>Illuminati</strong> is doing. Another Illuminatus that Graham had a workingrelationship with is Henry Luce, friend of the Baruchs. Luce <strong>an</strong>d BillyGraham spent several nights staying up talking late in<strong>to</strong> the night.Knowing how the <strong>Illuminati</strong> work, it is very safe <strong>to</strong> assume that theyhave pushed Billy Graham in<strong>to</strong> further degenerate acts. <strong>The</strong>y haveprobably done everything they c<strong>an</strong> <strong>to</strong> pervert Billy Graham, so there isno telling what sexual sins remain hidden. Kissinger is a member of P2Freemasonry. If we were <strong>to</strong> assume that Billy Graham were not involved(<strong>an</strong>d that is a big IF since we know that he is), then if one studies P2Masonic recruiting tactics given in the book In God’s Name, p. 116,then the reader will grasp that <strong>an</strong>yone of Billy Graham’s stature whoassociates so freely with P2 Freemasons will be targeted <strong>an</strong>dblackmailed <strong>an</strong>d forced <strong>to</strong> join. Once they join, new members areforced <strong>to</strong> compromise other possible targets. Billy Graham is part of thepeople who implement the Monarch program (which was a joint<strong>Illuminati</strong>/CIA <strong>to</strong>tal mind control program done <strong>to</strong> people). We know207


that he is serviced by Monarch sexual slaves (their kitten alters). It is veryeasy for the network <strong>to</strong> keep these poor victims (Monarch slaves) fromtalking, <strong>an</strong>d so the full extent of much of what has gone on may notcome out in our lifetimes. Another possible clue about Billy Graham’shidden life comes from Billy Graham himself. Do the readers rememberhow Jimmy Swaggert would disguise himself with sun glasses, etc. <strong>an</strong>dhis staff helped him carry out what he in part confessed? In Hollywood,FL (yes, FL!) Billy Graham said that he "often attends loveins <strong>an</strong>d rockfestivals incogni<strong>to</strong> by putting on a false mustache <strong>an</strong>d beard." He alsosaid he found the experience in doing that kind of thing "refreshing."This s<strong>to</strong>ry was in the Chicago Daily News, Dec. 29, 1969. <strong>The</strong> article’spurpose appears <strong>to</strong> have been <strong>to</strong> make Billy Graham look hip <strong>to</strong><strong>to</strong>day’s rock <strong>an</strong>d roll crowds of teenagers. Billy Graham described hisfriendship with Al<strong>an</strong> Dulles, I make every effort not <strong>to</strong> let it appear that Ifavor one party over <strong>an</strong>other. I count Secretary Dulles a friend, butSena<strong>to</strong>r Humphrey is also a good friend of mine, [who he met] ... whenwe were both swimming nude at the YMCA pool in Minneapolis wherehe was running for mayor." A friendship with Al<strong>an</strong> Dulles? Al<strong>an</strong> Dulles,direc<strong>to</strong>r of the CIA, was one of the biggest perpetra<strong>to</strong>rs of the traumabasedmind-control that this book is about. Humphrey also receivedorders from the Sat<strong>an</strong>ic hierarchy. And what is this swimming in nude?When Billy Graham had his 1954 Crusade, large sums of the moneycame directly from people in the <strong>Illuminati</strong>, the Whitneys, theV<strong>an</strong>derbilts, the Rockefellers, <strong>an</strong>d Chase M<strong>an</strong>hatt<strong>an</strong>. Billy Graham hasnumerous times attended Hollywood cocktail parties. Just twoexamples of which are: one given by Debbie Reynolds, <strong>an</strong>d <strong>an</strong>otherone which was a cocktail party for Hollywood stars put on by Nixon athis S<strong>an</strong> Clemente, CA home on a Sunday evening. Billy Graham’sschedule is filled with activities such as playing golf with people whoare in the <strong>Illuminati</strong>, or are Hollywood types. <strong>The</strong> full impact of thisconst<strong>an</strong>t fellowshipping with darkness is hard for people <strong>to</strong> grasp,because they picture that Graham is <strong>an</strong> ev<strong>an</strong>gelist <strong>an</strong>d so therefore hemust go where the sinners are. <strong>The</strong>re is <strong>an</strong> expression, show me a m<strong>an</strong>’s friends <strong>an</strong>d I’ll tell you about him. It’s one thing <strong>to</strong> spend time with evil<strong>to</strong> give it a ch<strong>an</strong>ce <strong>to</strong> repent <strong>an</strong>d come <strong>to</strong> the light, It is <strong>an</strong>other <strong>to</strong>fellowship with evil <strong>an</strong>d allow it <strong>to</strong> remain in darkness. Let us quote froma neutral source, a group who had been investigating the role ofchurch <strong>an</strong>d state. <strong>The</strong>y were trying <strong>to</strong> determine for their study whetherBilly Graham has had <strong>an</strong> impact on all the Presidents from Eisenhower<strong>to</strong> Clin<strong>to</strong>n, This study was not pro or <strong>an</strong>ti Graham, It was simply trying <strong>to</strong>determine what impact this religious leader is having on politicalleaders. Billy Graham has spent a lot of time with all the Presidents, sotheir question was "has Billy Graham had some type of impact?" <strong>The</strong>irconclusion printed in the Journal of Church <strong>an</strong>d State concludes, .. ..could Graham speak the word of truth - especially when that wordmay be critical or slashing -<strong>to</strong> the m<strong>an</strong> in the White House when he ison such friendly terms with him? On the basis of the evidence now208


available, the <strong>an</strong>swer must be no." What a person does on his free timeis said <strong>to</strong> be revealing. Christ did spend his time with sinners, but hecalled them <strong>to</strong> repent<strong>an</strong>ce. In all my study of Billy Graham, I haven’tseen <strong>an</strong>y of the Hollywood movie stars or politici<strong>an</strong>s ch<strong>an</strong>ge theirlifestyles by their association with Billy Graham. A number of"conversions" have been artificially created, <strong>an</strong>d given widespreadpublicity by the press. Pat Boone is the type of close friend of BillyGraham that perhaps typifies Billy Graham. He is someone wellreceivedby the public. Billy Graham has enjoyed using him inCrusades. Pat Boone continued playing in Playboy type night clubswhile he was singing at Billy Graham Crusades. Pat Boone who is projewish,may be jewish, because the State of Israel has given him somespecial positions. <strong>The</strong>re is nothing wrong with having ,,jewish blood", itjust explains some of his connections. <strong>The</strong> Nugen H<strong>an</strong>d B<strong>an</strong>k was a CIAoperation that laundered money, <strong>an</strong>d did m<strong>an</strong>y illegal activities. PatBoone was part of the Nugen H<strong>an</strong>d B<strong>an</strong>k sc<strong>an</strong>dal. Exactly how deephe was involved with the CIA’s dirty dealing is unclear. Pat Boone’sdaughter Debbie Boone made a hit out of the song ,,You Light Up MyLife", the words of the song were written by a wom<strong>an</strong> who worshippedLucifer <strong>an</strong>d wrote the song <strong>to</strong> Lucifer. Billy Graham has placed theemphasis in his Crusades on putting liberals, even Catholic priests, upon the platform with himself. When does Billy Graham ever spend timewith solid devout Christi<strong>an</strong>s? Every time Billy Graham went <strong>to</strong> Moscowhe tried <strong>to</strong> avoid the devout Christi<strong>an</strong>s of the unregistered churcheswho unwittingly tried unsuccessfully <strong>to</strong> meet with Graham. Instead, hewould meet with the heads of the Orthodox Church, which, since allthe ch<strong>an</strong>ges in Russia, are now proven <strong>to</strong> have been KGB agents--although most of us had suspected that all along from the type ofthings they said <strong>an</strong>d did. How naive c<strong>an</strong> Christi<strong>an</strong>s get? Do they reallythink that the <strong>Illuminati</strong> is going <strong>to</strong> let a legitimately powerful <strong>an</strong>ointedChristi<strong>an</strong> ev<strong>an</strong>gelist have regular access <strong>to</strong> their people? Don’tChristi<strong>an</strong>s realize that if he was a real threat--someone who might reallybring one of the <strong>to</strong>p elite <strong>to</strong> Christ that they would be assassinating him,not wining <strong>an</strong>d dining him.--"BEWARE OF FALSE PROPHETS, WHICH COME TO YOU IN SHEEPCLOThING, BUT INWARDLY THEY ARE RAVENING WOLVES." Mt. 7:15 --"BEHOLD, I AM SENDING YOU FORTH AS LAMBS AMONG WOLVES." Lk.10:3<strong>The</strong> Apostle Paul warned Christi<strong>an</strong> leaders, "Take heed therefore un<strong>to</strong>yourselves, <strong>an</strong>d <strong>to</strong> all the flock, over the which the Holy Spirit hathmade you overseers, <strong>to</strong> feed the church of God, which he hathpurchased with his own blood. For I know this, that after my departingshall grievous wolves enter in among you, not sparing the flock." Acts20:28-29 Bill Clin<strong>to</strong>n, some sena<strong>to</strong>rs, <strong>an</strong>d Billy Graham’s son Ned E.Graham invited the leaders of the Chinese house churches <strong>to</strong> a prayerbreakfast in Washing<strong>to</strong>n D.C. Three delegates from the Three Self209


Patriotic Movement (TSPM) <strong>an</strong>d 3 others from house churches wereinvited, Lin Xi<strong>an</strong>-Gao, Li Ti<strong>an</strong>-En, <strong>an</strong>d Yu<strong>an</strong> Xi<strong>an</strong>g-Chen. Rev. NedGraham visited these chinese in person <strong>to</strong> extend the U.S.government’s invitation. Graham <strong>to</strong>ld the chinese Christi<strong>an</strong>s that thegovernment would pick up the entire tab for the breakfast. In return theU.S. government w<strong>an</strong>ted the Christi<strong>an</strong>s <strong>to</strong> promise not <strong>to</strong> speak <strong>to</strong> theAmeric<strong>an</strong> press or <strong>to</strong> <strong>an</strong>y Americ<strong>an</strong>s comments that might hurt theimage of the Red Chinese government. <strong>The</strong> Chinese government hadpromised the Americ<strong>an</strong> government that they would guar<strong>an</strong>tee safeentry <strong>an</strong>d departure for these house church Christi<strong>an</strong> leaders. <strong>The</strong>nafter the meeting, they were invited <strong>to</strong> Billy Graham’s house. <strong>The</strong>Chinese christi<strong>an</strong>s declined the invitation by Graham. Chinese pas<strong>to</strong>rLin said, "If I went <strong>to</strong> the United States, I would tell the truth, not lies. Totell the truth would definitely be considered <strong>an</strong> act of damaging theimage of the Chinese government which would create a pretext forthe government <strong>to</strong> refuse my re-entry in<strong>to</strong> China. But my commissionfrom God is <strong>to</strong> serve Him faithfully in China only. <strong>The</strong>refore, I choose <strong>to</strong>remain in China rather th<strong>an</strong> <strong>to</strong> go abroad." Ned Graham (Billy’s son)tried <strong>to</strong> talk the Chinese in<strong>to</strong> coming, I know that you surely do loveyour enemies, why then c<strong>an</strong> you not compromise..." <strong>The</strong> pas<strong>to</strong>r<strong>an</strong>swered, "Yes, we c<strong>an</strong> forgive our enemies for persecuting oropposing us in their ignor<strong>an</strong>ce, but we c<strong>an</strong> never love the falseprophets or their heresy."’ Ned also said, "It is a glorious <strong>an</strong>d dignifiedthing <strong>to</strong> be invited by President Clin<strong>to</strong>n. M<strong>an</strong>y people seek it, butc<strong>an</strong>not obtain it. Fortunately, the chinese did not buy it. (This info <strong>an</strong>dquote comes from China <strong>The</strong> Un<strong>to</strong>ld S<strong>to</strong>ry by <strong>The</strong> Voice of the Martyrs,Inc., 1995. pp. 25-31)BUILDING AN IMAGE<strong>The</strong>re is <strong>an</strong>other area of Billy Graham that we will only <strong>to</strong>uch on. In oneof Fritz’s ‘92 newsletter, Billy Graham is quoted stating that he thoughtUFOs were <strong>an</strong>gels of God. On either J<strong>an</strong>. 28 or 29th (See Smyma, Feb.‘93, p.3), Billy Graham was interviewed on television by David Frost. BillyGraham said he believed people in heaven are sent by God <strong>to</strong> otherworlds <strong>to</strong> help them in redemption of life, This is edging somewhat close<strong>to</strong> what the Mormons believe, that "Christi<strong>an</strong>s" (that is Mormons) willeach receive their own pl<strong>an</strong>et <strong>to</strong> be god of. In <strong>an</strong>other show, Grahamsaid he w<strong>an</strong>ted <strong>to</strong> ev<strong>an</strong>gelize other pl<strong>an</strong>ets. Fritz has repeatedly tried<strong>to</strong> warn Christi<strong>an</strong>s of the m<strong>an</strong>y demonic d<strong>an</strong>gers associated with theentire UFO phenomena, <strong>an</strong>d the Sat<strong>an</strong>ic Hierarchy’s connection <strong>to</strong>UFOs. Billy Graham’s idea that UFOs are good <strong>an</strong>gels is a d<strong>an</strong>gerousidea. Billy Graham was given the contrived artificial image of being agreat <strong>an</strong>ti-Sat<strong>an</strong>ist. At the Chicago Crusade, 200 Sat<strong>an</strong>ists s<strong>to</strong>od up inthe crowds. Mayor Daily of Chicago then said from the st<strong>an</strong>d, Billy wehave 200 Sat<strong>an</strong>ists that w<strong>an</strong>t <strong>to</strong> disrupt your meeting shall I arrest them?What shall I do? And Billy said, No let’s sing a song. <strong>The</strong> crowd s<strong>an</strong>g a210


song <strong>an</strong>d the Sat<strong>an</strong>ists left the stadium on their own. <strong>The</strong> whole affairwas clearly staged <strong>an</strong>d hokey, but Christi<strong>an</strong>s are very naive aboutSat<strong>an</strong>ism <strong>an</strong>d Billy Graham. This further confirmed <strong>to</strong> them that BillyGraham was a great <strong>an</strong>ointed m<strong>an</strong> of God. First, hard core Sat<strong>an</strong>istsdon’t show their faces in public. Second, the Mayor of Chicago is notagainst the Sat<strong>an</strong>ists, he works with them, <strong>an</strong>d there are reasons <strong>to</strong>suspect he is one. Third, Sat<strong>an</strong>ists, who do show themselves in publiclike An<strong>to</strong>n LaVey, w<strong>an</strong>t good publicity <strong>an</strong>d would not carry outsomething like pretending <strong>to</strong> w<strong>an</strong>t <strong>to</strong> disrupt a Billy Graham crusade.Fourth, if a real threat had existed, Mayor Daily <strong>an</strong>d the police wouldn’tbe asking Billy Graham what <strong>to</strong> do, they would be taking care of theproblem. <strong>The</strong> police don’t need <strong>to</strong> ask for permission <strong>to</strong> take care oftroublemakers at the Crusade. Christi<strong>an</strong>s accepted this episode at itsface value. Those who did clearly show the common church goer’spoor underst<strong>an</strong>ding of those who seek <strong>to</strong> control <strong>an</strong>d destroy thechurch. How Billy Graham plays a key role in reprogramming Monarchslaves. Two different talkative Sat<strong>an</strong>ists <strong>to</strong>ld sources of mine about 2different coven meetings here in Portl<strong>an</strong>d in the Summer of 1993 wherethe covens discussed the benefits that the sat<strong>an</strong>ists were going <strong>to</strong> getfrom the Billy Graham Crusade. I know one of the benefits for thesat<strong>an</strong>ists was that Monarch programees who had become Christi<strong>an</strong>s<strong>an</strong>d had deactivated the effect of their mind-control programmingwere <strong>to</strong> be reprogrammed with Billy Graham’ s help. When BillyGraham arrived in <strong>to</strong>wn, someone on his Crusade staff had m<strong>an</strong>aged<strong>to</strong> find <strong>an</strong>d send out invitations <strong>to</strong> m<strong>an</strong>y of the survivors of Sat<strong>an</strong>ic ritualabuse (SRA) in Portl<strong>an</strong>d <strong>to</strong> come <strong>to</strong> a special meeting <strong>to</strong> personallymeet with Billy Graham. At this special meeting with SRA victims, BillyGraham personally beg<strong>an</strong> saying the buzz words <strong>to</strong> reactivate thesepeople’s programming, especially the Monarch survivors. (This comesfrom several witnesses.) For a number of years now, the Billy GrahamCrusade has been putting messages across the bot<strong>to</strong>m of televisionscreens that has activation codes for Monarch survivors. ThoseMonarch survivors who have become devote Christi<strong>an</strong>s <strong>to</strong> escape thenightmare of the Monarch mind-control are often not aware of thed<strong>an</strong>ger of watching the Billy Graham Crusade on television. Whenpeople are activated, special people are in the area <strong>an</strong>d they takethe Monarch survivors <strong>to</strong> what are called Near Death Trauma Centers.<strong>The</strong>se centers are used then <strong>to</strong> reprogram these poor people. <strong>The</strong>rewere five in this area, of which we located 2 <strong>an</strong>d forced them <strong>to</strong> movetheir sites. Religious fronts (denominations, individual churches <strong>an</strong>dcertain ministers) are used <strong>to</strong> hide criminal activity. Billy Graham, who isa programmed multiple himself, is exceptionally adept at m<strong>an</strong>aging hisMonarch kittens. <strong>The</strong> drug money laundered through his crusades iscarefully h<strong>an</strong>dled by m<strong>an</strong>y Monarch slaves working in shifts <strong>an</strong>d teams,so that the whole scheme c<strong>an</strong> not be uncovered by catching oneperson. Billy Graham runs big operations all over the world under thedisguise of ev<strong>an</strong>gelism. Another of the countless religious covers, that211


works with the Network’s/<strong>Illuminati</strong>’s drug activities involves the MormonBishop warehouses, which are used <strong>to</strong> s<strong>to</strong>re cocaine. Monarch slavesare involved with this. Different religious labels hide the same criminalNetwork. By the way, when giving the Patriarchal Blessing, the MormonPatriarch if he has a Monarch slave will use hypnosis <strong>an</strong>d triggers <strong>to</strong>convince the person what their future will be like. One c<strong>an</strong>’t say this ishappening in every case, but it is very widespread for the Patriarchwho give these blessings <strong>to</strong> be part of the Trauma-based mind-controloperations. Billy Graham also personally delivers messages <strong>to</strong> thePresidents for the <strong>Illuminati</strong>, such as when he arrived just prior <strong>to</strong> Bush’sdecision <strong>to</strong> launch Desert S<strong>to</strong>rm. Sometimes the papers even spell outthat Billy Graham serves as a message boy, for inst<strong>an</strong>ce, when hedelivered a message in April, 92 from the Pope <strong>to</strong> North Korea’sdicta<strong>to</strong>rKim.REFERENCES<strong>The</strong> following three books were very helpful <strong>to</strong> me in terms ofdocumenting Billy Graham’s activities, All three authors were interestedin documenting what Billy Graham is really all about. It may soundstr<strong>an</strong>ge that I say that, but sadly most of the books that <strong>to</strong>uch on BillyGraham like America’s Hour of Decision Including a Life S<strong>to</strong>ry of BillyGraham are simply part of the deception process of the enemy.However, if <strong>an</strong>yone w<strong>an</strong>ts <strong>to</strong> know more about Billy Graham thefollowing three books were very helpful for me <strong>to</strong> document BillyGraham’s activities.BILLY GRAHAM, A PARABLE OF AMERICAN RIGHTEOUSNESS by MarshallFrady.Marshall Frady was a writer for Life <strong>an</strong>d Newsweek. He has done <strong>an</strong>incredible amount of research in<strong>to</strong> Billy Graham’s life. He doesn’t <strong>to</strong>uchon the sinister side of Billy Graham, but by giving <strong>an</strong> honest reportabout Billy Graham he tears off the "Hollywood-type mask" so <strong>to</strong> speakthat everyone has seen <strong>an</strong>d believed. Marshall Frady simply w<strong>an</strong>ted <strong>to</strong>tell the whole s<strong>to</strong>ry of Billy Graham, good, bad or otherwise. He spentm<strong>an</strong>y hours interviewing Billy Graham <strong>an</strong>d m<strong>an</strong>y other people involvedin Billy Graham’s life. When this book was read by a devout Christi<strong>an</strong>, it<strong>to</strong>tally devastated this person’s media-built image of Billy Graham-- forinst<strong>an</strong>ce, items like Billy Graham going <strong>to</strong> dinner with a prostitute <strong>an</strong>dtaking her home, Billy Graham walking past his wife <strong>an</strong>d notrecognizing her, & Billy Graham’s New York Crusade refusing <strong>to</strong> allowstreet people in<strong>to</strong> the crusade because they were dirty. However,<strong>an</strong>other Christi<strong>an</strong> borrowed my copy of it, <strong>an</strong>d said after looking at thebook he didn’t see <strong>an</strong>ything wrong with Billy Graham in the book. But212


then he just read portions of the book. Still, unless one has spiritualdiscernment the book is probably not going <strong>to</strong> "blast a person out ofthe water," because it is a biography not <strong>an</strong> exposé. Until recently, thiswas the only really good biography that was available for Christi<strong>an</strong>s.M<strong>an</strong>y months before the Billy Graham 1993 Portl<strong>an</strong>d Crusade, theadvertisements for the crusade <strong>an</strong>d the crusade activity here inPortl<strong>an</strong>d beg<strong>an</strong>. Pilgrim Discount, which is one of the best Christi<strong>an</strong>books<strong>to</strong>res in the Portl<strong>an</strong>d area sells both used <strong>an</strong>d new Christi<strong>an</strong>books. <strong>The</strong>y had a used copy of Billy Graham a Parable of Americ<strong>an</strong>Righteousness. I watched for months <strong>to</strong> see if <strong>an</strong>y Christi<strong>an</strong>s would buythe book. Tens of thous<strong>an</strong>ds of Christi<strong>an</strong>s got involved in the BillyGraham Crusade in the Portl<strong>an</strong>d area, but none had the interest <strong>to</strong>read the only biography of Billy Graham available. Finally, just shortlybefore the Crusade, a teenage Christi<strong>an</strong> from Washing<strong>to</strong>n who hadbeen warned about Billy Graham <strong>an</strong>d who was trying <strong>to</strong> keep frombeing forced <strong>to</strong> attend, bought the book on a trip from Washing<strong>to</strong>n.This incident shows what Americ<strong>an</strong>s know--<strong>an</strong>d what they w<strong>an</strong>t <strong>to</strong>know about Billy Graham is shallow media-hype. A Christi<strong>an</strong> radio showhere had the author of Billy Graham A Prophet with Honor on <strong>to</strong>promote his book, which was done just when the Crusade was daysaway.A Startling Exposure- Billy Graham <strong>an</strong>d the Church of Rome by I<strong>an</strong> R. K.Paisley. This is perhaps the best book as far as actual documentation.<strong>The</strong> book is probably rare, <strong>an</strong>d not available. I<strong>an</strong> R.K. Paisley has madeit one of his projects of his life <strong>to</strong> expose Catholicism. Because BillyGraham works more with Catholics th<strong>an</strong> Protest<strong>an</strong>ts Paisley as aconcerned Christi<strong>an</strong> obviously found himself learning about BillyGraham. I<strong>an</strong> R.K. Paisley knows first h<strong>an</strong>d how powerful Billy Graham<strong>an</strong>d his establishment backers are. <strong>The</strong>y have a colossal publicationstrength <strong>to</strong> discredit <strong>an</strong>y critic of Billy Graham in whatever m<strong>an</strong>ner ittakes -- even if it me<strong>an</strong>s outright lies <strong>an</strong>d sl<strong>an</strong>der.Billy Graham Reformer? Politici<strong>an</strong>? Preacher? Prophet? AChronological Record Compiled from Public Sources By the ChurchLeague of America 195 1-1982. This book is from Edgar Bundy Ministries,It is a collection of articles that have appeared in the public media onBilly Graham over a period of 31 years. Billy Graham is condemned byhis own words <strong>an</strong>d his own actions. If people only <strong>to</strong>ok a look at whatBilly Graham is on public record saying it would startle them. Who is BillyGraham working for? Is he trying <strong>to</strong> build the Christi<strong>an</strong> churches up, or ishe trying <strong>to</strong> lay the foundation for a one-world religion? While somepeople may on first thought think that it is a great idea <strong>to</strong> have everyone belong <strong>to</strong> the same religious structure, they need <strong>to</strong> reflect on thed<strong>an</strong>gers inherent in one single religious body with all-encompassingpower. <strong>The</strong> groundwork for such a dicta<strong>to</strong>rial global religious body isalready partially constructed, <strong>an</strong>d is revealed in other writings of Fritz213


Springmeier. How m<strong>an</strong>y people know that in 1955 <strong>an</strong>d 1956 BillyGraham <strong>an</strong>nounced that he had a policy of sending people whocome forward at his crusades <strong>to</strong> the church of their choice whetherthat church or synagogue is Catholic, Protest<strong>an</strong>t or Jewish. Forinst<strong>an</strong>ce, the Protest<strong>an</strong>t Church Life quotes Billy Graham in its 29 Sept1956 issue, "Referring <strong>to</strong> the Billy Graham New York Crusade scheduledfor May, 1957, Dr. Graham said: ‘We’re coming <strong>to</strong> New York not <strong>to</strong>cle<strong>an</strong> it up, but <strong>to</strong> get people <strong>to</strong> dedicate themselves <strong>to</strong> God <strong>an</strong>d <strong>to</strong>send them on <strong>to</strong> their own churches--Catholic, Protest<strong>an</strong>t or Jewish."<strong>The</strong>re is one other book worth pointing out at this point, It was not asource book for my investigation, but I know the author, <strong>an</strong>d the bookcame out recently, so it is likely still available. <strong>The</strong> book is <strong>The</strong>Assimilation of Ev<strong>an</strong>gelist Billy Graham in<strong>to</strong> the Rom<strong>an</strong> Catholic Churchby Erwin Wilson. <strong>The</strong> address is Quebec Baptist Missions, Box 113,Comp<strong>to</strong>n, Quebec, C<strong>an</strong>ada, JOB iLO. It’s s nice that men like ErwinWilson are noticing Billy Graham’s love affair with the Catholic Church.He picked up on Billy Graham’s statement about the Pope, "Pope JohnPaul II has emerged as the greatest religious leader of the modernworld <strong>an</strong>d one of the greatest moral...leaders of this century." (<strong>The</strong>Saturday Evening Post, Feb, 1980.) However, several of these <strong>an</strong>ti-Catholic ministries are rejecting the bigger picture. <strong>The</strong>y have stronglyresisted learning about mind-control <strong>an</strong>d the exposure of theconspiracy in Be Wise As Serpents. Because of this, several of theseChristi<strong>an</strong> ministries <strong>to</strong> Catholics have lots of information about BillyGraham <strong>an</strong>d his close workings with the Catholic Church, but littlecomprehension of how the Catholic Church fits in<strong>to</strong> the bigger picture,<strong>an</strong>d how the New World Order is actually coming about. <strong>The</strong>re hasbeen widespread concern about Billy Graham among Christi<strong>an</strong>s.Because the controlled media don’t report these concerns, people arenot realizing the extent of the concerns which have been voiced. Evenbefore the co-authors got involved in exposing the <strong>Illuminati</strong> <strong>an</strong>d theircontrol over religion <strong>an</strong>d their pl<strong>an</strong>s for a New World Order, there hasbeen a long his<strong>to</strong>ry of concern by devout Christi<strong>an</strong>s over Billy Graham.<strong>The</strong>re has been a growing dissatisfaction among conservativeChristi<strong>an</strong>s <strong>to</strong>wards Billy Graham. <strong>The</strong> introduction <strong>to</strong> Erwin Wilson’s bookwhich is written by Dr. Bob Jones (Ch<strong>an</strong>cellor of Bob Jones University)provides <strong>an</strong> introduction <strong>to</strong> the concerns Christi<strong>an</strong>s have about them<strong>an</strong> who has been set up by the media <strong>an</strong>d the money elite <strong>to</strong> betheir greatest leader. We quote only a paragraph of what Dr. BobJones said, "Some of us who grieved over Graham’s first downwardsteps <strong>to</strong>ward compromise with apostasy <strong>an</strong>d biblical unbelief knewthat he was pursuing a direction from which there would be no turningback. While we grieved over him <strong>an</strong>d prayed for him, we had <strong>to</strong> warnmen against his ministry as we had warned Billy against his direction."<strong>The</strong> first area is doctrinal concerns by devout Christi<strong>an</strong>s, who havebeen deceived that Billy Graham thinks as they do. Christi<strong>an</strong>s usuallytake for gr<strong>an</strong>ted that Billy Graham is sound doctrinally. <strong>The</strong> following214


paragraph of beliefs of Billy Graham were documented in 1993 by FritzSpringmeier in his June ‘1993 newsletter, with its large documentpacket. Main line Christi<strong>an</strong>s would be shocked <strong>to</strong> find out what BillyGraham really believes <strong>an</strong>d is on public record as supporting. This willhelp show non-Christi<strong>an</strong>s, who read this, that Billy Graham is not reallythe Christi<strong>an</strong> he pretends <strong>to</strong> be. This is not <strong>to</strong> preach at non-Christi<strong>an</strong>readers, for some of the non-Christi<strong>an</strong> readers will agree with BillyGraham’s st<strong>an</strong>ds. <strong>The</strong>se views are written <strong>to</strong> show how a majorChristi<strong>an</strong> leader c<strong>an</strong> have a false public image that has survivedmainly because the full public record of Billy Graham’s st<strong>an</strong>ds are keeplow key. If we are big enough <strong>to</strong> look at the deceptions of ourpolitici<strong>an</strong>s <strong>an</strong>d statemen, we must be big enough <strong>to</strong> face thedeceptions of our ministers. Some of the areas that Billy Grahamdeviates from Scripture are as follows. He is on public record supportinghomosexuality, abortion, his disbelief in a literal hell, his support <strong>an</strong>dpractice of inf<strong>an</strong>t baptism <strong>to</strong> save children, his support for the Catholicchurch’s worship of Mary (yet he calls himself a Protest<strong>an</strong>t). He hasrepeatedly praised infidels <strong>an</strong>d apostates as great Christi<strong>an</strong>s. Heactively supported the Americ<strong>an</strong> government policy <strong>to</strong> fight theVietnam War. He would not challenge the idea that the Bible ismythology, when directly questioned. <strong>The</strong> deception doesn’t s<strong>to</strong>p withthe Protest<strong>an</strong>ts, Catholic supporters have been kept in the dark abouthis abortion views. <strong>The</strong> deception goes way beyond Protest<strong>an</strong>t,Catholic beliefs. As a programmed multiple who participates in Sat<strong>an</strong>icRitual, Billy Graham has deceived everyone. <strong>The</strong> second area isconcerns about his support for a One-World Church <strong>an</strong>d a One-World-Government. This stems from:1. Billy Graham ’s public endorsements of the World Council ofChurches <strong>an</strong>d the National Council of Churches.2. Billy Graham’s consistent attend<strong>an</strong>ce at the World Council ofChurches’ meetings.3. that Billy Graham has done more th<strong>an</strong> <strong>an</strong>yone in the world <strong>to</strong> bringabout the One-World-Harlot church, <strong>an</strong>d he has done more th<strong>an</strong><strong>an</strong>yone <strong>to</strong> unite all the Christi<strong>an</strong> groups in<strong>to</strong> one org<strong>an</strong>ization.4. Billy Graham’s support of the Pope <strong>an</strong>d the Catholic church which isthe largest Christi<strong>an</strong> religion <strong>an</strong>d one of the pillars of the New Age One-World religious body being set up.5. <strong>The</strong> support that the NCC <strong>an</strong>d WCC gives him.6. <strong>The</strong> support that the internationalists <strong>an</strong>d globalists give Billy Graham.Billy Graham was first asked <strong>to</strong> do his Portl<strong>an</strong>d Crusade in 1993 by theWCC/NCC representative in this area who is a homosexual, a newager, <strong>an</strong>d leader of the ecumenical movement.215


A third area is concern over the lack of depth that conversions at BillyGraham’s crusades have, Some of the details on this are:l. Only 2% of the people coming forward at a Crusade have neverbeen Christi<strong>an</strong>s <strong>an</strong>d are actually giving their life <strong>to</strong> Christ for the firsttime, <strong>an</strong>d of these 80% fall away.2. A great majority of people that come forward are sent <strong>to</strong> Catholic<strong>an</strong>d extremely liberal Churches, extremely few are sent <strong>to</strong> solid Biblebelieving churches., In the Catholic St<strong>an</strong>dard <strong>an</strong>d Times, Thursday, July16, 1992, p. 10, this Catholic paper reported that 1,900 Catholicsresponded <strong>to</strong> Billy Graham’s call <strong>to</strong> make decisions for Christ in thePhiladelphia Crusade <strong>an</strong>d were referred <strong>to</strong> about 250 parishes.3. People that come forward are sent even <strong>to</strong> Jewish synagogues <strong>an</strong>dNew Age churches.4. Converts are given the impression that Christ w<strong>an</strong>ts decisions for him,rather th<strong>an</strong> that Christ w<strong>an</strong>ts disciples.5. <strong>The</strong> people attending the crusades are almost all Christi<strong>an</strong>s, due <strong>to</strong>the high numbers of Christi<strong>an</strong> counselors <strong>an</strong>d the high number ofchurch people which are always intentionally bussed in, (Frady exposesthis, <strong>an</strong>d in 1992 a writer of the Williamette Week did a major s<strong>to</strong>ry forthe magazine detailing how she had searched the entire week at theBilly Graham Crusade for <strong>an</strong> unsaved person <strong>an</strong>d failed <strong>to</strong> find a singlenon-Christi<strong>an</strong>. <strong>The</strong>re were a few, but so few she didn’t find <strong>an</strong>y. Williamette Week, Oct. 1,1992).6. Most decisions at the crusades are for trivial things such as <strong>to</strong> s<strong>to</strong>psmoking.Interestingly, Christi<strong>an</strong>s with discernment spoke about how hurting thechurches were after the Billy Graham Crusade here in Portl<strong>an</strong>d. <strong>The</strong>yhad been made wild promises of success, they were fleeced of theirmoney, <strong>an</strong>d then given a lukewarm spiritual boost. <strong>The</strong>ir commentsreminded me of this warning <strong>to</strong> Billy Graham clear back in the 1950s as<strong>to</strong> how he was ruining the harvest field. Part of Sat<strong>an</strong>’s Pl<strong>an</strong>etarycontrol is through religious leaders. Christi<strong>an</strong>s have been conditioned <strong>to</strong>believe that Billy Graham is a great prophet of God by theestablishment media, who have <strong>to</strong>ld us for years that Billy Graham wasthe most respected m<strong>an</strong> in America, <strong>The</strong> percentages that thecontrolled Media have reported for Billy Graham’s popularity mayhave been inflated. <strong>The</strong>re are several studies that show how theestablishment uses polls dishonestly <strong>to</strong> m<strong>an</strong>ipulate thinking. <strong>The</strong>establishment media is able <strong>to</strong> create ideas so firmly within the mind ofthe public that it becomes almost impossible <strong>to</strong> deprogram people.What people see on T.V. becomes what you believe, <strong>The</strong> T.V. imagebecomes real. What actually happens at a crusade is far different from216


the media image. In Scotl<strong>an</strong>d for inst<strong>an</strong>ce, a poll was taken of churchmembership one month before the Billy Graham Scotl<strong>an</strong>d Crusade,<strong>an</strong>d two months after the Crusade. Church membership had actuallydeclined subst<strong>an</strong>tially. So after spending millions of the Christi<strong>an</strong>s’dollars, Billy Graham had not even helped the church attend<strong>an</strong>ce ofthe Scottish churches. When Billy Graham holds his crusades, thechurches in the area sponsor the crusade. In Pol<strong>an</strong>d, in a nation 95%catholic, the churches that sponsored his crusade in Warsaw wereCatholic churches <strong>an</strong>d when people went forward they were sent <strong>to</strong>Catholic churches. Yet, when the mass media report on Crusades, it ismade <strong>to</strong> sound like thous<strong>an</strong>ds of people became new Christi<strong>an</strong>s. M<strong>an</strong>yof the devout Christi<strong>an</strong>s that have supported Billy Graham haven’tthought through what is really going on at the crusades. <strong>The</strong>y havebeen so caught up with the media image that they are not able <strong>to</strong>critically comprehend that the crusades are really major spiritualdisasters. <strong>The</strong> book for counselors at the Billy Graham Crusade here inPortl<strong>an</strong>d specifically stated that only Billy Graham was allowed <strong>to</strong>proselytize, that the crusade counselors were forbidden <strong>to</strong> proselytize<strong>an</strong>yone at <strong>an</strong>y time during the crusade, or else they would lose theirCrusade badge as a counselor. (See these instructions in <strong>The</strong> BillyGraham Christi<strong>an</strong> Life & Witness Course, Minneapolis, MN: Billy GrahamEv<strong>an</strong>gelistic Association, p. 47, Instructions A.6.) But thous<strong>an</strong>ds of theChristi<strong>an</strong>s in Portl<strong>an</strong>d who became counselors for the ‘92 Crusadenever gave it a second thought that only Billy Graham was allowed <strong>to</strong>proselytize, because they trusted Billy Graham. Money that could havegone <strong>to</strong> helping victims of mind-control went <strong>to</strong>ward superficialdecisions for Christ. Money that could have gone <strong>to</strong> doing some seriousdamage <strong>to</strong> the evil, has gone for Madison avenue hype <strong>an</strong>d for bigshows, On <strong>to</strong>p of this, the large sums that are spent on the Billy GrahamCrusades serve as a cover for the Networks money laundering thatthey do through Graham’s Crusade using a series of Monarch slaves ina complex series of money drop offs. A fourth area is concern over hismethodology. A body l<strong>an</strong>guage expert says that Billy Graham’s talksare simply c<strong>an</strong>ned. <strong>The</strong>y are simply well-rehearsed c<strong>an</strong>ned-bodymovements <strong>an</strong>d not coming from the heart. His crusade uses Madison-Avenue sales techniques instead of traditional scriptural methods <strong>to</strong>get converts. Billy Graham crusades always spend great sums ofmoney for bill boards promoting Billy Graham <strong>an</strong>d bumper stickerspromoting Billy Graham, the end result is that Billy Graham’s name isusually promoted millions of times more often th<strong>an</strong> Jesus Christ.Christi<strong>an</strong>ity is consistently watered down <strong>an</strong>d identified with the world<strong>an</strong>d its ways. And a great deal of boasting is done about numbers ofdecisions instead of real me<strong>an</strong>ingful discipleship. A fifth area is concernover Billy Graham accept<strong>an</strong>ce of Communism. Although m<strong>an</strong>y peoplefeel communism is dead, this area is still relev<strong>an</strong>t. If you thinkcommunism is dead go live in North Korea, where Billy Graham went in1992 full of praise for North Korea. See Christi<strong>an</strong>ity Today, May 18, 1992,217


p.55. (By the way, Billy Graham & family have sat on the board ofChristi<strong>an</strong>ity Today, <strong>an</strong>d still control it, so it wouldn’t misquote him.) l. BillyGraham has repeatedly over international mass media claimed thatthere was no religious persecution under the communists, 2. BillyGraham has praised Mao-Tse-Tung’s principles, 3. Graham has praisedcommunist leaders on numerous occasions, 4. Dyed-in-the-woolcommunists who have been the ones giving orders <strong>to</strong> <strong>to</strong>rture Christi<strong>an</strong>sfor some reason feel comfortable spending time talking <strong>to</strong> BillyGraham. <strong>The</strong> actual heritage <strong>an</strong>d name of Billy Graham <strong>The</strong>re is aconnection between Marxism <strong>an</strong>d a group of Sat<strong>an</strong>ists called Fr<strong>an</strong>kists.One of the strongest sat<strong>an</strong>ic cults <strong>to</strong> take control over the Jewishpopulation was called Sabbati<strong>an</strong>ism. Jakob Fr<strong>an</strong>k assumed the role ofleader of this group, <strong>an</strong>d afterward this br<strong>an</strong>d of sat<strong>an</strong>ism was calledFr<strong>an</strong>kism. (Freud’s sexually-obsessed theories came from Fr<strong>an</strong>kism.)Fr<strong>an</strong>k taught his followers <strong>to</strong> convert <strong>to</strong> <strong>an</strong>other religion <strong>an</strong>d hidebehind that religion <strong>to</strong> practice their sat<strong>an</strong>ism. (One of several book onthe subject of Fr<strong>an</strong>kism is <strong>The</strong> Contemporary Faces of Sat<strong>an</strong> by Ratibor-Ray M. Jurjevich.) Billy Graham’s family when they originally came over<strong>to</strong> this nation were of the Fr<strong>an</strong>k family which is related <strong>to</strong> Jakob Fr<strong>an</strong>k.After coming over <strong>to</strong> this nation, they ch<strong>an</strong>ged their name <strong>to</strong> Grahamwhich is a Scottish name. Two groups of people who are overrepresented in the power structure over the last 200 years are Scots<strong>an</strong>d cabalistic sat<strong>an</strong>ic "jews." Obviously, not all Scotsmen nor jews areinvolved in the NWO. Several other researchers independentlydiscovered that Billy Graham’s heritage was the jewish Fr<strong>an</strong>k family.However, Fritz was beginning <strong>to</strong> suspect that there must be some kindof jewish blood in Billy Graham’s heritage, because of the all the thingshe would stumble upon. For inst<strong>an</strong>ce, the intimate connectionsGraham had with Jewish leaders <strong>an</strong>d Jewish Christi<strong>an</strong> ministries. And hisassur<strong>an</strong>ces <strong>to</strong> them that they are God’s chosen people, a specialgroup. Graham privately <strong>to</strong>ld them, that because they are a specialchosen group they don’t need <strong>to</strong> come <strong>to</strong> Christ. (Fritz discovered allthis by accident reading Jewish literature.) Further, the paper called"<strong>The</strong> C-9 Report For internal use only" states on page 11 that BillyGraham’s daughters have lived in Israel, <strong>an</strong>d that Billy Graham’s sonfought with the Israeli army in the Six-Day War. In the Be Wise AsSerpents book, chapter 2.1, "<strong>The</strong> Jewish author Gerald S. Strober in hisbook Americ<strong>an</strong> Jews Community in Crisis, p. 110 states that after aresolution in Feb. 1973 at Pittsburgh by the NCC failed <strong>to</strong> declare theNCC against converting the Jews, that Billy Graham <strong>an</strong>nounced thefollowing day a statement that God had a special place for the Jews<strong>an</strong>d rejected ,,coercive ev<strong>an</strong>gelistic efforts." Privately, Graham hasassured Jewish leaders he is against converting the Jews <strong>to</strong> Christi<strong>an</strong>ity.Strober also informs his readers (p. 111) that m<strong>an</strong>y Christi<strong>an</strong>org<strong>an</strong>izations that are "Jewish Missions" take their marching orders fromBilly Graham, This confirms numerous reports..." So Strober in effect issaying don’t worry Graham is with us, <strong>an</strong>d he controls most of the218


Christi<strong>an</strong> org<strong>an</strong>izations that are supposedly missions <strong>to</strong> ev<strong>an</strong>gelize us.Messi<strong>an</strong>ic Jewish groups are strongly pro-Billy Graham, Some of thesegroups have gained in size <strong>an</strong>d then str<strong>an</strong>gely gone back in<strong>to</strong> Judaism.That kind of thing has been happening here in Portl<strong>an</strong>d, not <strong>to</strong> mentionother localities. Now it is clearer why Jews coming forward at Crusadeshave often been <strong>an</strong>d are being referred by the Crusade people <strong>to</strong>Reformed Jewish synagogues. How Billy Graham is a 33° Mason. This is<strong>an</strong> import<strong>an</strong>t issue, however, even if Billy Graham were not a 33°Mason, there are m<strong>an</strong>y things that he is doing that should warnChristi<strong>an</strong>s not <strong>to</strong> support him. <strong>The</strong>re have been a number of people incasual conversation who have mentioned Billy Graham being a 33°Mason, for inst<strong>an</strong>ce a CIA leader, a NSA person who is against theNWO, <strong>an</strong>d various Masons. <strong>The</strong>se accidental revelations are what c<strong>an</strong>be considered casual evidence, in that it is accidently heard. Some ofthe people who have read Fritz’s Be Wise As Serpents book have beenexperiencing validation of what was written on Billy Graham by theirown casual contacts with people. <strong>The</strong>se types of encounters are veryme<strong>an</strong>ingful <strong>to</strong> the people who experience them, but their signific<strong>an</strong>ceis hard <strong>to</strong> communicate <strong>to</strong> others. Hopefully, readers of this, who aretruth seekers, will have their own casual-evidence-validationexperience. One piece of casual evidence came from a ShrinerClown. It turns out the only clowns who were chosen <strong>to</strong> perform for theBilly Graham 1993 Portl<strong>an</strong>d Crusade were Shriner Clowns. <strong>The</strong>re werenon-masonic clowns available, even some Christi<strong>an</strong> clowns, but themasons were the only ones Graham allowed <strong>to</strong> perform for him.Various people, who have worked in the system for the <strong>Illuminati</strong>, suchas <strong>an</strong> ex-witch who is now a Christi<strong>an</strong>, <strong>an</strong> ex-33° Mason now aChristi<strong>an</strong>, <strong>an</strong>d a CFR’s person also now a Christi<strong>an</strong>, all testify that BillyGraham is a 33* Freemason. A wom<strong>an</strong> <strong>an</strong>d a m<strong>an</strong> who are ex-sat<strong>an</strong>ists<strong>an</strong>d now Christi<strong>an</strong>s also have mentioned about Billy Graham’s masonicmembership. (One has <strong>to</strong> underst<strong>an</strong>d that there is a close workingrelationship between the Lodge <strong>an</strong>d the <strong>Illuminati</strong>.) To progress up ther<strong>an</strong>ks in Sat<strong>an</strong>ism, they will require you <strong>to</strong> go through Freemasonry.Freemasonry then teaches people about the symbology of the mysteryreligions. <strong>The</strong> lodges bring in female Monarch slaves for some of theirEgypti<strong>an</strong> sexual-magic rituals. If the reader were <strong>to</strong> get up in themorning <strong>an</strong>d your mother, sister, <strong>an</strong>d brother were in the kitchen <strong>an</strong>dsaid that your mother had just dr<strong>an</strong>k a cup of coffee, you would beable <strong>to</strong> tell from their faces if they were telling the truth, <strong>an</strong>d you wouldknow that your mother had dr<strong>an</strong>k a cup of coffee. This is the way it isfor us. We know these witnesses know the truth, <strong>an</strong>d we know they arenot making it up. But if people don’t believe that, then they need <strong>to</strong> goscrounge up their own witnesses, <strong>an</strong>d risk their own hide in doing thecontacting. <strong>The</strong> material we presented here is not frivolous work. Aspearls of value, we hope that this research is not taken <strong>an</strong>d allowed <strong>to</strong>become pearls given <strong>to</strong> swine. Because Billy Graham is such a keyperson for the <strong>Illuminati</strong> <strong>an</strong>d the Sat<strong>an</strong>ic pl<strong>an</strong> <strong>to</strong> bring in the Anti-Christ219


<strong>an</strong>d the One-World-Religion, key parts of Graham’s life have beenintentionally shrouded, When he joined the masonic lodge c. 1948,they intentionally kept his membership more secret th<strong>an</strong> others. Why?<strong>The</strong>y are secret about their membership in general, but even more so ifthe person is a key Illuminatus <strong>an</strong>d a big key <strong>to</strong> their religious control,This is why they have kept the membership of Charles T. Russell, founderof the Watch<strong>to</strong>wer Society quiet. This is why they keep thememberships of the Mormon prophets secret, It has been a consistentpattern by the Masonic Lodge <strong>to</strong> keep these key people’smembership very quiet. It would be much easier if we had amembership certificate, but for people who don’t w<strong>an</strong>t <strong>to</strong> believe noamount of evidence would suffice. In terms of a paper trail we havethe following:· Billy Graham’s books consistently refer <strong>to</strong> basically oniy Masons.· Billy Graham endorsed the Masonic DeMolay program for youth asGod’s work. This endorsement by Billy Graham is in a Masonic book thatis used <strong>to</strong> educate people about "the craft" (that me<strong>an</strong>s Freemasonry).That book is <strong>The</strong> Clergy <strong>an</strong>d the Craft <strong>an</strong>d it says that the people whoare quoted in it are Masons. (See Haggard, Forrest D. Tr<strong>an</strong>sactionsMissouri Lodge of Research, Vol. No. 27, <strong>The</strong> Clergy <strong>an</strong>d the Craft, p.127. where Graham endorses the Masonic youth program. In terms ofwitnesses who have put what they have witnessed in writing we havethefollowing:· Jim Shaw, ex-33° Mason -- the highest r<strong>an</strong>king Freemason <strong>to</strong> defect <strong>to</strong>Christi<strong>an</strong>ity, writes about Billy Graham being at his 33° initiationceremony. Hunting<strong>to</strong>n House refused <strong>to</strong> print his book co-authoredwith Tom McKenney unless they <strong>to</strong>ok out Billy Graham’s name on pg.104, <strong>an</strong>d substituted a general description. (See <strong>The</strong> Deadly Deception,p. 104-105.) Only Freemasons are allowed <strong>to</strong> attend these initiations.(See <strong>The</strong> New Age, the official org<strong>an</strong> of <strong>The</strong> Supreme Council 33°.Wash., D.C., Oc<strong>to</strong>ber 1961, p. 30.) Some Christi<strong>an</strong>s have tried everything in their mind <strong>to</strong> get around Jim Shaw’s testimony. And theMasonic Lodge are now claiming that he wasn’t a 33° Freemason.<strong>The</strong>re is no doubt that he was a 33° Mason. What we are seeing is howimport<strong>an</strong>t it is <strong>to</strong> the <strong>Illuminati</strong> <strong>to</strong> keep Billy Graham’s membershipsecret. Originally, Dr. Morey who wrote a book on Freemasonry <strong>to</strong>ld meover the phone that Billy Graham was a 33° Freemason <strong>an</strong>d that hehad held his membership file in his h<strong>an</strong>d in the library of the House ofthe Temple, which is where the Supreme Council of the 33° has theirheadquarters. However, now he denies it <strong>an</strong>d says that he only was<strong>to</strong>ld by the librari<strong>an</strong>s that the file existed, but that he didn’t examinethe membership file. He wrote a letter <strong>to</strong> Christi<strong>an</strong> News <strong>to</strong> the edi<strong>to</strong>rwhich was printed. At least, his letter <strong>to</strong> the edi<strong>to</strong>r of Christi<strong>an</strong> News saysthat the Scottish Rite have a Billy Graham file. Fritz st<strong>an</strong>ds by his originalstatements about what Dr. Morey said, even though he has gone backon his original s<strong>to</strong>ry <strong>an</strong>d is getting people <strong>to</strong> think Fritz somehow220


invented what he <strong>to</strong>ld me. <strong>The</strong>re are a great m<strong>an</strong>y things that aresuspicious about Dr. Morey. His book on Freemasonry claims thatFreemasonry started out a Christi<strong>an</strong> org<strong>an</strong>ization. His book was printedby a comp<strong>an</strong>y that uses the Knights Templar logo as their comp<strong>an</strong>ylogo, <strong>an</strong>d whose comp<strong>an</strong>y head is most likely a Freemason. If it lookslike a duck, quacks like a duck, <strong>an</strong>d walks like a duck--what do youthink it is? Long before I actually knew Billy Graham was a 33°Freemason, I felt that was the "most likely" expl<strong>an</strong>ation for what I waslearning of him. What caused me <strong>to</strong> think that way? Everything aboutthe m<strong>an</strong>, just shouted Freemason. <strong>The</strong> way he talks, who he has asfriends, etc. etc. This article is not capable of going in<strong>to</strong> depth aboutsmall nu<strong>an</strong>ces <strong>an</strong>d details, but suffice it <strong>to</strong> say that the Masons knowhow <strong>to</strong> broadcast <strong>to</strong> other Masons that they are a Mason. It should bepointed out some of the key people for Billy Graham’s staff have beenFreemasons. Let’s look at a few of the key people helping Billy Graham:William M. Watson -- DIRECTOR OF THE BILLY GRAHAM EVANGELISTICASSOCIATION, he is a Freemason, <strong>an</strong>d he is also President ofOccidental Petroleum Corporation. Chairm<strong>an</strong> of Occidental wasArm<strong>an</strong>d Hammer. Watson is also a member of the developmentcouncil of the Masonic run Baylor University. Baylor University hasparticipated in the mind-control, (See also the expose of BaylorUniversity in Be Wise As Serpents.) He also was a member of theadvisory council <strong>to</strong> the Southwestern Baptist <strong>The</strong>ological Seminary in Ft.Worth which had at least three Freemasons on its board of trustees,<strong>an</strong>d likely more.David M. McConnell -- DIRECTOR OF THE BILLY GRAHAM EVANGELISTICASSOCIATION, he is a Freemason, He was also U.S. ambassador <strong>to</strong> theUnited Nations (1968-69), business associate with Illuminatus CharlesGambrell, in Belk S<strong>to</strong>res of Charlotte, North Carolina.Arthur Lee Malory -- CO-CHAIRMAN of the BILLY GRAHAM CRUSADEAdvisory Committee for the 1973 St. Louis Crusade -- 32° Freemason,deacon in the So. Bapt. Church.Who are some of the primary ministers that had worked with 33°Freemason Billy Graham over the years?Billy Graham has helped set up other 33° Masons in ministry. BillyGraham has placed his stamp of approval on almost every well-knownapostate Christi<strong>an</strong> out there. When Billy Graham had a crusade inJap<strong>an</strong>, the Jap<strong>an</strong>ese minister that he had up on the platform was awell-known extremely liberal Christi<strong>an</strong>. A conservative jap<strong>an</strong>ese wasshocked. Billy Graham is also endorsing m<strong>an</strong>y of the books, <strong>an</strong>dministries of these apostates. Some of the three biggest ministers in theprotest<strong>an</strong>t world, Robert Schuller, Norm<strong>an</strong> Vincent Peale, <strong>an</strong>d OralRoberts are all 33° Masonic brothers of 33° Freemason Billy Graham.(See Roberts, Oral. Miracle of Seed Faith, p.9.) Billy Graham has helpedeach of these brothers with their ministries. Robert Schuller taught221


principles of church growth <strong>to</strong> Unity School in K<strong>an</strong>sas City. A Christi<strong>an</strong>,who used <strong>to</strong> be on staff there, said that Robert Schuller was fully awarethat Luciferi<strong>an</strong> Initiations were going on at the school <strong>an</strong>d that hedidn’t care. Robert Schuller, 33° Freemason, was helped in<strong>to</strong> ministry byBilly Graham. Schuller also participates in the Monarch program <strong>an</strong>d isalso sexually serviced by Monarch slaves. Norm<strong>an</strong> Vincent Peale’s formof Christi<strong>an</strong>ity called positive thinking is actually only white witchcraftwith different names. Peale simply is a "Christi<strong>an</strong>" witch. Norm<strong>an</strong>Vincent Peale, 33° Freemason, his church receive the bulk of peoplewho came forward at the NY Crusade. Norm<strong>an</strong> Vincent Peale is a 6°Illuminatus (Pilgrim Society), <strong>an</strong>d a 33° Freemason. In the magazinePsychic Magazine of S<strong>an</strong> Fr<strong>an</strong>cisco Peale says of occultist Kreskin, Allhe’s doing is dramatizing what I’ve been preaching in my writing foryears. Norm<strong>an</strong> Vincent Peale controls the approx. $200 millionPresbyteri<strong>an</strong> Minister’s Fund. He celebrated the 25th <strong>an</strong>niversary of theUnited Nations. He was the keynote speaker at the birthday of the lateMormon prophet Spencer W. Kimball (a secret Mason). Peale praisedKimball as a true prophet of God, <strong>an</strong>d a great m<strong>an</strong> of God. Pealepractices witchcraft, <strong>an</strong>d palms it off on unsuspecting Christi<strong>an</strong>s underdifferent terminology. <strong>The</strong> false unity movement which is so strong<strong>to</strong>day, w<strong>an</strong>ts <strong>to</strong> unite the devout Christi<strong>an</strong> with the likes of Norm<strong>an</strong>Vincent Peale. Peale is a good friend of Billy Graham, <strong>an</strong>d Billy Grahamreferred the largest number of new converts of the NY Billy GrahamCrusade <strong>to</strong> Peale’s church. Oral Roberts, 33° Freemason, helped in<strong>to</strong>ministry by his masonic brother Billy Graham. Oral Roberts has beenseen by witnesses participating in SRA <strong>an</strong>d <strong>Mind</strong>-control. Oral RobertsUniversity <strong>an</strong>d the charismatic movement is <strong>an</strong>other import<strong>an</strong>t religiousfront. <strong>The</strong> Charismatic movement has been infiltrated by multiples sinceday-one. <strong>The</strong> his<strong>to</strong>ry of the infiltration is extensive. Oral Roberts hadcherokee blood, According <strong>to</strong> some things that Oral Roberts has said,some Christi<strong>an</strong>s think that he received his healing powers from <strong>an</strong> oldIndi<strong>an</strong> who healed him through indi<strong>an</strong> sham<strong>an</strong>ism when Oral wasyoung. At times, Oral does use the same methods that spirit mediumsuse <strong>to</strong> heal with. According <strong>to</strong> slaves who have been deprogrammed,they were in sat<strong>an</strong>ic rituals with Oral Roberts. Christi<strong>an</strong> ministers, whohave participated in his ministry are saying that they have seen massiveswindle in his healing ministry. His university is being used as aprogramming center. His basketball team at one time had Monarchslaves playing on it. We do not know if they still do. Under the prayer<strong>to</strong>wer is one of the programming sites. Billy Graham, a h<strong>an</strong>dler himself,helped launch Oral Roberts University, <strong>an</strong>d is a friend of Oral Roberts.From the <strong>Illuminati</strong>’s point of view Tulsa is the Guardi<strong>an</strong> City of Apollo.<strong>The</strong> City of Faith is <strong>to</strong> be the center for healing from AEsculapius, ademon related <strong>to</strong> Apollo. While portraying themselves as Christi<strong>an</strong>s,infiltra<strong>to</strong>rs within the charismatic movement are carrying out sat<strong>an</strong>icrituals <strong>to</strong> get demonic healing powers. Tulsa is one of, if the main centerfor the campaign <strong>to</strong> infiltrate Christi<strong>an</strong>ity via the222


Charismatic/Pentecostal movement with programmed multiples. G.Bromiey Oxnam, 33° Freemason, was head of the FCC churches,supportive friend of Billy Graham, G. Bromley Oxnam has a long his<strong>to</strong>ry<strong>to</strong> him of working for the elite, interested readers c<strong>an</strong> pick up his s<strong>to</strong>ry inBe Wise As Serpents in the chapter that goes in<strong>to</strong> the details about howthe Christi<strong>an</strong> churches were org<strong>an</strong>ized by the FCC <strong>an</strong>d WCC for the<strong>Illuminati</strong>. <strong>The</strong> NWO is infiltrating the churches via the Earth StewardshipMovement. An attempt was made at Rio de J<strong>an</strong>eiro <strong>to</strong> get <strong>an</strong> EarthCharter but there wasn’t enough time, their were lots of N.O.G.delegates <strong>an</strong>d just in general lots of people <strong>to</strong> coordinate (4,000attended). Another Earth Summit was promised, but instead theydecided at the end of Sept/Oct of ’95 <strong>to</strong> have a State of the WorldForum <strong>to</strong> be held by/sponsored by the Gorbachev Foundation at thePresidio, CA. <strong>The</strong> ex-head of the KGB, Gorbachev is nowheadquartered in the Presideo, a major mind-control programmingsite. Christi<strong>an</strong> basher Ted Turner was the chairm<strong>an</strong> of the conference.<strong>The</strong> cost was $5,000 per person <strong>an</strong>d the invitations went out <strong>to</strong> onlyselect people. <strong>The</strong>re were 100 h<strong>an</strong>dpicked politici<strong>an</strong>s who receivedinvitations, along with Billy Graham <strong>an</strong>d Mother Teresa. This wascoordinated with the 50th <strong>an</strong>niversary of the UN which was beingcelebrated all over the world.FLEECING THE SHEEP<strong>The</strong> charismatic movement claims <strong>to</strong> have the Holy Spirit in a specialway, however, some seem <strong>to</strong> be lacking in all discernment that theHoly Spirit would give. <strong>The</strong>re are several books exposing the big nameCharismatic ministers. One is written by <strong>an</strong> ex-charismatic Assembly ofGod minister. He shows a picture in his book of <strong>an</strong> Assembly of God flierpromoting the "Testimony of J. Edgar Hoover." Yes, the Assembly ofGod promoted the ,,testimony" of J. Edgar Hoover, while he was known<strong>to</strong> be a power hungry individual who practiced homosexuality, It wasthis type of hype that caused this minister <strong>to</strong> grow disillusioned with thecharismatic movement’s so called spirituality. Recently, the spiritualdiscernment of Billy Graham <strong>an</strong>d m<strong>an</strong>y other big time ministries wasexposed when these big Christi<strong>an</strong> ministries were conned out of $550million dollars. Billy Graham introduced John G. Bennett <strong>to</strong> thous<strong>an</strong>ds ofpeople at a recent Billy Graham Crusade in Philadelphia in 1992. JohnBennett gave his testimony at the crusade. Because Billy Graham, JohnTemple<strong>to</strong>n, <strong>an</strong>d Laur<strong>an</strong>ce Rockefeller were apparently supportive ofJohn G. Bennett, big time Christi<strong>an</strong> ministries "trusted" him. John <strong>to</strong>ldm<strong>an</strong>y of the big Christi<strong>an</strong> ministries that if they gave him millions ofdollars, for every million he received he would give them two millionback. M<strong>an</strong>y of the big Christi<strong>an</strong> ministries gave Bennett money--in facthe collected $550 million (which he r<strong>an</strong> off with) from ministries such asPat Robertson’s, Bill Bright’s, Chuck Colson’s, Luis Palau’s, Westminster223


<strong>The</strong>ological Seminary, Whea<strong>to</strong>n College, the Salvation Army <strong>an</strong>d m<strong>an</strong>yothers. <strong>The</strong> reader may have heard of this New Era Foundation scam.That’s what it was. Bennett <strong>to</strong>ld these "Christi<strong>an</strong>" leaders "Give New Eraone million dollars <strong>an</strong>d we’ll give you back two million." <strong>The</strong> donationsof hard earned money by m<strong>an</strong>y innocent Christi<strong>an</strong> believers were lost,However, the Christi<strong>an</strong> believers are partially responsible because thechurch has refused <strong>to</strong> cle<strong>an</strong> house of wolves that set in their pulpits. Forinst<strong>an</strong>ce, when Billy Graham came <strong>to</strong> the Portl<strong>an</strong>d area all the variousdenominations from the most liberal <strong>to</strong> the most conservativesupported him. Only about a dozen churches did not get involved <strong>an</strong>donly one church actively tried <strong>to</strong> expose Billy Graham--EVEN THOUGHTHERE HAS BEEN A MASS OF DOCUMENTATION EXPOSING BILLYGRAHAM AS A WOLF FOR 30 YEARS. When the church refuses <strong>to</strong> followGod’s Word <strong>an</strong>d supports these men--then they must take some of theblame when these men give their millions of hard earned dollars away<strong>to</strong> a con artist.INADEQUATE REACTIONSWhen people have been warned about Billy Graham, one of thecommon responses is <strong>to</strong> for people <strong>to</strong> call up the Billy Graham crusadestaff, If I ask a biologist a question about biology I c<strong>an</strong> expect <strong>to</strong> get acredible <strong>an</strong>swer, If I ask a mother about her son I c<strong>an</strong> expect <strong>to</strong> get acredible <strong>an</strong>swer. But how in the world c<strong>an</strong> someone call up the BillyGraham Crusade staff <strong>an</strong>d expect <strong>to</strong> get a credible <strong>an</strong>swer <strong>to</strong> thequestion "Is Billy Graham a Mason?" <strong>The</strong> person that <strong>an</strong>swers the phoneis likely a secretary, someone who knows Billy Graham no more th<strong>an</strong>the j<strong>an</strong>i<strong>to</strong>r. What does that person know about the Freemasons?Because the Freemasons are a secret society, in general, there areonly two basic categories of people--people involved withFreemasonry, <strong>an</strong>d they certainly know what’s going on in it but theyhave taken blood oaths on penalty of death not <strong>to</strong> talk about it, <strong>an</strong>dthose who aren’t involved with Freemasonry <strong>an</strong>d don’t know <strong>an</strong>ythingabout it. <strong>The</strong>re are only a few people who are not masons, who areinformed about the Masons. <strong>The</strong> <strong>an</strong>swer of some secretary over thephone <strong>to</strong> the question, Is Billy Graham a Freemason?" is of little value,because the secretary or other staff member has not had theopportunity <strong>to</strong> get reliable information. This is from the st<strong>an</strong>dpoint ofgetting a reliable witness, calling some secretary or staff member issimply not a credible response <strong>to</strong> all the documentation. No courtwould view a secretary of a large org<strong>an</strong>ization as <strong>an</strong> expert witnessqualified <strong>to</strong> settle such a dispute. <strong>The</strong> second catch is that suchwitnesses are not reasonably unbiased. It is expected that BillyGraham’s staff would front for him <strong>an</strong>y questions that could expose him<strong>to</strong> bad publicity. This last comment is not speculation. <strong>The</strong>re is proofthat Billy Graham’s staff has consistently lied over the years <strong>to</strong> preventnegative publicity about Billy Graham. When Richard Nixon met with224


his political buddies <strong>to</strong> decide who <strong>to</strong> have run with him, the person heasked first in the smoke-filled room was Billy Graham, I have read theaccount of this is more th<strong>an</strong> one place, but I will quote Marshall Frady’sdescription of when Billy Graham was asked who he thought should runwith Nixon as Nixon’s vice-presidential running mate. Billy Grahamchose 33° Masonic brother (then only 32°) Mark Hatfield. Here is Frady’sdescription. "His assimilation in<strong>to</strong> the Nixon presidency had alreadybeen well underway, in fact, at that convention in Miami when, afterNixon’s nomination, Graham wound up sitting in Nixon’s penthousesuite among the smoggy late-night deliberations over Nixon’s vicepresidentialselection: Graham himself, whatever initial uncertainty hemight have felt <strong>to</strong> find himself in such a political locker-room session,soon pitched in<strong>to</strong> the proceedings with his own effusiverecommendation of Mark Hatfield: "He’s a great Christi<strong>an</strong> leader. He’salmost a clergym<strong>an</strong>. He’s been <strong>an</strong> educa<strong>to</strong>r, <strong>an</strong>d he’s taken a moreliberal st<strong>an</strong>d on most issues th<strong>an</strong> you, <strong>an</strong>d I think the ticket needs thatkind of bal<strong>an</strong>ce." In 1992, Mark Hatfield, along with Prince HallFreemason Jessie Jackson both were on television in July of last yeardefending Billy Graham’s actions. Mark Hatfield, according <strong>to</strong> adeprogrammed slave has been a user of Monarch sexual slaves. NY’sUnion Seminary is controlled <strong>an</strong>d funded by the Rockefellers. Presiden<strong>to</strong>f Union Seminary was Dr. Henry V<strong>an</strong> Dusen. Billy Graham made him aprominent person in his crusade <strong>an</strong>d said he was a "classic example" ofa mass ev<strong>an</strong>gelism conversion, If that is a good example of Graham’sconversions, we Christi<strong>an</strong>s should shudder. It is no coincidence that theSouthern Baptists of which Billy Graham is a member, is controlled bythe Freemasons. Brook Hays, Pres, of the So. Bapt. Convention was ahigh r<strong>an</strong>king Freemason as well as part of the CFR. None of the So.Bapt. Convention’s Presidents have opposed Freemasonry. Pres. BillClin<strong>to</strong>n, a slave h<strong>an</strong>dler, is a member of the Emm<strong>an</strong>uel Baptist Churchwhich is a Southern Baptist Church in Little Rock, Ark. <strong>The</strong> late Bill Moyerswho promoted the Mystery Religions was a Southern Baptist. Moyerswent <strong>to</strong> the SW Baptist <strong>The</strong>ological Seminary, the same school run byone of Billy Graham’s staff direc<strong>to</strong>rs. John Buch<strong>an</strong><strong>an</strong> is <strong>an</strong>otherSouthern Baptist. John Buch<strong>an</strong><strong>an</strong> went <strong>to</strong> a So. Bapt. Seminary, <strong>an</strong>dthen worked as a front m<strong>an</strong> for People for the Americ<strong>an</strong> Way startedby Jewish Norm<strong>an</strong> Lear, <strong>an</strong> <strong>an</strong>ti-Christi<strong>an</strong>. People might be shocked <strong>to</strong>learn of some of the New Age teachings <strong>an</strong>d New Age teachers thathave been allowed in<strong>to</strong> the Southern Baptist churches. <strong>The</strong> SouthernBaptist youth program is based on Masonic ideas <strong>an</strong>d is very masonicin its ritual.SUMMARY<strong>The</strong> reader is th<strong>an</strong>ked for wading through a lot of difficult material. <strong>The</strong>reader c<strong>an</strong> see why Billy Graham may well be the greatest deceptionthat has ever been successfully pulled off. But as Abraham Lincoln said,225


"You c<strong>an</strong> fool some of the people all of the time, <strong>an</strong>d all of the peoplesome of the time, but not all of the people all of the time." Ever sincethe early 1950s, there have been Christi<strong>an</strong>s exposing Billy Graham, Butthe control of the Christi<strong>an</strong> media <strong>an</strong>d the Christi<strong>an</strong> seminaries is farmore extensive th<strong>an</strong> most people realize. <strong>The</strong> Be Wise As Serpents bookdiagrams out how the Christi<strong>an</strong> religious denominations are beingcontrolled, <strong>an</strong>d how the Masons <strong>an</strong>d <strong>Illuminati</strong>-connectedadministra<strong>to</strong>rs <strong>an</strong>d trustees have control of most of the Seminaries. BillyGraham without a doubt works directly for the Sat<strong>an</strong>ic hierarchy. But arational <strong>an</strong>d fair appraisal of what the m<strong>an</strong> is, <strong>an</strong>d what damage hehas done <strong>to</strong> Christi<strong>an</strong>ity will probably not be given much of a ch<strong>an</strong>ce.Nobody, no matter who they are is going <strong>to</strong> fool Christ. <strong>The</strong>re will be areal evaluation done on judgment day <strong>an</strong>d when that day comesChrist said,“MANY WILL SAY TO ME IN THAT DAY, LORD, LORD, HAVE WE NOTPROPHESIED IN YOUR NAME, CAST OUT DEMONS IN YOUR NAME, ANDDONE MANY WONDERS IN YOUR NAME? And then I will declare <strong>to</strong>them, I never knew you; depart from Me, you who practicelawlessness!” Mt 7:22-23THE TOP SECRET AMISH FRONT (& HUTTERITES)It will probably assist the reader <strong>to</strong> know that both of the authors havefirst h<strong>an</strong>d experience with the following information about the Amish.Fritz was Amish for several years as a Amish church member in churchdistricts in K<strong>an</strong>sas, Missouri, <strong>an</strong>d Illinois. He has also visited numerousAmish settlements in the U.S. & C<strong>an</strong>ada, <strong>an</strong>d lived/worked with thehorse <strong>an</strong>d buggy Old Order Mennonites (not <strong>to</strong> be confused with theOld Order Amish Mennonites) in Ontario C<strong>an</strong>ada for half a year. He hasa m<strong>an</strong>uscript of a book that he wrote about the Old Order AmishMennonites, <strong>an</strong>d has gone so far as <strong>to</strong> inquire with publishers likeNational Geographic if they would like some of his material. He has alsoattended a variety of Mennonite churches, including Church of God inChrist, Menn. (Holdem<strong>an</strong>’s), Charismatic Mennonite, Conserv. Menn.<strong>an</strong>d Beachy Amish churches across the U.S. He also knows first-h<strong>an</strong>dthat <strong>Illuminati</strong> slaves, some of who are programmers, have beeninfiltrated by the <strong>Illuminati</strong> in<strong>to</strong> Mennonite churches. Perhaps what maycome across as the str<strong>an</strong>gest religious front, <strong>an</strong>d it is certainly one ofthe biggest secrets of the intelligence agencies is their use of the OldOrder Amish Mennonites as a front. <strong>The</strong> Amish are the most pacifisticpeople, so the <strong>Illuminati</strong>/intelligence agencies have placed some oftheir best programmed assassins behind the front of being Amish. <strong>The</strong>front is real--they are Amish, well, m<strong>an</strong>y of them, some were <strong>Illuminati</strong>children switched at birth <strong>to</strong> give the programmers better bloodlines <strong>to</strong>226


work from. Some Amish women in cult families have let the <strong>Illuminati</strong>impregnate them with stronger bloodlines. M<strong>an</strong>y Nazi bloodlines werehidden after WW II under the Mennonite/Amish cover. <strong>The</strong> Mennonites<strong>an</strong>d some of the more progressive Amish adopt m<strong>an</strong>y children. <strong>The</strong>Amish in Missouri (James<strong>to</strong>wn), K<strong>an</strong>sas (south of Hutchison), <strong>an</strong>dOklahoma (Guthrie, OK), Kentucky, Ohio (Holmes Co., OH), <strong>an</strong>dPennsylv<strong>an</strong>ia (L<strong>an</strong>caste, PA) have been involved in selling their children<strong>to</strong> the <strong>Illuminati</strong>. When the <strong>Illuminati</strong> would buy a child they would sendin one of their own midwives <strong>to</strong> help with the birth <strong>an</strong>d retrieve thechild. Generally, the Amish would sell their children when they realizedthey were going <strong>to</strong> have twins. One would be given <strong>to</strong> the cult, <strong>an</strong>done would be kept by the Amish parents. Because these children areborn outside of the system, <strong>an</strong>d have no birth certificates, they madeexcellent children <strong>to</strong> use in porn. <strong>The</strong>y also c<strong>an</strong> be used as expendablechildren <strong>to</strong> use in porn. <strong>The</strong>y were often blond haired <strong>an</strong>d blue eyed.<strong>The</strong> Amish women were not allowed <strong>to</strong> use birth control, it wasforbidden by the church, <strong>an</strong>d they were not allowed <strong>to</strong> have <strong>an</strong>abortion, <strong>an</strong>d it was their duty <strong>to</strong> have sex with their husb<strong>an</strong>ds. It ispossible that some parents sold their children just <strong>to</strong> get out of theresponsibility of having <strong>an</strong>other child. <strong>The</strong> Amish farms in K<strong>an</strong>sas <strong>an</strong>dOklahoma <strong>an</strong>d in the border states like Missouri <strong>an</strong>d Kentucky aremech<strong>an</strong>ized with trac<strong>to</strong>rs, <strong>an</strong>d they don’t need the large families thatthe Amish in other places need. Due <strong>to</strong> the strong legalism thatpervades their church, some have tried <strong>to</strong> get around the tight spotthat the rules place them in by selling a few unnoticed children.However, there is <strong>an</strong> active witchcraft practicing occult group withinthe Amish which is like a box within a box within a box. It is very secret.<strong>The</strong>re are m<strong>an</strong>y ways of describing what is going on with the Amish.Let’s describe quickly in half a page (it could be a book in itself) what adeep look at the spiritual dynamics of what is going on with theircommunities. <strong>The</strong> rise of Sat<strong>an</strong>ism within their r<strong>an</strong>ks is simply a naturaloutgrowth of the spiritual dynamics. <strong>The</strong>re were two trees in theGarden of Eden, one was the Tree of Life <strong>an</strong>d one was the Tree of theKnowledge of Good <strong>an</strong>d Evil. <strong>The</strong> first me<strong>an</strong>t being tr<strong>an</strong>sformed by theCrea<strong>to</strong>r who made them in<strong>to</strong> the image of the Spirit of God <strong>an</strong>dreceiving spiritual life, but the other tree was perform<strong>an</strong>ce. <strong>The</strong> Tree ofthe Knowledge of Good <strong>an</strong>d Evil (religion) includes both Law (good)<strong>an</strong>d license (evil). As soon as a group gets legalistic, they fall fromgrace. <strong>The</strong>y then separate themselves by their perform<strong>an</strong>ce <strong>an</strong>d say ineffect “look at what we’re doing” which is a form of pride. God resiststhe proud, so they through a number of spiritual dynamics losefellowship with God. This me<strong>an</strong>s they must cling <strong>to</strong> their legalistictraditions even more, because a live relationship with God is gone.(Bible Studies are forbidden by most Amish church districts, <strong>an</strong>d theydon’t get new revelation from God, they still are working off of therevelations of the 1600s, when they were traumatized <strong>an</strong>d quit growing.When they split from the rest of the Mennonites, they were like a child227


alter split which never grows up.) When a group gets legalism, they alsoget license, because the two grow from the same tree. Every Amishcommunity has two large groups--the legalistic ones <strong>an</strong>d the licenseones. <strong>The</strong> young people are even split this way. In L<strong>an</strong>caster County,the Groffies” is the nickname of the large license group of youngpeople who fornicate <strong>an</strong>d drink. <strong>The</strong>re is a smaller group of legalisticconservative young people <strong>to</strong>o, who are at the other end of thespectrum. <strong>The</strong>re is one group (g<strong>an</strong>g might be a more appropriatename) called Jamborees who are <strong>an</strong> unruly <strong>an</strong>d destructive collectionof <strong>an</strong>gry wild young people. <strong>The</strong> Bishops in L<strong>an</strong>caster Co. meet twiceyearly <strong>to</strong> keep this large settlement of opposites <strong>to</strong>gether. A lot ofcompromise <strong>an</strong>d looking the other way is done for the sake of peace.“Peace” at <strong>an</strong>y price is the name of the game. Even before a prayer issaid in church the minister calls out, “Wenn mer eenich sin, wella merbete.” This tr<strong>an</strong>slates, “If we are in one accord, then let us pray.”Because peace is so import<strong>an</strong>t, they are out of bal<strong>an</strong>ce in getting it.<strong>The</strong>y place peace far above truth. In order <strong>to</strong> have the appear<strong>an</strong>cethat everything is well, secrecy pervades everything like the air onebreathes. Because their whole culture is secret, children raised in itaren’t aware of how strong it is, it is simply a way of life, like it is for the<strong>Illuminati</strong>. Legalism values conformity. Conformity perfers roboticobedience over underst<strong>an</strong>ding. In fact, one Bishop <strong>to</strong>ld Fritz, co-authorof this book, “We don’t w<strong>an</strong>t our young folks <strong>to</strong> underst<strong>an</strong>d why theydo what they do, we only w<strong>an</strong>t obedience. Underst<strong>an</strong>ding isd<strong>an</strong>gerous.” Does the reader begin <strong>to</strong> see how the Amish make boththe perfect setting for Monarch <strong>Mind</strong>-Control, <strong>an</strong>d the perfect cover.<strong>The</strong> Amish are a very secret group. During their early his<strong>to</strong>ry theysuffered severe persecution. <strong>The</strong>ir culture teaches them <strong>to</strong> suffer insilence, which <strong>to</strong>day helps their Sat<strong>an</strong>ic abusers infiltrate their culture. Inthe past in Europe, when the Catholic or Protest<strong>an</strong>t church caughtthem they were <strong>to</strong>rtured <strong>to</strong> death. <strong>The</strong>y were hunted as <strong>an</strong>imals <strong>an</strong>dtreated worse th<strong>an</strong> <strong>an</strong>imals when caught. This was the trauma, thatSat<strong>an</strong> did <strong>to</strong> them, <strong>an</strong>d the lie that was then h<strong>an</strong>ded them was that ifthey would cloister themselves secretly in the New World away fromeveryone else, they would be safe. <strong>The</strong> Amish have shut out fromoutsiders the true flavor of their culture <strong>an</strong>d beliefs. <strong>The</strong>y are silentabout their problems. <strong>The</strong>y tell themselves that outsiders couldn’tpossibly be interested in their affairs. <strong>The</strong> Amish themselves are verydivided from each other. <strong>The</strong> divisions between Amish groups is calledZwietract. Zwietract c<strong>an</strong> cover <strong>an</strong>ything from a mild aloofness <strong>to</strong> a fullfledged shunning (called the Meidung). <strong>The</strong> Amish aren’t in generalqualified <strong>to</strong> tell outsiders much in detail about their own heritage, orreligion because they are so isolated from the other Amish settlements<strong>an</strong>d have been raised in such <strong>an</strong> <strong>an</strong>ti-intellectual culture. Most Amishare content <strong>to</strong> know that the way they do things “was always done thisway” <strong>an</strong>d that their elders <strong>an</strong>d forefathers were gifted men whoexamined things very closely. <strong>The</strong>ir social norms are not intellectually228


questioned by most Amish, but then Americ<strong>an</strong> society has been veryisolationist in the world <strong>an</strong>d few Americ<strong>an</strong>s question their society &norms. Americ<strong>an</strong>s even rebel in the prescribed fashion, whatever theelite tell society is the “in” “cool” “hot” stylish way <strong>to</strong> do things. <strong>The</strong>Amish are similar <strong>to</strong> the Mid-east culture in that they have a veryindirect approach <strong>to</strong> saying things. <strong>The</strong>y do not consider it proper <strong>to</strong>speak with a negative connotation about <strong>an</strong>ybody. <strong>The</strong>y alsoinstinctively give pat <strong>an</strong>swers <strong>to</strong> outsiders <strong>to</strong> blunt questions. <strong>The</strong>se pat<strong>an</strong>swers border on being rigid, prejudiced, <strong>an</strong>d simple. <strong>The</strong>y serve thepurpose <strong>to</strong> deter curiosity. <strong>The</strong> early Amish leaders were ex-Catholicpriests, but most of the people were peas<strong>an</strong>ts who had little formalschooling, had little Bible knowledge, <strong>an</strong>d came from southernGerm<strong>an</strong>y <strong>an</strong>d the Rheinl<strong>an</strong>d where witchcraft was practiced by thecommon people. <strong>The</strong> Spirit of Witchcraft never left the Amish. It hasalways been with them. <strong>The</strong> folk witchcraft is called Brauche, <strong>an</strong>d thecraft is kept secret by old men who pass the inc<strong>an</strong>tations down insecret. When the Amish moved <strong>to</strong> Pennsylv<strong>an</strong>ia, they moved in nextdoor <strong>to</strong> Rosicruci<strong>an</strong>s. When the Rosicruci<strong>an</strong> settlements fell apart theyjoined the Mennonites, thus bringing their hermetic magic along withthem. Somewhere within the Amish were some families that were undercover for the Jesuits, <strong>an</strong>d were sent in as spies long ago because theywere corrupt. <strong>The</strong>se families have been generational sat<strong>an</strong>ists, whichpractice pedophilia <strong>an</strong>d other crimes in the safety of their isolation.<strong>The</strong>y were placed within the Amish <strong>to</strong> help the Catholic church destroythe Amish. In Europe that happened under Hitler, when all the OldOrder Amish were arrested in 1938 <strong>an</strong>d wiped out of Germ<strong>an</strong>y. Prior <strong>to</strong>WW II, the Nazi’s part of the <strong>Illuminati</strong> sent over a number ofprogrammed multiples which set up <strong>an</strong> unnamed cult in upstate NewYork. This cult was <strong>to</strong> help Hitler take power in the U.S. when the Nazi’swon the war. <strong>The</strong>y did not win the war, but 60 years later this Sat<strong>an</strong>iccult still operates. Now 2nd <strong>an</strong>d 3rd generation programmed multiplesare now part of this cult. Somehow this <strong>Illuminati</strong> mission coordinateswith the <strong>Illuminati</strong> project <strong>to</strong> get Hitler’s bloodline hidden among theAmish, although the authors are aware of Hitler’s descend<strong>an</strong>ts being inOregon, <strong>an</strong>d Washing<strong>to</strong>n as well as Pennsylv<strong>an</strong>ia. One of them inPortl<strong>an</strong>d, Oregon works for the Federal government. L<strong>an</strong>caster Countyis sometimes referred <strong>to</strong> as the mother church. This was one of theoriginal counties which the Amish settled in when they first came over<strong>to</strong> the New World. William Penn invited Rosicruci<strong>an</strong>s, Amish, <strong>an</strong>d otherdissident religious groups <strong>to</strong> Pennsylv<strong>an</strong>ia. <strong>The</strong> Sat<strong>an</strong>ic covens inL<strong>an</strong>caster County, PA consist of members from Amish, Mennonite <strong>an</strong>dBrethren churches. <strong>The</strong>y are not simply all Amish.L<strong>an</strong>caster County’s Amish will fellowship will all the approximately 200other settlements of Amish around the country. What is a peculiarphenomena, is that m<strong>an</strong>y churches that do not fellowship with one<strong>an</strong>other, will still maintain “communion” with L<strong>an</strong>caster out of respect229


for place in Amish his<strong>to</strong>ry. However, L<strong>an</strong>caster County has some of themost immoral reprobate Amish that there could be. All this is hiddenvery well from the thous<strong>an</strong>ds of <strong>to</strong>urists, due <strong>to</strong> the secrecy of theAmish. <strong>The</strong> Amish do not often pay taxes, do not pay social securitybecause they are exempt from the Social Security program, <strong>an</strong>d sendm<strong>an</strong>y of their children <strong>to</strong> Amish schools. <strong>The</strong>y are truly a separatesociety which maintains rigid secrecy. If you were the New World Orderor the <strong>Illuminati</strong> where would you w<strong>an</strong>t <strong>to</strong> hide your assassins? <strong>The</strong>safest place is inside of the most pacifist group in the world, the Amish.Monarch mind-controlled slaves are being created out of Amishchildren. During W.W. II, Amish conscientious objec<strong>to</strong>rs were forced bythe government <strong>to</strong> do alternate public service in lieu of military service.This was known as Civili<strong>an</strong> Public Service. Amish & Mennoniteconscientious objec<strong>to</strong>rs were placed in<strong>to</strong> Mental Hospitals <strong>to</strong> help.<strong>The</strong>y served at Allen<strong>to</strong>wn State Hosp., Allen<strong>to</strong>wn, PA; C<strong>an</strong><strong>to</strong>nsville StateHosp., C<strong>an</strong><strong>to</strong>nsville, MD; Clevel<strong>an</strong>d State Hosp., Clevel<strong>an</strong>d, OH;Delaware State Hosp., Parnhurst, DL; Denver State Hosp., Denver, CO;Greys<strong>to</strong>ne Park State Hosp., Greys<strong>to</strong>ne Park, NJ; Harrisburg State Hosp.,Harrisburg, PA; Hudson River State Hosp., Poughkeepsie, NY; KalamazooState Hosp., Kalamazoo, MI; Lima State Hosp., Lima, OH; LivermoreState VA Hosp., Livermore, CA; Macedonia State Hosp., Macedonia,OH; Marlboro State Hosp., Marlboro, NJ; Mt. Pleas<strong>an</strong>t State Hosp., Mt.Pleas<strong>an</strong>t, 10; Norris<strong>to</strong>wn State Hosp., Norris<strong>to</strong>wn, PA; Provo State Hosp.,Provo, UT; Rhode Is. State Hosp., Howard, RI; Roseburg VA State Hosp.,Roseburg, OR; Staun<strong>to</strong>n State Hosp., Staun<strong>to</strong>n, VA; Tiffin State Hosp.,Tiffin, OH; Wernersville State Hosp., Wernersville, PA; Ypsil<strong>an</strong>ti StateHosp., Ypsil<strong>an</strong>ti, MI. <strong>The</strong> author, Fritz, believes that the complete s<strong>to</strong>ry ofhow the <strong>Illuminati</strong> got a secret foothold in<strong>to</strong> the Amish community liesin what happened in mental hospitals <strong>to</strong> the <strong>an</strong>xious-<strong>to</strong>-please,compli<strong>an</strong>t, innocent Amish boys, who were assigned <strong>to</strong> these mentalhospitals. M<strong>an</strong>y people do not realize that during W.W. I, severalMennonite/Hutterite conscientious objec<strong>to</strong>rs were <strong>to</strong>rtured <strong>to</strong> death byour government. Not a pretty picture when you find out how sadisticour government was willing <strong>to</strong> be <strong>to</strong>ward its own citizens. Not only didthe Amish boys go <strong>to</strong> lots of mental hospitals during W.W. II, but all ofthe religious groups that participated in the conscientious objec<strong>to</strong>rservice (called Civili<strong>an</strong> Public Service) contributed boys <strong>to</strong> the Office ofScientific Research & Development (part of the Army), which was stillusing these boys for experiments until Dec. 31, 1946. What kinds of“experiments” were the Amish boys, who were offered up as guineapigs, subjected <strong>to</strong> by the OSRD? We now know that some of theseexperiments were very d<strong>an</strong>gerous <strong>to</strong> their hum<strong>an</strong> guinea pigs. 1-0classification was the Selective Service Board’s Conscientious Objec<strong>to</strong>rclassification. During the Vietnam War, Amish young men went in<strong>to</strong> I-Wservice (conscientious objec<strong>to</strong>r service) at mental <strong>an</strong>d regularhospitals. <strong>The</strong>ir I-W service was for two years. Some of these young menwere programmed at these hospitals. One Amish boy after he got230


home from I-W service committed suicide. <strong>The</strong> secret sat<strong>an</strong>ic familieswithin various Amish settlements also offered up their children. Thisstarted a large scale super secret operation by the CIA/Intelligenceagencies <strong>to</strong> set up Delta teams within the Amish. Who would eversuspect <strong>an</strong> Amishm<strong>an</strong>? <strong>The</strong>y have been expendable assassins for theCIA for years. <strong>The</strong>se young men are strong farmboys. <strong>The</strong>y have noconnection between themselves <strong>an</strong>d the outside world where theysecretly carry out their missions, <strong>an</strong>d if they die, there is no birth record,<strong>an</strong>d perhaps a dozen other siblings for their family <strong>to</strong> continue on with.During the Vietnam War, the Military’s Selective Service did thingsdifferently th<strong>an</strong> in W.W.II. Any hospital or mental hospital which appliedfor approval could get I-W (conscientious objec<strong>to</strong>r) boys. <strong>The</strong> Amishput <strong>to</strong>gether a Steering Committee <strong>to</strong> work with the government <strong>an</strong>dthe I-W service. In the I-W Steering Committee meetings (<strong>an</strong>d theauthor Fritz attended one) it was stated by Committee members “<strong>The</strong>boys do not come back the same [from the hospitals]” <strong>an</strong>d that the I-W service in the mental hospitals was “proving unsatisfac<strong>to</strong>ry <strong>an</strong>dharmful.” Some of the mental hospitals which received Amish boysinclude Columbia Missouri’s State Mental Hospital & Hospital complex,Colorado Psychopathic Hospital in Denver, all of the hospitals that gotW.W. III-Ws (as listed above), Central State Hospital, Indi<strong>an</strong>polis, IND,New Jersey State Hospital, Greys<strong>to</strong>ne Park, NJ, Philadelphia StateHospital, Philadelphia, PA, plus numerous others. At <strong>an</strong>y one time, therewere hundreds of Amish boys in I-W service. It is suspected that m<strong>an</strong>y ofthese hospitals were involved in mind-control, <strong>an</strong>d it is known that theColumbia, MO complex of hospitals <strong>an</strong>d Mid-Missouri State MentalHospital, 803 Stadium Dr., Columbia, Missouri <strong>an</strong>d the Veteren’s Hospitalacross the street were involved in mind-control for the CIA. A mentalhospital had <strong>to</strong> apply <strong>to</strong> the Selective Service Board for approval <strong>to</strong> getI-W workers. <strong>The</strong>n their personnel departments would hire the I-W boysfor positions such as nursing attendents. One State Mental Hospitaladministra<strong>to</strong>r <strong>to</strong>ld Fritz that the whole I-W thing was “prettyconfidential.” <strong>The</strong> Amish Steering Committee worked with theMennonite Central Committee (MCC) which in turn worked for somequasi-religious group which is privately funded called <strong>The</strong> NationalService Board of Religious Objec<strong>to</strong>rs (NSBRO) still active in Washing<strong>to</strong>n,D.C. <strong>The</strong> Amish were slow <strong>to</strong> act, but by the end of the Vietnam War,they had m<strong>an</strong>aged <strong>to</strong> get some of their farms approved for I-W service<strong>an</strong>d in 1971, the Steering Committee was able <strong>to</strong> <strong>an</strong>nounce that 70Amish I-W boys were working on Amish farms in 8 states, rather th<strong>an</strong> inhospitals. However, this late ch<strong>an</strong>ge was <strong>to</strong>o late <strong>to</strong> protect theirsettlements from infiltration from sophisticated <strong>Illuminati</strong> mind-control.231


HOW IT IS DONEA programmed Amish boy will likely be contacted by what is called a“CUT-OUT’. This is the secret contact person who maintains contactbetween the H<strong>an</strong>dler <strong>an</strong>d the Amish Delta. CUT-OUT’s c<strong>an</strong> either begiven several slaves (a BLOCK CUT-OUT) or in other cases only know theup-line h<strong>an</strong>dler <strong>an</strong>d down-line person (a CHAIN CUT-OUT). If furthersecrecy is needed by the h<strong>an</strong>dler, he c<strong>an</strong> use ‘‘sterile telephones’’which the <strong>Illuminati</strong>/CIA have which c<strong>an</strong>not be traced, even by thetelephone comp<strong>an</strong>ies. When <strong>an</strong> Amish boy is activated <strong>an</strong>d sent ou<strong>to</strong>n <strong>an</strong> assassination mission for the <strong>Illuminati</strong>/Intelligence agencies he isa professional at what he has been trained <strong>an</strong>d programmed <strong>to</strong> do.Amish boys, programmed <strong>to</strong> be assassins, are used in what theirh<strong>an</strong>dlers call “wet ops”. This intelligence lingo me<strong>an</strong>s that hum<strong>an</strong> bloodwill run. Wet ops, also called black ops are debriefed by a briefingteam. <strong>The</strong> Amish multiple will have <strong>to</strong> give a detailed account of thefinished operation, once under hypnosis, once with a polygraph, <strong>an</strong>donce under the drug scopolamine (a truth serum). And when thedebriefing team, which includes a <strong>Mind</strong>-control Programmer, is satisfiedthat all of the inconsistencies between the different accounts havebeen ironed out, then the Programmer will block out all memory <strong>an</strong>dguilt of the operation. <strong>The</strong> h<strong>an</strong>dler may write a “blind memor<strong>an</strong>dum”which has no file no. or letterhead or name. <strong>The</strong>n Amish boy’sassassination alters will be praised for having done a great service <strong>to</strong>hum<strong>an</strong>ity <strong>an</strong>d <strong>to</strong> his country. <strong>The</strong> Amish boy c<strong>an</strong> now be sent home <strong>to</strong>milk cows <strong>an</strong>d work on his labor-intensive <strong>to</strong>bacco farm without <strong>an</strong>ynagging guilt or horrible memories surfacing <strong>to</strong> trouble him (at least intheory). Trained assassins do have memory flashes, as all Monarchslaves have, but they are only bits <strong>an</strong>d pieces. People also do notrealize that the Amish live in m<strong>an</strong>y more states th<strong>an</strong> Pennsylv<strong>an</strong>ia. <strong>The</strong>ymove all over the United States. If <strong>an</strong> Amishm<strong>an</strong> was travelling on a CIAmission there are numerous of excuses that could be made for why hecould be on the move. <strong>The</strong>re are far more Amish young people awayfrom the Amish settlements th<strong>an</strong> people realize because they dress likethe world. M<strong>an</strong>y young people leave with the knowledge that theyc<strong>an</strong> go back years later <strong>an</strong>d be accepted back in<strong>to</strong> their community.What are some of the mitigating fac<strong>to</strong>rs in all of this? <strong>The</strong> Amish do theirown butchering. <strong>The</strong>y are down-<strong>to</strong>-earth people who are not afraid ofblood. Essentially all Amish children grow up helping with butchering,<strong>an</strong>d seeing life <strong>an</strong>d death played out everyday on their farms. <strong>The</strong>Amish do not embalm their dead, <strong>an</strong>d have their own cemeteries. <strong>The</strong>Sat<strong>an</strong>ic cult within the Amish c<strong>an</strong> reopen the graves <strong>an</strong>d carry outsat<strong>an</strong>ic ceremonies afterward. <strong>The</strong>ir cemeteries are small almosthidden sites with markers hidden in grass. Some of these graveyardsblend in with their rural settings. Elmo, Joseph, <strong>an</strong>d Vic<strong>to</strong>r S<strong>to</strong>ll are someprominent Amishmen. Joseph <strong>an</strong>d Elmo have travelled a great dealesp. <strong>to</strong> Central America. Joseph wrote a book on Child Training which232


teaches parents how <strong>to</strong> break a child’s will. This author is supportive ofdiscipline <strong>an</strong>d respect. <strong>The</strong> book is pointed out, only because it is apaper trail <strong>to</strong> show that the Amish discipline <strong>an</strong>d the <strong>Illuminati</strong>’sdiscipline at times c<strong>an</strong> be similar. <strong>The</strong> only person who might see <strong>an</strong>Amish boy being disciplined (since they are a rural people) would bethe immediate family or <strong>an</strong> occassional amish guest. An Amishm<strong>an</strong>seeing a father carrying out the Monarch steps <strong>to</strong> build dissociationwould likely not see <strong>an</strong>ything wrong. If the guest did see somethingwrong (i.e. <strong>to</strong>o strict or me<strong>an</strong>), the objections would be kept very lowkey. For sure, no non-Amish would ever hear about it. <strong>The</strong> <strong>Illuminati</strong>families like the Dukes <strong>an</strong>d Reynolds control <strong>to</strong>bacco production <strong>an</strong>dcigarette m<strong>an</strong>ufacturing. In order <strong>to</strong> keep their lifestyle in Pennsylv<strong>an</strong>ia,the Amish have had <strong>to</strong> grow <strong>to</strong>bacco for the <strong>Illuminati</strong> controlledcomp<strong>an</strong>ies. This author c<strong>an</strong> only speculate what economic leveragethat has given the <strong>Illuminati</strong> over the Pennsylv<strong>an</strong>ia Amish.HIDING A MAJOR PROGRAMMING CENTER<strong>The</strong> blue prints of the Portl<strong>an</strong>d Mormon Temple at Lake Oswego, ORwhich sets over a secret underground programming site, werech<strong>an</strong>ged overnight after they were looked at. <strong>The</strong> original blueprintsshowed that Lake Oswego had allowed a building code <strong>to</strong> broken.<strong>The</strong> blueprint was ch<strong>an</strong>ged, showing that Lake Oswego’s cityemployees were working along with the Mormon church <strong>an</strong>d the CIA<strong>to</strong> keep everything running smooth with their high tech secretunderground programming center, which has the front of being sacredtemple grounds. Three separate Monarch slaves independentlydescribed this underground installation, <strong>an</strong>d there are other evidencesof it <strong>to</strong>o. In order <strong>to</strong> gain access <strong>to</strong> the underground programmingtunnels, a person has <strong>to</strong> have <strong>to</strong> place their palm on the wall, where adisguised instrument identifies a person’s h<strong>an</strong>d. <strong>The</strong> entr<strong>an</strong>ces aredisguised using the most sophisticated techniques. One is from theTemple Laundry Building south of the temple <strong>an</strong>d <strong>an</strong>other is from thehotel south of the temple. This hotel has a str<strong>an</strong>ge hard-<strong>to</strong>-findentr<strong>an</strong>ce <strong>to</strong> its parking lot, almost as if they haven’t w<strong>an</strong>ted uninvitedguests. Tunnels are widely used at the other various programming sites.EXTERNAL & INTERNAL DECEPTIONS<strong>The</strong>re are some s<strong>to</strong>ck <strong>to</strong>ols of deception that are used both externallyon the world <strong>an</strong>d internally on the slave when their system isprogrammed <strong>an</strong>d structured. Later in the book we will cover thestructuring. Since this chapter covers deceptions, we will discuss them233


here, but the reader needs <strong>to</strong> bear in mind, they will be employed inthe structuring/programming phases of the slave’s life. <strong>The</strong>y aredeflection, blinds, slides, Hegeli<strong>an</strong> dialectics, <strong>an</strong>d deniability.a. Deflection is taking something good <strong>an</strong>d deflecting its purpose. Thisis a s<strong>to</strong>ck <strong>to</strong>ol. For inst<strong>an</strong>ce, loyalty <strong>an</strong>d obedience c<strong>an</strong> be goodvirtuous things if given <strong>to</strong> the correct authority. But deflected <strong>to</strong> thefalse sadistic authority, they are disastrous. <strong>The</strong>y use Deflection <strong>to</strong>redirect the power of truth which is opposed <strong>to</strong> them. Healthy foods,benevolence, ecology, love, accept<strong>an</strong>ce, etc. are all part of theCrea<strong>to</strong>r’s Christi<strong>an</strong> walk. <strong>The</strong>se truths <strong>an</strong>d other are deflected from theiroriginal purpose of glorifying the Crea<strong>to</strong>r <strong>to</strong> glorifying their ownprograms. Rather th<strong>an</strong> publicly opposing Christi<strong>an</strong>ity, they rename theirown movements Christi<strong>an</strong>, <strong>an</strong>d then proceed <strong>to</strong> do very little for Christ,<strong>an</strong>d everything for Lucifer. <strong>The</strong>y are even deflecting worship of JesusChrist on<strong>to</strong> worship of a demon named Jesus.b. <strong>The</strong> next externally <strong>an</strong>d internally used s<strong>to</strong>ck <strong>to</strong>ol is called “Blinds”-these are deliberate deceptions placed within their own writings <strong>to</strong>confuse the uninitiated. H.P.B. gives a good description of the use ofthese, so do Masonic writers like Albert Pike. H.P.B. writing describes theuse of Blinds in <strong>The</strong> Secret Doctrine, Vol. 5 Adyar edition, p. 435. Blindsare used in CIA documents, they are incorporated in<strong>to</strong> the scripts thatthe alters receive. For inst<strong>an</strong>ce, the in fetro Moon Child ceremonies arenot revealed <strong>to</strong> the non-hierarchy alters, but they are <strong>to</strong>ld that theMoon Children have <strong>to</strong> do with the cage <strong>to</strong>rtures.c. Slides are truth that has been warped just slightly <strong>to</strong> take <strong>an</strong>investigative person in<strong>to</strong> a dead end. An example of a slide, is that theNew World Order is sat<strong>an</strong>ic, but that only Nazis <strong>an</strong>d stupid people thinkthat Jews are involved. This is a slide, because then the Rothschilds whohide behind their jewishness, c<strong>an</strong> not be mentioned as suspects withoutpeople yelling “Antisemitism.” In reality exposing these abusers hasnothing <strong>to</strong> do with Anti-semitism, it’s simply that all abusers no matterwhat good front they have, need <strong>to</strong> be correctly identified asd<strong>an</strong>gerous. Another example, <strong>an</strong> alter who pretends <strong>to</strong> be helpful isplaced in the system who says that the door <strong>to</strong> get <strong>to</strong> a castle internallyis the fifth door on the right in such <strong>an</strong>d such hall. <strong>The</strong> <strong>an</strong>swer is correct,but the door must be opened using the left side, rather th<strong>an</strong> the rightside where the door knob is located. Because the <strong>an</strong>swer doesn’t p<strong>an</strong>out then the idea that the door is the correct door is discarded, <strong>an</strong>dthe alter’s knowledge is suspect. Lots of psychiatrists are writing papersabout MPD with slides. <strong>The</strong>y give some truth, <strong>an</strong>d then they givepeople a path <strong>to</strong> go down that will dead end them from ever findingthe truth.234


d. <strong>The</strong>y use Hegeli<strong>an</strong> Dialectics. This dialectic process doesn’t happenon its own so it often has <strong>to</strong> be forced in<strong>to</strong> happening. <strong>The</strong> idea is thateach idea (“ism”) called a “thesis”, like say Capitalism, naturally bydefinition has <strong>an</strong> opposite, <strong>an</strong> “<strong>an</strong>tithesis”. In Capitalism the <strong>an</strong>tithesis isCommunism. <strong>The</strong> conflict between the two produces a synthesis. Bycontrolling both ends of the conflict, one controls the end product, thesynthesis. More th<strong>an</strong> not, the One-World-Power c<strong>an</strong> be seen workingbehind both sides of m<strong>an</strong>y conflicts. Indeed, the Secret Societies havebeen his<strong>to</strong>rically shown <strong>to</strong> be behind all the revolutions <strong>an</strong>d wars inModern Europe since the Americ<strong>an</strong> Revolution. In religious conflict,both sides are often being m<strong>an</strong>ipulated. Some of the various groupsopenly admit their strategy is designed <strong>to</strong> create a synthesis. You willfind Hegeli<strong>an</strong> Dialectics has been introduced in<strong>to</strong> the U.S. educationalsystem by the Skull & Bones Order, <strong>an</strong> <strong>Illuminati</strong> group. It was adoptedin Russia by the Slavophiles in the 19th century.Communism, Nazism, Fabi<strong>an</strong>s, most New Age groups, Liberation<strong>The</strong>ology, <strong>an</strong>d other parts of the Power use Hegeli<strong>an</strong> Dialectics. Hegelin turn based his system on the <strong>an</strong>cient Greek a<strong>to</strong>mists especiallyDemocritus. Hegali<strong>an</strong> dialectics is built in<strong>to</strong> the conflicting scripts thatalters are given. Slaves who are twinned <strong>to</strong> <strong>an</strong>other slave will findHegeli<strong>an</strong> dialectics employed in their twinning programming. <strong>The</strong>Hegeli<strong>an</strong> dialectics c<strong>an</strong> be worked in with the double-binds that theprogrammers love <strong>to</strong> use.e. esoteric l<strong>an</strong>guage.f. Indirect interference with truthful information getting out. This is doneby stealing the impact of the truth, by printing a parallel s<strong>to</strong>ry withdisinformation at the same time, or “leaking” <strong>an</strong> opposite s<strong>to</strong>ry withdisinformation at the same approximate time. Disinformation leaks c<strong>an</strong>be done through the mass media, or <strong>an</strong> individual alter.g. deniability. When orders are given <strong>an</strong>d l<strong>an</strong>guage is used, it is onpurpose vague so that the guilty c<strong>an</strong> deny their guilt.At this point, it might be appropriate <strong>to</strong> cover some st<strong>an</strong>dard CIAtactics. <strong>The</strong>y use some Monarch slaves as “Live Letter Drops”. An LLD isa person who will remail spy letters. <strong>The</strong>y will use “dead drop boxes”which are simply places that <strong>an</strong> item or message is concealed <strong>to</strong> beretrieved by some other criminal in the Network. <strong>The</strong>y may give theslave a gift which then has <strong>to</strong> be passed on. <strong>The</strong>y may protect awritten message by writing it on edible paper. Safe houses are used,indicated by things such as 2 lion statues along with prearr<strong>an</strong>ged O.K.signals, such as the position of a flower pot.235


INTERNAL DECEPTIONSWhen building <strong>an</strong> internal world, the programmers use every trick in thebook <strong>to</strong> hide things. First the abuse has <strong>to</strong> be hidden in silence, <strong>an</strong>dthen the MPD has <strong>to</strong> be hidden. Next, the real core needs <strong>to</strong> behidden. <strong>The</strong>n, the purpose of a Monarch slave needs <strong>to</strong> be hidden. Allthe time that this is going on, the programmers must const<strong>an</strong>tly work atkeeping the programmers’ identities hidden, <strong>an</strong>d their programmingsites hidden. Programmers usually have cover names whenprogramming, <strong>an</strong>d then hypnotically have the victim see them assomething else. For inst<strong>an</strong>ce, Dr. Green had victims see him as acricket. He even used a cricket noise maker while programming, thatclicked. In recent times, the Programmers <strong>an</strong>d h<strong>an</strong>dlers areprogramming their slaves <strong>to</strong> believe that they are aliens. <strong>The</strong> slave willgenerally be lied <strong>to</strong> that they have a “twin” somewhere. Internally, theProgrammer will begin making the System with the core related alters<strong>an</strong>d then the front alters. <strong>The</strong> front alters will be rearr<strong>an</strong>ged in a fashionthat the structure of the System is confused. <strong>The</strong> front alters will be givenheavy programming, <strong>to</strong> convince them that nothing ever happened<strong>to</strong> them, they had a wonderful life. <strong>The</strong>y will be given fictitious s<strong>to</strong>riesabout the programming, so that almost every item in a System has acover s<strong>to</strong>ry <strong>to</strong> mislead <strong>an</strong> alter about what is going on. M<strong>an</strong>y things areplaced in boxes. Clowns programmed <strong>to</strong> cut, are Jack-in-box clownsthat pop up when <strong>an</strong> alter even thinks unapproved thoughts. Some ofthe import<strong>an</strong>t things in a System may be hidden out front. An alter onthe front may think it is stupid, <strong>an</strong>d yet they have access <strong>to</strong> internalmaps of the entire system--which they c<strong>an</strong> remember only on code. Ifa person (such as a therapist or nosey alter) goes <strong>to</strong> look deep in theSystem for the material he might be frustrated. Under a f<strong>an</strong>atically unsexual(asexual) alter, will be a sexual alter. Under a stupid alter, maybe <strong>an</strong> alter gifted in a l<strong>an</strong>guage or art. Alters are very often hiddenbehind opposite types of alters.Import<strong>an</strong>t things in the System, <strong>an</strong>d m<strong>an</strong>y unimport<strong>an</strong>t things, are allwell guarded. Sometimes particular alters have <strong>to</strong> serve as the guards.Some of these guards are called Gatekeepers. Gatekeeper alters willappear near the surface of a system, <strong>an</strong>d then again deep in theSystem about level 10, <strong>an</strong>d 12. Gatekeeper alters are alters that theprogrammer must go through <strong>to</strong> get <strong>to</strong> deeper levels. <strong>The</strong> Gatekeeperalters are very heavily programmed <strong>to</strong> keep them in place. <strong>The</strong>y willreceive intensive lies. Some of the access triggers which mustaccomp<strong>an</strong>y the verbal codes are kept secret, by virtue of the fact thatno person in their right mind would use them, such as needles, electroshocks,or slaps <strong>to</strong> certain parts of the body <strong>to</strong> trigger deep alters <strong>to</strong>take the body. Items in a System will be disguised, such as theclockmaker alter/demons will make clocks <strong>to</strong> appear in the system like<strong>an</strong>ything they w<strong>an</strong>t. <strong>The</strong> only way these c<strong>an</strong> be adequately identified236


is that these clocks are always disguised as gold items. As theProgrammers work, they like <strong>to</strong> find word games, plays on words <strong>an</strong>ddouble-binds. <strong>The</strong>y will also put in scrambling programs, deaf alters <strong>an</strong>dforeign l<strong>an</strong>guage codes <strong>to</strong> help protect their secrets. <strong>The</strong> alters wholook the least <strong>to</strong> have programming may have the most.Duplicate alters of most alters are created, so that even the altersthemselves don’t know if it is themselves or <strong>an</strong>other alter. <strong>The</strong>seduplicates are called mirrored images & looking glass people (LGPs).Some of the mirrored images may turn out <strong>to</strong> be demonic entities thathave been placed using high level demonology. Suicide alters, whoare trained <strong>to</strong> have a big smile <strong>an</strong>d be clowns, mask their intention <strong>to</strong>kill the body when they take the body of a slave. A popular method forhiding things within the occult world, has been boxes within boxes. AMasonic org<strong>an</strong>ization will have a rite, within a secret rite, with a secretgroup, with <strong>an</strong> insider clique. Common everyday items that surroundthe slave will be given special me<strong>an</strong>ings. <strong>The</strong> songs the slave hears onthe radio, will for inst<strong>an</strong>ce have code words. <strong>The</strong> Programmers due <strong>to</strong>the corruption of the music industry knows what hit songs are comingout, <strong>an</strong>d they will haul their slaves in <strong>an</strong>d program them according <strong>to</strong>the lyrics of the soon-<strong>to</strong>-be hits. <strong>The</strong> lyrics will be written so thatprogrammed me<strong>an</strong>ings c<strong>an</strong> be attached <strong>to</strong> certain words <strong>an</strong>d lines.Something as innocent as watching T.V., listening <strong>to</strong> the T.V. or <strong>to</strong> asermon may actually be programming a special message in<strong>to</strong> thevictim.H<strong>an</strong>d signals will even be done over the news or other shows. Forinst<strong>an</strong>ce, Bill Clin<strong>to</strong>n at his inauguration made a sat<strong>an</strong>ic signal duringthe inauguration ceremony. This sign of Sat<strong>an</strong> is a st<strong>an</strong>dard hypnoticinduction h<strong>an</strong>d signal for slaves.Clin<strong>to</strong>n waves the sign of Sat<strong>an</strong> with his left h<strong>an</strong>d at his inauguration.This is a hypnotic induction signal for slaves. Although some mightinterpret this as “I love you” which is h<strong>an</strong>ded by the right h<strong>an</strong>d of adeaf person, this left h<strong>an</strong>ded signal will induct slaves no matter whatsome people think the me<strong>an</strong>ing is.237


No wise person would knowingly choose <strong>to</strong> fight their opponent blind<strong>an</strong>d deaf, yet that seems <strong>to</strong> be the choice which m<strong>an</strong>y nominalChristi<strong>an</strong>s are choosing. <strong>The</strong>y would like <strong>to</strong> live in denial <strong>an</strong>d <strong>to</strong>characterize this book as doomsdayer stuff <strong>an</strong>d then dismiss <strong>an</strong>d ignorethis material. <strong>The</strong>y w<strong>an</strong>t <strong>to</strong> eat, drink <strong>an</strong>d be happy. If people think thatby putting their heads in the s<strong>an</strong>d they c<strong>an</strong> escape the future, or eventhe present difficulties, they may be in for a rude surprise.<strong>The</strong> USE of ESOTERIC l<strong>an</strong>guageOne method of deception is the use of Esoteric l<strong>an</strong>guage. Esotericterms are unders<strong>to</strong>od by those deep in the occult, but aremisunders<strong>to</strong>od by the common people. <strong>The</strong> best example is the term“Saturn.”SATURN<strong>The</strong> word Saturn consistently turns up as <strong>an</strong> import<strong>an</strong>t word for the<strong>Illuminati</strong> <strong>an</strong>d upper levels of the occult. Because Saturn is such <strong>an</strong>import<strong>an</strong>t concept, it should be covered in this part of the book.<strong>The</strong>rapists may encounter something <strong>to</strong> do with Saturn in aprogrammed multiple. Before Fritz beg<strong>an</strong> researching the elite of theoccult world, Saturn was merely me<strong>an</strong>t <strong>an</strong> enormous pl<strong>an</strong>et 95 timesthe size of the earth’s mass, the 6th of the solar system in <strong>an</strong> orbit of 29.5years around the sun. This me<strong>an</strong>s that the co-authors of this book areless th<strong>an</strong> three Saturi<strong>an</strong> years old. Fritz was also aware that Saturn was238


the father of all Gods in the mythology of the <strong>an</strong>cient world. David M.Talbot in his book <strong>The</strong> Saturn Myth documents how all over the worldSaturn has been worshipped even more th<strong>an</strong> the sun god. Saturn hasbeen the secret god of the occult world. When we read in Deut. 18:9-10, “When thou art come in<strong>to</strong> the l<strong>an</strong>d which the Lord thy God giveththee, thou shalt not learn <strong>to</strong> do after the abominations of those nations.<strong>The</strong>re shall not be found among you <strong>an</strong>y one that maketh his son ordaughter <strong>to</strong> pass through the fire, or that useth divination, or <strong>an</strong>observer of times, or <strong>an</strong> ench<strong>an</strong>ter, or a witch.” All of these practicesare abominations done by Sat<strong>an</strong>ists <strong>to</strong>day <strong>an</strong>d are becomingcommoner among Americ<strong>an</strong>s. Note that the first item mentioned byMoses in this passage was passing (putting) children in<strong>to</strong> the fire (ofMoloch). A commentary (Keil, Carl F. <strong>an</strong>d Fr<strong>an</strong>z Delitzch. Commentaryon <strong>The</strong> Pentateuch, III, reprint, Gr<strong>an</strong>d Rapids, MI: Eerdm<strong>an</strong>s PublishingCo., 1949, p. 393 .) on DT 18:9-10 is: “Moses groups <strong>to</strong>gether all the wordswhich the l<strong>an</strong>guage contained for different modes of exploring thefuture <strong>an</strong>d discovering the will of God, for the purpose of forbiddingevery description of soothsaying, <strong>an</strong>d places the prohibition of Molochworshipat the head, <strong>to</strong> show the inward connection betweensoothsaying <strong>an</strong>d idolatry, possibly because februation, or passingchildren through the fire in the worship of Moloch, was more intimatelyconnected with soothsaying <strong>an</strong>d magic th<strong>an</strong> <strong>an</strong>y other description ofidolatry.” <strong>The</strong> worship of Moloch was the worship of Saturn. <strong>The</strong>re areperhaps various routes one c<strong>an</strong> take <strong>to</strong> learn this. One route is a veryclose examination of the Scripture, especially the old Septuagint.Scriptures actually write of this fact in Amos 5:25-26 <strong>an</strong>d Acts 7:41-43.Amos wrote, “Did ye bring un<strong>to</strong> me sacrifices <strong>an</strong>d offerings in thewilderness forty years, 0 House of Israel? Yea, ye have borne thetabernacle of your king (“siccuth malkecem”, or in the Septuagint itreads “skenen <strong>to</strong>u Moloch”!), <strong>an</strong>d the shrine (kiyyun) of your images,the star of your God, which ye made <strong>to</strong> yourselves” AMS 5:25-26 <strong>The</strong>Christi<strong>an</strong> Stephen quotes these passages of Amos <strong>an</strong>d connects it withthe worship of the golden calf (bull or Taurus). His words on this arerecorded in Acts 7:4 1. He further connects it in the next verse with theworship of “the host of heaven”. In line with tr<strong>an</strong>slations like theSeptuagint, he states in verse 43 that Amos 5 refers <strong>to</strong> the cult “ofMoloch <strong>an</strong>d the star of the god Reph<strong>an</strong>”. Hebrew writing consists ofonly the conson<strong>an</strong>ts. <strong>The</strong> vowels c<strong>an</strong> be added with what are termedvocalizations, which are dots. <strong>The</strong> Jewish scribes in their contempt forheathen gods placed vocalizations (vowel indica<strong>to</strong>rs) on the wordMolech (M-L-CH) from a hebrew word for “shame”. Because theincorrect vocalization was added out of contempt for the heathennames of abominable gods, the word Molech (Saturn worship) hasbeen mistr<strong>an</strong>slated by some tr<strong>an</strong>sla<strong>to</strong>rs. Further, the word Chiun(Kaim<strong>an</strong>u in Assyria) has been represented by the word Reph<strong>an</strong> in Acts7:43. Reph<strong>an</strong> is Kaiv<strong>an</strong> (Chiun) which is the arabi<strong>an</strong> <strong>an</strong>d syri<strong>an</strong> way ofsaying Saturn. Reph<strong>an</strong> apparently was a very limited or localized way239


of saying Saturn. <strong>The</strong> adoration of the calf (bull) in the wilderness was<strong>an</strong> import<strong>an</strong>t act of defi<strong>an</strong>ce by the Israelites-- while Moses went up onthe mountain <strong>to</strong> speak <strong>to</strong> God face <strong>to</strong> face. This worship of the bull wasactually worship of Saturn! Some call this star worship, <strong>an</strong>d the bull wasworshipped because at that time the constellation Taurus (the Bull)marked the position of the sun at the time of the spring equinox. <strong>The</strong>fact that the calf was gold was no accident--gold has m<strong>an</strong>y Sat<strong>an</strong>icconnotations. For a modern occult reference connecting the Bull,astrology <strong>an</strong>d gold <strong>to</strong>gether see Esoteric Astrology by Alice Bailey(Lucis Trust, 1951), pp 378-79. Various scholars on <strong>an</strong>cient religion havewritten that the worship of Moloch was Saturn worship. For inst<strong>an</strong>ce,Siculus Diodorus wrote, “. ..there was a brazen statue of Saturn puttingforth the palms of his h<strong>an</strong>ds, bending in such a m<strong>an</strong>ner <strong>to</strong>ward theearth, as that the boy who was laid upon them, in order <strong>to</strong> besacrificed, should slip off, <strong>an</strong>d so fall down headlong in<strong>to</strong> a deepburning furnace...’’ <strong>The</strong> <strong>an</strong>cient Rom<strong>an</strong> circus, like so m<strong>an</strong>y publicactivities in America, was based upon the occult. <strong>The</strong> circus had 7circuits, <strong>an</strong>d had a pyramid in the center with 3 alters, one <strong>to</strong> Saturn,one <strong>to</strong> Jove, <strong>an</strong>d one <strong>to</strong> Mars. This is <strong>an</strong> example of what the commonpeople knew about Saturn. Moloch, then was the Sun God, during theZodiac period from Taurus <strong>to</strong> Serpens <strong>an</strong>d Scorpio which is when thesun is hottest. <strong>The</strong> Babyloni<strong>an</strong>s referred <strong>to</strong> Saturn as the “star of the sun”.In the Mithraic Mysteries, Saturn was the Sun God. (See Hall, M<strong>an</strong>ly P.<strong>The</strong> Lost Teachings of All Ages. p. facing 21.) In fact, Saturn was the SunGod of m<strong>an</strong>y of the Pag<strong>an</strong> religions, <strong>an</strong>d was the foundation of theSolar Temple. (ibid. Hall tells us on pg. 97, Lower Left, that Saturn is thefoundation of the Solar Temple.) <strong>The</strong> Ten tribes of the Israelites fell in<strong>to</strong>the ritual sacrifices of Moloch (Saturn worship <strong>an</strong>d sacrifice) whichbrought them their judgment of Assyri<strong>an</strong> captivity. (2 KGS 17:16- 17)Astrology, witchcraft, <strong>an</strong>d ritual sacrifice were also associated withSaturn worship. Isaiah the prophet tells those who worship Saturn, “Letnow the astrologers, the star-gazers, the monthly prognostica<strong>to</strong>rs, st<strong>an</strong>dup, <strong>an</strong>d save thee.” ISA 47:13 Saturn did not save the Israelites fromcaptivity. Ex-<strong>Illuminati</strong> members have revealed that Saturn is Sat<strong>an</strong>. Yes,Saturn is Sat<strong>an</strong>. <strong>The</strong> Sat<strong>an</strong>ic <strong>Illuminati</strong> hierarcy teach the high levelstudents that “those who serve Saturn promote the return of the lost sonSaturn.” <strong>The</strong> religion of Saturn is Saturni<strong>an</strong> gnosis--which turns out <strong>to</strong>simply be a rehash of the gnosticism that the high level Sat<strong>an</strong>istsbelieve in. Saturn is severe. Jupiter is mild. <strong>The</strong> merging of Saturn(severity) with Jupiter (mildness) is the creation of the new Golden Age--according <strong>to</strong> high level Sat<strong>an</strong>ic hierarchy teachings. <strong>The</strong> earth hasbeen caught in a battle between a bi-polar world--the inner SolarLogos <strong>an</strong>d the outer Saturni<strong>an</strong> sphere. <strong>The</strong> tr<strong>an</strong>s-Saturni<strong>an</strong> pl<strong>an</strong>etsactually belong <strong>to</strong> Alcyone(!) which eventually gets its pl<strong>an</strong>etsreturned. (This may be the reason, that the Sat<strong>an</strong>ic hierarchy hastreated us <strong>to</strong> “good aliens from the Pleiades.” Alcyone is a star in thePleides.)240


Saturni<strong>an</strong> gnostic teachings are that darkness contains the light. Whatthis me<strong>an</strong>s is that darkness is necessary for light <strong>to</strong> exist. And lightappears within the matrix of darkness only by the Demiurge Saturnes--the Logos. This is what they teach. According <strong>to</strong> Albert Pike in theMasonic Text Book Morals <strong>an</strong>d Dogma given <strong>to</strong> 320 Masons, the workof the Sun is the perfecting (also known as the deification of) m<strong>an</strong>.Christi<strong>an</strong>s view that it is Sat<strong>an</strong>’s work <strong>to</strong> teach men that they c<strong>an</strong> bedeified (which is rebellion <strong>to</strong> the one <strong>an</strong>d only true God).SECRET HIGH LEVEL TEACHINGSIn secret Sat<strong>an</strong>ic rituals, the Gr<strong>an</strong>de Master has a scepter whichrepresents his authority <strong>to</strong> wield power through the Lord of this worldwho is known as Saturn. New Age leaders are calling “Saturn” “S<strong>an</strong>atKumera”. A devil by <strong>an</strong>y name is still a devil. In a dialogue with aMother of Darkness, this Mother of Darkness alter provides someinteresting information. <strong>The</strong> dialogue went like this: Mother of Darkness:“Saturn is the gateway that must be opened. For a season God haswinked that m<strong>an</strong> might be illuminated. But excessive light destroys.M<strong>an</strong> must not forget his destiny is concerned with loving regenerationof the earth [Mother Gaia worship] <strong>an</strong>d bal<strong>an</strong>ce. Soon the other eye ofGod must open. Those who are illuminated have kept the bal<strong>an</strong>cepoint. <strong>The</strong> majority of m<strong>an</strong>kind has not. Few seek the <strong>an</strong>cient seed ofwisdom that springs from the brow of Lucifer. M<strong>an</strong> becomes.. .forgetfulof His spiritual <strong>an</strong>cestry <strong>an</strong>d destiny....<strong>The</strong>y are Ellyllon. Keepers ofnothing. <strong>The</strong>y fill the earth with their passing <strong>an</strong>d crowd the pl<strong>an</strong>es withnothingness. <strong>The</strong>y are a waste of the energies. And so the other eyemust open. Each m<strong>an</strong> shall receive abund<strong>an</strong>ce in what he seeks.Some call it Karma...” Interviewer: “What do you me<strong>an</strong> by the othereye?” Mother of Darkness: “<strong>The</strong> other eye of God as some would say.Chemosh. Cle<strong>an</strong>sing Fire. <strong>The</strong> outstreched arms of Molech.”Interviewer: “What has that got <strong>to</strong> do with Saturn?” Mother of Darkness:“Everything. This is a most secret thing. Saturn is the gateway. <strong>The</strong> pointat which all thought is fixed. <strong>The</strong> point at which all feeling shall beprojected as the eye opens. Much ritual <strong>an</strong>d preparation has gone in<strong>to</strong>the issu<strong>an</strong>ce through the gateway of the <strong>an</strong>cient ones. <strong>The</strong>re has beena gathering of the elemental essence <strong>to</strong> clothe them. A strengthenedinvisible quintessence <strong>to</strong> hold them in this pl<strong>an</strong>e at the time of advent.Interviewer: “And what will be the result of this advent? What will itme<strong>an</strong>?” Mother of Darkness: “A res<strong>to</strong>ring of bal<strong>an</strong>ce. Those who do notseek wisdom shall cease. Those who are so bound <strong>to</strong> the earth thatthey forget the light shall cease....When the other eye opens the dawnshall come. <strong>The</strong> Golden Dawn shall be upon us <strong>an</strong>d the sun ofrighteousness shall rise with healing in His wings....<strong>The</strong> urge <strong>to</strong> sacrificeothers is a gift. It is a liberation from the awful rigidity for at least it241


permits <strong>an</strong> awareness of other hum<strong>an</strong>s. However badly.. .treated as aresult of that awareness they have served <strong>an</strong> import<strong>an</strong>t purpose. <strong>The</strong>bal<strong>an</strong>ce is kept <strong>an</strong>d the light dwells upon the illuminated. <strong>The</strong> energy isreleased in<strong>to</strong> the circle <strong>an</strong>d is converted in<strong>to</strong> something powerful <strong>an</strong>duseful....In this way you c<strong>an</strong> see they do not truly die. Light increases.Wisdom grows....Death begets life. <strong>The</strong> sacred cycle of the <strong>an</strong>cients.<strong>The</strong> earth shall regenerate herself when the eye of Molech opens.”<strong>The</strong>re the reader has it, secret teachings from a Mother of Darkness onSaturn. Gnosticism believes that there is a force (not Almighty God)--the Force as it is called c<strong>an</strong> be used for evil or good. Within thehierarchy of the Sat<strong>an</strong>ists (Moriah), their thinking has no problemunderst<strong>an</strong>ding that Lucifer is the same person as Sat<strong>an</strong>. Sat<strong>an</strong> is whathappens when the evil side of the Force is being used, <strong>an</strong>d Lucifer isthat person when the good side of the Force is being used. As in all ofthe Mystery Religions <strong>an</strong>d in the occult world in general, people are<strong>to</strong>ld different things at different levels. Most people don’t w<strong>an</strong>t <strong>to</strong> serveevil. <strong>The</strong>y w<strong>an</strong>t <strong>to</strong> think they are good--their pride motivates them <strong>to</strong>w<strong>an</strong>t <strong>to</strong> be thought of as good <strong>an</strong>d great. <strong>The</strong>y will easily follow Lucifer,but are not going <strong>to</strong> admit <strong>to</strong> themselves or <strong>an</strong>yone that they arefollowing Sat<strong>an</strong>. NO problem--they are allowed <strong>to</strong> think they areLuciferi<strong>an</strong>s. OR if being a follower of Lucifer is <strong>to</strong>o strong a statement,they c<strong>an</strong> be a worshipper of almost thing. Sat<strong>an</strong> in his pride hasprovided esoteric teachings on the worship of just about everything.<strong>The</strong>re are esoteric teachings about worshipping rock, mountains, trees,the stars, <strong>an</strong>imal spirits, mother earth etc. If one probes deep enoughin<strong>to</strong> the layers of hidaen me<strong>an</strong>ings all these worships go back <strong>to</strong> Sat<strong>an</strong>.<strong>The</strong> five primary interlocked concepts of Sat<strong>an</strong>, are all represented bythe Serpent, which are Lucifer (aka Light-bearer or godhood); Searchfor light or wisdom; sun worship, the Sun god, or energy; fire also calledKundalini force; <strong>an</strong>d the regenerative principle which is phallic <strong>an</strong>d sexworship. <strong>The</strong>se 5 interconnected concepts are represented world wideby snakes (serpents) <strong>an</strong>d represent worship of the supreme serpentSat<strong>an</strong>.THE EXTERNALIZATION OF THE HIERARCHY<strong>The</strong> big event or operation that is being carried out is theexternalization of the hierarchy. Sat<strong>an</strong>’s secret hierarchy with its pureSat<strong>an</strong>ists have been around for thous<strong>an</strong>ds of years. But the Sat<strong>an</strong>icconspiracy <strong>to</strong> control m<strong>an</strong>kind is <strong>to</strong> become <strong>an</strong> ‘‘open conspiracy’’.<strong>The</strong> hierarchy is <strong>to</strong> be externalized. And the elimination of Christi<strong>an</strong>s(those who haven’t sought worldly wisdom--that worldly wisdom whichcomes from Sat<strong>an</strong>) --is <strong>to</strong> pave the way for Sat<strong>an</strong>’s appear<strong>an</strong>ce. <strong>The</strong>Sat<strong>an</strong>ic occult conspiracy is <strong>to</strong> leave its secret confines in MasonicTemples <strong>an</strong>d Oddfellow Halls <strong>an</strong>d is <strong>to</strong> permeate Society in general.242


This is what has been happening. <strong>The</strong> real light must go out for the darkside <strong>to</strong> feel comfortable coming completely out. <strong>The</strong> Mysteries, alsoknown as the Mystery Religions are the Mysteries that one is initiatedin<strong>to</strong> when one joins Freemasonry. In fact, the very first item <strong>an</strong>yprospective Masonic c<strong>an</strong>didate must do is fill out a form requesting <strong>to</strong>be initiated in<strong>to</strong> ‘‘the Mysteries.’’ <strong>The</strong> Mystery Religions were actuallyveiled forms of the worship of Lucifer or Sat<strong>an</strong>. Lucifer is simply Sat<strong>an</strong>dressed up as the Light-bearer. In the Mystery Religions the disciples aretaught that the spirits of men are the powdered bones of Saturn. Whenone learns who Saturn is--it is a rather distasteful idea <strong>to</strong> think that menare taught that their bodies belong <strong>to</strong> Saturn. Further, Freemasonryteaches about Hiram Abiff <strong>an</strong>d CHiram. It turns out when we study theHiramic Legend by Freemasonry’s best philosopher that we learn whoS<strong>an</strong>ta Claus is. S<strong>an</strong>ta is a scrambling of Sat<strong>an</strong>. Anyway the Hiramiclegend goes like this according <strong>to</strong> Freemasonry great expert on theMystery Religions, “Saturn, the old m<strong>an</strong> who lives at the north pole, <strong>an</strong>dbrings with him <strong>to</strong> the children of men a sprig of evergreen (theChristmas tree), is familiar <strong>to</strong> the little folks under the name of S<strong>an</strong>taClaus, for he brings each winter the gift of a new year.’’ “Part of thesymbols, are displayed.. .<strong>to</strong> the initiated, but he is intentionally ledastray by false interpretations...Masonry conceals its secrets from allexcept the Adepts, the Sages <strong>an</strong>d the Elect; <strong>an</strong>d uses falseexpl<strong>an</strong>ations for its symbols <strong>to</strong> mislead those deserving <strong>to</strong> be misled.”(This is according <strong>to</strong> the great Freemason Albert Pike in his book Morals& Dogma.) It should come as no surprise that Saturn is one of the itemswhich is mentioned by various Masonic authors. For inst<strong>an</strong>ce, theFreemason Ragon, who is considered <strong>an</strong> expert on Freemasonry,wrote, “This is the import<strong>an</strong>t phenomenon, the ineffable mystery, thekey <strong>to</strong> nature, which the <strong>an</strong>cient sages succeeded in discovering, <strong>an</strong>dwhich they adopted as the basis of Masonic doctrine...It isinterpretation, the revolting atrocities of subject of Masonic legends.According <strong>to</strong> Saturn...were considered interesting enigmas, whichinvolve facts worth our notice.” (Ragon, Tyileur General De La Fr<strong>an</strong>c-Maconnerie, p. 219-19 as quoted in Mohr, Gordon. <strong>The</strong> Hidden PowerBehind Freemasonry, Burnsville, MN: Weism<strong>an</strong> Pub., 1990, p. 109) AliceBailey’s Esoteric Astrology states that Saturn is the Lord of Karma (p.105) Venus <strong>an</strong>d Saturn shall rule men during Aquarius. (p. 148) “Saturn isthe pl<strong>an</strong>et of discipleship... we st<strong>an</strong>d at the gateway of the new world,of the new age <strong>an</strong>d its new civilization, ideals <strong>an</strong>d culture.” (p. 148) <strong>The</strong>occult book A Treatise on Cosmic Fire, pp 1196-1207 states that Saturnis the 5th creative Hierarchy. This is the type of stuff that the Kaballacomes out with. And Americ<strong>an</strong> businesses which are controlled by the<strong>Illuminati</strong> are getting in<strong>to</strong> the act of bringing the occult out in<strong>to</strong> society.Ford called its car Taurus (Bull--the Pleiades), <strong>an</strong>other car is namedAries which is <strong>an</strong>other occult astrological name. <strong>The</strong>n there is the carnamed Saturn!! In conclusion, Saturn turns out <strong>to</strong> be <strong>an</strong> occult name forSat<strong>an</strong>. S<strong>an</strong>ta turns out <strong>to</strong> be <strong>an</strong> occult name for Saturn. It also turns out243


that the name Saturn has been used for Sat<strong>an</strong> for centuries by theoccult. <strong>The</strong> ritual sacrifices <strong>to</strong> Molech was Saturn worship. <strong>The</strong> openingof the eye of Saturn is the materialization of hordes of demons takingplace during this time period. High level <strong>Illuminati</strong>, who will gather<strong>to</strong>gether in Atl<strong>an</strong>ta in the summer of 1996, under the cover of the ’96Olympics will carry out high level rituals <strong>to</strong> open up a large hole for thematerialization of hordes of demons <strong>to</strong> complete their push <strong>to</strong>ward aworld dicta<strong>to</strong>r. <strong>The</strong> use of the name Saturn is <strong>an</strong> example of howSat<strong>an</strong>ism operates under the cover of layers of deception. M<strong>an</strong>yChristi<strong>an</strong> words also have occult me<strong>an</strong>ing. <strong>The</strong>re is a Morning StarChurch in Tulsa which ministers <strong>to</strong> victims of <strong>Illuminati</strong> Trauma Based<strong>Total</strong> <strong>Mind</strong>-Control. <strong>The</strong>re is also a prophetic magazine named <strong>The</strong>Morning Star, which is very slick <strong>an</strong>d glossy. On the other side of things,the term “the Morning Star”--Stella Matutina in Latin- is <strong>an</strong>other namefor Lucifer. Stella Matutina is also the name of a cabalistic black magiclodge which sat<strong>an</strong>ist Aleister Crowley led when the Golden Dawnreorg<strong>an</strong>ized in 1903. <strong>The</strong>re are Morning Star rituals done by <strong>Illuminati</strong>members. One <strong>Illuminati</strong> slave, who was trained <strong>to</strong> infiltrate Christi<strong>an</strong>churches <strong>an</strong>d turn them <strong>to</strong>ward the New Age movement, ch<strong>an</strong>neleda demon named Jesus. He infiltrated Christi<strong>an</strong> churches for decades,<strong>an</strong>d when he spoke about Jesus, he was referring <strong>to</strong> the demon hech<strong>an</strong>neled. We know about this because one day, his front alters gavetheir life <strong>to</strong> Jesus Christ, <strong>an</strong>d he ab<strong>an</strong>doned his job of infiltration, <strong>an</strong>dsought spiritual help. People need <strong>to</strong> underst<strong>an</strong>d that almost allChristi<strong>an</strong> terms have dual me<strong>an</strong>ings. Just because a term soundsfamiliar doesn’t me<strong>an</strong> it is being used in the way that a sincereChristi<strong>an</strong> would underst<strong>an</strong>d them.IN SUMMARYTo summarize, the <strong>Illuminati</strong> are m<strong>an</strong>ipulating technology, l<strong>an</strong>guage,ritualistic activity, subliminal awareness, fear, lust, hum<strong>an</strong> vulnerabilities,<strong>an</strong>d conflicts. <strong>The</strong>se m<strong>an</strong>ipulations are external deceptions, which helpcover up their trauma-based mind control. <strong>The</strong>y use the best covers asfronts. <strong>The</strong>y use fiction, the best of religious fronts, travellingentertainment fronts, <strong>an</strong>d the cover of national defense. <strong>The</strong>y usedeflection, blinds, slides, Hegeli<strong>an</strong> dialectics, deniability, <strong>an</strong>d esotericl<strong>an</strong>guage. <strong>The</strong>y use agent provocateurs, “cle<strong>an</strong> agents”, “legends”,<strong>an</strong>d safe houses. <strong>The</strong> <strong>Illuminati</strong> have refined the art of deception farbeyond what the common m<strong>an</strong> has imagined. <strong>The</strong> very life & liberty ofhum<strong>an</strong>ity requires the unmasking of their deceptions. That is what thisbook is about.244


CHAPTER 6 SCIENCE NO.6THE USE OF ELECTRONICS & ELECTRICITY245


<strong>The</strong>se pho<strong>to</strong>s printed in a magazine in the fall of 1981show electric prod marks on the necksof these two slaves who were used for porn.Another basic component of the Monarch program is lots of electroshock. Stun guns, staffs with hidden electric cattle prods, <strong>an</strong>d cattleprods are frequently used on the slaves. Electroshock is used <strong>to</strong> createthe dissociation from trauma during the programming, <strong>an</strong>d later it isused <strong>to</strong> remove memories after the slave has carried out a mission, or<strong>to</strong> instill fear <strong>an</strong>d obedience in a reluct<strong>an</strong>t slave. Slaves generally carryhorrible body memories of excruciating electro-shock <strong>to</strong>rtures <strong>to</strong> theirentire bodies. As the slaves begin a therapeutic deprogrammingprocess they will recover these horrible memories, not <strong>to</strong> mention m<strong>an</strong>yother painful memories. A slave often shows electro-shock marks ontheir feet, or back, or but<strong>to</strong>ck or legs after they have been used. Anowner of a slave will ordinarily carry a stun gun. This is perhaps a120,000 DC volt stun gun <strong>to</strong> erase & compartmentalize memories, butsome of the stun guns go up <strong>to</strong> 200,000 volts DC <strong>to</strong> erase the memoryof his slave. <strong>The</strong>y will apply their stun guns <strong>to</strong> the base of the skull. Aftergiving programming instructions they will usually give a high voltageshock <strong>to</strong> the base of the skull <strong>to</strong> imbed the instructions deep in thesubconscious. <strong>The</strong>y often use hypnotic cues along with the shock. Forinst<strong>an</strong>ce, they will tell the slave they are “now going over the rainbow”,<strong>an</strong>d that when the sun goes down they will forget everything, beforethey shock the body. <strong>The</strong> shock destroys <strong>an</strong>d scrambles the memorywhich is still s<strong>to</strong>red in the short term memory section of the brain. <strong>The</strong>ymust shock the person within 24 hours, <strong>to</strong> insure that the short termmemory doesn’t get in<strong>to</strong> long term memory as a coherent memory.This me<strong>an</strong>s that if a slave is being used daily, they get electroshockeddaily. Types of devices used by h<strong>an</strong>dlers: A cylindrical type cattle prodwith 3/4” between the contact points is used externally <strong>an</strong>d internally.This is m<strong>an</strong>ufactured by Hot Shot Products, Inc., Savage, MN 55378.Model B-12. <strong>The</strong>y have a red or black rubber h<strong>an</strong>dle with <strong>an</strong> overalllength of 12”. <strong>The</strong> low voltage is between 10,000-15,000 volts. <strong>The</strong>medium voltage is 12,000 <strong>to</strong> 20,000 volts. A bruise on the but<strong>to</strong>cks willbe black <strong>an</strong>d blue spots about 1 1/2” diameter each. A h<strong>an</strong>d heldw<strong>an</strong>d type shock prod which has 2 3/4” between its contact points. Ituses a rechargeable battery pack. <strong>The</strong> prod (w<strong>an</strong>d) is 2 1/2’ long, <strong>an</strong>d246


unwieldy <strong>to</strong> h<strong>an</strong>dle. Various farm supply comp<strong>an</strong>ies (lives<strong>to</strong>ckequipment) sell this. <strong>The</strong> medium voltage is 12,000 <strong>to</strong> 20,000. A stun gunwhich has exactly 2” between the contacts with a 9 volt battery. Thisstun gun was created for law enforcement, <strong>an</strong>d is generally regardedas the best device for dropping a victim or for inducing hypnosis, orsetting in a hypnotic program. Its high voltage is 35,000 <strong>to</strong> 120,000 volts.It is a light weight (12 oz.), compact device, 7” x 2” x 1”. This device willleave deep red dot (“holes”) scars <strong>an</strong>d c<strong>an</strong>cerous moles. <strong>The</strong> victimwill develop moles from the repeated use of this device. <strong>The</strong> muscledareas of the victim are preferred. For inst<strong>an</strong>ce, the muscled area justbelow the shoulder blade. Farrall Instrument Co., of Gr<strong>an</strong>d Isl<strong>an</strong>d, NEmakes a cattle prod with <strong>an</strong> adjustable voltage control. <strong>The</strong>ir longdist<strong>an</strong>ce wireless shocker called Personal Shocker c<strong>an</strong> shoot a shockabout 75 indoors <strong>an</strong>d 300 feet outdoors. <strong>The</strong> control box is h<strong>an</strong>d held,<strong>an</strong>d the receiver is a leather case. <strong>The</strong> shock c<strong>an</strong> be adjusted from 9 <strong>to</strong>800 volts, current is 5 milliamperes, <strong>an</strong>d it lasts 1 <strong>to</strong> 2 milliseconds. ThisPersonal Shocker was m<strong>an</strong>ufactured <strong>to</strong> be used on people. Anelectronic firm in Tujunga, CA makes a shock box used inprogramming. An electronic bark collar is used <strong>to</strong> train <strong>Illuminati</strong> &other Monarch slaves in silence & obedience. On other occassions,f<strong>an</strong>cy gem studded collars <strong>an</strong>d leather collars are fitted around thenecks of female slaves for sex with wolves <strong>an</strong>d fierce dogs, who bitethese neck-collars when they mount. M<strong>an</strong>y of the slaves haveexperienced these various collars for obedience, silence, & bestiality. Intrying <strong>to</strong> track down who makes the larger electro-shock machines,especially the computer guided ones, we only got startedinvestigating. Con-med (315-797-8375) makes medical electrodes forportable moni<strong>to</strong>ring units. Sentry Medical Products, at 17171 Murphy,Irvine, CA 92714 (714-250-0233) makes Skin Mounted ConductiveMedical Electrodes for Tense Unit Machines. In Vivo Metric, inHealdsburg, CA also makes silver Chloride electrodes for placement onhum<strong>an</strong> skin. Electro-Cap Inter, produces BEG placement systems. Uni-Patch Medical Products, 13 13-T Gr<strong>an</strong>t Blvd. W, Wabasha, MN makes alltypes of Electrodes <strong>an</strong>d some of theirs go on<strong>to</strong> machines for shockingpeople. Classic Medical Products, 582-T W 19246 Apollo Dr., Muskego,WI make electrodes for diagnostic <strong>an</strong>d shock purposes. ArndtAu<strong>to</strong>mation & Assoc., Inc., 17770 Liberty L<strong>an</strong>e, New Berlin, WI, makeelectrodes for ECG <strong>an</strong>d EKG machines. And a Colorado comp<strong>an</strong>ynamed Biomedical at Evergreen, CO makes medical electrodes. Whena slave is taken <strong>to</strong> <strong>an</strong> impromptu programming site--a hypnotic drug isinjected in<strong>to</strong> them for a quick induction while a metal b<strong>an</strong>d is putaround their head <strong>an</strong>d a current of 100,000 volts will be run through forsay 5 seconds in<strong>to</strong> their heads. This will cause the body <strong>to</strong> shake, theeyes <strong>to</strong> close, sweat <strong>to</strong> pour out of the body etc. <strong>The</strong> h<strong>an</strong>ds are tieddown with restraints. Sometimes the mouth is gagged so that the<strong>to</strong>ngue doesn’t protrude. After imbedding the hypnotic comm<strong>an</strong>dsdeep in<strong>to</strong> the mind, the programmers might adjust the au<strong>to</strong>matic timer247


on the equipment <strong>an</strong>d give the victim <strong>an</strong>other blast of voltage for 10seconds. <strong>The</strong> person’s body will shake <strong>an</strong>d quiver for a while after this.<strong>The</strong>y may dribble spit. Finally, the person will be brought out of theirhypnotic tr<strong>an</strong>ce, instructed not <strong>to</strong> remember <strong>an</strong>ything, <strong>to</strong> feel happy<strong>an</strong>d sent on their way. This entire programming session c<strong>an</strong> last 15minutes. Programming sites like this c<strong>an</strong> be the back of a v<strong>an</strong>, a backroom in a restaur<strong>an</strong>t, or <strong>an</strong>y other place that the equipment c<strong>an</strong> be setup at. This is why a slave, who has been used recently, may hobble alittle, or when they get memories feel a tight headb<strong>an</strong>d around theirhead along with awful headaches & flashes of light.<strong>The</strong> memory will feel like a robotic state <strong>to</strong> the slave. Here is a drawingthat one slave made of the electric headb<strong>an</strong>d used <strong>to</strong> program <strong>an</strong>alter.<strong>The</strong> x-rays below were usedwith the victims' permission.<strong>Mind</strong> control impl<strong>an</strong>t in the nasal cavity.248


Electrodes impl<strong>an</strong>ted in the person'sskull when a child in the 1940's.Tr<strong>an</strong>smitting impl<strong>an</strong>t in the cortex.Impl<strong>an</strong>ts enlarged from 7mm <strong>an</strong>d 11 mm.Drawings by Fritz Springmeier<strong>The</strong> slave h<strong>an</strong>dler will also carry a black or grey spiral book with all theirown slave’s access codes, triggers, cryptic keys <strong>an</strong>d programs. All thiswill fit in<strong>to</strong> a brief case. A working knowledge of hypnosis is helpful <strong>to</strong>underst<strong>an</strong>d how <strong>to</strong> deal with the slave in certain inst<strong>an</strong>ces. Becausethe slave is under the most powerful combinations of mind-control <strong>an</strong>dis so divided against his or her own self, it is almost impossible <strong>to</strong> havem<strong>an</strong>y problems with the slave if the h<strong>an</strong>dler does what he is supposed<strong>to</strong> do. However, some h<strong>an</strong>dlers get drunk or lo<strong>an</strong> the slave <strong>to</strong>inexperienced people, etc. <strong>an</strong>d problems do develop. Of course theslaves always end up taking the blame for everything that goes wrong.If the slave gets out of h<strong>an</strong>d, because the h<strong>an</strong>dler doesn’t know whathe is doing, a stun gun comes in h<strong>an</strong>dy <strong>to</strong> control the mism<strong>an</strong>agedslave. In other words, a brief case with the programming book <strong>an</strong>d stungun are basically all that is needed <strong>to</strong> control a Monarch slave for therest of his or her life. Some of these stun guns are only a few inches long<strong>an</strong>d look like boxes. Other stun guns are imbedded in staffs. <strong>The</strong> c<strong>an</strong>es<strong>an</strong>d the staffs that Sat<strong>an</strong>ists carry around, like Michael Aquino (inpublic in fact) are actually stun guns <strong>to</strong> control their slaves. <strong>The</strong> QueenMother’s staff of the <strong>Illuminati</strong> has <strong>an</strong> electric stun gun hidden in it.249


Children in day care centers are reporting small boxes with wires thatelectroshock them during programming. An example is given in Vol. 1,of how the <strong>Illuminati</strong> bloodlines connect <strong>to</strong> research about electricshocks <strong>to</strong> control people. For example, David V. Reynold’s research,who wrote, “Neuroelectric Research: Electroneuroprosthesis,Electro<strong>an</strong>esthesia, <strong>an</strong>d Nonconvulsive Electrotherapy.” Another way ofusing electricity for <strong>to</strong>rture is <strong>to</strong> use directed energy (a newtechnology) on men’s genitals. With skillful use of directed energy theyc<strong>an</strong> simulate a rape of a m<strong>an</strong> or wom<strong>an</strong>. Artificial sodomy via directedenergy was first tested in male prisons. ELF waves will place thoughtsin<strong>to</strong> the men’s mind as the directed energy make them feelsodomized.MICROWAVES FOR PROGRAMMINGOn Aug. 22, 1989, Phillip L. S<strong>to</strong>klin, P.O. Box 2111, Satellite Beach, FL <strong>to</strong>okout a patent --which is Patent Number 4,858,612 which is a device thatc<strong>an</strong> be placed in the audi<strong>to</strong>ry cortex of the brain. This device allowsthe following process: someone speaks in<strong>to</strong> a microphone, themicrophone then has its sounds coded in<strong>to</strong> microwave, which are sent<strong>to</strong> the receiver in the brain <strong>an</strong>d the receiver device will tr<strong>an</strong>sform themicrowaves back so that the person’s mind hears the original sounds.In other words, a person with this device in their head will hearwhatever the programmers send via microwave signals.Various types of “non-lethal” weapons have been created <strong>an</strong>d arenow being used. Directed-energy c<strong>an</strong> be used <strong>to</strong> sculpt clouds. ELFwaves c<strong>an</strong> be used <strong>to</strong> place thoughts in people’s minds without usingimpl<strong>an</strong>ts. In 1991, a paper trail beg<strong>an</strong> <strong>to</strong> appear when the CIAconnected U.S. government Global Strategy Council came out with apaper entitled, “Nonlethality: Development of a National Policy <strong>an</strong>dEmploying Nonlethal Me<strong>an</strong>s in a New Strategic Era.” <strong>The</strong>ir paper wasprepared by J<strong>an</strong>et Morris. <strong>The</strong> USAF School of Aerospace Medicine,Brooks Air Force Base, TX put out a report USAFAM-TR-87-30 entitled“Behavioral response of rats exposed <strong>to</strong> high-power microwaveradiation.” High-power,ultra-short pulse-width emitters of microwaveswere used <strong>to</strong> alter the thinking in rats. <strong>The</strong> report refers <strong>to</strong> two otherreports: one by T. Wheeler, et. al. “Retrograde Amnesia in RatsProduced by Electron BeamExposure,” entitled USAFAM-TR-83-3, Feb. ‘83. <strong>The</strong> other report is by R.Berm<strong>an</strong>t, “Classical conditioning of Microwave-Induced Hyperthermiain Rats.” Radio Sci. 14 (6S): 201-207, 1979. This is a clear paper trail, thatmilitary research has gone on <strong>to</strong> control the brain via microwaves.Another institution in Texas, the Texas Dept. of Criminal Justice TDCJ-ID,has been putting high-tech listening impl<strong>an</strong>ts in<strong>to</strong> the ear c<strong>an</strong>al behindthe ear drum which lets them moni<strong>to</strong>r what the ear is hearing--a greatway <strong>to</strong> spy. This is according <strong>to</strong> <strong>an</strong> impl<strong>an</strong>t victim who with medicalhelp discovered his impl<strong>an</strong>t. <strong>The</strong> Walter Reed Army Institute of250


Research (WRAIR) discovered that pulsed microwave audiograms alsocalled <strong>an</strong>alogs of the sounds of spoken words, could be tr<strong>an</strong>smitted <strong>to</strong>a target, <strong>an</strong>d the effect on victim would be <strong>to</strong> hear voices in theirhead. <strong>The</strong> next 11 pages are patent no. 4,858,612. After this, we'llreveal the numerous mind-control capabilities of ELF-microwave tech.)»<strong>The</strong> next pages, page 169 <strong>to</strong> page 174, may present the reader withsome minor difficulties in reading, because with some words it was notpossible <strong>to</strong> process them, because of poor printing. So some words arelost, <strong>an</strong>d this c<strong>an</strong> make certain sentences appear str<strong>an</strong>ge. Webmaster:because I edited the text the reading is normal now. It maybe sohowever that some words are wrong.251


HEARING DEVICEBACKGROUND OF THE INVENTION1. Field at the InventionThis invention relates <strong>to</strong> devices for aiding at hearing in mammals. <strong>The</strong>invention is based upon the perception at sounds which is experiencedin the brain when the brain is subjected <strong>to</strong> certain microwave radiationsignals.2. Description ot the Prior ArtIn prior art hearing devices for hum<strong>an</strong> beings, it is well known <strong>to</strong> amplifysounds <strong>to</strong> be heard <strong>an</strong>d <strong>to</strong> apply the amplified sound signal <strong>to</strong> the earat the person wear-ing the hearing aid. Hearing devices of this type arehowever limited <strong>to</strong> hearing disfunctions where there is no damage <strong>to</strong>the audi<strong>to</strong>ry nerve or <strong>to</strong> the audi<strong>to</strong>ry cortex. In the prior art, if there isdamage <strong>to</strong> the audi-<strong>to</strong>ry cortex or the audi<strong>to</strong>ry nerve, it c<strong>an</strong>not becorrected by the use ot a hearing aid. During World War II, individualsin the radiation path of certain radar installations observed clicks <strong>an</strong>dbuzzing sounds in response <strong>to</strong> the microwave radiation. It was throughthis early observation that it became known <strong>to</strong> the art that microwavescould cause a direct perception at sound within a hum<strong>an</strong> brain. <strong>The</strong>sebuzz-ing or clicking sounds however were not me<strong>an</strong>ingful <strong>an</strong>d were notperception of sounds which could other-wise be heard by the receiver.This type of microwave radiation was not representative of <strong>an</strong>yintelligible sound <strong>to</strong> be perceived. In such radar installations, there wasnever a sound which was generated which resulted in subsequentgeneration of microwave signals representative of that sound. Sincethe early perception of buzzing <strong>an</strong>d clicking. further research has beenconducted in<strong>to</strong> the micro-wave reaction of the brain. In <strong>an</strong> articleentitled Possi-ble Microwave Mech<strong>an</strong>isms of the Mammali<strong>an</strong> NervousSystem” by Philip L S<strong>to</strong>cklin <strong>an</strong>d Brain F. S<strong>to</strong>c-klin, published in the TITJournal of Life Sciences. Tower International Technomedical Institute.Inc. P.O. Box 4594, Philadelphia. Pa. (1979) there is disclosed ahypothesis that the mammali<strong>an</strong> brain generates <strong>an</strong>d uses electramagnetic waves in the lower microwave fre-quency region as <strong>an</strong>integral part of the functioning of the central <strong>an</strong>d peripheral nervoussystems. This <strong>an</strong>aly-sis is based primarily upon the potential energy of aprotein integral in the neural membr<strong>an</strong>e. In <strong>an</strong> article by W. Biseentitled “Low Power Radio-Frequency <strong>an</strong>d Microwave Effects OnHum<strong>an</strong> Electro- encephalogram <strong>an</strong>d Behavior,” Physiol. Chemistry252


Phys. 10. 387 (1978), it is reported that there are signifi-c<strong>an</strong>t effects uponthe alert hum<strong>an</strong> EEG during radiation by low intensity cw microwaveelectromagnetic en-ergy. Bise observed signific<strong>an</strong>t repeatable EEGeffects tar a subject during radiation at specific microwavefrequencies.SUMMARY OF THE INVENTIONResults at theoretical <strong>an</strong>alysis of the physics ot brain tissue <strong>an</strong>d thebrain/skull cavity, combined with experi-mentally-determinedelectromagnetic properties at mammali<strong>an</strong> brain tissue, indicate thephysical necessity for the existence of electromagnetic st<strong>an</strong>dingwaves. called modes in the living mammali<strong>an</strong> brain. <strong>The</strong> madecharacteristics rnay be determined by two geometric properties at thebrain: these are the cephalic index at the brain (its shape in prolatespheroidal coordinates) <strong>an</strong>d the semifocal dist<strong>an</strong>ce of the brain (ameasure of its size). It was concluded that estimation ot brain cephalicindex <strong>an</strong>d semifocal dist<strong>an</strong>ce using external skull mea-surements onsubjects permits estimation of the subjects characteristic modefrequencies, which in turn will permit a mode by mode treatment atthe data <strong>to</strong> simu-late hearing.This invention provides for sound perception by indi-viduals who haveimpaired hearing resulting tram ear damage, audi<strong>to</strong>ry nerve damage,<strong>an</strong>d damage <strong>to</strong> the audi<strong>to</strong>ry cortex. This invention provides forsimulation of microwave radiation which is normally produced by theaudi<strong>to</strong>ry cortex. <strong>The</strong> simulated brain waves are introduced in<strong>to</strong> theregion at the audi<strong>to</strong>ry cortex <strong>an</strong>d provide for perceived sounds on thepart at the subject.BRIEF DESCRIPTION OF THE DRAWINGSFIG. 1 shows the acoustic filter b<strong>an</strong>k <strong>an</strong>d mode control matrix portionsof the hearing device at this inven- tion.FIG. 2 shows the microwave generation <strong>an</strong>d <strong>an</strong>tenna portion of thehearing device of this invention.FIG. 3 shows a typical voltage divider network which may be used <strong>to</strong>provide mode partition.FIG. 4 shows <strong>an</strong>other voltage divider device which may be used <strong>to</strong>provide mode partition.253


FIG. 5 shows a voltage divider <strong>to</strong> be used as a mode partition whereineach of the resis<strong>to</strong>rs is variable in order <strong>to</strong> provide adjustment of thevoltage outputs.FIG. 6 shows a modified hearing device which in-cludes adjustablemode partitioning, <strong>an</strong>d which is used <strong>to</strong> provide initial calibration of thehearing device.FIG. 7 shows a group of variable oscilla<strong>to</strong>rs <strong>an</strong>d variable gain controlswhich are used <strong>to</strong> determine hearing characteristics of a particularsubject.FIG. 8 shows a <strong>to</strong>p view of a hum<strong>an</strong> skull showing the lateral dimension.FIG. 9 shows the relationship of the prolate spherical coordinate system<strong>to</strong> the cartesi<strong>an</strong> system.FIG. 10 shows a side view of a skull showing the medial pl<strong>an</strong>e of thehead. section A-A.FIG. 11 shows a plot of the tr<strong>an</strong>sverse electric field amplitude versusprimary mode number M.FIG. 12 shows a left side view of the brain <strong>an</strong>d audi<strong>to</strong>ry cortex.FIG. 13 shows the <strong>to</strong>tal modal field versus <strong>an</strong>gle for source location (Fig.13 is further down the page)254


255


256


257


DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT (for the figuresreferred <strong>to</strong> further down the article, see the pictures above)This invention is based upon observations at the physical mech<strong>an</strong>ismthe mammali<strong>an</strong> brain uses <strong>to</strong> per-ceive acoustic vibrations. Thisobservation is based in part upon neuro <strong>an</strong>a<strong>to</strong>mical <strong>an</strong>d otherexperimental evidence which relates <strong>to</strong> microwave brain stimulation<strong>an</strong>d the perception of sounds. It is has been observed thatmonochromatic acoustic stimuli (acoustic <strong>to</strong>nes, or single <strong>to</strong>nes) ofdifferent frequencies uniquely stimulate different regions at thecochlea. It has also been observed that there is a corre-sponding one<strong>to</strong> one relationship between the frequency of a monochromaticacoustic stimulus <strong>an</strong>d the region of the audi<strong>to</strong>ry cortex neurallystimulated by the cochlcar nerve under the physiologically normalconditions <strong>to</strong>no<strong>to</strong>picity). It has been observed that for <strong>an</strong> acoustic<strong>to</strong>ne of a frequency which is at the lower end at the entire acousticalr<strong>an</strong>ge perceivable by a person, that thin lateral region ("Line") parallel<strong>to</strong> the medial axis of the brain <strong>an</strong>d <strong>to</strong>ward the infenor portion of theprimary audi<strong>to</strong>ry cortex is stimulated. For <strong>an</strong> acoustic <strong>to</strong>ne whose frequencyis <strong>to</strong>ward the high end of the entire perceivable acousticr<strong>an</strong>ge, a thin lateral region parallel <strong>to</strong> the medial axis <strong>an</strong>d <strong>to</strong>ward thesuperior portion at the primary audi<strong>to</strong>ry cortex is stimulated. Neuralstimulation results in the generation at a broad b<strong>an</strong>d of microwavepho<strong>to</strong>ns by the ch<strong>an</strong>ge in rotational energy state of pro<strong>to</strong>ns integral <strong>to</strong>the neuron mem-br<strong>an</strong>e of the audi<strong>to</strong>ry cortex. <strong>The</strong> physical size <strong>an</strong>dshape of the brain/skull cavity, <strong>to</strong>gether with the (semi-conduc<strong>to</strong>r)properties (conductivity <strong>an</strong>d dielectric con-st<strong>an</strong>t) of the brain tissueprovide <strong>an</strong> electromagnetic reson<strong>an</strong>t cavity. Specific singlefrequencies are con-structively reinforced so that a number of st<strong>an</strong>dingelectromagnetic waves, each at its own single electro-magneticfrequency in the microwave frequency region. are generated in thebrain. Each such st<strong>an</strong>ding electromagnetic wave is called acharacteristic mode of the brain/skull cavity. Analysis in terms of prolatespheroidal wave func-tions indicates that tr<strong>an</strong>sverse electric fieldcomponents of these modes have maxima in the region of the audi<strong>to</strong>rycortex. This <strong>an</strong>alysis further shows that tr<strong>an</strong>sverse electric fieldpossess a variation of amplitude with <strong>an</strong>gle in the <strong>an</strong>gular pl<strong>an</strong>e (alongthe vertical dimension of the audi<strong>to</strong>ry cortex) <strong>an</strong>d that is dependen<strong>to</strong>nly upon the primary mode number. <strong>The</strong> audi<strong>to</strong>ry cortex in thenormally functioning mammali<strong>an</strong> brain is a source of microwavemodes. <strong>The</strong> audi<strong>to</strong>ry cortex generates these modes in accord<strong>an</strong>cewith the neural stimulation of the audi<strong>to</strong>ry cortex by the cochlearnerve. Mode weighting for <strong>an</strong>y one acoustic <strong>to</strong>ne stimulus is given bythe amplitude of each mode along the line region of the audi<strong>to</strong>rycortex which is neurally stimulated by that acoustic <strong>to</strong>ne stimulus. A258


listing of mode weighting versus frequency of acoustic stimulus is calledthe mode matrix. In this invention, the functions of the ear, the cochlearnerve, <strong>an</strong>d the audi<strong>to</strong>ry cortex are simulated. Mi-crowavessimulating the mode matrix are inserted directly in<strong>to</strong> the region of theaudi<strong>to</strong>ry cortex. By this insertion of simulated microwave modes, thenormal operation of the entire natural hearing mech<strong>an</strong>ism is simulated.Referring now <strong>to</strong> FIG. 1 <strong>an</strong>d FIG. 2 there is shown <strong>an</strong> apparattus whichprovides for induced perception of sound in<strong>to</strong> a mammali<strong>an</strong> brain. Thisbearing device includes a microphone 10 which receives sounds, <strong>an</strong>acoustic filter b<strong>an</strong>k 12 which separates the signals from themicrophone in<strong>to</strong> component frequencies, <strong>an</strong>d a mode control matrix14 which generates the mode sig-nals which are used <strong>to</strong> control theintensity of micro-wave radiations which are injected in<strong>to</strong> the skullcavity in the region of the audi<strong>to</strong>ry cortex. <strong>The</strong> acoustic filterb<strong>an</strong>k 12consists of a b<strong>an</strong>k of acoustic filters Fl through Fk which sp<strong>an</strong> theaudible acoustic spectrum. <strong>The</strong>se filters may be built from st<strong>an</strong>-dardresist<strong>an</strong>ce, induct<strong>an</strong>ce, <strong>an</strong>d capacit<strong>an</strong>ce compo-nents inaccord<strong>an</strong>ce with well established practice. In the preferredembodiment there are 24 filters which 63 correspond <strong>to</strong> the observedcritical b<strong>an</strong>dwidths of the hum<strong>an</strong> ear. In this preferred embodiment atypical, list at filter parameters is given by Table I <strong>to</strong> the right.Unfortu<strong>an</strong>ately the writing is not very clear:259


<strong>The</strong> rectifier outputs one through K are feed <strong>to</strong> K mode partitiondevices. <strong>The</strong> mode partitioning devices each have N outputs whereinN is the number of micro-wave oscilla<strong>to</strong>rs used <strong>to</strong> generate themicrowave radia-tion. <strong>The</strong> outputs 1 through N of each mode partitiondevice is applied respectively <strong>to</strong> the inputs of each gain controlledamplifier of the microwave radiation genera<strong>to</strong>r. <strong>The</strong> function of themode control matrix 14 is the control of the microwave amplifiers in themicrowave amplifier b<strong>an</strong>k 18. In the preferred embodiment thus will be24 outputs <strong>an</strong>d 24 microwave frequency oscilla<strong>to</strong>rs.Connected <strong>to</strong> each microwave amplifier gain control line is a modesimulation device 16 which receives weighted mode signals from themode partition devices 14. Each mode simulation device consists ofone through k lines <strong>an</strong>d diodes 17 which are each connected <strong>to</strong>summing junction 19. <strong>The</strong> diodes 17 provide for isolation from onemode partition device <strong>to</strong> the next. <strong>The</strong> diodes 17 prevent signals fromone mode partition device from returning <strong>to</strong> the other mode partitionde-vices which are also connected <strong>to</strong> the same summing junction ofthe mode summation device 16. <strong>The</strong> diodes also serve a secondfunction which is the rectification of the signals received from theacoustic filter b<strong>an</strong>k by way of the mode partition devices. In this wayeach mode partition device output is rectified <strong>to</strong> produce a varyingDC voltage with major frequency components of the order of 15milliseconds or less. <strong>The</strong> voltage at the summation junction 19 is thus aslowly varying DC voltage. <strong>The</strong> example mode partition devices areshown in greater detail in FIGS. 3. 4, <strong>an</strong>d 5. <strong>The</strong> mode partition devicesare merely resist<strong>an</strong>ce networks which produce 1 through N outputvoltages which are predetermined divisions of the input original fromthe acoustic filter associated with the mode partition device. FIG. 3shows a mode partitioning device wherein several outputs areassociated with each series resis<strong>to</strong>r 30. In the embodiment depicted inFIG. 4 there is <strong>an</strong> output asso-ciated with each series resis<strong>to</strong>r only, <strong>an</strong>dthus there are N series resis<strong>to</strong>rs, or the same number of series resis<strong>to</strong>rs asthere are outputs. <strong>The</strong> values of the resis<strong>to</strong>rs in the mode partitionresis<strong>to</strong>r network are determined in accord<strong>an</strong>ce with the magnitudes ofthe frequency component from the acoustic filter b<strong>an</strong>k 12 which isrequired at the summation point 19 or the gain control line for amplifiers20. <strong>The</strong> microwave amplifier b<strong>an</strong>k 18 Consists of: plural-ity of microwaveoscilla<strong>to</strong>rs 1 through N each of which is connected <strong>to</strong> <strong>an</strong> amplifier 20.Since the amplifiers 20 are gain controlled by the signals at summationjunction 19. the magnitude of the microwave output is con-trolled bythe mode control matrix outputs Fl through F. In the preferredembodiment there are 24 amplifiers. <strong>The</strong> leads from the microwaveoscilla<strong>to</strong>rs I through N <strong>to</strong> the amplifiers 20 are shielded <strong>to</strong> prevent crosstalk from one oscilla<strong>to</strong>r <strong>to</strong> the next, <strong>an</strong>d <strong>to</strong> prevent stray signals fromreaching the user of the hearing device. <strong>The</strong> output imped<strong>an</strong>ce ofamplifiers 20 should be 1000 ohms <strong>an</strong>d this is indicated by resis<strong>to</strong>r 21.260


<strong>The</strong> outputs of amplifiers 20 are all connected <strong>to</strong> a summing junction22. <strong>The</strong> summing junction 22 is connected <strong>to</strong> a summing imped<strong>an</strong>ce 23which is approximately 50 ohms. <strong>The</strong> relatively high amplifier outputimped<strong>an</strong>ce 21 as com-pared <strong>to</strong> the relatively low summingimped<strong>an</strong>ce 23 provides minimization of cross talk between the amplifiers.Since the amplitude of the microwave signal needed at the<strong>an</strong>tenna 24 is relatively small, there is no need <strong>to</strong> match the <strong>an</strong>tenna<strong>an</strong>d summing junction imped<strong>an</strong>ces <strong>to</strong> the amplifier 20 outputimped<strong>an</strong>ces. Eficiency of the amplifiers 20 is not critical. Level control ofthe signal at <strong>an</strong>tenna 24 is controlled by pick off 25 which is connected<strong>to</strong> the summing impe- d<strong>an</strong>ce 23. In this m<strong>an</strong>ner the signal at <strong>an</strong>tenna24 c<strong>an</strong> be varied from 0 (ground) <strong>to</strong> a value which is acceptable <strong>to</strong>the individual. <strong>The</strong> <strong>an</strong>tenna 24 is placed next <strong>to</strong> the subject’s head <strong>an</strong>din the region of the subjects audi<strong>to</strong>ry cortex 26. By placement of the<strong>an</strong>tenna 24 in the region of the audi-<strong>to</strong>ry cortex 26. the microwave fieldwhich is generated simulates the microwave field which would begener-ated if the acoustic sounds were perceived with normal hearing<strong>an</strong>d the audi<strong>to</strong>ry cortex was functioning normally. In FIG. 2A there isshown a second embodiment of the microwave radiation <strong>an</strong>dgenera<strong>to</strong>r portion of the hearing device. In this embodiment a broadb<strong>an</strong>d micro-wave source 50 generates microwave signals which arefeed <strong>to</strong> filters 52 through 58 which select from the broad b<strong>an</strong>dradiation particular frequencies <strong>to</strong> be tr<strong>an</strong>smitted <strong>to</strong> the person. As inFIG. 2. the amplifiers 20 receive signals on lines 19 from the modecontrol matrix. <strong>The</strong> signals on lines 19 provide the gain control foramplifiers 20. In FIG. 6 there is shown a modified microwave hear-inggenera<strong>to</strong>r 60 which includes a mode partition resis-<strong>to</strong>r divider networkas depicted in FIG. 5. Each of the mode partition voltage dividernetworks in this embodi ment are individually adjustable for all ot theresist<strong>an</strong>ces in the resist<strong>an</strong>ce network FIG. 5 depicts a voltage divisionsystem wherein adjustment of the voltage parti-tion resis<strong>to</strong>rs is providedfor. In FIG. 6, the sound source 62 generates audible sounds which arereceived by the microphone of the microwave hearing genera<strong>to</strong>r 60.In accord<strong>an</strong>ce with the operation described with respect <strong>to</strong> FIGS, 1<strong>an</strong>d 2. microwave signals are generated at the <strong>an</strong>tenna 10 inaccord<strong>an</strong>ce with the redistribution provided by the mode controlmatrix as set forth in FIG. 5. <strong>The</strong> sound source 62 also produces a signalon line 6-4 which is received by a head phone 66. <strong>The</strong> apparatusdepicted in FIG 6 is used <strong>to</strong> calibrate or fit a micro-wave hearinggenera<strong>to</strong>r <strong>to</strong> a particular individual. Once the hearing generater isadjuasted <strong>to</strong> the particular indi-vidual by adjustment of the variableresis<strong>to</strong>rs in the adjustable mode partition portion of the hearing genera<strong>to</strong>r.A second genera<strong>to</strong>r may be built using fixed value resis<strong>to</strong>rs inaccord<strong>an</strong>ce with the adjusted values achieved in fitting the device <strong>to</strong>the particular subject <strong>The</strong> sound produced by headphone 66 shouldhe the same as a sound from the sound source 62 which is received bythe microphone 10 in the microwave hear-ing genera<strong>to</strong>r 60. In this way,261


the subject c<strong>an</strong> make comparisons between the perceived soundfrom the hearing genera<strong>to</strong>r 60. <strong>an</strong>d the sound which is heard fromheadphone 66. Sound source 62 also produces a signal on 68 which isfeed in cue light 69. Cua light 69 comes on whenever a sound isemitted from sound source 62 <strong>to</strong> the microwave genera<strong>to</strong>r 60.A PIECE OF TEXT OMITTED, TEXT NOT READABLEIn Fig. 7 there is shown a modified microwave genera<strong>to</strong>r which maybe used <strong>to</strong> determine a subject's microwave mode frequencies. In thisdevice the acoustic filter b<strong>an</strong>k <strong>an</strong>d the mode control matrix havebeen removed <strong>an</strong>d replaced by voltage level signals generated bypotentiometers 70. Also included ar a plurality of variable frequencyoscilla<strong>to</strong>rs 72 which feed microwave amplifiers 74 which are gaincontrolled from the signal generated by potentiometers 70 <strong>an</strong>d pick offarm 76. This modified microwave hearing genera<strong>to</strong>r is used <strong>to</strong> providesignals using one oscilla<strong>to</strong>r at a timi. When <strong>an</strong> oscilla<strong>to</strong>r is turned on. thefrequency is varried about the estimated value until a maximumacoustic perception by the subject is perceived. This perceptionhowever may consist of a buzzing or hissing sound tat rather th<strong>an</strong> a<strong>to</strong>ne because only one microwave frequencies being received. <strong>The</strong>first test of perception is <strong>to</strong> determine the subject’s lowest modalfrequency for audibility. (M= 1). Once this modal frequency is obtained.<strong>The</strong> process is repeated for several higher modal frequencies <strong>an</strong>dcontinued until no maximum acoustic perception occurs. Anothermethod of determination of a subject’s modal frequencies is through<strong>an</strong>a<strong>to</strong>mical estimation. This procedure is by measurement of thesubject’s cephalic index <strong>an</strong>d the lateral dimensions of the skull. In thismethod, the shape is determined in prolate spheroidal coordin<strong>an</strong>ce.Purely <strong>an</strong>a<strong>to</strong>mical estimation of sub ject’s modal fre-quencies isperformed by first measuring the maximum lateral dimension (breadth)L FIG. 1, of the subject’s head <strong>to</strong>gether with the maximum dimension D(<strong>an</strong>terior <strong>to</strong> Posterior) in the medial pl<strong>an</strong>e of the subject’s head. D is thedist<strong>an</strong>ce along Z axis as shown in FIG. 10. <strong>The</strong> ratio L/D, called in<strong>an</strong>thropology the cephalic index, is mono<strong>to</strong>nically related <strong>to</strong> theboundary value E0 defining the ellipsoidal surface approximating theinterface be-tween the brain <strong>an</strong>d the skull in the prolate spheroidalcoordinate system. E0 defines the shape of this interface; E0 <strong>an</strong>d D<strong>to</strong>gether give <strong>an</strong> estimate of a, the semi-focal dist<strong>an</strong>ce of the definingellipsoid. Using E0 <strong>an</strong>d a, <strong>to</strong>-gether with known values of theconductivity <strong>an</strong>d di-electric const<strong>an</strong>ts of brain tissue, thosewavelengths are found for which the radial component of the electricfield satisfies the boundary condition that it is zero at E0. <strong>The</strong>sewavelengths are the wavelenghts associated wi ith the st<strong>an</strong>ding wavesor modes. <strong>The</strong> corresponding frequencies are found by dividing the262


phase velocity of microwaves in brain tissue by each of thewavelengths A subject’s microwave modal frequencies may also bedetermined by observing the effect of external micro-wave radiationupon the EEG. <strong>The</strong> frequency of the M equal I mode may then be usedas a base point <strong>to</strong> esti-mate all other modal frequencies. A typicalexample of such <strong>an</strong> estimation is where the subject is laterallyirradiated with a monochromatic microwave field simult<strong>an</strong>eous withEEG measurement <strong>an</strong>d the microwave frequency altered until asignific<strong>an</strong>t ch<strong>an</strong>ge occurs in the EEG, the lowest such frequencycausing a signific<strong>an</strong>t EEG ch<strong>an</strong>ge is found. This is iden-tified as thefrequency of the M= 1 mode, the lowest mode of import<strong>an</strong>ce inaudi<strong>to</strong>ry perception. <strong>The</strong> purely <strong>an</strong>a<strong>to</strong>mical estimation procedure(FIGS. 8, 9, 10) is then performed <strong>an</strong>d the ratio of each modalfrequency <strong>to</strong> the M 1 modal frequency obtained. <strong>The</strong>se ratios <strong>to</strong>getherwith the experimentally-determined M - I frequency are then used <strong>to</strong>estimate the frequencies of the mode numbers higher th<strong>an</strong> 1. <strong>The</strong>prolate spheroidal coordi-nate system is shown in FIG. 9. Along thelateral pl<strong>an</strong>e containing the x <strong>an</strong>d y coordinates of FIG. 9. the pro-latespheroidal coordinate variable 4 (<strong>an</strong>gle) liesFIGS. 9 <strong>an</strong>d 10. Plots of the tr<strong>an</strong>sverse electric field amplitude versusprimary mode number m are shown in FIG. 11. <strong>The</strong> equation is<strong>The</strong> “elevation view” FIG. 12, of the brain from the left side, shows theprimary audi<strong>to</strong>ry cortex 10. <strong>The</strong> iso-<strong>to</strong>ne lines <strong>an</strong>d the high frequencyregion are <strong>to</strong>ward the <strong>to</strong>p of 100 <strong>an</strong>d the low frequency region <strong>to</strong>wardthe bot<strong>to</strong>m of 100.<strong>The</strong> formula I, set forth below is the formula for combining modes from<strong>an</strong> iso-<strong>to</strong>ne line at ø= øj being excited <strong>to</strong> obtain the <strong>to</strong>tal modal field atsome other <strong>an</strong>gular location ø. For this formula, if we let J= 1 (just oneiso-<strong>to</strong>ne single frequency acouistic stimulus line), then it c<strong>an</strong> be shownthat ALL modes (in general) must be used for <strong>an</strong>y ONE <strong>to</strong>ne.263


FIG. 13 shows the resulting <strong>to</strong>tal modal field versus <strong>an</strong>gle ø for sourcelocation ø at 5.25°, 12.5°, etc. With reference <strong>to</strong> the set of curves at theleft <strong>to</strong>p of this fig-ure. A spacing of approximately 7.25° in ø’corresponds <strong>to</strong> a <strong>to</strong>nal difference of about I octave. This conclusion isbased on the side-lobes of pattern coming from ø=5.25°, etc. <strong>The</strong> <strong>to</strong>talfiled (value on y-axis) falls con-siderably below the <strong>to</strong>p curves forsource locations well below 5.25° (<strong>to</strong>ward the high acoustic stimulusend) <strong>an</strong>d also as the source of frequency goes wel above 10°frequency end) ø is plotted positive downward from the (at laterallocation as indicates in FIG I 11. Resis<strong>to</strong>r weightings are obtained fromthe (unreadable word) (m[ø -øj]). <strong>Formula</strong> I. <strong>The</strong> scale betweenacoustic frequency <strong>an</strong>d ø must be set or estimated from experiment.Approximately 5.25 ± 1° corresponils <strong>to</strong> a <strong>to</strong>nal stimulus at about 2 khz.(the most sensitive region of the ear) since this source location gives tltehighest electric field amplitude. <strong>The</strong> apparatus of FIG. 7 may also beused <strong>to</strong> deter-mine values for a hearing device which are required fora particular subject. Once the modal frequencies have beenestimated, the device of FIG. 7 which includes variable microwaveoscilla<strong>to</strong>rs may be used <strong>to</strong> deter-mine values for the oscilla<strong>to</strong>rs whichmatch the subject. <strong>an</strong>d <strong>to</strong> determine resist<strong>an</strong>ce values associated withthe mode partition devices of the mode control matrix. In FIG. 7m<strong>an</strong>ual control of the amplifier gain is achieved by potentiometers 76.In this m<strong>an</strong>ner the am-plifier gains are varied about the estimatedsettings ror <strong>an</strong> acoustic <strong>to</strong>ne stimulus in the region of two thous<strong>an</strong>dHertz (2 khz) until maximum acoustic perception <strong>an</strong>d a purest <strong>to</strong>ne areachieved <strong>to</strong>gether. <strong>The</strong> term purest <strong>to</strong>ne may also be described as themost pleasing acoustic perception by the subject. This process may berepeated at selected .frequencies above <strong>an</strong>d below 2 kHz. <strong>The</strong>selected frequencies correspond <strong>to</strong> regions of other acoustic filter264


center frequencies of the subject. When modal frequency (oscilla<strong>to</strong>rfrequency) <strong>an</strong>d gain set values (setting a potentiometer 76) are noted,it is then possible <strong>to</strong> calculate fixed oscilla<strong>to</strong>r frequencies <strong>an</strong>d controlresis<strong>to</strong>r values for the adjusted hearing device for this particular subject.In the event the subject has no prior acoustic experience, that is deaffrom birth, estimated resis<strong>to</strong>r values must be used. Also, a complexacoustic stimulation test including l<strong>an</strong>guage articulation <strong>an</strong>d pairs ofharmonically related <strong>to</strong>nes may be developed <strong>to</strong> maximize the matchof the hearing device parameters for those of this particular subject.Typical components for use in this invention include commerciallyavailable high fidelity microphones which have a r<strong>an</strong>ge of 50 Hz <strong>to</strong> 5kHz with plus or minus 3 dB variation. <strong>The</strong> audio filters <strong>to</strong> be used withthe acoustic filter b<strong>an</strong>k 12 are constructed in a conventional m<strong>an</strong>ner,<strong>an</strong>d have Q values of about 6. <strong>The</strong> filters may also be de- signed with 3dB down points (½ the b<strong>an</strong>dwidth away from the center frequency)occurring at adjacent center frequency locations. <strong>The</strong> diodes 17 in themode control matrix which provide isolation between the modepartition circuits are commercially available diodes in the audio r<strong>an</strong>ge.<strong>The</strong> microwave oscilla<strong>to</strong>rs I through N <strong>an</strong>d the mi-crowave amplifiers 20are constructed with available microwave tr<strong>an</strong>sis<strong>to</strong>rs which c<strong>an</strong> beconfigured either as oscilla<strong>to</strong>rs or amplifiers. Examples of the tr<strong>an</strong>sis<strong>to</strong>rsare GaAsFET field effect tr<strong>an</strong>sis<strong>to</strong>rs by Hewlitt Pack-ard known as theHFET series or silicone bipolar tr<strong>an</strong>-sis<strong>to</strong>rs by Hewlitt Packard known asthe HXTR series. All the cable between the oscilla<strong>to</strong>rs, the microwaveamplifiers, <strong>an</strong>d the <strong>an</strong>tenna should be constructed with either single ordouble shielded coaxial cable. <strong>The</strong> <strong>an</strong>tenna 24 for directingmicrowave signals <strong>to</strong> the audio cortex 26 should be approximately thesize of the audi<strong>to</strong>ry cortex. A typical size would be one <strong>an</strong>d one halfCM high <strong>an</strong>d one half <strong>to</strong> one CM wide. <strong>The</strong> <strong>an</strong>tenna as shown islocated over the left audi<strong>to</strong>ry cor-tex. but the right may also be used.Since the characteristic imped<strong>an</strong>ce of the brain tissue at thesemicrowave frequencies is close <strong>to</strong> 50 ohms, efficient tr<strong>an</strong>smission bycommercially available st<strong>an</strong>dard 30 ohm coax is possible. <strong>The</strong> inventionhas been described in reference <strong>to</strong> the preferred embodiments. It is,however, <strong>to</strong> be under-s<strong>to</strong>od that other adv<strong>an</strong>tages, features, <strong>an</strong>dembodiments may be within the scope of this invention as defined inthe appended claims. What is claimed is: 1. A sound perceptiondevice for providing induced perception of sound in<strong>to</strong> a mammali<strong>an</strong>brain comprising in combination: me<strong>an</strong>s for generating microwaveradiation which is representative of a sound <strong>to</strong> be perceived, saidme<strong>an</strong>s for generating including me<strong>an</strong>s for generat-ing a simult<strong>an</strong>eousplurality of microwave rada-tion frequencies <strong>an</strong>d me<strong>an</strong>s for adjustingthe ampli-tude of said microwave radiation frequencies in accord<strong>an</strong>cewith the sound <strong>to</strong> be perceived; <strong>an</strong>d <strong>an</strong>tenna me<strong>an</strong>s located in theregion of the audi<strong>to</strong>ry cortex of said mammali<strong>an</strong> brain for tr<strong>an</strong>smittingsaid microwave energy in<strong>to</strong> the audi<strong>to</strong>ry cortex-region of said brain.265


2. A hearing device for perception of sounds comprising incombination: me<strong>an</strong>s for generating a signal representative of sounds;me<strong>an</strong>s for <strong>an</strong>alyzing said signal representative of said sounds having <strong>an</strong>outputme<strong>an</strong>s for generating a plurality of microwave signals having differentfrequencies having a input con-nected <strong>to</strong> said output of said me<strong>an</strong>sfor <strong>an</strong>alyzing said signals, having <strong>an</strong> output; me<strong>an</strong>s for applying saidplurality of microwave sig-nals <strong>to</strong> the head of a subject, <strong>an</strong>d wherebythe subject perceives sounds which are representative of said sounds,3. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 2 wherein said me<strong>an</strong>s forgenerating a signal is a microphone for detecting sound waves.4. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 2 wherein said me<strong>an</strong>s forapplying said plurality of microwave signals is <strong>an</strong> <strong>an</strong>tenna. -5. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 4 wherein said <strong>an</strong>tenna isplaced in the region of the audi<strong>to</strong>ry cortex of the subject.6. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 2 wherein the subject is ahum<strong>an</strong> being.7. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 2 wherein said me<strong>an</strong>s for<strong>an</strong>alyzing said signal comprises: <strong>an</strong> acoustic filter b<strong>an</strong>k for dividing saidsounds in<strong>to</strong> a plurality of component frequencies; <strong>an</strong>d a mode controlmatrix me<strong>an</strong>s for providing control signals which are weighted inaccord<strong>an</strong>ce with said plurality of component frequencies, having <strong>an</strong>out-put connected <strong>to</strong> said me<strong>an</strong>s for generating a plurality ofmicrowave signal inputs.8. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 7 wherein said acousticfilter b<strong>an</strong>k includes a plurality of audio frequency filters.9. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 8 wherein said audiofrequency filters provide a plurality of output frequencies havingamplitudes which are a function of said signal representative of sounds.10. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 9 wherein said amplitudesare the weighted in accord<strong>an</strong>ce with tr<strong>an</strong>sform function of the signalrepresentative of sounds.11. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 7 wherein said modecontrol matrix device includes a voltage divider connected <strong>to</strong> each ofsaid plurality of said audio frequency filters.266


12. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim It wherein each of saidvoltage dividers has a plurality of outputs which are connected incircuit <strong>to</strong> said me<strong>an</strong>s for generating a plurality of microwave signals.13. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 2 wherein said me<strong>an</strong>s forgenerating a plurality of miro- wave signals comprises a purality ofmicrowave gener-a<strong>to</strong>rs each having a different frequency <strong>an</strong>d me<strong>an</strong>sfor controlling the output amplitude of each of said genera<strong>to</strong>rs.14. <strong>The</strong> apparattus in accord<strong>an</strong>ce with claims 2 wherein said me<strong>an</strong>sfor generating plurality of micro-wave signals comprises a broad b<strong>an</strong>dmicrowave source <strong>an</strong>d a plurality of filters.15. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 13 wherein saidgenera<strong>to</strong>rs each comprise a microwave signal source <strong>an</strong>d a gaincontrolled microwave amplifier.16. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 13 wherein said me<strong>an</strong>s for<strong>an</strong>alyzing output is connected <strong>to</strong> said me<strong>an</strong>s for controlling microwaveamplifier output amplitudes.17. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 13 wherein <strong>an</strong>alyzingincludes K audio frequency filters.18. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 17 wherein there are Nmicrowave genera<strong>to</strong>r.19. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 18 in-cluding a modepartitioning me<strong>an</strong>s which provides N outputs for each of said K audiofrequency filters.20. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 19 wherein said Namplifiers each have K inputs from said mode partitioning me<strong>an</strong>s.21. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 20 wherein said Namplifiers have K inputs less the mode partitioning me<strong>an</strong>s outputswhich are so small that they may be omitted.22. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 20 wherein said modepartitioning output device outputs each include a diode connected <strong>to</strong>each microwave amplifier gain control <strong>to</strong> provide isolation between alloutputs.23. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 20 wherein said K audiofrequency filters are chosen <strong>to</strong> correspond <strong>to</strong> the critical b<strong>an</strong>dwidths ofthe hum<strong>an</strong> ear.267


24. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 20 wherein said Nmicrowave genera<strong>to</strong>rs are each adjust-able in frequency output.25. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 18 wherein the frequencyof each N microwave genera<strong>to</strong>rs is determined by <strong>an</strong>a<strong>to</strong>micalestimation,26. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 18 wherein the frequencyof the lowest frequency micro.-wave genera<strong>to</strong>r is chosen bydetermination of the effect of external microwave generation on theEEG of the subject.27. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 18 wherein the frequencyof each of said N microwave genera<strong>to</strong>rs corresponds <strong>to</strong> the subject’smicrowave modal frequencies.28. <strong>The</strong> apparatus in accord<strong>an</strong>ce with claim 27 wherein the subject'smodal frequencies are determined by measurement of the subject'scephalic index <strong>an</strong>d the lateral dimensions of the skull.29. <strong>The</strong> apparatus in accord<strong>an</strong>ce with caim 28 wherein the subject'slowest modal frequency is determined hy varying the freqtaency of thelowest frequency microwave genera<strong>to</strong>r about the estimated valtueuntil a maximum acoustic perception is obtained by the subject.(continuation of the Microwave article, which s<strong>to</strong>pped above thearticle titled "Hearing Device").............. In 1989, James C. Lin wrote Electromagnetic Interaction WithBiological Systems which deals with tr<strong>an</strong>smitting ideas <strong>an</strong>d words viaelectromagnetic waves. Brief cases, stereo speakers <strong>an</strong>d boxes aresome of the disguises that the CIA has been caught using <strong>to</strong> hide theirELF microwave emitters that pl<strong>an</strong>t thoughts in people. One victim whospent time talking <strong>to</strong> Fritz Springmeier reported how they had repeatedtried <strong>to</strong> trick him in<strong>to</strong> going <strong>to</strong> free hotel rooms <strong>an</strong>d other traps, wherethey tried <strong>to</strong> bombard his head with the idea that he should sell drugs.He cleverly dism<strong>an</strong>tled their devices which they hid in the ceilings <strong>an</strong>dother locations in these rooms <strong>to</strong> protect himself from the thoughts theywere tryin~ repeatedly <strong>to</strong> beam in<strong>to</strong> his head. He was on the run as afugitive <strong>to</strong> protect his mind. Naval Intelligence <strong>an</strong>d other groups haveconducted research in<strong>to</strong> ELF waves upon the hum<strong>an</strong> body <strong>an</strong>d mind.Some of the m<strong>an</strong>y things that c<strong>an</strong> be done <strong>to</strong> the hum<strong>an</strong> body <strong>an</strong>dmind with ELF waves include:268


a. put a person <strong>to</strong> sleepb. make a person tired or depressedc. create a feeling of fear in a persond. create a zombie statee. create a violent statef. create a state of being sexually aggressive g. ch<strong>an</strong>ge cellularchemistryh. ch<strong>an</strong>ge hormone levelsi. inhibit or enh<strong>an</strong>ce M(RNA) synthesis/processesj. control the DNA tr<strong>an</strong>saction processk. control biological spin <strong>an</strong>d pro<strong>to</strong>n coupling const<strong>an</strong>ts in DNA, RNA &RNA tr<strong>an</strong>sferases.Unfortunately for us hum<strong>an</strong>s, ELF waves c<strong>an</strong> penetrate almost <strong>an</strong>ything.<strong>The</strong> U.S. Military has built a Ground-Wave Emergency Network (GWEN)all over the U.S. with several hundred 300-500’ GWEN <strong>to</strong>wers thatbroadcast a very-low-frequency wave (VLF) for mind-control of theAmeric<strong>an</strong> public. A single GWEN <strong>to</strong>wer c<strong>an</strong> broadcast up <strong>to</strong> 300 milesin a 3600 circle. Plus 8 secret powerfulELF tr<strong>an</strong>smitters have been established <strong>an</strong>d 3 of them operate on thewest coast.PROZAC AND SLAVES AND MICROWAVE TOWERSSome of the Monarch slaves are receiving Prozac. Prozac (fluoxetinehydrocloride-a sero<strong>to</strong>nin re-uptake inhibi<strong>to</strong>r) is d<strong>an</strong>gerous for everyone.Prozac is now the second most used drug in the world. Three examplesof the ongoing nightmare now happening worldwide: September 14,1989--Joseph Wesbecker on Prozac went crazy <strong>an</strong>d got a gun <strong>an</strong>dopened fire in the St<strong>an</strong>dard Gravure Building in Louisville killing eight<strong>an</strong>d wounding twelve others before killing himself. 20 suits against EliLilly were filed by victim in this case. July, 1990--Rhonda Hala of Shirley,NY filed a $150 million suit against Eli Lilly charging that Prozac haddriven her repeatedly <strong>to</strong> attempt suicide. August, 1990--CCHR calledon Congress <strong>to</strong> b<strong>an</strong> Prozac <strong>an</strong>d 3 widows in Louisville, KT filed $50million lawsuits each, charging that a m<strong>an</strong> on Prozac had been driven269


ins<strong>an</strong>e <strong>to</strong> kill by the Prozac <strong>an</strong>d had killed their husb<strong>an</strong>ds. Two otherlawsuits were filed in this time period, one from Indi<strong>an</strong>apolis, <strong>an</strong>d onefrom Chicago from people driven <strong>to</strong> attempt suicide by Prozac.Certain brain activities trigger people on Prozac <strong>to</strong> become homicidalor suicidal. Th<strong>an</strong>ks <strong>to</strong> research by <strong>Illuminati</strong> controlled comp<strong>an</strong>ies, theNetwork knows exactly how <strong>to</strong> used ELF waves vec<strong>to</strong>red on aparticular person by 3 separate <strong>to</strong>wers <strong>to</strong> stimulate the Prozaccontrolled brain <strong>to</strong> murder. This is being used <strong>to</strong> increase acts of<strong>an</strong>archy <strong>an</strong>d violence in order <strong>to</strong> help insure <strong>an</strong>ti-gun legislation. If aslave doesn’t comply or needs <strong>to</strong> be thrown from the Freedom Trainthey c<strong>an</strong> become a useable statistic. Simply trigger them <strong>to</strong> murder<strong>an</strong>d then watch the police gun them down. <strong>The</strong> NWO gains one morestatistic <strong>an</strong>d <strong>an</strong>other case <strong>to</strong> scare the public in<strong>to</strong> accepting guncontrol.THE USE OF WAVES & ELECTRICITY TO IMPLANT THOUGHTS<strong>The</strong> programmers are always trying <strong>to</strong> outdo what they’ve donebefore. <strong>The</strong>y are not satisfied with the old recipes for scrambled brains,they keep inventing <strong>an</strong>d refining new methods. Anything <strong>an</strong>deverything within their grasp has been tried. <strong>The</strong>y have found that ELF<strong>an</strong>d VLF electro-magnetic waves c<strong>an</strong> be used <strong>to</strong> control people’sthoughts. Harmonics <strong>an</strong>d sound waves are used <strong>to</strong> m<strong>an</strong>ipulate theRNA covering of neuron pathways <strong>to</strong> the subconscious. Harmonicgenera<strong>to</strong>rs (code named “ether-wave”) are able <strong>to</strong> imbed detailedcomm<strong>an</strong>ds which are linked <strong>to</strong> audible triggers. This is one of thest<strong>an</strong>dard features of the Monarch program. It allows the slaves <strong>to</strong> becontrolled by trigger words which make no sense or seem <strong>to</strong> carry nonegative connotation <strong>to</strong> outside listeners. For inst<strong>an</strong>ce the words, “Mr.Postm<strong>an</strong> wait <strong>an</strong>d see” (a Marionette comm<strong>an</strong>d) might set off <strong>an</strong>access sequence so that a slave living away from its master goes <strong>to</strong> itsmaster (also called a h<strong>an</strong>dler). <strong>The</strong> use of harmonics has taken awaymuch of the work of the big programmers. Now harmonic machinesc<strong>an</strong> impl<strong>an</strong>t the programming <strong>an</strong>d codes that the Programmers put in.It’s quicker <strong>an</strong>d perhaps more efficient, although the lesser cult groupshave <strong>to</strong> get by with the older methods. And the <strong>Illuminati</strong> still havem<strong>an</strong>y excellent programmers in full-time <strong>an</strong>d part-time use. According<strong>to</strong> <strong>an</strong> eyewitness, their <strong>to</strong>p-programmers are far beyond their 1950-60predecessors like Mengele. <strong>The</strong>re are four types of brain waves: alpha,beta, delta, <strong>an</strong>d theta. <strong>The</strong> four basic models of Monarch slaves havethe same names as these four types of brain waves. High level <strong>Illuminati</strong>models may have programming that includes all of these types.According <strong>to</strong> one ex(?)-government source, the CIA has been labelingtheir harmonic-created <strong>to</strong>tal <strong>Mind</strong>-controlled slaves by the following:270


Bravo 2 series models are men programmed <strong>to</strong> run the Beastcomputers.Delta series are models for espionage <strong>an</strong>d assassination.Juliet series are sexual mind controlled slaves. Kilo 5 series is militaryespionage.Michael 1 series slaves are CIA agents under <strong>to</strong>tal mind-control.Operation Greenstar was the <strong>Mind</strong>-control project <strong>to</strong> create UFOabductions scenarios.Much of the high level programming in the 1980s <strong>an</strong>d 1990s is no longerdone with hum<strong>an</strong> programmers, but is done via programmedmachines using drugs, electricity <strong>an</strong>d harmonics.TRACKING / I.D. IMPLANTSA great deal has come out in a whole number of Christi<strong>an</strong> books, aswell as secular books about the microchips that are being impl<strong>an</strong>ted inboth people <strong>an</strong>d <strong>an</strong>imals. <strong>The</strong>se microchips will do m<strong>an</strong>y things,depending upon which type of microchip they are, however, some ofthese microchips emit coded signals which allow satellites withcomputers <strong>to</strong> track the exact location of the person or <strong>an</strong>imal carryingthe chip. Obviously, a <strong>Mind</strong>-controlled slave is not going <strong>to</strong> have thefreedom <strong>to</strong> reject a chip like this. This gives the owner a method fortracking the slave should they ever escape <strong>to</strong> their exact location.M<strong>an</strong>y of the slaves, CIA agents, <strong>an</strong>d military men have these impl<strong>an</strong>tsalready. M<strong>an</strong>y Desert Shield troops (<strong>to</strong> make sure they weren’t lost inthe desert) were required <strong>to</strong> get the tracking impl<strong>an</strong>ts. Some county’sare making it m<strong>an</strong>di<strong>to</strong>ry for pets <strong>to</strong> get tracking impl<strong>an</strong>ts.MONITORING IMPLANTSAs I write this, I have the report “An eight ch<strong>an</strong>nel micropoweredPAM/FM biomedical telemetry system” written by the Space BiologyLab/Brain Research Institute of the UCLA Center for Health Sciences, ofLos Angeles, California 90024. What they are reporting on is <strong>an</strong> impl<strong>an</strong>twhich will electronically report back what is going on with a person’s271


ody <strong>to</strong> whoever is moni<strong>to</strong>ring the person. <strong>The</strong>ir “biotelemeter” consistsof a signal conditioner(s), multiplexer (for multich<strong>an</strong>nel systems), <strong>an</strong>d atr<strong>an</strong>smitter. <strong>The</strong> entire size of the impl<strong>an</strong>t is 6.35 cm. by 0.97 cm thick.EEG moni<strong>to</strong>ring is being done of free-swimming divers by impl<strong>an</strong>ts. Afrequency of 2300 Hz. was used on the first underwater moni<strong>to</strong>ringdevices.COMMUNICATION IMPLANTSFirst, we will give <strong>an</strong> overview of the subject <strong>an</strong>d then we will cover thedetails of how the technology works. In the Bible it predicts that in theend of church age that the rulers of the world “<strong>The</strong>se have one mind,<strong>an</strong>d shall give their power <strong>an</strong>d strength un<strong>to</strong> the Beast” REV 17:13.Robert Muller, a member of the <strong>Illuminati</strong>, <strong>an</strong>d former Assist<strong>an</strong>tSecretary General of the UN, who has been involved in setting up a“Peace University” in Costa Rica, said in a symposium “Toward aGlobal Brain, Our Next Evolutionary Step” (Nov. 9-11, 1984, “We arebeginning <strong>to</strong> link <strong>to</strong>gether <strong>to</strong> form one-world, minds <strong>an</strong>d souls. Let go ofour own beliefs - crap stuff. We st<strong>an</strong>d now at the threshold of the firstspiritualization of hum<strong>an</strong>ity. -<strong>The</strong> goal of having a single “World <strong>Mind</strong>” isbeing advocated by people tied <strong>to</strong> the <strong>Illuminati</strong> <strong>an</strong>d the New AgeMovement they have created. In the New Age book Gods of Aquariusthe author advocates, “<strong>The</strong> only viable solution is <strong>to</strong> link the brains of allmen in<strong>to</strong> one gi<strong>an</strong>t super brain. It has been the entire species thathave been developing <strong>an</strong>d it must be linked in<strong>to</strong> one super being. Asynthesis of hum<strong>an</strong> minds in a world brain.” Hollywood put out a moviein 1970 called Colossus-<strong>The</strong> Forbin Project which shows how theultimate computer will dominate the minds of men. Unfortunately, the<strong>Illuminati</strong> now have the capability via their fronts <strong>to</strong> impl<strong>an</strong>t tr<strong>an</strong>smittersthat will communicate messages <strong>to</strong> the hum<strong>an</strong> brain that are receivedvia computers. <strong>The</strong> ability <strong>to</strong> literally have a single World Brain is withinthe grasp of the elite. <strong>The</strong>y must now simply figure out methods <strong>to</strong>accomplish it. All this New Age talk by world leaders like Robert Mullerabout a single World <strong>Mind</strong> is not hot air. Unfortunately, the technologyis here already. Will hum<strong>an</strong>ity s<strong>to</strong>p the secret elite, or will hum<strong>an</strong>itycontinue <strong>to</strong> slide in<strong>to</strong> deeper slavery?CIA programmer/researcher Professor Delgado wrote in PhysicalControl of the <strong>Mind</strong> in 1969 that, “Brain tr<strong>an</strong>smitters c<strong>an</strong> remain in aperson’s head for life. <strong>The</strong> energy <strong>to</strong> activate the brain tr<strong>an</strong>smitter istr<strong>an</strong>smitted by way of radio frequencies.” <strong>The</strong> radio frequencies used<strong>to</strong> tr<strong>an</strong>smit <strong>to</strong> brain impl<strong>an</strong>ts are usually from 15 <strong>to</strong> 35 KHz. Radiofrequency <strong>an</strong>alyzing computers hooked up <strong>to</strong> computers havecharted the radio frequencies being used <strong>to</strong> tr<strong>an</strong>smit <strong>to</strong> victims withimpl<strong>an</strong>ts. (See Mediaeko Investigating Reporting Group. Brain272


Tr<strong>an</strong>smitters What <strong>The</strong>y Are <strong>an</strong>d How <strong>The</strong>y Are <strong>Used</strong>. 1993, pg. 8.) <strong>The</strong>use by h<strong>an</strong>dlers of Frequency shift signals, which is a special way ofmodulating through a given spectrum of frequencies, has beenobserved <strong>an</strong>d recorded. Some of the first brain tr<strong>an</strong>smitters looked likebullets <strong>an</strong>d were placed in<strong>to</strong> the victim’s brain via the nose. In the late1960s, some of the tr<strong>an</strong>smitters were simply swallowed, or carriedexternally by the victim. Small wires imbedded behind the ears are oneof the impl<strong>an</strong>ts. Sometimes impl<strong>an</strong>ts are placed within thepain/pleasure center of the brain, which allows the h<strong>an</strong>dler <strong>to</strong>m<strong>an</strong>ipulate what feels great or what feels painful. <strong>The</strong> Intelligenceagencies have given their impl<strong>an</strong>ts a whole variety of names. Some ofthese names for brain impl<strong>an</strong>ts are:EDOM -- Electronic Dissolution of MemoryEEOM--Electronic Enh<strong>an</strong>cement of MemoryESB --Electronic Stimulation of the brainRHIC -- Radio Hypnotic Intra-cerebral ControlTerms that accomp<strong>an</strong>y these techniques include:PREMA--Personal Radio & Electro-Magnetic Frequency Allocation. Thisis <strong>an</strong> individual’s personal frequency which is sc<strong>an</strong>ned by a h<strong>an</strong>d-helddevice (such as a Reading W<strong>an</strong>d). PRIME FREAK--This is the PrimaryFrequency of <strong>an</strong> individual, which the intelligence agencies will obtain<strong>an</strong>d then m<strong>an</strong>ipulate <strong>to</strong> control <strong>an</strong> individual.VITAL HUMAN BRAIN FREQUENCY-- This is a frequency that is vital forhum<strong>an</strong>s, (the 800 MHz b<strong>an</strong>d) which is m<strong>an</strong>ipulated for mass mindcontrol.In 1978, Samuel Chavkin warned in his book <strong>The</strong> <strong>Mind</strong> Stealers“With the increasing sophistication <strong>an</strong>d miniaturization of electronics, itmay be possible <strong>to</strong> compress the necessary circuitry for a smallcomputer in<strong>to</strong> a chip that is impl<strong>an</strong>table subcut<strong>an</strong>eously. In this way,the new self-contained instrument could be devised, capable ofreceiving, <strong>an</strong>alyzing <strong>an</strong>d sending back information <strong>to</strong> the brain,establishing artificial links between unrelated cerebral areas, functionalfeedbacks, <strong>an</strong>d programs of stimulations contingent on theappear<strong>an</strong>ce of predetermined wave patterns.” Since Chavkin wrotethis in 1978, the Network has come a long ways on miniaturization <strong>an</strong>dsophistication of their impl<strong>an</strong>ts. One of the most import<strong>an</strong>t end timescommunications systems of the <strong>Illuminati</strong> <strong>an</strong>d their intelligenceagencies is their ALEX system. This will operate on several levels. <strong>The</strong>electronic end of the ALEX system which st<strong>an</strong>ds for Amalgamated273


Logarithmic Encrypted Tr<strong>an</strong>smission (ALEX) is a method for encryptingelectronic tr<strong>an</strong>smissions so that a computer which could decode 5Trillion codes a second would take 2,000 years <strong>to</strong> decipher one of thesetr<strong>an</strong>smissions. In other words, when the ALEX system is operating--itc<strong>an</strong>not be decoded. <strong>The</strong> ALEX system has 700 Billion Trillion codes! Yes,the intelligence agencies/<strong>Illuminati</strong> have really outdone themselveswith overkill on this one! By the way, this is very ULTRA secret. <strong>The</strong> ALEXsystem intersects with the Monarch <strong>Mind</strong> Control Programming. <strong>The</strong>ALEX (also called ALEXUS) is part of the tracking <strong>an</strong>d AntiChrist-Call-Back Programming. Outside computers are able <strong>to</strong> interconnect withthe Monarch <strong>Mind</strong> Control slave <strong>an</strong>d call them back for AntiChristactivities. In other words, the Council of 9 of the <strong>Illuminati</strong> has placed<strong>an</strong> alter by the name of Alex or a similar name in high level slaves <strong>an</strong>dthey have either via impl<strong>an</strong>ts or some other type of programmingmade these slaves available for programming via electroniccommunications that tie in with their ALEX computers. (Fritz Springmeier<strong>to</strong>uched on this AntiChrist programming in his “Chapter 3 <strong>Mind</strong> Control”monograph in 1992, when he mentioned Imperial conditioning.)Actually Imperial <strong>an</strong>d Emperor programming are programs that work inconjunction with the ALEX system.All the police in this nation are <strong>to</strong> have their communicationsencrypted by Christmas, 1995 in time for the start of the most intenseperiod of <strong>an</strong>archy. <strong>The</strong> concentration camps, FEMA, FDIC, <strong>an</strong>d the allthe rest of the acronym monsters are switching over <strong>to</strong> the secre<strong>to</strong>perational frequencies which this paragraph will now provide you. Thiswill be 912 meg. <strong>to</strong> 954 meg. using either or both the ALEX or GeneralDynamic scrambles. Mo<strong>to</strong>rola is providing the hardware. In otherwords, when the most intense period of <strong>an</strong>archy <strong>an</strong>d arrests begins, theNew World Order (Big Brother) will have electronic tr<strong>an</strong>smissioncapabilities which will be <strong>to</strong>tally secret. Even police tr<strong>an</strong>smissions whichc<strong>an</strong> be listened <strong>to</strong> now by the bad guys will no longer receivable. <strong>The</strong><strong>Illuminati</strong> have been saving their best technology for use during theirtakeover in the next few years. Impl<strong>an</strong>ts within slaves are being used <strong>to</strong>communicate such thoughts as (actual samples of things sent):a. “murder your family”b. “the government is <strong>to</strong> blame, murder the President”c. “you c<strong>an</strong> not get legal redress for what has been done <strong>to</strong> you by thegovernment”d. “it is hopeless <strong>to</strong> fight us”e. “you w<strong>an</strong>t <strong>to</strong> have sex with the opposite sex” f. “you w<strong>an</strong>t <strong>to</strong> deal indrugs”274


g. “you w<strong>an</strong>t <strong>to</strong> protect your country by being loyal <strong>to</strong> the CIA”Since the early 1960s, the Intelligence agencies have been puttingtwo-way radio communication impl<strong>an</strong>ts in<strong>to</strong> victims. This is calledtelemetry or remote control. <strong>The</strong> radio wave enters the impl<strong>an</strong>t, theimpl<strong>an</strong>t tr<strong>an</strong>smits it <strong>to</strong> the brain, <strong>an</strong>d the brain’s reaction is then pickedup <strong>an</strong>d relayed back <strong>to</strong> a computer which decodes what the brainwaves show the brain was thinking. <strong>The</strong>se impl<strong>an</strong>ts in the early ‘60swere half the size of a cigarette filter. A few of victims have m<strong>an</strong>aged<strong>to</strong> escape the control of the System <strong>an</strong>d get x-ray pictures of theimpl<strong>an</strong>ts <strong>an</strong>d then have them removed. One victim in this Portl<strong>an</strong>darea has tried for years <strong>to</strong> find a legitimate surgeon <strong>to</strong> remove theimpl<strong>an</strong>t. Liquid crystals are said by some <strong>to</strong> be used. It is said that theliquid crystals are impl<strong>an</strong>ted <strong>to</strong> function as tr<strong>an</strong>smitters. Others say thatthe liquid crystals were tried <strong>an</strong>d were lethal.ASSESSORIESIt was discovered that if a strobe is flashed in<strong>to</strong> the eyes at tencycles/per sec. or 10 hertz (hz), the brain will retuned itself <strong>to</strong> thatfrequency. <strong>The</strong> brain will downshift from a beta state of consciousnessdown <strong>to</strong> <strong>an</strong> alpha or below. <strong>The</strong> entire cortex is influenced by thestrobe light. Actually, this was just a rediscovery of what some of the<strong>an</strong>cients had discovered. Flashing lights have been used by people <strong>to</strong>go in<strong>to</strong> altered states for a long time. P<strong>to</strong>lemy, the famous <strong>an</strong>cientGreek astronomer built a wheel that would flash sunlight, <strong>an</strong>d peoplewould stare at this contraption <strong>an</strong>d go in<strong>to</strong> <strong>an</strong> altered state. As withm<strong>an</strong>y inventions, they c<strong>an</strong> be used for good or bad. <strong>The</strong> followingmachines are things that <strong>an</strong>yone c<strong>an</strong> purchase, just like a stun gun or acattle prod. An array of mind-altering electronic devices have beencreated over the last few decades. Personal light-<strong>an</strong>d-sound machinesthat alter the brain’s consciousness that were once $60,000 dollars arenow a few hundred. <strong>The</strong>y have goggles that fit over a person’s eyes.<strong>The</strong> Synchro Energizer, which requires a trained opera<strong>to</strong>r <strong>to</strong> run itscontrol p<strong>an</strong>el, is a machine <strong>to</strong> electronically alter the brain’sconsciousness with a sound <strong>an</strong>d light show. Nine lights work via thegoggles <strong>to</strong> give a light show <strong>to</strong> alter the brain’s wave pattern. It is soldby Synchro-Tech of Clevel<strong>an</strong>d via Syncho Energize on Broadway, NY.An opera<strong>to</strong>r c<strong>an</strong> start the Synchro Energizer at the brain’s high betawaves <strong>an</strong>d then takes the wave pattern downward through the alpha,<strong>an</strong>d then <strong>to</strong> the theta <strong>an</strong>d sometimes in<strong>to</strong> the delta (the sleep state).<strong>The</strong>re are smaller machines designed <strong>to</strong> do the same thing, such as the275


Relaxm<strong>an</strong>, built by Synchro-Tech. Comptronic Device Ltd. has put out asimilar but superior machine called D.A.V.I.D.Jr. It c<strong>an</strong> place a personin<strong>to</strong> a deep delta wave sleep. <strong>The</strong>se are just what are available <strong>to</strong> thepublic. Imagine what NASA, the NSA, <strong>an</strong>d CIA have. If one needs <strong>to</strong>work with more th<strong>an</strong> one person, the Synchro-energizer ($60,000) alsobuilt by Synchro-Tech will place 32 people at the same time in<strong>to</strong>altered states of consciousness. This machine uses full-spectrum lights <strong>to</strong>ch<strong>an</strong>ge the brain’s state of consciousness. <strong>The</strong> Lumatron machine usesstrobe lights that c<strong>an</strong> be set <strong>to</strong> eleven different frequencies. When thelight is directed through the retina it is converted <strong>to</strong> <strong>an</strong> electrical nerveimpulse called a pho<strong>to</strong>current. Eventually, the pho<strong>to</strong>current passesthroughout the entire brain. Genesis is a machine which measures thebrain’s responses <strong>an</strong>d then matches music <strong>to</strong> that response. Hospitals<strong>an</strong>d corporations have been purchasing Genesis machines. <strong>The</strong>Twilight Learning Device is a bio-feedback machine that has <strong>an</strong> EEGmachine hooked up <strong>to</strong> two tape recorders.<strong>The</strong>re are dozens of technical articles on a whole host of subjectsrelating <strong>to</strong> the impl<strong>an</strong>ts. This is a vast subject that really needs its ownbook. FOR FURTHER STUDY of the big SUBJECT of IMPLANTS the reader isdirected for starts <strong>to</strong> the FOLLOWING ARTICLES: ‘Scotl<strong>an</strong>d on Sunday, 2April 1995, had <strong>an</strong> article about how U.S. <strong>an</strong>d Swedish scientists havepioneered a method <strong>to</strong> graft neurons <strong>to</strong> a computer chip. St<strong>an</strong>fordUniversity, CA helped with this. A person c<strong>an</strong> now be “hot-wired” <strong>to</strong> acomputer, such as Arnold Schwartzenegger in the film <strong>Total</strong> Recall. ·LATimes, 8/17/94, article about the Hughes Identification Device which isa tracking impl<strong>an</strong>t (microchip) which is called SmartDevice. 6million/per year are pl<strong>an</strong>ned <strong>to</strong> be quietly inserted in<strong>to</strong> people duringsurgery. ‘In a recent article “Alien-Hum<strong>an</strong> Interactions: the Facts <strong>an</strong>dPropag<strong>an</strong>da” by Karla Turner, she points out that m<strong>an</strong>y alienabductees (like herself) are “moni<strong>to</strong>red <strong>an</strong>d harassed by hum<strong>an</strong>agents of some sort <strong>an</strong>d the cases of phone <strong>an</strong>d mail surveill<strong>an</strong>ce areonly part of the s<strong>to</strong>ry.... He was compelled by some post-hypnoticsuggestion.. .there is strong external evidence that these events havebeen carried out by strictly hum<strong>an</strong> agents <strong>an</strong>d not by aliens giving theillusion of a military presence.” She goes on <strong>to</strong> explain about theimpl<strong>an</strong>ts, wires & tubes that are put in victims of “alien abductions”.Karla Turner doesn’t know that she is a victim of trauma-based mindcontrol, but she’s getting close <strong>to</strong> underst<strong>an</strong>ding what she has beensubjected <strong>to</strong>. ‘<strong>The</strong> Journal, Alex<strong>an</strong>dria, VA, Nov. 8, 1995, carried a s<strong>to</strong>ry“Surgeon, a UFO buff operated <strong>an</strong>d found...” <strong>The</strong> s<strong>to</strong>ry was by SteveChawkins of the Scripps Howard News Service. <strong>The</strong> article talks about aVentura, CA surgeon who has removed impl<strong>an</strong>ts from abductionvictims. <strong>The</strong> impl<strong>an</strong>ted items that are removed from victims, disappearwhen sent in for tests <strong>to</strong> determine what they are.>·Relev<strong>an</strong>ceMagazine-art. on Beh. Mod. impl<strong>an</strong>ts. >·Forte<strong>an</strong> Times #83, Oct.-Nov.‘95 article on Russia’s mind control called PIS which is similar <strong>to</strong>276


America’s. Barry Karr of the Center for Scientific Investigation of Claimsof the Par<strong>an</strong>ormal states, “We haven’t heard of <strong>an</strong>ything that, withoutthe shadow of a doubt, couldn’t have been made here on Earth. Let’ssee the evidence.” It is clear that some people are now realizing thatthese impl<strong>an</strong>ts are being placed in<strong>to</strong> people by hum<strong>an</strong> slave owners,who simply are hypnotically telling their slaves that they are aliens. IBMbeg<strong>an</strong> work on the impl<strong>an</strong>table microchips under the cover of othergoals. In the 1960s G.E. <strong>to</strong>ok over the development. Honeywellcontinued the work after they merged. <strong>The</strong> R2E Division of the cIIiHoneywell Bull in Fr<strong>an</strong>ce has then gone on <strong>to</strong> develop the Smart card.Lithium batteries in impl<strong>an</strong>ts were secretly being used in the 1 960s longbefore the public got wind. Fairchild has publicly <strong>an</strong>nounced severalyears ago that they have a bio-chip the size of a hum<strong>an</strong> hair with 4times the capacity of the BT952000 project. <strong>The</strong>se are some of thecomp<strong>an</strong>ies who have provided the Network with a large assortment ofimpl<strong>an</strong>table chips.IN SUMMARYElectro shock is used <strong>to</strong> control a slave <strong>an</strong>d <strong>to</strong> erase memory. Stun gunsare used daily on some slaves. Slaves are under so much control thatthey will shock themselves if the master w<strong>an</strong>ts them <strong>to</strong>.Equipment has been developed <strong>to</strong> alter states of consciousnesselectronically, <strong>an</strong>d also <strong>to</strong> track, <strong>an</strong>d moni<strong>to</strong>r slaves. <strong>The</strong> most seriousdevelopment in electronics for mind-control is their ability with hightech equipment <strong>to</strong> actually place thoughts in<strong>to</strong> a persons mind.Harmonic machines (given code-names) are now being used <strong>to</strong> dolots of the programming. Powerful individual & mass-mind control c<strong>an</strong>take place via electronic me<strong>an</strong>s; our question, who will control thecontrollers of these electronic me<strong>an</strong>s? So far the Americ<strong>an</strong> & Europe<strong>an</strong>people have been content <strong>to</strong> let them get by with what they havedone.277


CHAPTER 7THE SCIENCE OF STRUCTURINGA. STRUCTURING OF MPD WORLDS<strong>The</strong> purpose of the mind-control is <strong>to</strong> build a System within the mindthat is a hum<strong>an</strong> robot. It would do no good <strong>to</strong> <strong>to</strong>rture the slave <strong>an</strong>d getthous<strong>an</strong>ds of pieces (fragments of the mind, alter personalities) if thesewere not structured. Very few Multiples have ever really gotten <strong>to</strong> seethe deeper parts of their Systems. M<strong>an</strong>y of the early successes oftherapists were actually only the integration of the fronts of Systems,278


while the deeper cult parts were left fully functioning. <strong>The</strong> integration ofthe front alters was only a ruse <strong>to</strong> allow the therapist <strong>to</strong> think the patientwas healed. <strong>The</strong> <strong>Illuminati</strong>’s org<strong>an</strong>ization, whose identity still remainssecret <strong>to</strong> the therapist, c<strong>an</strong> continue <strong>to</strong> use the ‘healed” patient.Everyone was happy, therapist, client, <strong>an</strong>d the abusers.Also I might add the book publishers such as those who published Sybilare also happy. Sybil is <strong>an</strong> occult first name--but the book, movie <strong>an</strong>dtherapist give no hint that ritual abuse might be involved in her system’sMPD (DID). <strong>The</strong> victim of When Rabbit Howls (a book & a movie) showsclear signs of having a full-blown highly structured <strong>an</strong>d programmedMPD (DID) system, but the movie doesn’t even hint of programming orSat<strong>an</strong>ic involvement. <strong>The</strong> whole movie was a big slide. <strong>The</strong> <strong>Illuminati</strong>know the details <strong>an</strong>d minutiae of every new direction the therapeuticcommunity decides <strong>to</strong> take. Indeed, a number of their people areleading the pack, providing leads <strong>an</strong>d misleads. <strong>The</strong>ir first goal is <strong>to</strong>keep therapists on sideroads, away from the real issues. <strong>The</strong> secondgoal is, if they do get on<strong>to</strong> something, <strong>to</strong> bring the slaves in, <strong>an</strong>dstructure in defenses so that the therapists don’t go <strong>an</strong>ywhere. Andthen when one has success like we have seen, they eliminate frontstructures <strong>an</strong>d front alters, <strong>an</strong>d turn <strong>to</strong> massive reprogramming, <strong>an</strong>dskillfully linking primal traumas with the new programs. Bear in mind, theinternal programming alters are also always alert <strong>an</strong>d will restructurethe system const<strong>an</strong>tly if alters work against their programming.Restructuring is a process that c<strong>an</strong> continually go on, not somethingcompleted when the victim was a child. For inst<strong>an</strong>ce, new levels ofalters c<strong>an</strong> <strong>an</strong>d are created when the victim is in their 30s, either by theinternal or external programmers. From observations, it is clear that themost drastic ch<strong>an</strong>ges are from the external programmers, who c<strong>an</strong>work much faster th<strong>an</strong> the internal programmers. In the beginning, theprogrammer must bring order out of the chaos he has created. Hemust use some type of structure <strong>to</strong> place worlds. In recent years, thesehave been solar systems, galaxies, <strong>an</strong>d pl<strong>an</strong>ets, because they havegone <strong>to</strong> Star Trek, Star Wars, Alien types of programming. Each pl<strong>an</strong>etmay have a type of alter--a family, if you will, of alters who are similar.<strong>The</strong>y will not be able <strong>to</strong> travel <strong>to</strong> other solar systems, or stars, or galaxieswithout tr<strong>an</strong>sportation. Spaceships, <strong>an</strong>d teleporters have now replacedthe eleva<strong>to</strong>r that the older systems used <strong>to</strong> go up <strong>an</strong>d down the worlds.When the programming begins, it must be simple enough that a childc<strong>an</strong> underst<strong>an</strong>d it. One game that was excellent <strong>to</strong> teach internalstructures <strong>to</strong> child victims was Chinese checkers. An innocent game,but a great vehicle <strong>to</strong> communicate placement of alters <strong>an</strong>dstructures. Alter patterns would be placed upon the hexagram boardwith marbles. A marble would represent <strong>an</strong> alter. Notice that altercolors (<strong>an</strong>d/or jobs) c<strong>an</strong> be coded by what marble is chosen. A rubyalter c<strong>an</strong> be a red marble. A blue coded alter is a blue marble.Structures which are <strong>to</strong> be superimposed upon each other in the child’smind, are easy <strong>to</strong> superimpose. Take one pattern - of marbles off, <strong>an</strong>d279


place the superimposed pattern of marbles over the same place. This ishow several different structures c<strong>an</strong> be tied <strong>to</strong>gether in one locality inthe mind. This is one way structures c<strong>an</strong> be layered in. <strong>The</strong> Hexagramchecker board was called “<strong>The</strong> House of David” in one victim.B. THE CREATION OF ROLES INTERNAl, EXTERNAL, DEPENDENCE, ETC.M<strong>an</strong>y splits in the mind are not developed in<strong>to</strong> full blown personalities.Some are simply fragments which are given a single job assignment.Generally, a System will have about half a dozen alters whichfrequently take the body <strong>an</strong>d hundreds of alters which onlyoccasionally take the body. -Internally, the System must carry out thefollowing functions: Protect all information <strong>an</strong>d his<strong>to</strong>ry that relates <strong>to</strong>the creation <strong>an</strong>d use of the slave. All the structuring <strong>an</strong>d codes of theSystem are also secrets <strong>an</strong>d need <strong>to</strong> be guarded. <strong>The</strong> programming<strong>an</strong>d the very things that the slave c<strong>an</strong> think about need <strong>to</strong> beguarded. <strong>The</strong> slave is me<strong>an</strong>t <strong>to</strong> be entirely self-governing. <strong>The</strong> best bossis the boss who gives a directive <strong>an</strong>d c<strong>an</strong> go do something else whilethe person receiving the order carries it out without input <strong>an</strong>dsupervision. <strong>The</strong> Monarch slave is the prime example of how <strong>to</strong>delegate authority. <strong>The</strong> delegation of authority allows both the master<strong>an</strong>d the victim himself <strong>to</strong> blame the victim for the orders they carry out.<strong>The</strong> sat<strong>an</strong>ic cults will hide their alters which make money for the cultbehind the blood <strong>an</strong>d gore alters. This protects their illegal moneymaking operations. Alters must learn <strong>to</strong> function as designed by theProgrammer. If they c<strong>an</strong>’t work <strong>to</strong>gether, the <strong>Illuminati</strong> will try <strong>to</strong> getthem <strong>to</strong> work <strong>to</strong>gether somewhat akin <strong>to</strong> a mech<strong>an</strong>ic fixing a car. If thealters c<strong>an</strong>’t be fixed, they <strong>an</strong>d their System will have <strong>to</strong> be thrownaway. <strong>The</strong> dramatic disparities of all the alters goes h<strong>an</strong>d in h<strong>an</strong>d withwhat at first seems apparent, then not apparent, <strong>an</strong>d then apparentagain--there is a unity beneath the multiplicity. Alter functions <strong>an</strong>dabilities overlap with other alters. No alter is entirely separate fromseveral common pools of intellect <strong>an</strong>d dispositions that are attributable<strong>to</strong> the entire alter system. Alters are real <strong>an</strong>d separate persons. But thecommon traits that run through <strong>an</strong> alter system are also real. One altersystem may have a streak of kindness <strong>an</strong>d gentleness that runs throughthe entire system. <strong>The</strong>re may be a few alters which have beenbattered enough not <strong>to</strong> display the trait, but the trait is so pervasivethat it characterizes the System. <strong>The</strong> programmers are also skilled atbuilding in alters who c<strong>an</strong> serve as bal<strong>an</strong>cing points. Unless the systemof alters has bal<strong>an</strong>cing point alters who are calm, cheerful, <strong>an</strong>demotionally stable, a system could easily self-destruct with all theshatteredness, pain <strong>an</strong>d craziness that has been intentionally built in<strong>to</strong>the system. Each level or world will have a bal<strong>an</strong>cing point. When theSystem is being charted during the early programming process, aMother of Darkness <strong>an</strong>d the Programmer <strong>an</strong>d the Gr<strong>an</strong>de Dame will280


make a decision on how <strong>to</strong> label the chart. By the time the child is four,the weaknesses <strong>an</strong>d strengths that characterize the alter System havebeen recorded on charts <strong>an</strong>d the child’s destiny in life determined. <strong>The</strong>chart will read what occupation the child will be made in<strong>to</strong>, <strong>an</strong>d whatits function for the overall <strong>Illuminati</strong> pl<strong>an</strong> will be. This determines whattypes of programs <strong>an</strong>d alters must be created. Most people are stillunfamiliar with multiplicity <strong>an</strong>d their rigid thinking is challenged by theconcept that one mind c<strong>an</strong> have several personalities. On the otherh<strong>an</strong>d, they c<strong>an</strong> underst<strong>an</strong>d perfectly that a computer c<strong>an</strong> wall offsections of memory, <strong>an</strong>d they c<strong>an</strong> underst<strong>an</strong>d perfectly that a singlehum<strong>an</strong> mind is superior <strong>to</strong> all the computers in the world assembled<strong>to</strong>gether, <strong>an</strong>d yet they c<strong>an</strong>’t let go of their basic simplistic foundationalunderst<strong>an</strong>ding of life that one mind has only one personality. <strong>The</strong>y willallow a computer this ability but not the hum<strong>an</strong> mind. <strong>The</strong> creation ofmultiple personalities also divides responsibility within a person. Aperson who lives with a multiple, say for inst<strong>an</strong>ce their h<strong>an</strong>dler, will formwidely divergent relationships with the different alters. In terms ofprogramming, each dissociated fragment of the mind may be moldedin<strong>to</strong> something. Some fragments lend themselves <strong>to</strong> be molded in<strong>to</strong> fullpersonalities, <strong>an</strong>d some lend themselves in<strong>to</strong> being molded in<strong>to</strong> singlepurposefragments, <strong>an</strong>d some must be discarded. A part of the mindc<strong>an</strong> be developed in<strong>to</strong> a full-blown independent personality with allthe idiosyncracies that <strong>an</strong>y other person has. Bear in mind, thatgenerally the Programmers consider color identification <strong>an</strong>d the codednumbers <strong>to</strong> be more critical for identifying <strong>an</strong> alter th<strong>an</strong> a name. Aname hum<strong>an</strong>izes the alter. Names are sometimes attached later ifneeded by a h<strong>an</strong>dler. Some h<strong>an</strong>dlers simply refer <strong>to</strong> their sexual altersby their generic name “kitten”. Others may have a specific cat namesuch as “Tabby”, “Bast”, “Hecat”, “Ad<strong>an</strong>dara” or “the Lion of Judah”for <strong>an</strong> alter. Keep in mind, if full blown personalities are created, ithappens for both the benefit of the victim AND the programmers.During the Monarch Programming <strong>an</strong> average System will have at least1,000 alters, but not all of these will be personalities designed <strong>to</strong> holdthe body. For those who need <strong>to</strong> get a h<strong>an</strong>dle theologically on how <strong>to</strong>approach this, it is suggested that they approach it as a city of persons.A city has both a unity <strong>an</strong>d a multiplicity about it. It also must carry outcertain basic functions if it is <strong>to</strong> survive. All cities have administrations<strong>an</strong>d city pl<strong>an</strong>ners, <strong>an</strong>d justice, <strong>an</strong>d police, <strong>an</strong>d garbage collec<strong>to</strong>rs,<strong>an</strong>d entertainment, etc. <strong>The</strong> early <strong>Illuminati</strong> researchers soon acceptedthat their victim of multiple personalities is in essence a city of people,<strong>an</strong>d so they used that underst<strong>an</strong>ding <strong>to</strong> construct in the victim’s head,using the victim’s creativity under <strong>to</strong>rture <strong>an</strong>d drugs <strong>to</strong> create all thestructures <strong>an</strong>d features that accomp<strong>an</strong>y a geological l<strong>an</strong>d. <strong>The</strong> mapof the L<strong>an</strong>d of Oz in the Wizard of Oz books was frequently used for thefront parts of a System, with some additions <strong>an</strong>d subtractions. <strong>The</strong>engineering of the structures within <strong>an</strong> <strong>Illuminati</strong> Monarch slave, lookslike the original designs were done by engineering specialists--perhaps281


even Boole<strong>an</strong> algebra was used <strong>to</strong> develop the original designs.However, once working models of systems were proven <strong>to</strong> functionwithout fail, lesser skilled programmers & technocrats could helpassemble a Monarch System of alters without fully underst<strong>an</strong>ding theengineering <strong>an</strong>d all of - the demonology/magic behind it. Just like in acity, some people have friends <strong>an</strong>d know others, <strong>an</strong>d other people arestr<strong>an</strong>gers <strong>an</strong>d enemies, so it is with <strong>an</strong> <strong>Illuminati</strong> system of multiples.Some alters may be aware of each other, <strong>an</strong>d some may even hateeach other. When building a system, the Programmers take adv<strong>an</strong>tageof their knowledge of how multiplicity works. Two alters c<strong>an</strong> haveseveral possible relationships which are:two-way amnesia, where neither alter knows about the other’sexistence. This is what the Programmers w<strong>an</strong>t for most alters. <strong>The</strong>y don’tw<strong>an</strong>t multiples <strong>to</strong> even know they are multiples.one-way amnesia, where A alter knows B alter, but B doesn’t knowA. This c<strong>an</strong> be accomplished by setting in one-way mirrors.co-presence, two alters c<strong>an</strong> come on <strong>to</strong>p of each other at the fron<strong>to</strong>f the mind <strong>an</strong>d hold the body <strong>to</strong>gether. This produces some str<strong>an</strong>gebehavior for the multiple as different alters synthesize their thoughts.When a <strong>to</strong>ugh alter comes up behind a Christi<strong>an</strong> alter, the Christi<strong>an</strong>alter may find himself letting loose of a cuss word without knowingwhere exactly it came from. When a child alter comes up behind <strong>an</strong>adult, the adult may find itself talking like a child.co-conscious, this is when two alters are aware of what each otheris thinking.As the Programmers structure a System of alters, they build in No-talkwalls every so often where all communication <strong>an</strong>d visibility betweenalters is walled off. <strong>The</strong>se No-talk walls are specifically built structures<strong>an</strong>d not the result of normal amnesia. A 13 x 13 grid may have, forinst<strong>an</strong>ce, 2 No-talk walls. Other methods will be used <strong>to</strong> divide all thelevels from each other. One method of dividing the levels is the level oftr<strong>an</strong>ce for level 3 will be different th<strong>an</strong> the level of tr<strong>an</strong>ce for level 10.This will not hold true across the board, because some deeper altersare not in deep tr<strong>an</strong>ce. One Monarch slave, programmed beginning inthe 1950’s, described her System,Scattered PartsBroken hearts, divided parts, they all live inside of me. How m<strong>an</strong>y timesc<strong>an</strong> they divide my mind? Broken hearts with divided parts scatteredthroughout my mind. How m<strong>an</strong>y times c<strong>an</strong> they wipe me out before Icome back no more? C<strong>an</strong> they instill a will in me that is not mine? <strong>The</strong>y282


oke my heart <strong>to</strong>o m<strong>an</strong>y times <strong>an</strong>d divided all the parts, thenscattered them through time. Some are good <strong>an</strong>d some are evil. Howm<strong>an</strong>y times c<strong>an</strong> they split my mind? <strong>The</strong> lights, needles <strong>an</strong>d pain wen<strong>to</strong>n much longer th<strong>an</strong> we c<strong>an</strong> explain. Did these things happen, or is itwhat they w<strong>an</strong>ted me <strong>to</strong> believe? Does God exist or is it what I w<strong>an</strong>t <strong>to</strong>believe? Does the s<strong>to</strong>re house exist where the computer is? Are therecomputers in me that help split me? Scattered parts, broken hearts,where do I exist? Is there a castle built inside? If so, what person am I?Lights, needles, <strong>an</strong>d pain goes on <strong>to</strong>day, or is it lies that are made up ina mind split far <strong>to</strong>o m<strong>an</strong>y times. Broken hearts, divided minds, scatteredthroughout time. I don’t w<strong>an</strong>t <strong>to</strong> mislead you. Did the experimentswork? And they split me <strong>to</strong>o m<strong>an</strong>y times? Lights, needles, <strong>an</strong>d pain.<strong>The</strong>y c<strong>an</strong> wipe me out if I try <strong>to</strong> explain. Butterflies, butterflies, lots <strong>an</strong>dlots of them. I lay down at nights with them. I wrap up in a bl<strong>an</strong>ketmade of them. I hear their hum as they lead me <strong>to</strong> the lights, needles<strong>an</strong>d pain. <strong>The</strong> needles <strong>an</strong>d pain make it so I c<strong>an</strong> not think. I get sosleepy, but I c<strong>an</strong> not sleep. <strong>The</strong> pain races through my mind <strong>an</strong>d splits i<strong>to</strong>ne more time. I have forgotten more th<strong>an</strong> most will ever know. <strong>The</strong>computer will show how m<strong>an</strong>y times they c<strong>an</strong> split the mind, break theheart; divided minds scattered throughout time. How m<strong>an</strong>y timesbefore I c<strong>an</strong> come back no more?"--receivd from therapist DennyHilgers.Our previous book <strong>The</strong>y Know Not What <strong>The</strong>y Do, An Illustrated Guide<strong>to</strong> Monarch Programming-<strong>Mind</strong> Control, Oregon City, OR, 1995, p. 91,has a good description of how extensive the internal structuring is:“M<strong>an</strong>y Systems never get <strong>to</strong> the point of seeing their internal world(s).Further, most alters have only a small spot in which they are <strong>to</strong> reside,<strong>an</strong>d they don’t get <strong>to</strong> see but a tiny fraction of the entire System. Afterthese structures are built in<strong>to</strong> the mind they continue <strong>to</strong> work <strong>an</strong>d carryout their function on a subconscious level. Sometimes it takes years ofwork for a System <strong>to</strong> begin seeing their internal world. <strong>The</strong>y c<strong>an</strong> begindoing this by turning lights on inside of their worlds. To make acomparison, when a person looks at a clock they see the finishedresult, the time it shows, but they don’t see all the mech<strong>an</strong>isms. <strong>The</strong>structures in the mind are part of the mech<strong>an</strong>ism <strong>to</strong> keep the System ofAlters structured in a way that is useful <strong>to</strong> the abusers, but often all tha<strong>to</strong>bservers will see is the finished result, the mech<strong>an</strong>isms stay hidden. Butwe are exposing those mech<strong>an</strong>isms in this picture <strong>an</strong>d on this page. Atherapist’s client may be responding in a way that makes no sense untilone realizes the internal structures that they are responding <strong>to</strong>. An altergenerally must maintain the spot in the mind which it is assigned. Toleave that location in the mind, me<strong>an</strong>s travelling through a Systemwhich is filled with d<strong>an</strong>gers <strong>an</strong>d traps of all kinds. Only a few of ouralters ever ventured where they were not <strong>to</strong> go, <strong>an</strong>d they alwaysencountered m<strong>an</strong>y obstacles. However, if <strong>an</strong> alter gets trappedbehind mirrors, the alter should not break the mirrors. If the alter is a283


Christi<strong>an</strong> they c<strong>an</strong> use the blood of Jesus Christ of Nazareth <strong>to</strong> bind<strong>an</strong>d cast out the demons which are in the mirrors. <strong>The</strong> d<strong>an</strong>ger of themirrors is the demonology involved. Somethings work <strong>an</strong>d somethingsdon’t. We are speaking from our years of experience. <strong>The</strong> mirrors aredeadly <strong>an</strong>d they were everywhere in our System, but they are deadlyonly if one c<strong>an</strong>’t deal with the demonology. <strong>The</strong> therapist should atleast be aware that these images c<strong>an</strong> be worked with just as if theywere real <strong>to</strong> m<strong>an</strong>ipulate situations involving them. But if the structuresare going <strong>to</strong> be worked or <strong>to</strong>yed with, the therapist <strong>an</strong>d survivor need<strong>to</strong> have <strong>an</strong> underst<strong>an</strong>ding about the structures. If you don’t underst<strong>an</strong>dthe mirrors, or the River Nile, or whatever then be careful what youhave the survivor do <strong>to</strong> them.<strong>The</strong> structures (the images) that are built in<strong>to</strong> the mind of the Monarchslave are not trivial. An overview of the structures that are in our Systemalone will show that they went <strong>to</strong> a great deal of effort <strong>to</strong> build all kindsof internal worlds <strong>to</strong> house our thous<strong>an</strong>ds of alters. A list of the internalstructures that were contained in our System follows: Ant pits, Bee Trapsw/ swarms, Black Glass Wall, Black Holes (vortexes), Boxes (Dr. Green’sunder J.J., boxes have but<strong>to</strong>ns which access certain parts),C<strong>an</strong>dyl<strong>an</strong>d, Carpet (Magic), Castles, Castle dungeon (<strong>to</strong>rturechambers), Caves, Clocks (there are several incl. computer clocks),Concentration camp, Cords, Desert, Doll House, numbered Doors bythe thous<strong>an</strong>ds w/ red hot nobs, Eleva<strong>to</strong>rs, Emerald City (connected <strong>to</strong>the castle), Eucalyptus Trees, Fields of “forget me” & isl<strong>an</strong>d of “forgetme not” (JJ’s Prgrmg), Firewall, 2 Forests (singing forest with Cedars ofLeb<strong>an</strong>on <strong>an</strong>d Oaks, <strong>an</strong>d a dwarfs forest which has 3 kinds of trees), FruitTree (programming tree), Glass, Glass coffin, Golden Keys, Graveyards,Hallways with red doors, Hell Pit or Hell Fire (7 levels--pepperbox. <strong>The</strong>re isa glassy wall before the hell pit.), Hour Glass (matrix), House of David,Ice<strong>to</strong>wn, Invisible Countries, Keys (clock key), Libraries, Light side City,Marshl<strong>an</strong>ds, Mazes, Mirrors (constructed via access permissions) (Oneway),Moat, Mountains, Nursery (glass), Oce<strong>an</strong>, Paper Trees, PetraSecret City, Playground, Poppy field, Portals (for altars <strong>an</strong>d demons, likethe third eye), Rubicon (outer space beyond the stars), Rivers (Nile, RioGr<strong>an</strong>de, Shen<strong>an</strong>doah, etc.), Room behind a closet (existence notconfirmed), Seeds, Serpent tree, Shafts, Shells, Shifting s<strong>an</strong>ds, Shoes(gold, silver, <strong>an</strong>d ruby slippers), Snake pits (traps), Spider chambers,Stairway, Torpedo Town, Tin Woodsm<strong>an</strong>’s Castle, Tree with squarepaper boxes containing Dad’s music programming, Troj<strong>an</strong> Horse w/armies, Tunnels, Valley of the Dry Bones, Volc<strong>an</strong>o (<strong>to</strong> destroy & remakethe system), Vortices (see Black Holes), Wastel<strong>an</strong>d, Water (Moats),Waterfalls, Wind, Wires, Worms, <strong>an</strong>d a Yellow Brick Road.”In order <strong>to</strong> use the multiple in different life styles--they divide up asystem of alters in<strong>to</strong> worlds of alters which rarely see each other. <strong>The</strong>seworlds are also called cities. <strong>The</strong> words “city” or “world” areinterch<strong>an</strong>geable when it comes <strong>to</strong> a Monarch System. Typically, they284


eceived names such as Atl<strong>an</strong>tis, City of Refuge, Sh<strong>an</strong>gri-la, <strong>an</strong>d Troy.Later, after C<strong>an</strong>dy Jones exposed the programming, there was a majorshift about this time, <strong>an</strong>d m<strong>an</strong>y of the Systems were programmed withSolar Systems. Each pl<strong>an</strong>et had a different group or race of alter ordemon. <strong>The</strong> concept of Star Trek was helpful for this. Some of theSystems programmed in the 1970s, used Star Trek as their basis. <strong>The</strong>distribution of alters was similar <strong>to</strong> watching the various episodes of StarTrek. Alters that were created at the same time <strong>an</strong>d left in <strong>an</strong> area ofthe System <strong>to</strong>gether are families. <strong>The</strong> programmers in their efforts <strong>to</strong>dehum<strong>an</strong>ize these alters will stick <strong>to</strong> <strong>an</strong>imal names such as referring <strong>to</strong>them as “litters”. <strong>The</strong> front level of a System would often be given acover. <strong>The</strong> front level might see their world as a basketball court, orseveral houses, or a dollhouse, or a street. <strong>The</strong> front world is set up <strong>to</strong>deceive <strong>an</strong>yone from discovering the true structure of the system. <strong>The</strong>programmers c<strong>an</strong> link <strong>an</strong>d unlink, <strong>an</strong>d move alters around. Eventuallythey get something neat <strong>an</strong>d tidy on a sheet a paper. A st<strong>an</strong>dard<strong>Illuminati</strong> System is built like a 13x13x13 cube with <strong>an</strong> eleva<strong>to</strong>r shaftrunning up <strong>an</strong>d down from the bot<strong>to</strong>m <strong>to</strong> the <strong>to</strong>p. <strong>The</strong> eleva<strong>to</strong>r isconstructed as a piece of DNA <strong>an</strong>d alters c<strong>an</strong> ride up <strong>an</strong>d down theeleva<strong>to</strong>r (go up or down in tr<strong>an</strong>ce) <strong>to</strong> move when allowed. Most of thealters have no sense of time, <strong>an</strong>d most of the alters do not hold thebody very frequently. For various reasons most of the alters never growup. Obviously, if they don’t hold the body very much, <strong>an</strong>d aredissociated from everyone else’s memories, they have nothing <strong>to</strong>stimulate them <strong>to</strong> grow up. However, the Programmers must havesome of the alters who c<strong>an</strong> function as adults. For inst<strong>an</strong>ce, alters whogo in<strong>to</strong> bars must think of themselves as adults. <strong>The</strong> alters which willhold the body in public will be hypnotically made in<strong>to</strong> adults. <strong>The</strong>Network likes <strong>to</strong> leave m<strong>an</strong>y child alters, because most of them arepedophiles <strong>an</strong>d they like the pseudo-pedophile experience of makingit with <strong>an</strong> alter that thinks it is four years old. Or just the opposite,sometimes <strong>an</strong> adult alter will appear within a child victim, <strong>an</strong>d this is aclue that this is <strong>an</strong> access/reporting alter. M<strong>an</strong>y of the <strong>Illuminati</strong>systems, especially Mengele’s were set up on a 13x13 grid of alters. <strong>The</strong>grids are numbered <strong>to</strong>p <strong>to</strong> bot<strong>to</strong>m <strong>an</strong>d side <strong>to</strong> side but not in thefashion one might expect. <strong>The</strong> typical Mengele grid will begin with 6<strong>an</strong>d proceed 6, 7, 8, 9, 10, 11, 12, 13, 1, 2, 3, 4, 5. However, the structuredoesn’t have <strong>to</strong> be a grid, <strong>an</strong>y geometric shape works <strong>an</strong>d has beenused, such as a sphere, cube, or pyramid. Dr. Star <strong>an</strong>d his wife, who is<strong>an</strong> OTO programmer working out of Corpus Christi, TX likes <strong>to</strong> structure<strong>an</strong> alter system in the shape of the Seal of Solomon. <strong>The</strong> Yin-y<strong>an</strong>gsymbol is then equated with the entire Seal of Solomon. <strong>The</strong> all-seeingeye is placed in the center of Star’s systems, just like Mengele wouldput in <strong>an</strong> All-Seeing Eye. <strong>The</strong> hidden Sun of Tiphareth is placed in<strong>to</strong> Dr.Star’s victim’s systems, as well as the four elements, <strong>an</strong>d sulfuric acid.Alters are then placed in the various positions around the hexagram.Because therapists, (<strong>an</strong>d Christi<strong>an</strong> ministers) are generally unaware of285


the deeper occult things, they usually miss seeing the occultphilosophies behind the structures. For inst<strong>an</strong>ce, the elements of earth,wind, fire <strong>an</strong>d water are not just part of magic--they are in Druidismconsidered the four zones (or directions) also called rings which areheld <strong>to</strong>gether by the fifth ring--bal<strong>an</strong>ce. This is the basis of Celticgeometric art, metaphysical maps, <strong>an</strong>d <strong>an</strong>cient Irel<strong>an</strong>d wassymbolically divided in<strong>to</strong> four regions with a unifying fifth. This was thebardic view of the universe which is presented in the Vita Merlini(written by Geoffrey of Monmouth in 1150). Supposedly Engl<strong>an</strong>d, Wales<strong>an</strong>d Scotl<strong>an</strong>d were also divided in<strong>to</strong> 4 regions with a unifying fifth <strong>to</strong>o.And all these four regions Irel<strong>an</strong>d, Wales, Scotl<strong>an</strong>d <strong>an</strong>d Engl<strong>an</strong>d arejoined again in the U.K. In Druidism, the four magical elements theSword, Rod, Cup <strong>an</strong>d Shield are unified by the Cord while the fourelements are unified by the spirit. Ancient Druid s<strong>to</strong>ne statues of triplefaced gods <strong>an</strong>d goddesses still remain <strong>to</strong>day. Heads were consideredsacred by the early Celts which is why the heads of the <strong>to</strong>p Gr<strong>an</strong>dDames are preserved after they are ritually murdered. If <strong>an</strong> outsiderreally w<strong>an</strong>ts <strong>to</strong> underst<strong>an</strong>d why <strong>Illuminati</strong> systems are constructed in thefashion that they are--first underst<strong>an</strong>d that there is a great depth ofme<strong>an</strong>ing behind what structures are used <strong>to</strong> build <strong>an</strong> internal world. Anex-programmer talks about how the programmers would call uponSat<strong>an</strong> in high level rituals <strong>to</strong> “Tell me what <strong>to</strong> do, <strong>an</strong>d I’ll do what youw<strong>an</strong>t” <strong>to</strong> gain wisdom in how <strong>to</strong> design these alter systems. Within aSystem, a few alters will be given maps <strong>to</strong> the System. <strong>The</strong>re will be astructure “map” which takes the system down through its progressivelevels down <strong>to</strong> its fundamental or primal level. <strong>The</strong>re will also be internalworld maps, maze maps, or what some call programming maps.HOW THE SELF OF A MAIN ALTER CONSISTS OF SHATTERED SHADOWALTERS, A SCRIPT, MIRRORS, & ASSIGNED DEMONSWhat really is <strong>an</strong> alter? An alter is a dissociated part of the mind, whichis developed BY the programmers <strong>to</strong> be a complete personality. Wewill now explain what <strong>an</strong> alter is. If you were <strong>to</strong> look on theprogrammers’ charts found in his grey 3 ring binder, or his lap <strong>to</strong>pcomputer you would see graphs with alters with access codes. Whatare these alters? If the programmers didn’t invest a great deal ofprogramming <strong>an</strong>d structuring, each alter would not be a completepersonality. On the chart, the programmer will have a square on a gridwhere he will record the cult name, the front name, the alter’s alph<strong>an</strong>umericpull up code <strong>an</strong>d its grid number. What seems neat <strong>an</strong>d tidy isreally not so neat <strong>an</strong>d tidy. That alter is really <strong>an</strong> alter with m<strong>an</strong>yshadows of itself. This is a. family of fragments of that alter which holdparts of itself. <strong>The</strong>re is a particular secret term that only theprogrammers use for these fragments, but for purposes of discussion we286


will call these fragments “family fragments” or “shadow fragments.” Forinst<strong>an</strong>ce, a Gatekeeper alter will have a shadow alter fragment thatholds its fear, one that holds its pain, one that holds its <strong>an</strong>ger, <strong>an</strong>dm<strong>an</strong>y that hold its memories of abuse <strong>an</strong>d <strong>to</strong>rture. What appears onthe grid as a square is in reality a box holding lots of fragments. <strong>The</strong>programmers underst<strong>an</strong>d how multiplicity works, so rather th<strong>an</strong> chart<strong>an</strong> alter with 25 fragments coming off of it--they name the whole messafter the main alter they have created for that family of fragments. <strong>The</strong>main alter really is a fictional persona created by the programmerslinked <strong>to</strong> numerous fragments of the mind. <strong>The</strong> mind of the child victimwill cooperate with the <strong>to</strong>rture <strong>an</strong>d programming. <strong>The</strong> programmer willverbally discuss his programming scripts with his close assist<strong>an</strong>ts, forinst<strong>an</strong>ce, the Gr<strong>an</strong>d Dame who helps him; but he doesn’t record thescripts down. His<strong>to</strong>rically, the Programmers have always individuallytailored their s<strong>to</strong>ry scripts for each child. Because the best are masters<strong>to</strong>ry tellers, who c<strong>an</strong> make a s<strong>to</strong>ry come alive, they do not need <strong>to</strong>depend upon stale written scripts. <strong>The</strong> Wizard of Oz, <strong>an</strong>d Mother Goosebooks, etc. are read prior <strong>to</strong> actual programming session, <strong>to</strong> enh<strong>an</strong>cethe programming session. <strong>The</strong> final alters are recorded, but not thes<strong>to</strong>ries or the lies <strong>to</strong>ld them. After a main alter has been created <strong>an</strong>dshattered, the programmers find this main alter within the mind <strong>an</strong>dgive it a personal his<strong>to</strong>ry (via films, virtual reality headsets, s<strong>to</strong>ries, etc.),give it a job within the system, a place <strong>to</strong> live in the internal world, <strong>an</strong>dits rules <strong>an</strong>d guide lines on how <strong>to</strong> function within the system. It will begiven scripts about the outside world. And shortly, we will explain those.This doesn’t me<strong>an</strong> that alters don’t exist--they are physically part of themental makeup of a multiple’s brain--but <strong>an</strong> alter’s existence is not atall what it sees or what outsiders see. Both the alter <strong>an</strong>d the therapistsee only a small part of the picture. John O. Bearhrs (Limits of scientificpsychiatry, Role of uncertainly in mental health. NY: Brunner/Mazel,1986, pp. 86-113.), who did therapeutic work with Multiples, recognizedsome of the process that we are describing. He wrote about how <strong>an</strong>alter when confronted with more pain, guilt, <strong>an</strong>d rage will dissociatethis mental hazardous waste in<strong>to</strong> alters who function as internalgarbage c<strong>an</strong>s. He described a victim who had a jolly front alter Di<strong>an</strong>ewith a winning smile. This front alter dumped her pain on a small childalter Mary, who lived in <strong>an</strong> internal “basement”. However, in oneparticular case Mary didn’t w<strong>an</strong>t the pain <strong>an</strong>d she passed it <strong>to</strong> Karl (a 4yr. old alter), who cried <strong>an</strong>d yelled so loud internally that D<strong>an</strong>ny, a 12year old alter who was characterized by <strong>to</strong>ughness <strong>an</strong>d courage <strong>to</strong>okthe pain. However, the actual situation is more subtle <strong>an</strong>d complexth<strong>an</strong> Beahrs realized. Every alter creates shadow alters of itself <strong>to</strong>h<strong>an</strong>dle the <strong>an</strong>ger, fear, guilt, betrayal etc. <strong>The</strong> Programmers are <strong>to</strong>tallyaware of these shadow alters <strong>an</strong>d they work with them.If we picture <strong>an</strong> alter as a point in the mind--a dot or small circle, thenwe c<strong>an</strong> for the sake of discussion picture the shadow splits off of thatalter as rays coming out of that small circle. Now we have <strong>an</strong> image of287


something looking like a sun with rays. Actually, in real life, after all the<strong>to</strong>rture, the shadow alters holding memories <strong>an</strong>d all the programsattached are simply one big mess that resembles the br<strong>an</strong>ches of atree with leaves. <strong>The</strong> Programmers have made a thorough mess of theperson’s mind--<strong>an</strong>d they need some cle<strong>an</strong> way <strong>to</strong> deal with this messthey have created. So the Programmers use the imagery that bestresembles the mess they have made. <strong>The</strong> victim is <strong>to</strong>ld they have a treewith br<strong>an</strong>ches <strong>an</strong>d leaves growing through them. This tree with itsbr<strong>an</strong>ches grows through out every alter. <strong>The</strong> image of the vine <strong>an</strong>d itsbr<strong>an</strong>ches is also used, because then the programmers c<strong>an</strong> bring in theBible <strong>to</strong> make their programming seem <strong>to</strong> be supported by God’s HolyWord. <strong>The</strong> original alter is <strong>to</strong>ld that it is a mote of nothingness (a verytiny circle). <strong>The</strong> programmers don’t chart all the family or shadowfragments of <strong>an</strong> alter because they underst<strong>an</strong>d MPD (DID). <strong>The</strong>fragments will hold all the memories of abuse, so the alter c<strong>an</strong> function.<strong>The</strong> fragments will also give the alter the appear<strong>an</strong>ce of the full r<strong>an</strong>geof emotions. If a main alter gets <strong>an</strong>gry or feels guilty, what ishappening, is that it has accessed its shadows <strong>to</strong> express the full r<strong>an</strong>geof emotions. <strong>The</strong> Programmers abuse <strong>an</strong> alter <strong>an</strong>d get the Shadowalters. <strong>The</strong>n they hypnotically attach a memory cue (which is a codeconsisting of the alter’s name, the date of the memory, <strong>an</strong>d perhapssomething else <strong>to</strong> complete the code) <strong>to</strong> the main alter so that theyc<strong>an</strong> access the memory <strong>an</strong>ytime they w<strong>an</strong>t. <strong>The</strong>n they hypnotically &demonically build a on-way mirror between this main alter <strong>an</strong>d theshadow alters they have just created. <strong>The</strong>se one-way mirrors are likeone way windows--the reason they are referred <strong>to</strong> as mirrors is that theyare put in the child’s mind via mirrors. Next, they ritually/magicklyimpl<strong>an</strong>t demons <strong>to</strong> guard the mirror(s) <strong>an</strong>d <strong>to</strong> guard each memoryheld by the shadow alters. This separates <strong>an</strong> alter from knowing itself<strong>an</strong>d its own abuse. <strong>The</strong> main alter has dissociated the pain, etc. <strong>to</strong> itsshadow alters of itself. <strong>The</strong> Programmers then use the memory asblackmail <strong>to</strong> keep the main alter in line. <strong>The</strong> main alter has dissociatedthe pain, but will recover the memory if either one of three possibilitieshappen: a. the Programmer or h<strong>an</strong>dler says the memory code 3x, or b.if <strong>an</strong> event happens that triggers the main alter <strong>to</strong> remember, c. themain alter tries <strong>to</strong> remember the abuse <strong>an</strong>d the programming, <strong>an</strong>d indoing so they will be stepping outside of the circle assigned <strong>to</strong> them<strong>an</strong>d will “break the circle & break the mirrors.” Remember, how wedescribed a Main alter as a small circle with the rays (shadow alters)split off from it. <strong>The</strong> shadow or family alters of a Main alter are the truehis<strong>to</strong>ry of <strong>an</strong> alter. <strong>The</strong> Main alter is given the script <strong>to</strong> <strong>to</strong>tally love theProgrammer/Master. It should be <strong>an</strong>gry at what has happened <strong>to</strong> it.<strong>The</strong> ability <strong>to</strong> direct that <strong>an</strong>ger is lost with the dissociation, but might beretrieved if the alter remembered, so the programmers tr<strong>an</strong>sfer it bycreating some outside person or object for the alter <strong>to</strong> focus their hateupon. Elaborate hate scripts are then given <strong>to</strong> the main alter. <strong>The</strong> loveof the Master now protects the Main alter from having <strong>to</strong> remember its288


pain. Very few alters <strong>an</strong>d very few non-multiple people would w<strong>an</strong>t <strong>to</strong>remember such trauma <strong>an</strong>d it is very unpopular in society <strong>to</strong> rememberpast traumas (how often have you heard expressions “let bygones bebygones”, “the past is past”, “don’t dig up old skele<strong>to</strong>ns”, etc.) As longas the alter loves its Master, it is somewhat safe from remembering itsown traumas. And yet for a Monarch slave <strong>to</strong> regain its own mind, thealters must regain their own memories. That is why <strong>to</strong> really break downthe programming, memory work is need. That Monarch slaves mustregain their memories <strong>to</strong> heal is a hard one for m<strong>an</strong>y people <strong>an</strong>dministers <strong>to</strong> underst<strong>an</strong>d. Most deliver<strong>an</strong>ce ministries pray that Godwould take away their bad memories. Further, the programming holdsthe lies in place, <strong>an</strong>d the demonology holds the traumas, programs,<strong>an</strong>d memories in place. A Main alter is really in the middle of specialpurpose Shadow alters which have been split from itself. <strong>The</strong>Programmers do a reversal on this <strong>an</strong>d tell the Main alter that it is onthe outside looking in. Vagabond Programming (which tells <strong>an</strong> alter it isa vagabond) is then applied <strong>to</strong> teach the alter it doesn’t belong <strong>to</strong> theinside world, nor <strong>to</strong> the outside world. It belongs nowhere. <strong>The</strong> Mainalter will perceive that it is on the outside looking in at mirrors. <strong>The</strong> -mirrors then guard the inside of the circle. To try <strong>to</strong> remember the truthis <strong>to</strong> break the circle of mirrors. <strong>The</strong> circle of mirrors has magicalsignific<strong>an</strong>ce, because it ties in with the witchball or speculum which thewitches have used over the centuries <strong>to</strong> see beyond time <strong>an</strong>d space.<strong>The</strong> steps that the programmers do, c<strong>an</strong> be explained on m<strong>an</strong>y levels.M<strong>an</strong>y of these steps are done for special occult reasons. One of thefirst things taught <strong>to</strong> a child is “DO NOT BREAK THE CIRCLE”. This hasboth the internal me<strong>an</strong>ing “don’t go after you own memories <strong>an</strong>d theexternal me<strong>an</strong>ing “don’t leave the cult--the circle.” Special black mats(such as used in wrestling) have been constructed by theProgrammers. <strong>The</strong> first black mat is a circular mat with a 4’ radius. <strong>The</strong>next black mat has <strong>an</strong> 8’ radius (with a donut hole with a 4’ radius) sothat it c<strong>an</strong> fit over/around the first circle. From there you haveconcentric donut shaped pieces of mat each four feet wider in radiusth<strong>an</strong> the previous, which c<strong>an</strong> all be joined <strong>to</strong>gether. Each of theconcentric circles will have a different colored circle painted on itsedge. <strong>The</strong> victim child while it is in the crawling stage will be placedon<strong>to</strong> the middle dot <strong>an</strong>d <strong>to</strong>ld <strong>to</strong> stay. <strong>The</strong>y will be punished every timethey move. When they finally c<strong>an</strong> do this obediently, they will be giventhe 4’ circle. Toys will be placed outside of the painted line (which mayfor starters be a blue line, then perhaps green, <strong>an</strong>d then red). Just off ofthe mat are interesting things like a full bottle, a bl<strong>an</strong>ket, a coat, food,<strong>to</strong>ys, etc. <strong>The</strong> child is cold, hungry <strong>an</strong>d bored. Will the child obey <strong>an</strong>dstay in its circle? If it doesn’t it will be punished by being mildly shocked,or having its head dunked in<strong>to</strong> a <strong>to</strong>ilet, or its h<strong>an</strong>d punished, <strong>an</strong>d it willbe set back in the circle until it’s will is broken <strong>an</strong>d it learns <strong>to</strong> submit <strong>to</strong>the order <strong>to</strong> stay in the circle. This teaches the victim child severalthings: don’t step outside of boundaries, don’t break the circle, it289


teaches them the colors that will be used in the color programming ofthe internal world, <strong>an</strong>d it is again traumatizing. What they see, hear <strong>an</strong>ddo will now be done in obedience. Does the reader see how hard it isfor the child & its alters <strong>to</strong> move outside of the scripts? Alert readers willrealize that there are 13 colors in <strong>Illuminati</strong> systems <strong>an</strong>d that me<strong>an</strong>s 13 x4 feet = the radius of the finished 13-concentric-circled black matwhen all the pieces are laid down. This me<strong>an</strong>s a large indoor area witha floor space of at least 124’ across in needed. Military bases, hospitals,churches, <strong>an</strong>d universities like Oral Roberts University have gyms oraudi<strong>to</strong>riums which the <strong>Illuminati</strong> use for this stage of the programming.Mother of Darkness alters train the children. <strong>The</strong> Presideo had a greatplace for this training.This is the programming for the “Circle Will Not be Broken” script. <strong>The</strong>Amish do somethingsimilar, <strong>to</strong> make their children obedient, which is one reason theMonarch programming is easy <strong>to</strong> hide within the Amish culture. Thistype of programming is referred <strong>to</strong> in chapter 5 about the fronts <strong>an</strong>dthe Top Secret Amish Front. Let us briefly mention, that some systemsare simply concentric rings (levels of alters) each assigned a differentcolor. Another twist <strong>to</strong> the color coding--<strong>an</strong> alter in somecircumst<strong>an</strong>ces may have two colors. An alter may be coded Blackbelow white, so that when it sees black color below white it is triggered.<strong>The</strong> sections on a soccer ball, have been colored <strong>an</strong>d used for aprogramming visual aid. Various researchers who have tried <strong>to</strong> identify:What happens when a normal non-multiple subject is hypnotized <strong>to</strong> notfeel pain? Of course, the subject consciously tells the hypnotist that hefeels no pain, but researchers such as the Watkins & Hilgards havedemonstrated that the subject under hypnotism dissociates the pain <strong>to</strong><strong>an</strong>other part of the mind. In other words, hypnosis <strong>an</strong>d MPD (DID)290


which are both forms of dissociation are much closer in how theyfunction th<strong>an</strong> some people have realized. In fact, some researchers,who are well aware of how close the two dissociative functions are,have definedMPD (DID) as “spont<strong>an</strong>eous hypnosis” (Beahrs, 1982; Bliss, 1986). <strong>The</strong>non-conscious area of the mind that hypnotic subjects dissociated <strong>to</strong>have been labeled “ego-states”, “the hidden observer” <strong>an</strong>d “a covertcognitive structural system”. <strong>The</strong> giving away of pain, fear, <strong>an</strong>d othertraumas <strong>to</strong> Shadow parts is similar <strong>to</strong> what happens when researchersobserve a person who is directed in hypnosis <strong>to</strong> not feel pain,unknowingly giving his pain away <strong>to</strong> a hidden ego-state. A hidingplace where alters c<strong>an</strong> go, a place of light which gives energy, iscreated in a System. <strong>The</strong> New World Order’s One-World-Religion <strong>an</strong>dtheir <strong>Mind</strong>-Control is org<strong>an</strong>ized on the hierarchal system with a S.P.I.N.front. <strong>The</strong> <strong>Illuminati</strong> <strong>an</strong>d the occult world that theysupervise has a strong hierarchial system both world-wide <strong>an</strong>d withinthe slave. Fritz has spent a great deal of time researching <strong>an</strong>dcommunicating <strong>to</strong> other how the hierarchy controls on a large scale,<strong>an</strong>d how it is miniaturized <strong>an</strong>d how this identical hierarchy is placedinternally in<strong>to</strong> the slave. However, the big cover for the hierarchialarr<strong>an</strong>gement is the SPIN principal.WHAT IS THE SPIN PRINCIPLE?S-P-I-N = Segmented Polycentric Integrated Networks.If one were <strong>to</strong> diagram a SPIN org<strong>an</strong>izational chart it would not be aconventional box type configuration such as <strong>an</strong> army comp<strong>an</strong>yorg<strong>an</strong>ization chart. Rather, it would resemble a fish-net with interlockingnodes with groups linked <strong>to</strong> m<strong>an</strong>y other groups <strong>an</strong>d cluster aroundnodes. <strong>The</strong>re is no center <strong>to</strong> the network. It is like the brain’s electricalconnections, with <strong>an</strong> overlap of functions, so that good cells c<strong>an</strong> takeover from damaged sections. A network (one of their buzzwords) ism<strong>an</strong>y times more greater th<strong>an</strong> the sum of its parts. <strong>The</strong> New Age authorMarilyn Ferguson does <strong>an</strong> excellent job in describing how theConspiracy’s SPIN network functions. “This is a source of power neverbefore tapped in his<strong>to</strong>ry: multiple self-sufficient social movementslinked for a whole array of goals whose accomplishment wouldtr<strong>an</strong>sform every aspect of contemporary life. “Because SPINs are soqualitatively different in org<strong>an</strong>ization <strong>an</strong>d impact frombureaucracies...most people don’t see them--or think they areconspiracies. Often networks take similar action without conferring witheach other simply because they share so m<strong>an</strong>y assumptions. It mightalso be said that the shared assumptions are the collusion. “<strong>The</strong>Aquari<strong>an</strong> Conspiracy is, in effect, a SPIN of SPINs, a network of m<strong>an</strong>ynetworks aimed at social tr<strong>an</strong>sformation. <strong>The</strong> Aquari<strong>an</strong> Conspiracy is291


indeed loose, segmented, evolutionary, redund<strong>an</strong>t. Its center iseverywhere. Although m<strong>an</strong>y social movements <strong>an</strong>d mutual-helpgroups are represented in its alli<strong>an</strong>ces, its life does not hinge on <strong>an</strong>y ofthem.” Ferguson, Marilyn. <strong>The</strong> Aquari<strong>an</strong> Conspiracy. Los Angeles, CA:J.P. Tarcher, Inc., 1980, p. 217. ---<strong>The</strong> next 4 pictures are charts showing<strong>an</strong> hour glass & its turning mech<strong>an</strong>ism, & how a section c<strong>an</strong> havevarious codes, tr<strong>an</strong>ce depths, etc.292


293


<strong>The</strong> programmers enjoy setting up double-binds. One of their tricks is <strong>to</strong>create alters which are given negative spiritual roles with names <strong>to</strong>match. An alter may be named unforgiveness”, or “the one whodoesn’t trust <strong>an</strong>yone.” For such <strong>an</strong> alter <strong>to</strong> trust someone, makes thealter feel like it is giving up its name, <strong>an</strong>d therefore its identity. Bycombining the name with <strong>an</strong> identity that the alter doesn’t w<strong>an</strong>t <strong>to</strong>lose, the programming intend <strong>to</strong> double bind the alter. <strong>The</strong> Sat<strong>an</strong> alterwithin a System will see itself as Sat<strong>an</strong>. <strong>The</strong> alter Sat<strong>an</strong> feels that he is onthe winning side in a war, due <strong>to</strong> the lies that have been <strong>to</strong>ld this childalter when it was created. A girl child alter will be made <strong>to</strong> think theyare the evil male Sat<strong>an</strong>. <strong>The</strong> point is that the identity of this alter is tiedup with their negative. destructive role in the system. <strong>The</strong> Christi<strong>an</strong>therapist has a better ch<strong>an</strong>ce <strong>to</strong> show Sat<strong>an</strong> that the Rule of the Vic<strong>to</strong>rme<strong>an</strong>s that Sat<strong>an</strong> serves Almighty God, th<strong>an</strong> for a secular therapist <strong>to</strong>try <strong>to</strong> convince Sat<strong>an</strong> that Sat<strong>an</strong> doesn’t exist. And if the seculartherapist tries <strong>to</strong> debunk the Biblical view of things, what positivephilosophy or spirituality is the secular therapist going <strong>to</strong> give this Sat<strong>an</strong>alter <strong>to</strong> fight with against the inevitable external evil that we all face inlife?STANDARD ROLES WITHIN AN ILLUMINATI MONARCH SLAVE(Note: that depending upon what the System’s occupation in life is,also determines some of the types of alters created. If the System is apolitici<strong>an</strong>, they will need special alters <strong>to</strong> deal with certain secretactivities. If the System is a baseball pitcher, they will need alters thatare trained <strong>to</strong> pitch.)Alien alters for contact, bonding w/ aliens, & accept<strong>an</strong>ce of mockalien invasionAngel (imitation) alters for divine messages, these may be seenas Spirit Guide altersAngry altersAnimal alters who are me<strong>an</strong>t <strong>to</strong> act like <strong>an</strong>imalsAssassination alters (Deltas)Babysitter alters <strong>to</strong> look after keep them from popping outinappropriatelyBlackmail alters (Betas, <strong>an</strong>d Black Widows)Bird alters (used for half a dozen various internal purposes, includingravens for suicide, doves for peace, orks <strong>to</strong> fly overthe internal mazes, owls for wisdom, etc. <strong>The</strong> dove may be part of a294


false trinity.)Child altersClockmaker & Clockholder alters (Also the Grim reaper may beassociated with the clocks.)Core related alters <strong>to</strong> imitate or protect the core from <strong>an</strong>ythingCoven alters <strong>to</strong> lead coven level meetingsCourier alters (Carrier Pigeons)Data alters <strong>to</strong> hold information (this encompasses a wide r<strong>an</strong>ge ofalters, including alters who hold internal system information <strong>to</strong> alterswho hold information for their masters.Deaf & Dumb alters <strong>to</strong> prevent the System from hearing nonapprovedusers say access codes.Death alters <strong>to</strong> take near death traumasElement alters (Alr or Wind, Water, Earth, Fire) for magick &compli<strong>an</strong>ceEspionage altersFirechild or Bombchild alters <strong>to</strong> make body feel like its burningFlooding alters (often flooding comes simply from Shadowfragments)Foreign L<strong>an</strong>guage altersFront alters for a good coverGatekeeper alters <strong>to</strong> guard portals <strong>an</strong>d gates Guard (or Blocker)alters <strong>to</strong> guard import<strong>an</strong>t areas of the SystemJustice alters--alters who mete out justice for disobedient altersHierarchy alters <strong>to</strong> take part in <strong>Illuminati</strong> hierarchy ceremonies(there will be a big dem<strong>an</strong>d for m<strong>an</strong>y of these alters--differentceremonies <strong>an</strong>d different times of the year are given different alters).Hunts, alters created for the master’s sport of being hunted295


Loyalty alters which hold strong love & devotion <strong>to</strong> the masterMartial Arts alters <strong>to</strong> protect the System if need beMirror image alters, for deceptionMonster alters <strong>to</strong> scare the other altersMouse alters <strong>to</strong> run the clocks (computer, <strong>an</strong>d grids)Nothing alters, alters who believe they are nobody, or Mr. Nobody,or “no-name.Observation alters (these deep alters quietly observe all that goeson in <strong>an</strong> alter system. <strong>The</strong>y may be called Watchers.)Programmers, Internal (alters cloned after the original programmers<strong>to</strong> reprogram the System, also known as Internalists.)Programming alters <strong>to</strong> help <strong>Illuminati</strong> program Protec<strong>to</strong>r alters <strong>to</strong>protect almost everything in the System (essentially nothing is leftunprotected in the System.) In some systems, these alters may even beknown in the System as Warrior & Infiltration Alters. <strong>The</strong>y may includesuch titles as Keeper <strong>to</strong> the Pit.Ribbon Alters <strong>to</strong> send messages from computers <strong>to</strong> System areasReporting alters <strong>to</strong> give the master reports regularly, esp. import<strong>an</strong>t<strong>to</strong> moni<strong>to</strong>r all activity by a therapistRuling alters, such as Queens & KingsRun/return <strong>to</strong> master altersSat<strong>an</strong>ic hierarchy alters, <strong>to</strong> insure that system is controlled by Sat<strong>an</strong>Sexual alters (kittens for porn, S&M, etc.)Scrambling alters <strong>to</strong> prevent alters from hearingShell alters (<strong>to</strong> hide real alters from therapists)Suicide alters (clowns, Russi<strong>an</strong> Roulette alters, etc.)Tr<strong>an</strong>ced, (alters tr<strong>an</strong>ced deeply <strong>to</strong> move up <strong>an</strong>d tr<strong>an</strong>ce the body)Travel alters, which c<strong>an</strong> sleep during travel or be oblivious <strong>to</strong> where296


they are goingNext we will discuss how some of these types of alters are created.<strong>The</strong>se will be discussed in alphabetical order. It should be pointed outthat generally the <strong>Illuminati</strong> choose one of the early front Gatekeeperalters <strong>to</strong> be the alter who knows the entire system as it is made. Thisoften is Gatekeeper no. 3. After the entire structuring is finished this alterwill be hypnotically programmed <strong>to</strong> forget that they know the entiresystem. By the age of ten, <strong>an</strong> <strong>Illuminati</strong> system will have someone whoknows the entire system. However, these gatekeepers get heavyprogramming not <strong>to</strong> remember.ANGRY ALTERSBy the time the programmers are ready <strong>to</strong> create <strong>an</strong>gry alters, the childvictim has been well conditioned not <strong>to</strong> get <strong>an</strong>gry, but <strong>to</strong> passivelyaccept their abuse. <strong>The</strong> programmers have <strong>to</strong> get the child’s mind <strong>to</strong>break with their prior programming <strong>to</strong> get <strong>an</strong>gry. In order <strong>to</strong> do this, thechild will be <strong>to</strong>rmented without end for several days. This is one of theworst parts of the programming, <strong>an</strong>d m<strong>an</strong>y children die in this stage.<strong>The</strong> <strong>Illuminati</strong> pick their most gentle Mothers-of-Darkness systems <strong>to</strong>work with the male programmers. If the gentle Mothers-of-Darknessslaves didn’t bring some bal<strong>an</strong>ce <strong>an</strong>d affection <strong>to</strong> the child victims, thesadistic programmers would probably kill all of the children at this stageof programming. For more on this see Egypti<strong>an</strong> Armies just a littlefurther.ANIMAL ALTERS me<strong>an</strong>t <strong>to</strong> act like<strong>an</strong>imalsAlthough a large share of <strong>an</strong> alter system is dehum<strong>an</strong>ized, there arecertain alters which will be created <strong>to</strong> actually hold the body <strong>an</strong>d actlike <strong>an</strong>imals. <strong>The</strong> alter may even be named “<strong>an</strong>imal.” A male or femaleslave may have dog alters which bark like a dog <strong>an</strong>d get in<strong>to</strong> thecorrect position <strong>to</strong> allow a Rottweiler/Germ<strong>an</strong> shepherd/Doberm<strong>an</strong> <strong>to</strong>penetrate the slave sexually. This is accomplished by taking menstrualblood from a dog in heat <strong>an</strong>d smearing it on the victim.Animal alters are created by the st<strong>an</strong>dard dehum<strong>an</strong>ization methods,<strong>an</strong>d then shown films of what they are <strong>to</strong> become. Through hypnosis<strong>an</strong>d behavior modification, the alters eventually accept the role theyare <strong>to</strong>rtured <strong>an</strong>d programmed in<strong>to</strong> taking. It’s hard telling what rolesthe programmers have created, it could possibly be <strong>an</strong>y <strong>an</strong>imal, butcats, dogs, donkeys, horses, rats, <strong>an</strong>d mice are common examples.297


CHRISTIAN FRONT ALTERSMost <strong>Illuminati</strong> Systems have Christi<strong>an</strong> front alters. Some of the earlysplits around 2 years of age are provided the ch<strong>an</strong>ce <strong>to</strong> genuinelyaccept Christ. From these alters, two things will be done. Front alterswho are Christi<strong>an</strong>s will be created, <strong>an</strong>d sat<strong>an</strong>ic alters. In order <strong>to</strong> getdedicated Sat<strong>an</strong>ic alters, Christi<strong>an</strong> alters are severely traumatized <strong>an</strong>dGod is blamed for not helping them. <strong>The</strong> Sat<strong>an</strong>ic alters will be deeplyconvinced that God has ab<strong>an</strong>doned them. <strong>The</strong> Christi<strong>an</strong> alters willdissociate all the trauma, <strong>an</strong>d will believe that they are normal--nothinghas happened out of the ordinary in their life. Christi<strong>an</strong> alters will also,like all MPD/DID alters, tend <strong>to</strong> deal with overwhelming problems bydissociation. M<strong>an</strong>y Christi<strong>an</strong> alters will deny such basic things such asthat a Sat<strong>an</strong>ic conspiracy exists. <strong>The</strong>y often will be far more zealousth<strong>an</strong> the normal Christi<strong>an</strong>, because they do not have conflicting egostates.If <strong>an</strong>y situation calls for compromise of their religious beliefs theyc<strong>an</strong> switch <strong>to</strong> someone else--<strong>an</strong>d thereby escape having <strong>to</strong>compromise. <strong>The</strong>re are m<strong>an</strong>y programmed multiples leading theChristi<strong>an</strong> churches <strong>to</strong>day. Christi<strong>an</strong> alters are coached via the modernchurch <strong>an</strong>d their h<strong>an</strong>dlers <strong>to</strong> only “spiritually minded” <strong>an</strong>d not <strong>to</strong>challenge evil in the natural world. Some walk around believing thatGod will cure everything, which is true but not in the sense that some ofthe churches are explaining. That doesn’t me<strong>an</strong> that all Systems will be“Poly<strong>an</strong>ish”, but it c<strong>an</strong> happen. <strong>The</strong> original Christi<strong>an</strong> alters will beshamed <strong>an</strong>d then hidden by the programmers. <strong>The</strong> “host” or“presenting” alter which holds the body will often be a Christi<strong>an</strong>. Thisreally helps hide the entire mind-control. Interestingly, a system of20,000 alters may have oniy less th<strong>an</strong> a dozen Christi<strong>an</strong>s alters, but theone or two strong Christi<strong>an</strong> alters will exert a disproportionate influenceon the System. <strong>The</strong> <strong>Illuminati</strong> has had a hard time controlling theChristi<strong>an</strong> alters they allow. In their zeal <strong>to</strong> infiltrate, control <strong>an</strong>d destroythe Christi<strong>an</strong> churches, they have opened m<strong>an</strong>y of their <strong>to</strong>p slaves up<strong>to</strong> the love of God, which has ended in the slaves trying <strong>to</strong> break free.Unfortunately, most ministers know <strong>to</strong>o little <strong>to</strong> help these peopleescape.CLONES<strong>The</strong> clones are little children who have been put in<strong>to</strong> robot costumes<strong>an</strong>d are trained <strong>to</strong> attack parts of the system which are not incompli<strong>an</strong>ce with the programming. <strong>The</strong> heads of the clones c<strong>an</strong> beunscrewed. <strong>The</strong> clones c<strong>an</strong> be taken out by various tactics--but thereare hundreds of clones <strong>an</strong>d they each have been numbered. <strong>The</strong>serial numbers are placed on them. An example of a clone’s numberat the base of the neck might be 158.00. This may either be a model or298


actual serial no. but often is tied <strong>to</strong> the birthdate of the victim, which isgenerally part or all of the victim’s Monarch serial no.To create the clones during the 1950s, movie scenes of the divers of theNautilus of the movie 20,000 Leagues Under the Sea were shown. (Withlater models, such as in Star Wars programming, the robots of theseshows suffice.) Some clones kill with a knife as the divers in the movie20,000 Leagues Under the Sea. When clones surface <strong>an</strong>d take thebody they are cold. Programming is encased in a clone.Alters, particularly cult alters, may not be able <strong>to</strong> see the clones. <strong>The</strong>ymay be hidden in almost <strong>an</strong>ything internally, including door knobs <strong>an</strong>dwalls. However, there is the possibility for the therapist that a net madeof cloth woven of light c<strong>an</strong> be dropped <strong>an</strong>d the lumps will reveal theclones. <strong>The</strong>y may be behind mirrors <strong>to</strong>o. Water has certain propertiesthat c<strong>an</strong> s<strong>to</strong>p clones, as well as magnets. Microwaves will take care ofthe electronics. A little microwave c<strong>an</strong> take out a group of clones.Clones have m<strong>an</strong>y shapes--but they do not look like people. <strong>The</strong>yusually have a switch <strong>to</strong> be activated. Atl<strong>an</strong>tis may be set up as theworld for clones, in accord with 20,000 Leagues Under the Seaprogramming. Whatever the style, robots & clones are popular items forprogrammers <strong>to</strong> install. One of the major defects of the first fewdecades of <strong>Illuminati</strong> programming, was that the clones were set up sothat water would s<strong>to</strong>p them. <strong>The</strong>rapists could s<strong>to</strong>p the clone armies byapplying water on them. Recent models have corrected thatdeficiency. But when the clones are s<strong>to</strong>pped, <strong>an</strong>d the diver suits aretaken off of the child alters, who are inside of the robot suits, then achild alter will be found which is in the same drugged state that it wasin when it was being programmed. This child fragment alter will oftenhave <strong>an</strong> I.V. (wires <strong>an</strong>d needles) in it, <strong>an</strong>d will be very druggy. It will bein its programmed war-like <strong>an</strong>gry state. In Druidism, a sw<strong>an</strong> wassomething dirty like a pig in Judaism. Some alters which are assigned <strong>to</strong>protect, are warned they will become sw<strong>an</strong>s. If the Queen of theClones becomes a sw<strong>an</strong>, the clones will become helpless. <strong>The</strong> Queenof the Clones (a triad) must do her job or be turned in<strong>to</strong> a sw<strong>an</strong>.Ch<strong>an</strong>ging subjects <strong>to</strong> alter clones, Cloning programs include, forinst<strong>an</strong>ce, Lollipop & Lobster programs.DELTA’S<strong>The</strong> Delta’s are alters trained <strong>to</strong> carry out special missions resulting indeath. <strong>The</strong> Delta’s who are inactive are asleep. <strong>The</strong>y must beactivated. <strong>The</strong> programming <strong>to</strong> activate them will be triggered if amission is given or if certain parts of the deeper parts of the system aretampered with. Delta’s will work as a team with the Beta’s <strong>to</strong> kill. An<strong>Illuminati</strong> System will be “magically” twinned during programming <strong>to</strong> bea Twin with <strong>an</strong>other system’s Delta alters. And these two systems in turnare joined in programming with <strong>an</strong>other 2 person team, so that 2299


person <strong>an</strong>d 4 person teams c<strong>an</strong> be constructed. This gives the <strong>Illuminati</strong>more flexibility in what kind of missions it c<strong>an</strong> send its slave out on. 4person assassination teams are very common. <strong>The</strong>y had 2 four-m<strong>an</strong>Monarch slave assassination teams at Waco, Texas the day that theWaco Br<strong>an</strong>ch Davidi<strong>an</strong> building burned up.HOW THE DELTA’S ARE CREATED<strong>Illuminati</strong> Deltas are linked <strong>to</strong> the moon children, <strong>an</strong>d are the offspringof the moon child alter in the early cage programming. In the early1950s, the <strong>Illuminati</strong> would take a child <strong>an</strong>d force it <strong>to</strong> watch <strong>an</strong>otherchild, who they have bonded with, be incinerated alive in acrema<strong>to</strong>rium at high heat which would not only melt the child but turnit <strong>to</strong> ashes. <strong>The</strong> form of the child in ashes would stay in the shape of thechild until the crema<strong>to</strong>rium door which would have glass in it forviewing would be opened. A small gust of air would cause the ashes <strong>to</strong>lose their shape. Watching through glass <strong>an</strong>d feeling the fire <strong>an</strong>dhearing the child scream was a trauma for <strong>an</strong>y child. <strong>The</strong> Presideo <strong>an</strong>dsome of the <strong>Illuminati</strong>-run funeral homes which had this type ofcrema<strong>to</strong>rium were employed for fire traumas. <strong>The</strong> fire trauma wasdone so that the child would visualize melting from heat. This meltingtrauma would then form the basis of the good witch/bad witchprogramming where water on a witch makes her melt like in the Wizardof Oz s<strong>to</strong>ry. <strong>The</strong> Delta <strong>an</strong>d Beta alters are then <strong>to</strong> tr<strong>an</strong>ce in<strong>to</strong> theirmelted state whenever their programmers w<strong>an</strong>t them <strong>to</strong> function. <strong>The</strong>irfunctioning state is the “melted state”. <strong>The</strong> programming is that thewitches melt down <strong>to</strong> NOTHING. After a few years, the programmersrealized that they didn’t have <strong>to</strong> have a real trauma <strong>to</strong> get theprogramming done, because they could usually do it with acombination of hallucina<strong>to</strong>ry drugs, hypnotic drugs, <strong>an</strong>d paper dolls.Paper dolls which when cut out are all joined <strong>to</strong>gether would beplaced on a grid similar <strong>to</strong> <strong>an</strong> alter grid on a platform. <strong>The</strong> righthypnotic suggestions are made, <strong>an</strong>d the child believes these paperdolls are alive <strong>an</strong>d are burned up. If the paper dolls didn’t work, they’dgo back <strong>to</strong> using a real child <strong>to</strong> get the job done. Later, the lower catalters are taught how <strong>to</strong> be hunted <strong>an</strong>d hunt at the “life or death”Beltaine hunts. <strong>The</strong>se hunts helped train alters which are then used <strong>to</strong>create the Deltas. <strong>The</strong> Deltas are not completed until later. To create atrained assassin, the alters were desensitized <strong>to</strong>wards pain <strong>an</strong>d deathby being shown gory films with the eyes forced open. Hypnosis was alsoused. <strong>The</strong> potential victims were devalued, it is believed the Ary<strong>an</strong>alters which are very elitist <strong>an</strong>d racist are used for Delta alters. Sat<strong>an</strong>icrituals were also involved in the creation of the Deltas. Deltas will betrained in h<strong>an</strong>d <strong>to</strong> h<strong>an</strong>d combat--<strong>an</strong>d know certain vulnerable places<strong>to</strong> kill people incl. breaking the neck. Training included a great deal ofweapons training. In <strong>an</strong> early programmed multiple System, which was300


created <strong>an</strong>d programmed in Nazi Germ<strong>an</strong>y in the 1930s, theassassination alters are placed behind a wall of ice. When the wall ofice is melted, these assassination alters are freed <strong>an</strong>d they will goabout their assignment <strong>to</strong> kill by using <strong>an</strong> ice-pick type needle pokedin<strong>to</strong> the heart of their prey. <strong>The</strong>se Systems were infiltrated in<strong>to</strong> the U.S.during the 1930s <strong>to</strong> build a foundation for when the Nazi’s expected <strong>to</strong>win the war. Later, Americ<strong>an</strong> Delta alters were taught the art ofassassination by poking a needle through the eye of the victim. Thiskind of assassination is apparently hard <strong>to</strong> detect.HOW THE DELTAS ARE ACTIVATED<strong>The</strong> access codes for the Deltas are structured different th<strong>an</strong> for therest of the System, except for the sexual/entrapment/espionage alterswho are designed very similar. <strong>The</strong> Deltas may be black color coded.When the programmer w<strong>an</strong>ts <strong>to</strong> use these Delta alters, he will call themup from their genii bottle or wherever they are hidden deep in themind. <strong>The</strong>y will be comm<strong>an</strong>ded <strong>to</strong> melt. When they have melted in<strong>to</strong>the nothing state, then the programmer gives <strong>an</strong> exact script ofeverything the Delta alter is <strong>to</strong> do, just like you would program acomputer step by step-- from step a <strong>to</strong> step z. For inst<strong>an</strong>ce, theprogrammer might say, “At a certain place you will be in the meltedstate until you hear the words, “I’m going <strong>to</strong> K<strong>an</strong>sas City, where are youfrom Miss Ruby shoes?”, at that point you will remain in the melted state<strong>an</strong>d do part B of the script.” As the programmer continues with thescript, a Delta fragment will be given NWO codes, b<strong>an</strong>k accountnumbers, <strong>an</strong>d major sports numbers (so other NWO folks know who isgoing <strong>to</strong> win ahead of time). This fragment will simply be a mentalfloppy disk. <strong>The</strong> Delta-Beta alters are habitually lied <strong>to</strong> by theirprogrammers when they are given their detailed scripts. If they arecarrying cocaine they may be <strong>to</strong>ld it is soap for needy children. If theyshoot someone, then they will be <strong>to</strong>ld all kinds of lies about the personthey are <strong>to</strong> kill. <strong>The</strong>y never are really given a ch<strong>an</strong>ce <strong>to</strong> step outside oftheir deep tr<strong>an</strong>ce <strong>an</strong>d <strong>to</strong> ever hear the truth about what they aredoing. <strong>The</strong>y live their lives in a surreal f<strong>an</strong>tasy world where nothing reallymakes sense. <strong>The</strong>y don’t try <strong>to</strong> think for themselves, they just followorders.Since a mission may call for other alters <strong>to</strong> hold the body, theprogrammer must put <strong>to</strong>gether his Delta script so that two scripts c<strong>an</strong>be intertwined. <strong>The</strong> programmer may work out something so that theDelta alter goes in<strong>to</strong> a temporary sleep in the melted state while out onthe mission. This way the programmer doesn’t have <strong>to</strong> be present onthe trip <strong>to</strong> bring the Delta alter back in<strong>to</strong> its functioning “melted” state.<strong>The</strong> Delta alters c<strong>an</strong>’t be out <strong>to</strong>o long <strong>an</strong>yway because they are notused <strong>to</strong> functioning in the outside world <strong>an</strong>d they get tired fast. SeveralDelta alters c<strong>an</strong> switch so that they keep having a fresh Delta alter301


come out, but eventually every one begins <strong>to</strong> get tired. That is <strong>an</strong>otherreason they will work in <strong>an</strong>other script with front alters. <strong>The</strong> front altersare used <strong>to</strong> holding the body everyday. <strong>The</strong> front alters will take avacation, while the Deltas work on their detailed script of carryingsecret messages <strong>an</strong>d maybe killing someone. During <strong>an</strong> airpl<strong>an</strong>e trip, atravel alter will hold the body while the Deltas sleep in the melted state.Delta alters (who by the way have pho<strong>to</strong>graphic memories) are giventheir scripts by programmers, not run-of-the-mill h<strong>an</strong>dlers. Everything is<strong>to</strong>o fine tuned in the programming for a run-of-the-mill h<strong>an</strong>dler. Deltaalters have <strong>an</strong> internal hour glass, this hour glass may be a mural in theirinternal world that they look at. As long as they are obedient, the hourglass s<strong>an</strong>ds do not fall. If they are disobedient, the s<strong>an</strong>d begins falling,<strong>an</strong>d their life is on the line. <strong>The</strong>re is no room for mistakes. If the s<strong>an</strong>d runsout, death is <strong>to</strong> happen. Large hourglasses are often displayed in fron<strong>to</strong>f Delta-Beta slaves <strong>to</strong> remind them that their is no room for mistakes,no slack for disobedience. <strong>The</strong>ir thinking is buried in fairy tales. <strong>The</strong>y areprogrammed <strong>to</strong> see themselves in fairy tales, they are programmed not<strong>to</strong> see their h<strong>an</strong>dlers or <strong>an</strong>ybody’s else’s face for that matter. <strong>The</strong>irh<strong>an</strong>dlers pretend they are fairy tale characters or aliens. <strong>The</strong>se alters donot have a ch<strong>an</strong>ce <strong>to</strong> underst<strong>an</strong>d what they are doing. If theprogrammers get tired of the slave’s programming breaking down--<strong>an</strong>d it does in part due <strong>to</strong> the severe abuse they get from these sadisticprogrammers/h<strong>an</strong>dlers, then they will simply give the slave <strong>an</strong>assignment in which the slave will end up dying, i.e. a suicide mission.This type of suicide mission is happening all over the United States withgreat frequency. An example would be a lady who is getting <strong>to</strong> wiseabout the New World Order, so a Delta is assigned <strong>to</strong> crash their carin<strong>to</strong> the lady, <strong>an</strong>d its written down as “just <strong>an</strong> unfortunate ACCIDENTwith fatalities.” A shop owner refuses <strong>to</strong> pay the Mafia for protection; soa Delta v<strong>an</strong>dalizes <strong>an</strong>d tears up the shop <strong>an</strong>d has a fatal shoo<strong>to</strong>ut withthe police.FOREIGN LANGUAGE ALTERS<strong>The</strong> <strong>Illuminati</strong>/intelligence agencies realized when they started makingslaves with pho<strong>to</strong>graphic memories that they could create differentparts of a slave’s mind <strong>to</strong> operate on different l<strong>an</strong>guages. <strong>Illuminati</strong>hierarchy systems will employ foreign l<strong>an</strong>guage alters for severalpurposes: a. <strong>to</strong> facilitate the alter working in various situations, forexample French is helpful <strong>to</strong> work with Catholics in Quebec, <strong>an</strong>d withthe Cambodi<strong>an</strong>/Vietnamese criminal syndicate that the <strong>Illuminati</strong> setup in this nation. A high profile example of this is Bo Gritz, <strong>an</strong> officer ofthe Delta Force, who due <strong>to</strong> his pho<strong>to</strong>graphic mind (created via brainstem scarring) c<strong>an</strong> speak M<strong>an</strong>darin Chinese. M<strong>an</strong>darin Chinese is notnormally <strong>an</strong> easy l<strong>an</strong>guage for Americ<strong>an</strong>s. b. <strong>to</strong> hide things in a system.Examples of this include code words attached <strong>to</strong> Greek <strong>an</strong>d Hebrew302


letters for body programs. Another example is having latin phrases foraccessing deeper parts. If <strong>an</strong> entire area of a system is put in a foreignl<strong>an</strong>guage, <strong>an</strong>d the system is not given <strong>an</strong>y alters capable oftr<strong>an</strong>slation, then you have very effectively isolated <strong>an</strong> entire section.For inst<strong>an</strong>ce, systems are being created in their early teens which aresectioned off in<strong>to</strong> 5 or more l<strong>an</strong>guages, say for inst<strong>an</strong>ce, Germ<strong>an</strong>,Sp<strong>an</strong>ish, French, Itali<strong>an</strong>, <strong>an</strong>d Arabic. Some of the Systems created inthe late 195 0s, already were employing some of this. Since the verybest <strong>Illuminati</strong> programmer in the world is Europe<strong>an</strong>, <strong>an</strong>d speaks severall<strong>an</strong>guages you c<strong>an</strong> expect <strong>to</strong> start <strong>to</strong> see more <strong>an</strong>d more of this "Towerof Babel” programming (multi-l<strong>an</strong>guage systems where parts c<strong>an</strong>’tcommunicate.) <strong>The</strong> reader realizes that such multi-l<strong>an</strong>guagecapabilities are always secret until the person starts breaking down theprogramming. <strong>The</strong> programmers tell alter systems that God w<strong>an</strong>ts thisprogramming done, because God confounded all the l<strong>an</strong>guages &then spread people in<strong>to</strong> the 4 corners of the world.GATEKEEPER ALTERS<strong>The</strong> Gatekeeper alters are just that. <strong>The</strong>y protect the gates or portals <strong>to</strong>all System levels. Infrequently, the programmers may also call them“doorkeepers”, or “<strong>to</strong>llmen” & “<strong>to</strong>ll women”. <strong>The</strong> victim may refer <strong>to</strong>them as guards or blockers, although Gatekeepers are more th<strong>an</strong>guards, they are <strong>an</strong> entr<strong>an</strong>ce or portal <strong>to</strong> something. Gatekeepers mayoften be the alter that was split <strong>to</strong> get a particular section. Eachgatekeeper may be at a deeper level tr<strong>an</strong>ce th<strong>an</strong> the one before it.When a Gatekeeper is split it creates a natural link <strong>to</strong> the alters that arecreated from itself. <strong>The</strong>n the Gatekeepers are given programming not<strong>to</strong> see what they have created <strong>an</strong>d what they are natural portals <strong>to</strong>.<strong>The</strong>se steps create a natural portal for the deeper alters. One-waymirrors are usually installed between the Gatekeeper <strong>an</strong>d the sectionthey guard, so that the deeper alters c<strong>an</strong> see out, but the Gatekeeperc<strong>an</strong>’t see in. Besides splitting off entire sections from the Gatekeepers,clown alters will be created from them <strong>to</strong> keep the Gatekeepers in line.<strong>The</strong> first row of doors in a system--which the front Gatekeepers protectare often set up as the “red door(s)”. Deeper in the system, otherGatekeepers will be stationed in front of import<strong>an</strong>t systems, <strong>an</strong>d theseother doors will have a different color code th<strong>an</strong> the first set of doors.To train gatekeeper alters, they are taken <strong>to</strong> a door <strong>an</strong>d by behaviormodification techniques (i.e. severe <strong>to</strong>rture) they are taught not <strong>to</strong> gobeyond the door. <strong>The</strong>y are <strong>to</strong> hold their place <strong>an</strong>d not step through thedoor. <strong>The</strong>n they are strongly programmed via hypnosis <strong>to</strong> forget thetraining session, but not the lesson. <strong>The</strong> first row of Gatekeepers c<strong>an</strong>have no tie <strong>to</strong> the cult <strong>an</strong>d no tie <strong>to</strong> the outside world. <strong>The</strong>y are taughtthey are vagabonds. <strong>The</strong> only real tie they are allowed <strong>to</strong> have isthemselves, <strong>an</strong>d they are aren’t allowed <strong>to</strong> know who they themselves303


are. <strong>The</strong> st<strong>an</strong>dard programming for Gatekeepers is <strong>to</strong> mess them upwith love-hate double binds. Gatekeepers are often very mel<strong>an</strong>cholic<strong>an</strong>d if they go against their programming, they or the alters near themc<strong>an</strong> easily commit suicide. <strong>The</strong> Gatekeepers always receive heavyprogramming <strong>an</strong>d heavy trauma. Front line Gatekeepers may be nearthe front of a System, but due <strong>to</strong> their heavy programming, what theysay should be taken with a big grain of salt. <strong>The</strong>y usually provideoutsiders with the lies the programmers have so skillfully convincedthem <strong>to</strong> believe. <strong>Illuminati</strong> Gatekeeper alters are in 3 parts. <strong>The</strong> highernumbered gatekeepers have a pedestal which they are rotating on. Acat, a butterfly <strong>an</strong>d a porcelain face are the three kinds of alters whichare joined <strong>to</strong>gether <strong>an</strong>d rotate. <strong>The</strong> deeper Gatekeepers on <strong>Illuminati</strong>models must be locked in place before conversation c<strong>an</strong> ensue. <strong>The</strong>Gatekeeper alters are non-sexual, <strong>an</strong>d programmed not <strong>to</strong> see what isbelow their feet which are the sexual alters. A stacking mech<strong>an</strong>ism hasbeen created <strong>to</strong> call each gatekeeper alter out <strong>an</strong>d stacked on eachlike a deck of cards. This comm<strong>an</strong>d for some systems is “St<strong>an</strong>d in orderaccording <strong>to</strong> r<strong>an</strong>k & serial no. [said 3x].” Another stacking mech<strong>an</strong>ismc<strong>an</strong> be achieved <strong>to</strong> place them all on the potter’s wheel according <strong>to</strong>order with “See no evil, Hear no evil, do no evil” which originally wasaccomp<strong>an</strong>ied by a h<strong>an</strong>d movement of exposing cards. <strong>The</strong> NWO’sCharismatic br<strong>an</strong>ch give their deeper gatekeepers Porcelain FaceProgramming. Sometimes, the frontline Gatekeepers also get Porcelainface programming. <strong>The</strong> movie Ghostbusters, which has been used fora programming script on some slaves, has a very strong demonic“Gatekeeper” in the show. J<strong>an</strong>us, the two-faced god, was agatekeeper, & the 1st month which is the gate <strong>to</strong> the new yr. (J<strong>an</strong>uary)is named after him. <strong>The</strong> Illum. Great Rite ritual has a Gatekeeper (male)<strong>an</strong>d Keymaster (female) <strong>to</strong> produce <strong>an</strong> AntiChrist child.HIERARCHY & DEEPER CULT ALTERS<strong>The</strong> deeper cult alters may be placed in a crystal ball <strong>an</strong>d theCabalistic Tree of Life. <strong>The</strong> Mother-of-Darkness alters will be set up onthe Maiden-Mother-Crone trinity of the occult. S<strong>to</strong>rmy alters, <strong>an</strong>d theremay be 60 or more deep level S<strong>to</strong>rmy alters per system, are alters thatare <strong>to</strong> be involved in all the m<strong>an</strong>-made “natural disasters” that arepl<strong>an</strong>ned for -the period of <strong>an</strong>archy. Serge<strong>an</strong>t alters are deeper callback alters who will be comm<strong>an</strong>ders of programs for the AntiChristtakeover. <strong>The</strong> deep front alters of the Mother-of-Darkness, Gr<strong>an</strong>deDames, or Gr<strong>an</strong>de Master alters will not be in a deep tr<strong>an</strong>ce. <strong>The</strong>yneed <strong>to</strong> be fully alert for what they do for the <strong>Illuminati</strong>. However, sincethey are only out at special points in time, all they know is <strong>Illuminati</strong> life<strong>an</strong>d philosophy. <strong>Illuminati</strong> philosophy will include such things as “Pain isstrength. <strong>The</strong> pain we suffer will give us the strength <strong>to</strong> conquer.” <strong>The</strong>Sisters of Light (the level before the Mothers of Darkness) will be under304


the leadership of a Queen Mother. She will direct them <strong>to</strong> abduct ah<strong>an</strong>dsome male for breeding purposes. After the h<strong>an</strong>dsome male isused for breeding <strong>to</strong> get a male child for sacrifice or a female <strong>to</strong> raiseas a Sister of Light, then the h<strong>an</strong>dsome male will be sacrificed. <strong>The</strong>Sisters of Light wear white for this ceremony. Because these alters onlyknow the traditional ways, they don’t have a realization of what theyare doing. An <strong>Illuminati</strong> multiple will carry on ritual functions at <strong>an</strong>umber of different levels in the occult. <strong>The</strong>re will be different alters fordifferent levels <strong>an</strong>d different ritual dates. <strong>The</strong> back part of a hierarchysystem will not be worked until a sealing ceremony involving Egypti<strong>an</strong>magic at the age of 19 in late Apr.-May. Three keys are given at theceremony, which is tied <strong>to</strong> astrological events. <strong>The</strong> 19 also represents 9+ 10 doors in the system. <strong>The</strong>n the back (deeper hierarchy) alters willbegin <strong>to</strong> be used. This back half of the System will be shaped bypathworkings of the Cabalistic Tree of Life. In the first levels ofwitchcraft, they will think they are worshipping a male & a female god.By the third level they will be informed they are worshipping one god-Lucifer. Some <strong>Illuminati</strong> groups, which are Jewish, worship a female godat the coven levels. <strong>The</strong> secret <strong>Illuminati</strong> set of documents that theBavari<strong>an</strong> government confiscated in 1784 <strong>an</strong>d published as DieOriginalschriften der Illuminatensekte, Munich has <strong>an</strong> accurateorg<strong>an</strong>izational chart on p. 32 of these reprinted <strong>Illuminati</strong> papers. <strong>The</strong>rewere 130 or levels. Six of these are functional. Monarch slaves whohave internal worlds with 13 levels, with 6 functional <strong>an</strong>d 6 hidden arenot much different th<strong>an</strong> the actual hierarchy structure. In the <strong>Illuminati</strong>covens, each coven will secretly have a copy of <strong>The</strong> Book of Ages,which is vellum, <strong>an</strong>d is basically a Who’s Who of the <strong>Illuminati</strong>, <strong>an</strong>d acopy of <strong>The</strong> Book of Generations, which explains the 13 bloodlines <strong>an</strong>dwhat belongs <strong>to</strong> what generation. A h<strong>an</strong>dwritten magickal Book ofShadows will also belong <strong>to</strong> the coven. Only the Keeper of the Books<strong>an</strong>d the coven leader will know about these things. <strong>The</strong> coven will alsohave a Keeper of the Seals which pertains <strong>to</strong> vows <strong>an</strong>d oaths. AfterHalloween, the coven leader (priest or priestess) will secretly send allthe coven records <strong>to</strong> headquarters in Europe. It is import<strong>an</strong>t <strong>to</strong> realizethat the internal structuring of <strong>an</strong> <strong>Illuminati</strong> alter system will correspond<strong>to</strong> the external structures of the <strong>Illuminati</strong>. This may not be <strong>an</strong> exac<strong>to</strong>ne-<strong>to</strong>-one correspondence. Underst<strong>an</strong>ding the <strong>Illuminati</strong> hierarchyr<strong>an</strong>ks, which by the way had remained secret until Fritz Springmeier’srecent Newsletter From A Christi<strong>an</strong> Ministry in J<strong>an</strong>. ‘93, is import<strong>an</strong>t.Within the male membership in the hierarchy you will find the followingpositions, Gr<strong>an</strong>de Druid, Gr<strong>an</strong>de Master, 5-star general (Serv<strong>an</strong>t of thePentacle), Asmodeus, Ipsimus (or Royal Ipsimus), <strong>an</strong>d Supreme Master.Bards are wise men within Druidism. Within the female side, are theSisters of Light (9 grades), the Mothers of Darkness (11 grades), theGr<strong>an</strong>de Mothers (13 grades), the Gr<strong>an</strong>de Dames, <strong>an</strong>d the QueenMother. Each of the 13 bloodlines have their own governingmonarchies, upon which the numerous mob crime families are305


modelled. This particular arr<strong>an</strong>gement may have developed fromBasque witchcraft rather th<strong>an</strong> Druidism. Generational thrones (kings,princes, priests) are very import<strong>an</strong>t. <strong>The</strong> Kings are called Olympi<strong>an</strong>s. Allof these bloodlines cooperate by having councils. Three groups havebeen identified as preserving the pl<strong>an</strong>s for the world rule by theAntiChrist, the Keepers of the Dawn, the Order of the Quest, <strong>an</strong>d theOrder of the Garter.EGYPTIAN ARMIES<strong>The</strong> Egypti<strong>an</strong> armies are hundreds of fragments which have beenprogrammed <strong>to</strong> have uniforms <strong>an</strong>d <strong>to</strong> function as parts of <strong>an</strong> army. <strong>The</strong>main gods or spirits of Egypti<strong>an</strong> magic may be the names of thecaptains of the armies, such as the following names Isis, Osirus, Horus,Set <strong>an</strong>d Ra. Thoth c<strong>an</strong> be <strong>an</strong>other name. In the Temple of Set, alterswith Egypti<strong>an</strong> names abound, <strong>an</strong>d aren’t restricted <strong>to</strong> fragment armies.<strong>The</strong> armies are built <strong>to</strong> protect various internal structures. <strong>The</strong> technique<strong>to</strong> make these armies are <strong>to</strong> <strong>to</strong>rment the victim child in such a way thatthey make the child very <strong>an</strong>gry. At the peak of the child’s rage, theysplit the mind. <strong>The</strong> result is lots of child alter fragments which are <strong>an</strong>gry.<strong>The</strong>se are collected <strong>an</strong>d shaped in<strong>to</strong> <strong>an</strong> <strong>an</strong>gry army of little children.When <strong>an</strong> adult Monarch slave, triggers a protective army the adultalter finds themselves with <strong>an</strong>gry children alters who are like a largecrowd of <strong>to</strong>ddlers who are screaming their heads off. <strong>The</strong>re is no way<strong>to</strong> reason with these child fragments. Imagine trying <strong>to</strong> reason with alittle 2 year who is screaming. Without <strong>an</strong>yway <strong>to</strong> reason with them--theadult alter has little defense against such <strong>an</strong> army.FLOODING ALTERSFlooding alters c<strong>an</strong> be used as singles or as a group of alters. <strong>The</strong>re isalmost always a number of flooding alters in a system. <strong>The</strong>y aredeveloped by using drugs which lower dissociative barriers. <strong>The</strong> drugswere used when these alters held the body <strong>an</strong>d the drugs caused allthe dissociative walls <strong>to</strong> come down. <strong>The</strong>se alters hold the memory ofthis flooding.- Drugged alters in weird states c<strong>an</strong> also be pulled up <strong>to</strong> make asystem feeling crazy.GEMS<strong>The</strong> Gem alters are early child splits. <strong>The</strong>se alters are treated as bad aspossible. <strong>The</strong>y are literally defecated upon, <strong>an</strong>d pissed upon. <strong>The</strong>y areintentionally dehum<strong>an</strong>ized <strong>an</strong>d taught <strong>to</strong> think as little as possible306


about themselves. At some point, these alters who have no self-esteemare <strong>to</strong>ld that they are something precious as Sat<strong>an</strong>’s gems. But they arewarned that if they ever talk <strong>to</strong> someone on the outside, bombs will gooff. Various bomb mech<strong>an</strong>isms are constructed using other alters <strong>an</strong>dimagery. If these bombs go off, these alters will be so dysfunctional,incoherent <strong>an</strong>d in shock that the therapist will not be able <strong>to</strong> work withthe System again. <strong>The</strong> Gems are then used <strong>to</strong> tr<strong>an</strong>smit the mind ofSat<strong>an</strong> <strong>to</strong> the System. Beyond the gems, <strong>an</strong>d the hour glass disciples,there may be a stage which has more memories hidden. If a therapistgets that far, see how <strong>to</strong> raise the curtain.LOOKING GLASS PEOPLE<strong>The</strong> “Looking Glass Images” is the <strong>Illuminati</strong> name for mirror imagealters, who are split off of main alters in order <strong>to</strong> confuse everyone butthe controller. Sometimes these alters c<strong>an</strong> be spotted because <strong>an</strong> alterwill say, “I don’t know if I’m inside or outside, I think I’m inside.” Aspreviously mentioned, m<strong>an</strong>y alters also have shadow alters createdfrom themselves <strong>to</strong> take their pain. It will be appropriate <strong>to</strong> discuss theoverlays that the <strong>Illuminati</strong> place over real alters. <strong>The</strong> <strong>Illuminati</strong> will try <strong>to</strong>hide real alters with pseudo alters, mirror alters, mirror images <strong>an</strong>d othertricks. Some alters are demons, <strong>an</strong>d others are simply illusions of themind. Shell alters prevent therapists from talking <strong>to</strong> the real alters.MIRROR IMAGESMirror images are purpose fragments whose job is <strong>to</strong> confuse bothvictim <strong>an</strong>d therapist. When <strong>an</strong> event happens, .the abusers willfragment the alter who participated in the event, <strong>an</strong>d create mirrorimages of that alter. This me<strong>an</strong>s that no one has the full memory. Analter doesn’t know if the mirror image is itself or something else. It’s veryconfusing. A tri<strong>an</strong>gle is formed by a. <strong>an</strong> alter, b. its mirror images, c.demonic mirror images. When <strong>an</strong> alter tries <strong>to</strong> recover a memory itgoes round <strong>an</strong>d round in a vicious cycle <strong>an</strong>d finally concludes thememory is false. If one alter holds a memory, <strong>an</strong> alter close <strong>to</strong> it willhave no feelings attached <strong>to</strong> the memory <strong>an</strong>d will find it difficult <strong>to</strong>accept the memory as its own. It’s like wearing someone else’s coat, itmay fit, but it just isn’t your own. Mirror images, & pseudo-alters arelayered in, so that it becomes perplexing <strong>to</strong> identify where <strong>an</strong> alterstarts & where it ends. <strong>The</strong>rapists may think they have integrated alters,& actually only integrated their mirror images. Looking Glass People aresimilar <strong>to</strong> the mirror images. <strong>The</strong> Programmers may create a lookingglass alter by having a drugged alter(s) of the victim endure thetrauma of seeing someone’s face peeled. <strong>The</strong>n the victim’s face is alsopretended <strong>to</strong> be peeled--by pulling off something like elmer’s glue307


which has formed a surface on the victim’s face. <strong>The</strong>n the deadperson’s skin is placed over the victim being programmed. <strong>The</strong> LookingGlass People are charted on grids <strong>an</strong>d contain lots of the programs.<strong>The</strong>y are confusing <strong>to</strong> the regular alters, because they appearinternally like mirror images.PROGRAMMER ALTERSInternal programming alters, which are “clone images” of the 3 primaryexternal programmers will be placed in<strong>to</strong> a Monarch system. Of coursethe programmers w<strong>an</strong>t <strong>to</strong> remain <strong>an</strong>onymous, so these programmingalters are faceless & wear white robes. <strong>The</strong>y are given vast power in theauthority structure of a system, & c<strong>an</strong> move wherever they need <strong>to</strong>move. When programming is discussed by a victim & therapist, they willappear.REPORTING ALTERS<strong>The</strong>se alters are programmed <strong>to</strong> record everything. <strong>The</strong>y lack <strong>an</strong>overview of reality. <strong>The</strong>y are child parts that only know their job. <strong>The</strong>reporting alters will be involved in the recontact cues. Recontact altersare alters which are unaware of the abuse. <strong>The</strong> programmers maypromise these recontact alters favors if they “report <strong>to</strong> Daddy.” Foryears, m<strong>an</strong>y therapists have worked with clients <strong>an</strong>d never realized thatthe secret <strong>an</strong>d well hidden reporting alters were reporting everythingback <strong>to</strong> the h<strong>an</strong>dler.SCRAMBLING ALTERSThis is one of the hardest type of programs for the victim <strong>to</strong> master. Tomake sure that the victim’s mind is very alert a drug is given whichclouds the thinking. <strong>The</strong> alters must try exceptionally hard if they are <strong>to</strong>concentrate <strong>an</strong>d learn what their job is. <strong>The</strong>y will learn how <strong>to</strong> takesomething being said <strong>an</strong>d scramble it. When alters are not supposed <strong>to</strong>hear something, these alters will be called up by the internalprogrammers & they will sit on <strong>to</strong>p of other alters <strong>an</strong>d scrambleeverything they hear. <strong>The</strong>se alters are technici<strong>an</strong>s who usually enjoythe mastery they have over their difficult assignment. <strong>The</strong>rapists c<strong>an</strong>give them a new job scrambling incoming cult messages. Scramblingprograms (linked <strong>to</strong> triggers for scrambling alters) have at times beengiven names such as “AC DC” & “FLIP FLOP.”308


SEXUAL ALTERS<strong>The</strong> early sexual trauma is designed <strong>to</strong> familiarize the child with sex, <strong>an</strong>d<strong>to</strong> access the primal part of the mind. <strong>The</strong> <strong>to</strong>rture <strong>an</strong>d sexual abuseeventually becomes gratifying <strong>to</strong> the mind. <strong>The</strong> mind does a reversal,pain becomes pleasure. At <strong>an</strong>y rate, the programmers are trying <strong>to</strong> geta type of nymphom<strong>an</strong>iac. <strong>The</strong>y accomplish this on one level. <strong>The</strong>sexual alters have no feelings attached <strong>to</strong> what they do, <strong>an</strong>d theirmasters never allow them <strong>to</strong> enjoy sex. <strong>The</strong>y are not <strong>to</strong> have climaxes,although they may be coached how <strong>to</strong> fake it. (For punishment if aslave gives trouble, the programmers might even hypnotically orsurgically sew up the cli<strong>to</strong>ris <strong>to</strong> insure the slave receives no gratification.<strong>The</strong> arab sheiks of Saudi Arabia will cut off--destroy-- the cli<strong>to</strong>ris of theirMonarch slaves in the same fashion that the Moslem world does with alltheir females.) <strong>The</strong> Programmers have been heard <strong>to</strong> program theirslaves, “Don’t be a hustler <strong>an</strong>d don’t pick up strays.” <strong>The</strong> programmersmust now ‘‘groom’’ these alters. Little boys begin <strong>to</strong> be orally sexuallymolested when they are three. That is the st<strong>an</strong>dard age. Females (<strong>an</strong>dsome males) need <strong>to</strong> learn how <strong>to</strong> appear <strong>an</strong>d act seductive. <strong>The</strong>programmers underst<strong>an</strong>d hum<strong>an</strong> nature. <strong>The</strong>y underst<strong>an</strong>d that there isa spectrum of female sexuality, where on one end of the spectrumfemales guard their bodies with their minds, <strong>an</strong>d on the other end theyguard their emotions with their bodies. When a wom<strong>an</strong> guards heremotions with her body--she is the type who craves sex for the physicalpleasure of sex. <strong>The</strong>re are <strong>an</strong> entire cluster of behavior traits that gowith this type of personality, such as the way they walk, use their eyes,stare at men, the way they dress etc. <strong>The</strong> sexual groomers <strong>an</strong>dprogrammers will teach the sexual alters these clusters of behavior. <strong>The</strong>sexual alters will also pick up lots of expertise naturally during the yearsof having <strong>to</strong> sexually service hundreds of abusers in every fashionimaginable. When Rose<strong>an</strong>ne Barr, a Monarch slave, in her recent T.V.interview with Barbara Walters said, “I’m been screwed every possibleway,” she was not exaggerating. <strong>The</strong> Gumby Programming is <strong>to</strong> makethe slave think their body is like Gumby <strong>an</strong>d is flexible <strong>to</strong> move in<strong>to</strong> <strong>an</strong>yposition. <strong>The</strong> slave is repeatedly threatened with their life, if they do notperform perfectly. <strong>The</strong> sexual techniques of the world have beencollected <strong>an</strong>d improved upon by the <strong>Illuminati</strong> <strong>an</strong>d their intelligenceagencies such as MI6, & the CIA. <strong>The</strong>re are techniques <strong>to</strong> use with oldmen, for porn movies etc. which the common people aren’t evenaware of. <strong>The</strong> intelligence agencies & the - military, when they use amale Monarch slave for covert activities, will find a female slave whosepersonality matches the male <strong>an</strong>d pair them sexually during the periodthat the male slave is used on covert operations. This is done <strong>to</strong> insurethat the other side doesn’t take adv<strong>an</strong>tage of the male’s sexualdesires. Subjects such as how <strong>to</strong> train alters for espionage & prostitutioncould be books in themselves. <strong>The</strong> Illum. have male instruc<strong>to</strong>rs whoteach small classes of females about the power of seduction & how309


the male brain shutdowns when their sexual org<strong>an</strong> gets involved.Finishing schools like at Youngs<strong>to</strong>wn, OH teach sexuality perform<strong>an</strong>cebased on fear of death. <strong>The</strong> male & female sexual slaves usually arehighly skilled technici<strong>an</strong>s who don’t have emotions attached <strong>to</strong> whatthey do.NAMES<strong>The</strong>re are some examples in professional literature which will serve <strong>to</strong>illustrate how the alters in <strong>an</strong> <strong>Illuminati</strong> system are named. A therapist ina professional magazine provided the names of a client’s alters, whichwere Karen J, Karen Jo, Karen Ja, Baby Alpha, Middle Alpha, AdultAlpha. One of Fr<strong>an</strong>k Putnam’s clients, (who had PET sc<strong>an</strong>s doneshowing how different alters have vastly different PET brain sc<strong>an</strong>s,which are not exhibited by people who only pretend <strong>to</strong> have MPD),had a Pam 1, <strong>an</strong>d a Pam 2. <strong>The</strong>se three methods here are commonmethods for nomenclature. In a 13x13x13 grid of alters, the <strong>to</strong>p 2sections of 169 each will usually have a quite a number of duplicatenames. Our hypothetical Mary, would have a Mary 1,2, 3...11, 12, 13.She might have Eves 1-13 also. On the charts these would be Eve A,Eve B, Eve C, etc. She could also have a George Ann, a Georgee, aGeorgette, a plain George, <strong>an</strong>d a little child George, <strong>an</strong>d several altersattached <strong>to</strong> these who have no names. Sometimes alters will be set upwith first names <strong>an</strong>d a surname, so that a family of alters will all havethe same last name (surname). Some alters are not named by theirabusers, they must fend for themselves in figuring out what <strong>to</strong> - callthemselves. <strong>The</strong>y only have access codes <strong>to</strong> pull them <strong>to</strong> the front ofthe mind. <strong>The</strong>re seems <strong>to</strong> be no end <strong>to</strong> the variety of names of alters.Some are named after the quality they have like a robot named Steel,or a crazy alter being named Dementia, or a <strong>an</strong>imal alter beingnamed Animal. However, a number of names keep popping up inSystem after System, so for what it’s worth here are some popularnames that Fritz has seen occurring as alter names: the Adepts, Alexis(or Alex), Angel, Anna, Baker, Charlie (or Charles), Crystal, Death,Jezebel, Lilith, Queen, Sadie, <strong>an</strong>d Sam<strong>an</strong>tha. This is not a scientificsampling at all, just <strong>an</strong> observation based on dozens of alter systemswhich have shared some of their alter’s names.BOXES & SELF-ABUSEWe will now discuss one method of placing boxes in<strong>to</strong> <strong>an</strong> alter system.Between the age of 4 <strong>an</strong>d 4 1/2, <strong>an</strong> <strong>Illuminati</strong> child would be taken <strong>to</strong>Scotty’s castle, CA for programming. A cedar chest would be placedin front of a table. Two <strong>Illuminati</strong> children well in<strong>to</strong> their programmingwould be assigned <strong>to</strong> guard the chest, which would be called the310


Doc<strong>to</strong>r’s box. <strong>The</strong>y would have “cle<strong>an</strong> slate” alters who knew nothingbut their hypnotic comm<strong>an</strong>ds <strong>to</strong> guard the doc<strong>to</strong>r’s boxes. Expendablechildren would be coached <strong>to</strong> come in<strong>to</strong> the room <strong>an</strong>d try <strong>to</strong> get in<strong>to</strong>the box. <strong>The</strong> <strong>Illuminati</strong> children would be given strict orders <strong>to</strong> kill them ifthey tried <strong>to</strong> get in<strong>to</strong> the box. If the children failed in their guard duty,they either got more programming or were in turn expended. <strong>The</strong><strong>Illuminati</strong> children had sharp swords with which <strong>to</strong> guard the box, whichhad 3 seals on it. Internally, Mengele would then hypnotically programin countless boxes with 3 seals. Locked up in the boxes would be selfmutilation<strong>an</strong>d body programs, etc. <strong>The</strong>rapists should know that theseboxes are deadly. After reaching the level of obedience where theywould kill for the programmer, the <strong>Illuminati</strong> children would be placedin a deep well for a well-trauma, <strong>an</strong>d then while deep in the well wouldbe given various orders such as “cut yoursel,” “probe yourself(electroshock oneself)” <strong>an</strong>d other self-abusive things. <strong>The</strong> well <strong>to</strong>rturewould usually work at teaching the “cle<strong>an</strong> slate” alters <strong>to</strong> abusethemselves. During m<strong>an</strong>y programming sessions, the victim is <strong>to</strong>ld “youmust pass a test, will you pass the test?” <strong>The</strong>re is something that is moremotivating in these words, th<strong>an</strong> if the truth were said, “you must endurethese traumas, for our enjoyment <strong>an</strong>d <strong>to</strong> become a slave for And <strong>to</strong>quote a line from the film When Rabbit Howls, “<strong>The</strong> worse things got,the more of us showed up.” <strong>The</strong> mind keeps protecting itself bydissociating the overwhelming abuse.LAYERINGProgramming is layered in. Layer after layer of programming is put in.Each alter or alter fragment is used as if it were a component of a largesystem. <strong>The</strong> result is that no alter or fragment is the whole, only a cog ina great machine. C<strong>an</strong> a single cog rebel against the whole machine?It is very difficult for a single component of thous<strong>an</strong>ds of components <strong>to</strong>rebel against its abusers, when it doesn’t even have the ability <strong>to</strong>realize they are abusers <strong>an</strong>d not the alter’s natural order giver. Besidesprograms, items are placed in<strong>to</strong> the mind <strong>to</strong>o. Examples include vaults,safes <strong>an</strong>d doors which need combinations & keys. <strong>The</strong> <strong>Illuminati</strong>Programmers see the layering in of programming as demonic. <strong>The</strong>y feelthe scripts, <strong>an</strong>d movies are more “fronts” th<strong>an</strong> the actual layeringmech<strong>an</strong>ism. <strong>The</strong>y believe, as one ex-Programmer said, “Thisprogramming involves <strong>an</strong> org<strong>an</strong>ization system, established byhorrendous trauma, for the alter personalities involving internal mentalimagery, which is driven by demons, who provide the power. Undoingit requires <strong>an</strong> underst<strong>an</strong>ding of the mental processes involved, theimagery or blueprint used, <strong>an</strong>d the spiritual dynamics.” (By the way,some readers will be ignoring this as Christi<strong>an</strong> propag<strong>an</strong>da. However,this was said, not because this person is a Christi<strong>an</strong>, which this personisn’t, but because this person w<strong>an</strong>ted others <strong>to</strong> be set free. Its also true311


that the Word of God, the Holy Bible, which was the foundation ofWestern civilization, does speak about spiritual warfare.)SYSTEMSNow we will go in<strong>to</strong> the various systems that are programmed in. <strong>The</strong>Programmers place in<strong>to</strong> their slaves a combination of the followingst<strong>an</strong>dard systems <strong>to</strong> make up the victim’s programming: a. CabalisticTree of Life, b. Carousel, c. Castle, d. Cave <strong>an</strong>d well, e. Chess Board, f.Double Helix, g. Flowers, h. Helix, i. Hour glass j. the Mensa system, k.Pentagram, 1. Pool of Death, m. Potter’s Wheel, n. Puppet System, o.Solemetric, p. Spider Web, q. Spiritual structuring, r. Stairwell, s. aTelescoping system, t. Tornado System, <strong>an</strong>d u. Umbrella. Also <strong>an</strong>internal timing clock (syst.) keeps time according <strong>to</strong> the rotation ofritual dates, which helps ‘justify” the SRA, for “it’s that time of the year.”Just a quick note: different programmers have different preferences forhow they do things. It also may depend on what site they are using forthe programming. Drugs <strong>an</strong>d videos are frequently used <strong>to</strong> get theperson <strong>to</strong> adopt the script they are <strong>to</strong> accept internally. However,harmonics <strong>an</strong>d electronics are increasingly being used. Ritual <strong>an</strong>dmagical ceremonies may or may not have rigid scripts.A. CABALISTIC TREE OF LIFE (see picture below)While the Cabalistic Tree of Life me<strong>an</strong>s little <strong>to</strong> most people, it is a veryimport<strong>an</strong>t--essential structure for <strong>Illuminati</strong> systems. <strong>The</strong>refore, indescribing how these systems are built it is import<strong>an</strong>t <strong>to</strong> describe thiscrucial magical tree. <strong>The</strong> reason all these following items such as Treesof Life <strong>an</strong>d goddesses are placed in<strong>to</strong> slaves is because ThESE SLAVESARE PART OF HIGH LEVEL SATANISM. <strong>The</strong> slaves are a reflection of theworld view of their programmers. You <strong>an</strong>d I wouldn’t bother with all thisbecause we are not in<strong>to</strong> magic. That we find ourselves reporting allthis, does not me<strong>an</strong> we endorse <strong>an</strong>y of this. We don’t. But theprogrammers didn’t ask us what <strong>to</strong> place in<strong>to</strong> their slaves. If you have alow <strong>to</strong>ler<strong>an</strong>ce for underst<strong>an</strong>ding the <strong>Illuminati</strong>’s cabalism, skip on down<strong>to</strong> the Carousel system. <strong>The</strong> Cabalistic Tree of Life is put in<strong>to</strong> upper level<strong>Illuminati</strong> slaves. It is a very deep program laid in at about section(level) 11. <strong>The</strong> Cabala is the basis of a. Freemasonry, b. the magic ofthe <strong>Illuminati</strong> Monarch programming, c. the key <strong>to</strong> the spiritualmysteries of the Scripture (according <strong>to</strong> Caballists). Because the wordCabala is a word originating in the Middle East it c<strong>an</strong> be spelled with aQ, a QU, a K <strong>an</strong>d a C. All these spellings are O.K. It c<strong>an</strong> be spelled withone b or two, etc. Golem in the Cabala are <strong>an</strong>cient medieval mindcontrolled slaves--are these precursors <strong>to</strong> what we have <strong>to</strong>day? WHOliked <strong>to</strong> program this? Mengele, <strong>an</strong>d Wheeler (Dr. Green & Dr. Black)312


were skilled in the Cabala, especially Dr. Green (Mengele). Some ofthe Rothschild programmers have been <strong>to</strong>o.313


314


Mengele learned from the leading Jewish Kaballists, duringconcentration camp days--Mengele himself was <strong>an</strong> Ipsimus in<strong>Illuminati</strong>. Undoubtedly, it is st<strong>an</strong>dard programming <strong>an</strong>d m<strong>an</strong>y other<strong>Illuminati</strong> programmers must be doing it <strong>to</strong>o. WHAT is it? <strong>The</strong> Cabala issynonymous with Hermeticism or Hermetic magic. <strong>The</strong> Cabala wasjewish-babyloni<strong>an</strong> magic. <strong>The</strong> jewish black magici<strong>an</strong>s brought it <strong>to</strong>Europe. It beg<strong>an</strong> <strong>to</strong> get widespread notice in Europe afterEnlightenment period. <strong>The</strong> great pyramid according <strong>to</strong> the occult is asymbol of the Cabalistic Tree of Life--the br<strong>an</strong>ches of the tree form thefour streams or lines <strong>to</strong> the base of the pyramid. Because the Cabala isthe basis of their hermetic magic, <strong>Illuminati</strong> systems will be fairlyconsistent in the make of a slave’s internal Tree of Life <strong>an</strong>d Tree of Evil.A Maiden/Mother/Crone triad goddess will sit at the <strong>to</strong>p of thestructure <strong>an</strong>d will be married <strong>to</strong> the AntiChrist & Sat<strong>an</strong>. <strong>The</strong> CabalisticTree of Life area of the System may have up <strong>to</strong> 12 other trees. <strong>The</strong>se areother magical trees. <strong>The</strong>re are 10 circles or rooms which are joined by22 lines that make up the Cabalistic Tree of Life called <strong>The</strong> Cabala forshort. <strong>The</strong>re are 4 worlds of the Cabala--3 pillars <strong>to</strong> the tree which arealso given different names <strong>to</strong> these pillars at different times. As justmentioned, there are 10 spheres of the Tree of Life <strong>an</strong>d they are joinedby 22 paths. <strong>The</strong> Mother-of-Darkness alters (at least some of them) areplaced in a Tree of Life, <strong>an</strong>d they do what is called “pathworking”. <strong>The</strong>spheres of the tree (also called rooms) are called “sephiroth” <strong>an</strong>d theyalong with the 22 paths that join them are the “file drawers of this315


universal file cabinet.” Before the first sphere there are 3 veils ofnegative existence--the Ain, Ain Soph, <strong>an</strong>d Ain Soph Aur. Alters in male<strong>an</strong>d female systems in the Tree of Life will consider themselves <strong>to</strong> begods or goddesses. <strong>The</strong>ir names will often reflect god or goddessnames. Chesed is a sphere which may be called a ‘‘Hall of Masters’’ orthe ‘‘Sphere of the Adepts”. Geburah is called “Hall of Karma” or “Hallof Judgment”. <strong>The</strong> <strong>Illuminati</strong> alters of course believe in Karma. <strong>The</strong>center of the tree is called Tifareth which me<strong>an</strong>s Beauty or Harmony.Underst<strong>an</strong>ding of the mysteries of sacrifice may be attached here. Ifwe think of the Tree as three pillars--the right, center <strong>an</strong>d left pillars,then we start with describing the right pillar from the <strong>to</strong>p room down--<strong>an</strong> <strong>Illuminati</strong> system will have Ishtar! Venus/<strong>The</strong> Morning Star/Lucifer inthe <strong>to</strong>p room. <strong>The</strong> next room below this will be <strong>an</strong> alter of destruction,<strong>an</strong> alter of ch<strong>an</strong>ge, unbinding <strong>an</strong>d freeing. <strong>The</strong> final right pillar room atthe bot<strong>to</strong>m is associated with virtue/white/vic<strong>to</strong>ry/endur<strong>an</strong>ce. In themiddle pillar at the <strong>to</strong>p is <strong>The</strong> Crown. This is the Bride of Saturn (Sat<strong>an</strong>,<strong>an</strong>d the AntiChrist). <strong>The</strong> room in the middle pillar one down from the<strong>to</strong>p is the Blue Room. Sometimes front Mother alters are in the blueroom. Other rooms have other colors assigned, which then tie in withthe computer color coding. <strong>The</strong> blue room is the bal<strong>an</strong>cing point, <strong>an</strong>import<strong>an</strong>t room, the center of all things, associated with the twinning.<strong>The</strong> next room down is the Foundation. This room is the meeting pointfor the ethereal <strong>an</strong>d the earth. <strong>The</strong> next <strong>an</strong>d final room down on themiddle pillar is the Kingdom. It has the life force of the first male childwho was sacrificed by the slave. This is the feet on the earth room. <strong>The</strong>far left pillar has 3 rooms. <strong>The</strong> <strong>to</strong>p left is associated with Midnight/theMother/<strong>an</strong>d water. <strong>The</strong> next room down is associated with Discipline<strong>an</strong>d control. <strong>The</strong> next room down is <strong>an</strong> alter that performed <strong>an</strong> eatingthe dove ceremony. Each of these 10 rooms will not only have its ownname, but each room’s alter will have its own magical name, which isnot <strong>to</strong> be confused with its access code. <strong>The</strong> alter associated withWisdom “Chokmah” (<strong>an</strong>d maybe even named Wisdom) is usually full ofgood information. In the occult literature, the tree is said <strong>to</strong> beattached upside down--that is its roots are in heaven. This applies <strong>to</strong>the internal programmed tree. Malkuth is the <strong>to</strong>p of the tree. Malkuth isthe “Gate of Death”. <strong>The</strong>re seems <strong>to</strong> be more gatekeepers at theselower levels. <strong>The</strong> Lord of the Earth is the power of Malkuth. How it is putin? Our <strong>an</strong>swer applies <strong>to</strong> <strong>Illuminati</strong> Mother-of-darkness level systems.Before a Mother-of-darkness system is 16 years old they will have gonethrough all the ceremonies involved in the creation of the alters whichcorrespond <strong>to</strong> the rooms of the Cabalistic Tree of Life which is placed ineach system. <strong>The</strong>re is one alter assigned <strong>to</strong> each of the 10 rooms of thetree. Each one is created by a particular <strong>Illuminati</strong> ceremony. After theage of 16, the System will be guided on a personalized pathway by thesystem’s own demons <strong>an</strong>d the life force of the sacrificed baby underthe tree which relates <strong>to</strong> the s<strong>to</strong>ry of Lilith. Lilith is not a single drivingforce, but the demon Lilith is joined with Zerodieth <strong>an</strong>d Lucifer. Between316


age 16 <strong>an</strong>d 19 the deep Sat<strong>an</strong>ic alters are working on “pathworking.”This pathworking will be completed before they are 19. <strong>The</strong> ceremonyat 19 will include the 1,000 points of light ceremony at the super secretMother-of-Darkness castle of Chateau des Arnerois (Castle of Kings)close <strong>to</strong> the Belgium-French border in Europe <strong>an</strong>d about 20 kilometersas the crow flies west from Luxemburg. This will be a sealing ceremonywith the Mothers dressed in black. Guards <strong>an</strong>d heavy forest protect thelarge castle from view. <strong>The</strong> people in the nearby spooky village ofMuno, Bel. basically belong <strong>to</strong> the castle. <strong>The</strong> castle has a cathedralinside with a dome with 1,000 lights. <strong>The</strong> words 1,000 lights is <strong>an</strong><strong>Illuminati</strong> buzz word. When the President used it <strong>to</strong> describe the WhiteHouse’s Christmas tree, hierarchy people knew what he was signalling.<strong>The</strong> cathedral has a great hall with columns on either side, <strong>an</strong>d theQueen Mother’s throne will be set up there. Only a single male waving<strong>an</strong> incense ball <strong>an</strong>d robed in white with a red m<strong>an</strong>tle with gold symbolswill participate in 1,000 lights ceremony. Down in the secret basementis where <strong>an</strong> innocent child is sacrificed everyday <strong>to</strong> provide blood <strong>to</strong>write in a hugh book the record of how Sat<strong>an</strong> is bringing his pl<strong>an</strong>s <strong>to</strong>fruition. <strong>The</strong> s<strong>to</strong>ngm<strong>an</strong> protecting the tree of life isLilith/Zerodieth/Lucifer spirits amalgamated. Behind the 1st line of thetree are 880 demons, <strong>an</strong>d tens of thous<strong>an</strong>ds more are attached <strong>to</strong> thiswhole apparatus. For 24 hours after one of the Queen ceremonies, theQueen alter is a queen <strong>an</strong>d c<strong>an</strong> have <strong>an</strong>ything she wishes. Aspreviously stated, at 19, three keys are given, <strong>an</strong>d the back part of theSystem begins <strong>to</strong> be worked. <strong>The</strong> System has <strong>an</strong> alter lay on a throne(like in Egypti<strong>an</strong> days) with a lily. <strong>The</strong> death, burial <strong>an</strong>d resurrectionceremony also is done sometime in here. <strong>The</strong>re are 9+10 doors <strong>to</strong> thetree which make up the number 19 (which is the year the system issealed). This is tied <strong>to</strong> <strong>an</strong> astrological event. Note that every 19 yearsthe full moon appears on the Summer Solstice day <strong>an</strong>d this relates <strong>to</strong>the internal sun dial <strong>an</strong>d what is called “moon swing.” <strong>The</strong> Cabalistictree needs bal<strong>an</strong>ce <strong>an</strong>d becomes operational with bal<strong>an</strong>ce. Specialrituals are chosen for each individual, so the rituals from one alter inone system <strong>to</strong> <strong>an</strong>other will vary. Individualization may actually be achoice from a selection --that is menu of options--rather th<strong>an</strong> actually<strong>to</strong>tally unique. <strong>The</strong> “Becoming” ritual at 19 begins in the ceremony ofinhaling a dying mother-of-darkness’s breath. Consciousness of the treeis achieved by bal<strong>an</strong>ce. <strong>The</strong> Pr<strong>an</strong>a children are attached <strong>to</strong> the tree<strong>an</strong>d its ceremonies. Lily became white when Moon child drew downthe moon & exch<strong>an</strong>ged herself for the goddess. She then drew downthe stars of heaven (milk from the breast of the goddess). <strong>The</strong> lily sheheld in ceremony was the female challis <strong>to</strong> hold this essence or light oflight. (this ceremony has sexual <strong>to</strong>nes <strong>to</strong> it...) As Lily died in theceremonies--drinking something from a special cup <strong>an</strong>d laying downon <strong>an</strong> altar with c<strong>an</strong>dles at her head <strong>an</strong>d feet) night was born. <strong>The</strong>liquid was wine with lily essence in it as well as Rue, which is a strongsmelling Europe<strong>an</strong> pl<strong>an</strong>t. Two things happen as lily is consumed--one317


conceives <strong>an</strong>d one dies from poison. Does this death <strong>an</strong>d conceptionrelate <strong>to</strong> moon cycles? Night = Nuit Noir = Black. She has names in twoterms. She is death, perm<strong>an</strong>ence which preserves earthly attainmentsi.e. position, glory, possessions, etc. WHAT other items are involved withthis programming? <strong>The</strong> rooms of the tree of life have names. Essentially,every <strong>Illuminati</strong> hierarchy victim, has the Cabalistic tree of life placed inthem. This tree lies below the other trees. <strong>The</strong> circles that make up theinternal Cabalistic Tree of Life are called rooms or quads by the varioussurvivors. Alters c<strong>an</strong> use the internal Tree of Life <strong>to</strong> work magic internally.It also reminds deeper alters of cult control. <strong>The</strong> circles of the tree arerooms that c<strong>an</strong> be entered in<strong>to</strong>. Mt. Qabbalah is a figurative mountainin the Cabala. WHAT kind of demonology is programmed in with this?In the Cabala, demonology is import<strong>an</strong>t. Ashmedai is Asmodeus whichme<strong>an</strong>s king demon. Lilith is <strong>an</strong> import<strong>an</strong>t demon in Kaballah <strong>an</strong>d isfound in Ill. Mother of darkness systems. Lilith’s s<strong>to</strong>ry from the Cabalaabout mating with Adam <strong>an</strong>d killing her son, is used in Ill. ceremony<strong>an</strong>d programming. <strong>The</strong> blood of 1st born is placed in a box in theSystem under each tree. This according <strong>to</strong> the programming gives the“eternal life force <strong>to</strong> the tree.” This is in line with occult doctrine of thepower of blood, <strong>an</strong>d also serves as a misapplication of the biblical “lifeis in the blood” concept. Metatron is a lesser <strong>to</strong>p god of the Kaballah,<strong>an</strong>d is receiving lots of Hollywood attention in recent movies. <strong>The</strong> fourmothers of demons are Lilith, Naamah, Agrath, <strong>an</strong>d Mahalath (a.k.a.Rahab). In the Cabala each demon has its own seal. Samuel & Amonof No are import<strong>an</strong>t demon leaders in the Cabala. At least one Systemof the Mothers (<strong>an</strong>d we c<strong>an</strong> assume others do <strong>to</strong>o) uses the Bilair, Bilar,Bilid cabalistic names for Sat<strong>an</strong>, rather th<strong>an</strong> Sat<strong>an</strong>. <strong>The</strong> Shekinah rulesthe Cabalistic Tree of Life. This is not the Shekinah of God Almighty, butfrom the self-proclaimed “father of light” Lucifer. <strong>The</strong>re is a “Tree of Evil”said <strong>to</strong> be below the Tree of Life which is all spirit <strong>an</strong>d not alters. ThisTree of Evil has spirits attached <strong>to</strong> each room rather th<strong>an</strong> alters. Incontrast, both alters & spirits are attached <strong>to</strong> the 10 rooms of the Treeof Life. Various precious s<strong>to</strong>nes are attributed <strong>to</strong> each of the sephirothrooms, as well as occult arch<strong>an</strong>gels. Again if we look at the right pillarat the <strong>to</strong>p is Beelzebub with Chaigidel as assist<strong>an</strong>t. <strong>The</strong> KnowledgeAbyss separates this room from the room below. This next room isAstarte with Gamchicoth as her assist<strong>an</strong>t. <strong>The</strong> final room on the right isBaal with Hareb Serapel. <strong>The</strong> middle pillar at the <strong>to</strong>p is Sat<strong>an</strong> & Molochin joint rulership. Below that is the Daath room. <strong>The</strong> room below isBelphegor, <strong>an</strong>d the bot<strong>to</strong>m room on the middle pillar is Lilith withGamaliel as assist<strong>an</strong>t. <strong>The</strong> far left starts at the <strong>to</strong>p with Lucifuge. <strong>The</strong>nbelow that is Asmodeus. And the final room on the left is Addramalech.Finally, below the bot<strong>to</strong>m middle pillar live the four elements of life, air,water, wind, <strong>an</strong>d earth. Note that what is at the bot<strong>to</strong>m is really at the<strong>to</strong>p. On the other end, the pyramid with the all-seeing eye rests on thetwo Cabalistic Trees. Ratzkiel is the arch<strong>an</strong>gel of Chokmah. <strong>The</strong> <strong>an</strong>gelswhich carry out Ratziel’s directions are the Auph<strong>an</strong>im (the wheels), a318


name full of symbolism <strong>an</strong>d programming possibilities. Tzafkiel, theArch<strong>an</strong>gel of Binah is the Keeper of the Akashic Records, where all theSystem’s days, lessons, <strong>an</strong>d lessons <strong>to</strong> learn are kept. Since the libraryrecords are spiritual, during deprogramming they will have <strong>to</strong> be wipedout. However, I’m <strong>to</strong>ld that there is someway <strong>to</strong> retrieve them. Sometherapists are using sodium pen<strong>to</strong>thal or whatever <strong>to</strong> get accesscodes--but there is <strong>an</strong>other way <strong>to</strong> recover some of the records.WHAT ARE THE CODES LIKE?Gematria might play a role in Monarch codes Gematria is a Cabalisticteaching about numbers me<strong>an</strong>ing letters. Gematria is used a lot byMoriah. <strong>The</strong>se are the magical numbers that also serve as letters <strong>to</strong> theHebrew alphabet. Certain deeper alters are good at working at astrallevels. <strong>The</strong>se alters have “ASTRAL” or “CRAFT’ codes, <strong>an</strong>d code names,which will include codes from the names of herbs, spices, jewels, <strong>an</strong>dalpha-numeric codes. Simple equation codes are also used in thedeeper levels. HOW does this program relate <strong>to</strong> the twinning? M<strong>an</strong>ysurvivors have roses incl. red roses. <strong>The</strong> Red Rose in the Cabala isassociated with the Tree of Life. <strong>The</strong> Red one is assoc. with one part ofthe tree <strong>an</strong>d the white with the other part. When paired <strong>to</strong>gether theymake a blue rose which is the Rose of Malkuth. It may be possible thatRed Rose <strong>an</strong>d White Rose were used in the twinning <strong>an</strong>d that aCabalistic blue rose results in such a Monarch twinning. That laststatement is only a supposition. Speaking of roses, Rosemary (the Roseof Mary) is <strong>an</strong> occult term for a wom<strong>an</strong> who conceives a dark child. It isalso associated with a fragr<strong>an</strong>ce of the Mint family.THE WILLOW TREE VS. OAK TREE AS A PROGRAMMING HANGER FORMORIAB’S PROGRAMMING.Alters of <strong>an</strong> <strong>Illuminati</strong> System, due <strong>to</strong> programming, will perceive a treegrowing in them which has roots in their feet <strong>an</strong>d its trunk <strong>an</strong>d br<strong>an</strong>chesextending throughout their body. Upon this tree, fruit (programs) areplaced. <strong>Illuminati</strong> programs may be <strong>to</strong> cut a “tree” limb off (which isactually the victim’s arm), or for a certain part of the body <strong>to</strong> get hot,or for a certain part of the body <strong>to</strong> physically ch<strong>an</strong>ge in some way.<strong>The</strong>se are attached via the tree imagery. Both oak <strong>an</strong>d willows aretrees are used. Why might a programmer choose a willow tree ratherth<strong>an</strong> <strong>an</strong> oak tree in the basic programming? <strong>The</strong> <strong>an</strong>swer lies in why atree is used in the first place. A tree is used because of its imagery <strong>an</strong>dbecause of its magical powers according <strong>to</strong> Druidism. <strong>The</strong>re are <strong>an</strong>umber of images a tree provides <strong>an</strong>d there are a number of magicalpowers <strong>to</strong>o. We will discuss the contrasts <strong>to</strong> develop our <strong>an</strong>swer. <strong>The</strong>oak is a well-known powerful Druid item, but the willow tree is also319


sacred. <strong>The</strong> oak is so well-connected <strong>to</strong> the Druids that some of theother sacred trees of the Druids are not quickly recognized as sacred.Let us look at the intrinsic imagery adv<strong>an</strong>tages of the willow <strong>an</strong>d thenthe magical properties it might contribute. <strong>The</strong> combination of the two,will then provide us with the complete <strong>an</strong>swer as <strong>to</strong> why a willow treerather th<strong>an</strong> <strong>an</strong> oak tree might be used.IMAGERY.<strong>The</strong> imagery of a tree is used because it has br<strong>an</strong>ches, leaves <strong>an</strong>d aroot system. <strong>The</strong>se items are m<strong>an</strong>ipulated for programming purposes.For inst<strong>an</strong>ce, in the Alice In Wonderl<strong>an</strong>d programming, the girl jumpshypnotically in<strong>to</strong> the tree <strong>an</strong>d falls (hypnotically falling deeper <strong>an</strong>ddeeper) in<strong>to</strong> the roots of the tree. <strong>The</strong> deep root system of the willow is<strong>an</strong> adv<strong>an</strong>tage over the shallow root system of the oak. When a s<strong>to</strong>rmcomes the willow bends <strong>an</strong>d doesn’t break, while the oak is rather stiff<strong>an</strong>d breakable. Since these trees are programmed in<strong>to</strong> a person aflexible tree that c<strong>an</strong>’t be broke is <strong>an</strong> adv<strong>an</strong>tage. <strong>The</strong> wrappingaround imagery of the br<strong>an</strong>ches gives a great deal of flexibility forprogramming <strong>an</strong>d a stronger imagery th<strong>an</strong> the oak. <strong>The</strong> willow drawswater from deep below. <strong>The</strong> tree is “the tree of life” (the programs arethe life of the system), <strong>an</strong>d the Bible is used <strong>to</strong> “validate” theprogramming. For inst<strong>an</strong>ce, the tree of life by the river (REV 22) is used.<strong>The</strong>re are some other images that are import<strong>an</strong>t <strong>to</strong>o. During <strong>Illuminati</strong>rituals the willow br<strong>an</strong>ches are used as whips <strong>to</strong> “cle<strong>an</strong>se” people thevictims of programming. <strong>The</strong> image of a willow br<strong>an</strong>ch could easilytrigger the memories of being punished (whipped <strong>an</strong>d beingcle<strong>an</strong>sed), <strong>an</strong>d this in turn would help hold the programming in place.<strong>The</strong> fruit of the trees are the programs--<strong>an</strong>d some of the fruit c<strong>an</strong> beeaten <strong>an</strong>d some not. Sometimes children’s s<strong>to</strong>ries about lunch pailsh<strong>an</strong>ging from trees or fruit in the trees is used <strong>to</strong> create a place for theindividual programs are hung--or this could be a place for the frontprograms, <strong>an</strong>d the more import<strong>an</strong>t programs are s<strong>to</strong>red awaysomewhere more secret. Bear in mind, the trees in the programmingsing <strong>an</strong>d are able <strong>to</strong> wrap themselves around people if they are goingwhere they aren’t supposed <strong>to</strong> go. <strong>The</strong> willow has that flexibilitynaturally, so it is easier <strong>to</strong> imagine it wrapping itself around a person.MAGICAL PROPERTIES.Most every thing that is done programming-wise has a dark spiritualsignific<strong>an</strong>ce <strong>to</strong> it <strong>to</strong>o. <strong>The</strong> programmers will look for things that servetheir purpose both here <strong>an</strong>d in the spiritual realm. <strong>The</strong> willow tree isused <strong>to</strong> make witches w<strong>an</strong>ds, <strong>an</strong>d help <strong>to</strong> make witches brooms. (Birchc<strong>an</strong> also be used.) It is pl<strong>an</strong>ted around Druid/Celt graves <strong>to</strong> protect320


them spiritually. It is believed <strong>to</strong> also have magical sexual powers. It ispossible that some of the programmers might prefer the magical sexualpowers of the willow, rather th<strong>an</strong> those properties said <strong>to</strong> come fromthe mighty oak. This is not all of the willow’s magical powers. It isconnected with February <strong>an</strong>d April in different ways, <strong>an</strong>d magicallyconnected with spring. It’s possible that the person receiving a willowtree might be born in this time period. Is it possible that what type oftree is selected could sometimes be related <strong>to</strong> when a person is born.Some programmers might be in<strong>to</strong> being time appropriate--this woulddepend upon the beliefs of the programmer(s). <strong>The</strong> imagery of thewillow’s magical sexual properties could be worked in<strong>to</strong> theprogramming, as certain alters might be asked <strong>to</strong> make certain brews,or taste of certain things hypnotically. This would be done at such adeep level it might not be known. Just as in the case of the Alice InWonderl<strong>an</strong>d programming, when the person drops clear <strong>to</strong> the bot<strong>to</strong>mof the tree roots they find themselves small <strong>an</strong>d they go through adoor. But when they come back the alter is not going <strong>to</strong> remember thetrip <strong>an</strong>d what they ate on the hypnotic trip down the tree.Further considerations on the choice of Trees. It is possible that the wec<strong>an</strong> question the question. That is perhaps the question is not that theoak or the willow tree was used <strong>to</strong> the exclusion of the other--but thatBOTH trees were used in the programming. Generally, this seems <strong>to</strong> bethe case. In one particular case, it is possible that in a double system(with a dorm<strong>an</strong>t third system as a final backup), the oak tree being themore obvious Druidic symbol <strong>an</strong>d quite strong was used in the frontsystem, <strong>an</strong>d the <strong>to</strong>tally secret second system has the willow utilized.When the one person attempted <strong>to</strong> snap the oak tree at ground levelin a crude attempt <strong>to</strong> deprogram themselves, the root systemregenerated itself through the first mirror image, <strong>an</strong>d what came backwas more spirit <strong>an</strong>d more deadly. Remember, the tree serves as <strong>an</strong>umbilical cord linking via its roots the person <strong>to</strong> their spiritual life force(which are the evil spirits which comm<strong>an</strong>d <strong>an</strong>d drive the system.)However, when the oak tree <strong>an</strong>d its mirror images <strong>an</strong>d the spiritualprotec<strong>to</strong>rs (hideous spirits) were properly done away with, <strong>an</strong>d thenfurther deprogramming was done, a crack seems <strong>to</strong> have developedbehind the pyramid crystal which allowed the person’s original set ofalters <strong>to</strong> experience a new or double system! Since that has happenedit seems there has been <strong>an</strong> increased drawing <strong>to</strong> willows. In otherwords, for this particular victim it is conjectured that the front system(the fully operational set of alters) has <strong>an</strong> oak, <strong>an</strong>d the duplicate set ofalters which were each broken off of each of the original set) have asystem with a willow tree. <strong>The</strong> trees roots of course are the umbilicalcord <strong>to</strong> the source (the waters) that spiritually feed it. <strong>The</strong>se relate <strong>to</strong>the soul ties. <strong>The</strong>se roots have <strong>to</strong> be dealt with spiritually. <strong>The</strong>y are sointerwoven that they tie a person completely up with their roots <strong>an</strong>dprograms that are interwoven <strong>an</strong>d wrapped around each other. Other321


high level <strong>Illuminati</strong> survivors also have a front tree <strong>an</strong>d a back tree.Another consideration is that the trees have flowers pl<strong>an</strong>ted aroundthem. Uprooting the trees are not sufficient for deprogramming,because the flowers are the deeper generational material <strong>an</strong>d willregenerate the trees. Touching Lilith’s box under the tree c<strong>an</strong> releaseowls <strong>an</strong>d monkeys <strong>an</strong>d other <strong>an</strong>imals that are d<strong>an</strong>gerous. A genericcode often c<strong>an</strong> be used <strong>to</strong> take out the flowers.WHAT are the OTHER TREES?Other import<strong>an</strong>t occult trees are the Tree of the Knights Table, <strong>an</strong>d theTree of Alchemy. <strong>The</strong>re is such a thing as Tree Magic, which involvesm<strong>an</strong>y kinds of trees <strong>an</strong>d tree spirits. <strong>The</strong> Axle tree according <strong>to</strong> worldwide occult belief has the earth revolving about it. M<strong>an</strong>y survivors ofcourse have the oak, willow or ash trees placed in as their principle treeor as their back up tree. <strong>The</strong> final back up tree in <strong>an</strong> Ill. System might bethe occult Yggdrasil tree (ash tree). <strong>The</strong> Yggdrasil tree has 3 roots(spiritual, terrestrial, <strong>an</strong>d infernal) <strong>an</strong>d has a cosmic egg attached <strong>to</strong> it.Generally only one tree is mentioned, but a back up tree exists, <strong>an</strong>dthen third tree which is a back-door back-up tree. <strong>The</strong>rapists should becautioned that these trees often come in groups of 3. WHAT are theBACKUPS? Beside the principle tree, the programmers will often pl<strong>an</strong>t aflower that represents the generational ties. If the tree is taken out theflower will regenerate the tree. <strong>The</strong> petals, the flower center, the stem<strong>an</strong>d roots represent different generations of the victim.Underst<strong>an</strong>ding the Maiden-Mother-Crone combination in the Mothersof-Darkness.<strong>The</strong>rapists are going <strong>to</strong> find <strong>Illuminati</strong> slaves having 3 altersplaced <strong>to</strong>gether. This is part of how these systems are structured. <strong>The</strong>maiden is set up on the pedestal as the “a” alter. <strong>The</strong> first programmingchart which shows all the “a” alters in the system consists only of theyoung maiden mothers. <strong>The</strong> mother or second figures are close behindthe a’s. However, the crone part of the triads is me<strong>an</strong>t <strong>to</strong> hide in thebackground. <strong>The</strong>y serve as the power of advice behind the scenes.<strong>The</strong>se Mother of Darkness triads participate in various ceremonies. <strong>The</strong>irinitial initiation ceremonies included water <strong>to</strong>rture with electroshock,which is the death, burial <strong>an</strong>d resurrection ceremony. <strong>The</strong>re are the full- r<strong>an</strong>ge of Sat<strong>an</strong>ic holidays for the Mothers <strong>an</strong>d a look at the frill r<strong>an</strong>geof holidays will provide a person with the type of ceremonies that theMothers carry out, which include the two solstices. Different Mother-of-Darkness alters participate in different ceremonies. <strong>The</strong> inside of theirblack velvet gowns are color coded so that within the r<strong>an</strong>ks of theMothers are a whole series of r<strong>an</strong>ks (grades). All of these Mother partshave been <strong>to</strong>ld they are divine goddesses. <strong>The</strong> following informationwill clarify this further.322


THE MOTHER OR “A” PARTS<strong>The</strong> Mother part of the Goddess Trinity is the high point in all cycles.Traditionally her color is red, the color of life force. <strong>The</strong> Mother isassociated with adulthood <strong>an</strong>d parenthood. <strong>The</strong> Mother is ripeness<strong>an</strong>d bal<strong>an</strong>ce. Mothers actively work magick. She is a nurturer. She isconfident <strong>an</strong>d has no indecision. <strong>The</strong> Mother knows what she is. She isthe full moon. Summer is the Mother’s time of the year, the full moon isher monthly point of power. She is honored by Belt<strong>an</strong>e (May 1),Summer Solstice, <strong>an</strong>d Lunasa (Aug. 1). As stated before there arecertain rituals which call for Mothers rather th<strong>an</strong> a maiden or a crone.MAIDEN OR “B” PARTS--<strong>The</strong> young maiden part of the mothers is the equivalent <strong>to</strong> the“apprentice” level of the mystery schools <strong>an</strong>d Freemasonry. <strong>The</strong> mythholds that the maiden will be eternally youthful. Even with the agingprocess, the goddess c<strong>an</strong> experience youthfulness in the mind. <strong>The</strong>maiden is the creatress of new ideas. She also is the armed hunter ofthe Mother’s laws. She is the Guardi<strong>an</strong> of the Bal<strong>an</strong>ce. She is aware ofher sexuality. She is independent <strong>an</strong>d not controlled by men. She is theWay-Shower, the Keeper of the Keys. You will find the maiden in thefollowing rituals:new beginning ritualspl<strong>an</strong>s for conceptionthe birth of a childthe first menstruation for girlspuberty rituals for boysTHE CRONE OR “C” PARTS<strong>The</strong>se alters rarely show themselves. <strong>The</strong>y stay in the shadows <strong>an</strong>d passon advice. <strong>The</strong> crone aspect of the Triad of Goddesses has beencalled the Terrible Mothers, the Hag, the Dark Mother, <strong>an</strong>d the WiseOne. She is associated with black, death, winter, menopause, wisdom,counsel, reincarnation, <strong>an</strong>d the initia<strong>to</strong>r in<strong>to</strong> the deepest of theMysteries. <strong>The</strong> w<strong>an</strong>ing Moon is her monthly time of power. <strong>The</strong> cronesnumber is 9. 9 is a number of wisdom <strong>an</strong>d sacred magick. Nine is also amoon number, which me<strong>an</strong>s spiritual completion <strong>an</strong>d wholeness. <strong>The</strong>crone has a cauldron. She is the great recycler. She is the ultimateteacher. She contacts the Spirits <strong>an</strong>d is <strong>an</strong> expert on demonology. She323


is the Keeper of the Spiritual Records. She is the shadow behind theMother’s throne. According <strong>to</strong> the occult, she is the elder of unlimitedwisdom. <strong>The</strong>re are certain rituals which call for the crone, such asWinter Solstice. <strong>The</strong> crone completes the wheel or cycle of existence ofthe Mothers of Darkness. She is most likely in the system the mostdehum<strong>an</strong>ized of the three that sit on the pedestal.<strong>The</strong> following are a sampling of the goddesses you will find. Since thenames of these goddesses are not secret, it is possible for people whoare not in the occult <strong>to</strong> track down what the popular goddess namesare. Here are a few that are placed in<strong>to</strong> systems:ASET (Isis) (Maiden)--She dwells in the sky as the silver sheen. Isis orAset is the best known of the Egypti<strong>an</strong> goddesses. Her name me<strong>an</strong>sthrone. She is a ruler. She is the mother of the Anti-Christ figure of Horus.She has a horned crown or a solar crown. She has lots of titles.BAST (Maiden)--Bast is the mother goddess of all cats. Bast lookedlike <strong>an</strong> 18’ gi<strong>an</strong>t with a cat head. Internally, in the system she will lookhugh. Black cats were sacred <strong>to</strong> Bast. <strong>The</strong> internal Bast may likeobsidi<strong>an</strong> <strong>an</strong>d cats-eye. Bast corresponds <strong>to</strong> Yesod (the Foundation) onthe Cabalistic Tree of Life.CAILLECH (Crone)--Caillech was the Scotch <strong>an</strong>d Irish Crone figure.She is known as the black mother. A derivative of her name isCaledonia. She was the Spirit of disease. Caillech me<strong>an</strong>s <strong>an</strong> oldwom<strong>an</strong>, a hag, or a veiled one. California is named after a version ofher name. Some think her name is a derivative of Kali.HAT-HOR (Mother)--Hat-Hor is also known as Het-Hert. She is thewomb of Horus. She is Queen of the Dead, or Queen of the West. Inmythology, Hathor, when turned loose on the earth, slew hum<strong>an</strong>s untilblood r<strong>an</strong> in the rivers. She is the avenging Mother. She is identified withthe heavenly cow who made the Milky Way, <strong>an</strong>d the Nile Goose, wholaid the Golden Egg.ISHTAR (Mother in the swamps)--Ishtar is Lady of heaven, goddess ofthe moon. Istar had a lion throne <strong>an</strong>d a double serpent scepter. Ishtarwent down through 7 gates in<strong>to</strong> darkness <strong>an</strong>d then returned in order <strong>to</strong>try <strong>to</strong> find her lover Tammuz. Sometimes Istar is accomp<strong>an</strong>ied bydragons. She was originally a Babyloni<strong>an</strong> goddess.KALI (Crone)--Kali or Kali Ma is the best known Crone goddess. Shewill be deep in <strong>an</strong> System. One image of her in mythology is squattingover the dead Shiva devouring his penis while physically eating hisintestines. This is <strong>an</strong> actual Sat<strong>an</strong>ic ritual that Mothers-of -Darknessparticipate in. Kali has both creation-& destruction abilities. Kali’s324


necklace in Indi<strong>an</strong> legend consists of skulls with magical s<strong>an</strong>skrit letters.Kali was <strong>an</strong>d is worshipped by a great number of people, especiallythe Hindus. One group of worshippers has been the Thugs, who relate<strong>to</strong> the Assassins <strong>an</strong>d the Knights Templars. Another group of Kaliworshippers are the gypsies who left India in the middle ages <strong>an</strong>d overthe next following hundreds of years travelled all over the world.Originally, blood sacrifices of male <strong>an</strong>imals or men were made <strong>to</strong> her.<strong>The</strong>re is a reported decrease in India of such blood sacrifices from whatit was a century ago. <strong>The</strong> favorite view of Kali is the black Kali namedDakshinakali. She is usually shown black <strong>an</strong>d naked, full-breasted withdishevelled hair <strong>an</strong>d a wild grimace.KORE-PERSEPHONE (Maiden)--A great mother of Greek myth. Koreme<strong>an</strong>s “maiden” in greek. In mythology, she watched the grain growamong the wildflowers, especially red poppies. She became themistress of the underworld. She guards the chasm that goes in<strong>to</strong> theearth. She marks each spirit of the dead on their forehead withpomegr<strong>an</strong>ate juice. Pomegr<strong>an</strong>ates are used in ritual. Kore returns inSpring <strong>to</strong> see her mother Demeter. According <strong>to</strong> Greek legend Korewas raped in Hades. She is also known as the Queen of the Dead. Asimilar <strong>Illuminati</strong> ceremony takes place where a male wearing a maskacts like Sat<strong>an</strong>. Kore makes the journey <strong>to</strong> Hades by herself without hermother. <strong>The</strong> Greek mystery schools, which included m<strong>an</strong>y great Greekthinkers, have had rituals around Kore.MAAT--Maat’s name me<strong>an</strong>s “She whose name is Truth”. Her symbolis a red ostrich feather. A ritual vow is “by the Feather of Maat.” Maat’spresence might explain why a System is infatuated with feathers. Maatis the one in legend who “is the pattern” --the one who “will find a way<strong>to</strong> weave us back in<strong>to</strong> our proper places in the tapestry.”B. Carousel.<strong>The</strong> Carousel in real life is used as a device <strong>to</strong> teach dissociation, <strong>an</strong>dhow the alters are <strong>to</strong> go up <strong>an</strong>d down in tr<strong>an</strong>ce. Sometimes you willsee parents who seem <strong>to</strong> be so loving having their children ride for longperiods on a carousel. <strong>The</strong>y might actually be programming them indissociation. An internal carousel is built in<strong>to</strong> <strong>an</strong> internal system. Mirrors<strong>an</strong>d shadows are placed around <strong>an</strong>d perhaps in it. <strong>The</strong> carousel spins<strong>an</strong>d moves up <strong>an</strong>d down repeatedly. In the center of the carousel, theProgrammers often place something or someone import<strong>an</strong>t. <strong>The</strong>y willoften put this at the bot<strong>to</strong>m of the DNA double helix <strong>an</strong>d have thedouble helix eleva<strong>to</strong>r shaft coming up the center of the carousel. <strong>The</strong>carousel’s bot<strong>to</strong>m side will set on <strong>to</strong>p of the system’s switchingmech<strong>an</strong>ism. And the core will sometimes be placed in the center of325


the carousel somewhat underneath it. <strong>The</strong> switching mech<strong>an</strong>ism is themain control for turning the system (the Gr<strong>an</strong>dfather clock so <strong>to</strong> speak.)<strong>The</strong> carousel may have umbrella programming immediately on <strong>to</strong>p ofit. (This could be <strong>Illuminati</strong> Delta alters, which c<strong>an</strong> be one of thedeepest things put in.) <strong>The</strong> carousel must be approached from theback side. At times <strong>an</strong> internal key, which often looks like <strong>an</strong> old key isneeded <strong>to</strong> enter the Carousel. M<strong>an</strong>y <strong>Illuminati</strong> systems are given a keyor set of keys, <strong>an</strong>d at times when they enter therapy the front altersgive this <strong>to</strong> their therapist not knowing what the key is, but knowing it isimport<strong>an</strong>t. <strong>The</strong> co-authors believe that these keys are carousel keys. Afalse trinity will be assigned <strong>to</strong> guard this, which will consist of the FalseProphet, <strong>The</strong> Beast or Dragon, <strong>an</strong>d the Hoofed One. <strong>The</strong> false prophet<strong>an</strong>d the Beast (dragon) come out of the book of Revelations. <strong>The</strong>Hoofed One is a rare occult term for Sat<strong>an</strong>, not <strong>to</strong> be confused with thepopular usage of the Horned One in the occult. <strong>The</strong> two terms aredifferent. If several carousel are built in<strong>to</strong> a system, then they will haveother guards th<strong>an</strong> the false trinity. In m<strong>an</strong>y <strong>Illuminati</strong> systems, there are13 silent splits made from the core called silences, <strong>an</strong>d at this timeduring the splitting process guards are made <strong>to</strong> the Carousel/core. <strong>The</strong>method of doing this is <strong>to</strong> place black covers over the eyes of thevictim, <strong>an</strong>d then probes are inserted in<strong>to</strong> the base of the skull, as well aselectric shocks being applied body-wide <strong>an</strong>d in the subcortical part ofthe brain. <strong>The</strong> victim has their mouth restrained from screaming. <strong>The</strong>pain from this is about as excruciating as a hum<strong>an</strong> c<strong>an</strong> st<strong>an</strong>d. First, thefear part of the brain is activated. <strong>The</strong>n the logic part is activated, <strong>an</strong>dthe victim is <strong>to</strong>ld repeatedly “Be good, obey.” Next, the fear isstimulated, <strong>an</strong>d then the pain. <strong>The</strong> head will have excruciating pain,<strong>an</strong>d so will the body <strong>to</strong> the point of nausea <strong>an</strong>d sickness. An alter willbe created <strong>to</strong> carry the pain, <strong>an</strong>d one <strong>to</strong> carry the fear, <strong>an</strong>d one <strong>to</strong>carry the <strong>an</strong>ger. <strong>The</strong>se will be identified <strong>an</strong>d used <strong>to</strong> guard thecarousel. Six alters will guard the carousel. <strong>The</strong>y will be identified <strong>an</strong>dlinked <strong>to</strong> the most import<strong>an</strong>t carousel, which guards the core. Toattempt <strong>to</strong> think about the carousel, on the part of <strong>an</strong> alter, may bringup these guards, <strong>an</strong>d the system will abreact in memories that arealmost unbelievably painful. If a therapist accidently triggers this, getthe little child guard <strong>to</strong> back up or go <strong>to</strong> sleep. Make sure the heart ofthe victim, <strong>an</strong>d lungs continue <strong>to</strong> function. <strong>The</strong> alters within the victim’ssystem may have “aged” slightly since their primal trauma, <strong>an</strong>d mayappear about 2 years of age. Most alters this young do not know howold they really are. <strong>The</strong>rapists will attempt <strong>to</strong> associate the memory <strong>an</strong>dprovide <strong>an</strong>chors from the early memory <strong>to</strong> the present. Associationstrategies are worked out by the therapist <strong>to</strong> deal with the particulartrauma in relation <strong>to</strong> what alters are there <strong>to</strong> help <strong>an</strong>d were involved inthe trauma. <strong>The</strong> association may be done in steps. Older helping altersc<strong>an</strong> help assess the age of the inf<strong>an</strong>t alter by <strong>an</strong>swering questionsabout size, teeth, physical abilities, verbal abilities etc. Verbal abilities ofilluminati inf<strong>an</strong>ts may be adv<strong>an</strong>ced beyond norms.326


C. Castle.A castle system will contain a moat, drawbridge, turrets, gargoyles, a<strong>to</strong>rture dungeon filled with actual memories of <strong>to</strong>rture, secret passages,lots of levels, & rooms including a library. Child alters are often hidden inthe castle. Disobedient alters may be locked up in the castle. Lots oftraps are placed around <strong>an</strong>d in the castle. <strong>The</strong> castle will house somealters <strong>an</strong>d also some deadly programs. When castle alters get stirredup, the victim may internally see the castle lights go on. <strong>The</strong> castle wallsmay have a grid on them. <strong>The</strong> castle may be guarded by monsters.D. Cave <strong>an</strong>d well.A gatekeeper will guard the cave. Disobedient alters may be putdown the well. This system deals with a lot of darkness. Catacombsmay be connected <strong>to</strong> the cave <strong>an</strong>d well. Falling down the well is oneway <strong>to</strong> get <strong>to</strong> the abyss (see the film Labyrinth). Usually there is only oneentr<strong>an</strong>ce-exit <strong>to</strong> this cave.E. Chess Board.This system utilizes the Alice In Wonderl<strong>an</strong>d s<strong>to</strong>ry. It is put in<strong>to</strong> maleslaves. <strong>The</strong> pieces of the chess board move in various ways setting offdifferent programs. <strong>The</strong> devil will equal the black king. A program mightsound like this: “Black knight moves two spaces <strong>an</strong>d one right. Whiteknight moves two spaces <strong>an</strong>d one left. White knight challenges blackknight. Black Queen moves 5 spaces.” <strong>The</strong> victim who receives thisprogramming must be the type of thinker who would play chessreasonably well. <strong>The</strong> script c<strong>an</strong> be shown via videos while the victim isunder hypnotic drugs.F. Double Helix.This is a very import<strong>an</strong>t system. <strong>The</strong> double helix pattern is used as <strong>an</strong>eleva<strong>to</strong>r shaft running up <strong>an</strong>d down the worlds created for the alters. Ingeneral, each world lays at a tr<strong>an</strong>ce level. <strong>The</strong> double-helix is put in atprogramming sites where they have full medical facilities, such asLetterm<strong>an</strong> Hospital, Presideo, CA. <strong>The</strong> codes up <strong>an</strong>d down the eleva<strong>to</strong>rare alpha-numeric with lots of numbers. Because the way the doublehelix shape twists, one c<strong>an</strong> ride the eleva<strong>to</strong>r <strong>an</strong>d get off a level 1, 3, 5,7, 9 but you have <strong>to</strong> ride it the other way <strong>to</strong> get off at 2, 4, 6, 8, 10, 12.Because the double helix is the centerpiece of how the differentphysiological states of the mind are being layered, taking the victimdown <strong>to</strong> these different physiological states <strong>an</strong>d levels is very risky <strong>an</strong>d327


y the time it is through it involves lots of blood tr<strong>an</strong>sfusions for thevictim. <strong>The</strong> Caduceus is a double helix with snakes at the <strong>to</strong>p. <strong>The</strong>Caduceus is <strong>an</strong> occult symbol used in <strong>an</strong>cient Babylon, <strong>an</strong>cient HinduIndia, <strong>an</strong>d by Chinese occultists. Mercury in occult lore carries a staffcalled a caduceus. Mercury’s staff is a cabalistic symbol. WilliamHeller’s book on the Kaballah on page 78 states, “Mercury’s staff,called Caduceus, <strong>an</strong>d made of intertwined black-<strong>an</strong>d-white twinserpents, heralds more forthcoming splits in<strong>to</strong> duality. Once again, itreflects the ambivalent mind, its conscious, <strong>an</strong>d subconscious states, itswaking thoughts <strong>an</strong>d imaginative dreams.” So according <strong>to</strong> cabalisticdoctrine, the caduceus represents the various states of the mind.G. Flower system.This system is attached <strong>to</strong> other systems, <strong>an</strong>d utilizes the power of peerpressure <strong>an</strong>d generational ties. <strong>The</strong> flowers will often be bright. <strong>The</strong> budof the flower will represent one person, the stem <strong>an</strong>d the flowerrepresent others. This system might be connected <strong>to</strong> the Umbrella, theTrees, the Tri<strong>an</strong>gle <strong>an</strong>d the Star. A flower c<strong>an</strong> regenerate <strong>an</strong> internaltree because of its generational roots. Flowers are also used as eleva<strong>to</strong>rshafts, such as a sunflower. One has <strong>to</strong> jump in<strong>to</strong> the center of theflower <strong>an</strong>d go down the stem <strong>to</strong> reach a lower level. Flower fields suchas the poppy field are used as a hypnotic trigger <strong>to</strong> put <strong>an</strong> alter in<strong>to</strong>deep tr<strong>an</strong>ce.H. Helix.This is a simplified version of the double helix.I. Hour glass.Three hour glassed will be placed around the x-y-z axis in a quadr<strong>an</strong>t. Aquadr<strong>an</strong>t consists of a section of alters in a world <strong>an</strong>d their mirrorimages. <strong>The</strong> hour glass programming also includes a suicide program.12 disciple alters will be placed within the hourglass. Each disciple has<strong>to</strong> memorize a disciple lesson. If something triggers them, they willbegin <strong>to</strong> fall through the hour glass. If each of these 12 disciples fallsthrough the hour glass like s<strong>an</strong>d, then a sleeping gi<strong>an</strong>t like in Jack in theBe<strong>an</strong>stalk will wake up, . When the Gi<strong>an</strong>t awakes, he will kill the body.And of course, a mirror image of the Gi<strong>an</strong>t alter will be made also <strong>to</strong>help insure that at least one of the gi<strong>an</strong>ts get the job done.J. Mensa.328


This is a program put in<strong>to</strong> slaves who have pho<strong>to</strong>graphic memories. Itinvolves lots of numbers <strong>an</strong>d math. It’s overall structure looks like atri<strong>an</strong>gular-shaped fish net, with all the nodes or knots of the netcontaining a tri<strong>an</strong>gle. <strong>The</strong> core is place at the center of the tri<strong>an</strong>gle<strong>an</strong>d is surrounded by more tri<strong>an</strong>gles. <strong>The</strong>re are circles of alters withincircles of alters. Circles within circles. <strong>The</strong> a circle c<strong>an</strong> rotate <strong>an</strong>d seemsnever <strong>to</strong> end. <strong>The</strong> programming is me<strong>an</strong>t <strong>to</strong> be non-ending. <strong>The</strong>re arealso tri<strong>an</strong>gles within tri<strong>an</strong>gles. <strong>The</strong> effect of using a structure like this <strong>to</strong>house the alters is that they feel trapped in endless circles <strong>an</strong>d mazesof tri<strong>an</strong>gles within tri<strong>an</strong>gles. <strong>The</strong> codes in a Mensa system will beequations (sometimes called union force codes), bar codes, <strong>an</strong>dnumber sequences.K. Pentagram system.One pentagram system has pentagrams within pentagrams. <strong>The</strong>geometric lines grow from pentagram <strong>to</strong> pentagram by lines running inopposite directions. This has the same effect as circles within circles.L. Pool of Death.One or more of these c<strong>an</strong> be placed in<strong>to</strong> <strong>an</strong> alter system. <strong>The</strong>y oftenare found inside the main castle. Dead alters <strong>an</strong>d body parts <strong>an</strong>d<strong>to</strong>rture fragments, are all dumped in<strong>to</strong> these system garbage dumps.<strong>The</strong> Spirits of Death <strong>an</strong>d Destruction control these pools of Death.Variations of this may be called Lakes of Death, <strong>an</strong>d Waters of Death.In some systems, this is overseen by Taskmaster alters.M. Potter’s Wheel.This is the equivalent <strong>to</strong> a computer utility program. <strong>The</strong> way it functionsis that the Programmer pulls the alters he w<strong>an</strong>ts <strong>to</strong> work on up on thepotter’s wheel in order <strong>to</strong> work on them. When they are pulled up onthe potter’s wheel, they c<strong>an</strong> be asked <strong>to</strong> st<strong>an</strong>d in order <strong>an</strong>d r<strong>an</strong>k. <strong>The</strong>nthe alters will come <strong>to</strong> the front of the mind on <strong>to</strong>p of each other intheir prearr<strong>an</strong>ged sequence. <strong>The</strong> Charismatic movementprogrammer’s like <strong>to</strong> use this, because the Programmer c<strong>an</strong> becomegod, <strong>an</strong>d the slave becomes the clay. C<strong>an</strong> the pot talk back <strong>to</strong> thepotter? <strong>The</strong> Bible verse in ISA 45:9 is used, “WOE un<strong>to</strong> him that strivethwith his Maker! Let the potsherd strive with the potsherds of the earth.Shall the clay say <strong>to</strong> him that fashioneth it, What maketh thou? or thywork, He hath no h<strong>an</strong>ds?” <strong>The</strong> next verse again repeats its woes uponthose who question parents who fashion a child. As is typical of <strong>an</strong>umber of <strong>Illuminati</strong> programs, at first gl<strong>an</strong>ce they look like they are329


merely perversions of the Bible, but a closer look reveals that they areactually <strong>an</strong>cient occult rituals. For inst<strong>an</strong>ce, the <strong>Illuminati</strong> believe “Asabove, so below.” This is druidic philosophy, even though it soundssomewhat like something from the Bible. In the book Invocation of theGods Ancient Egypti<strong>an</strong> Magic for Today, pg. 203, the book gives amagical invocation that supposedly has been found in <strong>an</strong>cientEgypti<strong>an</strong> magical papyri. At <strong>an</strong>y rate this invocation’s wording ispowerful in English for a Monarch slave. <strong>The</strong> Invocation is called <strong>The</strong>Potter’s Wheel.“Hear the sound of the potter’s wheelAs it spins! Khnum!See the clay on the potter’s wheelAs it spins! Khnum!Feel the h<strong>an</strong>d of the Mighty Lord Form the seed <strong>to</strong> contain a soulAs it spins.See the soul, on the Wheel of LifeAs it spins! Khnum!Birth <strong>to</strong> death on the Wheel of Life See the soul, on the Wheel of LifeAs it spins!And with death we are born <strong>an</strong>ewWhile the vessel that’s <strong>to</strong>ssed aside Will return <strong>to</strong> the potter’s wheelAs it spins!”This is just one more example of where programming <strong>an</strong>d magicintersect.N. Puppet System.In this system the body feels <strong>to</strong>tally disjointed <strong>an</strong>d controlled by strings.Mengele enjoyed this program. He would say, “D<strong>an</strong>ce Marionetted<strong>an</strong>ce.” In other words, <strong>to</strong> paraphrase, “d<strong>an</strong>ce slave for me thecontroller”. Demons are laid in <strong>to</strong> pull the strings of the puppet. <strong>The</strong>internal controller may be a demon or a demonized alter. It c<strong>an</strong> beattached <strong>to</strong> other systems such as the Pentegram system. In a previouspart of the book, it was discussed how the victim’s body is paralyzed bydrugs <strong>an</strong>d then electroshocked in a way that the person seems <strong>to</strong> bethe Programmers puppet. This is put in when the child is very young. Thispuppet programming is very convincing <strong>to</strong> a small child, <strong>an</strong>d is a verynasty program for the slave <strong>to</strong> experience.O. Solemetric system.330


This is used for government/business/research slaves who must performcomplex tasks <strong>an</strong>d they w<strong>an</strong>t their minds <strong>to</strong> be less fragmented or notfragmented. <strong>The</strong> mind c<strong>an</strong> be programmed <strong>an</strong>d divided from itselfwithout creating alter personalities. Because the divisions in the minddue <strong>to</strong> dissociation <strong>an</strong>d programming lies are not as deeply structured,victims who get solemetric systems have strong demonic forces <strong>an</strong>dlot’s ritual <strong>to</strong> hold their systems in place.P. Spider Web system or Black Widow Spider System.This system is set up just for blackmail <strong>an</strong>d destruction via entrapment ofunsuspecting people who are perceived as threats <strong>to</strong> the <strong>Illuminati</strong>. Thissystem is found in lots of women coming in<strong>to</strong> churches with decent bynaive ministers. <strong>The</strong> system has a web with connec<strong>to</strong>rs <strong>an</strong>d silk str<strong>an</strong>ds.A target person will be symbolically placed in<strong>to</strong> the web <strong>an</strong>d then theblack widow alter(s) will entrap the victim. This is programming <strong>to</strong> takedown pas<strong>to</strong>rs of churches with sexual entrapment. <strong>The</strong> spirit Viperfound in ISA 59:5 is placed in<strong>to</strong> this system <strong>to</strong> protect it. <strong>The</strong>re will beegg alters which will devour the victim, <strong>an</strong>d Gatekeepers are assigned<strong>to</strong> guard the system.Q. Spiritual structuring.<strong>The</strong> spiritual structuring is not a single structure. A few people haveworked with the deeper elements of the programming <strong>to</strong> help victims<strong>an</strong>d also know what the <strong>Illuminati</strong> programmers have done <strong>an</strong>d whattheir agenda is, have come <strong>to</strong> realize that the spiritual structuring is themost import<strong>an</strong>t part of <strong>an</strong> <strong>Illuminati</strong> system. What you will now read isknown only <strong>to</strong> <strong>an</strong> exclusive few. Spiritual castles (Gr<strong>an</strong>dfather, Father,Mother, <strong>an</strong>d Gr<strong>an</strong>dmother castles) <strong>an</strong>d spiritual temples (<strong>to</strong> Moloch<strong>an</strong>d Baal etc.) are constructed internally. Entire spiritual worlds areconstructed internally. <strong>The</strong> most primal parts of the mind, <strong>an</strong>d the keyearly alters <strong>an</strong>d the core essence are usually taken <strong>to</strong> spiritualconstructs within the <strong>Illuminati</strong> slave. <strong>The</strong> gems are empowered by thelight of Lucifer (<strong>an</strong> alter-demon combination). But even more deeperth<strong>an</strong> that are the generational ties. <strong>The</strong> programmers, who themselvesare generational sat<strong>an</strong>ists, are part of a pl<strong>an</strong> where the generationallegal rights of Sat<strong>an</strong> are accumulated upon <strong>an</strong> individual. In theScriptures it says that the sins of the fathers are visited upon the third<strong>an</strong>d fourth generation. This gives Sat<strong>an</strong> a legal right <strong>to</strong> the generationalvictim. Each bloodline has its Prince demons attached <strong>to</strong> it--just like inthe Bible the Prince of Persia was both a m<strong>an</strong> & <strong>an</strong>d a demon. Hiddenwithin spiritual constructs such as black diamonds, <strong>an</strong>d diamonds, arefurther demonic constructs. <strong>The</strong> thrones of the generational PrinceDemons are attached <strong>to</strong> the primal hum<strong>an</strong> part of the victim. This is331


entirely spiritual--beyond that there are no words <strong>to</strong> describe it. It is veryreal <strong>to</strong> the survivor when therapists get <strong>to</strong> that point (which is veryrare!). <strong>The</strong> power of the <strong>Illuminati</strong> is that it is generational. <strong>The</strong>y buildupon that, when they build a system. Some of these genealogies havenot been free for m<strong>an</strong>y generations. If you w<strong>an</strong>t <strong>to</strong> spoil a structure,one need <strong>to</strong> bind the strongm<strong>an</strong>. <strong>The</strong> strongm<strong>an</strong> in <strong>an</strong> <strong>Illuminati</strong> systemis the generational ties. All ties <strong>to</strong> the bloodlines need <strong>to</strong> be renounced.<strong>The</strong> Programmers will take little <strong>Illuminati</strong> children <strong>to</strong> crypts of their<strong>an</strong>ces<strong>to</strong>rs in order <strong>to</strong> better attach the generational spirits. <strong>The</strong> wombholding the premature child is used as a temple in the Moon Childceremonies. After the child is born the womb structure will spirituallyserve as a temple for the primal hum<strong>an</strong> parts of <strong>an</strong> <strong>Illuminati</strong> slave.Whether the therapist c<strong>an</strong> realize these things or not, in the very least,they are aware of the saying “Father like son”, <strong>an</strong>d are aware howtraits may skip a generation but how a gr<strong>an</strong>dson may mirror agr<strong>an</strong>dfather. <strong>The</strong> generational aspects <strong>to</strong> <strong>Illuminati</strong> slaves are a majorrole in the <strong>Illuminati</strong>R. Stairwell.<strong>The</strong> stairwell is just as it sounds, it is a stairwell that is placed in<strong>to</strong> asystem. <strong>The</strong> stairwell c<strong>an</strong> be used as a trap for alters who are unwiseenough <strong>to</strong> be lured by programming <strong>to</strong> go in<strong>to</strong> it. <strong>The</strong> stairwell systemconnects various levels. <strong>The</strong>re are booby traps <strong>an</strong>d demonic entitiesattached <strong>to</strong> the system. Stairwells may be sealed up with Gatekeepersassigned <strong>to</strong> protect them. If <strong>an</strong> alter proceeds down a stairwell <strong>to</strong> get<strong>to</strong> other levels they need <strong>to</strong> realize that they initially will hit “<strong>to</strong>rnado(also called whirlwind) programming” <strong>an</strong>d flooding of memories. <strong>The</strong><strong>to</strong>rnados will spin the victim inward <strong>an</strong>d disorient them. <strong>The</strong> alterholding the body will feel as if it is out of control <strong>an</strong>d going <strong>to</strong> die.S. Telescoping.Any telescoping object (such as a telescoping army drinking cup, or atelescoping rod) c<strong>an</strong> be used <strong>to</strong> give the visual picture for the child <strong>to</strong>follow when it is being programmed. A telescoping system often has atime level, a function level <strong>an</strong>d <strong>an</strong> age level. <strong>The</strong> game of Chutes <strong>an</strong>dLadders along with Jacob’s Ladder have been used <strong>to</strong> place the s<strong>to</strong>ryline in<strong>to</strong> children.T. Tornado System.This is a free floating system that moves around areas that theprogrammers w<strong>an</strong>t protected. When it hits <strong>an</strong> alter(s) it causes332


confusion, spinning, <strong>an</strong>d switching, as well as a feeling of losing control.It’s part of the elemental back up programs discussed within a fewpages.U. Umbrella.This is associated with military programming. An umbrella protectssomething, such as the Delta assassination alters. An umbrella must betaken down from the inside <strong>an</strong>d so must this protective shield of theUmbrella program. One Umbrella system had 7 gates <strong>to</strong> it.DEFENSES IN DEPTHWhat would happen if a slave physically got away from its master orh<strong>an</strong>dler? This has happened countless times <strong>an</strong>d the mind-control is sosolid that the h<strong>an</strong>dlers don’t have <strong>to</strong>o much <strong>to</strong> worry about. <strong>Mind</strong>controlledslaves have gone <strong>to</strong> therapists for years <strong>an</strong>d never gottenfree of the mind-control. <strong>The</strong> therapeutic process that theestablishment has schooled them in <strong>an</strong>d then requires them <strong>to</strong> adhere<strong>to</strong>, prevents the therapist from doing things that might really set thevictim free. <strong>The</strong>rapists are often loath <strong>to</strong> give <strong>an</strong>y help in <strong>an</strong>y thing thatsmacks of spirituality. <strong>The</strong> spiritual issues in m<strong>an</strong>y of these slaves are themost crucial issues facing them. If they don’t resolve these spiritualissues, the deeper alters will continue <strong>to</strong> adhere <strong>to</strong> their blood oaths ofallegi<strong>an</strong>ce <strong>to</strong> their Sat<strong>an</strong>ic abusers <strong>an</strong>d their oaths <strong>to</strong> serve Sat<strong>an</strong>loyally.Each cult which programs, makes sure that they place in lots of loyalalters, which therapists call persecu<strong>to</strong>r alters because they <strong>to</strong>rment thealters who w<strong>an</strong>t freedom. If therapists try <strong>to</strong> eliminate these persecu<strong>to</strong>ralters, they will fight back with the full tenacity <strong>an</strong>d strength that thesurvival instinct gives <strong>to</strong> <strong>an</strong>yone. <strong>The</strong>ir persecu<strong>to</strong>r role needs <strong>to</strong> bevalidated, <strong>an</strong>d then redirected <strong>to</strong>ward productive ends. M<strong>an</strong>ypersecu<strong>to</strong>r alters see life simply as following their instructions <strong>an</strong>d thatthey are protecting the system from greater harm by s<strong>to</strong>pping therapy.During programming that was the case, but if their System has reacheda good therapist <strong>an</strong>d has good support team of other people, theirfears no longer apply. <strong>The</strong> cult will attempt <strong>to</strong> show them that theirfears do still apply. Hopefully, the support team for the system of alterswill work as hard at protecting as the abusers do <strong>to</strong> reinforce the fear.M<strong>an</strong>y of the programmers have been associated with the military. Oneof the tricks that the military learned is a defense in depth. <strong>The</strong> Russi<strong>an</strong>semployed defenses in depth with great success in 1943 in the bigbattle of Kursk during W.W. II. <strong>The</strong> first defense is that the slave has noawareness of the MPD (DID) or that they are being used as a slave.333


Some of the alters will realize that something is wrong, but the mindcontrol is <strong>to</strong>o strong for them <strong>to</strong> see clearly. Essentially the System is intr<strong>an</strong>ce all the time, even the front alters, they do not perceive realitylike people who are not in tr<strong>an</strong>ce all the time. <strong>The</strong> next line of defenseis that the fronts of <strong>an</strong> alter System don’t have a clue about the abuseor what their system has been designed for. <strong>The</strong> front alters will havealters which are loyal <strong>to</strong> the master, <strong>an</strong>d alters who are full of craziness<strong>an</strong>d disinformation. If the victim keeps probing (which m<strong>an</strong>y don’t)they will discover <strong>an</strong> occult involvement. Even if they discover that theSystem is related <strong>to</strong> the occult world, the programming is still intact. Ifthe person finds out he is MPD, <strong>an</strong>d finds out that the System was par<strong>to</strong>f the occult world, then he still is captured by all the programmingwhich is intact. Walls, fire walls, mazes, suicide programming, internalarmies, programmed craziness <strong>an</strong>d m<strong>an</strong>y other tactics sap the strengthof the front alters if they try <strong>to</strong> deviate from the straight <strong>an</strong>d narrowprogrammed way of behaving. WHEN THE FINAL CALL BACK IS GIVEN--m<strong>an</strong>y Monarch slaves are programmed <strong>to</strong> kill their therapists becausethe <strong>Illuminati</strong> will be able <strong>to</strong> hide/protect them once they leave theirplace in society <strong>an</strong>d return for the final callback. Reporting altershidden well in the System, observe <strong>an</strong>d secretly report back <strong>to</strong> theNetwork everything a therapist does. <strong>The</strong> alters have fix me codes <strong>to</strong>call for help such as “FIX ME”, “QUEEN OF HEART”, “THREE LITTLE KITTENSWHO LOST THEIR MITTENS”, “THE COWS IN THE CORN, LITTLE JACKIEHORNER WON’T YOU PLEASE BLOW YOUR HORN.” <strong>The</strong> jokers <strong>an</strong>dinternal programmers will work night <strong>an</strong>d day <strong>to</strong> s<strong>to</strong>p or reverse <strong>an</strong>ywork done <strong>to</strong>ward freedom. <strong>The</strong>re are so m<strong>an</strong>y levels, suicideprograms <strong>an</strong>d so m<strong>an</strong>y other defenses a person’s body is not strongenough <strong>to</strong> attack the programming head on. <strong>The</strong>re are for inst<strong>an</strong>ceBells of Destruction programming, <strong>The</strong> War in the Heavens suicideprogramming, the Gethsem<strong>an</strong>e Suicide Programming, the Oc<strong>to</strong>pussuicide programming, the Injection of Bleach, the overdose of drugs,the go ins<strong>an</strong>e program, just <strong>to</strong> mention a few. <strong>The</strong> slave will be given awhole batch of these types of programs which may all go off at once ifthe slave doesn’t comply with keeping the mind control secret. Oneinternal protective programming line is <strong>The</strong> M<strong>an</strong> without a Countrys<strong>to</strong>ry. Another is a water program but in with Scripture from Jer. aboutAhab s<strong>to</strong>mping the grapes. Another is for the slave <strong>to</strong> think they havebeen turned in<strong>to</strong> a fragile paper doll. <strong>The</strong> paper doll programming isput in by making the skin very sensitive <strong>to</strong> <strong>an</strong>y <strong>to</strong>uch, <strong>an</strong>d thenattaching that memory <strong>to</strong> the hypnotic suggestion of being a paperdoll. An oc<strong>to</strong>pus suicide program chokes the slave if they aredisobedient. A mush the brain is triggered by a f<strong>an</strong>ning movement. Ifthe slave <strong>to</strong>uches the programming, Armageddon programming isactivated in those who have Bible programming. <strong>The</strong> four horsemen ontheir different horses ride out <strong>an</strong>d bring their different mental <strong>to</strong>rtures <strong>to</strong>the slave’s mind. Winged monkeys (possibly alter fragments) from theWizard of Oz s<strong>to</strong>ry programming are called “watchers”. <strong>The</strong>y watch334


alters. <strong>The</strong> slave is conditioned that if <strong>an</strong>y programming or demonologyis taken out, it will come back seven times seven stronger. <strong>The</strong> Bible (MT12:43-44) is used <strong>to</strong> put in this programming. Actually, this is more th<strong>an</strong>programming, there is a principle in operation here. <strong>The</strong>rapists need <strong>to</strong>be cautious about pulling things out, if they do not underst<strong>an</strong>d whatthe ramifications will be. We w<strong>an</strong>t the victim <strong>to</strong> have hope, not <strong>to</strong>make the task look harder. One of the primary protective programs isthe JUDAS PROGRAMMING. Anyone who betrays the abusers islabelled “Judas” <strong>an</strong>d is programmed <strong>to</strong> go out <strong>an</strong>d act like Judas byh<strong>an</strong>ging themselves. If that mind-control program doesn’t happen, the<strong>Illuminati</strong> warn their people “Remember Tom Collins”, who was the sonof <strong>an</strong> <strong>Illuminati</strong> Gr<strong>an</strong>d Mother, who became a Christi<strong>an</strong>, startedexposing the <strong>Illuminati</strong> in churches, <strong>an</strong>d was gunned down in a groceryparking lot. Finally, the members are warned that they will be sacrificedon a cross like Christ in what is termed “a trai<strong>to</strong>r’s death.” Usually, mindcontrolledslaves will police their own actions <strong>an</strong>d thoughts. <strong>The</strong>therapist may hear their Monarch client talk about the Dove, fire,Moriab, <strong>an</strong>d water as protec<strong>to</strong>rs. <strong>The</strong>y may talk about a little bird dovewho is part of protection which flies ift<strong>to</strong> the ebony trees. <strong>The</strong> basicdefensive programming placed in<strong>to</strong> the early <strong>Illuminati</strong> models wasbased upon the 4 BASIC ELEMENTS--fire, wind, water, <strong>an</strong>d air. When theprogramming is <strong>to</strong>uched by <strong>an</strong>yone, the elements of the earth comealive. For inst<strong>an</strong>ce, if the programming is <strong>to</strong>uched the followingprograms based on the four elements come alive:WATER -- victim will freeze like ice, will suffocate like inhaling water, willboil like being placed in boiling water, will feel a drip drip drip on thehead, <strong>an</strong>d will flood with memories. This is why some Monarch slaves donot like <strong>to</strong> swim.FIRE -- Victim will burn inside <strong>an</strong>d outside. <strong>The</strong> victim will remember fire<strong>to</strong>rture, <strong>an</strong>d perhaps their face melting. This is why some Monarchslaves don’t like <strong>to</strong> light a match or a fire. Slaves will have theirprogramming reinforced with the warning, “If you disobey us, Sat<strong>an</strong> willtake your ability <strong>to</strong> resist burning away, <strong>an</strong>d you will burn in hell.” <strong>The</strong>alters have no way <strong>to</strong> conceive that God could love them, so they feelif they are <strong>to</strong> have <strong>an</strong>y ch<strong>an</strong>ce not <strong>to</strong> burn in the afterlife of hell theymust obey. <strong>The</strong> fire programs which activate when they disobeyreinforce this warning. Often victims report a “Ring of Fire” burningwithin.EARTH -- the victim will remember being dropped down a well, beingburied alive in either hot s<strong>an</strong>d, or a casket. Earth me<strong>an</strong>s “life or death”.<strong>The</strong> earth “swallows people up.” <strong>The</strong> victim may feel dehydrated from335


memories of being buried in hot s<strong>an</strong>d (hot earth). This is why somevictims have a fear of being buried alive. In fact, this c<strong>an</strong> be doneinternally where alters are internally placed in caskets <strong>an</strong>d buried.Alters are also internally thrown in<strong>to</strong> internal wells. <strong>The</strong> <strong>Illuminati</strong>programmers say, “ASHES TO ASHES, DUST TO DUST’ <strong>to</strong> me<strong>an</strong> that theearth will bring death. Sometimes even volc<strong>an</strong>os erupt (earth <strong>an</strong>d fire)out of the oce<strong>an</strong> (water) <strong>an</strong>d destroy parts of a system. Internalearthquakes also happen quickly <strong>an</strong>d then the entire system will beshifted <strong>an</strong>d shuffled.AIR or WIND -- Vortexes suck the person down <strong>an</strong>d away, a strong windtakes the alter(s) in<strong>to</strong> the Rubicon of Outer Space <strong>an</strong>d the bodydismembers itself as it goes away. <strong>The</strong> mind doesn’t underst<strong>an</strong>d why itis being <strong>to</strong>rn apart, only that it is being <strong>to</strong>rn like a <strong>to</strong>rnado. <strong>The</strong> altermay also go in<strong>to</strong> a bubble <strong>an</strong>d float away.(This effect is put in w/ drugs<strong>an</strong>d hypnosis.) <strong>The</strong>y will dissociate <strong>an</strong>d nothing is real. How does oneplace in<strong>to</strong> a child these types of programs? Let’s say the programmersw<strong>an</strong>t <strong>to</strong> put in the Tumbleweed Program where the child feels like it hasbecome a tumbleweed & c<strong>an</strong>’t ground <strong>an</strong>d get its bearings on<strong>an</strong>ything. Let’s say the programmer also w<strong>an</strong>ts the child <strong>to</strong> lose his arms& legs while being blown away. <strong>The</strong> child is dehydrated so the mind isoverheated <strong>an</strong>d hallucinating. Special drugs are also given <strong>to</strong> the child<strong>to</strong> make it more delirious, make it more suggestible, etc. <strong>The</strong> little childby this point has no mind of its own. Heavy f<strong>an</strong>s with hot air are placedupon the child. It is hypnotically <strong>to</strong>ld that it has no arms <strong>an</strong>d no legs.<strong>The</strong> child is <strong>to</strong>o weak <strong>to</strong> think for itself. It is almost coma<strong>to</strong>se. <strong>The</strong> childwill be left for perhaps 8 hours as a script which keeps repeating itself isplayed on a voice box. <strong>The</strong> child will hallucinate the script or the videoit is being shown. When the child c<strong>an</strong> give the script back <strong>to</strong> theprogrammer exactly like it is me<strong>an</strong>t <strong>to</strong> be, then the programmers knowthey c<strong>an</strong> s<strong>to</strong>p. <strong>The</strong> child alter is <strong>to</strong> take on the identity of thetumbleweed. If it responds like m<strong>an</strong>y Main alters--it will pass this abilityon <strong>to</strong> splits that it creates for this purpose. <strong>The</strong>se splits created for thetumbleweed script will be cle<strong>an</strong> slates for the programmers <strong>to</strong>m<strong>an</strong>ipulate. By the way, smelling salts are used <strong>to</strong> wake up childvictims who are <strong>to</strong>o coma<strong>to</strong>se.OVER VIEW ON THE PRINCESS PROGRAMMING.<strong>The</strong> Omega programs prevent integrating the Multiple personalities,<strong>an</strong>d they hold the body programs, <strong>an</strong>d run the computers. If majortampering is done with the System, which threatens <strong>to</strong> <strong>to</strong>tally wipe outthe Omega programs, then one of the backup programs is the Princessprogramming. <strong>The</strong> princess programming is a back up program. It c<strong>an</strong>be triggered several ways. One method is by astral communication336


etween loyal alters <strong>an</strong>d their <strong>Illuminati</strong> programmer. However, themain triggering fac<strong>to</strong>r is that the System has recognized that serioustampering has been done <strong>to</strong> the System. If serious deprogrammingoccurs, the Princess program with “Sleeping Beauty” kicks in. <strong>The</strong>programming is contained within a box, which is opened up upon theappropriate cues. <strong>The</strong> way it operates is that it kicks in when theh<strong>an</strong>dler loses control over a system. <strong>The</strong> princess who is kept sleepingby spiders which bite her in a coffin, wakes up <strong>an</strong>d looks for the prince<strong>to</strong> come. Daddy demon <strong>an</strong>d the dark princess are now ruling from thecastle dungeon. A System’s dwarfs <strong>an</strong>d Thor continue <strong>to</strong> guard as wellas the big guard cats like Bast. Darkness sets in on all the <strong>to</strong>p sections ofalters, <strong>an</strong>d thick walls <strong>an</strong>d pain come, then a webbing much like abody-suit-cocoon will envelope all but alters loyal <strong>to</strong> the master. Itbecomes hard <strong>to</strong> breathe <strong>an</strong>d the alters who had sought freedomfrom the programming, now find themselves being tr<strong>an</strong>ced out. Alterswho are cold <strong>an</strong>d in lots of pain are called up by code <strong>to</strong> <strong>to</strong>rment thebody. <strong>The</strong> Outer Darkness of a System (sometimes called the Rubicon)gets thicker. If Gatekeeper <strong>an</strong>d Kitten alters have porcelain faceprogramming, then they will get their porcelain masks back as theOmega programming kicks back in. <strong>The</strong> porcelain masks have cordsback <strong>to</strong> the black princess. <strong>The</strong> black princess’s coffin has cords <strong>to</strong>Papa. <strong>The</strong> core will give her energy <strong>to</strong> the dark side, <strong>an</strong>d alters whow<strong>an</strong>t freedom will receive very little energy. <strong>The</strong>y will be very tired.Those alters who liked the light side <strong>an</strong>d freedom are now underattack. <strong>The</strong>y will be isolated by walls <strong>an</strong>d then incapacitated by acocoon which leads <strong>to</strong> death. <strong>The</strong> alters who do not w<strong>an</strong>t <strong>to</strong> be part ofSat<strong>an</strong>ism will be worked over, <strong>an</strong>d they will continue <strong>to</strong> be worked overuntil they shatter. If need be, they c<strong>an</strong> be taken <strong>to</strong> the castle dungeon<strong>an</strong>d played movies of <strong>to</strong>rture which have been coded <strong>an</strong>d enteredin<strong>to</strong> the mind via codes. Internal voodoo will be carried out <strong>to</strong> scarealters in<strong>to</strong> complying. <strong>The</strong> worlds will reestablish their compasses. <strong>The</strong>internal BEAST computer along with the dark princess run the show. <strong>The</strong>box which opens up, sets off the suicide programming. <strong>The</strong> primary <strong>to</strong>olin fighting the suicide programming is the will <strong>to</strong> fight. If the will <strong>to</strong> fight isstrong, a way <strong>to</strong> fight through the walls c<strong>an</strong> be found. If the walls arebroken down, then a strategy of isolating the castle’s programmingc<strong>an</strong> be carried out, <strong>an</strong>d eventually the black princess c<strong>an</strong> even beretrieved. Since the princess <strong>an</strong>d daddy demon are running things viaspiritual <strong>an</strong>d demon processes, the battle at this point involves spiritualwarfare, although there are probably other methods <strong>to</strong> solve thesituation. <strong>The</strong> castle programming will be isolated by closing the portals,<strong>an</strong>d other safeguards. <strong>The</strong> Black Princesses c<strong>an</strong> be turned from theircourse. <strong>The</strong> Black Princess c<strong>an</strong> be retrieved. <strong>The</strong> castle’s power c<strong>an</strong> beshut down. <strong>The</strong> Princess programming c<strong>an</strong> be beat, but it takes hardwork. A system must make decisions <strong>to</strong> continue fighting theprogramming with all their creativity, strength <strong>an</strong>d will power. Arebirthing program will go off. This rebirthing program is controlled by a337


System of clocks. <strong>The</strong> clocks are the stabilizing heartbeat <strong>an</strong>d are tied<strong>to</strong> the eternal life force. <strong>The</strong>re are also clocks which control the steps <strong>to</strong>the Princess Programming. <strong>The</strong>se clocks bring about steps which willtake the System down the road <strong>to</strong> no-return. <strong>The</strong>se clocks c<strong>an</strong> befrozen <strong>an</strong>d by freezing them, one c<strong>an</strong> s<strong>to</strong>p the next step from takingplace. In the rebirthing program, umbilical cords <strong>an</strong>d strings run fromalters back <strong>to</strong> the black princess. <strong>The</strong> black princess is in the <strong>to</strong>rturechamber of the dungeon <strong>an</strong>d the strings carry the <strong>to</strong>rture memories <strong>to</strong>alters in sections w<strong>an</strong>ting freedom, especially those holding the body. Ifthose alters w<strong>an</strong>t <strong>to</strong> s<strong>to</strong>p the intense pain <strong>to</strong> the body they need <strong>to</strong>freeze those strings <strong>an</strong>d s<strong>to</strong>p the <strong>to</strong>rture memories from coming up fromthe <strong>to</strong>rture chamber. <strong>The</strong> umbilical cords are “feeding” the alters fromthe black princess. <strong>The</strong> Kittens alters, most likely due <strong>to</strong> programming,will w<strong>an</strong>t <strong>to</strong> protect the core so they do not w<strong>an</strong>t <strong>to</strong> s<strong>to</strong>p the process ofcontrol that the black princess is exerting over them. In other words,they will find it hard <strong>to</strong> save themselves. Internal Voodoo will come froma dollhouse, <strong>an</strong>d only by dealing with inside the doll house c<strong>an</strong> it bes<strong>to</strong>pped. One option is <strong>to</strong> create shields <strong>to</strong> protect alters from thevoodoo. Christi<strong>an</strong>s have the shield of faith which really c<strong>an</strong> function inreal life, <strong>an</strong>d <strong>an</strong> internal shield of faith has protected <strong>an</strong>d shieldedChristi<strong>an</strong>s from Voodoo. <strong>The</strong> darkness <strong>an</strong>d what people (alters) call“walls” c<strong>an</strong> be flooded with the blood of Jesus, which often drivesback the darkness <strong>an</strong>d c<strong>an</strong> give freedom <strong>to</strong> work. <strong>The</strong> soul ties that areinvolved with the princess programming <strong>an</strong>d the masks need <strong>to</strong> bebroken <strong>an</strong>d bound. <strong>The</strong> System may be able <strong>to</strong> find someone or someplace <strong>to</strong> get wisdom or underst<strong>an</strong>ding about their System. <strong>The</strong> Systemalso needs <strong>to</strong> cut their soul ties <strong>to</strong> their <strong>Illuminati</strong> programmers. <strong>The</strong>rebirthing program is also giving directions <strong>to</strong> the dark princess. <strong>The</strong>re is<strong>an</strong> umbilical cord which ties the dark princess <strong>to</strong> the rebirthingprogram. <strong>The</strong> blood of Jesus c<strong>an</strong> s<strong>to</strong>p this tie.BACKUP PROGRAMMINGOne of the backup programs is designed <strong>to</strong> deal with someone whohas a good underst<strong>an</strong>ding of a system, <strong>an</strong>d tries <strong>to</strong> take a system outvia spiritual warfare. A camera is designed <strong>to</strong> reflect <strong>an</strong> image on<strong>to</strong> amirror <strong>an</strong>d the deprogrammer works with the mirror images. <strong>The</strong>deprogrammer has great success with the mirror images, because thecamera c<strong>an</strong> merely shift its view, <strong>an</strong>d the things the deprogrammer istrying <strong>to</strong> get rid of disappear. However, since the alters that arecollaborating with the deprogrammer see all the correct thingshappen, they sincerely think they are being deprogrammed. When thedeprogrammer finishes the alters feel better, see their worlds come<strong>to</strong>gether, but the work has only been a sham. Other backup programsprovide the deprogrammer with mirror images <strong>an</strong>d sham alters <strong>to</strong> talkwith. <strong>The</strong> deprogrammer never talks <strong>to</strong> the real hum<strong>an</strong> elements. If we338


try <strong>to</strong> give a summary of the different backup programs we couldincludeeach grid has programs attached <strong>to</strong> its grid no. <strong>an</strong>d each sectionhas a computer, as well as connecting computers between sections---both the programming <strong>an</strong>d the computers have the power <strong>to</strong>reprogram themselves.the 4 elements of nature coming alive programsthe princess program (based on Sleeping Beauty)a plu<strong>to</strong>nium or a<strong>to</strong>m bomb set up activated by lasers <strong>to</strong> protect theinternal hierarchy.<strong>The</strong> Monarch programming creates very complex systems that are assophisticated as <strong>an</strong> Apollo spacecraft. <strong>The</strong>re is no way all the possiblein <strong>an</strong>d outs c<strong>an</strong> be covered. However, the reader c<strong>an</strong> watch a movie“Labyrinth” <strong>to</strong> get a good idea of what the end product is like for themind of the victim. <strong>The</strong> movie represents what the internal world is likefor <strong>an</strong> alter who is trying <strong>to</strong> underst<strong>an</strong>d its mind. It would be worthwhile<strong>to</strong> finish this chapter on structuring by covering this movie whichillustrates the end product. <strong>The</strong> bizarre movie Labyrinth may be shownagain on HBO <strong>an</strong>d is available from some video s<strong>to</strong>res. In fact, thevideo s<strong>to</strong>res have a hard time meeting cus<strong>to</strong>mer dem<strong>an</strong>ds for thispopular video. One of the co-authors knows a girl who has watched“Labyrinth” twenty times.“LABYRINTH”, A VIEW OF A MONARCH’S INTERNAL WORLDIn 1986, a movie called “Labyrinth” was produced by CherryMcFadden. <strong>The</strong> movie was Monty Python’s “Terry Jones” scripted. <strong>The</strong>movie is a portrayal of what the internal world inside a Monarch mindcontrolledslave looks like. <strong>The</strong> Monarch slave has <strong>an</strong> internal world builtinside their mind in which the hundreds <strong>an</strong>d thous<strong>an</strong>ds of alters mustlive in. <strong>The</strong> alters are given a psychotic world of fiction in which theymust live in as reality. An alter of a Monarch slave will have two worlds,the external world of reality, <strong>an</strong>d their own internal world which,because of the programming, will seem more real th<strong>an</strong> the real world.Hogel, a gnome, tells Sarah, “Things are not what they seem in thisplace.” <strong>The</strong> internal worlds of the slave c<strong>an</strong> be shifted <strong>an</strong>d rearr<strong>an</strong>gedby the internal programmers. <strong>The</strong> internal programmers c<strong>an</strong> ch<strong>an</strong>gecodes, eliminate alters, <strong>an</strong>d carry out extensive deception <strong>to</strong> otherparts of the System. As in the Monarch programming, the movie scastle reminds one of Emerald City. <strong>The</strong> movie Labyrinth seems weird<strong>an</strong>d occultic. Gargoyle elves (similar <strong>to</strong> coven demons) d<strong>an</strong>ce magic339


<strong>an</strong>d a sweet girl played by Jennifer Connelly moves from one weirdscene <strong>to</strong> <strong>an</strong>other, while <strong>an</strong> occasional shot gives us the hideous ruler ofthe Castle played by David Bowie. <strong>The</strong>se demons also guard the babythat represents the innocent core. Monarch slaves very frequently havecastles built in<strong>to</strong> their internal world. Some slaves will have a wholeseries of castles, some are King’s castles, some are Queen’s castles,<strong>an</strong>d some are castle’s shaped liked pyramids with all-seeing eyes inthem. <strong>The</strong> s<strong>to</strong>ry line of the movie Labyrinth is that the girl, Sarah,searches for her baby brother, Toby, who is captive in a castle in adream world. Actually, this represents <strong>an</strong> alter searching for theinnocent core from which it split off from. Often the core (the originalinnocent child personality which split off personalities in order <strong>to</strong> remaininnocent is locked up in the castle by the programmer who serves asMaster of the castle. Often in deprogramming, the core is taken <strong>to</strong> acastle dungeon in a terrible backup program called the princessprogram which was just described on a previous page. <strong>The</strong> princessprogramming (which is a back up program) functions, when theregular programming goes down (which is rare). When the Princessback-up program kicks in the <strong>to</strong>ad is kissed, the princess core is wokeup, etc. etc. Parts of the Princess program seem portrayed <strong>to</strong>wards theend of the movie. In the movie, David Bowie, who in real life was asat<strong>an</strong>ist & a rock star who committed suicide, plays the part of theMaster of the Castle. <strong>The</strong> girl soon goes in<strong>to</strong> the dream world (internalworld of her mind). She must go through a labyrinth if she w<strong>an</strong>ts <strong>to</strong> get<strong>to</strong> the castle. Although the movie is fiction, it is close enough <strong>to</strong> how aMonarch’s mind thinks, that <strong>an</strong> adult Monarch slave might well have hisor her programming reinforced if they saw this film. It also would triggerm<strong>an</strong>y Monarch slaves <strong>an</strong>d create fear in them. Monarch slaves havem<strong>an</strong>y clocks built in<strong>to</strong> their systems. <strong>The</strong>y have internal clock makers<strong>an</strong>d internal clock keepers. In the movie, clocks pop up everywherejust like in a Monarch’s mind. Some Monarch slaves are programmed<strong>to</strong> see their internal world, <strong>an</strong>d others are programmed not <strong>to</strong> be able<strong>to</strong> see their internal world. In other words, m<strong>an</strong>y Monarchs may nothave the ability <strong>to</strong> see a great deal at first of this programming due <strong>to</strong>further programming, <strong>an</strong>d yet these images work in the deep recessesof their minds <strong>to</strong> keep their minds within the confines of theprogramming. David Bowie has the magical ability <strong>to</strong> rearr<strong>an</strong>ge timeon the clocks. <strong>The</strong> h<strong>an</strong>dlers often mess with the internal <strong>an</strong>d externalclocks of a slave, so that the slave is disoriented about what time it is.Alters within a Monarch system are not allowed <strong>to</strong> stray from the pathassigned <strong>to</strong> them. If they try <strong>to</strong> move out of their assigned spot in themind, then they encounter traps, mazes, tunnels <strong>an</strong>d demons just like inthe movie Labyrinth. An internal world of a Monarch’s mind will havebrick walls, doors <strong>an</strong>d vortex tunnels just like in the movie. When the girlfalls in<strong>to</strong> a vortex, she has magici<strong>an</strong> h<strong>an</strong>ds all over her. Monarch victimsspeak of what vortexes are like <strong>an</strong>d they often describe h<strong>an</strong>ds comingout of no where. <strong>The</strong> movie begins with <strong>an</strong> oak tree. <strong>The</strong> oak tree is <strong>an</strong>340


import<strong>an</strong>t part of the <strong>Illuminati</strong> programming. <strong>The</strong> Master programmerin the castle, wearing a tri<strong>an</strong>gle medallion around his neck <strong>an</strong>d lookingveracious (David Bowie) sings, “Voodoo. ..Babes with the power...magic spells...d<strong>an</strong>ce magic...slap that baby <strong>an</strong>d make himpay....d<strong>an</strong>ce magic, d<strong>an</strong>ce magic.” Cobwebs are built in<strong>to</strong> theMonarch minds, <strong>an</strong>d when <strong>an</strong> alter goes where it shouldn’t they oftenget cobwebbing over them. <strong>The</strong> tunnels in the movie are full ofcobwebs. As the girl moves forward <strong>to</strong>ward the magic demon-investedCastle she comes across m<strong>an</strong>y things--all of which relate <strong>to</strong> internalitems built in<strong>to</strong> a Monarch slave’s mind. Some of the things are slightlydifferent in the movie th<strong>an</strong> in a slave’s mind--but the concepts are thesame. For inst<strong>an</strong>ce, the actual Thor figure looks like the Iron M<strong>an</strong> of theWizard of Oz series rather th<strong>an</strong> the iron robot that they portray. But thematch is close enough for the imagery <strong>to</strong> portray what it is me<strong>an</strong>t <strong>to</strong>represent. During programming, bracelets with pieces will be given <strong>to</strong>the child <strong>to</strong> teach them how the alters are <strong>to</strong> revolve. A bracelet likethis is owned by the girl. <strong>The</strong> girl encounters a dwarf. <strong>The</strong> dwarfs in theinternal world “mine the jewels” (that is the programming). <strong>The</strong> Jewelsare the particular programs that run a Monarch system of alters of <strong>an</strong>MPD (DID) mind. <strong>The</strong> dwarf in the movie is <strong>to</strong>ld by David Bowie (theProgrammer) that he has “lost his Jewels”--that is that he has lost hisprogramming! <strong>The</strong> dwarf in the movie decides <strong>to</strong> help the girl. InMonarch programming the dwarf helps <strong>an</strong> alter by bringing itprogramming! Some help! <strong>The</strong> goblin (demon) is asked by the girl <strong>to</strong>find a portal. <strong>The</strong> goblin opens a door <strong>an</strong>d it appears <strong>to</strong> be a broomcloset. He opens it again <strong>an</strong>d it appears as a door. This is the exact waythe programming is. Portals <strong>an</strong>d doors in the internal world have covers<strong>to</strong>ries. At first they look like one thing--but if the mind c<strong>an</strong> get by thefirst look--they will turn out in reality <strong>to</strong> be something else. <strong>The</strong>re is coverprogramming over everything--so that the slave doesn’t trust his ownmind. For inst<strong>an</strong>ce, besides lots of clocks undisguised, clocks aredisguised in a System as <strong>an</strong>y object, but they c<strong>an</strong> be recognized bythe trained observer because they are gold colored. In the movie,objects are const<strong>an</strong>tly ch<strong>an</strong>ging. M<strong>an</strong>y monarch’s fear the rockscoming alive--just as they do in the movie labyrinth. In the bot<strong>to</strong>m ofthe slave’s mind--put in at the deepest hypnotic levels possible are thehell pits. <strong>The</strong> movie shows the hell pit <strong>an</strong>d even calls it the “hell pit.”Notice that as she goes in<strong>to</strong> this str<strong>an</strong>ge world that the clocks c<strong>an</strong> beturned around. This is true in the programming. <strong>The</strong> clocks c<strong>an</strong> beturned by the programmer so that the slave c<strong>an</strong> be <strong>to</strong>ld it is J<strong>an</strong>uarywhen it is December. A cover program c<strong>an</strong> be entered so that theslave has memory of what he was supposed <strong>to</strong> have done inDecember. <strong>The</strong>se false memories are laid in with real <strong>to</strong>rture memories<strong>an</strong>d tied <strong>to</strong> emotions. <strong>The</strong> false memories lack certain characteristics ofreal memories--<strong>an</strong>d yet still they c<strong>an</strong> at times be difficult <strong>to</strong> separatefrom the true memories, especially if the mind-controlled slave is inprogramming. <strong>The</strong> following is the s<strong>to</strong>ry line of the movie as it happens341


in this bizarre movie. Early in the movie we see a witch with <strong>an</strong> hourglass. When the girl gets <strong>to</strong> the castle it is guarded by a mech<strong>an</strong>icalmonster that resembles in some ways Thor of the programming. Noticethat portals <strong>an</strong>d holes open up. When they open up <strong>an</strong>other level,protec<strong>to</strong>rs attack them <strong>an</strong>d they must run back down their tunnel <strong>to</strong>save themselves. <strong>The</strong> Monarch slave will get feelings of being crushed if<strong>an</strong> alter ventures where it shouldn’t in the mind. When the girl asks thedwarf “How c<strong>an</strong> I believe <strong>an</strong>ything you say?” She is <strong>to</strong>ld, “What choicedo you have?” Fire demons come out d<strong>an</strong>cing. <strong>The</strong>y take out theireyeballs <strong>an</strong>d eat them. <strong>The</strong>y say “Bad luck down the path.” What thefire demons represent are the Gamma programming <strong>an</strong>d the threatsthat the Gamma programming has upon the victim. <strong>The</strong> programmingtells <strong>an</strong> alter that it will lose its head or other horrible threat if it doesn’tcomply with the programming. “Let’s take off her head” the firedemons say, as they act out the various programs--decapitation,delimbing, etc. <strong>The</strong>y also w<strong>an</strong>t <strong>to</strong> throw her in<strong>to</strong> the pit of eternalflames. <strong>The</strong>y go down a chute in<strong>to</strong> the eternal hell pit. It is even calledthe eternal pit in the movie! <strong>The</strong> hell pits of a slave will generally smelllike sulfur--which is exactly what the movie’s hell pit does. A guardi<strong>an</strong> ofthe pit (looking like a dog) comes out. Guardi<strong>an</strong>s within the Monarch’smind are generally far more horrifying th<strong>an</strong> this dog. <strong>The</strong> guardi<strong>an</strong> mustgive permission for passage. Another trap appears--as the slave’sinternal world is filled with booby traps. <strong>The</strong> name of the dog theguardi<strong>an</strong> rides on is Ambrosius, similar <strong>to</strong> Ambrosia. A peach withpoison is given <strong>to</strong> the dwarf. <strong>The</strong> slave is programmed <strong>to</strong> fear poisonedfruit. (This is <strong>an</strong>other fairy tale turned in<strong>to</strong> programming.) David Bowie iscalled <strong>an</strong> “adept” who creates dream bubbles. <strong>The</strong> slave’s mind willhave adepts who are the programmers. <strong>The</strong> movie s adept puts aprincess in a bubble. <strong>The</strong>n she goes by memory back <strong>to</strong> when she wasat a Sat<strong>an</strong>ic ball where people wear masks of birds, goats, <strong>an</strong>d pigs.<strong>Illuminati</strong> ceremonies include balls like this with masks. This Love s<strong>to</strong>ry isreliving programming of the girl that she is a Queen, that she is married<strong>to</strong> Sat<strong>an</strong>, <strong>an</strong>d that this is a bonding ceremony. Everyone is grabbingher. People who have been <strong>to</strong> this <strong>Illuminati</strong> ceremony will recognize it.Next, she sees mirrors. When she shatters the mirrors (a no-no in theprogramming) she begins falling. Generally, if a slave shatters themirrors in their mind--they fall in<strong>to</strong> suicide programming. She falls in<strong>to</strong> ajunkyard. <strong>The</strong>n a sat<strong>an</strong>ic seed comes alive from her fruit. It is a worm.An old hag gives her a teddy bear. <strong>The</strong> programmers <strong>an</strong>d parents ofslaves frequently give stuffed <strong>an</strong>imals. <strong>The</strong> teddy bear without h<strong>an</strong>dsrepresents <strong>to</strong> the victim their helplessness. <strong>The</strong> old hag says “like a littlebunny rabbit...Don’t you...Bitsy Boob” All this is Monarch programmingstuff. <strong>The</strong>n she sees a book about the labyrinth. <strong>The</strong> Monarch’s mindhas libraries <strong>an</strong>d diagrams of their own system but these are keptguarded by the mirrors, the demons, <strong>an</strong>d programming. <strong>The</strong> girl Sarahfinds a book (the files) of how the labyrinth is built. Actually, you c<strong>an</strong><strong>to</strong>o. If the original programming was Wizard of Oz programming--then342


when you looked at the front of the Wizard of Oz series books youwould find a map that helped build the internal world. Some of theitems on that map will likely be found in your Monarch system (but notall). If your Monarch system has Star Trek programming it is possible theywill have <strong>an</strong> internal world similar <strong>to</strong> the diagrams shown in this bookwhere Star Trek programming is covered. In other words, there arebooks which do show the labyrinth, just as the movie Labyrinth hasSarah find a book showing the internal world. But if <strong>an</strong> alter finds amap, this does not me<strong>an</strong> the alter c<strong>an</strong> travel freely in its system’s mind!In working with a mind-controlled slave, we discovered one of themethods <strong>to</strong> get over the Wizard of Oz mazes was <strong>to</strong> fly with the Orks.However, <strong>an</strong> alter caught in the mazes was frightened <strong>to</strong> stay put bythe demons that surrounded it. (This is so well portrayed in Labyrinth.)This happens in real life <strong>to</strong> Monarch alters which stray in<strong>to</strong> the mazes.<strong>The</strong>y are lost <strong>an</strong>d then they c<strong>an</strong>’t come out <strong>an</strong>d take the body. <strong>The</strong>yare simply lost in the mind. <strong>The</strong> old hag gives her slippers! Slippers areimport<strong>an</strong>t triggers or cues <strong>to</strong> go places internally. She is given a horsey<strong>an</strong>d <strong>to</strong>ld she loves it. “Take back the child you have s<strong>to</strong>len.” A ferriswheel is shown. (Carrousels were used greatly in programming.) <strong>The</strong>nshe breaks <strong>an</strong> hour glass. Hour glasses are internal clocks. <strong>The</strong>n sheencounters levels, doors <strong>an</strong>d tunnels. An Iron robot representing Thorcomes out <strong>an</strong>d b<strong>an</strong>gs b<strong>an</strong>gs b<strong>an</strong>gs. <strong>The</strong> b<strong>an</strong>ging is the split brainheadaches that the internal Thor causes the victim’s mind <strong>to</strong>experience. A child is placed in<strong>to</strong> the robot. Often during theprogramming, child alters are programmed <strong>to</strong> put on a robot like suit<strong>an</strong>d serve with other children as clone solders in a clone army. (<strong>The</strong> seadivers of the Walt Disney movie “20,000 Leagues Under the Sea” wereused <strong>to</strong> program child alters in<strong>to</strong> how they were <strong>to</strong> get in<strong>to</strong> robot suits.)<strong>The</strong>se child alters form armies that attack if <strong>an</strong> alter tries <strong>to</strong> fight theprogramming. <strong>The</strong>se children alters are like children screaming--it isimpossible <strong>to</strong> reason or talk <strong>to</strong> them. Armies of these alters are difficult<strong>to</strong> s<strong>to</strong>p in the mind. In the programming, the brave are <strong>to</strong>ld they arebrave <strong>an</strong>d vice-versa. <strong>The</strong> character says “I have no courage.” But is<strong>to</strong>ld “You are a m<strong>an</strong> of courage.” More clocks <strong>an</strong>d a bell appears. Ared <strong>an</strong>d blue guardi<strong>an</strong> appear. Perhaps these colors represent thecolor programming. Rocks <strong>an</strong>d c<strong>an</strong>nons represent the protec<strong>to</strong>rs <strong>an</strong>dthe earthquakes they cause internally in a Monarch’s mind. When sheenters the castle it is a carbon copy of Esher’s drawing entitled“Relativity.” (See <strong>The</strong> Graphic Work of MC. Esher, figure 67.) She runs upstairs <strong>an</strong>d gets nowhere. Escher’s drawing, according <strong>to</strong> exprogrammers,are used for programming. <strong>The</strong> Master sings, “EverythingI’ve done, I’ve done for you.” David appears everywhere from every<strong>an</strong>gle. This is how the internal programmers, which are clones of thereal programmers appear everywhere in the mind of the slave. Hesings, “Just as I c<strong>an</strong> be so cruel...look without your heart beat. ..I mustlive within you.”She says, “Give me the child [the core]” <strong>an</strong>d the programmer says, “I343


have been generous. ..but I c<strong>an</strong> be so cruel .... I have reorderedtime...turned the world upside down...all for you.” <strong>The</strong> internal <strong>an</strong>dexternal programmers c<strong>an</strong> be cruel. <strong>The</strong> victim is trauma bonded <strong>to</strong>them. <strong>The</strong>y are cruel <strong>an</strong>d kind <strong>to</strong> the victim, just like Mengele was <strong>to</strong> histhous<strong>an</strong>ds of victims. <strong>The</strong> internal worlds c<strong>an</strong> be turned in a Monarchsystem, by turning the hour glasses which are on X, Y <strong>an</strong>d Z axes.<strong>The</strong> hour glasses are turned with h<strong>an</strong>d signals <strong>an</strong>d codes that are similar<strong>to</strong> what pilots use <strong>to</strong> tell their degree positions in the sky. <strong>The</strong>programmer sings, “I ask for so little, just let me rule you, <strong>an</strong>d you c<strong>an</strong>have everything you w<strong>an</strong>t...just love me, fear me, <strong>an</strong>d do as I say.” Hetells her that her kingdom is great. Internally alters are given great titles,<strong>an</strong>d are made queens, etc. <strong>The</strong>ir internal worlds give them all theyneed, <strong>an</strong>d that the real external world will never underst<strong>an</strong>d them. Sheis <strong>to</strong>ld repeatedly “Your kingdom is great.” “Bow down <strong>an</strong>d worshipme, <strong>an</strong>d you get everything.” At this point she realizes she hasdominion over the demons. When one listens <strong>to</strong> the programming, itseems that it is powerful <strong>an</strong>d in control. <strong>The</strong> movie does a good job ofshowing how a slave’s mind has both <strong>an</strong> internal <strong>an</strong>d <strong>an</strong> externalworld. A hall appears with daisies. Daisies were used in programming.When she leaves the internal world, she finds that the internal world isright there with her in her external world. She is surrounded by internalcues. <strong>The</strong>n she embraces <strong>an</strong>d accepts her internal world <strong>to</strong>ward theending of the movie. M<strong>an</strong>y systems have <strong>an</strong> owl in their system whichrepresents the master. In the movie, <strong>an</strong> owl representing the masterappears at various times & then flies away at the end. Toward the endthe Master sings, “Power of Voodoo...” <strong>The</strong> internal world is full ofgoblins, dwarfs, worms, a hat, door knockers, Fury 1,2,3,4,5 <strong>an</strong>d m<strong>an</strong>yother things. Ravens are in the movie. In real life, the programmers takealter fragments, which are splits which are not developed in<strong>to</strong> fullblown personalities <strong>an</strong>d they program them <strong>to</strong> have a single task, forinst<strong>an</strong>ce <strong>to</strong> think they are a raven <strong>an</strong>d <strong>to</strong> bite the body when ever theytake the body. Whole flocks of demons which take the form of ravensmay wait inside the mind waiting for their release <strong>to</strong> bite the body.When triggered by the internal programmers when <strong>an</strong> alter crosses theboundaries set down by the programming, a flock of ravens maycome forward <strong>an</strong>d “take the body” (as they say in MPD) of the slave<strong>an</strong>d the Monarch slave will bite his or her flesh <strong>an</strong>d viciously tear it withits teeth. By watching the movie Labyrinth, <strong>an</strong>d using this as a guide,the viewer will begin <strong>to</strong> underst<strong>an</strong>d the horror <strong>an</strong>d control that theinternal world holds over the alters of a Monarch slave. Few Monarchslaves ever tell other people what is going on in their minds, now youhave been privileged <strong>to</strong> find out. To learn this much for a Monarchslave comes with a high price. <strong>The</strong> price is paid by reliving for a secondtime what has been done <strong>to</strong> them, fighting off the suicide programsthat click on when the slave’s mind disobeys. <strong>The</strong> slave must also figh<strong>to</strong>ff <strong>to</strong>rture memories that recycle. <strong>The</strong>se <strong>to</strong>rture memories areactivated by the programming when <strong>an</strong> alter disobeys its344


programming. As one Monarch survivor described it <strong>to</strong> me, “This all c<strong>an</strong>be wrapped up by defining it as the raping of the body, soul <strong>an</strong>dspirit.”THE STRUCTURING DONE IN MONARCHSTAR TREK & STAR WARS PROGRAMMING<strong>The</strong> original Monarch programming often used the Wizard of Oz books<strong>an</strong>d film as the basic programming. <strong>The</strong> Alice <strong>an</strong>d Wonderl<strong>an</strong>d s<strong>to</strong>rythen was overlaid, along with m<strong>an</strong>y other fictional fairy tales <strong>to</strong>complete the <strong>Mind</strong> Control of a Monarch <strong>Mind</strong>-controlled slave.However, in recent years a superior s<strong>to</strong>ry line has appeared. It has moreflexibility <strong>an</strong>d more secrecy. This is the Star Trek series. In recent years,Star Trek is being used as a basis of programming. Those who areprogrammed with Star Trek programming c<strong>an</strong> attend <strong>an</strong>nual Star TrekConventions which are held in New York City since 1972. <strong>The</strong> child’smind is <strong>to</strong>rtured until the point they will accept <strong>an</strong>ything. <strong>The</strong>y are <strong>to</strong>ld<strong>to</strong> build certain structures in their mind. <strong>The</strong>se structures may be castles,or rivers or submarines or airfields, etc. In the case of Star Trekprogramming they have detailed maps <strong>an</strong>d diagrams that have beencreated <strong>to</strong> go along with the Star Trek program. (<strong>The</strong> real reason or theulterior motive of these Star Trek maps was <strong>to</strong> create a blueprint forprogramming. Some pages of these are included for you <strong>to</strong> look at.)<strong>The</strong>n particular alters are placed within these structures, <strong>an</strong>d they arehypnotically given cues that will pull them <strong>to</strong> the front of the mindwhen the alpha-numeric cue is said. M<strong>an</strong>y of the more secret altersc<strong>an</strong> only be accessed by a combination of several different cueswhich go <strong>to</strong> different senses--such as the person must be in a cornercontacting 3 points, a certain ring must be turned & a certain codesaid for the alter <strong>to</strong> come forth. <strong>The</strong> adv<strong>an</strong>tages of the Star Trek s<strong>to</strong>ryline is that a. almost <strong>an</strong>y type of scenario c<strong>an</strong> be fit in<strong>to</strong> theprogramming script because the Star Trek characters in the series,encounter about <strong>an</strong>ything imaginable, b. have holograms, which c<strong>an</strong>serve as substitutes for mirror images in the programming, c. alienprogramming c<strong>an</strong> be introduced in order <strong>to</strong> promote the mock alieninvasion being pl<strong>an</strong>ned by the <strong>Illuminati</strong>, <strong>an</strong>d d. the Star Trek series hasits own l<strong>an</strong>guage which c<strong>an</strong> be used for trigger codes, which Monarchslaves c<strong>an</strong> study, <strong>an</strong>d learn. <strong>The</strong> use of this klingon l<strong>an</strong>guage will makeit very difficult for ordinary people <strong>to</strong> break in<strong>to</strong> the slave’sprogramming. Michael Aquino, Sat<strong>an</strong>ist <strong>an</strong>d Colonel in the U.S. army,has enjoyed using Star Wars for programming. Aquino wrote his ownversion ofthe Star Wars, which he uses for programming. <strong>The</strong> programmerbecomes Darth Vader, which then is reproduced as <strong>an</strong> alter within thevictim. In the Star Trek series, Data was a dehum<strong>an</strong>ized “person” whos<strong>to</strong>red vast amounts of information. Monarch slaves are always345


created with libraries, <strong>an</strong>d volumes of information. This information iss<strong>to</strong>red in various ways <strong>an</strong>d c<strong>an</strong> be retrieved in a variety of ways. Dataof Star Trek lends himself <strong>to</strong> become the model for <strong>an</strong> alter of aMonarch system <strong>to</strong> copy. In other words the child is shown Data, <strong>an</strong>d issteered in the right direction <strong>to</strong> create <strong>an</strong> internal person named Data.Any child if it is drugged, <strong>to</strong>rtured, threatened with death if they don’tfollow directions, with weakened <strong>an</strong>d confused minds will get <strong>to</strong> thepoint where the child will create a Data alter in its mind, rather th<strong>an</strong>die. Once in place, the Data alter will think of itself as the moviecharacter. Every time the child sees Star Trek or pictures of Data, it willreinforce the programming. <strong>The</strong> tr<strong>an</strong>sformer room technique ofbeaming in Star Trek is what magici<strong>an</strong>s have tried <strong>to</strong> do for centuries<strong>an</strong>d which has been called “bi-location-physical projection” as well asother things. This is said in magic <strong>to</strong> be mental control over themolecules of the body via demonic power. Whether magici<strong>an</strong>s haveever done this, who knows, some certainly claim the power. <strong>The</strong>Illuminist is a power structure placed in<strong>to</strong> some Monarch slaves. It isconstructed from parts of numerous demons, rather like a demonicFr<strong>an</strong>kenstein, & is portrayed in Star Trek, the Next Gener. as thecrystalline body. A car<strong>to</strong>on series was created for Star Trek. In this series,children watch such things as Kirk in a magical universe of Megas-tuwhich has a Guardi<strong>an</strong> of Forever. Two other spin-out shows were DeepSpace Nine <strong>an</strong>d S.T. Voyager. In other words, a child could watch 5different Star Trek series. If the child’s parents had cable T.V. the childbe virtually immersed in<strong>to</strong> the various Star Trek shows. Unfortunately,some of the children who have been programmed with this are doingexactly that.Fritz has personally worked with someone who has Star Trekprogramming. <strong>The</strong>y sit for hours <strong>an</strong>d immerse themselves <strong>to</strong>tally in<strong>to</strong> allkinds of Star Trek details. We have two Star Trek Technical M<strong>an</strong>uals.Fritz’s father is <strong>an</strong> engineer <strong>an</strong>d designed quite a few things. Fritz himselfhas worked as a m<strong>an</strong>ual/computer draftsperson for the FederalHighway Administration as well as for his father off <strong>an</strong>d on over theyears. Based on that experience, he realizes the enormous amount ofwork that went in<strong>to</strong> these Technical M<strong>an</strong>uals for the Star Trek series issimply mindboggling. One m<strong>an</strong>ual is 183 pages <strong>an</strong>d the other is in theneighborhood of 250 pages. <strong>The</strong> amount of engineering <strong>an</strong>d computerdrafting that went in<strong>to</strong> these m<strong>an</strong>uals is as<strong>to</strong>nishing. Why did someonego <strong>to</strong> such extremes? <strong>The</strong>se m<strong>an</strong>uals are as good as if NASA werepl<strong>an</strong>ning <strong>to</strong> build <strong>an</strong> Enterprise spaceship. <strong>The</strong> pl<strong>an</strong>s are done moreprofessionally th<strong>an</strong> engineering designs that we have seen groups likethe United Nations drawing up. Why did all this engineering, design <strong>an</strong>ddrafting happen for a fictional T.V. show? To create a book <strong>to</strong> sell? <strong>The</strong>books.. could hardly be best sellers. One originally sold for $13 U.S. <strong>an</strong>dthe other for $6.95. One reason so much work <strong>an</strong>d money was put in<strong>to</strong>these Technical M<strong>an</strong>uals is that they are used for programming helplessvictims of the Monarch <strong>Mind</strong>-Control.346


THE FOLLOWING ARE THE DESCRIPTIONS OF WHY THE EXHIBITS AREIMPORTANT TO THE PROGRAMMING. <strong>The</strong> Technical (or Training) M<strong>an</strong>ualpages are coded.Exhibit 1. Star Fleet Technical Order. (TM:379260-1) This page showcodes on the far left that are similar <strong>to</strong> the type of codes used inMonarch access codes. Alters are trained <strong>to</strong> take the body upon theproper access code. Also certain activities or programs c<strong>an</strong> betriggered by codes also.Exhibit 2. Uniform Color Code. (TM:379260-0) In creating a System withinthe slave’s mind, geometric shapes are used. Within these shapes <strong>an</strong>umber of worlds or universes will be created. <strong>The</strong>se worlds c<strong>an</strong> be 3-D.That me<strong>an</strong>s when building them in the child’s mind they c<strong>an</strong> haveheight, depth, <strong>an</strong>d width. One system which I have seen several timesin slaves has been a 13 x 13 x 13 cube. In order <strong>to</strong> give <strong>an</strong>otherdimension <strong>an</strong>d <strong>to</strong> give the programmers the ability <strong>to</strong> tie differentthings in different parts of the system <strong>to</strong>gether--the programmers usecolor coding. Each alter will receive a color code. I am familiar with thest<strong>an</strong>dard color coding program, <strong>an</strong>d how it is put in<strong>to</strong> the child’s mind.Dr. Green (Mengele) used a box of colored scarfs <strong>an</strong>d electroshock <strong>to</strong>program in the color coding in<strong>to</strong> victim’s mind. Besides alters, otherthings in the system may be color coded also. Let’s say as Programmerswe place hidden observers on each level, system or world. <strong>The</strong>n wec<strong>an</strong> tie those isolated alters <strong>to</strong>gether by color coding them the same.During the programming, computers are built in<strong>to</strong> the mind <strong>to</strong> operatethe programming, <strong>an</strong>d they send their signals according <strong>to</strong> colorcoding.Exhibit 3. MILKY WAY GALAXY MAP.(TM379260-2) This is just one of a number of maps that go with the StarTrek programming. During the programming (which is sophisticated<strong>to</strong>rture of all kinds backed up w/ drugs) the child’s mind will beencouraged <strong>to</strong> psychotically build worlds in his or her mind. <strong>The</strong>seworlds are built with vortexes, mine fields, <strong>an</strong>d in the case of Star Trekprogramming Radiation zones. If <strong>an</strong> alter would attempt <strong>to</strong> w<strong>an</strong>derfrom its assigned spot in the mind, it will run in<strong>to</strong> Radiation zones, walls,<strong>an</strong>d other barriers. <strong>The</strong>se zones are built in<strong>to</strong> the mind, <strong>to</strong> insure that themultiple personalities do not contact each other. Aliens <strong>an</strong>d hologramsprotect certain areas <strong>an</strong>d prevent personalities from freely movingaround in the mind. <strong>The</strong>se “aliens” are placed in<strong>to</strong> the victim’s mind byhigh level demonology--in other words they are not aliens--they aredemons which have been brought in by high level rituals.347


Exhibit 4. 4.1 COMPUTER SYSTEM (p.50) <strong>The</strong> first thing created are themultiple personalities. <strong>The</strong>n these personalities are placed in<strong>to</strong> astructured system. To operate that structured system <strong>an</strong>d <strong>to</strong> insurecompli<strong>an</strong>ce the Monarch programmer will put in what is calledOmega programming. Omega programming consists of computers,wiring, conduits <strong>an</strong>d cords. <strong>The</strong> most import<strong>an</strong>t part are the computers.<strong>The</strong>se computers contain the instructions, <strong>an</strong>d they are controlled byinternal programmers who may be alters or who may be high leveldemons. <strong>The</strong> aliens (demons) who are placed strategically in the mind<strong>to</strong> keep the Omega programming intact are put in by sophisticatedhigh level demonology. <strong>The</strong> high level demonology part of theprogramming is the most secret <strong>an</strong>d it is termed Gammaprogramming. This is a diagram which could be used <strong>to</strong> help build in<strong>to</strong>the child’s mind a computer. In the early programming, a little girl whilebeing <strong>to</strong>rtured would be shown a multi-roomed dollhouse. <strong>The</strong> roomswould each have a separate color. <strong>The</strong> rooms would be linked in thechild’s mind <strong>to</strong> computers. In other words--the dollhouse structure wasthe structure the computers used. In the Star Trek programming, themodern child simply is given a multi-roomed computer like the onedrawn.Exhibit 5. TM:379260-3 ENGINEERING MAIN BRIDGE SECTION. Variousmethods of communication <strong>an</strong>d travel within a Monarch system’s mindwill be built in. Various alters are allowed contact with other alters.Portals <strong>an</strong>d one-way mirrors or one-way windows are built in also. Inorder <strong>to</strong> teach <strong>an</strong> alter <strong>to</strong> come <strong>to</strong> the front of the mind, <strong>an</strong> airpl<strong>an</strong>etaking off on a runway might be used as a visual aid <strong>to</strong> teaching how<strong>to</strong> leave the alters cubicle in the mind <strong>an</strong>d come forward <strong>to</strong> take thebody. Various internal communication system’s c<strong>an</strong> be built in<strong>to</strong> theSystem. <strong>The</strong> training m<strong>an</strong>ual is full of m<strong>an</strong>y possible communication<strong>an</strong>d locomotion devices, <strong>an</strong>d this is just one of a whole number of itemsthat could be incorporated in<strong>to</strong> a Monarch child’s mind as it isprogrammed.Exhibit 6. pg. 82. UTILITIES. <strong>The</strong> brain stems are scarred on babies <strong>an</strong>dwhen the body rebuilds itself it overcompensates <strong>an</strong>d the brain gets <strong>an</strong>incredible memory. Monarch slaves with scarred brain stems arerunning the computer systems for the New World Order. If the slave hasa pho<strong>to</strong>graphic memory as m<strong>an</strong>y of them do, then a specific chart likethis utility chart could function as the blueprint for the mind when itcreates its power packs. Power packs, <strong>an</strong>d energy cells (sometimes putin like light bulbs) run the computers which are built in<strong>to</strong> the slave’smind. This is part of what is called the Omega programming.348


Exhibit 7. TM:379260-2 S.I.N.S. Base Datum. This is a coordinate system. Inthe early years the Monarch systems were built with 3 hour glasseseach spinning on a x,y, or z axis. <strong>The</strong> hour glasses could be turned <strong>an</strong>din so doing the entire system of alters could be turned. Let’s say that wehave a slave <strong>an</strong>d we have created great Christi<strong>an</strong> front alters. Now,we decide that the time has come <strong>to</strong> use the dark Sat<strong>an</strong>ic alters fulltime. Since the dark alters are hidden at the bot<strong>to</strong>m of the system, weneed <strong>to</strong> rotate the System 180 degrees so that the Sat<strong>an</strong>ic alters arenow on <strong>to</strong>p. Now the Sat<strong>an</strong>ic alters will receive extra energy <strong>to</strong> be outholding the body full time. This SINS Base Datum is a way of making acoordinate system for a Monarch System. Certain codes would then begiven the System <strong>to</strong> make a shift when the h<strong>an</strong>dler needs <strong>to</strong> turn aSystem.Exhibit 8. Click "Exhibit 8" <strong>to</strong> read a part of the article.Darth Vader cover of Warren Magazine, plus the next two pages. Thisfinal exhibit consists of not one but 3 pages which are the first 3 pagesof a article written by Michael Aquino. This article is Michael Aquino’sown version of Star Wars.349


It is this version that he wrote <strong>an</strong>d then used <strong>to</strong> program Monarch <strong>Mind</strong>-Controlled slaves. Actually <strong>to</strong> give credit where credit is due, <strong>an</strong> armycolonel (who has since moved <strong>to</strong> S<strong>an</strong>ta Fe, NM) at the Army’s WarCollege worked with Michael Aquino at designing mind-controlprogramming around the Star War’s script.350


CHAPTER 8.THE SCIENCE OF BODYMANIPULATION & PROGRAMMINGA. THE SCARRING OF THE BRAIN STEM.Early on it was discovered that the brain would overcompensate forscarring on the brain stem. This is a principle similar <strong>to</strong> weight lifting. Bytearing down the muscle fiber by overexertion, the body rebuilds themuscle stronger. By scarring the brain stem, it -was discovered thatgeniuses who had pho<strong>to</strong>graphic memories could be created. Brainstem scarring was used <strong>to</strong> create the whiz kids that the NWO needed<strong>to</strong> run their big computers. For inst<strong>an</strong>ce, the computers that just NASAalone uses require people who c<strong>an</strong> work in ALGOL, BASIC, COBOL,COBOL 74, MULTICS COBOL ver. 4.4, COBOL Cb.4, COBOL CP-6, BOL,EULOR, FLIP, FORAST, FORTRAN, HAL/S, Illiac 4, JASP, JOSS, JOVIAL,/LYAPAS, LISP, LISP 2, /MAP/, NuSpeak, PASCAL, PEARL, /PLACE/, PL/1,PL/1-APAREL, PLANIT, Praxis, SA Machine L<strong>an</strong>guage, SEMANOL, SNOBEL,UNIX, WANG, ZBIE. It takes a good memory <strong>to</strong> remember computerl<strong>an</strong>guages <strong>an</strong>d programming. <strong>The</strong>se whiz kids, who were bothprogrammed with Monarch programming <strong>an</strong>d had their brain stemsscarred c<strong>an</strong> be seen in some of the University computer departments<strong>an</strong>d the intelligence/military agencies’ computers rooms.For inst<strong>an</strong>ce, at Ft. Meade, the NSA has 2 buildings which contain acompletely self-sufficient intelligence operation. (<strong>The</strong> complex has itsown s<strong>to</strong>res, b<strong>an</strong>k, dry cle<strong>an</strong>ing, dentistry, barber shop, PX, hospital, aswell as the normal snackbars <strong>an</strong>d cafeteria that Federal buildings oftenhave.) This complex which is internally guarded by cameras watchingall the corridors, has several major computer rooms where whiz kids areemployed. Movement by these whiz kids, requires that they have theproper I.D. attached <strong>to</strong> them. <strong>The</strong> CIA which has had <strong>an</strong> ongoingproject <strong>to</strong> create them, has called them “Compu-kids.” Some of theeleva<strong>to</strong>rs are private <strong>an</strong>d operate only with the proper key. <strong>The</strong> NSA’scomputers participate in electronically watching the world. Anotherexample of where compu-kids (slaves with scarred brain stems) workon big computers (incl. a Beast computer) is at Area 51 (Dreaml<strong>an</strong>d),NV. <strong>The</strong> method of scarring the reticular formation of the brain stem isaccomplished electronically. <strong>The</strong> RNA piles up <strong>an</strong>d breaks thecontinuity of the signals coming through. Different people’s bodies areable <strong>to</strong> <strong>to</strong>lerate different levels of abuse. M<strong>an</strong>y of the brain stem351


scarring victims die, or end up with a pseudo-Multiple Sclerosis. M<strong>an</strong>ychildren are coming in<strong>to</strong> hospitals <strong>an</strong>d being misdiagnosed as havingMultiple Sclerosis when in fact they are damaged from programming<strong>an</strong>d brain stem scarring. If the victim is successfully given apho<strong>to</strong>graphic memory through their entire alter system due <strong>to</strong> brainstem scarring, then they are often programmed <strong>to</strong> see what are called“hieroglyphics” (that is the cover name) which is really just the‘Intergalactic L<strong>an</strong>guage” that NASA developed in the 1960s <strong>an</strong>d thenturned around <strong>an</strong>d used <strong>to</strong> program slaves with pho<strong>to</strong>graphicmemories. Under the cover of research projects like N67-3042 (17 p.3022) “L<strong>an</strong>guage structure <strong>an</strong>d message decoding for interpl<strong>an</strong>etarydecoding.” in 1967 <strong>an</strong>d N65-32284 20-3414 in 1965 entitled “Symbolscience for communication l<strong>an</strong>guage of hum<strong>an</strong>s, <strong>an</strong>imals, <strong>an</strong>din<strong>an</strong>imate objects --application <strong>to</strong> mathematics, cybernetics, <strong>an</strong>dau<strong>to</strong>mation.” <strong>The</strong> actual study no. or no.s for the IntergalacticL<strong>an</strong>guage is not known, but they should appear somewhere in thevoluminous scientific <strong>an</strong>d Technical Aerospace Reports that NASA putsout each year. <strong>The</strong> script of this l<strong>an</strong>guage was shown in the beginningcredits of the str<strong>an</strong>ge movie Lawnmower M<strong>an</strong>. Some of the symbolsare similar <strong>to</strong> Ascii Computer l<strong>an</strong>guage (which is a l<strong>an</strong>guage thatinterfaces with m<strong>an</strong>y other computer l<strong>an</strong>guages, so that one l<strong>an</strong>guagec<strong>an</strong> be tr<strong>an</strong>slated in<strong>to</strong> <strong>an</strong>other l<strong>an</strong>guage.) <strong>The</strong> Monarch slaves are <strong>to</strong>ldthat this is <strong>an</strong> alien l<strong>an</strong>guage.THIS IS THE WAY THE SCRIPT OF THE INTERGALACTIC LANGUAGE LOOKSAnother method that has also been used <strong>to</strong> enh<strong>an</strong>ce memory ishypnosis. Estabrooks was able in the 1930s <strong>to</strong> create Multiplepersonalities via hypnosis <strong>an</strong>d get incredible mental featsaccomplished by those parts which were asked under hypnosis <strong>to</strong>352


have pho<strong>to</strong>graphic memories. Still <strong>an</strong>other method is <strong>to</strong> place smalltr<strong>an</strong>sceivers in<strong>to</strong> the head or body of the person. <strong>The</strong>se impl<strong>an</strong>ts havebeen attached in the neck or other places, <strong>an</strong>d have beenconnected <strong>to</strong> various parts of the brain. <strong>The</strong>y have literally createdwhat the movies called “terminal m<strong>an</strong>.” This has allowed specialintelligence agents <strong>to</strong> be linked <strong>to</strong> large computers. <strong>The</strong> intelligenceasset c<strong>an</strong> get continuous information on <strong>an</strong>ything the intelligenceagencies have m<strong>an</strong>aged <strong>to</strong> get in<strong>to</strong> their large computers. Brainimpl<strong>an</strong>ts c<strong>an</strong> down load incredible amounts of information <strong>to</strong> thebrain, however, the ability <strong>to</strong> use this information wisely is still a skill.Having a library of information available doesn’t necessarily me<strong>an</strong> aperson is wiser. For more on slave-computer interfacing see the indexfor information on ALEX, Amalgamated Logarithmic EncryptedTr<strong>an</strong>smissions, <strong>an</strong>d UNIX systems which are used <strong>to</strong> tie the Monarch<strong>Mind</strong> <strong>to</strong> computers. Drugs <strong>an</strong>d <strong>to</strong>rture are also used <strong>to</strong> enh<strong>an</strong>cememory. Brain stem scarring is not the only method <strong>to</strong> enh<strong>an</strong>cememory, but it has been a “highly successful” (if one doesn’t count allthe ruined lives when it’s failed) good method. MPD also naturallyincreases the brain’s functioning several fold, <strong>an</strong>d c<strong>an</strong> help givepho<strong>to</strong>graphic memories. In review, drugs, <strong>to</strong>rture, hypnosis <strong>an</strong>d MPD allwork <strong>to</strong> enh<strong>an</strong>ce memory. Most slaves have some pho<strong>to</strong>graphicmemory capability. <strong>The</strong> most serious form of memory enh<strong>an</strong>cement isbrain stem scarring, which produces a strong system-widepho<strong>to</strong>graphic memory.B. SPLIT BRAIN WORK<strong>The</strong> brain is “bicameral” or two-sided. <strong>The</strong> two-sides (calledhemispheres) communicate via a superpowerful connec<strong>to</strong>r called thecorpus callosum. <strong>The</strong> left hemisphere is specialized in verbal-linguistictr<strong>an</strong>sduction of speech <strong>an</strong>d <strong>an</strong>alytical thinking (logic, math, cause &effect, l<strong>an</strong>guage, & sequential thinking). <strong>The</strong> right side plays more of arole in holistic-metaphorical information tr<strong>an</strong>sduction such as imagery(art, d<strong>an</strong>ce, intuition, subjective, spont<strong>an</strong>eous, holistic, & dreamimagery). <strong>The</strong> primary role of creating imagery is carried out by theright side. Roger Sperry, a neuroscientist won a Nobel Prize for feedinginformation <strong>to</strong> only one side of the brain, <strong>an</strong>d also for feedingsimult<strong>an</strong>eously both sides of the brain different information. His resultsshowed that the two hemispheres could operate separately at thesame time. We hate <strong>to</strong> rewrite his<strong>to</strong>ry, but the work that won Sperry aNobel Prize was being done <strong>to</strong> unwilling hum<strong>an</strong> victims before hispublicly known experiments. Sperry’s research left people wondering ifit wasn’t possible <strong>to</strong> have one personality located in one hemisphere,<strong>an</strong>d <strong>an</strong>other person in the other. Psychologist Juli<strong>an</strong> Jaynes wrote abook arguing that m<strong>an</strong>kind used <strong>to</strong> have two personalities before the353


two hemispheres evolved <strong>an</strong> ability <strong>to</strong> integrate. (His book is <strong>The</strong> Originof Consciousness in the Breakdown of the Bicameral <strong>Mind</strong>.) Before thepublic had heard about the ability of the two hemispheres <strong>to</strong> workindependently, the <strong>Illuminati</strong> <strong>an</strong>d MK-Ultra programmers were carryingout split brain programming, by two methods, 1. shutting down oneside <strong>an</strong>d communicating only with one side of the brain, <strong>an</strong>d 2. bysimult<strong>an</strong>eously feeding different information <strong>to</strong> each hemisphere. This isoften down by the victim being locked in place with their eyes forcedopen, <strong>an</strong>d different movies shown simult<strong>an</strong>eously <strong>to</strong> both eyes. Thiscreates a form of split brain programming. High speed films will beshown with one hemisphere receiving horror scenes <strong>an</strong>d the othergetting family settings. This makes the two hemispheres work separately<strong>an</strong>d the victim feel crazy. <strong>The</strong> mind feels ripped apart. One hemisphereis trying <strong>to</strong> dissociate <strong>an</strong>d is having a miserable experience, while theother side is experiencing something just the opposite. When highspeed films are shown for split brain programming, the films are shownin 5 minute increments. Front alters may be shown good films <strong>to</strong> makethem believe they live in a perfect world with a good family life. Rightside sat<strong>an</strong>ic alters may receive horror films shown via the left eye. <strong>The</strong>right side of the brain doesn’t verbalize well, so this is one reason slaveshave emotions without the ability <strong>to</strong> verbalize. A possible third methodis <strong>to</strong> use drugs that block the two hemispheres from communicating. Afourth method in split brain work is <strong>to</strong> speak in<strong>to</strong> the left ear while givingthe right ear confusing noise. This last method is sometimes done <strong>to</strong>force alters <strong>to</strong> concentrate when learning scripts. <strong>The</strong> split brainprogramming done by the <strong>Illuminati</strong> is grotesque. A drug is injected atthe base of the skull in<strong>to</strong> one hemisphere of the brain <strong>to</strong> shut it down,while the other hemisphere is kept awake. Torture is then carried out <strong>to</strong>split the mind. What this does is create programs <strong>an</strong>d alters which areassociated with only half of the brain. <strong>The</strong> brain is being further dividedfrom itself. Work is done by the Programmers <strong>to</strong> develop the thinking ofalters from one side of the brain <strong>to</strong> think differently from those of theother side. Split brain programming is not just hypnosis, as some havebeen led <strong>to</strong> believe. Split brain programming provides theProgrammers one way <strong>to</strong> keep the left h<strong>an</strong>d from knowing what theright h<strong>an</strong>d is doing. It also gives them the ability <strong>to</strong> put in bodyprograms or memories which effect only half of the victim’s body.When one hemisphere is dominating in what the brain is doing, theopposite nostril will open <strong>an</strong>d take in air. When the right hemisphere isdoing most of the thinking, the left nostril will be doing most of thebreathing. Voluntary ch<strong>an</strong>ges in nostril breathing c<strong>an</strong> help shift thecenter of brain activity from one side of the brain <strong>to</strong> the other. When aperson lays on his side, the downward side hemisphere will beactivated, because the <strong>to</strong>p nostril will breath best. <strong>The</strong> control of nasalbreathing has been part of the Yogi’s art <strong>to</strong> achieve samadhi. <strong>The</strong>distinctions between the two hemispheres or two brains are used by354


the occult world. Moriah values the intuitiveness of the righthemisphere. As one <strong>Illuminati</strong> mind-control programmer said, “It’s theright brain that has <strong>an</strong> inbuilt propensity for accessing timelessness.<strong>The</strong>re is bound <strong>to</strong> be some unconscious prompting therefore that alertsus <strong>to</strong> the imminence of forthcoming disaster, that is, if we aresufficiently sensitive <strong>to</strong> its message....unless we have the wisdom, thesoul age, <strong>to</strong> affect the use of those additional facilities (<strong>to</strong> access rightbrain knowledge) we will find our intelligence sadly limited <strong>to</strong> the leftbrain logic of the material world.” While this book is not about occultphilosophy, occult philosophy is part of the motivation behind some ofthe split brain work. In order for the <strong>Illuminati</strong> <strong>to</strong> create alters which arehighly intuitive <strong>an</strong>d which are able <strong>to</strong> access the higher demonicspheres, they need <strong>to</strong> shut down the logic hemisphere. When the lefthemisphere is shut down, then the right brain (which controls the lefth<strong>an</strong>d <strong>an</strong>d left side of the body, i.e. the left h<strong>an</strong>d path) is able <strong>to</strong>function without competition. <strong>The</strong> victim must be able <strong>to</strong> get in <strong>to</strong>uchfully with his or her intuitive side <strong>to</strong> go in<strong>to</strong> the “spiritual dimensions”where demons exist. This is very nasty work, because this split brain workinvolves high level demonology. Most of the deeper <strong>Illuminati</strong> alters areright brain alters so that they will be very spiritually intuitive. <strong>The</strong> LesserKey of Solomon is <strong>an</strong> import<strong>an</strong>t teaching book of the <strong>Illuminati</strong>. It states,“An adept enters <strong>an</strong> abnormal pl<strong>an</strong>e <strong>an</strong>d equips himself <strong>to</strong> ‘charge’with magical energy the pentacle <strong>an</strong>d talism<strong>an</strong>s.” <strong>The</strong> training that thistakes is called “training of the higher will” <strong>an</strong>d split brain programmingis part of how it is accomplished.C. MEDICAL TECHNOLOGIESMedical science has been probing the gray matter that makes up thehum<strong>an</strong> brain for several hundred years <strong>an</strong>d they continue <strong>to</strong> probe it.With the use of various new techniques they c<strong>an</strong> look inside the hum<strong>an</strong>brain in ways that were not available before. An enzyme calledhorseradish peroxidase (HRP) which serves as a marker or highlighterallows brain researchers <strong>to</strong> visually look at brain cells on functioningbrains. Researchers such as Fr<strong>an</strong>k Putnam, at the National Institute ofMental Health, have taken PET sc<strong>an</strong>s of the brains of people withmultiple personalities, whose brain sc<strong>an</strong>s from one alter personality <strong>to</strong><strong>an</strong>other are very different. This doesn’t occur in non-multiple peoplewho pretend <strong>to</strong> have different personalities. <strong>The</strong> brain sc<strong>an</strong>s haveshown that brains with multiple personalities are physically differentth<strong>an</strong> other people’s brains. <strong>The</strong> different personalities are often indifferent neurophysiological states. Medical science has helped theprogrammers put people in<strong>to</strong> different neurophysiological states forprogramming. Some of these states are d<strong>an</strong>gerous unless trainedmedical personnel are available <strong>to</strong> insure the victim doesn’t die.355


Which, according <strong>to</strong> ex-Programmers, does happen <strong>an</strong>yway. Medicalscience has identified glutamate which is <strong>an</strong> amino acid as <strong>an</strong>import<strong>an</strong>t neurotr<strong>an</strong>smitter involved with memory s<strong>to</strong>rage. However,after countless tests <strong>an</strong>d all types of research, we still do not knowcompletely how the brain s<strong>to</strong>res memory. However, the NWO’sNetwork underst<strong>an</strong>ds far more th<strong>an</strong> they have let the public learn.HAVING SKILLED MEDICAL! LAB TECHNICIANSHaving the medical know how doesn’t get the job done in itself.Obviously, the Network has needed <strong>to</strong> have both hospitals <strong>an</strong>d trainedmedical personnel. Having skilled workers is part of the success of theMonarch Programming. For inst<strong>an</strong>ce, the simple interpretation of AlphaBFT instruments, requires that the opera<strong>to</strong>r be able <strong>to</strong> underst<strong>an</strong>d whatis background interference. Everywhere the instrument is located thereis going <strong>to</strong> be some amount of background interference. Only thegood opera<strong>to</strong>rs c<strong>an</strong> realize when a pseudo-alpha wave has beenproduced, perhaps from the child sweating in the location of theelectrode, or hair movements, or eye blinks or twitching. <strong>The</strong> <strong>Illuminati</strong>has their own midwifery training program, which will take teenageMonarch slaves <strong>an</strong>d train them. <strong>The</strong>y also begin training their people inprogramming <strong>an</strong>d observation from inf<strong>an</strong>cy up. By the time they are<strong>an</strong> adult, the programming alters know programming as secondnature. <strong>The</strong>y have no shortages of doc<strong>to</strong>rs, nurses, psychiatrists, <strong>an</strong>dother well educated people. If they have <strong>to</strong> save <strong>an</strong> import<strong>an</strong>tMonarch slave, they may fly in a specialist from wherever the rightspecialist is. When it comes <strong>to</strong> research, some of it done byprofessionals who don’t realize how their research is going <strong>to</strong> be used.M<strong>an</strong>y researchers are great on seeing detail, but not the biggerpicture. <strong>The</strong>y usually don’t realize how their research is going <strong>to</strong> bemisused, <strong>an</strong>d are very gullible people. <strong>The</strong> CIA finds that the researcheris quick <strong>to</strong> justify in his or her mind the moral value of the research theyare doing. M<strong>an</strong>y members of the <strong>Illuminati</strong> are involved in secretgenetic research. Having control over numerous big hospitals, is <strong>an</strong>import<strong>an</strong>t link in the ability of the Network <strong>to</strong> program so m<strong>an</strong>y peoplesuccessfully. Medical personnel are participating in acts that helpmind-control. One Christi<strong>an</strong> nurse quit the University Hospital here,because newborns are secretly being given impl<strong>an</strong>ts. A few years ago,it was discovered that <strong>The</strong> Upjohn, <strong>an</strong> Americ<strong>an</strong> multinationalcomp<strong>an</strong>y was involved in placing radiotr<strong>an</strong>smitting material in withtheir liquid cortisone preparation Depomedrone, which created <strong>an</strong>impl<strong>an</strong>t when medical personnel put Depomedrone in<strong>to</strong> their patients.356


D. HISTAMINESHistamine is a chemical (a particular molecule) which the body uses <strong>to</strong>defend against alien cells. It also has the ability <strong>to</strong> lower blood pressure<strong>an</strong>d <strong>to</strong> flare up the skin.<strong>The</strong> audi<strong>to</strong>ry sense c<strong>an</strong> effect histamine production via programming.Histamine is a molecule which is part of the immune system. Ch<strong>an</strong>ges inhistamine levels effect moles. It effects skin ch<strong>an</strong>ges in scars. This is howthe abusers c<strong>an</strong> magically make scars appear <strong>an</strong>d disappear, whichmakes the programming seem even more real <strong>to</strong> alters. <strong>The</strong> abuserslike <strong>to</strong> create invisible scars that form patterns <strong>an</strong>d pictures. <strong>The</strong> mostpopular is the Baphomet head (which st<strong>an</strong>ds for Sat<strong>an</strong>). Uponcomm<strong>an</strong>d they c<strong>an</strong> trigger the skin <strong>to</strong> make these scars visible. If onepricks someone’s skin with a needle having histamine on the tip, it willcause the skin <strong>to</strong> flare up red. Biofeedback has allowed people <strong>to</strong>mentally talk <strong>to</strong> their skin. Hypnosis has controlled people’s immunesystem. States of mind effect the immune system. Somehow acombination of these is used <strong>to</strong> allow the h<strong>an</strong>dler upon comm<strong>an</strong>d <strong>to</strong>trigger the correct state of mind within the victim <strong>to</strong> increase histamineproduction within the skin area. <strong>The</strong> bone marrow of the bodyproduces stem cells. <strong>The</strong> stem cells are capable of growing in<strong>to</strong> m<strong>an</strong>ydifferent types of cells. First the stem cells grow in<strong>to</strong> some basic differentcells <strong>an</strong>d those in turn grow some more <strong>an</strong>d further differentiate. Forinst<strong>an</strong>ce, a stem cell c<strong>an</strong> become a myeloid, which c<strong>an</strong> become apolymorpho nuclear gr<strong>an</strong>ulocyte which in turn c<strong>an</strong> become a basophilor mast cell. Both basophils <strong>an</strong>d mast cells are leukocytes <strong>an</strong>d they arepart of the body’s immune system. Both basophils <strong>an</strong>d mast cells arecarriers of histamine. Histamine does several things in the body.Histamine causes dilation of blood vessels, <strong>an</strong>d it allows blood vessels <strong>to</strong>become permeable (leaky so <strong>to</strong> speak) which allows other chemicals<strong>an</strong>d fluid <strong>to</strong> go through the blood vessels in<strong>to</strong> the area between cells<strong>an</strong>d tissues. All CNS (Central Nervous System) cells of the body haverecep<strong>to</strong>rs that the histamine c<strong>an</strong> attach itself <strong>to</strong> like a ship docking.When cells are damaged, or alien cells enter the body, the basophils<strong>an</strong>d mast cells release their histamine. For the body <strong>to</strong> have morehistamine, it must increase the number of basophils <strong>an</strong>d mast cells. Thisc<strong>an</strong> be accomplished by ch<strong>an</strong>ging the ratio of stem cells that developin<strong>to</strong> other types of cells. <strong>The</strong> core of the histamine molecule is <strong>an</strong>ethylamine. Antihistamines are molecules that resemble histaminesenough that they c<strong>an</strong> attach themselves <strong>to</strong> the histamine recep<strong>to</strong>rs onregular cells <strong>an</strong>d prevent the histamine molecules from attaching. If thehistamine molecules don’t attach, the body disposes of them. <strong>The</strong>point being that histamine remains in the skin only so long before thebody disposes of it. Histamine levels in the body c<strong>an</strong> raise IF the cellswhich carry the histamine are increased.357


THIS IS THE STRUCTURE OF A HISTAMINE MOLECULEIt is believed that breast impl<strong>an</strong>ts have some kind of effect on raisinghistamine production levels in the body. Whether these breast impl<strong>an</strong>tsare identical <strong>to</strong> what all breast impl<strong>an</strong>ts are, or whether they havesomething special <strong>to</strong> agitate the body in<strong>to</strong> higher immune cells’production of the mast cell & basophils type is not known. However,there seems <strong>to</strong> be some relationship between the Network’s need <strong>to</strong>raise histamine production in their slaves, <strong>an</strong>d the breast impl<strong>an</strong>ts thatthey are putting in them. Putting the pieces <strong>to</strong>gether leads one <strong>to</strong>believe that the impl<strong>an</strong>ts agitate the body’s immune system in<strong>to</strong> raisingthe level of its histamine carrying cells. A number of women who havegotten impl<strong>an</strong>ts speak about <strong>an</strong> increase in allergies. <strong>The</strong> allergicreaction is caused by high levels of histamine. Whether this happens <strong>to</strong>some or m<strong>an</strong>y it not known at the time this is written. <strong>The</strong> three big<strong>Illuminati</strong> chemical comp<strong>an</strong>ies are I.G. Farben, DuPont, <strong>an</strong>d DowChemical. Dow Chemical beg<strong>an</strong> research with impl<strong>an</strong>ting silicon in1956. After 35 years of studies in which they impl<strong>an</strong>ted thous<strong>an</strong>ds ofvarious <strong>an</strong>imals with silicon, the comp<strong>an</strong>y knew exactly what siliconwould do in the hum<strong>an</strong> body. <strong>The</strong> FDA had public hearings in 1992where internal documents of the Dow Chemical Co. were releasedwhich showed that the comp<strong>an</strong>y knew all along that their breastimpl<strong>an</strong>ts were very d<strong>an</strong>gerous, years before they put them on themarket. <strong>The</strong>re is <strong>an</strong> incredible search going on for a <strong>an</strong>ti-silicon<strong>an</strong>tibody so that they c<strong>an</strong> cle<strong>an</strong> up the mess they have created inmillions of people who have silicon impl<strong>an</strong>ts. <strong>The</strong> immediate chest wall<strong>an</strong>d area around the breast impl<strong>an</strong>t gets highly agitated. <strong>The</strong> siliconleaks through the membr<strong>an</strong>e, <strong>an</strong>d then causes great difficulties in thebody. M<strong>an</strong>y of the female Monarch slaves have received breastimpl<strong>an</strong>ts.358


E. BODY PROGRAMSResearchers have come along way <strong>to</strong>ward underst<strong>an</strong>ding the mind.<strong>The</strong>y have discovered, for inst<strong>an</strong>ce, that under stress the brain willconvert nerve signals in<strong>to</strong> “messenger molecules” who then in turndirect the endocrine system <strong>to</strong> produce steroid hormones, that c<strong>an</strong>reach the nucleus of various cells <strong>an</strong>d cause them <strong>to</strong> ch<strong>an</strong>ge how thebody’s genes are written out. <strong>The</strong>se genes will then direct the cells as <strong>to</strong>how <strong>to</strong> make a variety of molecules which are used in growth,metabolism, sexuality, <strong>an</strong>d the immune systems. In other words, themind c<strong>an</strong> rewrite genetics. This was the secret that helped get theMonarch program off <strong>to</strong> its scientific foundation. Now the actualmech<strong>an</strong>ics of this have been observed by researchers. One of theleaders in underst<strong>an</strong>ding the mind-body relationship was Fr<strong>an</strong>zAlex<strong>an</strong>der. Black was one of the researchers in<strong>to</strong> how hypnosis c<strong>an</strong> beused <strong>to</strong> regulate the body <strong>an</strong>d the body’s functions such as theimmune system. Ken Bowers also worked in this area. Dr. S.M. Lamber<strong>to</strong>f the Rockefeller Foundation studied how voodoo could cause deathby creating certain thoughts in the mind. Most of the research in thisarea was moni<strong>to</strong>red, if not sponsored by the Intelligence agenciesunder the auspices of the <strong>Illuminati</strong>. <strong>The</strong> Hypothalamus bridges themind <strong>an</strong>d the body. It works as part of the Limbic-hypothalamic system.This system is a determining center for what state of mind the brain isplace in. <strong>The</strong> immune system communicates directly with thehypothalamus part of the brain with its own “messenger molecules”known as “immunotr<strong>an</strong>smitters”. This then is mind-brain link that theMonarch programmers have taken so much adv<strong>an</strong>tage of. BarbaraBrown, a physiologist at Veter<strong>an</strong>’s Administration Hospital (inSepulveda) wrote a book New <strong>Mind</strong>, New Body. Barbara Brown’sresearch was government funded. Her book got the public interestedin biofeedback. Because of repeated success at getting patients <strong>to</strong>control such things as their heartbeat, Dr. Brown is convinced that aperson’s heart rate, breathing, muscle tension, gl<strong>an</strong>dular responses areall subject <strong>to</strong> a person’s will. Those who have worked with victims of U.S.government MK Ultra mind control know that what Dr. Brown writes iscorrect <strong>an</strong>d was known years before she published her book.Biofeedback is now required training in some prisons for some inmates.It is clear from the final results that Monarch slaves have programmingwhich c<strong>an</strong> carry out the following functions:Control the pulse rate <strong>an</strong>d heart beat,359


Control the body’s temperatureControl the temperature of individual body parts or sides of thebody--such as the right side of the body might get hot, <strong>an</strong>d the left sideof the body get ice cold. Fritz has observed this by <strong>to</strong>uching the left<strong>an</strong>d right sides of a victim who was burning hot on the right <strong>an</strong>d icecold on the left.<strong>The</strong> secretions of various enzymes <strong>an</strong>d histamine production hasbeen trained in<strong>to</strong> the victims <strong>an</strong>d attached <strong>to</strong> various body programs<strong>to</strong> keep the slave in line. Histamine production appears <strong>to</strong> be regulatedvia surgery carried out on women’s breast. It appears, but hasn’t beenconfirmed that the surgery where breast impl<strong>an</strong>ts are placed in<strong>to</strong>female Monarch slaves plays some role in histamine production &programmed control.Allow the body <strong>to</strong> pretend that it is dead, when actually it is in <strong>an</strong>altered state similar <strong>to</strong> being coma<strong>to</strong>se.<strong>The</strong> internal defenses consists in part of body programs that aretriggered if the <strong>Mind</strong>-controlled slave steps out of line. Here is a goodlist of some of these body programs: Audi<strong>to</strong>ry problems, a Bonedisorder, Blood flow/circulation, Coma (zombie death sleep whichmakes victim appear dead), Digestive failure, Headaches-split brain,Heart failure, Histamine production, Optic problems such as blindness,Respira<strong>to</strong>ry failure, Sleep deprivation, Sleeping program, <strong>an</strong>dTemperature ch<strong>an</strong>ge. Body programs will be put in across the boardfor all alters. <strong>The</strong> same code will work for all alters when the internalprogramming alters w<strong>an</strong>t <strong>to</strong> trigger a body program. If a bodyprogram is placed in<strong>to</strong> the slave it may be <strong>an</strong>chored <strong>to</strong> something,<strong>an</strong>d that might be something as drastic as the heartbeat. One of theprograms causes the victim <strong>to</strong> hear a heartbeat which is refrained intheir minds as the “heartbeat of Sat<strong>an</strong>.” Some of the body programsare carried out by creating <strong>an</strong> alter which has one mental state--suchas <strong>an</strong> alter fragment which is burning or one that was created by ice<strong>to</strong>rture. This alter or this feeling of being hot or cold is then attached <strong>to</strong>something in the mind. For inst<strong>an</strong>ce, if the victim moves <strong>to</strong>ward theworld, a cold alter or a cold feeling of a memory is hypnoticallyprogrammed <strong>to</strong> come up behind the alter holding the body.Sometimes the sensation of burning c<strong>an</strong> be eliminated by getting afirechild <strong>to</strong> back up from the front of the mind where <strong>an</strong>other alter isholding the body. M<strong>an</strong>y feelings, body sensations, <strong>an</strong>d drugged statesare attached <strong>to</strong> programs. When the alter hits a stringer, he will gothrough a series of memories, false memories, hypnotic comm<strong>an</strong>ds,<strong>an</strong>d body sensations that have been attached <strong>to</strong>gether in stringers.360


<strong>The</strong> stringer type of programming is often put in <strong>to</strong> set in a frontprogram which is <strong>to</strong> deceive <strong>an</strong> alter. <strong>The</strong> abilities of the hum<strong>an</strong> brain<strong>to</strong> control the body have been seriously underrated by people. Biofeedbackresearchers in the 1960s were surprised <strong>to</strong> find out that if asingle nerve cell’s activity is placed upon a screen so that the subjectc<strong>an</strong> see its activity graphed, the subject will be able <strong>to</strong> mentallyidentify that cell apart from <strong>an</strong>y other nerve fiber cell, <strong>an</strong>d will be able<strong>to</strong> have voluntary control over that single cell apart from <strong>an</strong>y other.Just <strong>to</strong> show how complex the body is, a single nerve fiber cell will have600 connections. This mental feat is simply mind-boggling forresearchers. <strong>The</strong> Mar. 5, 1972 L.A. Times reported that patients werebeing taught how <strong>to</strong> alter their heart rate without drugs. This hadalready been happening within the Monarch Programming. <strong>The</strong> heartis controlled by the mind <strong>an</strong>d works with the emotions of a person.<strong>The</strong>re have been people who have literally died from a “broken heart.”This is a his<strong>to</strong>rical fact. <strong>The</strong> Monarch programmers have long beentaking adv<strong>an</strong>tage of the mind’s ability <strong>to</strong> control the heart’s beating. Atiny little bit of tissue not really visible <strong>to</strong> the visible eye called the sinusnode, sends out electrical signals that regulate <strong>an</strong>d initiate heart beatsin <strong>an</strong> unbroken rhythm. <strong>The</strong> genetic code concerning the body’smetabolism <strong>an</strong>d the genetic code for the sinus node somehow get theentire heart beat genera<strong>to</strong>r mech<strong>an</strong>ism started. Two areas of the braincontrol the ch<strong>an</strong>ges in heart beats that the sinus node would make.<strong>The</strong> sinus node sends out the signals but it doesn’t ch<strong>an</strong>ge the rate. Avery primitive part of the brain stem is one of the control areas, <strong>an</strong>d theother control area along the spine. Both of these areas connect <strong>to</strong> thehigher thinking areas of the brain. <strong>The</strong> three most frequent events thatch<strong>an</strong>ge heart beat are emotions, sicknesses, <strong>an</strong>d muscle activity. Sincethe will influences emotions, the higher brain c<strong>an</strong> control the heartbeat <strong>an</strong>d its pulse. Alters are programmed so that they will tr<strong>an</strong>ce out if<strong>an</strong>yone tries <strong>to</strong> prove <strong>to</strong> them that they have a heart--which they havebeen programmed <strong>to</strong> believe was taken away from them by theprogrammer. <strong>The</strong> occult world learned this ability from the Indi<strong>an</strong> yogiswho have been controlling their hearts for centuries. Some have evenshown in the scientific labora<strong>to</strong>ry that they c<strong>an</strong> s<strong>to</strong>p their hearts for up<strong>to</strong> 30 seconds. (See Green of Menninger Foundation’s work.) <strong>The</strong> yogi’salso developed the skill of ch<strong>an</strong>ging their body temperatures. Forinst<strong>an</strong>ce, Swami Rama in the lab of Dr. Elmer Green could make oneside of his palm hot <strong>an</strong>d the other side of his palm cold simply bymental efforts. This type of body control was learned by the <strong>Illuminati</strong>years ago, <strong>an</strong>d has been applied <strong>to</strong> the Monarch programming <strong>to</strong>make the programming lies seem more real <strong>to</strong> the victim th<strong>an</strong> theoutside world. A Monarch slave c<strong>an</strong> get cold on the left side <strong>an</strong>d burnon the right side of his body. It has been well-documented that themind c<strong>an</strong> control the blood flow <strong>to</strong> various tissues <strong>an</strong>d in this waych<strong>an</strong>ge temperature in various different parts of the body. This was firstreported <strong>to</strong> the public in 1978 (Barabasz & McGeorge). It appears that361


a combination of yogi type bio-feed back techniques along withclassical behavior conditioning is able <strong>to</strong> account for some of the bodyprograms in slaves. Other body programs appear <strong>to</strong> be connected <strong>to</strong>the memories of alters. For inst<strong>an</strong>ce, if the Programmer w<strong>an</strong>ts the body<strong>to</strong> burn--he has the System pull up <strong>an</strong> alter which was <strong>to</strong>rtured with firewho comes up behind the alter holding the body, <strong>an</strong>d the body thenabreactes <strong>an</strong>d feels like it is burning. As mentioned, one technique isthe split-brain programming where the functioning of the twohemispheres of the brain are separated, which allows the patient <strong>to</strong>feel the “right h<strong>an</strong>d path” <strong>an</strong>d the “left h<strong>an</strong>d path” separately. Thistype of programming is very powerful in making the programmingscript seem more real th<strong>an</strong> outside reality. High blood pressure orhypertension has been found <strong>to</strong> be largely a function of the mind.However, conventional medicine has ignored this for years, <strong>an</strong>d has alarge volume of confusing <strong>an</strong>d misleading research <strong>to</strong> the opposite.Rather, th<strong>an</strong> admit the cause, the medical establishment has labeledthe largest percentage of hypertension cases as “essential” or“idiopathic” which are labels <strong>to</strong> cover up that they don’t know (orrefuse <strong>to</strong> recognize) the cause of the high blood pressure. At <strong>an</strong>y ratethe cardiovascular systems (heart <strong>an</strong>d blood vessels, etc.) is socomplex that it has been very difficult for researchers <strong>to</strong> get a grasp onm<strong>an</strong>y issues involved in blood pressure such as the release of hormonesin<strong>to</strong> the blood, <strong>an</strong>d the result of long term stress on the cardiovascularsystem. When tests show that the stress of unemployment increaseshigh blood pressure problems among men, it would seem that themedical establishment would begin <strong>to</strong> see the link that the mind haswith controlling blood pressure. Again bio-feedback <strong>an</strong>d classicconditioning have been successfully used <strong>to</strong> radically ch<strong>an</strong>ge asubject’s blood pressure. This along with the ability <strong>to</strong> go in<strong>to</strong> deeptr<strong>an</strong>ces, are abilities that the Monarch slave is programmed <strong>to</strong> have <strong>to</strong>control their blood pressure. Again the question may be, why wouldthey condition a slave this way? Because, if the Master c<strong>an</strong> call out ahypnotic trigger <strong>an</strong>d ch<strong>an</strong>ge the slave’s heart beat <strong>an</strong>d bloodpressure, does the reader see how “puppet-like” the slave feels? <strong>The</strong>slave’s mind <strong>an</strong>d body are literally owned by the master. <strong>The</strong> slave isnot even allowed <strong>to</strong> control his own body. This is what <strong>to</strong>tal mindcontrolis all about.PATHWAYS<strong>The</strong> medical profession uses the term “pathways” <strong>to</strong> describe the waysthe mind creates biochemical <strong>an</strong>d physiological ch<strong>an</strong>ges. In otherwords, how does the mind consciously decide <strong>to</strong> ch<strong>an</strong>ge its body?When medical researchers beg<strong>an</strong> <strong>to</strong> underst<strong>an</strong>d how the twohemispheres worked, they beg<strong>an</strong> <strong>to</strong> underst<strong>an</strong>d better how <strong>to</strong>362


facilitate mind-<strong>to</strong>-body communication so that they could programthe slave’s mind <strong>to</strong> control its body. One of the better books on thissubject is <strong>The</strong> PAychobiology of <strong>Mind</strong>-Body Healing by Ernest LawrenceRossi. Rossi <strong>an</strong>d Erickson devised a three-stage approach <strong>to</strong> accessingthe person’s inner resources for therapy. This type of hypnotic-inducedhealing is a clue <strong>to</strong> part of how the Body programs are structured in forbody control by the programming. What some use for good, is used byothers for evil. During the hypnotic work, Rossi uses what is called the“inner mind” of the person. For inst<strong>an</strong>ce, <strong>to</strong> get a person <strong>to</strong> s<strong>to</strong>pbleeding indirect hypnotic suggestions are made in the following 3stages, a. a time-binding introduction of “Why don’t you s<strong>to</strong>pbleeding? Now!” b. there is <strong>an</strong> accessing of state dependentunconscious processes that c<strong>an</strong> control the bleeding, <strong>an</strong>d c. there is aresponse by the person which ratifies that the inner process of s<strong>to</strong>ppingthe bleeding has actually happened. <strong>The</strong> hypothalamus is a very smallpart of the brain. It is only the size of a pea, but it contains <strong>an</strong> immenseamount of import<strong>an</strong>t tissues which control all types of inner activities ofthe body, including the endocrine, the immune, the neuropeptide <strong>an</strong>dau<strong>to</strong>matic systems. It is this area of the brain which is m<strong>an</strong>ipulated byhypnosis. <strong>The</strong> limbic-hypothalamic system is in a const<strong>an</strong>t process ofshifting what state of mind the brain is in. <strong>The</strong>re are numerousunconscious <strong>an</strong>d conscious states that c<strong>an</strong> be shifted <strong>to</strong>. <strong>The</strong>se arelabeled “psycho-neuro-physiological states” because researchers nowrealize how a state involves the entire person. All learning is associated<strong>an</strong>d depends upon the state it was learned in! A new sense org<strong>an</strong> wasdiscovered, <strong>an</strong>d US. News & World Report, July 19, 1993, p. 61 reportedon it. We do not know when this tiny sense org<strong>an</strong>, which is located inthe nasal cavity, was discovered by the people doing mind-control,but it is already being exploited. This org<strong>an</strong> responds <strong>to</strong> chemicalscalled pheromones, which play <strong>an</strong> import<strong>an</strong>t role in hum<strong>an</strong> emotions,such as fear, hunger <strong>an</strong>d love. Hum<strong>an</strong> skin gives off odorlesspheromones which other people c<strong>an</strong> detect. Basic hum<strong>an</strong> drives arecontrolled by Pheromones. Endorfin is a peptide, of which at least 50have been charted. By m<strong>an</strong>ipulating these chemicals, people c<strong>an</strong> bebiochemically put in<strong>to</strong> a different state of mind, <strong>an</strong>d victims have beenm<strong>an</strong>ipulated by these chemicals. <strong>The</strong>se chemicals are being used inconjunction with Virtual Reality <strong>to</strong> control slaves’ minds. In the March-April ‘94 edition of <strong>The</strong> Futurist the author Glenn F. Cartwright, of McGillUniversity <strong>an</strong>nounces in his article “Virtual or Real? <strong>The</strong> <strong>Mind</strong> inCyberspace”, “Str<strong>an</strong>gely, the developers of virtual reality seem largelyunconcerned by the possible d<strong>an</strong>gers inherent in launching individualsin<strong>to</strong> <strong>an</strong>other reality.” This is because Virtual Reality is being developedas <strong>an</strong>other <strong>to</strong>ol of mind-control. Computers c<strong>an</strong> dynamically control<strong>an</strong>d synchronize all that needs <strong>to</strong> be coordinated <strong>to</strong> give someone avirtual reality experience. <strong>The</strong> researchers/programmers are trying <strong>to</strong>immerse as m<strong>an</strong>y of the victim’s senses in<strong>to</strong> their virtual reality trip aspossible. It becomes almost impossible <strong>to</strong> distinguish reality from the trip363


for the victim of this type of programming. McGill University, Dr. White(Cameron’s) old s<strong>to</strong>mping grounds did some virtual reality research.People are now getting involved with what is called MUDs (multi-userdungeons) where a person via virtual reality c<strong>an</strong> create a parallel life.Some people are spending up <strong>to</strong> 120 hours a week immersed in theirvirtual reality second life. In 1992, Internet had 207 such games. Nowthe programmed slave only needs <strong>to</strong> hook in<strong>to</strong> Internet <strong>to</strong> beprogrammed. Cartwright’s article warns that a person’s ego-centerc<strong>an</strong> be projected somewhere else via virtual reality, which destabilizesone’s actual underst<strong>an</strong>ding of where their own identity is. He also warnsthat Virtual reality will create other personalities. He writes on page 24,“Multiple Identities. If it is possible in virtual reality or cyberspace <strong>to</strong>enter <strong>an</strong> altered state, become disembodied, swap genders, create avirtual ego-center, decenter the self, <strong>an</strong>d assume a different identity,then it may also be possible <strong>to</strong> assume more th<strong>an</strong> one identity at thesame time. In this context, the exponential increase in multiplepersonalitydisorders in recent decades may be of more th<strong>an</strong> justpassing interest .... having multiple, serial, <strong>an</strong>d simult<strong>an</strong>eous personae incyberspace may not only be possible, but may even be encouragedas a part of interacting with others.’’ Virtual reality via the computerInternet has now become <strong>an</strong>other <strong>to</strong>ol of the Programmers.MUSICDissociated <strong>to</strong>nes, beats <strong>an</strong>d music may accomp<strong>an</strong>y hypnoticinduction drugs. Pulsing beating sounds in the ears c<strong>an</strong> ch<strong>an</strong>ge thebrain’s waves. It is no secret that music will put someone in<strong>to</strong> <strong>an</strong> alteredstate. Music will ch<strong>an</strong>ge moods, heart rate, <strong>an</strong>d even one’s state ofconsciousness. In a home church setting, that Fritz participated in, thequestion was asked of a group what they do <strong>to</strong> overcome depression.Everyone present listed “listen <strong>to</strong> music” as one of the things they do <strong>to</strong>overcome depression. Sound will ch<strong>an</strong>ge body chemistry, bloodpressure, breathing <strong>an</strong>d digestion. (See Jacobson, Steven. “Media<strong>Mind</strong> Control”, Media Bypass, Sept. ‘95, pg. 50). To quote Jacobson,“Fast music will speed up the nervous system while slow music will slow itdown. Sounds vibrate in different parts of the body. Low <strong>to</strong>nes willvibrate in the higher portions <strong>an</strong>d on in<strong>to</strong> the head. Much of <strong>to</strong>day’spopular rock music is built around a heavy bass pattern louder th<strong>an</strong> themelody. <strong>The</strong>se low-frequency vibrations reverberate in the lower partsof the body so that the music ‘feels’ good. <strong>The</strong>se loud, low-frequencyvibrations <strong>an</strong>d the driving beat of most rock music affect the pituitarygl<strong>an</strong>d, which controls male <strong>an</strong>d female responses. <strong>The</strong> repeating soundpattern induces the hypnotic state of mind that is similar <strong>to</strong> daydreaming, thus clearing the mind of all thought so that the messagec<strong>an</strong> be impl<strong>an</strong>ted in the unconscious without resist<strong>an</strong>ce. “It is import<strong>an</strong>t364


<strong>to</strong> note that the lyrics of m<strong>an</strong>y rock songs are not clearly distinguishableconsciously. When you do not hear the message clearly, you c<strong>an</strong>notmake the conscious choice <strong>to</strong> accept or reject it. When you c<strong>an</strong>notmake that choice or when that choice is taken away from you, themessage is programmed directly <strong>to</strong> the subconscious, thuscircumventing <strong>an</strong>alysis <strong>an</strong>d choice in accepting the content of themessage. Sixties rock superstar Jimi Hendrix said: ‘You c<strong>an</strong> hypnotizepeople with music, <strong>an</strong>d when you get them at their weakest point, youc<strong>an</strong> preach in<strong>to</strong> their subconscious whatever you w<strong>an</strong>t <strong>to</strong> say.’” Longterm exposure <strong>to</strong> the heavy metal themes of sadomasochism,sat<strong>an</strong>ism, suicide <strong>an</strong>d drug abuse c<strong>an</strong> only have a negative influenceon the minds of the listener. Today’s generation of children are beingraised on this type of music. M<strong>an</strong>y of the big rock b<strong>an</strong>ds consist ofsat<strong>an</strong>ists. This statement isn’t made flipp<strong>an</strong>tly, but from having learnedfrom m<strong>an</strong>y witnesses of the rituals these Sat<strong>an</strong>ic b<strong>an</strong>ds participate in.Some of these sat<strong>an</strong>ists, as the reader c<strong>an</strong> already guess, areprogrammed multiples. For those programmed multiples whoparticipate in heavy rock music, they are simply adding one more typeof bondage <strong>an</strong>d mind-control <strong>to</strong> their already long list.<strong>The</strong> spiritual damage done by rock music will be briefly addressed laterin cht. 10.PROGRAMMING DAMAGE <strong>to</strong> the BODY.M<strong>an</strong>y of the body programs that activate via trigger codes are simplymemories of severe <strong>to</strong>rture. For inst<strong>an</strong>ce, the victim might be placednaked on a block of ice, which contains the body of a frozen person.(This is a common trauma used in programming.) When this memory istriggered, via <strong>an</strong> alter or alter fragment, the victim’s body abreacts<strong>an</strong>d gets very cold. Another common <strong>to</strong>rture is <strong>to</strong> stick a uretericcatheter up the external urethral orifice (whose ch<strong>an</strong>nel is called theurethra). This is painful. <strong>The</strong>n the urinary bladder is filled so that thevictim is in extreme pain, <strong>an</strong>d is made <strong>to</strong> hold their bladder in silence.This <strong>to</strong>rture <strong>to</strong> the body is painful. But the long term effects of this<strong>to</strong>rture, which is done repeatedly <strong>to</strong> slaves <strong>to</strong> teach obedience, is <strong>to</strong>seriously damage their urinary bladders. <strong>The</strong> abreaction of memories ofthis help blackmail alters in<strong>to</strong> obedience. <strong>The</strong> body of m<strong>an</strong>y slaves areonly kept functioning, because they are given repeated surgery bydoc<strong>to</strong>rs working under the auspices of the <strong>Illuminati</strong>. <strong>The</strong>se doc<strong>to</strong>rs c<strong>an</strong>be trusted on <strong>to</strong> keep quiet about the abused bodies they have <strong>to</strong>keep fixing. It was mentioned in chapt. 2 that some people sufferingfrom autism are failures in mind control programming. We know of onecase where a brilli<strong>an</strong>t autistic teenager who’d not talked duringchildhood beg<strong>an</strong> talking, <strong>an</strong>d shocked his parents because he beg<strong>an</strong>365


talking about his spirit guides (see chap. 10 on spirit guides.) Somepeople diagnosed as MS are really failures of the mind control’s brainstem scarring. M<strong>an</strong>y hundreds of women w/ breast impl<strong>an</strong>ts arecoming down w/ symp<strong>to</strong>ms that look like MS & Lupus. This may bebecause part of the women w/ impl<strong>an</strong>ts are programmed multiples.Another disease that is believed by some <strong>to</strong> be caused byprogramming failures is lupus (aka lupus erythema<strong>to</strong>sus or systemiclupus erythema<strong>to</strong>sus). Establishment medical science claims that thecause of lupus is unknown. Modem Maturity (Ap/My ‘93) & NationsBusiness (May ‘93) are examples of magazines that have run articlesabout Lupus. Ronald I. Carr <strong>an</strong>d the Lupus Foundation of America pu<strong>to</strong>ut a h<strong>an</strong>dbook on the disease in 1986. <strong>The</strong> direc<strong>to</strong>r of the LupusFoundation has been <strong>an</strong> <strong>Illuminati</strong> programmed multiple. <strong>The</strong> effects ofthe programming are not just in the mind. It has been scientificallyshown that the <strong>to</strong>rture memories are enbedded in the cells of thebody. In fact, the <strong>Illuminati</strong> intentionally w<strong>an</strong>ts the body injured bytrauma pains & trauma memories, because they w<strong>an</strong>t <strong>to</strong> prevent thepossibilities of the s<strong>an</strong>ctification of the body such as written about in 2TM 2:2 1. Also, the Programmers intentionally & zealously prevent thedeeper alters from w<strong>an</strong>ting <strong>to</strong> love as 1 COR 13 describes.PHYSICAL ASPECTS of the hum<strong>an</strong> BRAIN.Neurobiologists <strong>an</strong>d chemists have learned a great deal about thephysical aspects of the brain. One has <strong>to</strong> be careful aboutsimplification. <strong>The</strong> concept of the split brain has been over simplified,because the best researchers on the two hemispheres know that thereis const<strong>an</strong>t interplay between the brain’s two halves--unless the<strong>Illuminati</strong> have tampered with someone’s brain. <strong>The</strong> split brain concepthas been replaced with the Penta-Brain (something akin <strong>to</strong> apentagram). <strong>The</strong> Penta-Brain takes the triune-concept of the brainconceived by brain scientist Paul MacCle<strong>an</strong> <strong>an</strong>d adds it <strong>to</strong> the splitbrain hemispheres <strong>an</strong>d the duality of the frontal-posterior dimensionalso. In this process, “mammali<strong>an</strong>” & “reptili<strong>an</strong>” brains (those parts ofour brains that mammals & reptiles also have) are accessed <strong>an</strong>dworked on in people.<strong>The</strong> best description read by co-author Fritz of the intricate chemicalch<strong>an</strong>ges that happen during Learning <strong>an</strong>d Memory is a Special Reportentitled “<strong>The</strong> Chemistry of Learning <strong>an</strong>d Memory” Chemical &Engineering News, Oct. 7, 1991, pp. 24-4 1, by Karen J. Skinner, YaleChemistry Ph.D. in ‘73, Masters from Kennedy School of Govt., Harvard.This is a very technical report. <strong>The</strong> programmers do not learn thismaterial, but those who w<strong>an</strong>t <strong>to</strong> underst<strong>an</strong>d the nitty-gritty molecularbiologyof how the complex memory processes work in the mind might366


w<strong>an</strong>t <strong>to</strong> try <strong>to</strong> study the report. In very basic terms, what it iscommunicating is: Neurons (nerve cells--of which the brain has 10billion) meet each other at junctions (gaps) called synapses. At thesynapses (gaps), neurotr<strong>an</strong>smitters allow them <strong>to</strong> communicate. <strong>The</strong>reare 60 trillion synapses. As a person gathers information, the brainch<strong>an</strong>ges the synapses, in a sense rewires itself. Part of memory is howthe brain “rewires” itself, <strong>to</strong> use a laym<strong>an</strong>’s term. Genetics have <strong>an</strong>import<strong>an</strong>t role in the initial hardwiring of the brain. Genetics alsodetermine recep<strong>to</strong>r diversity (at the synapses) which relates directly <strong>to</strong>learning & memory because it increases the ways neurons c<strong>an</strong>perceive, process <strong>an</strong>d recall information. <strong>The</strong> Hippocampus has beenfound <strong>to</strong> play a role in long term memory s<strong>to</strong>rage. <strong>The</strong> Hippocampuss<strong>to</strong>res memory in the cortex <strong>to</strong> be encoded in<strong>to</strong> long term memory.Numerous areas of the brain are busy with processing only one type ofmemory. In a macaque monkey, around two dozen distinct visualareas of the brain for memory s<strong>to</strong>rage have been discovered. In otherreports, it has come out that memory is s<strong>to</strong>red holographically. Germ<strong>an</strong>researchers have been trying <strong>to</strong> figure out at the Max Pl<strong>an</strong>ck Institutefor Brain Research at Fr<strong>an</strong>kfurt, Germ<strong>an</strong>y what mech<strong>an</strong>ism is used <strong>to</strong>bind the m<strong>an</strong>y various parts of information s<strong>to</strong>red in<strong>to</strong> a coherentrecollection. <strong>The</strong> point that should be made at this point, is that <strong>an</strong> alterdoes not exist in one spot in the mind. <strong>The</strong> mind perceives that <strong>an</strong> alterdoes, but <strong>an</strong> alter in terms of physical ch<strong>an</strong>ge in the brain is actually amultitude of synaptic ch<strong>an</strong>ges scattered throughout the brain. <strong>The</strong>brainy s concept/image of <strong>an</strong> alter <strong>an</strong>d the dissociated state c<strong>an</strong> beplayed with by the programmers, but they really don’t kill alters likethey pretend <strong>to</strong> do during programming. Alters c<strong>an</strong>’t be “killed” in themind. As the mind consolidates info, it fires neurons in harmony (inphase) called a “binding” process. Perceptions which are notmemories are initiated this way. It is these perceptions that exist withoutmemories that are so import<strong>an</strong>t <strong>to</strong> the programmers. Some have calledthese perceptions “global unity” of the brain. <strong>The</strong>se are in phasefrequencies from 40 <strong>to</strong> 70 Hz. NMDA recep<strong>to</strong>rs c<strong>an</strong> perceive patternedfirings from nerve cells that are active at the same time, which allowsthe brain <strong>to</strong> strengthen some synapses <strong>an</strong>d let others grow weaker.Synaptic efficacy is called LTP. Interested readers c<strong>an</strong> study LTP’smolecular mech<strong>an</strong>ism, etc. in Karen Skinner’s Report. Ch<strong>an</strong>gingsubjects slightly, let’s discuss how Moriah fertilizes two zygotes <strong>an</strong>dintentionally kills one of the twins in the womb. Studies have shown thatin cases where one twin dies in the womb, the other twin usually tries <strong>to</strong>lead two lives. This has nothing <strong>to</strong> do with DID (MPD), except that thesurviving twin will later be made in<strong>to</strong> a programmed multiple. <strong>The</strong><strong>Illuminati</strong> doc<strong>to</strong>rs have perfected a method <strong>to</strong> kill a developing twin sothat the other engulfs it in the womb. This is skillfully done, <strong>an</strong>d createssome interesting mental ch<strong>an</strong>ges in the survivor. Moriah also believesthat it endows the survivor with twice the spiritual power.367


GENETIC ENGINEERING <strong>to</strong> CREATE PROGRAMMED ASSASSINSThis next section is somewhat of <strong>an</strong> appendix <strong>to</strong> this chapter. Readersmay w<strong>an</strong>t <strong>to</strong> skip it, if readers are only w<strong>an</strong>ting <strong>to</strong> just learn HOW themind-control is done. However, we felt that since genetic engineeringwent h<strong>an</strong>d-in-h<strong>an</strong>d with Moriah’s mind-control that a look at onespecific type of military mind-control model would be worthwhile forsome readers. An example of how genetic engineering is couple withthe trauma-based mind-control is Amphibious M<strong>an</strong>, a particular <strong>to</strong>psecret model of Monarch slave. <strong>The</strong> following section is taken from <strong>an</strong>earlier article by Fritz on this. As far as we know, this was the first <strong>an</strong>donly article ever written on the subject (not counting classified secretdocuments). When the public saw the British Royal Navy locate thesunken Lusit<strong>an</strong>ia in 1935 using the Iron M<strong>an</strong> Diving Suit, the British RoyalNavy <strong>to</strong>ld the public that it had no interest <strong>an</strong>d no use for the suit. <strong>The</strong>Royal Navy lied about the Iron M<strong>an</strong> Diving Suit that, “no use could bemade of it as the Navy [had] no requirements for deep diving.” <strong>The</strong>Royal Navy had no use for deep diving! Do you swallow that? That’s abold enough lie <strong>to</strong> drown on. <strong>The</strong>y had just used it <strong>to</strong> locate theLusit<strong>an</strong>ia! <strong>The</strong> lesson here is that when the World Order is using aparticular adv<strong>an</strong>ced technology, they will tell the public that theyhave no interest in it.<strong>The</strong> British, Americ<strong>an</strong> <strong>an</strong>d Germ<strong>an</strong> navies continued after W.W.I <strong>to</strong> doresearch beyond what the public knew they were interested in. Whilethe public thought that Aquam<strong>an</strong> was simply a comic idea--theresearch went on <strong>to</strong> develop the ability for hum<strong>an</strong>s <strong>to</strong> swim like fish.When the World Order has discovered a technological breakthroughthey pretend that they are still researching the basic concept. Oftenthey prepare the public for their inventions via science fiction novels<strong>an</strong>d movies. <strong>The</strong> reasons include their need <strong>to</strong> avoid the future shockthat c<strong>an</strong> incapacitate a people. If the reader has gone fishing, she orhe may be familiar with how fish c<strong>an</strong> breathe in the air, they don’t dieau<strong>to</strong>matically. <strong>The</strong>y have gills which are designed <strong>to</strong> take oxygen fromwater, but their gills do absorb some oxygen from the air, enough <strong>to</strong>keep them alive on l<strong>an</strong>d for a while, so that if they are left on the b<strong>an</strong>kafter being caught they may jump back in<strong>to</strong> the water <strong>an</strong>d escape.Likewise, people don’t au<strong>to</strong>matically die from drowning. Near drownvictims have been recovered after 40 minutes of being immersed incold water. However, normal hum<strong>an</strong>s do not survive breathing wateras well as fish breathe air. <strong>The</strong>re are some <strong>an</strong>imals though which c<strong>an</strong>breathe both air <strong>an</strong>d water, amphibi<strong>an</strong>s. Over the years, the NewWorld Order has secretly developed the ability <strong>to</strong> create a subspeciesof people who c<strong>an</strong> swim <strong>an</strong>d breathe water.368


Recently, the Oregoni<strong>an</strong> newspaper (July 28, 1995) Arts &Entertainment Guide, p. 22, r<strong>an</strong> <strong>an</strong> article entitled “Brave NewWaterworld”. This is <strong>an</strong> example of a fictional supposedly futuristicsetting for a movie about a technology they already possess. <strong>The</strong>movie Waterworld is the most expensive film made recently. It isestimated that it cost between $140 million <strong>to</strong> $200 million <strong>to</strong> make it.One of the main characters in the movie is Mariner, who is a hum<strong>an</strong>who has been genetically ch<strong>an</strong>ged <strong>to</strong> have gills behind his ears. Asmentioned already, they use movies like this <strong>to</strong> convince people thattheir present technology is only something of the future, while stillpreparing people mentally <strong>to</strong> accept it. That way the culture is no<strong>to</strong>verwhelmed if they encounter the technology in the near future.When secret researchers discovered that a particular chemical(s)added <strong>to</strong> the bloodstream would enable the hum<strong>an</strong> lungs <strong>to</strong> takeoxygen <strong>an</strong>d remove carbon dioxide from water, they had the ability <strong>to</strong>have men swim in water like fish without scuba gear. Now they needed<strong>to</strong> cover their tracks, so National Geographic Society (which has greatrespectability in the public’s eye) has written about experiments <strong>to</strong> finda way for men <strong>to</strong> breathe water. In the National Geographic bookExploring the Deep Frontier <strong>The</strong> Adventure of M<strong>an</strong> in the Sea, publishedin 1980, they show a GE experiment on pg. 248. <strong>The</strong> picture’s captionreads, “To dive like a whale <strong>an</strong>d breathe like a fish: Scientists search forways <strong>to</strong> increase m<strong>an</strong>’s freedom <strong>an</strong>d r<strong>an</strong>ge in the sea. In a t<strong>an</strong>k at aGeneral Electric research labora<strong>to</strong>ry (right) fish swim past a parakeetseparated from their watery world by a tr<strong>an</strong>sparent membr<strong>an</strong>e.Watertight but porous, the membr<strong>an</strong>e allows oxygen <strong>an</strong>d carbondioxide <strong>to</strong> pass in <strong>an</strong>d out. Equipped with artificial gills, m<strong>an</strong> may oneday breathe liquid while diving.” <strong>The</strong> example here is that they covertheir tracks when they make a discovery by setting up experiments thatare allowed <strong>to</strong> be published that make it look like they are onlybeginning <strong>to</strong> underst<strong>an</strong>d the subject. Bear in mind, the Allies capturedsecret Nazi Germ<strong>an</strong> records, <strong>an</strong>d the Germ<strong>an</strong>s did not research usingparrots--they used live but expendable people. <strong>The</strong> Nazis were notabove injecting drugs that induce respira<strong>to</strong>ry paralysis or otherresponses <strong>an</strong>d testing how the person’s body would respond <strong>to</strong>drowning. I would suggest that they <strong>an</strong>alyzed 02 contents in the hum<strong>an</strong>guinea pigs with mass spectrometers. <strong>The</strong> paperwork of the secret Naziresearch projects that the Navy confiscated at the end of W.W. II,would provide a better picture of what was researched <strong>an</strong>ddiscovered.<strong>The</strong> National Geographic article admitted that they had a membr<strong>an</strong>ethrough which a parrot could get oxygen via the water around it. Now,logic would tell you that if they have a membr<strong>an</strong>e that will allow aparrot <strong>to</strong> breathe surrounded by water that the technical difficulties ofadapting this <strong>to</strong> a person c<strong>an</strong> be easily overcome--so the concept ofgills for people is quite achievable--however, the ability for hum<strong>an</strong>s <strong>to</strong>369


directly breathe from water is already achievable due <strong>to</strong> some otheradv<strong>an</strong>ces they have already used secretly for years. In order <strong>to</strong>capitalize on their discovery of how <strong>to</strong> create Amphibious M<strong>an</strong>, militaryminds in the <strong>Illuminati</strong> went <strong>to</strong> work trying <strong>to</strong> think up schemes on how<strong>to</strong> use men who c<strong>an</strong> swim like fish <strong>to</strong> their own evil adv<strong>an</strong>tages. Here isa discovery that could benefit m<strong>an</strong>kind <strong>an</strong>d yet they are thinking ofways <strong>to</strong> use it for evil. <strong>The</strong>y basically realized that amphibious m<strong>an</strong>could be used like a glorified Seal team. Seal teams are the navy’ssemi-secret group of well-trained men, who do primarily l<strong>an</strong>doperations after swimming ashore. Monarch slaves are being used inthe Seal teams. <strong>The</strong> Seal teams are being secretly used <strong>to</strong> carry outassassinations, such as recently they were used <strong>to</strong> assassinate people inIraq. <strong>The</strong>y are trained in the ability <strong>to</strong> l<strong>an</strong>d <strong>an</strong>d disguise themselves asnatives <strong>an</strong>d carry out illegal assassination work during times of peace.For missions like this only programmed slaves will work, because theyneed <strong>to</strong> erase their memories. Seal teams are located around theworld, especially in the S<strong>an</strong> Diego HO area. <strong>The</strong> Seals were originallygiven dolphins <strong>to</strong> train <strong>an</strong>d communicate with via clickers but thesewere turned over the EOD (the navy’s ordin<strong>an</strong>ce group) so that thedolphins c<strong>an</strong> be used <strong>to</strong> disarm mine fields or carry explosives. <strong>The</strong>comic book scenario of Aquam<strong>an</strong> with dolphins is not fiction <strong>an</strong>ymore.<strong>The</strong> Seals use SDV (Deep Vehicles) which are tight fitting 4-personminisubs <strong>to</strong> submerge deep in<strong>to</strong> the water, before swimming with gear.<strong>The</strong> name which is being used world-wide by people familiar with theconcept of men swimming like fish is “amphibious m<strong>an</strong>”. <strong>The</strong>re aregroups secretly world-wide working on the use of this new sub-speciesof m<strong>an</strong>. <strong>The</strong>y are genetically trying <strong>to</strong> engineer new skin <strong>an</strong>d otherparts of the hum<strong>an</strong> body <strong>to</strong> make people more suitable for livingunderwater. In line with this, men, like Frenchm<strong>an</strong> Jacques Rougerie,have been designing <strong>an</strong>d building Aqua-cities so that people couldlive underwater <strong>an</strong>d have industry such as fish farming <strong>to</strong> sustainthemselves economically. Special “geothermal” genera<strong>to</strong>rs would helpgenerate heat for the Aqua-cities. Amphibious m<strong>an</strong> is alive <strong>an</strong>d well<strong>to</strong>day. Underst<strong>an</strong>d that the people who are being geneticallyengineered by the <strong>Illuminati</strong> are also being raised under their mindcontrol.<strong>The</strong> structures of their alter systems are very complex onAmphibious M<strong>an</strong> models, because so much secrecy is riding on theseslaves. <strong>The</strong> internal systems of these slaves are booby trapped everywhich way so that no tampering c<strong>an</strong> be attempted, plus the designwork on these Systems is some of the best. Things are tied <strong>to</strong>gether likea jigsaw puzzle. Fritz’s Summer ‘95 newsletter, revealed for the first timethat <strong>to</strong>day, there are genetically engineered Amphibious men who areable <strong>to</strong> swim underwater without air t<strong>an</strong>ks. <strong>The</strong>re were a number ofdifficulties that the elite’s scientists had <strong>to</strong> overcome <strong>to</strong> createAmphibious m<strong>an</strong>. Scientists had the benefit of being able <strong>to</strong> make lotsof comparisons - between various <strong>an</strong>imals. Some <strong>an</strong>imals c<strong>an</strong> usewater, some water <strong>an</strong>d air, <strong>an</strong>d some just air. <strong>The</strong>re are m<strong>an</strong>y other370


comparisons that have been used in underwater research. In almostevery physical aspect related <strong>to</strong> <strong>an</strong>imals living underwater there aredifferences between various <strong>an</strong>imals which c<strong>an</strong> be compared so thatthe technical feature which allows one <strong>an</strong>imal <strong>to</strong> do somethingunderwater that <strong>an</strong>other species c<strong>an</strong>’t c<strong>an</strong> be identified. Once thefeature is identified, then research c<strong>an</strong> begin on how <strong>to</strong> obtain thisfeature for hum<strong>an</strong> swimmers. For inst<strong>an</strong>ce, one type of snake (thepelagic yellow-bellied sea snake) which breathes air, c<strong>an</strong> underoptimum conditions stay underwater indefinitely. Turtles have <strong>an</strong>incredible <strong>to</strong>ler<strong>an</strong>ce for <strong>an</strong>oxia, in comparison <strong>to</strong> other reptiles, whichgo underwater. And sea turtles have the best <strong>to</strong>ler<strong>an</strong>ce of all thevarious turtles. This is the type of difference that lends itself <strong>to</strong>comparison research. Underwater comparison research had alreadybegun clear back in 1869, when Paul Bert examined the differencesbetween domestic chickens <strong>an</strong>d mallard ducks. Doing comparisons it iseasy <strong>to</strong> find out that birds <strong>an</strong>d mammals which dive have greaters<strong>to</strong>rage in their bodies for 02 th<strong>an</strong> hum<strong>an</strong>s. <strong>The</strong> Jap<strong>an</strong>ese Ama diverswere studied in the early 1930s by Germ<strong>an</strong> underwater researchers.However, the public has been <strong>to</strong>ld that very little research in this areaoccurred until the 1960s. Kooym<strong>an</strong>, Gerald L. Diverse Divers Physiology<strong>an</strong>d Behavior. Berlin, Ger.: Springer-Verlag, 1989, p. 33 states, “Littlefurther experimental work was done on the subject of gas exch<strong>an</strong>ge inhum<strong>an</strong> breath-hold divers until the early 1960s.” C<strong>an</strong> you believe thatthe British, Germ<strong>an</strong>s <strong>an</strong>d Americ<strong>an</strong>s didn’t research such <strong>an</strong> import<strong>an</strong>tunderwater subject for 30 years? Yes, they did continue fr<strong>an</strong>tic secretresearch, <strong>an</strong>d they eventually learned how <strong>to</strong> solve a number ofundersea problems facing hum<strong>an</strong>s. First, the regulation of respiration iscarried out by what is called the Chemorecep<strong>to</strong>rs which are carotid<strong>an</strong>d aortic bodies which detect the ch<strong>an</strong>ges in the partial pressures ofoxygen <strong>an</strong>d carbon dioxide in the blood. <strong>The</strong> CO 2 break pointmech<strong>an</strong>ism is sensitive <strong>to</strong> a number of phenomena, which c<strong>an</strong> preventit from protecting a person. When a person breaths, he has <strong>an</strong>ingassing <strong>an</strong>d <strong>an</strong> outgassing of oxygen, carbon dioxide, nitrogen, <strong>an</strong>dother gasses. <strong>The</strong> levels of each of these gasses <strong>an</strong>d their nature areimport<strong>an</strong>t fac<strong>to</strong>rs in how a person’s body underwater functions or dies.If the level of CO2 gets <strong>to</strong>o high, the person c<strong>an</strong> become unconscious.<strong>The</strong> hum<strong>an</strong> circula<strong>to</strong>ry system has <strong>to</strong> be ch<strong>an</strong>ged <strong>to</strong> be able <strong>to</strong> adapt<strong>to</strong> the oce<strong>an</strong> environment.In dealing with men swimming underwater all the laws of gasses thatregular divers have <strong>to</strong> deal with still apply <strong>to</strong> Amphibious M<strong>an</strong>--such asAmono<strong>to</strong>n’s law, Boyle’s Law, Charles Law, Henry’s Law, <strong>an</strong>dHald<strong>an</strong>i<strong>an</strong>’s <strong>The</strong>ory on gas absorption <strong>an</strong>d elimination by body tissues.Blood glucose is the only source for carbon when hum<strong>an</strong>s dive, whichforces muscles <strong>to</strong> rely primarily on <strong>an</strong>aerobic glycolysis. This me<strong>an</strong>s tha<strong>to</strong>xygen depletion is not the only major problem for those who hold theirbreath <strong>an</strong>d swim. Blood glucose levels must be attained for underwater371


swimmers that will sustain activity. Breathing water must assure theproper functioning of the circula<strong>to</strong>ry system. <strong>The</strong> high salinity of seawater causes hyper<strong>to</strong>nic reactions in the lungs. Fresh water has <strong>to</strong>o littlesalt in relation <strong>to</strong> the hum<strong>an</strong> blood & it causes hypo<strong>to</strong>nic reactions.Either way, the water (either fresh or salt) causes the alveolar tissue <strong>to</strong>damage <strong>an</strong>d the body begins leaking proteins out of the mouth.Secret naval intelligence researchers tied <strong>to</strong> the <strong>Illuminati</strong> studied whathappens underwater <strong>to</strong> the heart rate, cardiac output <strong>an</strong>d strokevolume, blood pressure <strong>an</strong>d flow, the various import<strong>an</strong>t org<strong>an</strong>s <strong>an</strong>d thehum<strong>an</strong> brain, the muscles <strong>an</strong>d bones <strong>an</strong>d venous circulation, thehemoglobin affinity for 02, the effect of being submersed on bloodgases, how oxygen is s<strong>to</strong>red, <strong>an</strong>d how hemoglobin concentrates in thebody. Another adv<strong>an</strong>cement was <strong>to</strong> discover how <strong>to</strong> m<strong>an</strong>ipulate thegenetic codes for the growth of skin, so that very dense skin could becreated. <strong>The</strong> genetics for all types of <strong>an</strong>imals have been spliced <strong>an</strong>ddiced <strong>an</strong>d all of weird hum<strong>an</strong>s <strong>an</strong>d creatures have been created.M<strong>an</strong>y are freaks <strong>an</strong>d serve the NWO no benefit. One of the bigunderground facilities for genetic research is Area 51, which is alsoclose <strong>to</strong> S<strong>an</strong> Diego, where the Seal Teams are HO. Area 51 is also <strong>an</strong>import<strong>an</strong>t mind-control programming center. Fritz’s June-July-AugustNewsletter ‘95 further discussed the underwater bases, underwatersupply depots, underwater mining research, undersea warfare systems,Tektite II, the mind-control research during the Consheif underwaterliving experiment, the U.S. Navy underwater research ship the Eagle,Scripps Institution of Oce<strong>an</strong>ography <strong>an</strong>d the Physiological ResearchLabora<strong>to</strong>ry for Naval Intelligence use, underwater research byRothschild <strong>an</strong>d Bowers, Remote Controlled Vehicles (RCVs), & CURV(cable-controlled Underwater Recovery Vehicle), <strong>an</strong>d specialunderwater <strong>to</strong>ols such as the hydraulic underwater saw.372


CHAPTER 9THE SCIENCE OF MIND MANIPULATION BYPSYCHOLOGICAL PROGRAMMING METHODS:BEHAVIOR MODIFICATION, PSYCHOLOGICALMOTIVATION & NLPOne way <strong>to</strong> explain how the slaves are conditioned is <strong>to</strong> relate <strong>an</strong>episode where the. two authors observed a Sat<strong>an</strong>ic family carrying outconditioning <strong>to</strong> reinforce their children’s mind control as their family“ate” at a restaur<strong>an</strong>t. After relating this interesting incident, the chapterwill cover the various psychological methods used <strong>to</strong> condition slaves.OBSERVATIONS OF A SATANIC FAMILY CARRYING OUT MONARCHCONDITIONING ON THEIR CHILDREN.<strong>The</strong> husb<strong>an</strong>d of the family was about 28 <strong>an</strong>d the wife was about 26. Ayoung m<strong>an</strong> (perhaps <strong>an</strong> uncle of the children) about 25 also sat at thetable with them. <strong>The</strong> family had 5 children, r<strong>an</strong>ging from about 1 1/2years old <strong>to</strong> about 7 years old. During the entire time we watchedthem, which was over <strong>an</strong> hour, we never saw one act of love, not oneact of nurturing on the part of the parents. Everything wasprogramming, programming <strong>an</strong>d more programming. <strong>The</strong> husb<strong>an</strong>dhad <strong>an</strong> attitude of control over his children. He was a young somewhatwild cock-sure type. From piecing <strong>to</strong>gether things it was clear that hemade a good salary <strong>an</strong>d that he <strong>an</strong>d his wife enjoyed prof<strong>an</strong>ity. Hiswife had the most dead looking eyes we have ever seen in a person.She looked every bit the part of a Sat<strong>an</strong>ic priestess of the worst type.<strong>The</strong> young m<strong>an</strong> of about 25 had very large knife hidden on his backthat we noticed only by close observation of his movements. Althoughit was 1 o’clock, the adults were calling their meal “breakfast.”<strong>The</strong> main male child was about 5 years old. He had <strong>an</strong> older sister <strong>an</strong>dtwo younger sisters, <strong>an</strong>d they all had a baby brother. During the entiretime that the family was there, the children ate almost nothing. <strong>The</strong> 5 yr.boy munched on a watermelon rind, trying <strong>to</strong> draw some susten<strong>an</strong>cefrom it. Part of mind control is depriving the body of food. <strong>The</strong> poorchildren never once asked for <strong>an</strong>ything; that is a clue that somethingwasn’t normal. During most of the time that the family was in the373


estaur<strong>an</strong>t, the mother <strong>an</strong>d father <strong>to</strong>ok turns shooting one questionafter <strong>an</strong>other at the five year boy. <strong>The</strong> questions were like:What is the capital of Florida? What is the 70th element on theperiodical chart? What are the names of the first five presidents? Whatis the square root of 121? <strong>The</strong> boy would roboticly <strong>an</strong>swer eachquestion successfully. <strong>The</strong> questions were not questions butprogramming <strong>an</strong>d comm<strong>an</strong>ds. <strong>The</strong> mother sternly said, “What make ofcar was that? That’s a question.” (Actually what she was saying was acomm<strong>an</strong>d.) Around this time they said, “Wake up, wake up, wake up.”(hypnotic comm<strong>an</strong>d.) A couple which was in the restaur<strong>an</strong>t waswatching how obedient the children were, <strong>an</strong>d they were alsooverhearing how excellent this little boy could <strong>an</strong>swer difficult rapid-firequestions. <strong>The</strong>y were impressed <strong>an</strong>d the lady came over <strong>to</strong> tell theparents how wonderful their family was. After oodling for 10 minutesover how great this family was the wom<strong>an</strong> went on <strong>to</strong> other things. Itwas difficult for both of us watching <strong>to</strong> s<strong>to</strong>mach the compliments thisstr<strong>an</strong>ger was giving <strong>to</strong> these parents. <strong>The</strong> natural impulse was <strong>to</strong> get her<strong>to</strong> shut up her compliments. She naively made all these complimentslittle knowing, that these parents were practicing one of the mosthideous if not the most hideous type of mind control invented. Askingquestions rapid fire is <strong>an</strong>other mind-control technique. In fact, all of theelements of what Fritz watched at the table that day were practicedon Fritz, the co-author, when he was in Beast Barracks at West Point,USMA. <strong>The</strong> little girl was repeating her programming, “I don’t have<strong>an</strong>ything inside me.” She was actually singing it. One of the girls haddifferent alters coming out <strong>an</strong>d was having a conversation with herselfbetween different alters (personalities). She placed her h<strong>an</strong>d over hertemple in scarecrow fashion (Wizard of Oz) programming. Her headmovement was a dead giveaway <strong>to</strong> those of us familiar with Monarchprogramming. -<strong>The</strong> parents had chosen the spot <strong>to</strong> eat because of thelarge surreal picture above them on the wall with blue & red flowers,water <strong>an</strong>d mountains. <strong>The</strong> picture was acting as a scramblingscatteringmech<strong>an</strong>ism, when the boy studied the picture, which he didfor the longest time in a tr<strong>an</strong>ce. <strong>The</strong> middle girl was dropping crayonsin<strong>to</strong> a styrofoam cup <strong>an</strong>d saying “get in<strong>to</strong> the fire.” <strong>The</strong>n she would say“I’m purple.” “I’m pink.” “I underst<strong>an</strong>d your purple.” “I underst<strong>an</strong>dyou’re pink.” “Get out of here for a minute.” What she was doing wasgiving the crayons personalities. In the Monarch programming, theperson is <strong>to</strong>tally dehum<strong>an</strong>ized so that some alters think they areribbons, some monkeys, some clowns, some dolls, some trees, somelions or tigers, etc. <strong>The</strong> sexual alters are often programmed <strong>to</strong> think ofthemselves as cats <strong>an</strong>d butterflies. While the girl was coloring, herfather reached over the table without warning <strong>an</strong>d <strong>to</strong>ok her colors,“You don’t deserve these colors <strong>an</strong>d I should have taken them awaybefore now. <strong>The</strong> girl had done nothing wrong. This is part of mindcontrol. <strong>The</strong> person learns that there isn’t a right or wrong only that they374


must be obedient. <strong>The</strong> little girl did not even respond when her colorswere y<strong>an</strong>ked away. When the mom talked <strong>to</strong> them, she said“children”--she never once personalized things. <strong>The</strong> parents beg<strong>an</strong><strong>an</strong>other programming session <strong>an</strong>d said something like, “I will sp<strong>an</strong>k you.If you don’t count then you c<strong>an</strong> be sp<strong>an</strong>ked, we will count 20 times.”<strong>The</strong> const<strong>an</strong>t double messages were obviously breaking down thechildren <strong>to</strong> think as programmed rather th<strong>an</strong> respond like normalpeople <strong>to</strong> the outside world. <strong>The</strong> wom<strong>an</strong> turned <strong>to</strong> her little baby <strong>an</strong>dsaid, “Tell daddy good-bye”. When the child waved good-bye, thewom<strong>an</strong> snapped, “Your not going <strong>an</strong>ywhere.” This serves <strong>to</strong> createconfusion. <strong>The</strong>n she kissed him <strong>an</strong>d said, “Baby, do you w<strong>an</strong>t apicture?” We decided <strong>to</strong> say something <strong>to</strong> them, <strong>an</strong>d we did so in theform of a compliment about their children. Neither parent showed <strong>an</strong>ypride in the children when the earlier lady had gushedly complimentedthe children, nor when we complimented them with a sentence.Instead, when we complimented the children, the father beg<strong>an</strong>shooting off a series of difficult questions <strong>to</strong> the boy. This was simplymore programming, but apparently he must have thought that we’dbe impressed with the boy’s ability <strong>to</strong> <strong>an</strong>swer difficult questions thatseemed way beyond what m<strong>an</strong>y teenagers would know. Two str<strong>an</strong>gethings happened during the course of our verbal interaction with thissat<strong>an</strong>ic family. First, the waitresses had given the family free ice creamcoupons, but the parents gave them <strong>to</strong> us without the children evenbatting <strong>an</strong> eyelid. Second, I asked the father what the age of hischildren were <strong>an</strong>d he didn’t know, or acted like he didn’t know. <strong>The</strong>nhe blurted out, they are 1, 2, 3, 4, <strong>an</strong>d 5 years old. His wife knew thatthat <strong>an</strong>swer must have looked bogus <strong>to</strong> us, <strong>an</strong>d she reprim<strong>an</strong>ded him,“You don’t even know the age of your children.” To which he replied,“Yes, they are 2, 3, 4, 5, <strong>an</strong>d 6.” He second <strong>an</strong>swer was equallyimplausible, but his wife didn’t protest, <strong>an</strong>d the poor mind controlledchildren were experiencing just one more element of Sat<strong>an</strong>ic mindcontrol.<strong>The</strong>y are not even allowed <strong>to</strong> realize how old they are. Dates,<strong>an</strong>d times, <strong>an</strong>d ages are kept very confused in the children’s minds forsecrecy <strong>an</strong>d control. Not only that, but by giving a hypnotic induction“1, 2, 3...” the father had lowered each of the alters which wereholding the bodies of his children in<strong>to</strong> a deeper tr<strong>an</strong>ce. With thesealters tr<strong>an</strong>ced, <strong>an</strong>other word from the father could have easily pulledup other alters.OTHER ITEMS THAT PARENTS DO TO ThEIR MONARCH CHILDRENDouble bind communication is commonly given multiples by all of theirabusers. Some of these double binds are well thought out <strong>an</strong>d somejust occur due <strong>to</strong> the craziness of the entire thing. For inst<strong>an</strong>ce, in ritualor programming, the child may have the option <strong>to</strong> stab or be stabbed.375


In fighting the programming, if <strong>an</strong> alter goes <strong>to</strong>ward health, theprogrammers have set in a booby-trap. Which evil does the slave livewith--the lies of the programming or the lies of the external world? Howdoes one tell the truth <strong>to</strong> a therapist, when the therapist is not capableof hearing the truth, <strong>an</strong>d yet still dem<strong>an</strong>ds <strong>to</strong> be <strong>to</strong>ld the truth? Yes,double-binds abound. Another trick is <strong>to</strong> alternate leniency withharshness. This trick is done in the military also, <strong>an</strong>d has been workedwith success by the Chinese government upon the people of RedChina. When leniency is alternated with kindness, the effect isdevastating <strong>an</strong>d disconcerting because the person looses the ability <strong>to</strong>predict what is going <strong>to</strong> happen. Everyone likes <strong>to</strong> control his or her life.Predicting what is going <strong>to</strong> happen is part of a person’s mind gainingcontrol over their environment. Even that control is stripped from aslave. <strong>The</strong>y soon learn <strong>to</strong> quit trying <strong>to</strong> protect themselves, <strong>an</strong>d theyquit trying <strong>to</strong> think for themselves but docilely submit <strong>to</strong> whatever fateassigns them. <strong>The</strong> mind c<strong>an</strong>’t figure life out, so it quits trying <strong>to</strong>underst<strong>an</strong>d life, <strong>an</strong>d just fatally submits. Dr. Green (Mengele) was verygentle when drawing blood, <strong>an</strong>d he was very gentle when giving thechildren X-rays. He would sweet talk them <strong>an</strong>d give c<strong>an</strong>dy. But he wasvery sadistic when he’d follow this up with abuse. <strong>The</strong> programmershave preferred <strong>to</strong> be inconsistent with the children like this. Soon thechild doesn’t know what hate <strong>an</strong>d love are <strong>an</strong>ymore. <strong>The</strong> person, whoclaims he loves them, gives them <strong>to</strong>rture or ab<strong>an</strong>dons them <strong>to</strong> be<strong>to</strong>rtured by someone else. A third trick is <strong>to</strong> give the victim mono<strong>to</strong>noustasks, such as ch<strong>an</strong>ting or copying long amounts of written material.This helps prod the dissociation, <strong>an</strong>d is a <strong>to</strong>rture that doesn’t leavemarks.AN OVERVIEWAll of the elements of mind control are incorporated in<strong>to</strong> the Monarchprogram. If a person surveys what the everyday cult mind controlwhich is NOT part of <strong>to</strong>tal Monarch mind-control looks like, you will findthe same elements of everyday cult control also are employed atvarious places within the Monarch programming of a person’s altersystem. (This didn’t happen by accident either, the <strong>Illuminati</strong> haveexamined all these lesser cults <strong>to</strong> see what they could borrow for theirown mind control.) Some of the elements which the Monarch programshares with other typical types of cult mind control are:1. THE NEEDS OF INDIVIDUALS ARE PROMISED TO BE MET, BUT AREIGNORED FOR GROUP GOALS.376


<strong>The</strong> <strong>Illuminati</strong> h<strong>an</strong>dler (master) will promise <strong>to</strong> meet individual needs ofalters, but these needs are ignored for group goals. For inst<strong>an</strong>ce,certain Monarch alters of a person’s system may be <strong>to</strong>ld they have nofaces <strong>an</strong>d no hearts. <strong>The</strong>y are programmed not <strong>to</strong> see their faces <strong>an</strong>dnot <strong>to</strong> hear <strong>an</strong>y heart beat. If a pulse moni<strong>to</strong>ring machine is hooked up<strong>to</strong> the alter, the alter will go in<strong>to</strong> a tr<strong>an</strong>ce. For inst<strong>an</strong>ce, the h<strong>an</strong>dlermight promise faces <strong>an</strong>d hearts but will never give them <strong>to</strong> theMonarch slave when he could. <strong>The</strong> promise is a control mech<strong>an</strong>ism.2. ISOLATION FROM THE WORLD, SO THAT THE ONLY REALITY IS THELEADER’S REALITY. <strong>The</strong> <strong>Illuminati</strong> isolates the slave so new ideas areavailable or allowed except their cult leader’s ideas. “Whatever thePapa Bear [master] says is reality.” Each alter will only communicatewith a few other alters. What this does is divide the person from theirown parts. <strong>The</strong> will <strong>an</strong>d mind is broken so that there is no org<strong>an</strong>izedresist<strong>an</strong>ce, nor <strong>an</strong>y access <strong>to</strong> other alters who might know something.<strong>The</strong> slave will often be denied mother, gr<strong>an</strong>dmother, gr<strong>an</strong>dfather,aunts, sisters, children, gr<strong>an</strong>dchildren, & friends. <strong>The</strong>y will be deprived ofall naturally occurring relationships via the mind control. This doesn’tthey me<strong>an</strong> exist in a vacuum, it me<strong>an</strong>s that the h<strong>an</strong>dlers will preventnatural relationships <strong>to</strong> develop. Isolation is very key »» <strong>an</strong>d parts aremade <strong>to</strong> feel like <strong>an</strong>imals rather th<strong>an</strong> people <strong>to</strong> isolate them fromhum<strong>an</strong>ity. No ideas are allowed the slave <strong>to</strong> confront theirprogrammer’s lies. <strong>The</strong>y are programmed <strong>to</strong> hate Christ <strong>an</strong>d the Godof the Bible, so that they are isolated from the true God <strong>an</strong>d Hisabund<strong>an</strong>t spiritual resources.3. THE PERSON’S SENSE OF IDENTITY IS LOST. <strong>The</strong> Monarch slave losehis/her sense of self <strong>to</strong> the cult <strong>an</strong>d <strong>to</strong> the person’s master. No sense ofwhere I begin & end, <strong>an</strong>d where the Master begins <strong>an</strong>d ends. <strong>The</strong>Monarch programming goes beyond what m<strong>an</strong>y cult have done, thealters are hypnotized <strong>to</strong> not see their faces, which is part of theiridentity.4. ALTERED STATES & HYPNOSIS IS USED. <strong>The</strong> h<strong>an</strong>dlers/programmers usehypnotic techniques. <strong>The</strong>y induce dissociation by songs, ch<strong>an</strong>ting, guiltinducing sessions, <strong>to</strong>rture, isolation, as well as using songs, repeatingtriggers 3X, <strong>an</strong>d lots of hypnosis.377


5. A SENSE OF PEACE IS INDUCED, ESPECIALLY WHEN ONE MERGES WITHWHOEVER IS LEADING. THE HEAD OF THE CULT WILL TAKE CREDIT FORWHAT THE SLAVE IS. <strong>The</strong>y induce a sense of peace leading <strong>to</strong> thef<strong>an</strong>tasy of merging with leader, often suggested by leader. <strong>The</strong>n thevictim has the abuser placed internally in them. For example, themaster may say he was one with the slave <strong>an</strong>d that he “created” theslave. <strong>The</strong> h<strong>an</strong>dler will claim <strong>to</strong> be God.6. OUT OF BODY EXPERIENCES. Out of body experiences (O-B-E’s) areinduced by the <strong>to</strong>rture & <strong>Illuminati</strong> training, as well as splits.7. SENSORY BOMBARDMENT & FATIGUE. Sensory bombardment used,such as prolonged sleep deprivation, environmental control, <strong>an</strong>d lovebombing. Cages, love bombing of certain alters, <strong>an</strong>d a sterilenursery/<strong>to</strong>ddler room are employed.8. CRITICAL THINKING AND DISAGREEING WITH THE LEADER ISFORBIDDEN. <strong>The</strong> slave must suspend ability <strong>to</strong> think critically or disagreewith leader. <strong>The</strong> slave must never question the Master (also called theh<strong>an</strong>dler), never get <strong>an</strong>gry at the h<strong>an</strong>dler, or else the slave w<strong>an</strong>ts <strong>to</strong> bepunished. <strong>The</strong> slave must always obey or pay with pain. <strong>The</strong> alters aresplintered from others so c<strong>an</strong>’t use their information for <strong>an</strong>alysis.9. <strong>The</strong> slave must reorg<strong>an</strong>ize reality through identification withaggressor (<strong>Illuminati</strong> master). Strong identification is created with themaster. <strong>The</strong> slave is programmed <strong>to</strong> protect the master.10. Individual sees locus (location) of control with the Master <strong>an</strong>d the<strong>Illuminati</strong> rather th<strong>an</strong> self. Programming overrules self.11. Black <strong>an</strong>d white thinking is created by the programming. M<strong>an</strong>y ofthe Gnostic cults (see theFritz’s Be Wise As Serpents book for <strong>an</strong> examination of what a Gnostic378


cult is) have employed these tactics. People in the Jehovah’s Witnesses<strong>an</strong>d CUT, which are Gnostic cults, as well as members of m<strong>an</strong>y othergroups--such as the CIA will recognize that these methods were usedon them. (<strong>The</strong> CIA is in reality just <strong>an</strong>other cult, <strong>an</strong>d <strong>an</strong> <strong>Illuminati</strong>controlledcult at that.)ISOLATIONFor children who are being taken out of Day Care Centers <strong>an</strong>dprogrammed without their parents knowledge, they will be isolatedfrom their real parents. <strong>The</strong> abusers will tell the children that they areactually the “real parents” <strong>an</strong>d that they intend <strong>to</strong> come <strong>an</strong>d take thechild away from its parents later. <strong>The</strong>y will make the innocent child feellike it is cut off <strong>an</strong>d rejected by everyone including the world at large.In a sense, this is true, because the child is expected <strong>to</strong> endure themost horrible abuse <strong>an</strong>d yet has no one <strong>to</strong> talk <strong>to</strong>. Feelings of isolation<strong>an</strong>d despair take control over the child’s mind. <strong>The</strong>se ways of thinkingare also spiritually enh<strong>an</strong>ced by rituals <strong>to</strong> bring in demonic spirits thatwill help insure the child is dominated by feelings of hopelessness.During the entire life of the slave, the h<strong>an</strong>dlers <strong>an</strong>d programmers arealways trying <strong>to</strong> sow distrust in the victim. <strong>The</strong> programming is oftendesigned <strong>to</strong> sow distrust in everyone on the outside except the godlikefigure the Master. Even the Master is not trusted so much as feared <strong>an</strong>dobeyed by the slave. <strong>The</strong> slave is also subjected <strong>to</strong> isolation as a childbeing placed in<strong>to</strong> freezers, closets, dark rooms, boxes <strong>an</strong>d isolationt<strong>an</strong>ks. Sensory deprivation is a serious thing, that has been discovered<strong>to</strong> cause people <strong>to</strong> hallucinate. <strong>The</strong> brain goes in<strong>to</strong> <strong>an</strong> altered state justfrom sensory deprivation. Polar explorers who see only white for days onend must deal with this d<strong>an</strong>ger.HANDWRITING MODIFICATIONPsychology developed over the years a number of projective,objective <strong>an</strong>d subjective tests of personality. Ludwig Klages (ofGerm<strong>an</strong>y), H.J. Eysenck (of Engl<strong>an</strong>d), <strong>an</strong>d M.N. Bunker (of the U.S.) aresome of the notable researchers who <strong>to</strong>ok h<strong>an</strong>dwriting <strong>an</strong>alysis out ofthe occult realm <strong>an</strong>d in<strong>to</strong> the scientific realm. (<strong>The</strong> co-author, Fritz,happens <strong>to</strong> be a certified Grapho<strong>an</strong>alyst through IGAS, who has doneGrapho<strong>an</strong>alysis professionally. IGAS has strict st<strong>an</strong>dards not <strong>to</strong> allowmembers <strong>to</strong> do ahything associated with the occult, but insists theykeep their work on a scientific basis.) When a person writes, he will useabout 200 separate muscles in the h<strong>an</strong>d, arm, <strong>an</strong>d body. <strong>The</strong> mindcoordinates all these muscle movements. A good h<strong>an</strong>dwriting <strong>an</strong>alyst379


has about 800 different things that he c<strong>an</strong> look for in a sample ofh<strong>an</strong>dwriting, such as how hard did the writer write with his instrument,how big, where did he start on the paper, how did he cross his “t” etc.In other words, the mind in order <strong>to</strong> write had <strong>to</strong> make hundreds ofdecisions within seconds. <strong>The</strong>re are <strong>to</strong>o m<strong>an</strong>y decisions <strong>to</strong> make themall the decisions consciously. This is why document examiners c<strong>an</strong>authenticate signatures. Most of the m<strong>an</strong>y decisions as one writes aredone subconsciously, <strong>an</strong>d the decisions are influenced by state ofmind, personality, the state of the physical body, <strong>an</strong>d the environment.<strong>The</strong> goodh<strong>an</strong>dwriting <strong>an</strong>alyst is able <strong>to</strong> work backwards. Why was thedecision made <strong>to</strong> make the capital P look like <strong>an</strong> L? Why did theperson start their writing half-way in<strong>to</strong> the paper <strong>an</strong>d waste half thepiece of paper? Through scientific studies <strong>an</strong>d observations, a vastwealth of underst<strong>an</strong>ding has developed by graphologists about whycertain decisions are made. Some graphologists use a wholisticmethod, others like grapho<strong>an</strong>alysts, <strong>an</strong>alyze each stroke. Both methodswill give the same results if the h<strong>an</strong>dwriting <strong>an</strong>alyst is skilled at applyingthe principles of graphology. H<strong>an</strong>dwriting <strong>an</strong>alysis has not gotten thecredibility it deserves, in part, because it is such a powerful diagnostic<strong>to</strong>ol, the intelligence agencies have w<strong>an</strong>ted <strong>to</strong> keep it <strong>to</strong> themselves.However, the nation of Israel, uses h<strong>an</strong>dwriting <strong>an</strong>alysis <strong>to</strong> hire with, <strong>an</strong>da high percentage of the businesses use it in hiring also. <strong>The</strong> nation ofIsrael has had a high rate of success with h<strong>an</strong>dwriting <strong>an</strong>alysis. Howdoes h<strong>an</strong>dwriting <strong>an</strong>alysis play a part in the mind control? Severalways. A number of the programmers are skilled in h<strong>an</strong>dwriting <strong>an</strong>alysis.<strong>The</strong>y are well aware that the abuse of their slaves will show in theh<strong>an</strong>dwriting. Through behavior modification (usually <strong>to</strong>rture) the frontalters are trained <strong>to</strong> write in a fashion that hides the abuse. <strong>The</strong> abusewill show in the h<strong>an</strong>dwriting of most of the alters, so m<strong>an</strong>y of them areprogrammed not <strong>to</strong> read or write. This is why some of the child alters willhave older alters write for them.<strong>The</strong> programmers were also aware of how the mind heals/ch<strong>an</strong>gesitself via h<strong>an</strong>dwriting therapy. If the mind will place enough energy in<strong>to</strong>writing a particular way--it will go ahead <strong>an</strong>d put enough energy in<strong>to</strong>becoming what it writes. In other words, if I am lazy, but I getdetermined enough <strong>to</strong> focus the brain so that it doesn’t makeh<strong>an</strong>dwriting strokes that indicate laziness, then my brain will alsoch<strong>an</strong>ge its lazy attitude in other ways. In other words, I c<strong>an</strong> begin <strong>to</strong>ch<strong>an</strong>ge a personality trait by working on the h<strong>an</strong>dwriting decisions thatstem from that trait. <strong>The</strong> programmers c<strong>an</strong> <strong>an</strong>d do help modify theirslaves’ personalities this way. <strong>The</strong>y of course will employ a number ofpersonality ch<strong>an</strong>ging techniques as a group package. <strong>The</strong> goal is <strong>to</strong>bring as much pressure <strong>to</strong> bear as possible <strong>to</strong> get the original traitmodified. This will be done in accord<strong>an</strong>ce with the programming goalsfor the various alters within a system. Remember, some alters need <strong>to</strong>be outgoing <strong>an</strong>d other reticent, some mel<strong>an</strong>cholic, <strong>an</strong>d others380


s<strong>an</strong>guine or choleric. <strong>The</strong> programmers know what they w<strong>an</strong>t <strong>an</strong>d how<strong>to</strong> modify what they have <strong>to</strong> get the temperament <strong>an</strong>d personalitytraits they w<strong>an</strong>t.BEHAVIOR MOD (MODIFICATION)Behavior modification comes in various packages. One package hasbeen called ELT (Electrolytic Trtmt) developed by H.C. Tien. One simpleversion of behavior mod is <strong>to</strong> find out what someone has done which isgood, <strong>an</strong>d praise <strong>an</strong>d reinforce that behavior. <strong>The</strong>n state the goal. Andthen continue <strong>to</strong> reinforce promptly the good things the person isdoing. <strong>The</strong> goal in mind must be measurable. An example of this, mightbe for a h<strong>an</strong>dler <strong>to</strong> praise his kitten <strong>an</strong>d <strong>to</strong> purchase it nice things if aclient is satisfied with the sexual service he got. <strong>The</strong> reinforcementneeds <strong>to</strong> be soon, <strong>an</strong>d appropriate. ‘‘Thinking behavior’’ is a term thatbehavior mod scientists use. “Adverse conditioning” is <strong>an</strong>other.Anectine, which paralyzes the body <strong>an</strong>d makes one think they aresuffocating, c<strong>an</strong> be used for aversion conditioning. <strong>The</strong> victim is <strong>to</strong>ldnot <strong>to</strong> do a particular behavior or else experience discomfort. Whenbehavior modification is done in programming, you c<strong>an</strong> be sure thatthere is paper work done <strong>to</strong> chart the progress. Rather th<strong>an</strong> worryabout what a person is thinking, the behaviorist charts a person’sbehavior <strong>an</strong>d then gives reinforcements of correct behavior (or theopposite adverse rewards of punishment) <strong>to</strong> modify it. Victims areconditioned <strong>to</strong> carry out certain behaviors. If <strong>an</strong> alter does somethingwrong, there is <strong>an</strong> immediate consequence set up for it. Soon it isconditioned not <strong>to</strong> do what the programmer doesn’t w<strong>an</strong>t. <strong>The</strong>behavior mod scientists believe that creativity c<strong>an</strong> be controllable.When a child creates a new form he is rewarded. Soon the child learns<strong>to</strong> create. <strong>Illuminati</strong> Delta-Beta alters will be trained in espionage. <strong>The</strong>ywill be trained <strong>to</strong> recognize a person’s physical identity inst<strong>an</strong>tly. Onemethod of training which has been used is <strong>to</strong> teach people <strong>to</strong>remember reflexively rather th<strong>an</strong> <strong>an</strong>alytically. Thous<strong>an</strong>ds of faces orthous<strong>an</strong>ds of license plates, or whatever are flashed on a screen, <strong>an</strong>dwhen a repeat is shown the person must press a but<strong>to</strong>n. If a mistake ismade, the slave is treated <strong>to</strong> a nasty little shock. After a while a persondevelops the correct reflexes. Slaves are being trained in recognitionfrom the time they are small children, this is import<strong>an</strong>t so that they c<strong>an</strong>build their internal worlds with mirror images <strong>an</strong>d other confusing things.<strong>The</strong> following “deeper” programming is <strong>an</strong> example of classicalconditioning. <strong>The</strong> child’s h<strong>an</strong>d is cut so that the child goes in<strong>to</strong> a tr<strong>an</strong>ceof shock, <strong>an</strong>d then each time they use the word “deeper” they cutdeeper <strong>to</strong> enh<strong>an</strong>ce the shock/tr<strong>an</strong>ce state. By pairing the word withthis trauma, when they are through, the word “deeper- asleep” willthrow some alters inst<strong>an</strong>tly in<strong>to</strong> a very deep tr<strong>an</strong>ce.381


PSYCHOLOGICAL MOTIVATIONWhen a person has been knocked down <strong>an</strong>d degraded, traumatizedby poor sleep <strong>an</strong>d little food <strong>an</strong>d water, he is more susceptible <strong>to</strong>suggestion. He c<strong>an</strong> then be <strong>to</strong>ld that he himself is the cause for his owndegradation. If he just behaves betters, his treatment will improve.When the person accepts his guilt for the bad situation he is in, then theprogrammers give a target for the blame--God, country, or whateverthe person had depended upon. <strong>The</strong> programmer then aggravatesthese hostile feelings, <strong>an</strong>d keeps nurturing them until the person is lividwith <strong>an</strong>ger <strong>to</strong>ward the object of blame. <strong>The</strong> victim is coached <strong>to</strong>project their blame on<strong>to</strong> this target of blame. When this is accepted,the conditions for the victim improve. Once the person has targetedtheir blame, then the Programmer becomes the friend <strong>to</strong> help one fightthe evil target. Anything <strong>an</strong>d everything is rationalized in this “Allbecomes fair in war.” Enemies are easy <strong>to</strong> create. People readilyaccept them. <strong>The</strong> intelligence community has long played on people’sfears about communism. People might be shocked <strong>to</strong> realize that thiswas one of Hitler’s favorite methods <strong>to</strong> recruit loyalty from people. It iswhy the Nazi’s secretly burned down the Reichstag, <strong>an</strong>d then blamedthe communists. <strong>The</strong> <strong>Illuminati</strong> are masters at making Christi<strong>an</strong>ity thefault for everything from homosexual suicide <strong>to</strong> the world wars.NEURO-LINGUISTIC PROGRAMMINGNLP me<strong>an</strong>s Neuro-Linguistic Programming, which are practicalcommunication skills. Programmers were using NLP before it becameknown as NLP in 1976. Some NLP techniques are obvious truths, <strong>an</strong>dsome are more subtle truths in dealing with hum<strong>an</strong> nature. NLP c<strong>an</strong> bemore of <strong>an</strong> art, th<strong>an</strong> a science. One of the truths in NLP is “Everyonelives in their unique reality built from their sense impressions <strong>an</strong>dindividual experiences of life, <strong>an</strong>d we act on the basis of what weperceive our model of the world.” (O’Connor, Joseph & John Seymour.Introducing NLP. S<strong>an</strong> Fr<strong>an</strong>cisco, CA: Aquari<strong>an</strong> Press, 1993, p. 4 .) That iswhy alters have their worlds created by their programmers, <strong>an</strong>d thenthe occult alters are indoctrinated with sat<strong>an</strong>ic beliefs. ( Chap. 11 PartA deals with this indoctrination.) Let’s list some other “assumptions” thatNLP practitioners believe in without explaining them:Almost all communication is non-verbal.Knowledge of content is not required <strong>to</strong> make behavioral ch<strong>an</strong>ges.Our internal representation of the world is not the world but only ourown feeble map of it. <strong>The</strong> map is not the terri<strong>to</strong>ry.382


People will choose predicates which correspond <strong>to</strong> whatrepresentational system they are using, <strong>an</strong>d which one they choosec<strong>an</strong> be seen from eye accessing cues.If one studies NLP, one will find that NLP books such as Basic TechniquesBook II by Clifford Wright, teach people how <strong>to</strong> create dissociativestates which are alternate personalities, <strong>an</strong>d that they teach peoplehow <strong>to</strong> develop different states of mind, <strong>an</strong>d pseudo multiplepersonalities. It is difficult <strong>to</strong> express all the different cross-overs that NLPhas with Monarch Programming, but at different times the concepts ofNLP certainly would be helpful <strong>to</strong> the h<strong>an</strong>dlers. However, it must bestressed that NLP IS NOT Monarch Programming. One of NLP’ssuggestions is that a person assess their “present state” <strong>an</strong>d their“desired state.” This simply common sense suggestion is often carriedout during programming. <strong>The</strong> Programmer will tell the victim WHAT KINDof alters they w<strong>an</strong>t produced <strong>an</strong>d HOW MANY when they begin the<strong>to</strong>rture. <strong>The</strong> motivation <strong>to</strong> do this is also suggested by NLP <strong>an</strong>d isaccomplished by the programmers threats <strong>to</strong> the person’s life, <strong>an</strong>d bythe person’s desire <strong>to</strong> be free of pain <strong>an</strong>d <strong>to</strong>rture. Mil<strong>to</strong>n Erickson’s workon altered states has been picked up by NLP. Likewise at least part ofthe programming hypnosis is based on Erickson’s ideas.CLUES FOR OBSERVING A VICTIMLateral Eye Movement (LEM) c<strong>an</strong> be a useful skill <strong>to</strong> the programmer.Monarch victims are sometimes programmed so that the real LEM is notdone publicly by the victim, <strong>to</strong> prevent people from getting visual cluesas <strong>to</strong> what is going on in their mind. A person who is thinking in visualimages will generally speak more quickly <strong>an</strong>d at a higher pitch th<strong>an</strong>someone who is not. <strong>The</strong>se types of clues help the Programmers bemore skilled, but it isn’t a necessity.ANCHORSNLP researchers have noticed that people have emotional states inwhich the entire body will take up a posture in carrying it out. Memoriesc<strong>an</strong> come in<strong>to</strong> a person that causes the body <strong>to</strong> take up the negativestates again. <strong>The</strong> NLP practitioners have developed l<strong>an</strong>guage whichincludes such terms as Anchors, emotional states, <strong>an</strong>d triggers. <strong>The</strong>sewords are used <strong>to</strong> describe ideas that have long been in use.383


For inst<strong>an</strong>ce, let’s say that when you heard a particular song at somepoint in your life you were having a good time (emotional state). Nowthat every time you receive a trigger <strong>to</strong> that memory, such as the song,you regain that good feeling that is attached <strong>to</strong> the memory of thesong. Every time you hear the song, you feel good, which then in turn,continues <strong>to</strong> act as reinforcement of the association of a good feeling<strong>to</strong> the song. A stimulus that is linked <strong>to</strong> <strong>an</strong>d triggers a physiological stateor emotional state is called <strong>an</strong> <strong>an</strong>chor. Our lives are filled with naturallyoccurring <strong>an</strong>chors, such as our favorite childhood smells, or the alarmclock. One of the <strong>Illuminati</strong> kingpins in Germ<strong>an</strong>y, a Krupp, liked thesmell of m<strong>an</strong>ure, <strong>an</strong>d built his house so he could smell horse m<strong>an</strong>ure allday. NLP is the art of building associations with <strong>an</strong> <strong>an</strong>chor. A pastemotion c<strong>an</strong> be linked <strong>to</strong> something <strong>to</strong>day. If a person is afraid ofpublic speaking, then a good feeling c<strong>an</strong> be linked <strong>to</strong> giving talks. <strong>The</strong>skilled programmer will <strong>an</strong>chor <strong>an</strong> emotion with several sense cues--including audi<strong>to</strong>ry, visual, <strong>an</strong>d <strong>to</strong>uch. <strong>The</strong> person visualizes <strong>an</strong>emotional state from the past. When the state is reaching its peak, the<strong>an</strong>chor is placed in. <strong>The</strong> <strong>an</strong>chor needs <strong>to</strong> be unique, distinctive, & easy<strong>to</strong> repeat in the exact form that it was done. Much of the traumabasedprogramming is actually setting <strong>an</strong>chors using extreme trauma.When the <strong>an</strong>chors are tested (fired), if the emotional state is pulled up,then the <strong>an</strong>chors have worked. Firing two separate <strong>an</strong>chors at once iscalled collapsing <strong>an</strong>chors. Two separate states c<strong>an</strong> be fired at once.<strong>The</strong>re is a methodology for collapsing <strong>an</strong>chors <strong>to</strong>gether.FUTURE PACINGFuture pacing c<strong>an</strong> be used <strong>to</strong> help program a person <strong>to</strong>ward hisoccupational objective which was charted for the victim when theywere small. Future pacing is a mental rehearsal that is practiced in theimagination so that the person c<strong>an</strong> deal with some future challenge.Expectations c<strong>an</strong> often become self-fulfilling prophecies. NLP also isused <strong>to</strong> teach people how <strong>to</strong> learn. It teaches people <strong>to</strong> learn avariety of methods for a single skill. However, this type of self-help info isnot freely given <strong>to</strong> the slave. It might be used if the programmersneeded <strong>to</strong> develop the person hypnotically in a certain direction.PACING FOR HYPNOSISBecause Mil<strong>to</strong>n Erickson st<strong>an</strong>ds out as a genius among those who haveused hypnosis, <strong>an</strong>d people are still trying <strong>to</strong> figure out fully what he did,it is appropriate <strong>to</strong> mention his work. We don’t know how these ideas ofMil<strong>to</strong>n Erickson’s are used by the Programmers. We do know that the384


CIA has. paid close attention <strong>to</strong> his ideas, <strong>an</strong>d that some of theProgrammers have some of the smoothest <strong>to</strong>ngues. If there is someway <strong>to</strong> utilize Erickson’s work <strong>to</strong> help control <strong>Mind</strong>-controlled slaves,then the Intelligence agencies have no doubt found it. On the flip side,several dc-programmers used Ericksoni<strong>an</strong> methods <strong>to</strong> unlock theprogramming of the people they w<strong>an</strong>t <strong>to</strong> help. What we describe inthis section is just a small sampling of Erickson’s methods. Another typeof NLP pacing besides the one just previously mentioned wasdeveloped by Mil<strong>to</strong>n Erickson. He would gain rapport with <strong>an</strong>yone bydescribing <strong>to</strong> them what they were feeling, hearing <strong>an</strong>d seeing. Hewould induce a peaceful state by speaking slowly, using a soft <strong>to</strong>nality,<strong>an</strong>d pacing his speech <strong>to</strong> the person’s breath. Gradually hypnoticsuggestions are introduced <strong>to</strong> lead them in<strong>to</strong> what is called“downtime.” He would gently encourage people with gentlesuggestions such as, ‘It’s easy <strong>to</strong> close your eyes whenever you wish <strong>to</strong>feel more comfortable...” But you may wonder how c<strong>an</strong> <strong>an</strong>yone knowwhat someone else is thinking? Erickson developed l<strong>an</strong>guage that wasvague enough for people <strong>to</strong> match their own thinking <strong>to</strong> what hedescribed. He would use smooth tr<strong>an</strong>sitional words such as “while”,“<strong>an</strong>d”, <strong>an</strong>d “as”. <strong>The</strong> type of vague sentences he would say are “It iswell known that people c<strong>an</strong> read books <strong>an</strong>d make ch<strong>an</strong>ges.” Mil<strong>to</strong>nErickson learned <strong>to</strong> distract the domin<strong>an</strong>t brain hemisphere, <strong>an</strong>d alsospeak in a complex way that all seven (plus or minus two parts of theconscious mind) would get engaged in trying <strong>to</strong> figure out what hisambiguous statements me<strong>an</strong>t. Mil<strong>to</strong>n found that he could say <strong>an</strong>ythingif he set it up in the context of someone else saying it. He also foundthat the unconscious mind does not process the linguistic negative.Rather th<strong>an</strong> tell a child “Don’t fall” tell it “Be careful.”REFRAMING WITH METAPHORSMetaphors, some from Druidism or from some other occult teachings,are used by the Programmers. For inst<strong>an</strong>ce, the seasonal ch<strong>an</strong>ges thatleaves on trees make is <strong>an</strong> example of a programming metaphor.For those readers who don’t know what refraining is, the following inthe book Refraining, Neuro-Linguistic Programming <strong>an</strong>d theTr<strong>an</strong>sformation of Me<strong>an</strong>ing by B<strong>an</strong>dler <strong>an</strong>d Grinder (Moab, UT: RealPeople Press, 1982) is <strong>an</strong> excellent s<strong>to</strong>ry <strong>to</strong> explain it:“A very old Chinese Taoist s<strong>to</strong>ry describes a farmer in a poor countryvillage. He was considered very well-<strong>to</strong>-do, because he owned a horsewhich he used for plowing <strong>an</strong>d for tr<strong>an</strong>sportation. One day his horse385


<strong>an</strong> away. All his neighbors exclaimed how terrible this was, but thefarmer simply said ‘Maybe.’ “A few days later the horse returned <strong>an</strong>dbrought two wild horses with it. <strong>The</strong> neighbors all rejoiced at his goodfortune, but the farmer just said ‘Maybe.’ “<strong>The</strong> next day the farmer’sson tried <strong>to</strong> ride one of the wild horses; the horse threw him <strong>an</strong>d brokethe leg. <strong>The</strong> neighbors all offered their sympathy for his misfortune, butthe farmer again said ‘Maybe.’ “<strong>The</strong> next week the conscriptionofficers came <strong>to</strong> the village <strong>to</strong> take young men for the army. <strong>The</strong>yrejected the farmer’s son because of his broken leg. When theneighbors <strong>to</strong>ld him how lucky he was, the farmer replied, ‘Maybe.’<strong>The</strong> me<strong>an</strong>ing of <strong>an</strong> event depends upon the FRAME we place upon it.Those frames are perceptions. Occult fairy tales are great for refrainingevents. A frog turns in<strong>to</strong> a prince. Rudolf s embarrassing red nosebecomes a guiding light <strong>to</strong> bring happiness <strong>to</strong> people. M<strong>an</strong>y of thecommon things in our everyday life are refrained by the Programmers<strong>to</strong> have hidden mind-control me<strong>an</strong>ings. <strong>The</strong> Teddy Bear the child isgiven by her Daddy is <strong>to</strong> remind her how helpless she is <strong>to</strong> prevent himfrom raping her. <strong>The</strong> carousel <strong>to</strong>y is <strong>to</strong> remind the child of dissociation<strong>an</strong>d the internal carousel built in<strong>to</strong> the mind. M<strong>an</strong>y of the things thatparents, who are intentionally raising a programmed child, do, looknice on the outside unless one c<strong>an</strong> reframe what they are doing in thecontext of <strong>to</strong>tal-mind-control based on trauma <strong>an</strong>d fear. Refrainingc<strong>an</strong> be done by collapsing <strong>an</strong>chors. For inst<strong>an</strong>ce, the sober part of <strong>an</strong>alcoholic <strong>an</strong>d the drunk state of the alcoholic are given the same<strong>an</strong>chor <strong>an</strong>d then these are collapsed <strong>to</strong>gether <strong>to</strong> get the drunk <strong>to</strong> staysober. <strong>The</strong> two states are taken in a process of integration for therefraining <strong>to</strong> occur. Refraining someone with MPD is almost impossiblewithout integration, but refraining a particular alter with metaphors isnot out of reach. <strong>The</strong> programmers have much more ch<strong>an</strong>ce <strong>to</strong>reframe while they program th<strong>an</strong> the therapist, because theprogrammers set in defensive programs <strong>to</strong> prevent other’s fromreframing.POWER WORDS, REVERSALS, & PUNSIn NLP, 7 senses are taken in<strong>to</strong> consideration. First we see, then wehear, <strong>an</strong>d finally we have the senses of internal kinetics <strong>an</strong>d ouremotions. <strong>The</strong> Programmer also takes in<strong>to</strong> consideration what arecalled “power words”. Those are words which have specific me<strong>an</strong>ingfor the person. <strong>The</strong> programmers also love <strong>to</strong> use reversals <strong>an</strong>d puns, forinst<strong>an</strong>ce in Disney’s Ducktales the character says, “I s<strong>to</strong>le ‘em fair <strong>an</strong>dsquare.” Other typical reversals are “Life is death, <strong>an</strong>d death is life”, “Pa386


in is love, <strong>an</strong>d love is pain.” Another example is one used on CathyO’Brien, where the words “Service Entr<strong>an</strong>ce” were used <strong>to</strong> me<strong>an</strong>“Serve us. En-Tr<strong>an</strong>ce.” Naming <strong>an</strong> alter “Allison Wonderl<strong>an</strong>d” --a pun onAlice in Wonderl<strong>an</strong>d--is <strong>an</strong>other example of a programming pun. <strong>The</strong>programmers love <strong>to</strong> use these types of things.THE MIND’S NATURAL ALARM CLOCK.<strong>The</strong> programmer’s have made use of the mind’s natural ability <strong>to</strong> wakeitself up like <strong>an</strong> ‘alarm clock” if it w<strong>an</strong>ts. Slaves may be given thecoded message that the draconi<strong>an</strong> enforcer will come by <strong>to</strong> pickthem up at 1 a.m. <strong>The</strong> slave will au<strong>to</strong>matically wake up in the middle ofthe night, <strong>an</strong>d in a tr<strong>an</strong>ce like a sleep walking, a deep LGP alter willtake the slave out <strong>to</strong> the street <strong>to</strong> be picked up. M<strong>an</strong>y slaves are beingused at night without their families suspecting <strong>an</strong>ything. Sleepingpatterns are also related <strong>to</strong> personality. REM sleep is believed <strong>to</strong> helpres<strong>to</strong>re the effectiveness of certain brain pathways in whichnorepinephrine is a tr<strong>an</strong>smitter subst<strong>an</strong>ce. By programming differentalters <strong>to</strong> have certain sleep patterns, their personalities c<strong>an</strong> beadjusted. Of course this is done in conjunction with m<strong>an</strong>y other aspectsof mind control.<strong>The</strong> RIGHT BRAIN & the UNCONSCIOUS.<strong>The</strong> Programmers are also aware that right-h<strong>an</strong>ded people use theirleft brain hemisphere for highly conscious processess which requiregood attention, focus & intentional decisions; while their right brain willtend <strong>to</strong> work on the unconscious & au<strong>to</strong>matic chores. Split brainprogramming takes this contrast in<strong>to</strong> account.387


CHAPTER 10THE 10th SCIENCE - USING SPIRITUAL THINGS TOCONTROL A PERSON.388


<strong>The</strong> spiritual for programming laid by the programmers are thegenerational spirits which are laid in the womb & introduced <strong>to</strong> thechild when verbal as the child's "friend" & "spirit guide." A cl<strong>an</strong>'s guidingspirit is also called a <strong>to</strong>tem. <strong>The</strong> keepers or guardi<strong>an</strong>s protect the spiritswithing <strong>an</strong> illuminati system. <strong>The</strong>re will be one alter which knows all thedemons which have been layered in. From the age of five, the child'scult parts will be taught the genealogical his<strong>to</strong>ries of their spirit guides.At the age of twelve, some c<strong>an</strong>didates for Americ<strong>an</strong> tribal chiefs had<strong>to</strong> wait in the wild for their <strong>to</strong>tem <strong>to</strong> guide them. <strong>The</strong>y must remain inthe forest untill their guiding spirit appears. This is why the <strong>Illuminati</strong> studythe xibali<strong>an</strong> mysteries written in the Popul Vuh.Saving this chapter for last (of the mind, body, spirit chapters) is likesaving the best wine for last. <strong>The</strong> authors know first h<strong>an</strong>d that the<strong>Illuminati</strong> fears more th<strong>an</strong> <strong>an</strong>y other information getting out, that thespiritual aspects of programming would be revealed. This chapter hasbeen org<strong>an</strong>ized in<strong>to</strong> the following parts: a. using spiritual principlesagainst a person, b. how the Monarch program miniaturizes what isdone on a larger scale, c. dehum<strong>an</strong>ization, d. fear, e. the use of guilt,shame & ridicule & <strong>an</strong>ger f. teaching that the master is God, g. portals,focal points, h. vows & oaths, i. the use of demon possession, layeringetc., j. the use of <strong>an</strong>gel alters, k. the use of Scripture, l. <strong>The</strong>taprogramming. <strong>The</strong> 10th science includes some of the most secretelements of the Monarch programming, <strong>an</strong>d certainly some of themost controversial. Psychologists <strong>an</strong>d psychiatrists are <strong>an</strong> unlikely group<strong>to</strong> delve in<strong>to</strong> demonology, although there have been a number ofstudies done in this area. Six examples of such studies:Braude, S.E. (1988). “Mediumship <strong>an</strong>d multiple personality.” Journalof the Society for Psychical Research, 55, 177-195.Krippner, 5. (1987). “Cross-cultural approaches <strong>to</strong> multiplepersonality disorder: Practices in Brazili<strong>an</strong> spiritism.” Ethos, 15, 273-295.Rodgers, R.L. (1991). “Multiple personality <strong>an</strong>d ch<strong>an</strong>neling.”Jefferson Journal of Psychiatry, 9, 3-13.Rogo, D.S. (1987). “<strong>The</strong> spiritual side of multiple personality.” In D.S.Rogo, <strong>The</strong> inf<strong>an</strong>tile boundary: A psychic look at spirit Possession,madness, <strong>an</strong>d multiple personality (pp. 243-246). New York: Dodd,Mead, <strong>an</strong>d Co.Ronquillo, E.B. (1991). “<strong>The</strong> influence of ‘Espiritismo’ on a case ofmultiple personality disorder.” Dissociation, 4, 39-45.Smith, RD. (1981). “Hypnosis, multiple personality, <strong>an</strong>d magic: A casestudy.” Voices: the Art <strong>an</strong>d Science of Psycho-therapy, 17, 20-23.389


<strong>The</strong> Gamma programming is the secret layering in of demons. Howeverone w<strong>an</strong>ts <strong>to</strong> describe these demons--the victim has <strong>to</strong> deal with their“reality”. <strong>The</strong> ceremonies <strong>to</strong> demonize the victim occur even beforethey are born. Generational spirits are very import<strong>an</strong>t <strong>to</strong> determine howthe Programmers program a person. But this 10th science goes waybeyond just demonology, because it deals with the fundamental issuesthat effect our views of God, our fellowship with Almighty God, <strong>an</strong>d ourview of the occult sciences of astral projection, ESP, telepathy, etc.PART A - THE USE OF SPIRITUAL PRINCIPLES TO ISOLATE THE SYSTEM FROMGOD.In the course of deprogramming Monarchs, <strong>an</strong>d rubbing shoulders withprogrammers, it became clear that the programmers of the Monarchprogram are fully aware of the spiritual principles which are inoperation for everyone. In 1930, a leader of one of the groups which<strong>to</strong>day carries out trauma-based mind-control, wrote that the occultmasters are not interested in uplifting the souls of men, but that “<strong>The</strong>seMasters. .. have in reality no interest in soul or astral development,except as a me<strong>an</strong>s of forming passive illuminized <strong>to</strong>ols, completelycontrolled in mind <strong>an</strong>d actions.” <strong>The</strong> Monarch victims of <strong>to</strong>day are thetail end of centuries of efforts by the Kaballists, Freemasons, <strong>an</strong>d the<strong>Illuminati</strong> adepts <strong>to</strong> completely control other hum<strong>an</strong> beings.<strong>The</strong> following quote comes from a communist m<strong>an</strong>ual on how <strong>to</strong>brainwash a nation. It could just have well been written by Monarch<strong>Mind</strong>-Control Programmers. “<strong>The</strong> first thing <strong>to</strong> be degraded in <strong>an</strong>ynation is the state of M<strong>an</strong>, himself. Nations which have high ethical<strong>to</strong>ne are difficult <strong>to</strong> conquer. <strong>The</strong>ir loyalties are hard <strong>to</strong> shake, theirallegi<strong>an</strong>ce <strong>to</strong> their leaders is f<strong>an</strong>atical, <strong>an</strong>d what they usually call theirspiritual integrity c<strong>an</strong>not be violated by duress. It is not efficient <strong>to</strong>attack a nation in such a frame of mind. It is the basic purpose of[mind-control] <strong>to</strong> reduce that state of mind <strong>to</strong> a point where it c<strong>an</strong> beordered <strong>an</strong>d enslaved. Thus, the first target is M<strong>an</strong>, himself. He must bedegraded from a spiritual being <strong>to</strong> <strong>an</strong> <strong>an</strong>imalistic reaction pattern. Hemust think of himself as <strong>an</strong> <strong>an</strong>imal, capable only of <strong>an</strong>imalisticreactions. He must no longer think of himself, or of his fellows, ascapable of ‘spiritual endur<strong>an</strong>ce,’ or nobility... “As it seems in foreignnations that the church is the most ennobling influence, each <strong>an</strong>devery br<strong>an</strong>ch <strong>an</strong>d activity of each <strong>an</strong>d every church, must, one way,or <strong>an</strong>other, be discredited. Religion must become unfashionable bydemonstrating broadly, through pyschopolitical indoctrination, that thesoul is non-existent, <strong>an</strong>d that M<strong>an</strong> is <strong>an</strong> <strong>an</strong>imal.” Later this chapter will390


describe how a person is dehum<strong>an</strong>ized.One spiritual principle is that if you c<strong>an</strong> get a person <strong>an</strong>gry at God, youc<strong>an</strong> get that person <strong>to</strong> commit <strong>an</strong>y sin. Great effort is taken, via stagedevents <strong>to</strong> make the victim being programmed certain that God hasrejected them. For inst<strong>an</strong>ce, some victims had someone play God <strong>an</strong>dwalk away from them when they needed help in a life & deathsituation. <strong>The</strong> 1980 Hollywood movie Altered States, which is about auniversity professor in the 1960s who experiments with mind-alteringdrugs <strong>an</strong>d sensory deprivation t<strong>an</strong>ks, shows some scenes where Godturns in<strong>to</strong> a goat. Some of the religious scenes in this movie, matchsome of the <strong>an</strong>ti-God/religious programming of some Monarch slaves.<strong>The</strong> Monarch slaves are repeatedly warned that God is cruel <strong>an</strong>djudgmental, <strong>an</strong>d that He w<strong>an</strong>ts <strong>to</strong> destroy them for the wicked thingsthey have done. Bible verses that tell of the wrath of God & God’s<strong>an</strong>ger are read <strong>to</strong> the victim. An example of how the slave isprogrammed <strong>to</strong> hate God will now be given. A hypnotic drug will begiven the victim when they are about 6 years of age. This will relax theperson <strong>an</strong>d allow the programmers <strong>to</strong> take the child in<strong>to</strong> the deepesttr<strong>an</strong>ce, so that the programming will be sure <strong>to</strong> enter in<strong>to</strong> the very fiberof the child’s being. After several hours of being in a deep tr<strong>an</strong>ce, asthe drug begins <strong>to</strong> wear off, the child will be strapped very secure in<strong>to</strong>a tight fitting coffin. A m<strong>an</strong> with long white hair, <strong>an</strong>d a long robe, withs<strong>an</strong>dals, staff <strong>an</strong>d a white robe will present himself before the child,<strong>an</strong>d <strong>an</strong>nounce that he is “God the great I AM”. <strong>The</strong>n “God” will look ina big book <strong>an</strong>d <strong>an</strong>nounce he c<strong>an</strong>not find the person’s name so he willhave <strong>to</strong> send the person <strong>to</strong> hell for being bad. <strong>The</strong> coffin will then belowered in<strong>to</strong> a deep pit---like a mine shaft, <strong>an</strong>d the victim will be <strong>to</strong>ldthat when they c<strong>an</strong> no longer hear God’s voice that they will be a cat<strong>an</strong>d not hum<strong>an</strong>. God c<strong>an</strong>’t find them in the book because they haveno soul, <strong>an</strong>d are a cat. Deeper <strong>an</strong>d deeper the child is lowered. <strong>The</strong>yare <strong>to</strong>ld this is the penalty for having tried <strong>to</strong> pray <strong>to</strong> God.<strong>The</strong> programmers make sure that the slave is implicated in m<strong>an</strong>y grosssins, such as the murder of innocent children, in order <strong>to</strong> insure that theperson is sure that God hates them. <strong>The</strong>n the victim is <strong>to</strong>ld that God is aconsuming wrath who hates them. <strong>The</strong> injustice of God creating aworld of suffering is also taught <strong>to</strong> the slave. All this is <strong>to</strong> insure that thevictim hates God. That hatred <strong>to</strong>ward God will express itself in thevictim’s system’s willingness <strong>to</strong> do <strong>an</strong>y sin, without conscience.391


PART B - THE MONARCH PROGRAMMING IS A MINIATURIZATION OFWHAT WAS BEING DONE TO ENTIRE PEOPLES OR CITIESDemons are attracted by the “scent” of people. We are made in theimage of God, <strong>an</strong>d we are attractive prey <strong>to</strong> those who hate GodAlmighty. Cities are magnets for demons. When demons target aperson or people, a common tactic is <strong>to</strong> make trouble for the person.When a person’s problems reach a crescendo, they will be in a state ofmind <strong>to</strong> grab <strong>an</strong>y solution that is passing by. People then make pactswith demonic forces. <strong>The</strong>y sell their souls hoping for relief from theirproblems. All this is clear as a bell <strong>to</strong> the spiritually enlightened, but thedemonic forces are able <strong>to</strong> dull the senses of their victims <strong>to</strong> the pointthey no longer have the slightest realization that they have sold theirsouls. People make a choice <strong>to</strong> accept the falsehood offered by thedemons for their relief, rather th<strong>an</strong> stick with the truth which seems <strong>to</strong>hurt. <strong>The</strong> demonic lies may be that colds <strong>an</strong>d flues are caused by evilspirits--when in reality they are caused by viruses <strong>an</strong>d bacteria. Or theopposite type of lie may be given--that demonic forces have noinfluence over disease, that only viruses <strong>an</strong>d bacteria exist. In Africa,modern medicine is often viewed as White M<strong>an</strong>’s magic, because theyfight disease with inc<strong>an</strong>tations which the demons have taught them <strong>to</strong>use <strong>to</strong> cure their problems. Authority <strong>to</strong> demons is tr<strong>an</strong>sferred <strong>to</strong> themby festivals, ceremonies <strong>an</strong>d pilgrimages. Strong demonicm<strong>an</strong>ifestations usually occur around festivals, ceremonies, rituals <strong>an</strong>dpilgrimages which are being done everyday around the world. <strong>The</strong>seceremonies <strong>an</strong>d rituals are welcome mats for demonic forces givingthem the right <strong>to</strong> rule. Every area of the world has them. And oftendemonic signs <strong>an</strong>d wonders occur at these rituals <strong>an</strong>d ceremonies. <strong>The</strong>power of a lie has <strong>to</strong> be preserved <strong>an</strong>d fueled by tradition, which ism<strong>an</strong>ifested via rituals. Without tradition the power of the lie would dieout. If the tradition is being rejected by a people, the demons oftenaugment it with “new” deceptions. <strong>The</strong> first lie doesn’t st<strong>an</strong>d a ch<strong>an</strong>ce.<strong>The</strong> pre-existing bondage then is strengthened by new deceptions thatseem more appropriate. If you were asked now, “HOW DOES SATANENSLAVE PEOPLE?” you should know the <strong>an</strong>swer because it was justgiven it <strong>to</strong> you. <strong>The</strong> <strong>an</strong>swer is Sat<strong>an</strong>’s control is trauma-based. A traumais applied <strong>to</strong> the lives of people. <strong>The</strong>y reach out for some type of<strong>an</strong>swer <strong>to</strong> the trauma, <strong>an</strong>d the demons offer some type of <strong>an</strong>swer--som<strong>an</strong>y Hail Marys, or so m<strong>an</strong>y sacrificed cats, or pray <strong>to</strong> some idol whichis a disguised demon. <strong>The</strong> lies are turned in<strong>to</strong> myths which the peoplebelieve. <strong>The</strong> myths are a blurring of reality which the people on onelevel may know are false, but their minds c<strong>an</strong>’t break loose of thepower of the lie. <strong>The</strong> power of the myths are fueled by tradition <strong>an</strong>ddemonic m<strong>an</strong>ifestations <strong>an</strong>d demonic attacks. Anyone who stepsoutside of the demonic lie is attacked. <strong>The</strong> people feel they are beingpersonally attacked when their traditions are ignored. Because apeople has willingly sacrificed the truth for the falsehood in their need392


for relief from their trauma, they have chosen <strong>to</strong> be deceived. Thischoice <strong>to</strong> be deceived has a great deal of spiritual power <strong>to</strong> it. <strong>The</strong>yare no longer truth-lovers. It is not enough <strong>to</strong> come <strong>to</strong> these peoplewith the truth. <strong>The</strong>y have rejected the truth. <strong>The</strong>y must at some pointwill <strong>to</strong> seek the truth again. <strong>The</strong>se people c<strong>an</strong> have all the proof shown<strong>to</strong> them about the truth, <strong>an</strong>d they will continue <strong>to</strong> reject it. <strong>The</strong>irdemonic bondage needs <strong>to</strong> be broken somehow.This bondage c<strong>an</strong> be broken in a number of ways. Pointing out theinadequacies of the lies is sometimes sufficient <strong>to</strong> break the demonicspell over people. But after the lies are broken, they need <strong>to</strong> befollowed by the truth--<strong>an</strong>d the love of truth. <strong>The</strong> Monarch <strong>Mind</strong> Controlprogramming is simply the sophisticated application of what has beendone <strong>to</strong> hum<strong>an</strong>ity on a large scale being scaled down <strong>an</strong>d applied <strong>to</strong>a single hum<strong>an</strong> body. Trauma <strong>an</strong>d lies are used in the same way. <strong>The</strong>different alters sell their souls <strong>to</strong> the lies in return for their safety. A basicingredient <strong>to</strong> the programming of a group of people (or a group ofalters) is the same--trauma <strong>an</strong>d fear. <strong>The</strong> L<strong>an</strong>d of Oz was ruled by ashadow-leader, the Wizard of Oz. Most countries are ruled by unseenpeople <strong>an</strong>d unseen powers. <strong>The</strong> Wizard of Oz s<strong>to</strong>ry is so representativeof how life is for Sat<strong>an</strong>’s world. No wonder it is the programming basefor so m<strong>an</strong>y Monarch mind-controlled slaves. <strong>The</strong> solution <strong>to</strong> Sat<strong>an</strong>’scontrol, was that the disciples of Christ would be so united in love thatthe world would see the solution. “That they all may be one.. .that theworld may believe.” For the Monarch slaves, the therapists havew<strong>an</strong>ted integration. For the world, Christ w<strong>an</strong>ted integration. But thereare formidable spiritual strongholds which divide us. <strong>The</strong>se spiritualstrongholds are far stronger th<strong>an</strong> most Christi<strong>an</strong>s c<strong>an</strong> imagine. <strong>The</strong>heartbeat of the Body of Christ is <strong>to</strong> bring all hum<strong>an</strong>ity <strong>to</strong> their Crea<strong>to</strong>rGod. This c<strong>an</strong> be done by breaking down all the lies <strong>an</strong>d programmingthat separate the parts of the Body of Christ so that those of Christ areso well integrated in love <strong>an</strong>d spirit that the world believes on thepower of Christ. Each of the programming acts has a spiritual, mental,<strong>an</strong>d physical side <strong>to</strong> it. <strong>The</strong> slave has his or her will stripped from them soit becomes unnecessary <strong>to</strong> think in terms of their guilt--they are slaveswho no longer have the freedom of choice. If they kill, or steal, or tell<strong>an</strong> untruth (lie), they have not done it intentionally. Still theProgrammers know that there are spirits involved <strong>to</strong> spiritually preparethe slave <strong>to</strong> do these acts. For inst<strong>an</strong>ce, they impl<strong>an</strong>t Spirits of Greed<strong>an</strong>d lust in<strong>to</strong> the victim. An <strong>Illuminati</strong> value system is drilled in<strong>to</strong> thevictim. Any person who is not taught <strong>to</strong> dedicate personal rights <strong>an</strong>dpossessions <strong>to</strong> God, will end up with all types of surface forces such asinsecurity, worry, <strong>an</strong>ger, envy, jealousy <strong>an</strong>d tension. This goes formultiples or non-multiples. <strong>The</strong>se surface forces will in turn cause alltypes of surface weaknesses such as lying, stealing, cheating, <strong>an</strong>darguing. If these surface weaknesses are displayed by <strong>an</strong>yone, theyare evidence that a deeper spiritual problem exists. However, the slave393


is not being set up <strong>to</strong> display these vulnerabilities as they will, but ONLYas they are programmed. An <strong>Illuminati</strong> Beta model c<strong>an</strong> have sex onlywith who her master allows her <strong>to</strong> have sex with. Nor is she gr<strong>an</strong>ted theprivilege of refusing <strong>to</strong> sexually service someone. If the slave is allowedfree will, they often will reject the life style programmed in<strong>to</strong> them. <strong>The</strong>reason they c<strong>an</strong> reject the Spirits of Seduction & Lust that have beenlayered in <strong>to</strong> insure that these moral weaknesses exist, is because thewill of the alter being programmed was being coerced. <strong>The</strong>re wasduress involved. Sat<strong>an</strong> has some claim, but not the stronghold thatcomes from those whose active will is involved in a sin. That doesn’tme<strong>an</strong> that some slaves don’t develop a taste for their perversion. <strong>The</strong>point is that the ability <strong>to</strong> have these personality weaknesses, shouldthe programmers w<strong>an</strong>t them, c<strong>an</strong> be spiritually set in<strong>to</strong> the slave byteaching the slave <strong>to</strong> resist the grace <strong>an</strong>d love of God. It may beshocking <strong>to</strong> realize that the slaves are specifically programmed <strong>to</strong> resistGod’s grace <strong>an</strong>d love, <strong>an</strong>d <strong>to</strong> hate Him. This is not left <strong>to</strong> ch<strong>an</strong>ce, <strong>an</strong>dis accomplished by a number of events in the slave’s life. Anotherspiritual area that is tampered with is the self-image of the person. <strong>The</strong>yare not allowed <strong>to</strong> think of themselves as made in the image of God(unless they are front alters created or allowed <strong>to</strong> be Christi<strong>an</strong>). Insteadof allowing the victim <strong>to</strong> learn about Jesus, the victim is consistentlybelittled <strong>an</strong>d compared <strong>to</strong> others. This is in violation of a spiritualprinciple found in 2 Corinthi<strong>an</strong>s 10:12, “For we dare not make ourselvesof the number, or compare ourselves with some that commendthemselves; but they measuring themselves by themselves, <strong>an</strong>dcomparing themselves among themselves, are not wise.” John 5:44<strong>an</strong>d 2 Cor. 10:17,18 teach how it is <strong>to</strong> be done correctly. Fritz, coauthor,knows of one programmer who is still programming who is fullyaware of these scriptures <strong>an</strong>d how they apply spiritually. When peopleare not allowed <strong>to</strong> accept themselves, they end up resisting the will ofGod. <strong>The</strong> wrong attitudes are built in<strong>to</strong> the slave, so that they willalways resist the will of God. Again if the programmers w<strong>an</strong>t a Christi<strong>an</strong>front, they may program the correct thinking in<strong>to</strong> the front alter. To dothis doesn’t threaten their hold on the system in the least. To haveSat<strong>an</strong>ic alters <strong>an</strong>d Christi<strong>an</strong> alters which are diametrically opposed <strong>to</strong>each other’s thinking only insures that if they would discover eachother in the mind, that they would reject w<strong>an</strong>ting <strong>to</strong> learn about theother part, <strong>an</strong>d would go in<strong>to</strong> denial of the part’s existence. <strong>The</strong>programming <strong>an</strong>d mind-control is being linked <strong>to</strong> a belief system.Taking this one step further, we c<strong>an</strong> also say that the programming isalso a conflict between two faiths, the faith that the alters place whenthey visualize <strong>an</strong>d create their occult-system, that is their faith indemonism <strong>an</strong>d magic, versus the faith of those who follow the God ofthe Bible. <strong>The</strong> method of creating hard-core Sat<strong>an</strong>ic alters fromtraumatized Christi<strong>an</strong> alters is <strong>an</strong> obvious example of this. Some seculartherapists have been slow <strong>to</strong> admit this conflict. If we look at the<strong>Illuminati</strong>’s br<strong>an</strong>d of Druidism, we will notice that the Book of Pheryllt394


which is a Druidic book for rituals gives four symbols which c<strong>an</strong> bemade <strong>to</strong> evoke the four elemental forces also called the four basicportals. Visualization is said <strong>to</strong> be the key <strong>to</strong> the occult, <strong>an</strong>d <strong>to</strong> openingportals with these four signs. As the deeper parts of a slave are drawnin<strong>to</strong> such activity, they are in reality placing their faith in that beliefsystem. How c<strong>an</strong> you take something away, without giving somethingin return? An alternative faith in a God <strong>an</strong>d belief system that is notconnected <strong>to</strong> mind-control is <strong>an</strong> import<strong>an</strong>t therapeutic aid.You c<strong>an</strong> not hate something passionately if you are unaware of it.When two groups are very similar, in order <strong>to</strong> high light their individualidentity they will have a high level of <strong>an</strong>imosity <strong>to</strong>ward each other. Inorder <strong>to</strong> create strong Sat<strong>an</strong>ic alters who hate God, the <strong>Illuminati</strong>actually encourage the young two year old victim <strong>to</strong> underst<strong>an</strong>d <strong>an</strong>daccept the love of God. Upon this faith in a loving God will be built therejection <strong>an</strong>d trauma <strong>to</strong> create wounded alters, who hate Godbecause they feel rejected. Rejection is a <strong>to</strong>ol of Sat<strong>an</strong> across theboard in the world. Rejection creates a sine wave of hills <strong>an</strong>d valleys.(<strong>The</strong> way of the Lord is made straight leveling these hills <strong>an</strong>d valleys.)When a person (or nation) is rejected they will often shift <strong>to</strong> one of twoextremes: either they try <strong>to</strong> perform <strong>to</strong> meet up <strong>to</strong> expectations or theywill retaliate against rejection. Both are extremes (the hills <strong>an</strong>d valleys ofthe shadow of death) of the what resembles a sine way.Both rejection <strong>an</strong>d retaliation are <strong>to</strong>ols of bondage. <strong>The</strong> enemy willwork a person <strong>to</strong> get them <strong>to</strong> feel either rejected or <strong>an</strong>gry. If either sideof the sine wave is latched on<strong>to</strong> by a person (or nation) they will set inmotion a dynamic where they will end up with the other side of thecurve. This is because the hum<strong>an</strong> mind has <strong>an</strong> inbred desire <strong>to</strong> bal<strong>an</strong>cethings out. If we feel rejection, then we may retaliate or try extra hard<strong>to</strong> perform. This sets up a BONDAGE LOOP. <strong>The</strong> Cabalistic Tree of Life isthe knowledge of good <strong>an</strong>d evil--perform<strong>an</strong>ce. <strong>The</strong> programmer byrepeatedly REJECTING the slave, build in<strong>to</strong> the slave a high level ofperform<strong>an</strong>ce. <strong>The</strong> slave is not allowed <strong>to</strong> get <strong>an</strong>gry at the programmer--which is the opposite peak of the sine wave. <strong>The</strong> hum<strong>an</strong> mind willnaturally try <strong>to</strong> bal<strong>an</strong>ce the perform<strong>an</strong>ce peak with increasing the<strong>an</strong>ger/retaliation peak <strong>to</strong> match it in opposite intensity. Because theslave c<strong>an</strong> not get <strong>an</strong>gry at their programmer, they turn this <strong>an</strong>gerinward <strong>an</strong>d upward <strong>to</strong>ward themselves <strong>an</strong>d God. <strong>The</strong> perform<strong>an</strong>ce of395


the slave for the master is a form of false love. Perform<strong>an</strong>ce love is falselove. “If you do this for me, then I’ll love you.” Christ loved us when wewere yet sinners <strong>an</strong>d unlovable. This is the type of godly true lovedescribed by Paul in 1 COR 13 which seeks not its own. Selfpreservationis a <strong>to</strong>ol of death. That is one reason Christ did notpreserve himself--even though he could have called <strong>an</strong>gels--hew<strong>an</strong>ted <strong>to</strong> show the world true love. Fear gets its root in death. <strong>The</strong>threat of death of a spouse, of oneself, of one’s dreams, of one’sidentity, or of one’s fleshly body creates fear. Death comes from Sat<strong>an</strong>.Life from Yahweh God. Fear is built on a threat of some kind of death.Self-preservation then is actually based upon fear which is in turn basedon death. This is why Christ said one must lose their life <strong>to</strong> gain it. Toescape the sat<strong>an</strong>ic bondage loop of self-preservation built on fear, wemust reach out for the love of God. Self-justification is not normally seenby people as a bondage loop, but it often is. Only the sureness thatAlmighty God loves us gives us the strength not <strong>to</strong> get caught in theself-preservation tactic of self-justification. <strong>The</strong>re is a place fordefending the truth, but it must be done in love. Christ <strong>an</strong>d his disciplestaught that we are justified by faith in God--not by self-justification. Selfjustificationc<strong>an</strong> easily be related <strong>to</strong> the self-preservation bondageloop. We simply have <strong>to</strong> have <strong>an</strong> inner knowing that we are made inthe image of God, <strong>an</strong>d that He is working in each of our lives. Since weare His work, He will justify us. All of the Monarch slaves, are a work ofGod. <strong>The</strong> cult has simply refashioned what God created. <strong>The</strong> slaveneeds <strong>to</strong> recapture the loving view God has of what He created. Goddoesn’t make mistakes. He has placed lots of beauty <strong>an</strong>d value ineach person. Each person is His h<strong>an</strong>diwork, isn’t the hum<strong>an</strong> bodyfearfully <strong>an</strong>d wonderfully made? After someone has been made <strong>to</strong>participate in crimes against hum<strong>an</strong>ity, the Programmers intuitivelyhave created a situation where the person may fall in<strong>to</strong> selfjustification,for example, “<strong>The</strong>y deserved <strong>to</strong> die.” This is a subtle, butd<strong>an</strong>gerous <strong>to</strong>ol of bondage. Much of the trauma-based mind-control isbased on simple fundamental spiritual life-spiritual death issues. <strong>The</strong>Spirit of the Lord does not give fear. It comes from the enemy.Abductees, who claim <strong>to</strong> have met aliens, claim that the aliens feedoff of hum<strong>an</strong> fear. Fear brings spiritual death. To show this dynamic in<strong>an</strong>other way, let’s describe a common thought for alters of Monarchslaves. This thought is “If I stay with the programming I’m safe.” This isthe same thought that society in general is taught via fear of selfpreservation.“If I stay with the crowd, if I stay with the system, then I willbe safe.” This is why peer pressure, which seems safe, c<strong>an</strong> lead m<strong>an</strong>yyoung people in<strong>to</strong> death. All this fear of self-preservation by remainingin the programming (whether individual or societal) will be tr<strong>an</strong>sferred<strong>to</strong> loyalty of the AntiChrist--that is the pl<strong>an</strong>. <strong>The</strong> Truth shall set you free.Anytime we reject the truth for safety <strong>an</strong>d peace because of our fearfor self-preservation, we accept a lie. If the truth sets a person free,then by definition, slavery me<strong>an</strong>s <strong>to</strong> “not <strong>to</strong> have truth.” All lies lead <strong>to</strong>396


ondage. <strong>The</strong>y create strongholds. M<strong>an</strong>y religious groups are builtupon a collection of truths <strong>an</strong>d lies. <strong>The</strong> truths are used as the enticingattractive front, the lies are used as the enslaving bondage. This is whythere is almost no end <strong>to</strong> all the lies used <strong>to</strong> program Monarch-typetrauma-based <strong>to</strong>tal <strong>Mind</strong>-controlled slaves. An import<strong>an</strong>t mind-controlprogramming dynamic is the creation of images. This will take someexplaining. One spiritual dimension of hum<strong>an</strong>s is that we like <strong>to</strong> beholdour God. This was built in<strong>to</strong> us. Archeologists have noticed that <strong>an</strong>cientm<strong>an</strong> has always worshipped. It is built in<strong>to</strong> m<strong>an</strong> <strong>to</strong> worship, <strong>an</strong>d we like<strong>to</strong> behold whatever we worship--whether that is God, ourselves, orsome other image. In other words, worship is image oriented. This is thepower of images. One of the most ignored comm<strong>an</strong>dments of God, ofwhich Fritz wrote a book about in 1977, was the comm<strong>an</strong>dment Godgave “thou shalt not...make <strong>an</strong>y likeness of <strong>an</strong>y thing that is heavenabove, or that is in the earth beneath, or that is in the water under theearth.” EX 20:4 Students of God’s Word are warned <strong>to</strong> “examineeverything carefully; hold fast <strong>to</strong> that which is good.” 1 THES 5:2 1. Whatis signific<strong>an</strong>t is that God’s comm<strong>an</strong>dments in Ex. 20, which were adistillation of His laws, could have simply stated “Thou shallt not make<strong>an</strong>y graven image”, but instead went on <strong>to</strong> make a big issue in thatsame passage about <strong>an</strong>y image of God’s creatures (the wordtr<strong>an</strong>slated “things” has his<strong>to</strong>rically been unders<strong>to</strong>od as “living things.”)In DT 4:15 “pasal” images--that is images formed out of <strong>an</strong>y materialwith a <strong>to</strong>ol (ax, chisel, or engraving <strong>to</strong>ol) <strong>an</strong>d the “likeness of male orfemale” <strong>an</strong>d “similitude of <strong>an</strong>y figure” are forbidden. Next, it againforbids the likenesses of living creatures. <strong>The</strong> word “image” occursabout 100 times in the Bible, <strong>an</strong>d is usually accomp<strong>an</strong>ied byjudgements such as “I will cut down. ..destroy...break down...smote.” Ina number of verses (EC 7:20, PS 106:29, 39), the scriptures speak abouthow m<strong>an</strong> is always seeking inventions that provoke God <strong>to</strong> <strong>an</strong>ger. <strong>The</strong>creation of images of m<strong>an</strong>y varieties was a big part of Egypti<strong>an</strong> magic,<strong>an</strong>d still is. Because the creation of images is so esteemed <strong>to</strong>day, abal<strong>an</strong>ced view/discussion of the spiritual ramifications of images (&their creation) is a rare subject. “For the invisible things of Him, from thecreation of the world are clearly seen, being unders<strong>to</strong>od by the thingsthat are made, even His eternal power <strong>an</strong>d Godhead, so that they arewithout excuse.” RM 1:20. (cf. ISA 6:3) One ex-Programmer has talkedat length, that part of the motivation for the m<strong>an</strong>y programmingimages, is so that they c<strong>an</strong> establish a world built by Sat<strong>an</strong>, becausethey w<strong>an</strong>t <strong>to</strong> insure that there is no testimony about God’s power. (Bythe way, some deliver<strong>an</strong>ce ministries are having success in helpingheal victims by pointing out that Sat<strong>an</strong>ic programmers only build fromelements God has already created.) Mirrors, <strong>an</strong>d lots of them, areimport<strong>an</strong>t in occult programming because they make images. <strong>The</strong>ycreate so m<strong>an</strong>y internal images one doesn’t know which way <strong>to</strong> go.Images are lies. We often create false images of the people we w<strong>an</strong>t<strong>to</strong> love. Do we love them or their image? Movie stars are loved for their397


image, <strong>an</strong>d rarely for who they really are. Some of them haveacknowledged that they don’t feel loved by their f<strong>an</strong>s, because theirf<strong>an</strong>s are only worshipping <strong>an</strong> image. Again, we must remember THETRUTH SHALL SET US FREE. What is our real identity? Who are we really inGod’s eyes? Why did He allow us <strong>to</strong> be born? What was His realpurpose for us? <strong>The</strong>se real questions which are so hard for so m<strong>an</strong>y ofus, are the reality that we need in our lives. <strong>The</strong> bondage of images hasyet <strong>to</strong> be unders<strong>to</strong>od. <strong>The</strong> word “duplicity” is based on the wordduplicate. Machiavelli taught the elite how <strong>to</strong> rule through duplicity--that is <strong>to</strong> rule via imitation images. This is nothing more th<strong>an</strong> one of theoperational principles of mirror images placed within the Monarch<strong>Mind</strong>-controlled slaves. Whatever gives life is duplicated in a mirrorimage by Sat<strong>an</strong>. Life swallows up death, as the Kingdom of God’sgenuine light gets progressively brighter. <strong>The</strong> copy of this is thatperform<strong>an</strong>ce must get progressively better--i.e. technology mustch<strong>an</strong>ge <strong>to</strong> get better if we are <strong>to</strong> have life. <strong>The</strong> Amish show thatsociety’s pench<strong>an</strong>t for technological progression, does not improvelife. <strong>The</strong> Amish have a very successful life-style free from divorce <strong>an</strong>dcrime. Missionaries <strong>to</strong> Africa have come back at times wondering if theprimitive tribe they spent time with didn’t have m<strong>an</strong>y things which ourtechnologically adv<strong>an</strong>ced society had lost. This doesn’t me<strong>an</strong> that <strong>an</strong>invention won’t help m<strong>an</strong>kind--it is that m<strong>an</strong>kind will not get life fromtechnology. Technology must be unders<strong>to</strong>od in the entire context oflife. If a person catches on<strong>to</strong> the lie of technology or perform<strong>an</strong>ce,they may try the opposite lie--platforming. M<strong>an</strong>y troubled peoplereach out <strong>to</strong> God, receive help, <strong>an</strong>d then platform by saying, “Th<strong>an</strong>ksfor the help God, but I’m O.K. now.” God’s love is not perform<strong>an</strong>cebased,but we still need <strong>to</strong> continue <strong>to</strong> press <strong>to</strong>ward the mark of thehigh calling of God, tr<strong>an</strong>sforming <strong>an</strong>d renewing our mind, ever growingspiritually. Things which do not grow are labelled dead. How do wegrow without being perform<strong>an</strong>ce oriented? That is the message thatChrist tried <strong>to</strong> bring people. <strong>The</strong> programmers get their slaves caught ina perform<strong>an</strong>ce loop. <strong>The</strong> slaves are not going <strong>to</strong> get freedom, if aminister of some church traps them in<strong>to</strong> some religious group that isperform<strong>an</strong>ce-based, rather th<strong>an</strong> unconditional godly-love based.It is sad <strong>to</strong> see victims of mind-control free themselves at great cost,only <strong>to</strong> run from one controlling group <strong>to</strong> <strong>an</strong>other. If we neglect <strong>to</strong> lookat the spiritual dimensions of mind-control slavery, we then areneglecting <strong>to</strong> see some of the elements of <strong>to</strong>tal mind-control slavery.398


IN SUMMARY, SOME OF THE FIRST THINGS ATTACKED.What is often the first thing which is attacked in individuals <strong>an</strong>d nationsin order <strong>to</strong> control them? It is their sense of identity as a spiritual moralbeing. Both individuals <strong>an</strong>d nations are targeted <strong>to</strong> destroy their ethicalself-respect. <strong>The</strong> individual <strong>an</strong>d the nation must be brought <strong>to</strong> think ofthemselves as <strong>an</strong>imals. Another primary tactic or <strong>to</strong>ol is <strong>to</strong> traumatizethe victim who is <strong>to</strong> be controlled, <strong>an</strong>d then provide relief when ademonic lie is accepted. Rejection is <strong>an</strong> import<strong>an</strong>t trauma, because itcreates a desire for perform<strong>an</strong>ce <strong>an</strong>d retaliation, <strong>an</strong>d gets peopletrapped in a bondage loop. Lies put people in<strong>to</strong> bondage. Images area type of lie, that lead <strong>to</strong> bondage. This is why so m<strong>an</strong>y images <strong>an</strong>d liesare placed in<strong>to</strong> the <strong>Mind</strong>-controlled slave. <strong>The</strong>se images <strong>an</strong>d lies areinherently bondage-makers. Fear <strong>an</strong>d self-preservation are groundedin death. To preserve ourselves, we will allow ourselves <strong>to</strong> be enslaved.(Eventually, <strong>Mind</strong>-controlled slaves <strong>an</strong>d society in general in order forpeace, safety <strong>an</strong>d self-preservation will tr<strong>an</strong>sfer their allegi<strong>an</strong>ce <strong>to</strong> themaster programmer, the <strong>Illuminati</strong>’s AntiChrist.)PART C - THE DEHUMANIZATION PROCESS<strong>The</strong> dehum<strong>an</strong>izing of a multiple -- that is of a fragmented personality --is done <strong>to</strong> most of the alters, but the front alters are allowed <strong>to</strong> behum<strong>an</strong>. Because alters take on the characteristics of what they werecreated from, the front alters have <strong>to</strong> be some of the first splits so thatthey have a sense of family <strong>an</strong>d that they are hum<strong>an</strong>. That does notme<strong>an</strong> that the first series of splits c<strong>an</strong>’t be dehum<strong>an</strong>ized later--they are,they are turned in<strong>to</strong> gems (crystals). How do you make <strong>an</strong> alter in<strong>to</strong> <strong>an</strong><strong>an</strong>imal alter? It may not be quite as difficult as some may imagine,because they c<strong>an</strong> create alters with “cle<strong>an</strong> slates”--that is they are theplain tablets that Dr. White (Dr. D. Ewin Cameron) prided himself thathe was able <strong>to</strong> make out of adult minds. When a part of the mind hasno reality <strong>to</strong> reference, <strong>an</strong>d is <strong>to</strong>rtured <strong>an</strong>d <strong>to</strong>ld lies, then it will acceptwhat the programmer says is real. When <strong>an</strong> alter is created via <strong>to</strong>rture,if you w<strong>an</strong>t a cat alter, they will have the child <strong>to</strong>rtured in a cagesurrounded by cats of some type. <strong>The</strong> new alters will be <strong>to</strong>ld they arecats. <strong>The</strong>ir programmers will actually kill a little child in the worst way infront of these alters <strong>an</strong>d tell them that that is what happens <strong>to</strong> little girls<strong>an</strong>d boys. Do they w<strong>an</strong>t <strong>to</strong> be a little girl? No. After watching thehorrible things that happen <strong>to</strong> little girls, they do not w<strong>an</strong>t <strong>to</strong> be littlegirls or little boys (as the case may be). <strong>The</strong>y w<strong>an</strong>t <strong>to</strong> be a cat, becauseas a cat they will not be killed <strong>an</strong>d <strong>to</strong>rtured like the children. <strong>The</strong> altersare forced <strong>to</strong> eat like cats with cats. <strong>The</strong>y are repeatedly shamed <strong>an</strong>ddegraded <strong>an</strong>d repeatedly <strong>to</strong>ld they are cats. Lie detec<strong>to</strong>r Instrumentsare hooked up <strong>to</strong> the child <strong>to</strong> determine if the alters actually believe399


they are cats. When the alter c<strong>an</strong> actually state, “I’m a kitten.” or “I’ma tiger.” <strong>an</strong>d pass the lie detec<strong>to</strong>r test, then the programmers knowthey have succeeded.But what if the mind resists being <strong>to</strong>ld it is a cat? As long as the child is agirl it is given faeces <strong>to</strong> eat. But the cats are fed wholesome meals infront of the victim. <strong>The</strong> little girls in the other cages are dirty <strong>an</strong>d<strong>to</strong>rtured <strong>an</strong>d ill fed. Do you w<strong>an</strong>t <strong>to</strong> be a little girl? A great deal ofsimple <strong>to</strong>rture is applied <strong>to</strong> make sure that the correct <strong>an</strong>swers aregiven. If your life depended upon saying you were a cat, you’d be acat <strong>to</strong>o. Further, children have a vivid imagination. Normal childrenc<strong>an</strong> easily role play, <strong>an</strong>d they c<strong>an</strong> easily imagine they are somethingthey aren’t, because their personalities <strong>an</strong>d egos have not solidified.Again nothing is left <strong>to</strong> ch<strong>an</strong>ce. A fake blood tr<strong>an</strong>sfusion of cat bloodmay be given the child. Very often high speed films of kittens playing<strong>an</strong>d having fun are shown in one eye, while the other eye is forced <strong>to</strong>few little girls having <strong>to</strong> undergo the worst of <strong>to</strong>rtures. This viewing isforced upon the child, as its eyes are held open <strong>an</strong>d the child isstrapped in<strong>to</strong> a viewing chair. <strong>The</strong> dehum<strong>an</strong>ization process will makealters in<strong>to</strong> various types of birds, cats, dogs, aliens, horses, earthelements, gems<strong>to</strong>nes, rocks, <strong>an</strong>d countless other items. <strong>The</strong>y will thenplace in back up programming <strong>to</strong> insure that the alters continue <strong>to</strong>believe they are not hum<strong>an</strong>. <strong>The</strong> ingenuity of the back upprogramming <strong>to</strong> ensure that they continue <strong>to</strong> believe the lies areextensive <strong>an</strong>d ingenious. A great deal of hypnosis, <strong>an</strong>d drug inducedstates, <strong>an</strong>d drug-hypnosis is used <strong>to</strong> carry out the dehum<strong>an</strong>izationprocess. <strong>The</strong> programming will be reinforced by a cat alter’senvironment, because the alter’s h<strong>an</strong>dlers will always refer <strong>to</strong> them askittens or other types of cats.<strong>The</strong> painful rape of a child with its legs held in a butterfly configurationis used <strong>to</strong> get butterfly alters. To get a puppet, the body is given a drugwhich paralyzes the child. <strong>The</strong>n electro-shock is applied <strong>to</strong> certainmuscles upon the comm<strong>an</strong>d of the programmer. <strong>The</strong> effect is that thechild has no control over his body, <strong>an</strong>d the programmer c<strong>an</strong> make thechild’s body parts jerk <strong>an</strong>d move by electro-shocking the muscles. <strong>The</strong>child actually becomes the puppet of the programmer. This is a verypowerful program. One of the names connected with Monarchprogramming is Marionette Programming. <strong>The</strong> child literally becomes aMarionette. This concept appears <strong>to</strong> have been cooked up by theGerm<strong>an</strong>s under Hitler. An alter System as a child is physically shown thatthey are a marionette puppet. <strong>The</strong>ir muscles are electro-shocked insuch a way as <strong>to</strong> take adv<strong>an</strong>tage of the natural reflexes. Whenelectro-shocked that way, the victim’s body parts jerk out of ourcontrol at the whim of the programmer <strong>to</strong> prove <strong>to</strong> the victim that theyare a puppet. At this time, the rules are given <strong>an</strong>d rule number 8 is that400


the alters are their puppet. <strong>Illuminati</strong> programmer Dr. Mengele, usedpuppets in a dollhouse as he programmed. He did skits with hispuppets. “D<strong>an</strong>ce Marionette d<strong>an</strong>ce,” he’d say in his thick germ<strong>an</strong>accent. Pinocho’s s<strong>to</strong>ry was used <strong>to</strong> name the spirit guide JimneyCricket. Along with rule no. 8, he taught the following rules at this point:1. Listen <strong>to</strong> your instructions., 2. <strong>The</strong>re is no room for error., 3. “<strong>The</strong> GameTimer”--these were the specifics of how <strong>to</strong> move, the melted mirror,etc., 4. <strong>The</strong>re is a chain of comm<strong>an</strong>d, the King’s men., 5. Your Masterwould chart your course., 6. You will receive orders, what <strong>to</strong> do, amemorized script <strong>to</strong> follow <strong>an</strong>d fulfill., 7. <strong>The</strong> Crea<strong>to</strong>r <strong>an</strong>d Master wouldalways own you in<strong>to</strong> infinity., 8. You are puppets on a string. “D<strong>an</strong>ceMarionette d<strong>an</strong>ce. You are <strong>to</strong> speak only those words <strong>to</strong>ld <strong>to</strong> you, <strong>an</strong>d<strong>to</strong> only speak those words when your string is pulled., 9. <strong>The</strong>re is noroom for questions., 10. <strong>The</strong> controller always plays the role of the WhiteRabbit. Dark side alters of a System are taught <strong>to</strong> know these rules aspart of their being. Dr. Joseph Mengele (known as Dr. Green) carried aviolin, which was used during programming. He programmed slaves <strong>to</strong>respond <strong>to</strong> the key word “Fiddler”. During programming, the victim willbe made <strong>to</strong> believe that all their insides have been removed <strong>an</strong>d taperecorders placed in<strong>to</strong> them <strong>an</strong>d surgically hooked up. To the childbeing programmed this is real. This is part of the dehum<strong>an</strong>izationprocess <strong>to</strong> protect them from spiritual growth <strong>an</strong>d freedom. <strong>The</strong>programmers’ dehum<strong>an</strong>ization parallels what is done in the army whenthe drill serge<strong>an</strong>t yells at the new recruits names such as ‘‘maggot’’<strong>an</strong>d ‘‘worm’’.PORCELAIN FACE PROGRAMMING<strong>The</strong> Porcelain Face Programming was already <strong>to</strong>uched on earlier inchapters 2 & 7 when the fire <strong>to</strong>rtures <strong>an</strong>d Gatekeeper alters werewritten about. Fire <strong>to</strong>rture <strong>an</strong>d melted wax is used <strong>to</strong> make the childvictim believe their face has been burned. <strong>The</strong>n the programmergenerously gives the traumatized alters a porcelain mask. <strong>The</strong> altergetting the Porcelain face may be given a “gem” hypnotically likeJade <strong>an</strong>d that becomes their secret name. <strong>The</strong>re are several differentmethods that are available <strong>to</strong> lay in the porcelain face programming.<strong>The</strong>re has been a great deal of porcelain casts made of people’sfaces <strong>an</strong>d then masks made of them. In fact, when a h<strong>an</strong>dler dies, atleast in one case the replacement h<strong>an</strong>dler wore a mask <strong>to</strong> look like theprevious h<strong>an</strong>dler. Hum<strong>an</strong> baby skin is used <strong>to</strong> construct a mask fromthe victim’s facial cast. A mask is worn by the <strong>Illuminati</strong> victim whenthey are married <strong>to</strong> the AntiChrist. <strong>The</strong> Porcelain Masks are often part ofthe Camelot & Shakespeare programming. Another use of porcelainmasks which was only experimented with was <strong>to</strong> place masks on Pawnalters which were used as alters who would guard things by scaring401


other alters with their fearful porcelain counten<strong>an</strong>ces. Thisprogramming has spiritual ramifications, because it is one of theprogramming methods <strong>to</strong> steal alters of their faces. <strong>The</strong> alters gettingporcelain face programming will only see a porcelain face in the mirroruntil the programming is taken down. As long as the computer on theirlevel is operating the programming <strong>to</strong> that alter will be intact.HEARTS OF STONE<strong>The</strong> programmers leave no s<strong>to</strong>ne unturned when they strip the alters ofa system of <strong>an</strong>y vestige of hum<strong>an</strong>ity they might have. <strong>The</strong> programmersmake the alters believe that the programmers have surgically removedtheir hearts & replaced them with a s<strong>to</strong>ne. To reinforce thisprogramming the victim is hypnotized <strong>to</strong> fall in<strong>to</strong> a deep tr<strong>an</strong>ce if at<strong>an</strong>y time the victim’s deeper alters are hooked up <strong>to</strong> <strong>an</strong>ythingmoni<strong>to</strong>ring the heart. If <strong>an</strong>d when someone tried <strong>to</strong> prove that thesealters have a heart by taking their pulse, they may be surprised whenthese alters tr<strong>an</strong>ce deep enough that the machine doesn’t even read.This is how the programming keeps the lies safe from exposure. <strong>The</strong>Programmers will hypnotically take the hearts for a number of reasons.One is blackmail. <strong>The</strong>y will promise <strong>to</strong> return the hearts, if the victimobeys, returns home <strong>to</strong> the cult when needed, <strong>an</strong>d is present when theAnti-Christ needs the victim. It is doubtful these alters would get theirhearts back by their cult considering all the false promises that aretypically made. <strong>The</strong> Programmers will give the hearts <strong>to</strong> a queenmother alter for safekeeping. <strong>The</strong>y may be hidden somewhere like inthe Temple of Molech. <strong>The</strong> Temple of Molech in some survivors is usedas a deposi<strong>to</strong>ry for memories of child sacrifices. It is not a place <strong>an</strong>yalter could or would w<strong>an</strong>t <strong>to</strong> go in the internal world. In return, theProgrammers give the victim s<strong>to</strong>nes, yes, hearts of s<strong>to</strong>ne. S<strong>to</strong>ne-likeprotec<strong>to</strong>rs will st<strong>an</strong>d guard in the background. <strong>The</strong>ir voodoo dollappear<strong>an</strong>ce reflects the voodoo images that are built in<strong>to</strong> MonarchInternal Worlds. By removing the victim’s hearts, it removes <strong>an</strong>y ch<strong>an</strong>cethat dark alters would have a soft warm spot in their heart for <strong>an</strong>yone.<strong>The</strong>y will be <strong>to</strong>ld that they are incapable of having friends or of lovingothers. This is quite effective in separating these alters from others. Thatisolation is a part of the mind control. Because the alters believe theyhave no life source within themselves--that is no heart, they have <strong>to</strong>look <strong>to</strong> their master. If the master places his h<strong>an</strong>d upon the victim’schest they may feel alive. Because people need a heart <strong>to</strong> feel, altersare programmed <strong>to</strong> believe that they are incapable of feeling <strong>an</strong>dhave no feelings. <strong>The</strong>y c<strong>an</strong> not cry during their own suffering, <strong>an</strong>d areencouraged <strong>to</strong> feel incapable of caring for the suffering of others. Inspite of all the brutality <strong>an</strong>d isolation of the programming, the alter’shum<strong>an</strong>ity will lay in the background, but whether alters will ever402


acknowledge that hum<strong>an</strong>ity is a big question. If people ask theseheartless alters <strong>to</strong> give their hearts <strong>to</strong> Jesus, they may be <strong>to</strong>ld that theydon’t have one. In all coven<strong>an</strong>ts, something is given <strong>to</strong> the cult. In thiscase the victim’s hearts are (hypnotically) given <strong>to</strong> the sat<strong>an</strong>ic Master.<strong>The</strong>re is a Keeper of the Seals who keeps the items given when a vowor coven<strong>an</strong>t is made. If a person is a trai<strong>to</strong>r <strong>to</strong> a vow, then the cult has<strong>an</strong> object <strong>to</strong> carry out voodoo or magic upon <strong>to</strong> punish the person.Monarch <strong>Mind</strong>-controlled slaves know their orders, <strong>an</strong>d are locked in<strong>to</strong>obedience.HYPNOTIC SURGERYAfter the Programmers steal the deeper alters’ hearts, their identities,their free will, their real families, <strong>an</strong>d their faces <strong>an</strong>d their hum<strong>an</strong>ity, theyare kind enough <strong>to</strong> sew back in<strong>to</strong> the victim’s chest via hypnoticsurgery black s<strong>to</strong>nes. <strong>The</strong>y do all this surgery by hypnosis. Via hypnosis,the Programmers c<strong>an</strong> heal the victim’s wounds after they <strong>to</strong>rture thevictim. <strong>The</strong>y c<strong>an</strong> basically make or remake reality <strong>to</strong> be what theyw<strong>an</strong>t.PART D - FEAR<strong>The</strong> thing that st<strong>an</strong>ds out so vividly for those who have met victim’s whoare in therapy is the Spirit(s) of Fear that control them. Waves ofpar<strong>an</strong>oia roll back <strong>an</strong>d forth through the alters. Everyone needs <strong>to</strong>bear in mind, that the programmers were sadists, <strong>an</strong>d they didn’t getsatisfaction from their programming until they could see raw terror intheir victims. <strong>The</strong> primary vehicle for programming was the raw terrorthat is repeatedly instilled in<strong>to</strong> the victim. To achieve <strong>to</strong>tal terror, thesadist programmer gains <strong>to</strong>tal control over every aspect of a person,their thoughts, their bowel movements, their life, even the power <strong>to</strong>commit suicide is stripped from the victim. Nothing that originallybelonged <strong>to</strong> the victim is left un<strong>to</strong>uched. A realistic fear of most victims,is that they will never be believed. Indeed, m<strong>an</strong>y therapists are servingthe final insult <strong>to</strong> these severely traumatized people by denying theauthenticity of things the victim experienced himself <strong>an</strong>d even wisheswere not true. For a victim <strong>to</strong> overcome their fear <strong>to</strong> tell, after all theyears of programming not <strong>to</strong> tell <strong>an</strong>d threats not <strong>to</strong> tell is <strong>an</strong> enormousfeat. Very few victims, ever get <strong>to</strong> this point. And yet, when they doovercome this enormous barrier, they must face disbelief. Traditionally,the psychiatrists have treated these victims as if their abuse is nothingbut psychotic nonsense. How m<strong>an</strong>y fleeing victims have been lockedup <strong>an</strong>d <strong>to</strong>ld they were Par<strong>an</strong>oid Schizophrenics? <strong>The</strong> fear of losing403


one’s identity within a coven or religious group, says the Church ofScien<strong>to</strong>logy, is bal<strong>an</strong>ced out by the structured framework that thesegroups have. Members identify with each other, because theyparticipate in the same rituals <strong>an</strong>d have given their allegi<strong>an</strong>ce <strong>to</strong> thesame idealized master.PART E - THE USE OF GUILT, SHAME, RIDICULE & ANGER<strong>The</strong> Chinese <strong>an</strong>d police agencies have been especially good atdeveloping methods <strong>to</strong> solicit confessions. This is done by a variety ofpunishment <strong>an</strong>d reward strategies, <strong>an</strong>d the Mutt & Jeff routine.Confession <strong>an</strong>d self-criticism have been used by religious groups, esp.the Jesuits as a method <strong>to</strong> convert persons <strong>to</strong> <strong>an</strong>d then perpetuate abelief. One of the things that the deeper alters will not be taught aboutis forgiveness. Because forgiveness of oneself <strong>an</strong>d others is such <strong>an</strong>import<strong>an</strong>t spiritual dynamic, <strong>to</strong> not know about forgiveness cripplesm<strong>an</strong>y deeper alters from healing from the deep spiritual wounds theyhave received. Forgiveness is <strong>an</strong> act of the will. Forgiveness of oneself isusually a major issue with deeper alters who generally don’t know how<strong>to</strong> do this. However, the h<strong>an</strong>dlers <strong>an</strong>d abusers will be sure <strong>to</strong> heap lotsof guilt--whether deserved or not on<strong>to</strong> the poor mind-controlled victim.It is natural for a person <strong>to</strong> focus on himself--after all, if a person doesn’tthink for himself who will? Often a person accepts their strengths, butfocus’s on their weaknesses hoping that that weakness will somehowbe reduced by the focus that is placed upon it. <strong>The</strong> programmers knowhow <strong>to</strong> take adv<strong>an</strong>tage of that. <strong>The</strong>y set impossible st<strong>an</strong>dards ofperfection, <strong>an</strong>d then deme<strong>an</strong> the victim because they have failed <strong>to</strong>live up <strong>to</strong> the impossible st<strong>an</strong>dard of perfection. Black <strong>an</strong>d whitethinking develops in the slave’s mind. <strong>The</strong> programmers will not allowthe victim <strong>to</strong> display natural feelings of <strong>an</strong>ger, sadness or doubt. To doso me<strong>an</strong>s that one is a failure <strong>an</strong>d weak. Of course they are naturalfeelings, so the slave has <strong>to</strong> do a great deal of repression <strong>an</strong>d selfincriminationfor having these natural feelings. <strong>The</strong> slave learns <strong>to</strong> turnhis or her <strong>an</strong>ger inward. M<strong>an</strong>y of the male slaves end up committingsuicide. <strong>The</strong>y beat themselves up with subconscious & conscious guilt.Anything <strong>an</strong>d everything wrong or bad in the slave’s life is blamedupon him. Of course not all things are me<strong>an</strong>t <strong>to</strong> be remembered by theslave. Guilt c<strong>an</strong> play a natural role in the forgetting of memories <strong>to</strong>o. Ifthe Monarch slave would remember something terrible, the religiousfront alters c<strong>an</strong> be made <strong>to</strong> feel repent<strong>an</strong>t for such terrible thoughts.<strong>The</strong>n the natural desire <strong>to</strong> forget c<strong>an</strong> be reinforced by suggesting thatthe evil memory be removed from the mind. In other words, memoriesare forgotten because they don’t conform <strong>to</strong> a person’s moral code. Ifgood morals are programmed in<strong>to</strong> the front alters, they will take thehypnotic suggestion not <strong>to</strong> remember what has really happened that404


they had <strong>to</strong> participate in. <strong>The</strong> front alters will only remember as<strong>an</strong>itized version. <strong>The</strong> person may even w<strong>an</strong>t <strong>to</strong> think of the memory as“only a dream” because the guilt associated with believing the realityof it. If a person is hypnotized <strong>to</strong> have guilt about something that theydidn’t commit, then they c<strong>an</strong> be gotten <strong>to</strong> believe that they did it. Forinst<strong>an</strong>ce, a false impl<strong>an</strong>ted memory of the Monarch slave killing a childmay be impl<strong>an</strong>ted with the comm<strong>an</strong>d, if you do not obey we will killmore children <strong>an</strong>d you then will be guilty for not just this child bu<strong>to</strong>thers. People will tend <strong>to</strong> justify their abuse by saying “I was bad, I wasevil.” <strong>The</strong> programmers take adv<strong>an</strong>tage of this natural tendency.Nothing the slave does is good enough or worthy of praise. After theysexually please a cus<strong>to</strong>mer, they are called “bitch” <strong>an</strong>d “whore” <strong>to</strong>make the slave feel guilty, when all they have done is follow orders. <strong>The</strong>whole situation causes the slave <strong>to</strong> work harder for approval which ofcourse is very tentative <strong>an</strong>d fleeting at best. <strong>The</strong> Master just keepscontrol, <strong>an</strong>d sets the st<strong>an</strong>dards higher if the slave gets close <strong>to</strong>reaching perfection. <strong>The</strong> Master must insure that the slave feels guilty<strong>an</strong>d dirty. M<strong>an</strong>y of the slaves endure a guilt that is common amongsoldiers <strong>an</strong>d concentration camp survivors--the guilt of having survivedwhen others died. “Why did I live <strong>an</strong>d they die? I was no better th<strong>an</strong>them?” Any desire on the part of deeper alters <strong>to</strong> w<strong>an</strong>t something forthemselves is painted as “selfishness”. <strong>The</strong>y will be internally <strong>an</strong>dexternally punished for <strong>an</strong>y pleasure. If a sexual alter enjoys a sexualencounter, she is programmed <strong>to</strong> internally feel some type of severepunishment program. One st<strong>an</strong>dard punishment for a female slavewho appears <strong>to</strong> have actually enjoyed a sexual act is <strong>to</strong> cut them fromvagina <strong>to</strong> rectum, <strong>an</strong>d sew them back up without <strong>an</strong>esthesia WHILEthe slave is forced <strong>to</strong> watch her punishment in silence without tears orscreams. One form of <strong>to</strong>rmenting a slave is <strong>to</strong> ridicule the slave as theyhave <strong>to</strong> carry out a wretched assignment. M<strong>an</strong>y slaves lose their zestfor humor because they end up the brunt of so m<strong>an</strong>y bad jokes.Comedi<strong>an</strong>s, because they are skilled with puns, <strong>an</strong>d other wordsgames, have often served as h<strong>an</strong>dlers or programmers. Bob Hope isthe best example of a Monarch slave h<strong>an</strong>dler who uses his verbal skillsas both a h<strong>an</strong>dler <strong>an</strong>d comedi<strong>an</strong>. Bob Hope has a side <strong>to</strong> him that thepublic doesn’t see. Over the years, Bob Hope has spent millions ofdollars on his team of gag writers <strong>to</strong> keep him well supplied with gags.ANGER<strong>The</strong> use of <strong>an</strong>ger is not haphazard. <strong>The</strong> spiritual ramifications of <strong>an</strong>gerare very well known <strong>to</strong> the programmers. <strong>The</strong>y know that <strong>an</strong>ger opensup spiritual portals for demonic activity. Remember, chapter 7 onstructuring explained how the programmer purposefully push the victimalmost <strong>to</strong> its breaking point <strong>to</strong> get <strong>an</strong>gry alters. <strong>The</strong> use of <strong>an</strong>ger is seen405


in a number of different areas of programming. <strong>The</strong> Gatekeeper alterswill be depressed <strong>an</strong>d <strong>an</strong>gry alters <strong>to</strong> insure that they remain goodportals for demons. Gatekeeper alters function as Gatekeepers inseveral different capacities. Gatekeeper alters will be found <strong>to</strong> thewhole system, often on the second level (section) down. Gatekeeperalters will also be found guarding import<strong>an</strong>t sections like the Carousel<strong>an</strong>d Castle. In review, Anger <strong>to</strong>ward God, <strong>an</strong>ger <strong>to</strong>ward the outsideworld, <strong>an</strong>d <strong>an</strong>ger <strong>to</strong>ward themselves are all built in<strong>to</strong> a System. Wherewas God? Where was the outside world, when all these things werehappening. M<strong>an</strong>y, if not all, of the victims of Monarch turn their <strong>an</strong>geron themselves, which is the only safe place <strong>to</strong> vent it. Most of thedeeper alters of a Monarch system will have very low self-esteem <strong>an</strong>dwill have lots of guilt <strong>an</strong>d <strong>an</strong>ger <strong>to</strong>ward themselves. <strong>The</strong> slave isvictimized so much, that when their h<strong>an</strong>dlers give them the ch<strong>an</strong>ce <strong>to</strong>victimize someone else, some victims find release in assaulting others.Of course the entire process of tr<strong>an</strong>sference further entraps the victim,<strong>an</strong>d provides more guilt <strong>an</strong>d more debilitating spiritual dynamics. <strong>The</strong>slave may be given the power of life or death over others, as well asthe power of deciding <strong>an</strong>other person’s eternal fate. Sometimes thispower is addictive. This addiction c<strong>an</strong> be a trap that binds the slave <strong>to</strong>his source of power. <strong>The</strong> power that the <strong>Illuminati</strong> give their slaves is oneof the major barriers preventing deeper alters from moving <strong>to</strong>wardfreedom when their systems have a ch<strong>an</strong>ce. Slaves also turn a greatdeal of <strong>an</strong>ger in on themselves. <strong>The</strong> self-image of most alters in aSystem is extremely low. <strong>The</strong> <strong>an</strong>ger that alters have becomes a <strong>to</strong>ol ofthe h<strong>an</strong>dler <strong>to</strong> insure that the slave never thinks highly enough ofthemselves <strong>to</strong> do <strong>an</strong>ything about the control over them. An example ofthis is Monarch slave Loretta Lynn. Loretta Lynn’s h<strong>an</strong>dler is her husb<strong>an</strong>dDoolittle. Although Loretta has worked (slaved) very long hard hoursshe credits Doolittle for all her success. Her programming allows her only<strong>to</strong> give him credit for her successes. In her “au<strong>to</strong>biography” LorettaLynn A Coal Miners Daughter, which was written by a professionalwriter who sat down <strong>an</strong>d worked with her, Loretta says on page 63, “Ina lot of ways, it was good for me <strong>to</strong> marry someone older th<strong>an</strong> me [herhusb<strong>an</strong>d Doo was a WW II vet/sat<strong>an</strong>ist who married her when she was13], because I could learn from him. But, in <strong>an</strong>other way, it wasn’t sogood because I went directly from Daddy <strong>to</strong> Doolittle without everbeing on my own. Even <strong>to</strong>day, men are telling me what <strong>to</strong> do. Myhusb<strong>an</strong>d, my lawyer, my account<strong>an</strong>t, my personal m<strong>an</strong>ager [Ken Riley,her road m<strong>an</strong>ager has been her mind-control h<strong>an</strong>dler, <strong>an</strong>d AlexHous<strong>to</strong>n & Reggie Maclaughlin have done some of her recentprogramming]. In a sense, I still don’t have complete control overmyself. Maybe I never will. But if it wasn’t for Doo [her nickname for herhusb<strong>an</strong>d & h<strong>an</strong>dler], we wouldn’t have what we have <strong>to</strong>day.” Angerwithin a System c<strong>an</strong> be d<strong>an</strong>gerous, when one alter directs its <strong>an</strong>ger<strong>to</strong>ward <strong>an</strong>other alter. Sometimes one alter will try <strong>to</strong> kill <strong>an</strong>other alter.Actually, this happens more often th<strong>an</strong> one might imagine. If the alter406


succeeds of course, the body will be dead, with the resultingconsequence that everyone dies. <strong>The</strong> programmers enjoy seeing thistype of drama, but they don’t w<strong>an</strong>t it <strong>to</strong> be carried out <strong>to</strong> its finalconclusion, so they generally, if not always, have alters who c<strong>an</strong> step in<strong>an</strong>d take the body <strong>an</strong>d s<strong>to</strong>p this. If the alter system c<strong>an</strong>’t, then alterswho underst<strong>an</strong>d what is going on c<strong>an</strong> call their master for help, <strong>an</strong>dthe master c<strong>an</strong> once again show how dependent they are upon himfor life. This is the “divide <strong>an</strong>d conquer” strategy. <strong>The</strong> divide <strong>an</strong>dconquer strategy is used repeatedly in constructing <strong>an</strong> alter system.PART F - TEACHING THAT THE MASTER IS GOD; THE PROGRAMMERS SETTHEMSELVES UP AS GODS.<strong>The</strong> Programmers <strong>an</strong>d the H<strong>an</strong>dlers are setting themselves up as gods,or Almighty God, or as a being from a superior race of aliens, such asKoldasi<strong>an</strong>s or Pleiadi<strong>an</strong>s. Interestingly, if one listens, these different alienraces make conflicting claims for whatever good the earth has.However, those of us who have followed the Monarch programmingknow that these aliens are just men who do the Programming. Time-lifePublishers (owned by men in the <strong>Illuminati</strong>) subtly gave this away intheir book <strong>The</strong> UFO Phenomenon when they referred <strong>to</strong> UFOabductions as “the Oz fac<strong>to</strong>r.” <strong>The</strong>y go on <strong>to</strong> say that its like Dorothy inthe Wizard of Oz on page 71. <strong>The</strong>n they go so far as <strong>to</strong> reemphasize thepoint by showing a picture of Dorothy in Oz. In the TV series on aliens &UFOs called the “X-Files”, they begin a show with <strong>an</strong> “I love you-I loveyou not” Monarch programming script. Often the Programmers tell thealters which they have created, that they are their Crea<strong>to</strong>r <strong>an</strong>dtherefore their God. In a spiritual sense, they <strong>to</strong>ok the place of God inevery way, including attributing the scriptures about God <strong>to</strong>themselves. This works well for <strong>Illuminati</strong> alters, because they areindoctrinated that all hum<strong>an</strong>s c<strong>an</strong> be divine. It also works well with non-<strong>Illuminati</strong> alters as long as they are under mind-control. However, theactions of the h<strong>an</strong>dlers are so ungodlike, that should the programmingbreak down, <strong>an</strong>d the alters get a taste of reality, these lies soon aretr<strong>an</strong>sparent. <strong>The</strong> lies that the h<strong>an</strong>dler is <strong>an</strong> alien are much harder <strong>to</strong>refute th<strong>an</strong> the lies that the h<strong>an</strong>dler is God. <strong>The</strong> trend appears <strong>to</strong> be forthe h<strong>an</strong>dlers <strong>to</strong> refer <strong>to</strong> themselves as a superior race of aliens. Most ifnot all of the people seeing aliens, are really just being jerked aroundby their h<strong>an</strong>dlers. This doesn’t me<strong>an</strong> that aliens do or don’t exist. It doesme<strong>an</strong> that those of us who have been working with people who havealien contact experiences <strong>an</strong>d who underst<strong>an</strong>d Monarch <strong>Mind</strong>-controlhave only seen people obviously under mind-control. Fritz has yet <strong>to</strong>meet someone who has had <strong>an</strong> “alien contact” who wasn’t undermind-control. In 1992, a book Exposing <strong>The</strong> Mystery of Iniquity wasstarted by Fritz Springmeier showing the connections between so407


called “aliens” <strong>an</strong>d “demons.” Is it coincidence that the demon SirJohn Dee conjured for his enochi<strong>an</strong> magic looks just like a small greyalien pictured so often <strong>to</strong>day? People who have participated in highlevel <strong>Illuminati</strong> ceremonies speak about guardi<strong>an</strong>s which are nephalim(half hum<strong>an</strong>-half demon) which are the offspring of mixing hum<strong>an</strong>s withdemons, <strong>an</strong>d who look like the variety of “aliens” that are so oftenreported. <strong>The</strong> subject of nephalim <strong>an</strong>d whether aliens are or are notvisiting us is <strong>to</strong>o vast for this book. However, these nephalim guardi<strong>an</strong>sare perceived as real by <strong>Illuminati</strong> members, <strong>an</strong>d they strikeincalculable fear within the members of the <strong>Illuminati</strong>. As one of the bigsources of fear, the guardi<strong>an</strong>s take their place as part of the controlmech<strong>an</strong>isms <strong>to</strong> keep slaves in place. Polls taken by others, have foundthat 100% of Sat<strong>an</strong>ists have had a experience with UFOs, <strong>an</strong>d reportsome type of “alien” abduction. (<strong>The</strong> Programmers & upper levelhierarchy don’t get themselves in polls, <strong>an</strong>d the lower levels are allprogrammed.) <strong>The</strong> point is that there is a close relationship betweenUFOs <strong>an</strong>d the occult world. On the following page are some of themore respectable scripts that persons, who are victims of “alienabductions” see in their heads. Signs of MPD were visible in each ofthese cases, <strong>an</strong>d these abductee are placing their wills at thecomm<strong>an</strong>d of these “higher beings”. <strong>The</strong>ir wills are subservient <strong>to</strong> the willof the “alien”. <strong>The</strong>y receive messages in these scripts in altered states ofconsciousness. Some of the scripts are blat<strong>an</strong>tly sat<strong>an</strong>ic magic scripts<strong>an</strong>d sigils, but the majority are blat<strong>an</strong>tly of hum<strong>an</strong> design. It stretchesthe imagination that most alien scripts would have a l<strong>an</strong>guage <strong>an</strong>dscript that matches the English alphabet, with the same letterfrequencies of English letters--that is ‘‘a’s”, ‘‘m’s’’, <strong>an</strong>d are found inabund<strong>an</strong>ce. It stretches the imagination passed the breaking point <strong>to</strong>think that aliens light years away with different vocal cords or whateverthey have, evolved a script that corresponds <strong>to</strong> English, when ouralphabet doesn’t correspond <strong>to</strong> Greek, or S<strong>an</strong>skrit, or Ogham thatclosely. Quite a few abductees have the “aliens” give them morecomplex versions of their “alien script” as they get older. <strong>The</strong> simplifiedversion is received as a child, <strong>an</strong>d then it evolves. It appears that thereare now numerous programmers, who are simply concocting made-upscripts, <strong>an</strong>d hypnotically telling their poor hapless victim that the script isalien. In this respect, these scripts are really codes--not “alien scripts”.<strong>The</strong>y are full of what are called follows. Follows are symbols that aresimilar <strong>to</strong> one <strong>an</strong>other, which are a variation on a theme. Test resultshave shown that made-up scripts have m<strong>an</strong>y more follows that <strong>an</strong>actual real his<strong>to</strong>rical script. <strong>The</strong> occult world are teaching that theAkashic record of all recorded information lies somewhere in theessence of space called the reticulum dei (the network of God). <strong>The</strong>mind-control victim, who actually gets his au<strong>to</strong>matic writing <strong>an</strong>d hisinformation from deep in his system, is led <strong>to</strong> believe that he has gottenit from the Akashic record. <strong>The</strong> spiritual dynamics of the Programmersetting himself up as God are far reaching. <strong>The</strong> spiritual world mirrors408


the physical world. In the physical world, in biology, researchers havefound that chemicals that resemble other natural body chemicals c<strong>an</strong>be substituted in for those original chemicals with far reaching effects.For inst<strong>an</strong>ce, <strong>an</strong>ti-histamines do not destroy histamine, they resemblehistamine enough that they steal the places that histamine text -----continued after the piucture below ------molecules attach themselves <strong>to</strong> cells. Because the histamine moleculeshave had their attachment places s<strong>to</strong>len, they c<strong>an</strong>’t interact with thecells. Within the spiritual realm the very same thing happens. <strong>The</strong> Anti-Christ is less of a Christ destroyer as he is a Christ replacement. Truespiritual power is replaced within the world by the religious spirit. WithinChristendom, the religious spirit has replaced much of the positions thatshould have gone <strong>to</strong> true faith. <strong>The</strong>refore the power of true faith isdestroyed by simply being replaced <strong>an</strong>d its position usurped. <strong>The</strong>foundation for the religious spirit are fear <strong>an</strong>d pride, which are alsofoundational pillars for the Monarch programming. <strong>The</strong> religious spiritc<strong>an</strong> be detected when someone reads <strong>an</strong> admonishment <strong>an</strong>d c<strong>an</strong>apply it immediately <strong>to</strong> others <strong>an</strong>d not <strong>to</strong> oneself. When a person sins,for example Eli in the book of Samuel, the religious spirit will propel them409


<strong>to</strong> make a sacrifice <strong>to</strong> cover that sin like Eli did. However, that religiouszeal <strong>to</strong> cover sin by doing good <strong>an</strong>d giving sacrificially of oneself, stemsfrom the religious spirit not the holy Spirit of God (See 1 Samuel 3:13-14).Religious zeal done <strong>to</strong> cover sin is not accepted by Almighty God. Eli’ssons “despised the offering of the LORD” (1 SAM 2:17). One of theoutgrowths of SRA upon the Monarch victim is that they will generallyexhibit black <strong>an</strong>d white thinking. Black <strong>an</strong>d white thinking is actually <strong>an</strong>element of the religious spirit, which in spiritual terms pervades theMonarch victim. <strong>The</strong> Monarch victim’s system is set up <strong>to</strong> usurp truefaith. Something has <strong>to</strong> replace true faith, <strong>an</strong>d the religious spirit is agood substitute. Perfectionism or unloving idealism is part of thereligious spirit. This perfectionism will dem<strong>an</strong>d that if a person c<strong>an</strong> notbe perfect, they should give up. <strong>The</strong> holy Spirit of God gives hope. <strong>The</strong>religious spirit destroys hope by dem<strong>an</strong>ding more th<strong>an</strong> people c<strong>an</strong>give. As long as people are travelling the journey of seeking God, theydon’t need <strong>to</strong> have arrived <strong>to</strong> perfection. Idealism w<strong>an</strong>ts people <strong>to</strong> beat the destination at once or not start the journey. This religious spirit hass<strong>to</strong>pped m<strong>an</strong>y victims of Monarch programming from moving forward<strong>to</strong> real freedom. It is a very powerful type of spirit. M<strong>an</strong>y people arewaiting until they are perfect <strong>to</strong> help minister <strong>to</strong> others. Sadly this is <strong>an</strong>outgrowth of the religious spirit. We do not need <strong>to</strong> be perfect <strong>to</strong> helpothers. <strong>The</strong> following is <strong>an</strong> actual account: a Christi<strong>an</strong> m<strong>an</strong> who didn’tunderst<strong>an</strong>d mech<strong>an</strong>ics very well s<strong>to</strong>pped <strong>to</strong> see what he could do <strong>to</strong>help <strong>an</strong> elderly couple str<strong>an</strong>ded on the road. <strong>The</strong> car miraculouslystarted for the Christi<strong>an</strong> <strong>an</strong>d he was able <strong>to</strong> have the couple follow him<strong>to</strong> a repair station at the next <strong>to</strong>wn. But the attitude of the Christi<strong>an</strong> was<strong>to</strong> make himself available <strong>to</strong> God--not that he was going <strong>to</strong> fixsomeone else’s problem. <strong>The</strong> couple was sure they had been visited by<strong>an</strong> <strong>an</strong>gel. What is being discussed is how setting oneself up as “a god”or “God” is part of the religious spirit that attracts itself <strong>to</strong> so m<strong>an</strong>y of us.One of the attributes of the religious spirit is that it will notice what iswrong in a person rather th<strong>an</strong> discerning what is right. Unlessdiscernment is based upon love, discernment will be warped. Churchescaught up in the religious spirit have mercy on the things that areabominations <strong>to</strong> God. Likewise, they show unwarr<strong>an</strong>ted mercy on theactions of ministers who have mercy on things that are abominations <strong>to</strong>God. One of the best examples is the religious front this book discussedin detail in chapter 5. Billy Graham, a Monarch slave h<strong>an</strong>dler, is onpublic record endorsing Mao-tse-tung’s teachings, abortion, salvationthrough witchcraft, the One-World-Church in alli<strong>an</strong>ce with the world’spolitical power, <strong>an</strong>d m<strong>an</strong>y other things. Quite a number of Freemasons,ex- <strong>an</strong>d current members have stated that Billy Graham is a secretFreemason, however, his staff denies this. <strong>The</strong> religious spirit has r<strong>an</strong> acampaign <strong>to</strong> cover up Billy Graham’s personal use of prostitutes, m<strong>an</strong>yof them Monarch kittens. And some of these Monarch kittens havebeen able <strong>to</strong> reveal the facts of their abuse.410


Billy Graham is a “prophet” who works for the Network. <strong>The</strong> point is thatchurches turn a blind eye <strong>to</strong> these things. Fritz has tried <strong>to</strong> approachministers about these things, <strong>an</strong>d there isn’t <strong>an</strong> open ear. By the way,Almighty God still c<strong>an</strong> step above what Billy Graham is <strong>an</strong>d work inspite of it. Sat<strong>an</strong>ists c<strong>an</strong> infiltrate the highest church positions, but theywon’t s<strong>to</strong>p good from eventually conquering evil, <strong>an</strong>d God’s will beingdone. When we write “God’s will”, please underst<strong>an</strong>d that God hasseveral types of will, including a conditional will, <strong>an</strong>d <strong>an</strong> ultimate will. Hisconditional will is let men have what they w<strong>an</strong>t. His ultimate will is <strong>to</strong> seeHis creation be a wonderful paradise. <strong>The</strong> religious leaders in Jesus’ daygot rid of true prophets. <strong>The</strong> religious spirit <strong>to</strong>day will do the same. <strong>The</strong>religious spirit causes people <strong>to</strong> flagellate their backs with whips. ARussi<strong>an</strong> br<strong>an</strong>ch of the <strong>Illuminati</strong>, called the Skoptsi, are famous for theself-inflicted <strong>to</strong>rtures including castration that they carry out upon theirbodies. <strong>The</strong> religious spirit causes people <strong>to</strong> have self-abasement forthe wrong motives. Discipline <strong>an</strong>d faith are worthy things <strong>to</strong> have, butnot if they are done out of only love for oneself rather th<strong>an</strong> also love forone’s Crea<strong>to</strong>r. This is why sat<strong>an</strong>ic alters have such a hard time seeingwhat Christi<strong>an</strong>ity has for them. <strong>The</strong>y see the religious spirit of Christi<strong>an</strong>ity<strong>an</strong>d they realize that Sat<strong>an</strong>ism has a more powerful form of religion.Sat<strong>an</strong>ism is based upon legalism (the rituals have <strong>to</strong> be exactly so), <strong>an</strong>dupon pride, <strong>an</strong>d fear. To make <strong>an</strong> <strong>an</strong>alogy, the religious spirit is like am<strong>an</strong> or wom<strong>an</strong> who dresses <strong>to</strong> get compliments rather th<strong>an</strong> dressingnice <strong>to</strong> please their spouse. In other words, the m<strong>an</strong> who wearssomething that offends his wife, because he w<strong>an</strong>ts other men <strong>to</strong> thinkhe is macho, has a similar motivation as the religious spirit.<strong>The</strong> author of the religious spirit is Sat<strong>an</strong>, the author of death. Godw<strong>an</strong>ts people <strong>to</strong> choose thing which are excellent <strong>an</strong>d make their livescount for eternity. On the flip side, the programmers, who worship &serve Sat<strong>an</strong> in their invocations, murder their victims in 4 ways of death-- mental, moral, spiritual, <strong>an</strong>d physical death. <strong>The</strong>y program 4 types ofongoing suicide in<strong>to</strong> their slaves. <strong>The</strong>y bring them a. mental suicide, b.moral suicide, c. spiritual suicide, <strong>an</strong>d d. push some alters <strong>to</strong> physicalsuicide, <strong>an</strong>d program others <strong>to</strong> commit physical suicide. <strong>The</strong>y push theirslaves in<strong>to</strong> near death experiences--some alters die, <strong>an</strong>d arediscarded. Often, there are “dead” alters within a live System. a. Toperpetuate mental death, the programmers administer drugs, hypnosis,<strong>an</strong>d false philosophies, <strong>an</strong>d programming <strong>to</strong> wipe the truth out of theslaves mind. This is mental murder. b. Resist<strong>an</strong>ce <strong>to</strong> evil is the essence oflife. By requiring their slaves <strong>to</strong> engage in the worst moral impurities,these parts lose their spiritual eyes. This is moral murder. (2 Peter 1)411


PART G - Portals <strong>an</strong>d focal points.Within the occult world, the entire study of demonology is wrappedaround the geometric shapes that serve as focal points for demons(such as made by crystals <strong>an</strong>d pyramids), <strong>an</strong>d the portals by whichdemons c<strong>an</strong> enter the hum<strong>an</strong> body. A demon doesn’t have <strong>to</strong> bematerialized (conjured up) <strong>to</strong> enter in<strong>to</strong> a body. Geometric shapeswhich are believed <strong>to</strong> attract demons are placed in<strong>to</strong> the internalworlds of slaves. <strong>The</strong> will of the person also plays a role in theintroduction of demons in<strong>to</strong> the body. Torture attaches <strong>an</strong>d layers indemons within the body. Sex <strong>an</strong>d blood sacrifices are used <strong>to</strong> attachpowerful demons. According <strong>to</strong> high level demonology, certainpowerful spirits c<strong>an</strong> only be m<strong>an</strong>ipulated if there are blood sacrifices.This may seem str<strong>an</strong>ge, however, the record (evidence) bears out thatgenerational victims of possession who have had demons placed in viablood sacrifices are definitely controlled by more powerful demonicforces. All of the chahkra points, <strong>an</strong>d the orifices <strong>to</strong> the hum<strong>an</strong> bodyserve as portals. Both the <strong>Illuminati</strong> <strong>an</strong>d Christi<strong>an</strong> deliver<strong>an</strong>ce ministriesagree that the mouth, ears, nose, <strong>an</strong>us, etc. are portals. High influxes ofdemonic energy in<strong>to</strong> the body is accomp<strong>an</strong>ied by a burning sensation.<strong>The</strong> Mother of Darkness who is assigned <strong>to</strong> a child who is beingprogrammed has <strong>to</strong> oil the child periodically <strong>to</strong> protect it from thisburning. <strong>The</strong> goal <strong>to</strong> possess someone of spirits, or <strong>to</strong> be possessed byspirits has been practiced since the early times of m<strong>an</strong>kind. InLlewellyn’s New Worlds of <strong>Mind</strong> <strong>an</strong>d Spirit magazine June/July 1994,issue #943, they write, “<strong>The</strong> golem of Prague is perhaps the mostfamous example of ‘practical cabala’--the use of cabala for magicalcabala.” Scholem in his excellent treatise on the Cabala has <strong>an</strong> entirechapter about the Golem. <strong>The</strong> golem were mind-controlled slavescreated by the magick of the Cabala. <strong>The</strong> Cabala, according <strong>to</strong> thebest masonic authorities, including Albert Pike in his famous Morals <strong>an</strong>dDogma book is the basis of Freemasonry. By extension then, it is clearthat the goal of having a mind-controlled golem has been the goal ofFreemasonry, because that goal is the best example of practicalcabala. This is the paper trail, that let’s us view the secret goals of thesecret world of Freemasonry. <strong>The</strong>re are Cabalistic grades withinFreemasonry. Sexual slaves were used by the higher <strong>an</strong>d more occultMasonic rites in the 19th century. <strong>The</strong>se sexual slaves were subjected <strong>to</strong>tr<strong>an</strong>ces <strong>an</strong>d demonic possessions. <strong>The</strong>y were subjected <strong>to</strong> all types ofperverse magical rituals. <strong>The</strong> Cabala teaches intercourse with demons.<strong>The</strong>urgy is the skill or ability <strong>to</strong> invoke demons variously called <strong>an</strong>gels oflight, genii, spirits of various kinds, such as elemental spirits. Demonscome with a price <strong>an</strong>d that price is blood. Sat<strong>an</strong>ism <strong>an</strong>d Luciferi<strong>an</strong>ism<strong>an</strong>d other similar cults are blood cults that require blood <strong>to</strong> besacrificed <strong>to</strong> pull in certain demons. For inst<strong>an</strong>ce, blood may be takenfrom both the <strong>to</strong>ngue <strong>an</strong>d the genital area <strong>an</strong>d mixed in a certainceremony <strong>to</strong> invoke a particular demon. Demons are not bought with412


gold or silver, they are bought with blood. Some spirits are invoked byplacing alcoholic enemas in<strong>to</strong> the child. <strong>The</strong>se children get <strong>to</strong>tallyin<strong>to</strong>xicated with alcohol, some <strong>to</strong> the point that they even die from theceremony. This is all done <strong>to</strong> bring in particular demons. <strong>The</strong> SpiritChoronzon <strong>an</strong>d Typhon are critical spirits <strong>to</strong> place in<strong>to</strong> a person for the<strong>Mind</strong>-Control <strong>to</strong> work. <strong>The</strong> <strong>Illuminati</strong> do not believe the <strong>Mind</strong>-control willwork without the assist<strong>an</strong>ce of these spirits. Typhon <strong>an</strong>d Choronzon dothe tunneling <strong>an</strong>d the MPD work. An example of <strong>an</strong> import<strong>an</strong>t ritual <strong>to</strong>demonize the victim is the baptism of the child victim <strong>to</strong> Sat<strong>an</strong>. Sat<strong>an</strong>may be called Set in the ritual. <strong>The</strong>re are variations on this ceremony,so a victim’s personal baptism may vary in some or all of the details.This is actual variation of the ritual done <strong>to</strong> Monarch mind-controlledslaves: <strong>The</strong> child is stripped nude <strong>an</strong>d given a purple robe. It is placedinside the pentegram, <strong>an</strong>d <strong>an</strong> “altar” which is made by a nude wom<strong>an</strong>or child is brought forward. A horse or jackal is inscribed with theinscription “Nebebka” on the neck or forehead. <strong>The</strong>n the <strong>an</strong>imal issacrificed <strong>to</strong> whatever name the group is using for Sat<strong>an</strong> (such as Se<strong>to</strong>r Sam<strong>an</strong>). <strong>The</strong> abdomen of the beast is split open completely, <strong>an</strong>d theliver removed. <strong>The</strong> 4 spirits of the 4 watch<strong>to</strong>wers are invoked. <strong>The</strong> slavechild being baptized is smeared with fat from the dead beast. <strong>The</strong>Gatekeeper spirit is called by ringing a bell. <strong>The</strong>n the child is placedin<strong>to</strong> the <strong>an</strong>imal’s belly. A part of the raw liver is given <strong>to</strong> the child <strong>an</strong>dthe rest consumed by the group. <strong>The</strong> child is then baptized in blood. Acut called the Devil’s Seal is placed on the child on the left h<strong>an</strong>d, orunder the armpit, or on the upper part of the head. This in Cabalism isthe Mark of Foundation. <strong>The</strong> Priest reads out of the Book of Sat<strong>an</strong> <strong>an</strong>dthe Book of Names. <strong>The</strong> victim repeats after the Priest. In this fashion thePriest ritually gives the person a new name. <strong>The</strong> D<strong>an</strong>ce of Hod (Glorythesphere on the bot<strong>to</strong>m left of the C. Tree of Sephiroth) is then begunin a circular motion by the cult, <strong>to</strong> oppose Netsah (Vic<strong>to</strong>ry-the sphereon the bot<strong>to</strong>m right of the Tree). <strong>The</strong> Priest of the coven will then dismissthe demon(s) he has conjured. At times this ritual is done with a childsacrifice rather th<strong>an</strong> <strong>an</strong> <strong>an</strong>imal, & sometimes it is done in conjunctionwith <strong>an</strong>other ritual, such as All Hallow’s Eve. To empower the MonarchSystem, special rings which have been dipped in the blood ofsacrificed victims, are given <strong>to</strong> the victim with instructions <strong>to</strong> wear itfaithfully. <strong>The</strong> rings are used as focal points <strong>to</strong> insure the continueddemonization of the victim. Some examples of this would be a BlueTopaz ring, a Black Onyx ring, or a Diamond ring. Black Onyx is used <strong>to</strong>capture souls. Whether the therapist believes this or not, becomesirrelev<strong>an</strong>t in view of the fact that the deeper alters in a MonarchSystem are skilled in demonology <strong>an</strong>d they do believe it, <strong>an</strong>d takeconsolation that their magical powers are never challenged bytherapists. <strong>The</strong>se deeper alters will continue <strong>to</strong> do much of thedemonization of the system for the Programmer, <strong>an</strong>d this delegation ofthis job, me<strong>an</strong>s the Programmer/h<strong>an</strong>dler is free <strong>to</strong> focus on other things.Our experience is that the Slave Masters within the <strong>Illuminati</strong>, when they413


take away the hearts of the alters of a system, they give them a hear<strong>to</strong>f s<strong>to</strong>ne <strong>an</strong>d a ring. <strong>The</strong> ring is import<strong>an</strong>t for if they lose this, they thinkthey will not get their hearts back. <strong>The</strong> slaves will wake up in the middleof the night looking for a ring--but never knowing what ring they arelooking for. “CATCH A FALLING STAR, PUT IT IN YOUR POCKET FOR ARAINY DAY” ties in with this s<strong>to</strong>ry line. <strong>The</strong> star is magical stardust. Duringprogramming the Programmers use “magical star dust.” If the slaveloses their ring, they are <strong>to</strong>ld the Master will never love them. When theMaster comes <strong>to</strong> give his love, then the slave will get <strong>to</strong> use theirmagical w<strong>an</strong>d with its star dust. <strong>The</strong> ring of the Programmer, which hasoccult power from being used in ritual, is also used as a hypnotic cue.<strong>The</strong> ring also represents occult power <strong>an</strong>d authority.PART H - VOWS & OATHS<strong>The</strong> Illum. & generational occult families attach Ancestral &Generational curses (noted about in EX 20:5-6, DT 23:2, 2 KG 5:27, JER32:18, JER 3:25, LEV 26:40) <strong>to</strong> the victim.<strong>The</strong> Programmers create soul ties (intermeshment with others in <strong>an</strong>ungodly way), including intermeshment of spirits. Sex, emotionaldependence, <strong>an</strong>ger <strong>an</strong>d love c<strong>an</strong> be tied <strong>to</strong> this dependence. <strong>The</strong>spiritualpower of the Communion meal--which is a form of the Passovermeal (deliver<strong>an</strong>ce) & the Marriage Supper of the Lamb (wholeness inheaven) is reversed by Black Mass’s symbolism/bondage.<strong>The</strong> Moriah & other occult groups attach curses <strong>to</strong> a person that arebrought on by occult involvement. <strong>The</strong>se curses are the consequencesof sinful occult involvement.<strong>The</strong> Monarch programmers force the slave <strong>to</strong> make bloodcoven<strong>an</strong>ts, contracts, oaths, <strong>an</strong>d <strong>to</strong> shed innocent blood. Often timesthe deeper alters feel like they have made these contracts willingly--however, if they could see the whole picture they would realize thatthey were forced <strong>an</strong>d deceived in<strong>to</strong> accepting these occult practices.To free themselves of these oaths <strong>an</strong>d coven<strong>an</strong>ts every alter has <strong>to</strong>break them, or at least the main alter breaks it for others. What variouswitchcraft <strong>an</strong>d <strong>Illuminati</strong> slaves will experience will be Sat<strong>an</strong> drawingblood from their left h<strong>an</strong>d <strong>an</strong>d causing them <strong>to</strong> write in the slave’s ownblood a formal contract entering his service. <strong>The</strong> ceremony has alasting impression. <strong>The</strong>ir signature in the Great White Book, which is <strong>an</strong>import<strong>an</strong>t <strong>Illuminati</strong> document, which has everyone’s signature willch<strong>an</strong>ge color, <strong>an</strong>d they will lose their magical power, etc. This creates414


a double bind, if they keep the System “safe”, they c<strong>an</strong>’t get out. <strong>The</strong>yneed <strong>to</strong> underst<strong>an</strong>d that greater is Jesus th<strong>an</strong> he who is the world. SeeCol. 2:15 also, which speaks about him triumphing over theprincipalities <strong>an</strong>d powers. <strong>The</strong> <strong>Illuminati</strong> & the Network keeps bookswhich have the signatures of all their membership, including slaves.<strong>The</strong>y tell the slave that if they ever break a coven<strong>an</strong>t with them, thatSat<strong>an</strong> will cause the signature in blood <strong>to</strong> turn green. In other words,the slave is led <strong>to</strong> believe <strong>an</strong>d is convinced that if they ever renege ontheir vows <strong>to</strong> Sat<strong>an</strong> <strong>an</strong>d the New World Order, they will be inst<strong>an</strong>tlyfound out. Even the americ<strong>an</strong> presidents are reported <strong>to</strong> bethreatened with this type of threat.<strong>The</strong> “birthright” of a child born <strong>to</strong> <strong>Illuminati</strong> parents is <strong>to</strong> be allowed in<strong>to</strong>sat<strong>an</strong>ic coven level activity. Alters which function at coven levels, willbe far removed in a Monarch system from <strong>Illuminati</strong> hierarchy alters.<strong>The</strong> coven level will also be called the <strong>an</strong>archy level <strong>an</strong>d is representedby <strong>an</strong> A. One of the early oaths taken by the <strong>Illuminati</strong> child before theGr<strong>an</strong>d Druid Council is, “Sat<strong>an</strong> the Way <strong>an</strong>d the Light. No one comes<strong>to</strong> me except through the father of light which is the Anti-Christ. I, [birthname], by my free choice take the following oath. I commit <strong>to</strong> servemy body <strong>an</strong>d spirit in union with the father of light for the <strong>to</strong>talprosperity <strong>an</strong>d insur<strong>an</strong>ce of the vic<strong>to</strong>ry of Sat<strong>an</strong> <strong>an</strong>d the father of lightthe AntiChrist. Now within <strong>an</strong> unbroken circle of spiritual power,underst<strong>an</strong>ding <strong>an</strong>d accepting the consequences of breaking thespiritual circle which joins the Mothers of Light (later they learn that theyhave joined the Mothers of Darkness). with each other <strong>an</strong>d <strong>to</strong> thefather of light. I [<strong>Illuminati</strong> coven name] with these bonds in placecommit <strong>to</strong> rule within the spiritual union over the principalities ofdarkness <strong>to</strong> insure Sat<strong>an</strong>’s power <strong>an</strong>d control over the world. I forevertake on the seal of the father of light <strong>an</strong>d commit my eternal life <strong>to</strong>serve Sat<strong>an</strong> as the prince of peace, savior, <strong>an</strong>d spiritual light for ever<strong>an</strong>d ever. I now denounce the truth of the God, the resurrection ofChrist <strong>an</strong>d the power of the Holy Spirit.” Should the person break thisvow, they are programmed <strong>to</strong> remember <strong>to</strong>rture on a cross, which isdesigned <strong>to</strong> cause a seizure <strong>an</strong>d heart failure. <strong>The</strong> Final Vows of aMother of Darkness or a Gr<strong>an</strong>d Master will make these cult alters feellike they are bound <strong>an</strong>d trapped in service <strong>to</strong> Sat<strong>an</strong>. <strong>The</strong>y are almostalways unaware that Almighty God doesn’t recognize such vows, <strong>an</strong>dwill willingly release them from their evil servitude. <strong>The</strong> black s<strong>to</strong>ne isused in the Mothers-of-Darkness vows. <strong>The</strong> book of Revelation speaksabout a white s<strong>to</strong>ne with a name written on it. Mothers of Darknessalters get a black s<strong>to</strong>ne with their assigned Queen goddess nameswritten on them. Those who have been on the inside of Sat<strong>an</strong>ism knowthat oaths taken by occult lodges <strong>an</strong>d sat<strong>an</strong>ic cults are at timesenforced. <strong>The</strong> oaths describe the type of trai<strong>to</strong>r’s death that is <strong>to</strong> becarried out. An example of the types of penalty these oaths carry c<strong>an</strong>be seen in the following words, “All this I most solemnly <strong>an</strong>d sincerely415


promise <strong>an</strong>d swear with a firm steadfast resolution, <strong>to</strong> keep <strong>an</strong>dperform the same without <strong>an</strong>y equivocation, mental reservation orsecret evasion of mind whatever, binding myself under no less penaltyth<strong>an</strong> that of having my throat cut across, my <strong>to</strong>ngue <strong>to</strong>rn open, myheart plucked out my body severed in twain, my bowels taken fromthence <strong>an</strong>d burned <strong>to</strong> ashes, should I knowingly violate this my solemnobligation.” <strong>The</strong> coven<strong>an</strong>ts, <strong>an</strong>d vows <strong>an</strong>d threats all work <strong>to</strong>gether <strong>to</strong>keep people in line. Alters within a Monarch slave are conditioned bytheir servitude <strong>to</strong> believe that their life is controlled by Sat<strong>an</strong>, who isstronger th<strong>an</strong> God. Where was God when they needed him? And yetm<strong>an</strong>y of the Monarch slaves coming in for therapy have had numerousmiracles in their lives that have given them the latitude <strong>to</strong> reach out forhealth <strong>an</strong>d freedom. If the Monarch alters c<strong>an</strong> not see the positives ofwhat God has done, they will remain trapped in their perception thatSat<strong>an</strong> rules. Actually, the survivors of the <strong>Illuminati</strong>’s mind-control wereme<strong>an</strong>t <strong>to</strong> play a big role in helping God upset the detailed sat<strong>an</strong>icscript. And because these people sincerely gave their lives <strong>to</strong> Christaround the age of 2, God will honor that <strong>an</strong>d help them. At <strong>an</strong>y rate,even the informed secular therapist should realize these programmedslaves are in the middle of some power struggles. <strong>The</strong>y are instrumentsof the Sat<strong>an</strong>ic hierarchy <strong>to</strong> carry out their pl<strong>an</strong>s. <strong>The</strong> Network goes ou<strong>to</strong>f their way <strong>to</strong> enh<strong>an</strong>ce the slave’s perception that the occult rules.Along this line, President Reag<strong>an</strong> insisted the Monarch programmerMichael Aquino wear his black sat<strong>an</strong>ic ritual robes <strong>to</strong> a White Houseparty. (One c<strong>an</strong> read more about that night in Tr<strong>an</strong>sformation ofAmerica, p.129-130.) Working h<strong>an</strong>d in h<strong>an</strong>d with the vows <strong>an</strong>d theoaths, are the extreme measures the Network goes <strong>to</strong>, <strong>to</strong> convince theslave that they are always being watched. This is the “You c<strong>an</strong> run, butyou c<strong>an</strong>’t hide” programming. Supposedly, the slave is being watchedby satellite no matter where they go. For inst<strong>an</strong>ce, at Offit Air ForceBase in Nebraska, <strong>an</strong> underground viewing room is used <strong>to</strong> convinceMonarch slaves they have no place <strong>to</strong> hide. <strong>The</strong>re the walls havenumerous “satellite pictures” from around the world. <strong>The</strong> satellites arecalled “Eye in the Sky.” A four-screen viewer pretends <strong>to</strong> respond <strong>to</strong> thetype-in comm<strong>an</strong>ds of <strong>an</strong> air force official who tells the slave, “Wherewill you run? To the Artic? <strong>The</strong> Antarctic? Brazil? <strong>The</strong> Mountains?...Wec<strong>an</strong> find you there. <strong>The</strong>re is truly no place <strong>to</strong> run <strong>an</strong>d no place <strong>to</strong> hide.”This show, which was made <strong>to</strong> convince the mind-controlled slave ofthe NWO’s prowess, is just a pre-made slide show, it is just theatrics.However, the computer chips they have been impl<strong>an</strong>ting in<strong>to</strong> peopledo give them the ability <strong>to</strong> track their slaves. And the intelligenceagencies do have spy satellites. <strong>The</strong> NWO is protected from nuclearattack via the Pentagon’s C³I (pronounced “see-cubed-eye”)me<strong>an</strong>ing comm<strong>an</strong>d, control, communication & intelligence. Animport<strong>an</strong>t part of C³I is MILSTAR which is a global central nervous systemof 9 satellites <strong>an</strong>d about 3,500 million dollar MILSTAR terminals on theground. <strong>The</strong> CIA has among other things, the $300 million Vortex spy416


satellite <strong>an</strong>d a $500 million Magnum spy satellite which were recentlylaunched.PART I - LAYERING IN DEMONSIn the Americ<strong>an</strong> Journal of Psychotherapy, two noted psychiatrists <strong>an</strong>d<strong>an</strong> M.D. from India wrote <strong>an</strong> article “Multiple Personality in India:Comparison with Hysterical Possession State”. <strong>The</strong> tenor of the articlewas that in India, the psychiatrists have <strong>to</strong> deal with demonicpossession rather th<strong>an</strong> MPD which is found in the west. <strong>The</strong>y madecomparisons of demonic possession in India <strong>to</strong> the MPD of the west,which are similar but not the same. Later, other articles <strong>an</strong>d letters werewritten about this article. One of the criticisms was that these Indi<strong>an</strong>psychiatrists were trying <strong>to</strong> compare their demonic possession <strong>to</strong> thewest’s MPD when it was obvious that their cases of demonic possessiondid not meet all the criteria of MPD. In the experience of the co-authorsof this book, demonic possession is not MPD (DID) but it does havem<strong>an</strong>y of the same characteristics. If we underst<strong>an</strong>d programming fromthe Programmers point of view, they believe in both MPD <strong>an</strong>d Demonicpossession. From the programmers point of view, they try <strong>to</strong> create thealters <strong>an</strong>d demonize the alters. Several ex-Programmers have <strong>to</strong>ld Fritzthat if a person really w<strong>an</strong>ts <strong>to</strong> underst<strong>an</strong>d the Monarch trauma-basedmind-control, they need <strong>to</strong> realize that it is fundamentally demonicbased.Both of the co-authors have had <strong>to</strong> sit through lectures bysecular therapists who dismissed Sat<strong>an</strong>ism <strong>an</strong>d the occult as simply as<strong>an</strong> excuse on the part the abusers <strong>to</strong> traumatize their victims.According <strong>to</strong> these secular therapists, demon possession <strong>an</strong>d sat<strong>an</strong>icrituals have nothing <strong>to</strong> do with therapeutic issues, but are merelygames <strong>an</strong>d charades put on by the abusers. We beg <strong>to</strong> differ with thispoint of view. Programming <strong>an</strong>d mind-control c<strong>an</strong> not be separatedfrom demonology <strong>an</strong>d occult ritual. Even the “alien programming” useslots of occult symbols, rituals & spiritual programming. An example ofhow ritual & programming overlap is the sabbat ceremony <strong>to</strong> insurethat cult slaves keep silent no matter what, even under <strong>to</strong>rture. On afull moon sabbat, a large oak tree will be used <strong>to</strong> hold this nightceremony. A Majic cake, also known as a Red or Acacia Cake is madefor the ceremony. <strong>The</strong> demon seer is invoked using the name Shaddai(one of its 9 mystic names). An unbaptized child, who has been takenfrom Christi<strong>an</strong> parents, is in the middle of the Pentagram, <strong>an</strong>d a livealtar consisting of a wom<strong>an</strong> is used. A magic square called Satarformula is carved on<strong>to</strong> the child with <strong>an</strong> Eagle or Rooster claw. <strong>The</strong>child is turned <strong>to</strong> the 4 directions <strong>an</strong>d then turned face down <strong>to</strong>wardthe east. <strong>The</strong> child must curse <strong>an</strong>d blaspheme God Almighty. <strong>The</strong>n itsmouth is gagged with a purple cloth. Flesh is cut from the child, <strong>an</strong>dmixed with black millet <strong>an</strong>d given <strong>to</strong> Sat<strong>an</strong> (also called Sheit<strong>an</strong>).417


Prayers in Enochi<strong>an</strong> are said. Incense is lit. <strong>The</strong> child is now sacrificed <strong>to</strong>Sat<strong>an</strong>, using the ritual athame (perhaps a black h<strong>an</strong>dled dagger),while the child is condemned by the cult <strong>to</strong> hell. This type of ritual is <strong>to</strong>instill fear of talking <strong>an</strong>d praying in<strong>to</strong> the cult members. One of thesecret ceremonies <strong>to</strong> invoke demons comes from <strong>The</strong> Book of Beasts. Itis <strong>an</strong> <strong>an</strong>cient ceremony <strong>to</strong> summon demons. <strong>The</strong> ceremony begins withreading the Tetragramma<strong>to</strong>n Elohim, the Creature of Judgement isinvoked, as well as the 9 mystic names of the dead. A child is skinned<strong>an</strong>d sacrificed. <strong>The</strong> Book of the Old Faith is read from. And then thedemons are dismissed <strong>an</strong>d a bell rung in the 4 directions. Monarchslaves recall the stench of the demons, <strong>an</strong>d the roar that they makewhen invoked. To live through a horrifying experience like this doesimpact the slave, <strong>an</strong>d therapists need <strong>to</strong> quit ignoring the variousimpacts that effect the victim of occult ceremonies. On the flip side,victims of mind-control need <strong>to</strong> realize that although demonicpossession is one of the <strong>to</strong>ols of control, that the diagnosis of “demonpossession should not be used <strong>to</strong> cover up the m<strong>an</strong>y other issuesinvolved with the mind-control including body memories, a lifetime ofsevere abuse, ab<strong>an</strong>donment issues, safety issues, <strong>an</strong>d all the rest of thegarbage that goes with having been a mind-controlled slave. <strong>The</strong>sem<strong>an</strong>y other issues need <strong>to</strong> be addressed <strong>to</strong>o. When one of the authorsof this book, Fritz Springmeier, beg<strong>an</strong> working with ProgrammedMultiples, he was <strong>to</strong>ld by several independent of one <strong>an</strong>other that theyhad problems with spirits, which they called Legion, Beelzebub,Asmodeus, Leviathon <strong>an</strong>d Behemoth. Occasionally H<strong>an</strong><strong>an</strong> wasmentioned. After doing some work, false sat<strong>an</strong>ic trinities were foundleading these Structured Multiple’s systems. Interestingly, other ministerswho were working in other areas of the country with <strong>Illuminati</strong>programmed multiples were finding the same thing. If we comb therare books of Europe, there is a book in french Cruels effets de lavenge<strong>an</strong>ce du Cardinal Richelieu ou His<strong>to</strong>ire des diables de Loudun byAubin (Amsterdam, 1716, pp. 215 +) <strong>an</strong>d as well as <strong>an</strong>other one,Delacroix, Etudes d’his<strong>to</strong>ire et de psychologie du mysticisme. Paris,1908, pp. 328-344., which tell the s<strong>to</strong>ry of the Uruline convent in Loudonbetween 1632 <strong>an</strong>d 1638. This convent plays a role in the <strong>Illuminati</strong>bloodlines. What is of interest <strong>to</strong> us, is that the nuns back in 1632 foundthemselves “possessed” by demons. <strong>The</strong>se demons made the peopleact like <strong>an</strong>imals, such as bark like dogs, rave in altered states, go in<strong>to</strong>tr<strong>an</strong>ces, have uncontrollable ch<strong>an</strong>ges in personality which they wouldbe amnesiac about. A male voice would appear in a female, etc. <strong>The</strong>mystic Father Surin, who came <strong>an</strong>d tried <strong>to</strong> help the convent, himselfgot possessed for 20 years <strong>an</strong>d had <strong>an</strong> entire ch<strong>an</strong>ge in personality for20 years. He wrote that at times he felt like Sat<strong>an</strong>. Seven demonsm<strong>an</strong>ifested themselves in very different but distinct persons within thesenuns. <strong>The</strong> Catholic priest (<strong>an</strong> exorcist) could make the differentdemonic personas take the bodies of the Loudun nun Je<strong>an</strong>ne desAnges, <strong>an</strong>d her face & body & voice would ch<strong>an</strong>ge from one418


possession <strong>to</strong> the other. <strong>The</strong>se seven demons were Asmodée (alsocalled Asmodeus), Leviath<strong>an</strong>, Béhémoth, Am<strong>an</strong> (Ham<strong>an</strong>), Isacaaron,Balaam, <strong>an</strong>d Grésil. <strong>The</strong>y also had a false trinity Lucifer-Beelzebub-Leviathon associated with them. French psychologist P. J<strong>an</strong>et in 1888noticed that m<strong>an</strong>y of his patients found themselves losing control oftheir body <strong>to</strong> what they called a demon who would often be namedAstaroth, Leviath<strong>an</strong> or Beelzebub. (P. J<strong>an</strong>et, L ‘Au<strong>to</strong>matismepsychologique. Paris, 1888, pp. 440 +.) Reports from other areas such asGerm<strong>an</strong>y over the years are similar. Is this mere coincidence? It isstretching the imagination <strong>to</strong> believe that so m<strong>an</strong>y separate incidentshave commonalities, <strong>an</strong>d identical demonic entities, <strong>an</strong>d yet are notrelated in some fashion. By the way, medieval witchcraft,Rosicruci<strong>an</strong>ism, <strong>an</strong>d the <strong>Illuminati</strong> have all had rituals where peopledress with Cat, Lion, Owl, Cuckoo, <strong>an</strong>d Parrot masks. In altered states,these medieval witches may have actually flipped in<strong>to</strong> <strong>an</strong>imal alterswho thought they were a cat or owl, etc., which would account forwritten accounts by medieval craft adepts that witches wouldtr<strong>an</strong>sform in<strong>to</strong> <strong>an</strong>imals. Demonic possession is getting more <strong>an</strong>d morerecognition by psychologists. Some psychologists have discovered thattheir programmed multiples responded very positively <strong>to</strong> deliver<strong>an</strong>ce ofdemons, <strong>an</strong>d were able <strong>to</strong> get more accomplished in a few hours ofdeliver<strong>an</strong>ce th<strong>an</strong> years of psychology. What does this tell us? Well, it isNOT “scientific proof’ that demons exist, but it is proof that deliver<strong>an</strong>cec<strong>an</strong> be very helpful. One c<strong>an</strong> debate the exact reasons whydeliver<strong>an</strong>ce works--perhaps it is merely that the helping person isentering the other person’s construct--but the events of successfuldeliver<strong>an</strong>ce strongly indicate that what has happened is <strong>an</strong> actualdeliver<strong>an</strong>ce of demons. Because this book is about HOW the victim’sare controlled, <strong>an</strong>d the programmers believe that the primaryingredient in the mind-control is demonology, we will coverdemonology. If that bothers some readers, then they need <strong>to</strong> askthemselves, Are they really w<strong>an</strong>ting <strong>to</strong> underst<strong>an</strong>d HOW the mindcontrolis done, or simply superimpose <strong>an</strong>d replace the HOW it is donewith what they themselves would do? Several times psychologists havebeen heard saying, “We don’t know how the programmers think. Itwould be helpful <strong>to</strong> know.” How m<strong>an</strong>y people are really ready <strong>to</strong> hearthe <strong>an</strong>swer? Recently, one of the Programmers (<strong>an</strong>d names could bementioned) never got excited as long as his slave was in therapy, butwhen his slave got a deliver<strong>an</strong>ce, he came <strong>to</strong>tally unglued. On the flipside, <strong>an</strong>yone who c<strong>an</strong> read this book entirely <strong>to</strong> this point <strong>an</strong>d thinkthat <strong>Illuminati</strong> slaves only have a problem with demons has somehowmissed most of the book. <strong>The</strong> programmers are so demon possessedthat people who have worked with them say that the powerfuldemons within them try <strong>to</strong> compete with each other for power. Thosewho have worked with the programmers know how the programmersthemselves have been skilled in conjuring demons with a nine-footcircle with magical phrases like “Bagabi laca Bachabe, Lamac cahi419


achababe,...” Rituals have been performed at the programming sites.(On the flip side, deliver<strong>an</strong>ce ministries c<strong>an</strong> send demons <strong>to</strong> the throneof Almighty God <strong>to</strong> get instructions.) One of the first s<strong>to</strong>ries read <strong>to</strong> aslave may be the Jungle Book by freemason & occultist RudyardKipling (1865-1936). <strong>The</strong> s<strong>to</strong>ry is used <strong>to</strong> teach the child <strong>to</strong> have <strong>an</strong>imalspirit guides, such as the bear <strong>an</strong>d leopard spirit guides found in JungleBook. <strong>The</strong> main character in Jungle Book is neither <strong>an</strong>imal or hum<strong>an</strong>,but in between. Neither world accepts this orph<strong>an</strong> boy. Slaves aretaught that they are not hum<strong>an</strong>, but not fully <strong>an</strong>imal, but somethingthat c<strong>an</strong>’t be fully accepted or unders<strong>to</strong>od by <strong>an</strong>yone. Jungle Bookprovides the script for this. A bracelet keeps the boy safe by giving himthe power of the gods. <strong>The</strong> slave is taught <strong>to</strong> get demonic power fromjewelry which is given <strong>to</strong> them. <strong>The</strong>re are m<strong>an</strong>y other features of JungleBook which are used for the initial programming <strong>to</strong>o, such as the packof wolves (protec<strong>to</strong>rs in the system), snakes in the hell pit, a BoaConstruc<strong>to</strong>r snake <strong>to</strong> guard the castle, the need <strong>to</strong> pass through thewaterfall <strong>to</strong> get in<strong>to</strong> a wonderful world, a black jungle of death on theother side of the waterfall, castle jewells, caged birds, etc. Later, alterswill be <strong>to</strong>ld they are the leader of a pack. Via the Jungle Book s<strong>to</strong>ryused as a demonic programming script, the child’s alters are taughtthat they are orph<strong>an</strong>s with no mother or father, <strong>an</strong>d that they must play<strong>an</strong>d have the <strong>an</strong>imal spirit guides as their friends.HOW THE PROGRAMMERS UNDERSTAND DEMONOLOGYDemonology is the key <strong>to</strong> what the programmers accomplish. Somerecent efforts <strong>to</strong> expose the Monarch <strong>Mind</strong> Control have portrayed theprogrammers as very cynical about their “magick”. While there may beexceptions <strong>to</strong> the rule, within the <strong>Illuminati</strong>, demonology is not takenlightly, but is considered <strong>to</strong> be the real science of the Sciences of <strong>Mind</strong>Control. <strong>The</strong> goal of the <strong>Illuminati</strong> programmers is stated in their ownwritings in latin,”Quod superius est sicut quod inferius et quod inferius estsicut quod superius ad perpetr<strong>an</strong>da miracula rei unius...” Me<strong>an</strong>ing thattheir goal is <strong>to</strong> achieve the wonders of the “one thing” where “thatwhich is above, is like that which is below <strong>an</strong>d that which is below is likethat which is above.” In other words, they take the dark spiritual realmof Sat<strong>an</strong>, as the pattern for the world. This latin phrase is also used <strong>to</strong>support astrology, which influences some of the programmingdecisions. <strong>The</strong> concept of astrology was created by reframing God’s“event markers” as event controllers. While Americ<strong>an</strong>s think of 1776 asindependence year, 1776 was originally chosen as the most favorableyear <strong>to</strong> reorg<strong>an</strong>ize the mystery religions in<strong>to</strong> the formal <strong>Illuminati</strong>because 1776 consists of 1100 <strong>an</strong>d 666. 1100 is the Babyloni<strong>an</strong> countingsystem’s number for 666. Babyloni<strong>an</strong> sat<strong>an</strong>ism is a foundational part ofMoriah’s Illuminism. Some of its bloodlines are descendents of the420


Pharisees who secretly practiced Babyloni<strong>an</strong> sat<strong>an</strong>ism at the time ofChrist, incl.. child sacrifices. It’s st<strong>an</strong>dard operating procedure in theoccult world that-what you see is not what you get, double-me<strong>an</strong>ingsare the norm. Those students of Monarch <strong>Mind</strong> Control who do notw<strong>an</strong>t <strong>to</strong> delve in<strong>to</strong> what the Programmers are doing are limiting theirown underst<strong>an</strong>ding. Most of what the Programmers do is actuallyspiritually based <strong>an</strong>d connects <strong>to</strong> their underst<strong>an</strong>ding of demonology.Much of what the victims of the Monarch Programming experience willbe unders<strong>to</strong>od in the context of the spiritual world. Obviously some isillusion. Obviously some is delusion. However, when the high levelprogrammers teach novice programmers, they will be teaching thespiritual principles you the reader are about <strong>to</strong> be <strong>to</strong>ld. (A fewtherapists across the U.S.--<strong>an</strong>d their names will not be revealed, havehad miraculous recoveries of their Monarch slaves when theyaddressed these demonic <strong>an</strong>d spiritual issues. <strong>The</strong>se are therapists, whotried the old methods for years, <strong>an</strong>d then in desperation were willing <strong>to</strong>listen <strong>to</strong> ex-programmers <strong>an</strong>d other informed people about the spiritualside of the programming.) Everything in life has a physical <strong>an</strong>d aspiritual side <strong>to</strong> it. Things in the spiritual effect the physical, <strong>an</strong>d things inthe physical effect the spiritual. <strong>The</strong>y are two worlds. <strong>The</strong> Alice InWonderl<strong>an</strong>d s<strong>to</strong>ry is highly regarded by the programmers, because itportrays the situation that exists between the spiritual world & thephysical world. When people within the physical look <strong>to</strong>ward thespiritual, it is like looking in<strong>to</strong> a mirror. Initially, they will only see thephysical world reflected back. But if they go beyond the mirror, theywould see a “mirror image” of the physical exists in the spiritual realm.When Christi<strong>an</strong>s pray they say, “Thy will be done on earth as it is inheaven.” Earth is a mirror image of heaven, not <strong>an</strong> exact copy, butsomeday they will be alike, according <strong>to</strong> Scripture. According <strong>to</strong>messi<strong>an</strong>ic jews who underst<strong>an</strong>d the OT well, the ceremonial law isbeing enacted in heaven spiritually as it’s mirror image once was doneon earth. When the programming is seen only in a secular fashion,much of its design is missed. What have witches used <strong>to</strong> see beyondtime <strong>an</strong>d space? Mirrors. Remember the witch saying ‘mirror, mirror onthe wall, who is the fairest of them all”? <strong>The</strong> idea is magical mirrors, thespeculums, which will lead one “through the looking glass mirror” thatthen allows the victim <strong>to</strong> magically tr<strong>an</strong>scend time & space. One of theimport<strong>an</strong>t keys <strong>to</strong> success with Monarch programming aregenerational spirits. <strong>The</strong> cover for this is studies in genetic science. <strong>The</strong>programmers believe that genetics are import<strong>an</strong>t, but the real abilities<strong>to</strong> program someone come from the generational spirits that are builtup in bloodlines. This is why the <strong>Illuminati</strong> were in part skeptical thatnon-generational occult bloodlines could be successfullyprogrammed. <strong>The</strong>y have found that they c<strong>an</strong> be (especially with alltheir high tech equipment), but the best c<strong>an</strong>didates are those withstrong generational spirits. <strong>The</strong> difference could be compared <strong>to</strong> thosewho raise race-horses for the Kentucky derby <strong>an</strong>d those who have421


horses as a hobby. A race horse must have high spirits. <strong>The</strong> suburb<strong>an</strong>housewife & daughter who ride as <strong>an</strong> occasional pastime could careless for that quality of horse. <strong>The</strong> military c<strong>an</strong> produce c<strong>an</strong>non fodderwith the simple mind-control of Basic Training. <strong>The</strong>y don’t needsophisticated time intensive mind-control techniques like the MonarchProgram for some military positions. Third world children are beingprogrammed <strong>to</strong> become baseball players etc. But the highest occultavocational positions will be given <strong>to</strong> people with exceptionalgenerational demonic power. Within a Multiple you will find duplicatesof a particular name. For inst<strong>an</strong>ce, you may find thirteen Susies. Susy Imay not even be aware of the other Susies. <strong>The</strong> internal worlds of theMonarch victim are structured along demonic patterns. Within thedemonic world the spirit Moriah is not itself in every victim that hasMoriah. Moriah # 10,882 may be in victim A, <strong>an</strong>d Moriah # 3,355 invictim B. But the difference is academic because the Moriah in eachvictim is a member of the same demonic family--the Moriah SpiritFamily. <strong>The</strong>y are for all intents <strong>an</strong>d purposes the same spirit. <strong>The</strong><strong>Illuminati</strong> programmers are acutely aware of the generational spirits,who they are, <strong>an</strong>d how they function. <strong>The</strong> ten comm<strong>an</strong>dments warnthat a person’s iniquity will affect the next 3-4 generations. EX 20:5b. Agenerational spirit is given “appointment” over a victim at birth. <strong>The</strong>victim will receive generational spirits from their biological father <strong>an</strong>dmother. Sat<strong>an</strong> c<strong>an</strong> not be the crea<strong>to</strong>r of heaven <strong>an</strong>d earth, but hec<strong>an</strong> satisfy his desire <strong>to</strong> do so, by creating <strong>an</strong> internal world within thevictim, a heaven, earth <strong>an</strong>d hell of his own creation. <strong>The</strong> armies ofspirits which are placed in<strong>to</strong> the inf<strong>an</strong>t will cooperate with theprogrammer <strong>an</strong>d the child <strong>to</strong> produce the programming. It’s like theFather (“Papa” the programmer), son (child) <strong>an</strong>d unholy spirit(demons) work <strong>to</strong>gether. <strong>The</strong> internal creation of worlds within thevictim will be the heart beat of Sat<strong>an</strong>. A Regional terri<strong>to</strong>rial comm<strong>an</strong>derdemon will make weekly rounds in <strong>an</strong> area, <strong>an</strong>d so the structuring workdone with generational victims, combines ideas from the generationalspirits as well as the regional comm<strong>an</strong>der. <strong>The</strong> curses <strong>an</strong>d the vows givethe Comm<strong>an</strong>der the legal right <strong>to</strong> exercise control over the victim.Within <strong>an</strong>y geographic area, there has been a layering in of demons,much in the same fashion that the programming <strong>an</strong>d demons arelayered in<strong>to</strong> a Monarch victim. <strong>The</strong> most import<strong>an</strong>t terri<strong>to</strong>rial spirits in <strong>an</strong>area are the root or original spirits. In the United States these are Indi<strong>an</strong>Spirits. Terri<strong>to</strong>rial spirits may contribute ideas as <strong>to</strong> what will be effectivefor programming in their area. <strong>The</strong>re are geographic patterns <strong>to</strong>spiritual warfare. Each area has its deities <strong>an</strong>d spirits which rule thevalleys, homes, <strong>an</strong>d nations. <strong>The</strong>se particular spirits exercise power overthe local people. <strong>The</strong> ev<strong>an</strong>gelist is not going <strong>to</strong> progress, unless heunderst<strong>an</strong>ds the spirits that are ruling what he is trying <strong>to</strong> liberatepeople from. <strong>The</strong> basic terri<strong>to</strong>rial spirits are the original ones. In the U.S.these are the Indi<strong>an</strong> spirits. That is why the <strong>Illuminati</strong> pays such a stronginterest in the Indi<strong>an</strong>s. <strong>The</strong> original principalities are the foundation, the422


edrock upon which everything else is layered upon. This also is done inMonarch programming. A number of Monarch slaves have Indi<strong>an</strong>sham<strong>an</strong>s <strong>an</strong>d spirits placed in their systems. Upon the originalfoundation, the newer ideologies are layered in. In Russia, communismwas simply layered on <strong>to</strong>p of the original terri<strong>to</strong>rial spirits. In China,communism was simply layered on <strong>to</strong>p of the original terri<strong>to</strong>rial spirits.This is one fac<strong>to</strong>r why Chinese & Russi<strong>an</strong> communism were never alike.Traumas <strong>an</strong>d crises will produce strongholds. Our underst<strong>an</strong>ding of ourblind spots is often weak because we use others as our measuring stickrather th<strong>an</strong> the divine word of God. Blindspots & strongholds may takeoutside intervention in our lives <strong>to</strong> eliminate. How m<strong>an</strong>y of us see thatMoroni on <strong>to</strong>p of Mormon temples is a ruling demon? How m<strong>an</strong>y of ushave realized that the rising sun on Jap<strong>an</strong>’s flag is the Sun goddess whois a ruling spirit over Jap<strong>an</strong>? If we go <strong>to</strong> Hawaii we will see some of the“natives” are interested in Pele, the God of Fire. <strong>The</strong> volc<strong>an</strong>oes havebeen used by the demons <strong>to</strong> entrap the people <strong>to</strong> Pele, the God ofFire. One of the things that the author’s book Ezekiel 6:3 An InhouseDirec<strong>to</strong>ry shows is that m<strong>an</strong>y of the ritual sites have occult names.Devil’s C<strong>an</strong>yon may well be a c<strong>an</strong>yon for devils. <strong>The</strong> names peoplegive geographic areas are import<strong>an</strong>t. <strong>The</strong>y show the types of pactsthat people have been making. When the psychiatrist Karl Menningerof the Menninger Foundation dealt with spiritual issues with people inmental hospitals (i.e. he had them ask for forgiveness of sins), he wasable <strong>to</strong> clear out whole sections, <strong>an</strong>d send the patients home well. (Hisbro. Roy W. Menninger, <strong>an</strong> Episc., & also a psychiatrist, worked inBos<strong>to</strong>n State Hosp. while in the military in ‘52-53.) <strong>The</strong>re is a direct tiebetween much of the ins<strong>an</strong>ity <strong>to</strong>day <strong>an</strong>d demons. Spiritual principlesshould be studied by Christi<strong>an</strong>s <strong>to</strong> underst<strong>an</strong>d how demons operate<strong>an</strong>d what gives them entry rights <strong>an</strong>d power. Certain objects <strong>an</strong>dpeople are focal points for spirits.WHO are the experts?Basically, two types of people involve themselves in studyingdemonology--those who are involved with performing works ofdarkness such as magic, or those involved with performing works ofgodliness such as deliver<strong>an</strong>ce ministries. Jesus <strong>to</strong>ld his disciples <strong>to</strong>comm<strong>an</strong>d the demons <strong>to</strong> leave. He didn’t ask his disciples <strong>to</strong> let himcast out demons, nor did he ask his disciples <strong>to</strong> ask the demons <strong>to</strong>leave. No, the responsibility was placed upon his disciples & they wereasked <strong>to</strong> comm<strong>an</strong>d the demons <strong>to</strong> leave. <strong>The</strong> <strong>Illuminati</strong> maintainhidden libraries full of <strong>an</strong>cient treatises on demonology, which theyavidly study. Some of the more import<strong>an</strong>t demonology books are theSixth <strong>an</strong>d Seventh Book of Moses, <strong>The</strong> Black Raven, <strong>The</strong> Spring Book,<strong>The</strong> Spiritual Shield. A whole series of magical books bearing the name423


of Solomon exist, of which the Key of Solomon is widely known.Clavicula Salomonis or the Clavicle of Solomon is also well known. More<strong>an</strong>d more of the <strong>an</strong>cient writings seem <strong>to</strong> be coming <strong>to</strong> light in theseend times, <strong>an</strong>d the hierarchy is getting bolder <strong>an</strong>d bolder in the releaseof this information. A Cabalistic Jew will study the Talmud until he is 40or so, <strong>an</strong>d the study of the Cabala is reserved for the only those whohave studied a long time. <strong>The</strong> Zohar <strong>an</strong>d the esoteric teachings are nottaught until late in life. Opposite the <strong>Illuminati</strong>, are those dedicatedChristi<strong>an</strong>s who study demonology, not <strong>to</strong> invoke demons but <strong>to</strong> freepeople from them. Each state in the United States contains a fewChristi<strong>an</strong>s who underst<strong>an</strong>d demonology <strong>an</strong>d deliver<strong>an</strong>ce from it. <strong>The</strong>blood of Jesus Christ (Yeshua ha Messiach) is very powerful againstdemons. High level deliver<strong>an</strong>ce c<strong>an</strong> not be done without <strong>an</strong>gelic <strong>an</strong>dthe Holy Spirit’s help. <strong>The</strong> Christi<strong>an</strong> who gets in<strong>to</strong> studying <strong>an</strong>d fightinghigh level demonology needs <strong>to</strong> learn the signific<strong>an</strong>ce of gettingGod’s help. Without God’s help, the deliver<strong>an</strong>ce will back-fire in theface of the deliverer. Members of the <strong>Illuminati</strong> are bound in servitude<strong>to</strong> Sat<strong>an</strong>. One of the strong shackles that bind Sat<strong>an</strong>ists <strong>to</strong> Sat<strong>an</strong> is thehigh level of demonology they are enslaved <strong>to</strong>.HOW are the demons org<strong>an</strong>ized?It is very clear that there are different types of demons, <strong>an</strong>d that theyare divided up in<strong>to</strong> different r<strong>an</strong>ks, functions, orders, etc. A great dealof time has been spent by both brilli<strong>an</strong>t Christi<strong>an</strong>s <strong>an</strong>d sat<strong>an</strong>icMagici<strong>an</strong>s <strong>to</strong> chart out the names, r<strong>an</strong>ks, <strong>an</strong>d structure of the demonicarmies that Sat<strong>an</strong> comm<strong>an</strong>ds. One accurate method of r<strong>an</strong>kingdemons has 365 r<strong>an</strong>ks of demons, with no. 1 being the highest level ofdemons. <strong>The</strong> numbers of <strong>to</strong>p level demons are numbered in the trillions,while the lower level imps are incredibly numerous. <strong>The</strong>re is no shortageof demons <strong>to</strong> carry out the work of Sat<strong>an</strong> on this pl<strong>an</strong>et. <strong>The</strong>se demonsare sometimes variously referred <strong>to</strong> as spirit guides, <strong>an</strong>gels, wizards,ghosts <strong>an</strong>d aliens or a number of other disguises. Both early Christi<strong>an</strong>s<strong>an</strong>d the occult have often divided up the evil spirits under fire, water,wind, <strong>an</strong>d earth. <strong>The</strong> power of Enochi<strong>an</strong> magic comes from theWatch<strong>to</strong>wers of these four elements.Some common types of Evil Spirits are:Spirit of the Anti-Christ (1 John 4:3)Spirit of Bondage (Rom<strong>an</strong>s 8:15)424


Spirit of Divination (Ezekiel 21:21)Spirit of DeathDumb & Deaf Spirit (Mark 9:25)Spirit of Error (1 JN 4:6)Familiar Spirit (LV 20:27)Spirit of Fear (2 TM 1:7)Spirit of Haughtiness (PRY 16:18, 19)Spirit of Heaviness (ISA 61:3)Spirit of Infirmity (LK 13:11Spirit of Jealousy (NM 5:14)Lying Spirit (2 CHR. 18:22)Perverse Spirit (ISA 19:14)Seducing Spirits (1 TM 4:1)Spirit of Whoredoms (Hosea 4:12, <strong>an</strong>d 5:4)Each of these types of Evil Spirits has a number of specialists. Forinst<strong>an</strong>ce the Spirits of Whoredoms contains spirits which c<strong>an</strong> specializein the following:A Spirit of UnfaithfulnessA Spirit of Prostitution (whether Spirit, Soul or Body)A Spirit of the Love of MoneyA Spirit of IdolatryA Spirit of Chronic DissatisfactionA Spirit of FornicationA Spirit of Glut<strong>to</strong>ny425


<strong>The</strong> Spirits of Bondage include:A Spirit of FearA Spirit of <strong>an</strong>y number of addictions (drugs, alcohol, etc.)A Spirit of the Fear of DeathA Spirit of being a Serv<strong>an</strong>t of CorruptionA Spirit of Compulsive Iniquity<strong>The</strong>se lower echelon demons are <strong>to</strong>o numerous <strong>to</strong> keep track of. Whena portal is opened which gives a particular demon legal access in<strong>to</strong> abody, they move very quickly in<strong>to</strong> the physical body. When a m<strong>an</strong> lustsafter a wom<strong>an</strong>, he will open a portal, such as the mouth through whicha demon (spirit of lust), shaped for inst<strong>an</strong>ce like a frog, will jump inthrough. This demon will then insure that the evil thought will be actedupon. <strong>The</strong> principalities <strong>an</strong>d powers exercise dominion over spirits.Further, high level Sat<strong>an</strong>ists are well aware of all these things. Whengodly people of faith identify, bind <strong>an</strong>d cast out specific demons, theyshould practice loosening the appropriate good spirit <strong>to</strong> take its place.If we bind a spirit of Bondage, we loose a spirit of adoption. If we binda Spirit of Error, then we loose a Spirit of Truth.<strong>The</strong>re are 3 powerful sat<strong>an</strong>ic covens of 21 persons. <strong>The</strong>y are distributedin Monterray, CA, Phoenix, AZ <strong>an</strong>d the third in Idaho. L.A. also has afourth headquarters for the Coven of the 21st Star. <strong>The</strong>se 21-personcovensare made up of very intelligent, powerful persons. <strong>The</strong>se type ofcovens attract powerful comm<strong>an</strong>der demons. Within the co-author’sarea, Bend, Portl<strong>an</strong>d <strong>an</strong>d Eugene areas in Oregon have powerfulcovens. <strong>The</strong> power of these types of powerful covens will be reflectedin the spiritual world. Paul under the Spirit’s inspiration wrote, ‘while wedo not look at the things which are seen, but at the things which arenot seen. For the things which are seen are temporary, but the thingswhich are not seen are eternal.’ 2 Cor 4:18 <strong>The</strong> invisible things are moreimport<strong>an</strong>t that the visible. If we recognize this, the Word of God saysthat this will help us keep from losing heart! ‘<strong>The</strong>refore we do not loseheart. Even though our outward m<strong>an</strong> is perishing, yet the inward m<strong>an</strong> isbeing renewed day by day.’ 2 Cor 4:16Spirits are in a sense a mirror image world. <strong>The</strong>y are placed in the victimfirst. <strong>The</strong> programming <strong>an</strong>d the images that are built will be built withtheir cooperation <strong>an</strong>d guardi<strong>an</strong>ship. Spirits are appointed <strong>to</strong> protecteach program <strong>an</strong>d each memory. A spirit comm<strong>an</strong>der called a chief426


executive is set in comm<strong>an</strong>d of the victim’s life. Military comm<strong>an</strong>dstructures around the world are structured on how the demoniccomm<strong>an</strong>d structure exists. Some soldiers have the same function, butare not actually the exact same person. So it is with demons. Victimshave their own individual demons, but they are models of what thattype of demon is supposed <strong>to</strong> act like. <strong>The</strong> child is exposed <strong>to</strong> films,books <strong>an</strong>d s<strong>to</strong>ries. <strong>The</strong> spirits interact within the person’s mind <strong>to</strong> lockthese pictures in place. <strong>The</strong> demons in a sense serve as mirrors withinthe child’s mind, reflecting the images the child needs <strong>to</strong> fix in themind. As the programmer, child <strong>an</strong>d demons structure the interualworld, the demonic spirits will guard these structures. <strong>The</strong> force orenergy behind the structures is the demons. In order <strong>to</strong> guard thingsfurther, demonic castles <strong>an</strong>d temples will exist within a system <strong>to</strong> guardit. Entire spiritual quadr<strong>an</strong>ts will exist, that are entirely spiritual <strong>an</strong>dcontain absolutely no alters. <strong>The</strong>se spiritual worlds c<strong>an</strong> not be seenphysically. Only spiritual power <strong>an</strong>d discernment c<strong>an</strong> reveal them. Infact, while the normal person uses 5 senses, the <strong>Illuminati</strong> teach theiralters <strong>an</strong>d people in demonology <strong>to</strong> use 7 spiritual senses. <strong>The</strong> child willbe shown films <strong>an</strong>d s<strong>to</strong>ries, but will then be programmed <strong>to</strong> forgetthem. However, the demonic spirits will guard these concepts. <strong>The</strong> coreis involved in giving energy <strong>to</strong>ward these spiritual programming goals.<strong>The</strong> willful contribution of energy <strong>to</strong> these demonic goals must beguarded so the core is hidden. While other children are playing withchildren, the victim of Monarch <strong>Mind</strong>-control slavery is being taught <strong>to</strong>d<strong>an</strong>ce <strong>an</strong>d play with internal playmates which are demons. This is <strong>to</strong>familiarize the child <strong>to</strong> the spirit world. <strong>The</strong> child’s family becomes itsinternal world. <strong>The</strong>re are some teachers in public schools <strong>an</strong>d preschoolsthat are openly helping children do this. All the time that theprogramming is going on, the spiritual world stays hidden in thedarkness. Gnomes, sometimes called dwarfs, are one of the fourdivisions of nature spirits. <strong>The</strong>y know where the gold is within the earth.This is why Joseph Smith, Jr. who was from <strong>an</strong> import<strong>an</strong>t generationaloccult bloodline which has generational programmed MPDs, didmagic <strong>to</strong> elemental spirits when he was looking for jewels <strong>an</strong>d gold asa young m<strong>an</strong>. In reflection of this, the Gnomes (also known as dwarfs,elves, or minihunes) of the internal world mine the gold <strong>an</strong>d jewels--theprograms of the System. <strong>Illuminati</strong> programmer M<strong>an</strong>ly P. Hall wrote in hisclassic book <strong>The</strong> Secret Teachings of all Ages on page CVI, ‘...there arem<strong>an</strong>y types of gnomes evolving through the subjective ethereal bodyof Nature. <strong>The</strong>se earth spirits work in <strong>an</strong> element so close in vibra<strong>to</strong>ryrate <strong>to</strong> the material earth that they have immense power over its rocks<strong>an</strong>d flora, <strong>an</strong>d also over the mineral elements in the <strong>an</strong>imal <strong>an</strong>d hum<strong>an</strong>kingdoms. Some,...work with the s<strong>to</strong>nes, gems <strong>an</strong>d metals, <strong>an</strong>d aresupposed <strong>to</strong> be the guardi<strong>an</strong>s of hidden treasures.” <strong>The</strong> Disney family<strong>an</strong>d the Disney corporations are part of the occult world. While thenames Dopey, Happy, Bashful, Sleepy, Grumpy, Sneezy, <strong>an</strong>d Docsound like names picked <strong>to</strong> please children, they are actually the427


tr<strong>an</strong>slation from Sc<strong>an</strong>dinavi<strong>an</strong> of the demonic dwarfs Toki, Skavaerr,Varr, Dun, Orinn, Grerr, <strong>an</strong>d Radsvid. Note that Disney placed acharacter with a green mask in a dark mirror, <strong>an</strong>d had in his showswhat was called the ‘Spirit of the Magic Mirror’ which was also called<strong>The</strong> Slave of the Magic Mirror. <strong>The</strong> Monarch slaves “most preciousprograms” are concealed in the ground <strong>an</strong>d are guarded by thegnomes built internally by the programming. <strong>The</strong>se gems have powerthat is ch<strong>an</strong>neled from Sat<strong>an</strong>. Most of the readers thought Snow White<strong>an</strong>d the 7 Dwarfs was simply a harmless piece of fiction. <strong>The</strong>y most likelydidn’t realize that it is demonology. An example of the import<strong>an</strong>ce ofthese types of spirits is Findhorn’s use of them. Findhorn Institute inScotl<strong>an</strong>d, which has br<strong>an</strong>ches by other names in other countries, is likethe Vatic<strong>an</strong> of the New Age. It secretly sends out orders <strong>to</strong> m<strong>an</strong>ywitches <strong>an</strong>d New Agers. To spell it out clearer, Findhorn, the Vatic<strong>an</strong> ofthe New Age movement, is one of the ch<strong>an</strong>nels of communicationfrom the secret <strong>Illuminati</strong> councils <strong>to</strong> their people worldwide. <strong>The</strong>success of Findhoru’s community, according <strong>to</strong> Findhorn is their use ofelemental gnome spirits in their gardening <strong>an</strong>d pl<strong>an</strong>ting. What issomeone who believes in good spirits <strong>to</strong> do with this information? Torecognize that the patterns for the programming are inspired bydemons, are held in place by demonic energy <strong>an</strong>d are guarded bydemons. <strong>The</strong> programming c<strong>an</strong> be collapsed upon itself if this demonic“glue’ is taken away. But only a few individuals underst<strong>an</strong>d the spiritualforces behind the programming. This underst<strong>an</strong>ding takes spiritual eyes.If the spiritual is not dealt with, the person c<strong>an</strong> be reprogrammed at willby the demonic entities that still control the victim. This is the “missingpiece that has frustrated adv<strong>an</strong>ced secular therapists. Within <strong>Illuminati</strong>slaves, they will have the All-seeing Eye placed in their system guardedby legions of demons. Within the very eye of the all-seeing eye, theProgrammers will place some actual alters. <strong>The</strong>re will also be demonsplaced within the construct <strong>to</strong>o. <strong>The</strong> De-programmer must be careful<strong>to</strong> separate the demonic from the hum<strong>an</strong> element <strong>an</strong>d get the alterswho are held captive in the eye out. <strong>The</strong> Programmers do a great dealof mixing demons with alters, <strong>an</strong>d they place alters all over the systemin captive or hostage situations so that the System of Alters is literallyblackmailed in<strong>to</strong> cooperating if they don’t w<strong>an</strong>t <strong>to</strong> hurt parts ofthemselves. <strong>The</strong> Programmers do both internal <strong>an</strong>d external blackmail.Within the Monarch programming, the demons are layered in betweenthe worlds. In the older <strong>Illuminati</strong> programming, mirrors were placedin<strong>to</strong> the System <strong>an</strong>d the demons were layered behind the mirrors. <strong>The</strong>mirrors would separate levels within the mind. <strong>The</strong> demons wouldprotect the mirrors. If a Monarch alter would shatter a mirror, thedemons behind it are released <strong>an</strong>d all hell breaks loose in their mind.<strong>The</strong>rapists who have tried everything for years <strong>to</strong> deal with the mirrors,have found that a few minutes of correct spiritual warfareaccomplished more th<strong>an</strong> years of trying psychological techniques. Inthe 1980 models of Monarch slaves, the Programmers beg<strong>an</strong> placing a428


pl<strong>an</strong>et of alters, interspersed with a pl<strong>an</strong>et of demons, as they wouldbuild a solar system. This had the same layering effect as the mirrors.<strong>The</strong> demons then would be assigned <strong>to</strong> protect the different levels, inthis case represented by different orbiting pl<strong>an</strong>ets. Principle demonsthat are popular <strong>to</strong> place in<strong>to</strong> Monarch systems are:Æsculapius -- the sat<strong>an</strong>ic miracle healer, related <strong>to</strong> Apollos, in thepag<strong>an</strong> world he was depicted with his head encircled with rays. Inorder <strong>to</strong> show pag<strong>an</strong>s that it was O.K. <strong>to</strong> worship Jesus, the Catholicchurch put the golden rays of Æsculapius around pictures of Jesus. Heis also at times represented as the sacred snake.Absolom --, Amon -- (various spellings) A marquis of Hell, who hasthe gift of prophecy.Apollyon - This demon is over the bot<strong>to</strong>mless pit <strong>an</strong>d is described byREV 9:11. Demon of fear <strong>an</strong>d destruction, who may be a deep part ofa System.Apollo -- <strong>The</strong> AntiChrist’s fatherAstar (Star, Ashtareth, Ashtaroth, Astarte, Ishtar) - Bible students willfind this demon referred in m<strong>an</strong>y Bible passages including JDG 2:13ACTS 20.Balilo -- witch demon, Beelzebub -- Ruling demonBeliah -- the chief demon, with the name me<strong>an</strong>ing “worthless one”.Beliel -- sexual demon, Bes -- Spirit ruling the dwarfs. Blackwell--legiondemon, upper r<strong>an</strong>k, <strong>to</strong> divide the mind. Blood(aka Yahweh Elohim) --dark spirit using God’s name & part of Black Mass, conn. w/ early 3-year-old trauma <strong>to</strong> “locked-up child’. Choronzon -- <strong>to</strong> help withconstructing the mind control DameonDagon -- the fish god over water. <strong>The</strong> fish sign was adopted byelements of the Catholic church <strong>to</strong> secretly keep Dagon worship alive.<strong>The</strong> Pope wears the garb that the Pontiface Maximus wore as leader ofthe cult of Dagon. One system had a water monster named CTHULHU.Electra -- Enigma --, Geb -- voice behind the earth spirit, Gerberus --Guardi<strong>an</strong> <strong>an</strong>gels -- the <strong>Illuminati</strong> may assign guardi<strong>an</strong> <strong>an</strong>gels calledHafaza. Javen -- double-minded demon Kali -- bloody female goddessKemoshLeviath<strong>an</strong> (Seen as a sea-monster, or Tyr<strong>an</strong>nosaurus Rex, or Dragon-429


like)-This demon runs up <strong>an</strong>d down the spine. Leviath<strong>an</strong> is related <strong>to</strong> theBabyloni<strong>an</strong> reptili<strong>an</strong> God Tiamet (which looks like the Reptili<strong>an</strong> aliensportrayed <strong>to</strong>day.) Is tied <strong>to</strong> the double-helix. It c<strong>an</strong> actually be threespirits. Bible students c<strong>an</strong> read about Leviath<strong>an</strong> in Job 3:8, Job 41:8,15,22, PS 74:14, ISA 27:1 Lilith -- a bloody demon, known as the “terror ofthe night”. <strong>The</strong> occult s<strong>to</strong>ry is that she was Adam’s wife before Eve, <strong>an</strong>dthat her offspring with Adam were demonic-hum<strong>an</strong> monsters. It mightbe worthy <strong>to</strong> mention that in Druidism, the life-force or energy force isconsidered <strong>to</strong> be the Dragon. <strong>The</strong>re are several names for this Dragonincluding Wyvern, nwyvre, or the winged lion.Mammon -- the demon of avarice Meg<strong>an</strong>osis -- Metatron --Sometimes said <strong>to</strong> be Enoch. Moriah-Moloch (also spelled Molech) --<strong>The</strong> various sat<strong>an</strong>ic-luciferi<strong>an</strong> groups that program offer child sacrifices<strong>to</strong> Moloch, <strong>an</strong> internal Temple of Moloch may guard the innocentblood of children sacrificed during ceremonies. His<strong>to</strong>rically, the peoplein Israel sacrificed children <strong>to</strong> Moloch at Tophet in the Valley of Hinnomnear Jerusalem. Drums (<strong>to</strong>phim) were beat so the cries of the childrencouldn’t be heard. Mormo- Import<strong>an</strong>t demon placed in MormonMonarch slaves.N<strong>an</strong>na-Nemo -- Mormon programming Oc<strong>to</strong>pus--blood suckingdemonOrion -- placed over Mormon victims, the name Orion is poppingout all over the place, P<strong>an</strong>-protec<strong>to</strong>r of woods Ronwe -Squat -- <strong>an</strong>umber of <strong>Illuminati</strong> Monarchs report that this demon gives them theability <strong>to</strong> underst<strong>an</strong>d foreign l<strong>an</strong>guages, Shu -- does internal weathermagic Others incl. - Typhon (program tunneling connections in themind), Verono, Vultar Val (legion), P<strong>an</strong> whose depression sends oneRege (drugs), who sends one <strong>to</strong> Bacchus(addiction) which then starts abondage loop.THE JOKERS<strong>The</strong> everyday demons who the alters have <strong>to</strong> contend with if they stepout of line, are the Jokers. Jokers c<strong>an</strong> jump out of the mirrors <strong>an</strong>d drag<strong>an</strong> alter in<strong>to</strong> the looking giass world. Alters going in<strong>to</strong> the system awayfrom their assigned living quarters end up in mazes of mirrors. <strong>The</strong> mazesof mirrors c<strong>an</strong>’t be broken because demons are placed behind themirrors. However, deliver<strong>an</strong>ce methods work well <strong>to</strong> destroy the powerof these demonic protected mirrors. M<strong>an</strong>y, if not most of the occultworld do not view spirits as evil. <strong>Illuminati</strong> children are taught that thesespirits are playmates. Since the child is not allowed real friends, they arehappy <strong>to</strong> have demons <strong>to</strong> play with inside their mind. One major430


eligion whose adherents publicly seek spirit (demonic) possession--although they again view spirits as being capable of both good <strong>an</strong>devil, neutral in connotation much like the Greek gods, is Voodoo.VOODOO (Vaudou)In discussing how trauma-based mind-control is done, voodoo must beincluded as a component. M<strong>an</strong>y of the <strong>Mind</strong>-controlled slaves havehad voodoo as part of their trauma, <strong>an</strong>d m<strong>an</strong>y had voodoo dollsplaced in<strong>to</strong> their Systems. When vows <strong>an</strong>d oaths are made, <strong>an</strong> objectis given <strong>to</strong> the sat<strong>an</strong>ic cult or the <strong>Illuminati</strong> for the Keeper of the Seals <strong>to</strong>guard. If the vow is broken voodoo magic c<strong>an</strong> be used against theoffender by using the object given in the sealing. Voodooism camefrom Africa, where it is called Ju-Ju. A recent book Blood Secrets is thetrue s<strong>to</strong>ry of demon worship <strong>an</strong>d hum<strong>an</strong> sacrifice by a former JuJu highpriest Isaiah Oke, who gave up JuJu magic for the Christi<strong>an</strong> faith. <strong>The</strong>Basu<strong>to</strong> in Africa call witches “baloi”, the Ak<strong>an</strong>s say “obayifo” <strong>an</strong>d theLovedu say “vuloi”. <strong>The</strong>re are different names <strong>an</strong>d vari<strong>an</strong>ces ofmagical practices, but what most people don’t realize is that these arejust different styles of JuJu-ism. <strong>The</strong> JuJu priests (called a babalawo) willrule the religious/magic lives of <strong>an</strong> Afric<strong>an</strong> village. JuJu is sat<strong>an</strong>ic, <strong>an</strong>dmuch of it is kept secret by its high priests. <strong>The</strong> Priests take blood oathsof secrecy. <strong>The</strong> West Afric<strong>an</strong> name for Sat<strong>an</strong> is Esu. A group in Phoenix,AZ claims <strong>to</strong> be in contact with <strong>an</strong> alien named Jesus Esu S<strong>an</strong><strong>an</strong>da.Another word that has come from Voodoo is the word zombie. M<strong>an</strong>ymembers of the <strong>Illuminati</strong> go <strong>to</strong> the Caribbe<strong>an</strong> <strong>an</strong>d South America <strong>to</strong>attend <strong>Illuminati</strong> rituals. Umb<strong>an</strong>da (Brazili<strong>an</strong> sat<strong>an</strong>ism), which issometime mistakingly called Macumba, openly has sat<strong>an</strong>ic rituals onCopacab<strong>an</strong>a Beach. M<strong>an</strong>y of the elite have made their pilgrimage <strong>to</strong>Copacab<strong>an</strong>a Beach, incl. europe<strong>an</strong> royalty <strong>an</strong>d the Pope. <strong>The</strong>re are 7bloodlines in Umb<strong>an</strong>da, <strong>an</strong>d a newcomer must join one of these. IfAmer. IlIum, slaves have memories of Argentina <strong>an</strong>d other LatinAmeric<strong>an</strong> countries, the memories could easily be true. <strong>The</strong> <strong>Illuminati</strong>within the Jehovah’s Witnesses’ Bethel HQ (which are programmedmultiples) have used quiet isl<strong>an</strong>ds in the Bahamas for rituals. In 1958, it isbelieved (according <strong>to</strong> 2 partly de-programmed multiples) that it wasAndros Is., Bahamas which they used for their rituals. In Haiti, Voodoo,called Vaudou, is the religion of the majority of the people, about 90%of the people. This is interesting because it gives us <strong>an</strong> example of whatthe situation is like when <strong>an</strong> entire nation regularly seeks <strong>to</strong> be demonpossessed. Possession behavior in the various black occult groups, suchas Umb<strong>an</strong>da (brazili<strong>an</strong> sat<strong>an</strong>ism), Haiti<strong>an</strong> Vaudou, <strong>an</strong>d the St. VincentShakers (also called Zeckeeboom people) is a learned behavior.C<strong>an</strong>didates for mediumship in Sao Paulo Umb<strong>an</strong>da are given specialtraining in tr<strong>an</strong>ce & possession. <strong>The</strong>y use dissociation techniques such431


as focusing on a lighted c<strong>an</strong>dle, or turning the person <strong>an</strong>d snappingthe fingers <strong>to</strong> put people in tr<strong>an</strong>ce. In the U.S., because demonpossession seems rare <strong>to</strong> psychiatrists, they have labeled demonpossessed people as “crazy”. However, in Haiti, <strong>an</strong> entire nationregularly conducts rituals <strong>to</strong> become demon possessed. Since the normis <strong>to</strong> be demon possessed, it fails <strong>to</strong> be abnormal behavior. M<strong>an</strong>y of theother labels <strong>an</strong>d expl<strong>an</strong>ations that psychiatrists find easy <strong>to</strong> giveconcerning demon possession in the U.S. obviously just don’t explainwhat is happening in Haiti. Some of the expl<strong>an</strong>ations given bypsychiatrists for demon possession in Voodoo is a. repressed personalityis coming <strong>to</strong> the surface, b. that the voodoo tr<strong>an</strong>ce is <strong>an</strong> act <strong>to</strong> impressa crowd, c. it stems from hysterical nervous disorders, <strong>an</strong>d d. it stemsfrom psychopathy, neurosis, or schizophrenia. a. In Haiti, demonpossession of people c<strong>an</strong> not be a repressed personality because theperson being possessed of a demon must behave according <strong>to</strong>rigorous rules of how each demon is supposed <strong>to</strong> act. Far fromexpressing himself, the victim of demon possession tries <strong>to</strong> personifysome mythical spirit whose character on the whole is foreign <strong>to</strong> himself.b. In Haiti, most people who go in<strong>to</strong> the demon possessed state are no<strong>to</strong>bserved closely because it is the norm for people <strong>to</strong> become demonpossessed. People at the ceremonies may cast absentminded looks atthe people being possessed, but the entire scenario gains thepossessed person very little attention. Nor does <strong>an</strong> entire crowd inHaiti<strong>an</strong> Voodoo get possessed, or go in<strong>to</strong> a collective delirium. <strong>The</strong>excitement is quite varied with the crowds. c. If expl<strong>an</strong>ation c. weretrue, it would me<strong>an</strong> <strong>an</strong> entire nation is hysterical <strong>an</strong>d mentallyder<strong>an</strong>ged. 40 years ago it was shown that the Haiti<strong>an</strong> people are notall hysterical, but that demon possession in Haiti was the normal me<strong>an</strong>sof communicating with supernatural powers. If demon possessiontr<strong>an</strong>ces were genetic in origin, then why do some groups of blacks fromthe same gene pool but living in other nations have absolutely little <strong>to</strong>do with the occult? d. Investiga<strong>to</strong>rs in Haiti have had <strong>to</strong> discountdemon possession as a neurosis. According <strong>to</strong> one investiga<strong>to</strong>r thenumber of schizophrenics <strong>an</strong>d psychotics is very small within cults likeVoodoo. “Here the very marked lack of response <strong>to</strong> the cathartictherapies employed in possession cults in the case of seriously disturbedindividuals...is itself a testimony <strong>to</strong> the robust mental health of themajority of particip<strong>an</strong>ts....<strong>The</strong> latter have no difficulty at all incommunicating their problems. <strong>The</strong>y operate within a culturallyst<strong>an</strong>dardized medium of communication. Nor in contrast <strong>to</strong> the trueself-insulated psychotic, do they miss their “cues.” <strong>The</strong>y respond in theexpected way, <strong>an</strong>d others react equally predictably.” A Brazili<strong>an</strong>psychiatrist said that no “fr<strong>an</strong>kly schizophrenic person would be able <strong>to</strong>pass the probationary scrutiny” involved <strong>to</strong> join this religious group.(<strong>The</strong>se last two quotes come from a study of Black Religious groups.)Interestingly, studies made of W.W. II war criminals show no personalitydifferences between them <strong>an</strong>d the normal population. Could it be432


possible that there really is a demonic element in the lives of peoplethat helps move them in the direction of evil? So’what is demonpossession in Haiti’s Voodooism? According <strong>to</strong> the Haiti<strong>an</strong>s a spiritwhich they call “loa” joins a person like a rider mounts a horse. <strong>The</strong> spiritthen controls the person like a rider. <strong>The</strong> possessed person is called a“chual” which me<strong>an</strong>s horse, <strong>an</strong>d the spirit is said <strong>to</strong> mount or saddle hisvictim. Blood sacrifices are often associated with the demon, <strong>an</strong>d thepossessed person will drink the blood from the sacrificed <strong>an</strong>imal.Polished s<strong>to</strong>nes, <strong>an</strong>d herbs, <strong>an</strong>d tr<strong>an</strong>ce <strong>an</strong>d dissociative states are used<strong>to</strong> attract spirits. While the Monarch slaves have trauma-baseddissociative states, the practitioners of Voodoo have ritually induceddissociative states. Voodoo rituals will involve ch<strong>an</strong>ting, drums, at timesh<strong>an</strong>dclapping <strong>an</strong>d frenzied d<strong>an</strong>cing <strong>to</strong> induce the dissociative states.In fact, several features have been identified which bring aboutdissociative states in the black religions of the Caribbe<strong>an</strong> <strong>an</strong>d SouthAmerica. First they have d<strong>an</strong>cing <strong>to</strong> a pronounced <strong>an</strong>d rapid beat.Next, the induction in<strong>to</strong> the dissociative state frequently follows aperiod of starvation <strong>an</strong>d/or overbreathing (hyperventilation). <strong>The</strong>beginning of the demonic possession is characterized by a brief periodof muscle inhibitions, or a collapse. <strong>The</strong> person who is experienced atbeing possessed acquires a specific behavior pattern for the deity thatis supposedly controlling it. And finally, the head <strong>an</strong>d limbs may tremorunder tr<strong>an</strong>ce, <strong>an</strong>d the person may become dissociative enough thatthey c<strong>an</strong> pick up red hot irons. <strong>The</strong> possessed c<strong>an</strong> be conscious,semiconscious, or unconscious. Studies made of this situation where <strong>an</strong>entire nation like Haiti actively seeks demonic possession allows us <strong>to</strong>discount some expl<strong>an</strong>ations <strong>an</strong>d get a better picture of what demonpossession isn’t. It also helps <strong>to</strong> underst<strong>an</strong>d what is involved in demonicpossession. <strong>The</strong> first major authoritative work on Haiti<strong>an</strong> Voodoo writtenin 1884 by Spencer St. John reported on the terror, the blood rites, <strong>an</strong>dthe c<strong>an</strong>nibalism of Haiti<strong>an</strong> Voodoo. This has been <strong>to</strong>o much for somepeople <strong>to</strong> believe. Still, if people s<strong>to</strong>p <strong>to</strong> realize how Voodoo cameabout it, it makes sense. Conservative estimates of the number ofslaves brought in<strong>to</strong> the port of Saint Dominque while it was a pl<strong>an</strong>tationcolony are 900,000. <strong>The</strong> conditions on the isl<strong>an</strong>d for the slaves was like aNazi work camp. <strong>The</strong> cruelty on the colonial Haiti<strong>an</strong> pl<strong>an</strong>tations wasbeyond comprehension. <strong>The</strong> Afric<strong>an</strong>s brought in as slaves alreadypracticed JuJu. Under the crucible of the severe <strong>to</strong>rture of slavery, theslaves formed Haiti<strong>an</strong> voodoo, which is a conglomeration of Afric<strong>an</strong>Voodoo, masonic rites, <strong>an</strong>d Europe<strong>an</strong> magic <strong>an</strong>d Catholic saints <strong>an</strong>dsymbols. For 2 centuries, their Afric<strong>an</strong> vaudou was these slaves onlypower against their cruel pl<strong>an</strong>tation owners, <strong>an</strong>d is partly credited forhelping Haiti become the first free black republic in the revolution of1804. In Haiti, Cuba, Brazil, Trinidad <strong>an</strong>d other areas of the New World,where JuJuism has tr<strong>an</strong>sformed itself in<strong>to</strong> black occult religions, the oldgods of Africa: Damballa, Erzilie, Legba, Obatala, Ogun, Oshun <strong>an</strong>dothers have been equated with Catholic saints <strong>an</strong>d given the names433


of these saints. <strong>The</strong> ritually induced dissociative states of Voodoo aregenerally accomp<strong>an</strong>ied by amnesia, that is lost time. During this losttime, the person acts as if he is a spirit (god). This is a ritual baseddissociative state rather th<strong>an</strong> a trauma-based dissociative state. <strong>The</strong><strong>Illuminati</strong> Monarch programming at times attempts <strong>to</strong> combine the twobases--ritual <strong>an</strong>d trauma--<strong>to</strong> create a dissociative state. This is why is itdifficult <strong>to</strong> separate out the religious fac<strong>to</strong>r.INDIAUp <strong>to</strong> now there have been numerous cases of demonic possession inIndia, but there has been no case of a true multiple personality. <strong>The</strong>reason why is that the multiple’s in the U.S.-Europe are being cr<strong>an</strong>kedout by trauma-based mind-control <strong>an</strong>d the <strong>Illuminati</strong> hasn’t beenprogramming in India like the U.S. & Europe. As the slaves that arebeing created disperse, within time, we will eventually start seeingmultiples in India. In the Americ<strong>an</strong> Journal of Psychotherapy, J<strong>an</strong>. 1981,p. 115, it states, “However, so far, no case of double or multiplepersonality so labeled by a psychiatrist, has been reported from India inthe professional literature. Considering that hysterical disturb<strong>an</strong>ces ingeneral are quite widespread in the country, this is surprising. On theone h<strong>an</strong>d, it could me<strong>an</strong> <strong>an</strong> actual low prevalence of multiplepersonality in the country.” For those of us who underst<strong>an</strong>d what ishappening, it is obvious why multiples aren’t found in India. <strong>The</strong> factthat multiples aren’t found in India ought <strong>to</strong> wake up people thatmultiple personalities is not “demon possession nor is it simply the resul<strong>to</strong>f bad parenting or everyday type of horrendous trauma. Almosteveryone has a trauma in their early life, <strong>an</strong>d is somewhat dissociative,but that doesn’t make them have multiple personalities, which areprogrammed <strong>an</strong>d have separate his<strong>to</strong>ries <strong>an</strong>d altar names. India hasover twice the population of the U.S. <strong>an</strong>d yet no multiples reported.After reading this book, the reader underst<strong>an</strong>ds why not. It might beappropriate <strong>to</strong> point out here that the early Americ<strong>an</strong> cases of MPD(now called DID) are from bloodlines associated with the <strong>Illuminati</strong>. <strong>The</strong>first widely reported Americ<strong>an</strong> case of MPD was Mary Reynolds in 1811.<strong>The</strong> Top 13 <strong>Illuminati</strong> Bloodlines covers the Reynold’s bloodline as beinga major <strong>Illuminati</strong> bloodline. Two other earlier Amer. MPD cases are oneinvolving a m<strong>an</strong> from Edinburgh University, Scotl<strong>an</strong>d <strong>an</strong>d one founddiscussed in a letter in 1791 written by a Reverend Joseph Lathrop ofMass. <strong>to</strong> the President of Yale Ezra Stiles. (See Letters <strong>an</strong>d Papers of EzraStiles, President of Yale College, 1778-1795. New Haven: Yale Univ.Press, 1933.) Those, who have tracked the conspiracy, or read Fritz’swritings, know that Yale founded by the Unitari<strong>an</strong>s has long beenimport<strong>an</strong>t for the <strong>Illuminati</strong>. <strong>The</strong> Unitari<strong>an</strong>s have been connected withhermeticism <strong>an</strong>d money from the start.434


HOW THE ANTI-CHRIST SPIRIT CONTRIBUTES TO CONTROLLING THE SLAVEWithin the <strong>Illuminati</strong> hierarchy slaves, the Spirit of the Anti-Chris<strong>to</strong>perates. <strong>The</strong> Mothers-of-Darkness are only allowed <strong>to</strong> becomeMothers-of-Darkness after they marry the AntiChrist. <strong>The</strong> entireworldwide collection of Mothers-of-Darkness alters will serve thephysical AntiChrist as a private harem when he takes over. <strong>The</strong>y willalso serve as <strong>an</strong> inner elite guard of the physical AntiChrist. <strong>The</strong>ydescribe the consummation of the marriage with the AntiChrist asbeing badly burned. Because the AntiChrist, who is alive <strong>an</strong>d well<strong>to</strong>day, will be/is already the master h<strong>an</strong>dler <strong>an</strong>d the masterprogrammer a description of him is given in Appendix A. How does theSpirit of the AntiChrist influence a <strong>Mind</strong>-controlled slave? Some of thethings that this Spirit does <strong>to</strong> control individuals is <strong>to</strong> cause them <strong>to</strong>judge themselves. Another thing done <strong>to</strong> control the slave’s alters <strong>to</strong>ch<strong>an</strong>ge their focus so they c<strong>an</strong>’t grow spiritually, bribe the person withenticing doctrines of demons, <strong>an</strong>d mislead people from true freedomin<strong>to</strong> religious bondage. We will clarify what we me<strong>an</strong> as we explainthese things in the next few paragraphs. Sat<strong>an</strong> himself spawned theAnti-Christ spirit, as well as leading the demonic <strong>an</strong>gels in<strong>to</strong> their evil.<strong>The</strong> Spirit of the Anti-Christ has as its purpose the destruction ofeverything that God has built within the person--their looks, theircuriosity of beauty, <strong>an</strong>d their personhood itself. <strong>The</strong> Spirit of theAntiChrist is attached <strong>to</strong> the religious spirit when people get Christi<strong>an</strong>itywithout the Spirit of Life. M<strong>an</strong>y Monarch slaves with the Anti-Christ spiritare working under the cover of being good Christi<strong>an</strong>s. <strong>The</strong> Bible eventalks about them, “For such are false apostles, deceitful workers,tr<strong>an</strong>sforming themselves in<strong>to</strong> the apostles of Christ. And no marvel; forSat<strong>an</strong> himself is tr<strong>an</strong>sformed in<strong>to</strong> <strong>an</strong> <strong>an</strong>gel of light. <strong>The</strong>refore it is nogreat thing if his ministers also be tr<strong>an</strong>sformed as the ministers ofrighteousness; whose end shall be according <strong>to</strong> their works.” 2 COR11:13-15.<strong>The</strong> greek word tr<strong>an</strong>slated “tr<strong>an</strong>sforming” is also the source of our wordmasquerade. It me<strong>an</strong>s <strong>to</strong> have a front, with a hidden character behindthe front. <strong>The</strong> words of the apostles warn Christi<strong>an</strong>s about “doublemindedmen” (JS 1:8) <strong>an</strong>d that Sat<strong>an</strong>’s key people will masqueradewith false fronts. In contrast, the Scriptures admonish followers of Christ<strong>to</strong> have their public lives match their private lives.Sat<strong>an</strong> lavishes the Spirit of the AntiChrist upon his hierarchy. He doesn’tlavish his spirit within what he views as the “rabble” of hum<strong>an</strong>ity, whodo not directly serve him. When the Spirit comes in<strong>to</strong> a person, it comesin as a cold clammy spirit that consumes all hope <strong>an</strong>d all joy in life.Rather th<strong>an</strong> being a fresh breeze bringing joy, this Spirit of the AntiChristis like a vacuum sucking life. It is like being raped. Victims of this spirit,say they felt like they were raped <strong>an</strong>d defiled by it. <strong>The</strong> person’s own435


natural feelings of cle<strong>an</strong>liness will feel violated. This Spirit c<strong>an</strong> <strong>to</strong>uch ourlives in different ways <strong>an</strong>d at different levels. When our personalst<strong>an</strong>dards are violated, the person will often not forgive themselves.Instead, they judge themselves. This further illustrates how the AntiChristsets up abusive patterns. By judging ourself, rather th<strong>an</strong> forgiving, weset ourselves up as God, for only God c<strong>an</strong> judge a person, for He is theonly one who has a true st<strong>an</strong>dard <strong>an</strong>d measuring stick <strong>to</strong> judge by.Captured by the cycle of abuse of the Spirit of the AntiChrist, a personwill continue <strong>to</strong> beat up upon themselves. At some point we forgiveourselves, <strong>an</strong>d in so doing we are saying that the memory no longerhas mastery over us. As Christ is the incarnation of God in the flesh, theAntiChrist will be the incarnation of Sat<strong>an</strong> in the flesh. (cf. REV 13:4)Sat<strong>an</strong> w<strong>an</strong>ted God’s power <strong>an</strong>d glory, but not the character of God.<strong>The</strong> Spirit of the AntiChrist has a wisdom that it promotes which is“earthly, natural, demonic.” (JAS 3:14-15) <strong>The</strong> Spirit of the AntiChrist willentice people with the Doctrine of Demons. (See 1 TIM 4:1) Forinst<strong>an</strong>ce, “For when they speak great swelling words of v<strong>an</strong>ity, theyallure through the lusts of the flesh, through much w<strong>an</strong><strong>to</strong>nness, thosethat are just escaping from them who live in error. While they promiseliberty, they themselves are the serv<strong>an</strong>ts of corruption...” 2 Ptr. 2:17-19<strong>The</strong> AntiChrist Spirit breaks our ability <strong>to</strong> love God & others. Sat<strong>an</strong>’soriginal pride came from selfishness. <strong>The</strong> Spirit of the AntiChrist bringsselfishness, but it brings it in a hidden way. <strong>The</strong> AntiChrist Spirit will causepain. Heaven, where the Spirit of the AntiChrist is absent--has nosuffering. <strong>The</strong> hidden damage of pain is that it inflicts self-focus. Christas He hung on the cross was able <strong>to</strong> continue <strong>to</strong> focus on others.While most men would have been thinking about themselves in self-pityJesus was still thinking of others. He said <strong>to</strong> his mother, “Wom<strong>an</strong>, beholdyour son.” And <strong>to</strong> John, “Behold your mother.” To paraphrase, Takecare of my mother. Later he said, “Forgive them for they know notwhat they do.” (See the Gospel of John) Jesus even brought someone<strong>to</strong> the Lord while he hung on the cross. He was ev<strong>an</strong>gelizing. Don’t som<strong>an</strong>y Christi<strong>an</strong>s look for the ideal situation <strong>to</strong> lead people <strong>to</strong> the Lord,yet Christ did it under the worst of conditions. Self-focus, selfishness <strong>an</strong>dpride are closely related. It is hard <strong>to</strong> point out where one begins <strong>an</strong>dthe other ends. <strong>The</strong> Spirit of the AntiChrist w<strong>an</strong>ts <strong>to</strong> draw others <strong>to</strong> itsposition of pride. So it inflicts pain <strong>an</strong>d suffering, like it did <strong>to</strong> Job <strong>to</strong>draw the attention of the person off of Yahweh God <strong>an</strong>d one’sfellowm<strong>an</strong> <strong>an</strong>d on<strong>to</strong> oneself. All the comm<strong>an</strong>dments h<strong>an</strong>g on us lovingYahweh God will all our heart, soul, <strong>an</strong>d mind, <strong>an</strong>d loving our neighboras ourselves, but the AntiChrist Spirit gets our focus off of Yahweh <strong>an</strong>dothers <strong>an</strong>d on<strong>to</strong> ourselves. Bitterness may develop in us. Bitternessgrieves the Holy Spirit. Bitterness will seat itself in our mind, <strong>an</strong>d like atr<strong>an</strong>sponder will emit bitterness. A lack of peace <strong>an</strong>d joy results. <strong>The</strong>Spirit of the AntiChrist has sidetracked the whole maturing process. As a436


child grows in<strong>to</strong> <strong>an</strong> adult it learns <strong>to</strong> shift its focus from itself <strong>to</strong> others.C<strong>an</strong> we go in <strong>an</strong>d focus on our own problems <strong>an</strong>d solve them? If par<strong>to</strong>f the problem is self-focus, then the <strong>an</strong>swer is “no.” <strong>The</strong> <strong>an</strong>swer lies infocusing on the Holy Spirit. Living <strong>an</strong>d walking in the Spirit of Christ is thehealth we seek. (GAL 5:16; JN 15:1-11) Does it work? Yes. <strong>The</strong> authorsknow of m<strong>an</strong>y cases, where all kinds of individuals solved all kinds ofproblems by receiving the Holy Spirit in<strong>to</strong> their lives. <strong>The</strong>y see thesupernatural cle<strong>an</strong>sing that happens, but m<strong>an</strong>y times they don’tunderst<strong>an</strong>d the principle behind what they just experienced. Whensome of their problems persist, do they turn again <strong>to</strong> focus on the HolySpirit? Often they focus on themselves, self-pity, bitterness, etc.Counseling <strong>to</strong>day often takes this approach. It is fine <strong>to</strong> identify theproblem, but then following that- the solution is not <strong>to</strong> focus on theproblem but <strong>to</strong> get out of the path of death.<strong>The</strong> process of healing.Healing may be a process, not <strong>an</strong> event. We break <strong>an</strong> arm in asecond, it takes m<strong>an</strong>y months <strong>to</strong> heal. We break our capacity <strong>to</strong> loveGod <strong>an</strong>d our fellowm<strong>an</strong>, but we expect <strong>an</strong> inst<strong>an</strong>t cure. Anyone whohas met the Spirit of the AntiChrist needs <strong>to</strong> learn how <strong>to</strong> love again.Love is <strong>an</strong> action word. One learns <strong>to</strong> hammer nails by hammeringnails. One learns <strong>to</strong> type by typing. One learns <strong>to</strong> love by loving. <strong>The</strong>survivor who has been controlled by the Spirit of the AntiChrist mayneed <strong>to</strong> get a teacher of love, a “Loving teacher” so-<strong>to</strong>-speak.PART J - THE USE OF ANGEL ALTERSM<strong>an</strong>y <strong>Illuminati</strong> models had “<strong>an</strong>gels” or “spirit guides” created thatcould provide divine messages <strong>to</strong> the Monarch slave. <strong>The</strong><strong>Illuminati</strong>/Intelligence agencies have been highly successful withcontrolling people via their religious beliefs by impl<strong>an</strong>ting alters who areseen by a Monarch slave as being a messenger from God or thegod(s). For someone like, Loretta Lynn, they use spirits of Indi<strong>an</strong>s.Another example of this, is someone having 3 Black Angels. <strong>The</strong>concept is the same though. This works in closely with having demonicguides.PART K - SCRIPTURES IN PROGRAMMINGAn ex-Programmer states that the <strong>Illuminati</strong> <strong>Mind</strong>-Control intentionally437


used verses from every book of the Bible. <strong>The</strong> Programmers alsointentionally used everything Jesus said in one dis<strong>to</strong>rted way or <strong>an</strong>otherin the programming. A person c<strong>an</strong> pick up a Bible with Jesus’ words inred, <strong>an</strong>d get a quick idea of one area of the Bible which was heavilymisused. <strong>The</strong> programmers love <strong>to</strong> reframe (twist) parables. BillyGraham, who is a Monarch h<strong>an</strong>dler, is very adept at weaving inprogramming l<strong>an</strong>guage in with biblical messages. For inst<strong>an</strong>ce, as thisbook was being finished, in his 1995 televised Christmas message, givenin front of a fireplace with 13 c<strong>an</strong>dles lit behind him, he said, “Comehome so I c<strong>an</strong> give you a new heart.” A little later he activated thePlowshares programming, <strong>an</strong>d a little later he said, “from the cradle <strong>to</strong>the cross <strong>to</strong> the ground”, which is a phrase <strong>an</strong>y deeper cult alter wouldhave <strong>an</strong> entirely different me<strong>an</strong>ing for th<strong>an</strong> the person on the street.Readers, who read chapter 5, will remember what was written aboutBilly Graham. When Billy Graham was in Portl<strong>an</strong>d, his ministry somehowgot the addresses <strong>an</strong>d phone numbers <strong>to</strong> all the Monarch survivors inthe area, who he invited <strong>to</strong> a personal meeting with him. While he hadhis mind-control survivors gathered, he talked <strong>to</strong> them <strong>an</strong>d set off theirprogramming with their personal codes. This was observed by severalwitnesses. His ministry also sends codes via their messages flashedacross the bot<strong>to</strong>m of the T.V. screen. <strong>The</strong> reader needs <strong>to</strong> bear in mindthat bloody Sat<strong>an</strong>ic holidays occur around Christi<strong>an</strong> holy days. <strong>The</strong>Winter Solstice occurs around Christmas. Every Christmas, the <strong>Illuminati</strong>covens around the world build m<strong>an</strong>gers with children which thesacrifice. This is worked in <strong>to</strong> enh<strong>an</strong>ce the programming they are doingwith their children. Around Easter time, the <strong>Illuminati</strong> do Death, burial<strong>an</strong>d resurrection ceremonies (traumas). Nothing sacred <strong>to</strong> Christi<strong>an</strong>itygets overlooked. <strong>The</strong> method that it is mocked depends on who is incontrol of that region’s ceremonies. <strong>The</strong> idea of using Scriptures forprogramming accomplishes several things:a. therapists are usually secular <strong>an</strong>d unfamiliar with the Bible. Thisprevents exposure of the programming cues <strong>an</strong>d triggers <strong>an</strong>d fronts.b. ministers are usually unable <strong>to</strong> believe in psychology <strong>an</strong>d mindcontrolprogramming <strong>an</strong>d so their Bible knowledge is not of <strong>an</strong>ytherapeutic benefit because they are ignor<strong>an</strong>t of Sat<strong>an</strong>’s devices.Some Christi<strong>an</strong> ministers are putting out advice that Multiples need <strong>to</strong>be helped by simply telling “the person” <strong>to</strong> quit using multiplicity as away <strong>to</strong> cop out of responsibility. First, there is no “person” who is usingmultiplicity as a cop out--the personality of the person has beenshattered--<strong>an</strong>d no one person represents the entire mind. Second, theperson is not in control of their mind <strong>to</strong> s<strong>to</strong>p what is happening. <strong>The</strong>yare under <strong>to</strong>tal mind control.c. the last place people would look for underst<strong>an</strong>ding Sat<strong>an</strong>icprogramming is in the Bible.438


d. when programmed multiples go <strong>to</strong> church, they c<strong>an</strong> be used, <strong>an</strong>dprogrammed by using Christi<strong>an</strong> terms. <strong>The</strong>re are “Christi<strong>an</strong>” churches inWashing<strong>to</strong>n, Ark<strong>an</strong>sas, Tennessee, <strong>an</strong>d California <strong>an</strong>d m<strong>an</strong>y otherplaces which are 100% cult mind-control operations, such as the“Lord’s Chapel.”e. When a programmed multiple tries <strong>to</strong> set themselves free by takingin spiritual knowledge of God, they find that the Bible is a programmingtrigger, that sets off programming or brings up some alter. Reading thebook of 1 John might bring up the <strong>Illuminati</strong>’s alter named Jesus.f. <strong>The</strong> cult which is doing the programming by making a mockery ofGod, c<strong>an</strong> build their egos <strong>an</strong>d their pride. It may allow them <strong>to</strong> feelthey are more powerful th<strong>an</strong> God Almighty.g. <strong>The</strong> victim c<strong>an</strong> be <strong>to</strong>ld that “God” is telling them <strong>to</strong> do something.And who sets himself up as “god”? --the cult programmer.<strong>The</strong>re isn’t <strong>an</strong>ything in the Bible that c<strong>an</strong>’t conceivably be misused, butsome of the Scriptures <strong>an</strong>d their programming misuse are listed below.Scriptures that lend themselves <strong>to</strong> double-binds, <strong>to</strong> obedience or covers<strong>to</strong>ries that seem <strong>to</strong> justify the programmer <strong>an</strong>d the programming areused. Names of Queens <strong>an</strong>d Kings in the Bible c<strong>an</strong> be used for alternames. <strong>The</strong> men who wrote under inspiration, knew that scripturescould be misused, in 2 Cor 4: 1-2 Paul writes about himself, “<strong>The</strong>reforeseeing we have this ministry, as we have received mercy, we faint not;but have renounced the hidden things of dishonesty, not walking incraftiness, nor h<strong>an</strong>dling the word of God deceitfully...” Clearly,mish<strong>an</strong>dling the word of God deceitfully is <strong>an</strong> <strong>an</strong>cient art.GENESIS --Genesis Creation S<strong>to</strong>ry--cover s<strong>to</strong>ry for the creation of parts of aslave’s SystemTree of Life--used <strong>to</strong> create <strong>an</strong> internal Cabalistic Tree of Life for altermagicAdam & Eve--code wordsGarden of Eden--part of the System, usually the early pure part thatneeds <strong>to</strong> be guarded by “<strong>an</strong>gels”(demons)Angels--alters or demons placed in<strong>to</strong> a System. Angles could be a439


method by which the abuser sends messages <strong>to</strong> the person, thus givingdivine credibility <strong>to</strong> the programmer’s message. Angel names c<strong>an</strong>represent alters <strong>an</strong>d demons placed in<strong>to</strong> a person.Sodom & Gomorrah--a type of suicide programGenesis 22:17-18, “That in blessing I will bless thee, [the programmeras god is going <strong>to</strong> bless the victim with <strong>to</strong>rture] <strong>an</strong>d in multiplying I willmultiply thy seed as the stars of the heaven, <strong>an</strong>d as the s<strong>an</strong>d which isupon the sea shore; <strong>an</strong>d thy seed shall possess the gate of his enemies;<strong>an</strong>d in thy seed shall all the nations of the earth be blessed [all theareas of the system]; because thou hast obeyed my voice.” [theprogrammer’s voice]Melchizedek -a type of occult order or r<strong>an</strong>k Genesis 38--pledge of asignet, bracelet & staff--trigger cues <strong>to</strong> open up a System <strong>to</strong> obey.Joseph & Esau’s birthright--Sat<strong>an</strong>ic birthrights emphasized as ifs<strong>an</strong>ctioned by God’s word.EXODUS--<strong>The</strong> 12 (actually 13 with M<strong>an</strong>assah <strong>an</strong>d Ephraim) Tribes of Israel c<strong>an</strong>be used for the code names of alters <strong>an</strong>d sections of alters.House of Israel--code name for section/structure of a systemPlagues of Egypt--Program <strong>to</strong> terrorize a slave.Oaths <strong>an</strong>d Coven<strong>an</strong>ts--their existence in the Bible is used <strong>to</strong>emphasize the validity <strong>to</strong> Sat<strong>an</strong>ic oaths <strong>an</strong>d coven<strong>an</strong>ts. <strong>The</strong> curses thatGod says will happen if disobedience takes place are used by theH<strong>an</strong>dlers <strong>to</strong> instill fear in<strong>to</strong> the victim, that if he doesn’t comply, God’scurses will fall on them. <strong>The</strong> Catholic/Jesuit programming relies heavilyupon the Bible. <strong>The</strong> Bible verse ECL. 5:4 “When you make a vow <strong>to</strong>God, do not delay <strong>to</strong> pay it...It is better not <strong>to</strong> vow th<strong>an</strong> <strong>to</strong> vow <strong>an</strong>d notpay,” is used by these Sat<strong>an</strong>ic programmers <strong>to</strong> hold their victims undervows made under duress, hypnosis, or deception. (DT 23:2 1 alsoemphasizes keeping your vows.) <strong>The</strong>se Sat<strong>an</strong>ic <strong>Mind</strong>-controlled slaveh<strong>an</strong>dlers do not tell their slaves that Numbers 30 states that m<strong>an</strong>y vows,such as the vows of children are null <strong>an</strong>d void. <strong>The</strong> first fruits of thingsbelong <strong>to</strong> the real God of the Bible <strong>an</strong>d c<strong>an</strong>’t be vowed away. <strong>The</strong>Sat<strong>an</strong>ic groups like <strong>to</strong> take the first male child in mockery of whatbelongs <strong>to</strong> God. Evil vows, vows made under duress (just like contractsmade under duress) are null <strong>an</strong>d void. But the H<strong>an</strong>dlers never tell theirslaves these “finer points of the law.” Instead, they use the Bible <strong>to</strong>440


justify their own goals.I AM [one of the names of Yahweh]--used as a programming cue ornameEX 15 - “I am the Lord that healeth thee”. <strong>The</strong> programmer c<strong>an</strong>apply this <strong>to</strong> himself as he helps rescue the victim from a m<strong>an</strong>ufacturedlife-threatening crisis.Ten Comm<strong>an</strong>dments with LEV 20--used <strong>to</strong> belittle the victim <strong>to</strong> showhim that he is rejected of God.When the Programmer sets himself up as God, he c<strong>an</strong> misapply allthe verses calling on people <strong>to</strong> serve God such as DT 4:29 “Seek theLord thy God, thus thou shalt find him, if thou seek him with all thy heart<strong>an</strong>d with all thy soul.” See DT 8:18 also DT 11:13, “love the Lord yourGod, <strong>an</strong>d <strong>to</strong> serve him with all your heart <strong>an</strong>d with all your soul.” Ofcourse m<strong>an</strong>y of the alters have been stripped of their hearts duringprogramming <strong>an</strong>d given a heart of s<strong>to</strong>ne. <strong>The</strong>y do not have a realheart <strong>to</strong> serve God, but they c<strong>an</strong> serve their master with their heart ofs<strong>to</strong>ne.OT HISTORICAL BOOKS--1 KG chapters16-2 1, <strong>The</strong> s<strong>to</strong>ry of Ahab, Jezebel, <strong>an</strong>d Elijah. <strong>The</strong> Programmers playthemselves in the role of Jehu coming <strong>to</strong> protect what is his. <strong>The</strong> onlyadmirable thing for Jezebel <strong>to</strong> do, is <strong>to</strong> put her make-up on <strong>an</strong>dprepare herself <strong>to</strong> die. This s<strong>to</strong>ry is used <strong>to</strong> make a wom<strong>an</strong> slave thinkthat the only admirable thing <strong>to</strong> do is <strong>to</strong> prepare <strong>to</strong> die like Jezebel. <strong>The</strong>Vineyard of Naboth is also used as a programming theme. <strong>The</strong> showMysteries of the Bible is <strong>an</strong> example of how the Bible <strong>an</strong>d television c<strong>an</strong>work <strong>to</strong>gether <strong>to</strong> control a person. This show had <strong>an</strong> episode aboutJezebel, Ahab <strong>an</strong>d Jehu. It must be remembered that Dr. Green’sinternal alter in some victims is called Jehu, <strong>an</strong>d that <strong>an</strong>otherprogrammer has taken the identity of Ahab <strong>an</strong>d that one of the deepcats is the Gr<strong>an</strong>de Dame programmer represented by Jezebel. <strong>The</strong>effect of the show on one Monarch System was this: Jehu has thepower over the gates <strong>an</strong>d <strong>to</strong> bring judgement upon Ahab <strong>an</strong>dJezebel. Jezebel in the show Mysteries of the Bible is praised becausewhen she knew she was going <strong>to</strong> die she got her makeup on <strong>an</strong>d shegot herself ready for Jehu <strong>an</strong>d allowed herself <strong>to</strong> be killed. <strong>The</strong> Systemunders<strong>to</strong>od the show <strong>to</strong> me<strong>an</strong> in paraphrase:“this is a threat, you are <strong>to</strong> get yourself ready for Jehu or whoever <strong>an</strong>dcomply.”441


PROPHETS--EZ (Ezekiel) 1:15-17 <strong>an</strong>d the rest of the chapter. This whole chapter isused <strong>to</strong> build the internal circle within circles of interconnecting worldsof the alter system.Jeremiah 18:3--When the child is 3 or 4, a utility program called thePotter Wheel is placed in so that the Programmer c<strong>an</strong> work with <strong>an</strong>entire section of alters if he so desires. When <strong>an</strong> alter(s) go up on thewheel, they are available <strong>to</strong> be worked on. <strong>The</strong>y will be asked <strong>to</strong>“st<strong>an</strong>d in file according <strong>to</strong> r<strong>an</strong>k <strong>an</strong>d serial no.”EZ 37-<strong>The</strong> s<strong>to</strong>ry of the Valley of Dry bones is used as a way ofreactivating dead robots--or dead robotic clones within a Monarchsystem.JER (Jeremiah) 47:3--in this verse horses show up when a boundarywas crossed. This is used <strong>to</strong> put in protective programming.Nahum 3:2--the sword = staff. <strong>The</strong> entire 3rd chapter of Nahum isused <strong>to</strong> make slaves feel that God has rejected them. <strong>The</strong>y have noheart, because of their evilness.DANIEL. D<strong>an</strong>iel 10--the Beast with 10 <strong>to</strong>es (used for programming inthe Beast computer)GOSPELS--MT 5:13 “Ye are the salt of the earth: but if the salt have lost hissavior wherewith shall it be salted? it is thenceforth good for nothing,but <strong>to</strong> be cast out <strong>an</strong>d <strong>to</strong> be trodden under foot of men.” This is used <strong>to</strong>justify punishment of the slave.MT 6:22-23 “<strong>The</strong> lamp of the body is the eye. If therefore your eye isgood, your whole body will be full of light. But if your eye is bad, yourwhole body will be full of darkness. If therefore the light that is in you isdarkness, how great is that darkness!” <strong>The</strong>se words are used with ame<strong>an</strong> programming trick where disobedient alters are pulled up,locked in<strong>to</strong> placed, placed mentally within crystal ch<strong>an</strong>deliers <strong>an</strong>dthen the sexual org<strong>an</strong>s, mouth, <strong>an</strong>d side of the brain are shocked insequence. <strong>The</strong> “light” does a severe shattering <strong>to</strong> all the alters whichexperience the shocks. This shatters the disobedient alters <strong>an</strong>d they arereplaced with others.MK 3:24-25, “And if a kingdom be divided against itself, that442


kingdom c<strong>an</strong>not st<strong>an</strong>d. And if a house be divided against itself, thathouse c<strong>an</strong>not st<strong>an</strong>d.” <strong>Used</strong> <strong>to</strong> help justify backup programming thatwill not allow disobedience. <strong>The</strong> slave’s front alters are <strong>to</strong>ld <strong>to</strong> go alongwith the rest of the System’s desires, <strong>an</strong>d if not, then the house (body)will fall (commit suicide). This type of scriptural programming is used in ademonic way <strong>to</strong> keep the victim from straying from the script of themind-control.MK 4:6 “But when the sun was up it was scorched, <strong>an</strong>d because ithad no root, it withered away.” This is used <strong>to</strong> make sure the roots ofthe programming are not uprooted.MK 4:28-32, “And he said, Whereun<strong>to</strong> shall we liken the kingdom ofGod?...It is like a grain of mustard seed. ..But when it is sown it growethup <strong>an</strong>d becometh greater th<strong>an</strong> all herbs, <strong>an</strong>d shooteth out greatbr<strong>an</strong>ches; so that the fowls of the air may lodge under the shadow ofit.” In the programming, a tree is programmed mentally in<strong>to</strong> the victim’sentire body. This tree carries the programs, <strong>an</strong>d the birds nest in it. Thisscripture is used for the imagery of part of that programming.MK 5--This entire chapter deals with the s<strong>to</strong>ry about Legion (which is alarge number of demonic spirits). <strong>The</strong> s<strong>to</strong>ry is also found in MT 8:33.Legion is placed in<strong>to</strong> the person <strong>to</strong> guard the All-Seeing-Eye.LK 1:46-52, When a person is traumatized <strong>an</strong>d the Master is allowed<strong>to</strong> save the victim, he c<strong>an</strong> present himself as Savior <strong>an</strong>d will use thisscripture <strong>to</strong> buttress his authority.LK 11:9-10, “And I say un<strong>to</strong> you, Ask, <strong>an</strong>d it shall be given you; seek,<strong>an</strong>d ye shall find; knock, <strong>an</strong>d it shall be opened un<strong>to</strong> you. For every onethat asketh receiveth; <strong>an</strong>d he that seeketh findeth; <strong>an</strong>d <strong>to</strong> him thatknocketh it shall be opened.” This is used <strong>to</strong> reinforce the knockingtriggers that open up a system. MT 7:8 is almost identical <strong>to</strong> thisscripture.JN 15:4, “As the br<strong>an</strong>ch c<strong>an</strong>not bear fruit of itself, except it abide inthe vine; no more c<strong>an</strong> ye, except ye abide in me.” This is used <strong>to</strong> forcethe slave <strong>to</strong> stay within the programming script, so that the fruit (theprograms) will not be damaged. <strong>The</strong> slave has been given lots of alters<strong>an</strong>d demons whose only assignment is <strong>to</strong> protect that fruit-bearing (theprogram-bearing) capability of the System. This chapter continues, “Ifye abide in me, <strong>an</strong>d my words abide in you, ye shall ask what ye will,<strong>an</strong>d it shall be done un<strong>to</strong> you....If you keep my comm<strong>an</strong>dments, yeshall abide in my love; even as I have kept my Father’scomm<strong>an</strong>dments, <strong>an</strong>d abide in his love.” JN 15:7,10 In other words, theMaster is telling the slave, if you do what I comm<strong>an</strong>d, you remain in mylove, but I will pull my love away if you don’t comply.443


ACTS 17:28, “For in him we live, <strong>an</strong>d move, <strong>an</strong>d have our being; ascertain also of your own poets have said, For we are also his offspring.”<strong>The</strong> slave is bonded <strong>to</strong>tally with their master. His existence is theirexistence.PAUL’S WRITINGS--ROM 1:7, “And he said un<strong>to</strong> them, It is not for you <strong>to</strong> know the timesor the seasons, which the Father hath put in his own power.” <strong>The</strong> slaveis <strong>to</strong> depend upon the Master called God for all this.ROM 1:18, “For the wrath of God is revealed from heaven againstall ungodliness <strong>an</strong>d unrighteousness of men, who hold the truth inunrighteousness.” <strong>Used</strong> by the Programmer/h<strong>an</strong>dler <strong>to</strong> justify theirwrathful abuse.ROM 6:16, “Know ye not, that <strong>to</strong> whom ye yield yourselves serv<strong>an</strong>ts<strong>to</strong> obey, his serv<strong>an</strong>ts ye are <strong>to</strong> whom ye obey; whether of sin un<strong>to</strong>death, or of obedience un<strong>to</strong> righteousness.” This scripture is a goodone <strong>to</strong> use with ROM 13:1 <strong>to</strong> make the slave think that obedience <strong>to</strong>the Master’s authority is righteousness.ROM 7:22, “For I delight in the law of after the inward m<strong>an</strong>.” God isProgrammer, <strong>an</strong>d the slave is <strong>to</strong> delight in programmer’s laws.ROM 9:20-22, “Nay but, 0 m<strong>an</strong>, who art thou that repliest againstGod? Shall the thing formed say <strong>to</strong> him that formed it, Why hast thoumade me thus? “Hath not the potter power over the clay, of the samelump <strong>to</strong> make one vessel un<strong>to</strong> honour, <strong>an</strong>d <strong>an</strong>other un<strong>to</strong> dishonour?“What if God, willing <strong>to</strong> show his wrath, <strong>an</strong>d <strong>to</strong> make his power known,endured with much longsuffering the vessels of wrath fitted <strong>to</strong>destruction.” <strong>The</strong> programmers teach the alters that the Programmersare the Potter <strong>an</strong>d the alters <strong>an</strong>d their minds are the clay. What rightdoes the clay have <strong>to</strong> question the Potter. This is a powerful verse used<strong>to</strong> insure compli<strong>an</strong>ce <strong>an</strong>d accept<strong>an</strong>ce of the programming.ROM 13:1, “Let every soul be subject un<strong>to</strong> the higher powers. Forthere is no power but of God: the powers that be are ordained ofGod.” <strong>The</strong>re is the perfect scripture <strong>to</strong> be misused <strong>to</strong> prove <strong>to</strong> the slavethat their master has <strong>to</strong> be God or at least ordained by God. Who haspower? where does power <strong>an</strong>d authority come from? God. This is afavorite verse within the Catholic realms <strong>to</strong> dem<strong>an</strong>d loyalty <strong>to</strong>authority. To defy their authority is <strong>to</strong> defy God. It is the perfect doublebindfor the slave.444


1 COR 3:16, “Know ye not that ye are the temple of God, <strong>an</strong>d thatthe Spirit of God dwelleth in you? If <strong>an</strong>y m<strong>an</strong> defile the temple of God,him shall God destroy; for the temple of God is holy, which temple yeare.” <strong>The</strong> slave has a temple built in<strong>to</strong> their System <strong>an</strong>d they are <strong>to</strong>ldthat their master is God. If they defile that temple (by <strong>to</strong>uching theprogramming)--their master will destroy them.1 COR 11:27, “Wherefore whosoever shall eat this bread, <strong>an</strong>d drinkthis cup of the Lord, unworthily, shall be guilty of the body <strong>an</strong>d blood ofthe Lord.” Actual blood <strong>an</strong>d <strong>an</strong> actual hum<strong>an</strong> body are consumed.<strong>The</strong> person is <strong>to</strong>ld they must be worthy of this or else they are guilty.2 COR 1:22 “God; who hath also sealed us, <strong>an</strong>d given the earnes<strong>to</strong>f the Spirit in our hearts.” C<strong>an</strong> be applied <strong>to</strong> the Programmer, who isGod.2 PTR 2:22--Slaves are cursed with the verse <strong>an</strong>d as dogs <strong>to</strong>ld <strong>to</strong>return <strong>to</strong> their own vomit. During the <strong>to</strong>rtures of eating foul things, theslave doesn’t w<strong>an</strong>t <strong>to</strong> vomit--because it is a st<strong>an</strong>dard practice <strong>to</strong> makeslaves eat their own vomit.REVELATION (OR APOCALYPSE)--<strong>The</strong> White S<strong>to</strong>nes of REV. 2:17--<strong>The</strong>deeper alters go through a ceremony where the white s<strong>to</strong>ne is taken<strong>an</strong>d a black s<strong>to</strong>ne with their name is given.REV. 6-8. <strong>The</strong> 7 seals are used for Armageddon Suicideprogramming. First, the white, second the fiery red, third the black seal,<strong>an</strong>d the fourth is pale, it is death & hades, fifth, is blood <strong>an</strong>dbeheading, sixth, is earthquakes internally, <strong>an</strong>d the seventh is goldenwhich is silence.RV 21--<strong>The</strong> description of heaven is used <strong>to</strong> build internal structures<strong>an</strong>d the s<strong>to</strong>nes used in heaven are used for access points. “<strong>The</strong> stree<strong>to</strong>f the city was pure gold, like tr<strong>an</strong>sparent glass.” RV 21:21 lends itself <strong>to</strong>Wizard of Oz Yellow Brick Road programming. <strong>The</strong> words “Alpha <strong>an</strong>dOmega” are programming triggers. <strong>The</strong> trumpets <strong>an</strong>d seals ofRevelation <strong>an</strong>d the horses of judgement are all part of the charismaticMonarch <strong>Mind</strong> Control.THE BIBLE IS OPPOSED TO MIND CONTROL& PROVIDES MANKIND WITH ANANCIENT WARNING.<strong>The</strong> prophets of the Bible warned that mind control would dominatethe world in the last days. For inst<strong>an</strong>ce Paul wrote, “Now the Spiritspeaketh expressly that in the latter times some shall depart from the445


faith, giving heed <strong>to</strong> seducing spirits, <strong>an</strong>d doctrines of devils.” 1 TM 4:1,2“...the god of this world hath blinded the minds of them which believenot...” 2 COR 4:4/ Along this line Jesus the greatest prophet said, “Whenthe Son of M<strong>an</strong> comes [referring <strong>to</strong> his own second coming], will he findthe faith on the earth?” Lk 18:8 Paul warns “Let no m<strong>an</strong> deceived youby <strong>an</strong>y me<strong>an</strong>s: for that day shall not come, except there come afalling away first [from the truth].” 2 THES 2:3,4 He tells us that in the lastdays people will not endure sound doctrine which me<strong>an</strong>s soundteachings. <strong>The</strong> prophet John warn that the love of the truth was all thatwould protect people in the end times from the mass deceptionscoming. It is this mass mind control <strong>an</strong>d individual mind control whichallows the sat<strong>an</strong>ic New World Order <strong>to</strong> carry out a world-wide sat<strong>an</strong>icconspiracy right under the noses of the world’s citizenry without themajority of people even being alarmed! “...<strong>The</strong> whole world lies in thecontrol of the evil one.” 1 JN 5:19Part L - THETA PROGRAMMING<strong>The</strong>ta Programming got its name just as the Alpha, Beta, <strong>an</strong>d DeltaProgramming in part from the four types of EEG brain waves. <strong>The</strong>tawaves are frequent in children. <strong>The</strong> 4 types of waves are ratedaccording <strong>to</strong> their wave frequencies which are delta- 1-3 cycles/sec;theta 4 <strong>to</strong> 7 cycles/sec; alpha 8 <strong>to</strong> 13 cycles/sec; <strong>an</strong>d beta 13 + cyclesper second. Psychic warfare became a br<strong>an</strong>ch of the MonarchProgramming. This is the <strong>The</strong>ta Programming. It is the marriage of occultpractices with state of the art science. <strong>The</strong> idea <strong>to</strong> be able <strong>to</strong> copywhat Elisha did <strong>to</strong> the King of Syria (2 KG 6:11-12) when he“telepathically” spied on the enemy, discovered their pl<strong>an</strong>s, <strong>an</strong>dthereby ruined their ch<strong>an</strong>ces of success. Today this has been called“ESPionage”, <strong>an</strong>d the U.S. Army’s term is “psychotronics”. Of course,the CIA’s position is that they couldn’t find <strong>an</strong>ything that worked, butthat is simply not true, because the co-authors know of m<strong>an</strong>y <strong>The</strong>taalters <strong>an</strong>d <strong>The</strong>ta model systems which have <strong>The</strong>ta programming whichis successful. Black magici<strong>an</strong>s have been honing their skills on how <strong>to</strong>deflect magical attacks for centuries. Are their efforts superstition <strong>an</strong>dempty nonsense, or do they really have efficacy? <strong>The</strong> <strong>Illuminati</strong> <strong>an</strong>dHitler believed in black magic. And in recent times, the other groupsinvolved in trauma-based mind-control have also looked in<strong>to</strong> magicbased psychic warfare. For those readers who skipped the split-brainprogramming section, you may w<strong>an</strong>t <strong>to</strong> read that section <strong>to</strong> find outhow the <strong>Illuminati</strong> create alters via split-brain programming who arevery intuitive <strong>an</strong>d capable of interacting in higher demonic spheressuch as the occult pl<strong>an</strong>es of the magical Watch<strong>to</strong>wers. Some of thegroups who did research for the Monarch’s <strong>The</strong>ta Programming are:446


AiResearch (Al c<strong>an</strong> st<strong>an</strong>d for artificial intelligence)M<strong>an</strong>ufacturing Co., Torr<strong>an</strong>ce, CA (such as psychic warfare & ESP)Biological Dept. of Air Force Research, Baltimore, MD (telepathy)Bell Telephone, Bos<strong>to</strong>n, MS (telepathy)Defense Intelligence AgencyDuke University Parapsychology Lab, Durham, N.C.(parapsychology, ESP, telepathy)Garret Air Research Corp., El Segundo, CA. (ESP, ELF)General Electric, Schenectady, NYInstitute of Noetic SciencesMaimonides Dream Lab in Maimonides Medical Ctr.,Brooklyn, NYNASA (telepathy <strong>an</strong>d m<strong>an</strong>y other things)National Institute of Mental Health (funneled money <strong>to</strong>telepathy/clairvoy<strong>an</strong>ce projects for the CIA)Naval Surface Weapons Center <strong>an</strong>d China LakePrince<strong>to</strong>n Univ., (ESP, remote perception, telepathy)St<strong>an</strong>ford Research InstituteVeter<strong>an</strong>s’ Administration HospitalsWhether the public perceives Psychic warfare as viable or not, billionsof dollars have been spent on it, <strong>an</strong>d numerous <strong>The</strong>ta modelsproduced. Twelve psychics in a room <strong>to</strong>gether are said <strong>to</strong> be able <strong>to</strong>guide missiles which are fired. <strong>The</strong>re are a number of excellent booksthat have come out on the subject. <strong>The</strong> New Earth Battalion <strong>an</strong>d theDelta forces of the U.S. Army consist of Monarch slaves trained inPsychic warfare. (<strong>The</strong> reader is invited <strong>to</strong> read for inst<strong>an</strong>ce John White’sbook Psychic Warfare Fact or Fiction? (Wellingborough, UK: <strong>The</strong>447


Aquari<strong>an</strong> Press.) Col. John B. Alex<strong>an</strong>der has been one of the morevisible <strong>an</strong>d prominent military men assigned <strong>to</strong> training <strong>an</strong>d providingthe U.S. Army some elite units of warrior-monks who c<strong>an</strong> fight with bothmartial arts <strong>an</strong>d psychic warfare. Of course, they picked their elitemind-controlled programmed multiples for this. Col. Alex<strong>an</strong>der’sposition has direc<strong>to</strong>r of “the Adv<strong>an</strong>ced System Concepts Office” inAdelphi, MD. He has worked with Col. Michael Aquino with Monarchslaves. Upper level martial arts involves the use of the occult. <strong>The</strong> Ninjiare one of the few groups who openly realize that their martial artpower comes from demonic powers. A half crow/half m<strong>an</strong> spiritempowers them. <strong>The</strong> Samurai would kill the Ninji because they usedwitchcraft in warfare. But the Samurai <strong>an</strong>d m<strong>an</strong>y other martial arts alsouse occult powers, which are actually different forms of witchcraft <strong>an</strong>ddemonology, even though they don’t recognize it as such. NowAmeric<strong>an</strong> Monarch slaves in the U.S. First Earth Battalion are taught <strong>to</strong>throw energy balls, <strong>to</strong> move people during h<strong>an</strong>d <strong>to</strong> h<strong>an</strong>d combat, <strong>an</strong>ddo other things using occult forces. (Yes, these warrior/monk groups areeven getting in<strong>to</strong> blood sacrifices.) In 1987, <strong>The</strong> Seattle Times, r<strong>an</strong> afront page s<strong>to</strong>ry on Lt. Col. Jim Ch<strong>an</strong>non, who worked with the military<strong>The</strong>ta models. <strong>The</strong> s<strong>to</strong>ry is entitled “<strong>The</strong> New Army’s experiment with‘New Age’ thinking”. <strong>The</strong> article says, “So the army tried ‘New Age’thinking - the idea that the world c<strong>an</strong> be ch<strong>an</strong>ged by ch<strong>an</strong>ging theway people think about it, <strong>an</strong>d that the mind has invisible but t<strong>an</strong>giblepowers yet <strong>to</strong> be tapped. Centers were established at Fort Ord, Calif.,<strong>an</strong>d in Washing<strong>to</strong>n, D.C., <strong>to</strong> explore the intriguing idea that mind powerplus firepower could either win wars or make them unnecessary. From1980 <strong>to</strong> 1982 the proposals were exp<strong>an</strong>ded at Fort Lewis by Lt. Col. JimCh<strong>an</strong>non....<strong>The</strong> Army beg<strong>an</strong> by finding young officers enthused with‘new thought’ <strong>an</strong>d combining them with skeptical scientists. <strong>The</strong> twogroups were quickly dubbed ‘the butterflies [<strong>an</strong> appropriate name forMonarch mind-control men] <strong>an</strong>d the bees.’...One result was <strong>an</strong> Armythink t<strong>an</strong>k at the Pentagon that evaluated the par<strong>an</strong>ormal - unusualpsychic or mental phenomena. It brought in proponents of extrasensory perception (ESP), mental spoon-bending, people who‘ch<strong>an</strong>neled’ spirits <strong>an</strong>d even a helmet designed <strong>to</strong> unite the left(logical) <strong>an</strong>d right (intuitive) halves of the brain.” Col. John B.Alex<strong>an</strong>der, US Army <strong>an</strong>d part of the Monarch Programming, wrote forPsychic Warfare, “Psychotronics may be described as the interaction ofthe mind <strong>an</strong>d matter. While the concepts may stretch the imaginationof m<strong>an</strong>y readers, research in this area has been underway for years,<strong>an</strong>d the possibility for employment as weaponry has been explored. Tobe more specific, there are weapons systems that operate on thepower of the mind <strong>an</strong>d whose lethal capacity has already beendemonstrated.” Some of those systems are Monarch systems of the<strong>The</strong>ta Model, <strong>an</strong>d m<strong>an</strong>y of those in the military are young men of the<strong>Illuminati</strong>. Some have been seen at NORAD, in Colorado, which helpsconfirm that <strong>The</strong>ta models are being employed <strong>to</strong> bring in the Anti-448


Christ. (NORAD is a main center for Alex <strong>an</strong>d J<strong>an</strong>us end-timedprogramming.)Col. Alex<strong>an</strong>der claims that the ability <strong>to</strong> tr<strong>an</strong>sfer energy from oneperson <strong>to</strong> <strong>an</strong>other has been proven, that em<strong>an</strong>ations of body energyhave been proven <strong>an</strong>d picked up by Kirli<strong>an</strong> pho<strong>to</strong>graphy, <strong>an</strong>d finallythat hypnotic states have been induced telepathically. <strong>The</strong> Pentagon<strong>an</strong>d the CIA spent m<strong>an</strong>y millions of dollars on ESP, at least $6 million peryear. According <strong>to</strong> the information that has leaked, there are psychichum<strong>an</strong>s, but the ability is not a consistent ability available for all. In theearly 1980s it came out that the Navy had 34 psychics, who they paid$400 a month, <strong>to</strong> track Soviet subs. <strong>The</strong> CIA claimed during the coldwar that 200 Russi<strong>an</strong> experts were working on telepathy. M<strong>an</strong>y of the<strong>Illuminati</strong>’s Monarch slaves will speak about learning on the astralpl<strong>an</strong>e. One reason it is difficult <strong>to</strong> deprogram a slave, is because thedeeper parts know how <strong>to</strong> astral project, <strong>an</strong>d c<strong>an</strong> carry out thedemonology which helps their master <strong>to</strong> astral project <strong>to</strong> them so thatthe System c<strong>an</strong> be reprogrammed. Whether the therapist believes indemonology or not, if the therapist deprograms a client <strong>an</strong>d then findsout that the deeper parts have undone the work via the astral pl<strong>an</strong>e,the therapist should look in<strong>to</strong> how <strong>to</strong> m<strong>an</strong>age this problem. This type ofreprogramming rarely needs <strong>to</strong> occur because few slaves are evereven partially deprogrammed. One of the most skilled programmers ofAstral Projection is the Programmer B. Bowers. He is known nationally forthis skill. He worked with the famous M<strong>an</strong>ly P. Hall, who also had areputation in the <strong>Illuminati</strong> for Astral Projection. Astral projection isaccomplished by a focused tr<strong>an</strong>ce where the spirit by demonic powerleaves the body <strong>an</strong>d travels <strong>to</strong> a particular point. Gr<strong>an</strong>d Masters withinthe <strong>Illuminati</strong> c<strong>an</strong> give lessons <strong>to</strong> students on the astral pl<strong>an</strong>e. Much oftheir <strong>Illuminati</strong> occult learning, according <strong>to</strong> some <strong>Illuminati</strong> slaves wasdone on the astral pl<strong>an</strong>e. We will discuss several methods on how this isdone. <strong>The</strong> traditional druidic method (the three stepping s<strong>to</strong>nemethod) <strong>to</strong> teach astral projection called “spirit flight” is <strong>to</strong> get 3s<strong>to</strong>nes, a silver one, a gold one <strong>an</strong>d a black one. Three small s<strong>to</strong>neswhich are painted would work. <strong>The</strong> silver represented the female, <strong>an</strong>dthe properties of silver. <strong>The</strong> gold represented male <strong>an</strong>d the propertiesof gold. And the black s<strong>to</strong>ne represented midnight <strong>an</strong>d the unknown<strong>an</strong>d the properties of coal. <strong>The</strong> silver s<strong>to</strong>ne will be placed at a carefullyselected location at some dist<strong>an</strong>ce from the student’s house, <strong>an</strong>d thenfarther out the gold s<strong>to</strong>ne will be placed, <strong>an</strong>d still further out the blacks<strong>to</strong>ne. During sleep the Druidic student will practice seeking out the“three stepping s<strong>to</strong>nes” in order.Telepathy has been developed by the <strong>Illuminati</strong>, but is a closelyguarded secret, which their <strong>Illuminati</strong> slave alters are trained in.Telepathy is used by Delta teams <strong>to</strong> coordinate their activity <strong>an</strong>d <strong>to</strong>sense if one of them is in d<strong>an</strong>ger. Duke University (which ties back <strong>to</strong>449


the Duke/Reynolds <strong>Illuminati</strong> bloodlines) has done massive amounts ofresearch in<strong>to</strong> psychic abilities. Only certain people have the ability <strong>to</strong>be a psychic. A certain type of brain structure is required <strong>an</strong>d the CIAhas identified <strong>an</strong>d mapped everyone with this natural ability in the U.S.However, the Programmers are not above “cheating” in creatingpsychic phenomena within the slave’s mind <strong>to</strong>o. Since slaves c<strong>an</strong> notbe consistently given <strong>The</strong>ta programming, a surgical impl<strong>an</strong>tation of asodium/lithium powered high frequency receiver/tr<strong>an</strong>sducers coupledwith a multi-r<strong>an</strong>ge discharge capaci<strong>to</strong>r was placed in<strong>to</strong> the brains ofMonarch slaves. This gives the h<strong>an</strong>dlers the ability <strong>to</strong> signal by remotesignals <strong>to</strong> the victim’s brain. When the receiver picks up the signals theyelectronically stimulate certain areas of the brain which in turn triggerspre-set programming. Impl<strong>an</strong>ts are now being placed in a highpercentage of the Monarch slaves.HOW OUT OF BODY EXPERIENCES (ASTRAL PROJECTION) ARE DONEAnother method of creating psychic phenomena with the aid ofelectronics is astral projection using sound waves. This method seems <strong>to</strong>work fairly consistently, although it is possible it wouldn’t work for somepeople. It was discovered that astral projection occurs at a point thatthe body is asleep <strong>an</strong>d the mind is awake. Focus 10 is the state of mindwhere the body is asleep <strong>an</strong>d the mind is awake, <strong>an</strong>d with the properstimuli the mind c<strong>an</strong> w<strong>an</strong>der off in<strong>to</strong> the astral pl<strong>an</strong>e. A few oddpeople get in<strong>to</strong> the Focus 10 state by themselves, but it is rare. <strong>The</strong>brain works off of waves that are less th<strong>an</strong> 16 hz. <strong>an</strong>d the hum<strong>an</strong> earc<strong>an</strong>’t hear <strong>an</strong>ything below 30 hz. so at first it appears sound wavesc<strong>an</strong>’t influence the brain. However, if one ear hears 100 hz. <strong>an</strong>d theother ear hears 104 hz. the brain will hear a ghost beat of 4 hz. 4 hzhappens <strong>to</strong> be a theta/delta frequency on the border of sleep <strong>an</strong>dwaking that c<strong>an</strong> possibly launch <strong>an</strong> astral trip. Focus 10 is just thestarting point for astral travel. Focus 12, 15, 21 <strong>an</strong>d beyond are the realtrip. When a person astral projects it is said <strong>to</strong> ch<strong>an</strong>ge the BEG pattern<strong>to</strong> a special pattern called Alphoid. To stimulate someone <strong>to</strong> astralproject they are induced in<strong>to</strong> sleep, <strong>an</strong>d then just as they loseconsciousness, the mind is jolted awake with some high-frequencybeta signals. <strong>The</strong> body remains asleep, <strong>an</strong>d the mind is then free fromthe body <strong>to</strong> w<strong>an</strong>der. A hemispheric synchronizer (which was patentedin 1975) is used <strong>to</strong> get both hemispheres working <strong>to</strong>gether. Those whow<strong>an</strong>t <strong>to</strong> read more on this subject might start with Journeys Out of theBody by Robert A. Monroe, <strong>an</strong>d Far Journeys, <strong>an</strong>d D. Scott Rogo’sLeaving the Body: A Complete Guide <strong>to</strong> Astral Projection, <strong>an</strong>d ATraveller’s Guide <strong>to</strong> the Astral Pl<strong>an</strong>e by Steve Richards.450


OTHER THETA CONTROLSELF (Extremely Low Frequency Waves) are being used <strong>to</strong> modify peoplethoughts, impl<strong>an</strong>t thoughts, <strong>an</strong>d modify their emotions, such as make aperson <strong>an</strong>gry. ELF weapons are being used on civili<strong>an</strong> targets in the U.S.High pitched sounds, <strong>an</strong>d helicopter flying with P7 mind controlequipment are also augmenting the abilities of the<strong>Illuminati</strong>/Intelligence Agencies/NWO Network.TELEPATHYEssentially all <strong>Illuminati</strong> slaves have dark side alters who are taught <strong>to</strong>be telepathic. <strong>The</strong>re will be differing opinions as <strong>to</strong> whether this is real orimagined. IF it is real, <strong>an</strong>d we will work off of that assumption, then howdo the <strong>Illuminati</strong> do it? Again there are varying opinions about how itmech<strong>an</strong>ically works--it appears that it may involve all or part of thefollowing components:a. <strong>The</strong> hum<strong>an</strong> nervous system is able <strong>to</strong> ch<strong>an</strong>ge the gravitationalconst<strong>an</strong>t in a field surrounding a person. If the sender had a low field<strong>an</strong>d the receiving party had a higher th<strong>an</strong> normal field, thoughts c<strong>an</strong>flow from the sender <strong>to</strong> the receiving party.b. Somehow altered states of consciousness influence telepathy.Experiments with two people who simult<strong>an</strong>eously hypnotize each other,have found that they enter a shared world in which they do not have<strong>to</strong> verbally speak <strong>to</strong> communicate.c. Demonic spirits provide insights <strong>to</strong> those who are involved in theoccult world, as a method <strong>to</strong> further entrap the occultist. In otherwords, the person is cooperating with some other intelligence.Although the various occult groups have different ways of explainingtelepathy, with Alice Bailey & Lucis Trust (<strong>an</strong>d spin off groups like the IAM movement) it is explained that you are <strong>an</strong> ascended master. Insome groups, telepathy is described as putting on energy <strong>an</strong>d thencontrolling that energy. It is seldom in the occult world that telepathy islinked with demonology. However, those in the occult world who areskilled in demonology are fully aware that the “energy” that onecontrols <strong>to</strong> carry out telepathy are demons. In the occult, thetelepathic person must control his demon <strong>an</strong>d then send it <strong>to</strong> <strong>an</strong>otherperson. <strong>The</strong> first person’s demon must then control a kindred spirit inthat person. High r<strong>an</strong>king demonology, such as in the high r<strong>an</strong>ks of the<strong>Illuminati</strong>, would view telepathy as the ability <strong>to</strong> control demons.451


d. An excess of negative ions in the atmosphere has signific<strong>an</strong>tlyincreased telepathic scores in experiments. When telepathy occurs,researchers have noted that the parasympathetic nervous system isactivated, & this occurs along with <strong>an</strong> increased amount ofacetyicholine in the brain. According <strong>to</strong> the high levels in the occult,there are 7 points in the Auric Body. <strong>The</strong>se points are not on thephysical body, but are on what is called the etheric body (or thebody’s astral energy) whose location is approximately in the samelocality as the physical body, except that it extends for a few inchesbeyond. <strong>The</strong> 7 points--(all import<strong>an</strong>t demonic portal points) are the <strong>to</strong>pof the head, the third eye, the throat, the chest-heart area, the solarplexus, the lower abdomen, <strong>an</strong>d the genital area. (<strong>The</strong> back of thehead <strong>an</strong>d the spleen make up 2 other points that are not consideredas active. <strong>The</strong>re are 21 minor centers, <strong>an</strong>d 49 focal points found on thehum<strong>an</strong> body.) Streams of energy called nadis carry the astral energy <strong>to</strong>where the sender’s mind focuses <strong>to</strong> have the energy taken. <strong>The</strong>recipient feels this energy in the solar plexus. Another area that is said<strong>to</strong> be active during telepathy is the throat. <strong>The</strong> throat area on theetheric body is said <strong>to</strong> be able <strong>to</strong> tr<strong>an</strong>smit mental thoughts if the sender<strong>an</strong>d receiver are in harmony <strong>an</strong>d rapport, <strong>an</strong>d are dissociated.Intuitional telepathy is said <strong>to</strong> be a function of the third eye <strong>an</strong>d thethroat areas working <strong>to</strong>gether <strong>to</strong> send thoughts. In review, there areseveral different types of telepathy, all of which use different points ofthe etheric body. Whether therapists believe in telepathy or not, if theywork with <strong>Illuminati</strong> slaves who feel comfortable <strong>to</strong> express themselves,then the therapists will find out that the deeper parts have beentrained in mind reading <strong>an</strong>d telepathy. An <strong>Illuminati</strong> Monarch mindcontrolslave will be twinned with <strong>an</strong>other Monarch. If these twopersons are in the same room <strong>an</strong>d send forth a gl<strong>an</strong>ce of love <strong>to</strong>wardeach other, they will establish a connecting energy link that allowsthem <strong>to</strong> telepathically communicate. When two Multiple personalitySystems meet, there will be communication going on dozens of levelsas all types of alters seek out their counterparts <strong>an</strong>d begin <strong>to</strong>communicate. A drug containing alkaloids derived from theAyahuasca vine in Brazil is said <strong>to</strong> place a person in<strong>to</strong> the telepathicstate. C<strong>an</strong>ada outlawed it in 1947 after a comp<strong>an</strong>y sold it publicly in1946. <strong>The</strong> U.S. may also have outlawed the drug. Sodium amytaldestroys psychic abilities, <strong>an</strong>d caffeine enh<strong>an</strong>ces them. Also a positiveintent by the receiver <strong>an</strong>d the correct emotions of both parties helps.KILLING FROM A DISTANCEVarious methods have been attempted by the military <strong>to</strong> give theirwarrior monks the ability <strong>to</strong> kill by psychic powers. One reported projectin the late 1970s, which appears <strong>to</strong> have tried <strong>to</strong> link technology with452


some previous occult ideas, was called Dreamsc<strong>an</strong>. When a personwas in his dream state, waves matching brain waves are <strong>to</strong> begenerated by some type of hardware, in order <strong>to</strong> cause the death ofthe sleeper. Some intelligence assets in AT&T were said <strong>to</strong> be involvedin this.IN QUICK REVIEW<strong>The</strong> military <strong>an</strong>d the <strong>Illuminati</strong> are using telepathy, psychic warfare,astral projection <strong>an</strong>d other occult sciences with their programmedslaves. <strong>The</strong> ability <strong>to</strong> carry out some of these occult sciences (psychicabilities) c<strong>an</strong> be greatly enh<strong>an</strong>ced by certain drugs, brain wavepatterns, training, <strong>an</strong>d demonology. Non-illuminati models may nothave these abilities built in, but the deeper alters of <strong>Illuminati</strong> slavesgenerally have some alters who are trained in all these abilities.THE PHILOSOPHER’S STONEOne of the major goals of Alchemy was “<strong>The</strong> preparation of aurumpotabile, liquid gold, a sovereign remedy, because gold being itselfperfect could produce peffection in the hum<strong>an</strong> frame.” -quoted from<strong>The</strong> His<strong>to</strong>ry of Chemistry as quoted by M<strong>an</strong>ly P. Hall in his <strong>The</strong> SecretTeachings of All Ages, p. CLV. Gold has long been called the metal ofwisdom by the <strong>Illuminati</strong>. <strong>The</strong> <strong>Illuminati</strong> are well aware of thealchemical quest <strong>to</strong> create the correct type of gold which will bringenlightment <strong>to</strong> the world. <strong>The</strong> Rabbi’s, who know the Cabala, haveconsidered the secret of white powdered gold the greatest secret ofall times. Somehow the Egypti<strong>an</strong> Pharaoh’s had learned the secret ofhow <strong>to</strong> make white powdered gold which when seen up close istr<strong>an</strong>sparent--like the gold described in the Bible as making up thestreets in heaven. This gold is mono<strong>to</strong>nic (with molecules in a high spinstate), <strong>an</strong>d looks like baking flour. It greatly enh<strong>an</strong>ces the pineal gl<strong>an</strong>d,<strong>an</strong>d a similar subst<strong>an</strong>ce of iridium greatly enh<strong>an</strong>ces the pituitary gl<strong>an</strong>d.Regular yellow gold or gold salts will cause the hair of the subject <strong>to</strong> fallout, but white gold is safe <strong>to</strong> ingest. After ingesting the white gold forover 9 months, a subject will become extremely psychic <strong>an</strong>d diseasefree. <strong>The</strong> person’s body will also glow. Whether the <strong>Illuminati</strong> discoveredthis white gold, <strong>an</strong>d have been using it secretly when their adepts wentin<strong>to</strong> hiding for months of long training, or whether they were onlyplaying with substitutes we c<strong>an</strong>not say. (By the way, some occultgroups groom slaves in the craft for 24 hours a day for a year.) At <strong>an</strong>yrate, in recent years a m<strong>an</strong> named David Hudson, who is of the HolyBlood line (13th <strong>Illuminati</strong> Bloodline, of the de Guise lineage),453


discovered <strong>an</strong>d patented white gold. He named the white goldOrmus, which is the occult name for the Prieure de Sion. Ormus alsopertains <strong>to</strong> gnosticism in the <strong>an</strong>cient world. Ormus is also the Hebrewwords for “golden tree”, which David finds appropriate since this whitegold is the elixir of life that the sho-bread (& m<strong>an</strong>na) was made from.This is said <strong>to</strong> be the reason the Priest glowed when he came out of theHoly of Holies, after eating the sho-bread. David Hudson, <strong>to</strong>ld coauthorFritz that he was supportive of the cabalistic goal of AdamKadmon. Because Hudson knew the cabala very well, it seems likelythat he underst<strong>an</strong>ds what Adam Kadmon is really all about. Monarchslaves of the House of Rothschild have revealed how the <strong>Illuminati</strong> areable <strong>to</strong> do what they call Proxying. This is a <strong>Mind</strong>-Spirit tr<strong>an</strong>sfer, done bythe twinning traumas, ch<strong>an</strong>neling, telepathic communication, <strong>an</strong>dastral projection so that all slaves worldwide are being pulled in<strong>to</strong> onesingle interlinked Demonic One World <strong>Mind</strong>. We do not underst<strong>an</strong>dhow white gold <strong>an</strong>d iridium help the body become a semi-conduc<strong>to</strong>rso that the body is highly psychic, but it does. We hope <strong>to</strong> find outmore. David Hudson has the patent (U.S. patent <strong>an</strong>d someinternational patents) on white gold. <strong>The</strong>re are a number of scientificstudies on white gold which verify the power of white gold on thehum<strong>an</strong> body. When the co-author Fritz talked <strong>to</strong> David Hudson, hecertainly knows the occult world exceptionally well, besides beingskilled in the Cabala. He claims he has nothing <strong>to</strong> do with the occultworld, <strong>an</strong>d that he stays away from the <strong>Illuminati</strong>. He says that he <strong>to</strong>okwhat was occult <strong>an</strong>d turned it in<strong>to</strong> science. <strong>The</strong> co-author’s talk withhim left m<strong>an</strong>y questions. David Hudson has given m<strong>an</strong>kind the mostimport<strong>an</strong>t secret that has captivated the best minds of the occultworld for centuries, the Quest for the Philosopher’s S<strong>to</strong>ne.FURTHER SPIRITUAL BONDAGE SNARES<strong>The</strong>re are a number of activities which are snares <strong>to</strong> entrap people,both Monarch slaves <strong>an</strong>d people in particular, which are notcommonly recognized as such. One has <strong>to</strong> view them in their overallcontext <strong>an</strong>d the consequences of what these activities lead <strong>to</strong>.According <strong>to</strong> Biblical teachings, Sat<strong>an</strong> is trying <strong>to</strong> develop m<strong>an</strong>’shidden abilities as well as provide him some extraordinary supernaturalpower <strong>to</strong> encourage m<strong>an</strong>’s indepedence from God, as opposed <strong>to</strong>m<strong>an</strong>’s faith in, fellowship with <strong>an</strong>d dependence upon his Crea<strong>to</strong>r. Asm<strong>an</strong> developes these hidden powers that were part of Adam’s naturalmental, psychic, <strong>an</strong>d physical abilities, m<strong>an</strong>kind increasingly feels moregodlike. M<strong>an</strong>’s independence from his Crea<strong>to</strong>r Yahweh God, makeshim more vulnerable <strong>an</strong>d more dependent upon Sat<strong>an</strong>. (Cf. verses inScripture about the fall, 1 Cor. 15:4,5,46, how m<strong>an</strong> is a combination ofspirit, body, soul in 1 <strong>The</strong>s. 5:23, <strong>an</strong>d how Sat<strong>an</strong>’s system will do trade inthe souls & the power of the souls of men, REV 18:11-13.) Due <strong>to</strong> thecorruption ofm<strong>an</strong>, God doesn’t w<strong>an</strong>t <strong>to</strong> develop these abilities. For454


inst<strong>an</strong>ce, a<strong>to</strong>mic power may make m<strong>an</strong> powerful, but m<strong>an</strong> has notdeveloped spiritually enough for these abilities <strong>to</strong> be used in a godlyfashion. M<strong>an</strong>kind, according <strong>to</strong> the Bible, is not ready for these abilities,until m<strong>an</strong>kind is on a higher spiritual walk with God. Today, m<strong>an</strong>kindlacks the authority from God <strong>to</strong> use occult powers. M<strong>an</strong>kind’s flirtationwith occult powers, is similar <strong>to</strong> the teenage boy who is disobedient <strong>to</strong>his father’s guidelines <strong>an</strong>d uses his new sexual powers before he haslearned responsibility <strong>an</strong>d how <strong>to</strong> use his new power responsibly. Weare not <strong>to</strong> be ignor<strong>an</strong>t of Sat<strong>an</strong>’s devices. Underst<strong>an</strong>ding about thesepowers, just as the teenage boy underst<strong>an</strong>ding about sexuality in aconstructive way, is not the same as the irresponsible use of thesepowers. One of the most d<strong>an</strong>gerous, ensnaring spirits, is the Spirit ofGambling. <strong>The</strong> <strong>Illuminati</strong> know that if they c<strong>an</strong> get a m<strong>an</strong> hooked ongambling, that gambling will bring in every evil spirit with it. When am<strong>an</strong> is hooked on gambling he will do <strong>an</strong>ything. Gambling introducescovetiousness, greed <strong>an</strong>d lust. A m<strong>an</strong> with big gambling debts willmurder, sell his children, lie, deceive, steal, etc. This is not simply the twoauthors’ opinions, but the experience of the <strong>Illuminati</strong> in working withhum<strong>an</strong> nature. When the <strong>Illuminati</strong> w<strong>an</strong>t <strong>to</strong> destroy a lineage, they willpurposefully try <strong>to</strong> get a m<strong>an</strong> or wom<strong>an</strong> in that lineage hooked ongambling. That will begin a cycle of evil spirits being passed down forgenerations. In order, <strong>to</strong> introduce the gambling spirit in<strong>to</strong> society on amass scale, they are working off of several traumas. <strong>The</strong> rejection,abuse, lack of power <strong>an</strong>d lack of respect that the Americ<strong>an</strong> Indi<strong>an</strong>sreceived from the White m<strong>an</strong>, has opened the Americ<strong>an</strong> Indi<strong>an</strong>s up <strong>to</strong>accepting the lie that opening gambling institutions on their reservationl<strong>an</strong>ds is a good thing. <strong>The</strong> Americ<strong>an</strong> Indi<strong>an</strong> is gaining back some power<strong>an</strong>d money, but their gambling operations will actually lead them in<strong>to</strong>further bondage. <strong>The</strong> state governments are finding it hard <strong>to</strong> fin<strong>an</strong>ceprojects, <strong>an</strong>d their m<strong>an</strong>ufactured hardship is also opening the door <strong>to</strong>state run gambling. Again we see the trauma, <strong>an</strong>d the subsequentprogramming lie being done on a mass scale. Once the gambling spiritis entrenched, it will continue <strong>to</strong> strengthen its control over people <strong>an</strong>dsociety. <strong>The</strong>se things are well-conceived spiritual operations that areblindsiding Americ<strong>an</strong>s because “evil” spirits are no longer politicallycorrect <strong>to</strong> talk about. <strong>Illuminati</strong> Monarch slaves, such as a Mother ofDarkness or Gr<strong>an</strong>de Master, are given occult powers. <strong>The</strong>y are alsofrequently connected <strong>to</strong> gambling--they will have alters who like <strong>to</strong>gamble. Rather th<strong>an</strong> being activities of power <strong>an</strong>d opportunity, occultpower & gambling are really activities that ensnare people. <strong>The</strong> symbolthat the Programmers use <strong>to</strong> symbolize the bondage loops that theyconstruct is the infinity sign, the same sign that we saw on the front ofBilly Graham’s Decision magazine.455


CHAPTER 11SCIENCE No. 11 - INTERNAL CONTROLSA - TEACHING OCCULT PHILOSOPHIESLearning plays <strong>an</strong> import<strong>an</strong>t part in perception. <strong>The</strong> Programmers try <strong>to</strong>get their victims <strong>to</strong> subscribe <strong>to</strong> philosophies <strong>an</strong>d ideas that will make ithard for them <strong>to</strong> rebel against their controllers. This is what is termedindoctrination. <strong>The</strong> same methods of teaching that others find usefulare employed. Ways of thinking are incorporated by the slave viah<strong>an</strong>dlers, programmers, <strong>an</strong>d the cult they belong <strong>to</strong>. Everyone tries intheir own way <strong>to</strong> make sense of life. This is a natural brain function, sothat the hum<strong>an</strong> mind c<strong>an</strong> underst<strong>an</strong>d how <strong>to</strong> deal with the future. <strong>The</strong>mind takes raw data, <strong>an</strong>d then applies some type of logic, <strong>an</strong>d comes<strong>to</strong> conclusions. Once accepted these conclusions c<strong>an</strong> be as hard asnails, <strong>an</strong>d they will defy <strong>an</strong>y attempt <strong>to</strong> ch<strong>an</strong>ge them, even in the ligh<strong>to</strong>f new evidence. If the Programmer is smart enough, he c<strong>an</strong> get <strong>an</strong>alter <strong>to</strong> logically believe <strong>an</strong>ything. Once the belief is embedded, it willremain there tenaciously. In the <strong>Illuminati</strong>, ‘great” masters <strong>an</strong>d adeptsteach “hidden mysteries”. <strong>The</strong> slave feels the authority that em<strong>an</strong>atesfrom this teacher with special gifts <strong>an</strong>d abilities. <strong>The</strong> slave is hardly in aposition <strong>to</strong> question the teachings being given from on high. Circularreasoning, lies, <strong>an</strong>d other tricks are used <strong>to</strong> convince the person thatthe occult world is true. For inst<strong>an</strong>ce, “God ab<strong>an</strong>doned you, thereforeyou need <strong>to</strong> cling <strong>to</strong> us, the only ones who would see <strong>an</strong>y use in you.”(<strong>The</strong> truth is that the cult staged a crisis where their ac<strong>to</strong>r playing Godab<strong>an</strong>doned the child <strong>to</strong> the cult’s abusiveness. <strong>The</strong> whole event wassimply cult abuse--with God taking the blame.) “We are trying <strong>to</strong>fashion a better m<strong>an</strong>, a m<strong>an</strong> with far more capabilities th<strong>an</strong> before,with better genetics. Those who oppose us, are trying <strong>to</strong> keephum<strong>an</strong>kind back in the dark ages.” This is circular reasoning <strong>an</strong>doutright lies. (<strong>The</strong>y are not interested in helping m<strong>an</strong>kind, onlydestroying it.) To make occult philosophies more palatable, the occultworld attacks the character of <strong>an</strong>yone whose life would dispute theirfalse claims. <strong>The</strong>y also use a great deal of rationalization, where theend justifies the me<strong>an</strong>s. M<strong>an</strong>y slaves have had <strong>to</strong> sit <strong>an</strong>d listen <strong>to</strong> theirmasters rationalize their brutality. Within the <strong>Illuminati</strong>, r<strong>an</strong>ks areachieved with much learning <strong>an</strong>d ritual. Within the Temple of Set, amember is required <strong>to</strong> read certain books. Fritz, the co-author has a lis<strong>to</strong>f books a Temple of Set member is asked <strong>to</strong> read, with the commentsattached by the Temple of Set <strong>to</strong> each suggested title. In theirsuggested/required reading Category 19 entitled “<strong>The</strong> Metamind” is456


Metropolis by <strong>The</strong>a von Harbou. <strong>The</strong>ir comments are “An Expressionisticportrait of a negative u<strong>to</strong>pia in which hum<strong>an</strong>s are controlled bymachines.. .the basis for m<strong>an</strong>y electronic/audio-visual ritual techniquesemployed by the Church of Sat<strong>an</strong> <strong>an</strong>d further developed by theTemple of Set.” (p. C21-2) Another is Physical Control of the <strong>Mind</strong>:Towards a Psychocivilized Society by Jose M.R. Delgado. <strong>The</strong>ircomments, “Delgado, Professor of Physiology at Yale University, is oneof the most distinguished authorities in the field of Electrical/chemicalStimulation of the Brain (ESB). This book is necessarily dated, but it is sowell-written that it deserves <strong>to</strong> be perused as a preface <strong>to</strong> more recentworks on the subject.” (p.C-16?-2) <strong>The</strong> Psychology of AnomalousExperience by Graham Reed. <strong>The</strong>ir comments, “This book addressesunusual, irregular, <strong>an</strong>d puzzling experiences- deja’vu, illusions, delusions,hallucinations, etc.-in terms of the mind’s normal psychologicalprocesses of gathering, moni<strong>to</strong>ring, processing, <strong>an</strong>d s<strong>to</strong>ringinformation.” (ibid.)This is just a brief look <strong>to</strong> illustrate <strong>to</strong> the reader that leaders of groupslike the Temple of Set are avid students of mind-control. (An almostcomplete membership list of this group at one point in time, is providedin Appendix A.) <strong>The</strong> librari<strong>an</strong> of the Multnomah County Detention Ctr.shared with co-author Fritz that Sheila, formerly second-in-comm<strong>an</strong>d ofthe Bhagw<strong>an</strong> Shree Rajneesh’s commune at Antelope, OR studied, viajail/prison interlibrary lo<strong>an</strong>, books on Hitler’s mind-control techniques.M<strong>an</strong>y other examples could be given of how mind-control is beingstudied <strong>an</strong>d taught by these groups.One more book on the Temple of Set’s reading list would be worthy <strong>to</strong>point out, <strong>The</strong> Psychology of M<strong>an</strong>’s Possible Evolution by Peter D.Ouspensky. <strong>The</strong>ir comments, “Should be read especially by thosemembers whose magical ability is hampered by flaws in their bal<strong>an</strong>cefac<strong>to</strong>r....A series of lectures which explain the Gurdjieff approach <strong>to</strong> theconcept better th<strong>an</strong> G. himself was able <strong>to</strong> do.” <strong>The</strong>re is <strong>an</strong> import<strong>an</strong>tlink between Gurdjieff, mind-control, MPD, etc. but the subject is big<strong>an</strong>d needs <strong>to</strong> be further investigated. Co-author Fritz has beeninvestigating this link, including talking with leaders of the mostsuccessful Gurdjieff commune. As with so m<strong>an</strong>y groups, what you see,is not what you get.TEACHING THE IDEOLOGIES OF WAROne of the ways <strong>to</strong> control a person is <strong>to</strong> get them <strong>an</strong>gry <strong>an</strong>d thench<strong>an</strong>nel that hate. Wars have been used for centuries by theoligarchies that run things <strong>to</strong> control their people. Right now, the NewWorld Order is carrying out a Drug War, <strong>an</strong> Environmental War, <strong>an</strong>d aBosni<strong>an</strong> conflict for the express purpose in their own pl<strong>an</strong>s <strong>to</strong> control us.457


<strong>The</strong>y have a mock-alien invasion pl<strong>an</strong>ned <strong>to</strong> further justify more controlover our lives. Over the years m<strong>an</strong>kind has created <strong>an</strong> entire industryaround warfare. <strong>The</strong>re are long traditions within military units, that forsome reason must be “upheld” by the men who serve inthose units. When people buy in<strong>to</strong> the philosophies of war, they c<strong>an</strong>generally be persuaded <strong>to</strong> give up or do <strong>an</strong>ything <strong>to</strong> contribute <strong>to</strong> thatwar. After all, <strong>an</strong>y sacrifice will be minor compare <strong>to</strong> the large numbersof bodies that will end up dead. One of the large purposes of theMonarch type of trauma-based mind-control is <strong>to</strong> produce roboticsoldiers who will do <strong>an</strong>ything. Normal military training is usually sufficientfor most military needs, so it is clear that Monarch slaves have someulterior uses that the military doesn’t w<strong>an</strong>t the public <strong>to</strong> know about.VARIOUS DELTA FORCES<strong>The</strong> military as well as other groups have created numerous deltateams, delta forces, delta groups etc.DELTA ASSASSINATION TEAMS<strong>The</strong>se teams are projects that the Sat<strong>an</strong>ic Hierarchy <strong>an</strong>d the CIAcollaborated <strong>to</strong>gether on. <strong>The</strong> programming that was placed in<strong>to</strong>people was ingenious <strong>an</strong>d very complex. As the program progressedover the years, the programming became more sophisticated <strong>an</strong>dpast mistakes were improved upon. <strong>The</strong> Delta Teams wereprogrammed <strong>to</strong> carry out various assignments such as politicalassassinations. <strong>The</strong> members of these teams are housewives <strong>an</strong>d otherordinary people who were programmed years ago. <strong>The</strong> Delta Teamsare part of the CIA’s psychic warfare bag of tricks. <strong>The</strong> CIA works soclosely with the military that the Delta Force is easily expected <strong>to</strong> betied in with the CIA & U.S. intelligence.DELTA FORCE<strong>The</strong> system tapped Fr<strong>an</strong>k Burns <strong>to</strong> create the Delta Force. Fr<strong>an</strong>k Burnswas a Green Beret. What kind of things did Fr<strong>an</strong>k get involved withAFTER joining the military? Hold on. Fr<strong>an</strong>k Burns was <strong>an</strong> SDS (Students fora Democratic Society--<strong>an</strong> <strong>Illuminati</strong> org<strong>an</strong>ization) org<strong>an</strong>izer. He wasalso deep in<strong>to</strong> Zen Buddhism, which is the same as mysticism. Fr<strong>an</strong>kBurns as <strong>an</strong> officer also studied under the Esalen Institute. <strong>The</strong> EsalenInstitute is at Big Sur, California <strong>an</strong>d is the Americ<strong>an</strong> equivalent of theinfamous Tavis<strong>to</strong>ck Institute. <strong>The</strong> Esalen Institute created “sensitivitytraining” programs for the business world under the title “Org<strong>an</strong>izationalDevelopment (OD). Esalen people were brought in <strong>to</strong> Fort Ord whereFr<strong>an</strong>k Burns was the comm<strong>an</strong>der <strong>an</strong>d beg<strong>an</strong> training people. <strong>The</strong> armypromoted Burns <strong>to</strong> work in the Chief of Staffs office as <strong>an</strong> “seniororg<strong>an</strong>izational effectiveness consult<strong>an</strong>t”, which allowed Burns <strong>to</strong>introduce Esalen programs all through the army. This could not haveaccidently happened. Fr<strong>an</strong>k Burns in a conversation with a two-starGeneral about the need for “wholistic” soldiers coined the slog<strong>an</strong> “Beall that you c<strong>an</strong> be in the army.” Burns phraseology beg<strong>an</strong> the army’srecruiting slog<strong>an</strong>. It refers <strong>to</strong> the Hum<strong>an</strong> Potential Movement that thearmy has incorporated from the New Age movement. <strong>The</strong> army is458


moving <strong>to</strong>ward becoming <strong>an</strong> occult fighting force that practiceswitchcraft with its warfare. Some of the units moving that direction arePsy-Op operations, which has included Sat<strong>an</strong>ists within its officers. <strong>The</strong>Delta Force network of various Generals <strong>an</strong>d other high r<strong>an</strong>king officersis merely one facet of the drive by the <strong>Illuminati</strong> <strong>to</strong> tr<strong>an</strong>sform theAmeric<strong>an</strong> army in<strong>to</strong> something akin <strong>to</strong> occultic warriors that will be asfierce as the Nazi Death head units. Bear in mind that George Bush,comm<strong>an</strong>der-in-chief of Burn’s Armed Forces has come from <strong>an</strong><strong>Illuminati</strong> family/ & the Ill. Skull & Bones chapter that was part of thesecret support for Hitler. <strong>The</strong>y have been using as <strong>an</strong> insignia what theythemselves (the Skull & Boners) call “the Death Head”. It is not surprisingthen that support for the Delta Team activities has come from the very<strong>to</strong>p. Fr<strong>an</strong>k Burns set out <strong>to</strong> create a warrior monk. Lt. Col. Jim Ch<strong>an</strong>non,in Delta Forces, also put forward the idea. Ch<strong>an</strong>non visited more th<strong>an</strong>130 New Age groups in California doing what was called “socialexperimentation.” It is <strong>an</strong> idea that the occult have repeatedly carriedout. Hitler’s S.S. were <strong>an</strong> special elite group of warrior monks from whichabout 3,000 went through religious initiations. (As the war progressedthe primary focus of the S.S. shifted from being the Black Order <strong>to</strong>merely being a reliable military group called the Waffen SS.) <strong>The</strong>re were3 levels of initiation, the last reserved for the hard-core Sat<strong>an</strong>ists at the<strong>to</strong>p. <strong>The</strong> Nazi initiation seems <strong>to</strong> have been <strong>an</strong> attempt <strong>to</strong> get the forceof the Vril. <strong>The</strong> Ordensburgen (Castles of the Order) were trainingcenters for the elite Nazis, including the S.S. (Having been in the military,I know first h<strong>an</strong>d that the success of the S.S. <strong>an</strong>d Waffen S.S. units inbeing fierce warriors is attributed by some of our leading military men<strong>to</strong> their training <strong>to</strong> be warrior-monks.) One group of the S.S. calledKnights of Poseidon volunteered themselves for castration, in <strong>an</strong>experiment <strong>to</strong> ch<strong>an</strong>ge them back <strong>to</strong> the supermen of the mythical <strong>an</strong>dmagical Hyperborea. Some of the best Sufi org<strong>an</strong>izations were warriormonks. Burns <strong>an</strong>d his Task Force Delta generated the First EarthBattalion, which is <strong>an</strong> occult military unit trained in martial arts, <strong>an</strong>dwitchcraft. Men who are selected for First Earth Battalion are given <strong>an</strong>occult initiation which includes the following oath:“I have the capacity <strong>an</strong>d therefore the duty <strong>to</strong> contribute <strong>to</strong> thedevelopment of myself, my associates, <strong>an</strong>d our pl<strong>an</strong>et, simult<strong>an</strong>eouslynow! I take personal responsibility for generating evolutionaryconspiracies as a regular part of my work. I will select <strong>an</strong>d createconspira<strong>to</strong>rial mech<strong>an</strong>isms that are not costly in time or resourcesbecause I am aware of the five ch<strong>an</strong>nels available <strong>to</strong> me (such asradio, television, <strong>an</strong>d word of mouth.) I will org<strong>an</strong>ize a self-supportinghigh comm<strong>an</strong>do group that will create <strong>an</strong>d perform evolutionarybreakthrough actions on behalf of people <strong>an</strong>d pl<strong>an</strong>et. One people,one pl<strong>an</strong>et. I will then pass this concept on <strong>to</strong> others who are capableof generating further self-org<strong>an</strong>izing comm<strong>an</strong>do teams."What ever happened <strong>to</strong> defending this nation? Military units such asthe First Earth Battalion although they are supported by Americ<strong>an</strong> tax459


dollars are not here <strong>to</strong> protect America. <strong>The</strong>y are global minded. <strong>The</strong>yare here <strong>to</strong> protect <strong>an</strong> occult world government. <strong>The</strong>y are out thereactively promoting the New World Order. Several years ago, Egendorfstates that $4.5 million (which came from you <strong>an</strong>d I, <strong>an</strong>d otherAmeric<strong>an</strong>s) had already been spent on Delta Force’s 80 differentprojects. <strong>The</strong> Green Berets is <strong>an</strong>other org<strong>an</strong>ization that has beenheavily targeted by the Sat<strong>an</strong>ists, <strong>to</strong> indoctrinate <strong>an</strong>d recruit. <strong>The</strong>Green Berets are increasingly moving <strong>to</strong>ward being warrior-monkgroup. M<strong>an</strong>y of them are now programmed multiples. One m<strong>an</strong> who isbeing looked up <strong>to</strong> by m<strong>an</strong>y Americ<strong>an</strong> Patriots <strong>an</strong>d Christi<strong>an</strong> Patriots asthe leader <strong>to</strong> help them oppose the New World Order is Bo Gritz. Hewas a recent presidential c<strong>an</strong>didate. Bo Gritz was a Green Beret <strong>an</strong>d aDelta Force comm<strong>an</strong>der. Bo Gritz is very proud of the fact that hewrote the m<strong>an</strong>ual for the Delta Forces. He also worked for the CIA. BoGritz is one of the military’s best programmed multiples, <strong>an</strong>d perhapsone of the most d<strong>an</strong>gerous. Insiders have <strong>to</strong>ld me he IS the mostd<strong>an</strong>gerous. Numerous insiders both for <strong>an</strong>d against Bo, have talkedabout Bo Gritz, <strong>an</strong>d that he is a programmed multiple. According <strong>to</strong> BoGritz’s campaign literature for President he was a comm<strong>an</strong>der in DeltaForces. Reproduced on a previous page is Bo’s own presidentialcampaign literature where he states that he is “Intelligence Officer &Reconnaiss<strong>an</strong>ce Chief, Delta Force.” He is also “Chief, SpecialActivities, U.S. Army General Staff, the Pentagon” <strong>an</strong>d “Principle Agent,National Security Council, Intelligence Support Activity”. Underqualifications Bo states that he is a “Security & Counter-terroristSpecialist.” Within the government, they are already referring <strong>to</strong>Christi<strong>an</strong>s who are against the NWO as terrorists. Bo is their greatestcounter-intelligence counter-terrorist they have. He came in like as<strong>to</strong>rm <strong>an</strong>d <strong>to</strong>ok control of the Patriot movement, <strong>an</strong>d it has been likepulling teeth <strong>to</strong> warn patriots about who he is. Bo Gritz himself was aGreen Beret, <strong>an</strong>d was used <strong>to</strong> assassinate 300 people. His blood lustcaused him at one point during the Vietnam War <strong>to</strong> shoot 30 prisonersin cold blood. I also heard Bo talk about say being Temple recommendMormon. That me<strong>an</strong>s he was at that time in good st<strong>an</strong>ding with the LDSMormon church so that he could go <strong>to</strong> the Temple <strong>an</strong>d participate inits rituals. Those who are alert realize that the temple rituals are likeMasonic <strong>an</strong>d Witchcraft rituals. Now he is no longer a Mormon. But hestill continues in the military philosophy he believes in. Bo Gritz is goingaround the nation teaching SPIKE training <strong>to</strong> <strong>an</strong>yone who w<strong>an</strong>ts martialarts skills. Bo has done <strong>an</strong> excellent job in identifying for the New WorldOrder every person in the nation who could threaten their pl<strong>an</strong>s for amartial law NWO takeover.Bo Gritz likes <strong>to</strong> call attention that he is one of this country’s foremostcounter-terrorist agents. This is true. <strong>The</strong> New World Order believespatriots <strong>an</strong>d Christi<strong>an</strong>s are terrorists, because they st<strong>an</strong>d in the way ofthe world’s accept<strong>an</strong>ce of their world dicta<strong>to</strong>r. Bo Gritz has done a460


great deal <strong>to</strong> infiltrate <strong>an</strong>d neutralize the opposition <strong>to</strong> the New WorldOrder. He has been their best counter-terrorist agent.B - INTERNAL COMPUTERS --PERFECT DELEGATION; INTERNALCOMPUTERS WHICH AUTO-CONTROL A SLAVEIf a master has <strong>to</strong> const<strong>an</strong>tly spend time whipping <strong>an</strong>d motivating hisslave, as well as forever watching that the slave doesn’t escape or doshoddy work, or physically or verbally injure the master, then controllingthe slave c<strong>an</strong> end up <strong>to</strong> be a full time job. When the master gets <strong>to</strong>omuch involved in the control process, he ceases <strong>to</strong> be master, <strong>an</strong>dbecomes a slave <strong>to</strong> the control process. <strong>The</strong> intelligence agenciesknew that they would have <strong>to</strong> create mind control slaves who couldpolice themselves. If the master has <strong>to</strong> const<strong>an</strong>tly guard his slave, theslave will be more trouble th<strong>an</strong> he is worth. M<strong>an</strong>y successful peoplehave gained their success because they knew how <strong>to</strong> delegate. <strong>The</strong>most successful supervisor is the one who c<strong>an</strong> delegate the best. <strong>The</strong>programmers had <strong>to</strong> find ways <strong>to</strong> cut their supervisory requirements <strong>to</strong>the bone if they were <strong>to</strong> make owning a Monarch slave worthwhile.<strong>The</strong> method chosen was <strong>to</strong> build “computers” in<strong>to</strong> the slave’s mindthat would internally regulate everything. <strong>The</strong>y do this by takinghundreds of the alters <strong>an</strong>d dehum<strong>an</strong>izing them <strong>an</strong>d turning them in<strong>to</strong>parts of a computer. For inst<strong>an</strong>ce, the shutter on the All-seeing eye ofthe computer, which is seen in the mind like a camera shutter, is a childalter who job is <strong>to</strong> open <strong>an</strong>d shut. (Another primal part is inside theeye’s pupil.) This shutter part knows what goes on in all the systemsubconsciously but if discovered by a therapist <strong>an</strong>d pulled <strong>to</strong> the fron<strong>to</strong>f the mind will not be able <strong>to</strong> vocalize about the system. <strong>The</strong> softwarefor this “computer” could be programmed in<strong>to</strong> it, <strong>an</strong>d all the individualprogramming of every alter c<strong>an</strong> then be tied back <strong>to</strong> the computer. Inother words, each alter would be programmed on how <strong>to</strong> view life, <strong>to</strong>act, <strong>to</strong> think, <strong>an</strong>d <strong>to</strong> function in their job. This programming would belinked <strong>to</strong> a computer. <strong>The</strong> programmers invented the perfect method<strong>to</strong> decentralize their control over their slaves <strong>an</strong>d yet still supervise withthe tightest of control. Each alter is linked <strong>to</strong> a computer (internal-not<strong>an</strong> external one) built from a foundation of fear <strong>an</strong>d trauma. Sinceeach section of alters was <strong>to</strong> remain secret, each section of alters for aslave is given its own computer, <strong>an</strong>d then linking computers were built<strong>to</strong> link the various sections, <strong>an</strong>d then finally a major backup computer isbuilt, <strong>an</strong>d then finally the internal Beast computer. Bear in mind that thisis all built internally in the mind of the victim. We are not talking aboutactual physical computers built out of physical microchips, wires,condensers etc. If the programmer concentrates on a single pointwhen giving instructions he will get better results. Rather th<strong>an</strong>complicating things for the slave, you gain power over the slave (<strong>an</strong>d<strong>an</strong>y subordinate) if you c<strong>an</strong> give simple clear instructions. For thisreason, a large share of the alters in <strong>an</strong> alter system are given veryclear straight forward jobs. Because their jobs are so straightforward,these alters will often remain fragments, rather th<strong>an</strong> alter parts with full461


lown personalities. <strong>The</strong> programmers don’t cloud the issue. Anundeveloped alter will be given one single clear, basic job. By stringing1,000’s of alters <strong>to</strong>gether with single tasks, a highly sensitive system ofalters c<strong>an</strong> be created. Each piece of the System is separated by somedegree of dissociation <strong>to</strong> make it a separate piece. By dividing themind so much, it is incapable of fighting what has been done <strong>to</strong> itself.Before we begin describing the technical details of <strong>an</strong> internalcomputer, bear in mind that every Monarch System is unique <strong>an</strong>d yetthey all follow certain patterns & methodologies. Most of the models forthe first few decades follow these patterns, some of the newer oneshave more updated imagery.POWER SOURCESIn <strong>an</strong> <strong>Illuminati</strong> System, a computer is created for each section of alters.That computer will be given a “power source”, which if unscrewed likea light bulb will go out. <strong>The</strong> light from one of these power sources mightbe emerald blue or emerald green or other color. <strong>The</strong> reader mayw<strong>an</strong>t <strong>to</strong> refer <strong>to</strong> chapter 4 for the codes <strong>to</strong> underst<strong>an</strong>d the structuringof the various computers <strong>an</strong>d systems.COLOR CODES & RIBBONSIn a st<strong>an</strong>dard 13x13x13 <strong>Illuminati</strong> alter system, 13 colors were used, <strong>an</strong>deach computer was given a color. <strong>The</strong>se would be pink, or<strong>an</strong>ge,yellow, white, red, brown, blue, green, black, purple, silver, gold <strong>an</strong>dplatinum, <strong>an</strong>d clear. Color programming is reported <strong>to</strong> have beendeveloped at UCLA. Whatever the case, Systems all over the UnitedStates have color programming. <strong>The</strong> hierarchy of colors in a System isoften as follows (from <strong>to</strong>p power down): Platinum, Gold, Silver, Purple,Black, Red, Green, Brown, White, Or<strong>an</strong>ge, Yellow, Pink. Clear is alsoused as a color for secret areas of the system. This hierarchy of colorcoding c<strong>an</strong> be switched. <strong>The</strong> internal programmers c<strong>an</strong> reassign colorsif they need <strong>to</strong>, in order <strong>to</strong> protect the programming. Alters, sections,<strong>an</strong>d parts of the computer are all color coded. <strong>The</strong> color coding foralters is not the same just because the alters are in the same section.<strong>The</strong> color coding within the <strong>Illuminati</strong> <strong>Mind</strong> Control is fairly consistent,however a sample of <strong>an</strong> alternative <strong>Illuminati</strong> color scheme will also beprovided.A survey of colors is as follows:CLEAR. Secret or shell alters who c<strong>an</strong> take on <strong>an</strong>y color are codedclear. <strong>The</strong>se are alters who serve as images or as a stage for otheralters. This would include “Guardi<strong>an</strong> of the Vail” alters.GOLD. This color is for the supreme leadership in the System, whichincludes the Gr<strong>an</strong>d Druid Council.SILVER. This color is for the Sat<strong>an</strong>ic alters who perform high levelSat<strong>an</strong>ic rituals. <strong>The</strong> Mothers of Darkness have silver coding.PURPLE. <strong>The</strong>se alters see themselves as the abusers, rather th<strong>an</strong> the<strong>Illuminati</strong>. <strong>The</strong>se alters were involved with the programming. <strong>The</strong>y havebeen taught <strong>to</strong> forget the abuse <strong>an</strong>d <strong>to</strong> reframe it in their mind astraining.462


BLACK. <strong>The</strong>se alters were born out of Sat<strong>an</strong>ic ritual, <strong>an</strong>d are Moonchildren. <strong>The</strong> Delta <strong>an</strong>d Beta alters are black coded. <strong>The</strong>y do the dirtywork for the cult, such as blackmail <strong>an</strong>d assassination.RED. <strong>The</strong>se altars see themselves as witches. <strong>The</strong>y were born out ofwitchcraft ritual, believe they have great spiritual power, <strong>an</strong>d tend <strong>to</strong>deny that they have been abused.GREEN or EMERALD GREEN. <strong>The</strong>se cat altars recognize they havebeen abused. <strong>The</strong>y still see themselves as belonging <strong>to</strong> the cult family,<strong>an</strong>d deny that they have been abused <strong>to</strong> protect their cult family.BLUE ALTERS. Clones, armies <strong>an</strong>d the ribbons appear <strong>to</strong> have bluecoding. <strong>The</strong>se alters will go so far as <strong>to</strong> hurt the body <strong>to</strong> protect it fromleaking information or deprogramming.WHITE. ‘<strong>The</strong>se are Atl<strong>an</strong>te<strong>an</strong> alters who have been given Ary<strong>an</strong> typeracial nonsense <strong>to</strong> think they are superior. <strong>The</strong>y believe in geneticengineering, <strong>an</strong>d a master race.ORANGE. <strong>The</strong>se special protec<strong>to</strong>r alters are scouts who warn ofd<strong>an</strong>ger from internal or external threats.YELLOW. <strong>The</strong>se are the strong Christi<strong>an</strong> alters of which there will onlybe a few in the System. <strong>The</strong>y help serve as a bal<strong>an</strong>cing point <strong>to</strong> controlthe System as well as <strong>to</strong> hide what the System is all about.PINK. <strong>The</strong>se are core related alters. <strong>The</strong>y maintain the true feelings ofthe true self apart from the cult programming <strong>an</strong>d the cult family’sprogramming. <strong>The</strong>se alters are viewed as weak because they areemotional <strong>an</strong>d often break down <strong>an</strong>d weep. <strong>The</strong>y are fragileemotionally.An alternative color scheme that is used:DARK EMERALD GREEN. This color is assigned <strong>to</strong> the AntiChrist-Sat<strong>an</strong>alter(s). Green is the occult color for Sat<strong>an</strong> <strong>an</strong>d happens <strong>to</strong> be the mostsacred color. Few people outside of Sat<strong>an</strong>ists know that Green is moresacred for them th<strong>an</strong> <strong>an</strong>y other color.LIGHT GREEN. <strong>The</strong> gods <strong>an</strong>d goddess alters which are triads whichfunction in<strong>Illuminati</strong> ceremonies get this color coding.WHITE. <strong>The</strong> internal programmers who come around in white robesget this color assigned <strong>to</strong> them, as if they are doc<strong>to</strong>rs or <strong>an</strong>gels of light.RED. Sexual alters are given the natural color of sex <strong>an</strong>d arousal red.BLACK. Connecting alters that are Nexus alters between varioussystem parts.PINK. Reporting alters.DARK BLUE. Non hierarchy cult alters.LIGHT BLUE. Alters in charge of the way the system runs, such as thejudges.YELLOW. Alters which are ritually <strong>an</strong>d sexually twinned with alters ofother systems.ORANGE. Guard alters which are heavily programmed forobedience.VIOLET-PURPLE. Front alters <strong>an</strong>d small child alters placed in<strong>to</strong> boxes.463


CLEAR. Shell alters <strong>to</strong> deceive the outside world.GOLD. <strong>The</strong> traumatized alters upon which the programming is buil<strong>to</strong>n.Joseph Mengele <strong>an</strong>d the programmers who worked with <strong>an</strong>d underhim, used a large dollhouse with 26 rooms. Each of the rooms werepainted with one of the 13 different colors in order <strong>to</strong> build in<strong>to</strong> thechild’s mind, the 13 front <strong>an</strong>d the 13 back computers. <strong>The</strong> internalcomputers worked off of color codes, as well as other codes. Adollhouse was used <strong>to</strong> instill in<strong>to</strong> the child’s minds the compartments ofthe computer. Each room was done up in a different color. Oneparticular room was a secret room, <strong>an</strong>d this represents the secret worldof Petra which is hidden behind two large rocks. This secret world iscoded the color clear. Besides the special color clear, the followingcolors appear in the system: Gold, Silver, Purple, Black, Red, Green,Blue, Brown, White, Or<strong>an</strong>ge, Yellow, <strong>an</strong>d Pink. Each color has me<strong>an</strong>ing<strong>an</strong>d a r<strong>an</strong>k. Just as the hour glasses could be turned, the color codingc<strong>an</strong> be switched in r<strong>an</strong>k. This is why in some systems there is a“Computer Opera<strong>to</strong>r Black”, a “Computer Opera<strong>to</strong>r Green”, <strong>an</strong>d a“Computer Opera<strong>to</strong>r Purple”, etc. During the programming a blackbox with needles <strong>an</strong>d wires which attach <strong>to</strong> the body for electroshockis used. While electro shocking the victim, colored scarfs coming out ofa box are showed <strong>to</strong> the child. <strong>The</strong> scarfs would help form the imageryneeded <strong>to</strong> build colored ribbons internally. Alters would be createdusing the Tall Book of Make Believe s<strong>to</strong>ry of the P<strong>an</strong>cake people. Usingthis as a base or foundation, the alters would then be dehum<strong>an</strong>izedone step further in<strong>to</strong> thinking they were ribbons--such as ticker tape,which could tr<strong>an</strong>smit information from one computer <strong>to</strong> <strong>an</strong>other areaof the mind. <strong>The</strong> Ribbons had the ability <strong>to</strong> travel between the differentlevels <strong>an</strong>d <strong>to</strong> tr<strong>an</strong>smit messages through the System, especially <strong>to</strong> thecomputers. It is believed they could do this because they were spirit.When a System is accessed by a programmer, one procedure is <strong>to</strong>obtain a Ribbon alter <strong>an</strong>d then inform the Ribbon what he w<strong>an</strong>ts. <strong>The</strong>ribbons tr<strong>an</strong>smit messages <strong>to</strong> the internal computers. <strong>The</strong> ribbons onolder systems use morse code. Who are the Ribbons? <strong>The</strong> Ribbons arethe beginning of the Luciferi<strong>an</strong> alter-like demons <strong>an</strong>d alters. <strong>The</strong>y areprimarily the message bearers from the computers <strong>to</strong> the differentcomputers, levels <strong>an</strong>d alters. <strong>The</strong> Ribbons might have <strong>an</strong>gelic names(Michael, Gabriel, etc.). <strong>The</strong> word <strong>an</strong>gel me<strong>an</strong>s messenger. <strong>The</strong> ribbonsserve a very similar function. <strong>The</strong>y tr<strong>an</strong>smit ticker tape with morse codemessages. <strong>The</strong>y are at work most of the time for a System. A samplecover s<strong>to</strong>ry for what they guard--which is the main computer with thegems <strong>an</strong>d the core, is that the ribbons guard the System’s “Garden ofEden”. Some more of the cover s<strong>to</strong>ry that may be given is this: Ribbonswere supposedly formed out of the dust of the ground <strong>an</strong>d wereplaced in the Garden of Eden <strong>to</strong> create every pleas<strong>an</strong>t tree. (SeeGenesis 1.) <strong>The</strong> ribbons relate <strong>to</strong> the Tree of Life. But <strong>to</strong> eat of the Treeof Knowledge of Good <strong>an</strong>d Evil will cause death. <strong>The</strong> name of the first464


iver of four in the garden is Pashon. Out of the first river come fourheads. <strong>The</strong> River Pashon has gold, ballium, onyx, rubies, diamonds <strong>an</strong>dprecious s<strong>to</strong>nes. <strong>The</strong>se gems are the programs the dwarfs mine. If theSystem has charismatic programming, the alters will have porcelainface programming. In this case each ribbon’s color will match thecolor of the s<strong>to</strong>nes in the masks--that is yellow, white, blue, green,purple, red <strong>an</strong>d black. <strong>The</strong> colors of the ribbons correlate or match thecolors of the Dollhouse rooms. What do ribbons do? <strong>The</strong> Ribbons servethe programmers <strong>an</strong>d the computers, who in turn serve the evil masterSpirits. Things that the Ribbons do for the computers have beenidentified as follows:a. <strong>The</strong> Ribbons eat from the system’s internal “Tree of Good <strong>an</strong>d Evil”.,b. Ribbon programming consists of several things--where they reside,who they are <strong>an</strong>d what they are <strong>to</strong> protect.,c. Ribbons must protect the computers in order <strong>to</strong> protect their own life.<strong>The</strong> Ribbons will be programmed <strong>to</strong> believe that reversing thecomputer will reverse the Ribbons’ life. <strong>The</strong> ribbons themselves operatewith mech<strong>an</strong>ical hearts (not hum<strong>an</strong> hearts). <strong>The</strong> cover s<strong>to</strong>ries mayinclude the following: All Ribbons are hid behind a little girl, who is afront for them & who tells the creation s<strong>to</strong>ry. <strong>The</strong> little girl will tell thecreation s<strong>to</strong>ry which included the Ribbons. Behind her runs a silver cord.<strong>The</strong> silver cord has <strong>to</strong> do with heart programming. <strong>The</strong> silver cord has 3str<strong>an</strong>ds that c<strong>an</strong>not be broken as per ECL 4:12. This silver cord goes offif the Ribbons are <strong>to</strong>uched. Ribbons are set up so that suicideprogramming is triggered if they are cut. Actually, french braidingconceals a 4th str<strong>an</strong>d. In review as stated, during the programming, abox with colored scarfs was shown the child while severe electro-shockwas given <strong>to</strong> the body. A colored scarf represents a ribbon which runsa message from a colored room <strong>to</strong> a similar colored alter. In a Systemwhich is structured in<strong>to</strong> families <strong>an</strong>d cities <strong>an</strong>d worlds <strong>an</strong>d sections,these “geographically different” structures in the mind of the victimc<strong>an</strong> be connected via the color coding. In other words, the alters arestructured in<strong>to</strong> a 3-D cube structure. <strong>The</strong>n a fourth dimension (the colorcoding) is added <strong>to</strong> tie in all of the three dimensions. A centralcomputer was placed in at the bot<strong>to</strong>m of the mind. Using varioustechniques the victim is brought <strong>to</strong> the deepest altered state possible,<strong>an</strong>d a computer is built in<strong>to</strong> the mind via hypnosis <strong>an</strong>d alters. This c<strong>an</strong>be done by freezing the entire body <strong>an</strong>d just keeping the head active.Or it c<strong>an</strong> be done by bringing the body <strong>to</strong> a coma<strong>to</strong>se state where theheart is beating faintly. This step c<strong>an</strong> only be done under the strictestmedical supervision. <strong>The</strong> memory s<strong>to</strong>rage area for the computersinclude the Emerald City Library (staying with the Wizard of Oz theme)which contains alters who only function is <strong>to</strong> memorize & retain withpho<strong>to</strong>graphic memories pages <strong>an</strong>d pages of information. <strong>The</strong> layoutwith codes of the entire system c<strong>an</strong> be s<strong>to</strong>red in a s<strong>to</strong>rage b<strong>an</strong>k, so theprogrammer could access this area if his own records were lost. <strong>The</strong>libraries contain the his<strong>to</strong>rical genealogies of sat<strong>an</strong>ic iniquity from early465


<strong>an</strong>cient times <strong>to</strong> present. This <strong>an</strong>cient occult information has beenreported by at least half a dozen <strong>Illuminati</strong> slaves as being retainedinternally by demons.HOW MONARCH SLAVES ARE BEING DESIGNED TO INTERFACE WITH THEUNIX SYSTEM OF THE BEAST COMPUTERSIn line with what is being done by the <strong>Illuminati</strong> around the world withtheir network of computers--the computers have access codes similar<strong>to</strong> 666 666 666, <strong>an</strong>d back out <strong>an</strong>d close down codes similar <strong>to</strong> 999 999999. <strong>The</strong>se are the codes that the UNIX universal system uses, <strong>an</strong>d theMonarch slaves are being created with codes that interface with theUNIX system for computers. (On some systems if the computer isshutdown it will request <strong>an</strong> input code of 666fff666fff666fff666...This c<strong>an</strong>then be reversed F6F6F6F6F6F6F6F6F6F6.) <strong>The</strong> UNIX system is being used<strong>to</strong> allow the New World Order’s big BEAST computers <strong>to</strong> communicatewith <strong>an</strong>y known computer, including the minds of their Monarch mindcontrolledslaves. In the 1960s, the U.S. Department of Defense beg<strong>an</strong>linking computers <strong>to</strong>gether in<strong>to</strong> a superhighway now developed in<strong>to</strong>the Internet. Hundreds of thous<strong>an</strong>ds of computers around the world aretied in. Like buildings in a city, each computer has its own uniqueaddress. Most of these addresses are registered at the NetworkInformation Center in Menlo Park, CA. Individuals c<strong>an</strong> also beregistered at the NIC <strong>to</strong>o. <strong>The</strong> U.S. Military links in<strong>to</strong> the system with theirArp<strong>an</strong>et <strong>an</strong>d Milnet networks, which tie <strong>to</strong>gether such divergent thingsas MIT computers, West Point computers, NORAD computers, Alr ForceSystems Comm<strong>an</strong>d Space Division computers at El Segundo, CA <strong>an</strong>dU.S. Army DARCOM at Seckenheim, Ger. (<strong>to</strong> name a few). <strong>The</strong>se are allbeing tied <strong>to</strong>gether <strong>to</strong> form one vast electronic brain. <strong>The</strong>re are ninesecret BEAST computers of the New World Order, at the time this waswritten. “Big Bertha” is the nickname of the BEAST computer located atthe secret military installation called Dreaml<strong>an</strong>d at the secret GroomLake, NV test site facility. Papoose Lake is referred <strong>to</strong> as S-4. <strong>The</strong> othersuper-secret facilities in the area are named S-2, 8-6, <strong>an</strong>d S-66. This areahas become the <strong>Illuminati</strong>’s prime programming facility for turning outMonarch slaves, <strong>an</strong>d the Monarch slaves which are turned out from thisarea have turned out <strong>to</strong> be the worst basket cases. In other words theprogramming is very severe which is carried out in this area. This areahas also been used for the space program, for the U-2 & SR-71, for theCIA’s A-12 spy pl<strong>an</strong>e, for the Stealth fighters (Lockheed F-1 17A Attackpl<strong>an</strong>e) <strong>an</strong>d bombers, the Aurora, <strong>an</strong>d for the U.S. government’s“Above Top Secret” flying saucers. <strong>The</strong> Big Bertha computer (namedafter the <strong>Illuminati</strong> Mother-of-Darkness Bertha Krupp) c<strong>an</strong> be talked <strong>to</strong>in half a dozen l<strong>an</strong>guages <strong>an</strong>d will <strong>an</strong>swer a person back in thel<strong>an</strong>guage they speak.On a daily basis, airpl<strong>an</strong>es fly in<strong>to</strong> the Groom Lake facility. <strong>The</strong>callname of flights bringing workers <strong>an</strong>d people go by the call name“J<strong>an</strong>et”. About 12 J<strong>an</strong>et flights come in<strong>to</strong> the facility everyday. <strong>The</strong>seflights are usually Boeing 737s <strong>an</strong>d arrive from places like a secure466


terminal run by EG&G at McCarr<strong>an</strong> Alrport in Las Vegas <strong>an</strong>d from themilitary’s Palmdale, CA facility. <strong>The</strong>se 737s are unmarked except for ared stripe running down the fuselage. Large military C-130 arrive withcargo, <strong>an</strong>d <strong>Illuminati</strong> dignitaries arrive in smaller twin-engine craft.Victims for the programming are brought in via pl<strong>an</strong>es, & other routes.One of the BEAST computers occupies three floors of the headquartersof the Europe<strong>an</strong> Economic Community building in Brussels, not far fromthe import<strong>an</strong>t <strong>Illuminati</strong> Mother-of-Darkness worldwide headquarterscastle near the Fr.-Bel. border near Muno, Belgium. Another BEASTcomputer is in Luxembourg. In observing the operations of the<strong>Illuminati</strong>, it has been seen that telephone area codes are used as par<strong>to</strong>f a mind-controlled slave’s code. We do not underst<strong>an</strong>d everythingabout their codes, but it does tie in with other things that arehappening. Every person in the world has been assigned <strong>an</strong> 18 digittracking number, which consists of 3 groups of 6 numbers. <strong>The</strong> first 3numbers assigned in the BEAST computer <strong>to</strong> everyone are 666. <strong>The</strong> nextis one’s national code. <strong>The</strong> U.S. national code is 110. <strong>The</strong>n the next 3numbers are you telephone area code, <strong>an</strong>d then finally your 9 digitSocial Security number. <strong>The</strong> code then is 666 + Nation code + Tel. areacode + social security no. = BEAST I.D. no. for <strong>an</strong> individual. According<strong>to</strong> Dwight Kinm<strong>an</strong>’s book <strong>The</strong> World’s Last Dicta<strong>to</strong>r, 2nd ed.,(Woodburn, OR: Solid Rock Books, p. 256) VISA has already begunissuing VISA cards using the BEAST 18 digit number. When <strong>an</strong> Americ<strong>an</strong>makes a b<strong>an</strong>k tr<strong>an</strong>saction on <strong>an</strong> au<strong>to</strong>teller within a matter of secondsthe BEAST has been informed of the activity. <strong>The</strong>se computers use UNIX.<strong>The</strong> particular programs for the economic tr<strong>an</strong>sactions just describedare a worldwide computer network called SWIFT (Society ForWorldwide Interb<strong>an</strong>k Fin<strong>an</strong>cial Tr<strong>an</strong>sactions). <strong>The</strong> SWIFT works off of theUNIX system <strong>an</strong>d c<strong>an</strong> communicate with <strong>an</strong>y computer. It wasdeveloped by AT&T <strong>an</strong>d uses C l<strong>an</strong>guage. (Bear in mind that there aredialects of UNIX, such as the st<strong>an</strong>dard AT&T UNIX <strong>an</strong>d for inst<strong>an</strong>ceBerkeley UNIX. <strong>The</strong> UNIX system uses both timesharing <strong>an</strong>d multitasking.<strong>The</strong> mind of a Monarch slave also does both multitasking <strong>an</strong>d timesharing. One of the nice UNIX features, is “protected memory”, which isalso part of the Monarch programming. A kernal is what the UNIXprogrammers call a “protected person”. It is very similar <strong>to</strong> the internal“person” (alter) who helps the Monarch slave’s programming functions.<strong>The</strong> big item about UNIX is that it has permissions gr<strong>an</strong>ted. This is similar<strong>to</strong> the Monarch programming. Permissions are gr<strong>an</strong>ted <strong>to</strong> 3 types ofentities. <strong>The</strong> Top Programmer or “god” as he is called, of the UNIXSystem receives what is called the individual permission. <strong>The</strong> nextpermission is called group permission, <strong>an</strong>d it is given <strong>to</strong> insiders whowork with the system. <strong>The</strong> final permission type is the world, which hasvery limited access. <strong>The</strong> parallel between this <strong>an</strong>d the Monarchprogramming is surprising. In some cases the programmers may havematched things on a one-<strong>to</strong>-one correspondence. <strong>The</strong> Monarchprogram also has a Top Programmer who is called “god” <strong>to</strong> the System.467


He has <strong>to</strong>tal control over the system. His programming permissions c<strong>an</strong>not be deprogrammed out by others who might w<strong>an</strong>t <strong>to</strong> usurp hispower. Hidden from the casual user of the UNIX system are theDaemons <strong>an</strong>d Demons. <strong>The</strong> UNIX programmers decided <strong>to</strong> use the oldenglish spelling for demon = Daemon. <strong>The</strong>se are computer processeswhich work secretly behind the scenes <strong>an</strong>d are given actual demonicnames--some corresponding <strong>to</strong> actual names of his<strong>to</strong>rically knowndemons, such as Asmodeus. Asmodeus is also a demon which isplaced in<strong>to</strong> m<strong>an</strong>y Monarch slaves. In the UNIX system these demonsare treated like persons in the computer’s user direc<strong>to</strong>r. Demons in thecomputer system do not have <strong>to</strong> log on<strong>to</strong> the computer, but they workbehind the scenes <strong>an</strong>d are given the same powers that people usersare given. <strong>The</strong>y are set up in the same structure as how the computertreats people. Permission in the UNIX system is gr<strong>an</strong>ted using <strong>an</strong> 8 bitcount with 0 through 7. <strong>The</strong> three kinds of permission are the read,write, <strong>an</strong>d execute permissions. If no permission were gr<strong>an</strong>ted in <strong>an</strong>yway the UNIX system would indicate” “on the screen which me<strong>an</strong>s000000 000 or nine 0’s. <strong>The</strong> super user called god is given the code 777which me<strong>an</strong>s super user. However, the permission of 666 gives the userthe power <strong>to</strong> everything the 777 permission gives, except that the 777permission allows the god the master programmer) <strong>to</strong> execute notexecutable programs. <strong>The</strong> Postmaster Demon is the head demon, <strong>an</strong>dhis permission level in UNIX is 666. (In the Monarch Programming “Mr.Postm<strong>an</strong>” is a code word used internationally.) <strong>The</strong> most import<strong>an</strong>t par<strong>to</strong>f the BEAST system is its communication power. <strong>The</strong> Electronic MailSystem of the BEAST allows it <strong>to</strong> communicate worldwide, <strong>an</strong>d alongwith electronic mail comes levels of permission <strong>to</strong> view or work with theelectronic mail. <strong>The</strong> super user (god) is called Root. A programmer onthe Beast must get permission. His program must get permission. Thatprogram that gives permission must also get permission. In other words,there are levels of permission that must be gone through. This is similar<strong>to</strong> the Monarch program. For inst<strong>an</strong>ce, the alters personalities whichwould control the body during <strong>Illuminati</strong> gatherings have very tightaccess permission. It is very hard <strong>to</strong> access these hierarchypersonalities. Both the UNIX system (<strong>an</strong>d the Monarch programming)creates “children” by “spinning”. <strong>The</strong> “child” spins off. When the “child”is finished it is “killed” in UNIX lingo. When the programmers createdchild processes in the computer, they were having problems with thechild processes killing the parent processes. <strong>The</strong> same type of problemshave had <strong>to</strong> be dealt with in the Monarch programming. <strong>The</strong> initialprogrammer is often the biological parent of the child, <strong>an</strong>d this parentis very responsible for extreme <strong>to</strong>rtures being applied <strong>to</strong> the child who isbeing programmed--not <strong>to</strong> mention all of the expendible children, whoare killed in front of the child <strong>to</strong> highlight the reality of the trauma. <strong>The</strong>natural reaction of the child being created is <strong>to</strong> hate the programmer.Naturally, the Monarch programming had <strong>to</strong> overcome that naturaltendency, which it does very successfully. <strong>The</strong> UNIX system uses <strong>an</strong>468


internal clock within its computer system. <strong>The</strong> UNIX clock is calledCRON. CRON checks files <strong>to</strong> see if the programmer has put in <strong>an</strong>y files<strong>to</strong> run. <strong>The</strong> UNIX system uses data bus lines, which are like the Monarchprogramming ribbons, which go through the system. <strong>The</strong>se ribbons ordata bus lines take information <strong>an</strong>d comm<strong>an</strong>ds from the computers <strong>to</strong>other computers. Within the UNIX system, insiders have revealed thatthe Daemon (Demon) processes of all the UNIX systems have a securityflaw. That flaw is that the Postmaster Daemon has access <strong>to</strong> them inspite of who the god is of that particular UNIX computer system. Sowhile owners, who purchase UNIX systems think that they haveexclusive control over their system, <strong>an</strong> external Postmaster Daemoncoming from the Beast could use its permission levels <strong>to</strong> over ride thepower of the local owner of the system. <strong>The</strong> Monarch system has asimilar feature, the <strong>Illuminati</strong> programmers know how <strong>to</strong> access thebase or primal <strong>an</strong>chors <strong>to</strong> the programming <strong>an</strong>d y<strong>an</strong>k out <strong>an</strong>yprogramming they w<strong>an</strong>t. All the slaves of these lesser groups such asthe CIA, Church of Sat<strong>an</strong>, Mafia, etc. c<strong>an</strong> all be reprogrammed ratherquickly <strong>to</strong> serve the <strong>Illuminati</strong>, if they are not already due <strong>to</strong> the<strong>Illuminati</strong> programmers extra knowledge on how <strong>to</strong> get in<strong>to</strong> the baseprogramming. In these m<strong>an</strong>y ways, the UNIX system serves both realcomputers <strong>an</strong>d also for the internal computers of some slaves’ mind.<strong>The</strong> slave’s system becomes a computer system. It functions as a seriesof computers that are connected <strong>to</strong> the master computer which issunk in<strong>to</strong> the mind at the lowest hypnotic level, which is a level oftenplaced even below <strong>an</strong> internal “hell pit”. To access the differentcomputers, combinations of cards were used for the codes (numbersare also used. See Chapter 4.). Various parts of a Monarch systemcorrespond <strong>to</strong> what <strong>an</strong>y computer would have. A microprocessorregister has 3 sections on a computer <strong>to</strong> make it functional. In MonarchSystems, you would find these 3 represented by 1. s<strong>to</strong>red data in thelibrary <strong>an</strong>d alters with pho<strong>to</strong>graphic memories, 2. <strong>an</strong> instruction sectionwith codes, <strong>an</strong>d 3. stacking mech<strong>an</strong>isms. Linked <strong>to</strong> all this were acrystal, clock, hour glasses, a compass <strong>an</strong>d <strong>an</strong> entire demoniccomm<strong>an</strong>d structure. <strong>The</strong> eye in front of the big computer will beprotected by legions of spirits. <strong>The</strong> front big computer runs frontquadr<strong>an</strong>ts <strong>an</strong>d the back computer runs the deeper quadr<strong>an</strong>ts. <strong>The</strong>software so <strong>to</strong> speak for the Omega programming (computer) may beset up <strong>to</strong> include a stacking program called the Potter’s Wheel. <strong>The</strong>Potter’s Wheel is a misuse of the Bible, <strong>an</strong>d is a type of programmingthat the Charismatic/pentecostal movement carries out. <strong>The</strong> Mormons<strong>an</strong>d the Catholics have their own distinctive “software” programs. Aninitial stacking mech<strong>an</strong>ism would work by telling alters <strong>to</strong> “St<strong>an</strong>d inOrder according <strong>to</strong> r<strong>an</strong>k <strong>an</strong>d serial no.” Another code along with ah<strong>an</strong>d signal would place the Gatekeeper alters up on the Potter’swheel for their “crea<strong>to</strong>r” <strong>to</strong> work on them. A group of alters could betaught <strong>to</strong> go up on their Potter’s wheel by seeing a pattern ofdominoes. It is whatever the programmer decides.469


<strong>The</strong> dominoes were used for coding, but they also had theprogramming feature of being able <strong>to</strong> tie alters <strong>to</strong>gether so that if theSystem is tampered with out of sequence, a domino effect would takeplace. This domino effect is for one program <strong>to</strong> set off <strong>an</strong>other program<strong>to</strong> set off <strong>an</strong>other program. Soon the Monarch slave’s mind is trying <strong>to</strong>deal with dozens of suicide programs running simult<strong>an</strong>eously, alongwith perhaps other programs such as scrambling programs. Forinst<strong>an</strong>ce, one s<strong>to</strong>ry line used is the mice run up <strong>an</strong>d down <strong>an</strong>d open upnew levels of programming <strong>an</strong>d are tied <strong>to</strong> the pendulum/clockmech<strong>an</strong>ism. <strong>The</strong> mice c<strong>an</strong> activate the hour glass, <strong>an</strong>d a gold-wingedgreen skirted fairy Whisper bal<strong>an</strong>ces the hour glass on her wings. If theslave goes <strong>to</strong>ward freedom, the slave’s mind triggers programs of allkinds, <strong>an</strong>d the mind ends up not knowing if it was coming or going withall the different programs which activate. A more exhaustive look at allthe craziness <strong>an</strong>d activity of the Omega & Gamma programs whichactivate <strong>to</strong> defend the <strong>Illuminati</strong>’s <strong>Mind</strong> Control are given in otherchapters. <strong>The</strong> programming has been designed that if it was taken outimproperly, it is <strong>to</strong> come back Seven times Seven stronger. This is also aclue that the programming is partly a demonic m<strong>an</strong>ifestation, cf. MT12:43-45 et al.COMPONENTS OF THE CONTROLSAt the center of the System are the mech<strong>an</strong>isms that control it, such asthe Master Computer, the All-Seeing Eye, the Compass, the MasterClock, <strong>an</strong>d the Quadr<strong>an</strong>ts that tie in <strong>to</strong>gether. <strong>The</strong> System may have 3hourglasses spinning on axes. <strong>The</strong>se hour glasses c<strong>an</strong> also be calledmatrixes, which are on your st<strong>an</strong>dard 3 axes, a X axis, a Y axis & a Z axis.<strong>The</strong> worlds are various sections of these matrixes.<strong>The</strong>re are backup worlds & mirror image worlds. Occasionally, there willbe a double system. Some of the more import<strong>an</strong>t alter System are evenfar more complex th<strong>an</strong> a double System or a double Double System.Each alter is split so that every alter has <strong>an</strong>other alter created from it.<strong>The</strong>n there are demonic doubles--demonic mirror images in the System.<strong>The</strong> double images shown in the picture are very real when describingour System. Some therapists have noticed “Sat<strong>an</strong>ic Guardi<strong>an</strong> Angels”which talk <strong>to</strong> their patients. <strong>The</strong>y do not know what <strong>to</strong> make of these.Some classify them as hallucinations, because they do not have <strong>an</strong>yroom in their belief system for demonology. <strong>The</strong>se are the demons thatdo control the multiple’s mind. Thor, with his hugh hammer is a painfuldemon. Thor’s image is made of cast iron & carried <strong>an</strong> iron mallet. Thoris a black strong figure. When his hammer strikes, the slave gets splitbrain headaches. Programmers c<strong>an</strong> use the s<strong>to</strong>ry of the Gi<strong>an</strong>t with theHammer in the Ozma of Oz book (pp. 141-155) <strong>to</strong> give the imagerywhen programming. A special series of sweeping motions with bothh<strong>an</strong>ds will relieve the split brain programming, but some alters c<strong>an</strong> only<strong>to</strong>lerate these h<strong>an</strong>d signals being done by the master. By the way, Thoris <strong>an</strong> import<strong>an</strong>t protec<strong>to</strong>r in Sat<strong>an</strong>ic/occult beliefs, & the religion of Thornow has equal stature/popularity in Germ<strong>an</strong>y as the Luther<strong>an</strong> church.470


<strong>The</strong> programs are put in<strong>to</strong> a System <strong>an</strong>d given codes. <strong>The</strong>se programsuse Greek, Hebrew <strong>an</strong>d Druidic letters (or other esoteric l<strong>an</strong>guages) intheir activation codes. Actually, these alphabets also are the waythese people numbered with, <strong>an</strong>d the Greek, Hebrew & Druid letterswere used as numbers. <strong>The</strong>se programs could be called UtilityPrograms, because they function much like the utility programs of acomputer. Along with all the programming comes cover programming.Generally, front s<strong>to</strong>ries cover almost everything in a System. Dominoshave been used in Monarch programming as the basis for what iscalled a “Mother Board” in actual computers. Telephone <strong>to</strong>nes key inon a slave’s computer matrix. At times, telephone <strong>to</strong>nes in everyday lifewill make slaves accidently wacky. All computers run off of base 2--which uses the numbers 0, <strong>an</strong>d 1. 0 <strong>an</strong>d 1 c<strong>an</strong> be represented as on<strong>an</strong>d off. In the programming, they were represented by “He Loves Me”,“He Loves Me Not.” <strong>The</strong> Programmers, especially Dr. Mengele, enjoyedtaking a daisy <strong>an</strong>d pulling its petals off one at a time. First petal, “I loveyou”. Second Petal, “I love you not.” IF the last daisy petal was “I loveyou not--then the child was dramatically killed in front of other children<strong>to</strong> be programmed. <strong>The</strong> <strong>Illuminati</strong>’s method of death--skinning alive--has been developed in<strong>to</strong> a fine art, for both programming <strong>an</strong>dceremonies. A drawing of this skinning procedure by a witness is on pg.338. <strong>The</strong> daisy game, which was scary for a child, heightened thevictim’s attention. Matrixes were built upon this deadly game. How didit feel <strong>to</strong> be programmed with Mengele’s “I love you, I love you not”programming? A victim recalls, “<strong>The</strong> child was place in a cageexposed <strong>an</strong>d naked. <strong>The</strong> low voltage wires were rigged <strong>to</strong> the metal ofthe cage. <strong>The</strong> child experienced a continual erratic or sporadicprolonged voltage of shock until the heart would pulsate <strong>an</strong>d the<strong>an</strong>xiety level of the child became out of control. “<strong>The</strong>n the Dr. wouldenter the scene with his sneering taunting smile while holding a daisy inhis h<strong>an</strong>ds. <strong>The</strong> sporadic voltage would continue <strong>to</strong> flow through thechild’s body. As the shock continued, the Dr. s<strong>to</strong>od before the childpulling petals off the daisy. His only communication was voiced in thesewords, “LOVE YOU, LOVE YOU NOT, LOVE YOU, LOVE YOU NOT,” whilepulling off the daisy petals. This action would drive the child crazybecause the child knows full well if that last petal is pulled off it me<strong>an</strong>tdeath. <strong>The</strong> child that is not loved is skinned alive before the otherchildren. “...we c<strong>an</strong> now begin <strong>to</strong> underst<strong>an</strong>d that the expendablechildren were in other cages placed all around us for the eye <strong>to</strong> see.<strong>The</strong>y went through the same process as we watched. When the lastpetal of the daisy was pulled from the flower they were killed. <strong>The</strong>n theterror of what we had just experienced through the seeing <strong>an</strong>dhearing, let us know we were next, but when? By the time the doc<strong>to</strong>rgot <strong>to</strong> “He loves me not” some children no longer knew fear. <strong>The</strong>irashes were taken from the crema<strong>to</strong>rium <strong>an</strong>d used in the garden forfertilizer, as a reminder <strong>to</strong> all what happens <strong>to</strong> unloved children. “In theclinical room, the lights were used <strong>to</strong> program the day’s events. <strong>The</strong>471


ight light continually flashed starting with 7 lights, then six dots, thenfive dots, then four dots, then three, then two dots, then 1 dot. In theblindness of the lights, we could hear the doc<strong>to</strong>r’s voice, “LOVE YOU,LOVE YOU NOT.” over <strong>an</strong>d over again. A child could have a false trustwhen the lights flashed 7 dots. By the time one dot was flashing, thechild’s terror had once again risen. <strong>The</strong> doc<strong>to</strong>r never pulled the lastpetal off for us, but we c<strong>an</strong>’t forget how he teased us. He smiled <strong>an</strong>dwalked away, ‘NO, I LOVE YOU.’ <strong>an</strong>d walked away.” If we use L=I loveyou <strong>an</strong>d N=I love you not we c<strong>an</strong> build the following matrix for theinternal computer:L N L N L N1 2 3 4 5 62 3 4 5 6 13 4 5 6 1 24 5 6 1 2 35 6 1 2 3 46 1 2 3 4 5This type of configuration c<strong>an</strong> even be tied <strong>to</strong> color programming, <strong>an</strong>d<strong>to</strong> dominoes, where the numbers are represented as the dots on adomino. By making numbers in<strong>to</strong> dots--the numbers c<strong>an</strong> berepresented by lights in the same patterns of black domino dots. Thisme<strong>an</strong>s that dominos c<strong>an</strong> be used <strong>to</strong> program a child, <strong>an</strong>d who wouldsuspect <strong>an</strong>ything about dominoes?Another thing that lends itself well <strong>to</strong> use as a programming code are adeck of cards. M<strong>an</strong>y slaves have this. It c<strong>an</strong> be tied in with the Alice InWonderl<strong>an</strong>d s<strong>to</strong>ry. When cards are used, a section (also called a worldor city) of alters will be given its own computer. To access thatcomputer, a code consisting of several things including 2 cards c<strong>an</strong> beused. In review of what Chapter 4 said about codes, often doublecodes are employed--what is me<strong>an</strong>t by that is that suppose we have13 import<strong>an</strong>t alters in a section. <strong>The</strong>y will designate each of these “A”alters. <strong>The</strong>n they number them each 1 through 13. But then they willdouble code them so that as we count up, we also count down. <strong>The</strong>nthey attach a generic level number <strong>to</strong> them, say 2,000. So putting this<strong>to</strong>gether we have Emerald Green 2001-13a for our first alter, then nextis Emerald Green 2002-12a, the next is Emerald Green 2003-11a, <strong>an</strong>d soon. <strong>The</strong>n the magical name of the alter or the Tribal name of the alterc<strong>an</strong> be attached on<strong>to</strong> this <strong>to</strong> complete <strong>an</strong> access code. While it seemsperhaps complex at first, all <strong>an</strong> alter is remembering is a color, acommon section no. <strong>an</strong>d their r<strong>an</strong>k no. <strong>an</strong>d their file letter, <strong>an</strong>d their472


magical name. (<strong>The</strong> name <strong>to</strong> pull them up--will not be their name forpublic use.) Alice In Wonderl<strong>an</strong>d, the Wizard of Oz <strong>an</strong>d the Tall Book ofMake Believe played a fundamental role as “software” in a System. <strong>The</strong>Wizard of Oz s<strong>to</strong>ries are often used <strong>to</strong> show how & what structures <strong>to</strong>put in the small victim’s internal world. <strong>The</strong> s<strong>to</strong>ries even teach HOW <strong>to</strong>create <strong>an</strong> internal world <strong>an</strong>d its parts. Some of the T.V. shows & movies,which served as Monarch programming scripts (i.e. the software)include:Batm<strong>an</strong>BewitchedBobby’s World Car<strong>to</strong>ons (deliberate triggers)Dameon/Omen moviesDisney movies (all of them, some with deliberate triggers)Duck Tails Car<strong>to</strong>on (deliberate triggers)ET (used in alien programming)F<strong>an</strong>tasy Isl<strong>an</strong>d (deliberate triggers)Ghost Busters (used for “who ya’ gonna call” theme)Love Boat (used for mind control of cruise prostitutes)My Fair Lady (finishing school for slaves, such as Youngs<strong>to</strong>wn, OH)Star WarsSteven King Horror MoviesTiny Toons Car<strong>to</strong>ons of Steven Speilberg (deliberate triggers)Wizard of Oz moviesSome of the books which were used as programming scripts, whichhaven’t been mentioned yet, are the Dead Sea Scrolls, the Egypti<strong>an</strong>Book of the Dead (sat<strong>an</strong>ic rituals follow closely the rituals of theEgypti<strong>an</strong> Book of the Dead), Steven King novels, & Wilbur Smith’s. <strong>The</strong>Mother Goose nursery rhymes were used prolifically for internal codes inslaves. Now that we have discussed the widely used “soft ware”available <strong>to</strong> the programmers, we don’t w<strong>an</strong>t <strong>to</strong> forget the rootprogram, the tree which was used as a method of org<strong>an</strong>izing thevarious programs, just like a computer’s subdirec<strong>to</strong>ries br<strong>an</strong>ch out more473


subdirec<strong>to</strong>ries. If the programming is tampered with, the slave will w<strong>an</strong>t<strong>to</strong> cut the tree--however, since the tree is in them, this me<strong>an</strong>s they willw<strong>an</strong>t very badly <strong>to</strong> cut their arms, especially their veins. <strong>The</strong>programming is not guarded as much as the computers. Everythingguards the BEAST computer including deaf alters who have <strong>to</strong> becommunicated with using a h<strong>an</strong>d number code system. Such a codemight resemble finger signing 1,2,3,4,5,10 = 15 & following this with ashutdown code which simply reverses the access equation.Surrounding the central All-seeing-eye will be alters & programs withins<strong>an</strong>ity, fear, hopelessness, cutting, burning, aloneness, etc. Strongdemonic forces are attached <strong>to</strong> these alters & programs. <strong>The</strong>y also c<strong>an</strong>trigger the slave <strong>to</strong> have abusive behavior as punishment. A System isgiven a life force which is able <strong>to</strong> regenerate a system, the jokers whoprotected the programming, <strong>an</strong>d you have the alpha-numeric codes,the cards, <strong>an</strong>d dominoes (represented by a dice) that formed theaccess codes <strong>to</strong> parts of the System. <strong>The</strong> alters will often feel theheartbeat (which may be <strong>an</strong> alter) associated with the computer Inthe background is a Luciferi<strong>an</strong> blue light. This Sat<strong>an</strong>ic light empowersthe Joker. It along with the Joker <strong>an</strong>d the internal programmers give aSystem the ability <strong>to</strong> regenerate itself. One c<strong>an</strong> shut down internalcomputers which run programming <strong>to</strong> the levels of the System using thesame codes that the original programmers use, but until one also takescare of the 13 Jokers & the faceless white-coated programmers whocontrol the Omega Programming, then the back up computers c<strong>an</strong>regenerate the programming & rebuild the system.JOKERSIf the computers are given cards as access codes--it works in well <strong>to</strong>create Jokers who are wild cards within the system, which c<strong>an</strong> imitate<strong>an</strong>ything. <strong>The</strong> Jokers have a Luciferi<strong>an</strong> form. Luciferi<strong>an</strong> is the term thatthe programmers used. This me<strong>an</strong>s that it is spirit. Because the Jokersare Spirit, they c<strong>an</strong> take <strong>an</strong>y form they need <strong>to</strong> <strong>an</strong>d they c<strong>an</strong> do whatthey w<strong>an</strong>t <strong>to</strong> do, until they are bound & cast out with the rest of theirhierarchy of demons. <strong>The</strong> Jokers will pop up when a victim tries <strong>to</strong> studythe codes & programming that direct that victim’s life. Around this cultcore are the jewels (which are the programs the dwarfs mine).Remember the s<strong>to</strong>ry of Snow White <strong>an</strong>d the Seven dwarfs? Also swirlingaround Silence are ribbons which we will discuss later.TREES.<strong>The</strong> trees bud at certain times. This is one way the imagery of the tree474


<strong>to</strong> connect <strong>to</strong> the time that rituals are <strong>to</strong> happen. If the tree is barren ofleaves (no programs--i.e. deprogrammed), then the system is <strong>to</strong> growmore leaves.C -INTERNAL HIERARCHIES<strong>The</strong> programmers build chains of comm<strong>an</strong>d within the groups of altersthat they create. <strong>The</strong>y credit themselves with bringing order out ofchaos. When a system of multiple personalities thinks of rebelling, theyare in the similar situation as a colony w<strong>an</strong>ting freedom from its mothercountry. C<strong>an</strong> we govern ourselves, <strong>an</strong>d what governing structures c<strong>an</strong>we keep--since the structure itself is colonial? C<strong>an</strong> the mind work<strong>to</strong>gether <strong>to</strong> help itself? <strong>The</strong> concerns are legitimate questions. And yes,the multiple’s mind c<strong>an</strong> function outside of the control of theprogrammer’s hierarchial arr<strong>an</strong>gement, but not without alters taking ondifferent job assignments. In the slave’s hierarchal chain of comm<strong>an</strong>d,adult alters are assigned <strong>to</strong> insure that child alters don’t get out, unlessthe abusers w<strong>an</strong>t a child alter out. Likewise, comm<strong>an</strong>der alters areneeded <strong>to</strong> keep the switching smooth, <strong>an</strong>d <strong>to</strong> keep things orderly.Subordinate alters are taught <strong>to</strong> submit <strong>to</strong> their king, or governor, orqueen alter. Immense power <strong>an</strong>d indoctrination is given <strong>to</strong> the key cultalters ruling a system. <strong>The</strong> internal hierarchial arr<strong>an</strong>gement me<strong>an</strong>s thatthe host alter coming in<strong>to</strong> therapy (often a Christi<strong>an</strong>) may not be ascompletely open as therapists think. <strong>The</strong>y must play <strong>an</strong> internal gameof going <strong>to</strong>ward health while not pushing the but<strong>to</strong>ns of deeper morepowerful alters. A lot of internal politics may go on. A front alter maypromise a deeper alter secrecy in order <strong>to</strong> consult with it. This makes forall kinds of tri<strong>an</strong>gulation <strong>an</strong>d m<strong>an</strong>ipulation within the alter system itself.<strong>The</strong> entire hierarchy of alters has a lot invested in protecting the corefrom trauma, which was why the core was split in the beginning. Trad.therapy goes after the core & the multiplicity that protects it, thusinsuring resistence from the entire hierarchy incl. front alters, who inMPD systems seeking help are often close <strong>to</strong> the core. <strong>The</strong> core self isbest not directly pursued by the therapist, but gently encouraged on itsown <strong>to</strong> reconnect.475


476


CHAPTER 12.THE SCIENCE OF EXTERNAL CONTROLS477


A - MONITORING (ASSET CONTROL)Every intelligence service since time beg<strong>an</strong> has sought methods ofowning people <strong>an</strong>d ensuring they stayed loyal. Two of 13 <strong>Illuminati</strong>familieswho are known <strong>to</strong> have developed extremely well-runbloodline intel ligence groups are the Li family <strong>an</strong>d the Rothschildfamily. <strong>The</strong> Li’s family started its Chinese intelligence back in 1400 A.D.<strong>The</strong>y had already been <strong>an</strong> <strong>an</strong>cient chinese aris<strong>to</strong>cratic family for m<strong>an</strong>ycenturies prior <strong>to</strong> this. Some of their techniques for their agents werestate of the art mind control techniques. <strong>The</strong> Rothschild’s personal spynetwork <strong>an</strong>d their own mail service was known <strong>to</strong> be superior <strong>to</strong> thenational europe<strong>an</strong> governments during the 19th century. Traditionalspycraft has involved the ability <strong>to</strong> recruit <strong>an</strong>d keep agents loyal. <strong>The</strong>professional spook m<strong>an</strong>ipulates his recruits for a living. He becomesadept at controlling people. For thous<strong>an</strong>ds of years, spy operationshave honed their skills at controlling people. Because they worksecretly, they generally have done whatever they w<strong>an</strong>ted. When youcombine the resources <strong>an</strong>d centuries of intelligence operations of the<strong>Illuminati</strong>, along with the credibility of government intelligenceagencies supposedly guarding our national security, the combination ishorrific. <strong>The</strong>re are no moral or fin<strong>an</strong>cial restraints on what is being done.If the intelligence groups w<strong>an</strong>t <strong>to</strong> dabble in keeping a severed headalive apart from the body, (or a frozen body with <strong>an</strong> active head)which they have done, there is no one <strong>to</strong> s<strong>to</strong>p them. H<strong>an</strong>dlers of slavesuse both natural <strong>an</strong>d contrived cues <strong>to</strong> convey <strong>to</strong> the slave that theyw<strong>an</strong>t obedience. A natural non-verbal threat cue would be brusquemovements, <strong>an</strong>d <strong>an</strong> innuendo in their voice. A contrived cue would beplacing both h<strong>an</strong>ds behind the head, which is a code for “I AM YOURMASTER, OBEY ME.” Another cue for slaves <strong>to</strong> obey is when the mastermakes a fist with his right h<strong>an</strong>d <strong>an</strong>d <strong>to</strong>uches his forehead. This me<strong>an</strong>s,“OBEY.” Even children, who were multiples, who were being taught <strong>to</strong>control their mother who w<strong>an</strong>ted <strong>to</strong> leave the cult, have beenobserved using the fist <strong>to</strong> the forehead <strong>to</strong> try <strong>to</strong> get obedience fromtheir mother. Staring is one method that the Programmers use. CharlesM<strong>an</strong>son, who was both a slave <strong>an</strong>d a h<strong>an</strong>dler, is <strong>an</strong> example of how apenetrating hypnotic stare is used by the Programmers. One way <strong>to</strong>control people is <strong>to</strong> wear clothes of authority. Dr. Green, Dr. Black, Dr.Star, Michael Aquino <strong>an</strong>d other programmers have worn Nazi uniformswhile programming, <strong>an</strong>d at other time have worn Sat<strong>an</strong>ic Priestly garb.A beginning point <strong>to</strong> control people is underst<strong>an</strong>ding hum<strong>an</strong> needs,<strong>an</strong>d underst<strong>an</strong>ding the individual <strong>to</strong> be controlled. A good case officerlearns everything he c<strong>an</strong> about the asset (person or slave) he is <strong>to</strong>control. Case officers/h<strong>an</strong>dlers have been const<strong>an</strong>tly working at478


improving their skills of control. Monarch slaves who must function asintelligence officers, who recruit spies, are trained in the art of listening<strong>an</strong>d conversation. Learning <strong>to</strong> listen without interrupting is a guar<strong>an</strong>teeof success. CIA h<strong>an</strong>dlers/ programmers have <strong>an</strong> extremely personableside <strong>to</strong> them--<strong>an</strong>d a very deadly <strong>an</strong>imalistic side <strong>to</strong> them <strong>to</strong>o. <strong>The</strong>y willbe trained <strong>to</strong> look <strong>an</strong>yone they w<strong>an</strong>t <strong>to</strong> recruit in the eyes <strong>an</strong>dwithst<strong>an</strong>d their stare. “Friendship begins with a smile; recruitment with astare.” (This is a quote from the book Suvorov, Vik<strong>to</strong>r. Inside <strong>The</strong>Aquarium. New York: Macmill<strong>an</strong>, p. 108. During training, men in U.S.Army Intelligence are <strong>to</strong>ld <strong>to</strong> read this book <strong>to</strong> underst<strong>an</strong>d how U.S.intelligence works.) <strong>The</strong> entire lives of Monarch slaves are kept onrecords. Zbigniew Brezinski, <strong>an</strong>d the heads of the CIA, <strong>an</strong>d Sec. ofDefense Cheney are just some of the men known about who haveaccess <strong>to</strong> the computer records that contain records on every activeMonarch slave. Not everyone has a price, but everyone will respond <strong>to</strong>their needs being met. James K. V<strong>an</strong> Fleet, <strong>an</strong> import<strong>an</strong>t militaryintelligence officer, wrote about how <strong>to</strong> m<strong>an</strong>age people. In militaryintelligence, they keep files on people where they identify whichsubconscious desires of people are import<strong>an</strong>t <strong>to</strong> the person at the time.All this information is kept in SOFT FILES--which are not official files, sothese files have never officially existed <strong>an</strong>d are not given up even <strong>to</strong>Congressional subpoenas. <strong>The</strong> Intelligence agencies know that if theyfind out what the person w<strong>an</strong>ts above all else in life, they c<strong>an</strong> controlthe person. <strong>The</strong> nine areas that are moni<strong>to</strong>red <strong>to</strong> see if they areimport<strong>an</strong>t at the moment are:1. emotional security2. recognition of efforts or reassur<strong>an</strong>ce of worth3. creative outlets4. a sense of personal power5. a sense of roots--belonging somewhere6. immortality7. ego-gratification8. love in all its forms9. new experiences479


Once they moni<strong>to</strong>r these areas <strong>an</strong>d then they determine which needsare priority needs for the person, then they will use what they call “thedepth approach” <strong>to</strong> subconsciously gratify those needs in a way thatthey gain control over the person. Modern comp<strong>an</strong>ies are doing this<strong>to</strong>o. Dough mix isn’t sold, but making a family memory with the childrenis. Soap isn’t sold <strong>to</strong> get dishes cle<strong>an</strong>--but rather soft beautiful h<strong>an</strong>dsare sold. Cosmetic comp<strong>an</strong>ies don’t sell <strong>an</strong> item--they sell you hope or<strong>an</strong> image. Fruit dealers don’t sell fruit, they sell health <strong>an</strong>d vitality. Cardealers don’t sell cars, they sell prestige <strong>an</strong>d images. Freezers aren’tsold, emotional security from having a full freezer is sold. <strong>The</strong>y havelearned <strong>to</strong> genuinely appeal <strong>to</strong> the 9 subconscious desires. Inintelligence, these desires are called “weaknesses”, becauseintelligence case officers <strong>an</strong>d h<strong>an</strong>dlers will attempt <strong>to</strong> m<strong>an</strong>ipulatethose desires for their own gain by sincerely helping the person. <strong>The</strong>yset up short-r<strong>an</strong>ge & long term goals <strong>an</strong>d pl<strong>an</strong>s on how m<strong>an</strong>age aperson.For inst<strong>an</strong>ce, if a Monarch slave’s day <strong>to</strong> day alters w<strong>an</strong>t egogratification,a creative outlet, <strong>an</strong>d reassur<strong>an</strong>ce of worth, the <strong>Illuminati</strong>may promise the slave that if the alters comply they will give them asinging contract in Las Vegas. If they need <strong>to</strong> appeal <strong>to</strong> their emotionalsecurity--they c<strong>an</strong> promise a big salary <strong>an</strong>d a nice house. If they need<strong>to</strong> appeal <strong>to</strong> immortality they c<strong>an</strong> promise <strong>to</strong> award them a star onHollywood Boulevard or whatever religious immortality they c<strong>an</strong>credibly offer. (<strong>The</strong> slave will get the short end of <strong>an</strong>y deal.) Anythingthe slave gets is going <strong>to</strong> come at a price. <strong>The</strong> slave will have <strong>to</strong> dosomething in return for the Network. <strong>Illuminati</strong> alters are promisedpower, honor, glory <strong>an</strong>d wealth. Considering the power <strong>an</strong>d wealth ofthe elite, they do have the resources <strong>to</strong> make good on this if they w<strong>an</strong>t.However, the price of obedience might be <strong>to</strong> shave one’s head insubmission <strong>an</strong>d sacrifice a child. Another import<strong>an</strong>t point is that theabusers w<strong>an</strong>t <strong>to</strong> get the active cooperation of the person being used.This c<strong>an</strong> be accomplished by lies (or facts if they are convenient)which appeal <strong>to</strong> the person’s views of right <strong>an</strong>d wrong. For inst<strong>an</strong>ce, apedophile will talk <strong>to</strong> the child who they are going <strong>to</strong> rape <strong>to</strong> get itscooperation. <strong>The</strong> CIA h<strong>an</strong>dlers will listen <strong>to</strong> what a Slave needs, <strong>an</strong>dsolve it for them. Bear in mind, they will only do this if the slave doesn’tlive with the h<strong>an</strong>dler <strong>an</strong>d is pulling in the wrong direction. For inst<strong>an</strong>ce,the CIA has lots of sleepers, who are d<strong>an</strong>gerous people just waiting <strong>to</strong>be set off. In these cases, the CIA has <strong>to</strong> work with front alters whoaren’t aware of the mind control. Rather th<strong>an</strong> force <strong>an</strong> issue withcontrol, sometimes a gentle m<strong>an</strong>ipulation will work. <strong>The</strong>n again someslave alters are under such strong mind control that they simply need<strong>an</strong> order, <strong>an</strong>d don’t need gentle m<strong>an</strong>ipulation.<strong>The</strong> isolation that the h<strong>an</strong>dlers impose on their slave <strong>to</strong> prevent realrelationships with outsiders, <strong>an</strong>d the strong bonding of the slave <strong>to</strong> its480


master (trauma bonding, etc.) that is administered via the mindcontrol, actually provides a ch<strong>an</strong>ce for freedom IF the slave survives itsmaster’s death. Most slaves are programmed <strong>to</strong> die soon after theirmaster dies--the co-author Cisco was. If the slave survives the suicideprogramming, the <strong>Illuminati</strong> will have already taken in<strong>to</strong> considerationwho the slave will be passed on<strong>to</strong>. Cisco’s system survived theirprogrammer/master’s death, <strong>an</strong>d they were not able <strong>to</strong> break theintense bonds which made the System loyal <strong>to</strong> that master. Becausethere is so much secret mind-control slavery going on, if only a smallpercentage begin <strong>to</strong> break loose because their loyalty programmingbackfires on the <strong>Illuminati</strong>, it has still has given us on the other side asignific<strong>an</strong>t break. Another example of <strong>an</strong> MPD system becomingexposed when a h<strong>an</strong>dler dies, is when Rothschild, the President ofOilfield Scrap & Equipment in Kentucky, committed suicide. He was theh<strong>an</strong>dler of a highly functioning MPD slave, who was his secretary, MaryDavis. Mary Davis could not function after his death <strong>an</strong>d sued in court--Davis v. Oilfield Scrap & Equipment Co., 482 So.2d 970 (La. App. 3rd Cir.1986)--for worker’s compensation because she could not function afterher h<strong>an</strong>dler’s death. Because the <strong>Illuminati</strong> have kept their membershipsecret, people have not seen the connections between the variouscases of multiple personality that surface. In Iowa in 1987, a Multiplenamed Freem<strong>an</strong> was arrested for stealing a car. In South Carolina in1990, a Rutherford with MPD was in court. In North Dakata in 1988, <strong>an</strong>MPD daughter named Johnson tried <strong>to</strong> sue her abusive father namedJohnson for her sexual abuse. In 1984, a Multiple named Hall was hit bya truck <strong>an</strong>d was in court. In 1987, a Multiple named Jones tried <strong>to</strong> usehis MPD <strong>to</strong> get off of a murder conviction in Washing<strong>to</strong>n. In 1988, MarieMoore, a Multiple in N.J. r<strong>an</strong> a coven which <strong>to</strong>rtured teenagers. <strong>The</strong>police found a well hidden body in her house, but the corrupt judicialsystem did not convict her of murder. In 1988, a Ms. Wheeler appliedfor Social Security disability benefits due <strong>to</strong> mental impairments such asMPD. In each of these MPD cases: Freem<strong>an</strong>, Hall, Jones, Johnson,Moore, Rutherford, <strong>an</strong>d Wheeler are all surnames that have m<strong>an</strong>ymembers in the <strong>Illuminati</strong>. <strong>The</strong> secrecy of the <strong>Illuminati</strong> has protectedpeople from seeing their hidden genealogies. Tracking thesegenealogies would in turn start exposing the extent of their mindcontrol. As the h<strong>an</strong>dlers isolate the slave from mainstream society, theyc<strong>an</strong> begin <strong>to</strong> give them things that will satisfy their long suppressedemotional needs. <strong>The</strong>se are given in a way that they further lock theperson in <strong>to</strong> the control. For inst<strong>an</strong>ce, the slave has been stripped ofpower, he craves power--so he is given power over other people’slives. <strong>The</strong> slave has been stripped of its real family, so he is given rootsby a long generational occult bloodline, <strong>an</strong>d a cult family. EachMonarch slave exists in their own situation, but there are often commonfeatures <strong>to</strong> how they are controlled. For inst<strong>an</strong>ce, the h<strong>an</strong>dlers like <strong>to</strong>restrict the mobility of their slaves. Some of the slaves will never writetheir own checks, will never drive <strong>an</strong>ywhere, <strong>an</strong>d will seldom watch481


television unless it is something like a Walt Disney movie which is mindcontrolprogramming. Some slaves are allowed <strong>to</strong> drive, but only on alimited basis <strong>an</strong>d their sense of direction is stripped from themhypnotically. In J<strong>an</strong>uary, 1995, this co-author’s newsletter From AFollower of Christ had a feature article on Marilyn Monroe. Monarchmind-controlled slaves like Loretta Lynn <strong>an</strong>d Marilyn Monroe livedtightly controlled lives, <strong>an</strong>d were not allowed <strong>to</strong> drive au<strong>to</strong>mobiles. <strong>The</strong>one exception is that Loretta has been allowed <strong>to</strong> drive her car aroundthe r<strong>an</strong>ch. <strong>The</strong> following is some excerpts from the co-author’s J<strong>an</strong>uary‘95 newsletter because it gives a good example of how MarilynMonroe, a mind-controlled slave had her life very tightly controlled.EXCERPTS....... On a day in Oc<strong>to</strong>ber, 1957, a wom<strong>an</strong> named Lena Pepi<strong>to</strong>ne washired <strong>to</strong> take care of Marilyn Monroe. In 1979, she published hermemories of the time she was the primary person taking care of MarilynMonroe. I personally think that Lena Pepi<strong>to</strong>ne was cle<strong>an</strong>, <strong>an</strong>d didn’tknow what she was dealing with. She describes in detail her life withMarilyn Monroe. <strong>The</strong> inside s<strong>to</strong>ry of life with Marilyn is nothing like peoplemight imagine. Lena’s book is such a clear description of how life witha Monarch slave c<strong>an</strong> be--that I decided <strong>to</strong> use her book as the basis ofsome articles. Marilyn Monroe was <strong>an</strong> orph<strong>an</strong>, <strong>an</strong>d during her inf<strong>an</strong>cythe <strong>Illuminati</strong>/CIA programmed her <strong>to</strong> be a Monarch slave. Beforebecoming <strong>an</strong> actress, while she was still a stripper, she spent time withthe founder of the Church of Sat<strong>an</strong> An<strong>to</strong>n LaVey. Victims of LaVeyhave pointed him out as a mind-control programmer. At that time,Marilyn was going by several names including Mona. When they madeher a star, Marilyn lived on the 13th floor, in 13E at Sut<strong>to</strong>n Place, NY theworld of the rich <strong>an</strong>d famous. That is where Lena came <strong>to</strong> help her.However, Marilyn’s existence was not that of a rich person, but wasmore like that of <strong>an</strong> inmate. Marilyn was allowed <strong>to</strong> have no personallife, outside of the dictates of her programmers <strong>an</strong>d her masters. <strong>The</strong>programmers <strong>an</strong>d users bore down so hard on controlling Marilyn thatthey repeatedly came close <strong>to</strong> driving her ins<strong>an</strong>e. <strong>The</strong> following formatthe words in italic are direct quotes from Lena Pepi<strong>to</strong>ne’s book which isentitled Marilyn Monroe Confidential An Intimate Personal Account,NY: Simon & Schuster, 1979.p.16- “Floor-<strong>to</strong>-ceiling mirrors were everywhere. Even the diningalcove at the rear of the living room had a table with a mirrored <strong>to</strong>p.All these mirrors didn ‘t cheer things up.”482


In programming Monarch slaves, mirrors are used a great deal. Withinthe Monarch slave’s mind, countless mirror images are made. <strong>The</strong> slavesees thous<strong>an</strong>ds of mirrors everywhere in their mind. Because Marilynwas so stripped of <strong>an</strong>y personal identity, she decorated her house asher mind looked on the inside--full of mirrors. Although other Monarchsmay have some desires <strong>to</strong> decorate with mirrors, Marilyn is the mostextreme case I know of filling one’s house full of mirrors.p.25-- “Marilyn ‘s bedroom was definitely not a queen ‘s chamber...<strong>The</strong>re were no paintings in the cramped, square room, only mirrors.Marilyn’s controllers kept her down. Even when she was famous <strong>an</strong>dgreat, she lived like a slave. She was not allowed <strong>to</strong> have <strong>an</strong>y selfesteembeyond what she was programmed for.p.29 -- “May was finally able <strong>to</strong> callfor the chauffeur <strong>to</strong> take Marilynaway. “... Marilyn was a captive, she didn’t go <strong>an</strong>ywhere on her own,she always had someone drive her.p.32-- “First of all, Marilyn’s life was incredibly mono<strong>to</strong>nous for her. Herdoc<strong>to</strong>r ‘s appointments (I later learned these were appointments withpsychiatrists) <strong>an</strong>d her acting lessons were virtually all she had <strong>to</strong> lookforward <strong>to</strong>. She spent most of her time in her little bedroom... Marilynwent out of the house <strong>to</strong> be either programmed or groomed. Otherth<strong>an</strong> that she stayed cooped up in her room. Does the reader begin <strong>to</strong>see that the wom<strong>an</strong> was a slave with no life of her own?p.33-- “She [Marilyn] didn ‘t even own a television, never listened <strong>to</strong>the radio.” <strong>The</strong>y stripped Marilyn of <strong>an</strong>y contact with the outside world<strong>to</strong> insure that their mind control would work. <strong>The</strong>y were afraid thatsomething might go wrong with the first Presidential slave that wasallowed <strong>to</strong> be highly visible <strong>to</strong> the public....p.41-- [Marilyn says], “Shit. My life is shit, “she wept. “I c<strong>an</strong>’t go<strong>an</strong>ywhere. I’m a prisoner in this house. “Marilyn is only telling the truth.· p.43-- “Because Marilyn had no real friends, she concentrated onherself” <strong>The</strong> closest friend Marilyn had is saying that Marilyn Monroehad no real friends. Doesn’t that strike someone as str<strong>an</strong>ge. Marilyndidn’t have <strong>an</strong>y real friends. Almost the only ones in her life were herabusers, <strong>an</strong>d they worked hard <strong>to</strong> strip her of <strong>an</strong>y personal goals oresteem.p.70-- “You c<strong>an</strong> go <strong>an</strong>ywhere,” I [Lena] assured her. “Anywhere inthe world” “Who with? she asked sadly. “Who with? By myself””Mr.Miller, your friends...” “What friends? I am ‘t got nobody.” M<strong>an</strong>y timesduring the programming, the programmers separate the victim from<strong>an</strong>yone who could be a support person, they are isolated from having483


friends <strong>an</strong>d relatives unless the relatives are in the occult.p. 71 --Marilyn repeatedly calls herself a prostitute. She says, “<strong>The</strong>ylaugh at me. What am I . . . nothing... a prostitute. “Further on the pageMarilyn tells Lena that no one has cared about her for her entire life,including her mother....p.77-- “Don’t take my baby. So they <strong>to</strong>ok my baby from me... <strong>an</strong>d Inever saw it again. “After Marilyn had a healthy baby it was takenaway from her <strong>an</strong>d she was never allowed <strong>to</strong> see it. It was very likelysacrificed. Marilyn was <strong>to</strong>o afraid <strong>to</strong> ask what they were going <strong>to</strong> dowith it.p.100-- Marilyn loses her baby at the same place that some of herprogramming was done at. One c<strong>an</strong> speculate that they <strong>to</strong>ok thebaby for some perverted use....p.134 -- “<strong>The</strong> operation <strong>to</strong>ok place at Polyclinic Hospital whereMarilyn had lost her baby the year before... [Marilyn said]”Going back<strong>to</strong> that hospital’s a nightmare... .Pain? What ‘spain?” For her, the onlypain was in not having her own child” Notice she always go back <strong>to</strong>the Polyclinic Hospital. Monarch victims have had <strong>to</strong> endure vastamounts of horrible <strong>to</strong>rture. <strong>The</strong>y learn <strong>to</strong> survive by disassociation.When Marilyn says “What is pain?” she is being accurate in reflectingher response <strong>to</strong> pain. She could not have pain--because she woulddisassociate it. Certain alters are created <strong>to</strong> take the pain, <strong>an</strong>d theother alters don’t have <strong>to</strong> experience it.p.135-- “I found Marilyn in a small room without <strong>an</strong>y view. It was verydepressing, especially since there were no flowers or <strong>an</strong>y other signsthat Marilyn had friends who were thinking of her.” Imagine a greatac<strong>to</strong>r like Marilyn is given a room without a view <strong>an</strong>d no flowers or<strong>an</strong>ything <strong>to</strong> cheer her up.p.137-- “Marilyn’s now almost daily visits <strong>to</strong> the psychiatrists ... She wasclosely moni<strong>to</strong>red.p.193-- Marilyn’s half-sister tries <strong>to</strong> come in<strong>to</strong> Marilyn’s life. Marilynsays, “I have a right <strong>to</strong> have a family.” And on the next page, “Gee,you’re really my sister. My sister... At least you lived with relatives.”Marilyn’s masters did not w<strong>an</strong>t her <strong>to</strong> have <strong>an</strong>y family. <strong>The</strong>y often stripthe deeper alters of a Monarch slave from <strong>an</strong>y ties <strong>to</strong> <strong>an</strong>y non-cultperson....p.199--Marilyn orders a $3,000 Emerald green dress <strong>to</strong> be made.Emerald green is often the most favorite color of Monarch slavesbecause of their Wizard of Oz programming which is usually the484


foundational programming.p.202-- “Fr<strong>an</strong>k... clipped two gorgeous emerald earrings on Marilyn ‘sears.” Again we see that emerald green is often used by Monarchslaves.p. 205-- “A side from her evenings with Fr<strong>an</strong>k [Sinatra], Marilyn’s life inCal fornia seemed identical <strong>to</strong> her life in New York. She didn ‘t read,didn ‘t watch television, didn’t go <strong>an</strong>ywhere. Although the sun wasalways shining, Marilyn was as pale as ever. She didn’t like <strong>to</strong> gooutside during the day.”As time goes on the case officer or h<strong>an</strong>dler will weave <strong>an</strong>d ever firmingever tightening web of control around his asset. <strong>The</strong>y will often userapport. M<strong>an</strong>y of the CIA’s Monarch programmers are very likablepeople, they have learned the skill of “B.S.” <strong>an</strong>d building rapport. Someof this involves just underst<strong>an</strong>ding people <strong>an</strong>d NLP. <strong>The</strong> h<strong>an</strong>dler will lookfor telltale signs such as absenteeism, lateness, nervousness, orinconsistency. He will rely on intuition, spies, astral projection or psychicabilities <strong>to</strong> keep tabs on the asset. <strong>The</strong>n if a problem develops it will beaddressed with appeals <strong>to</strong> patriotism, greed, ambition, or fear.Whatever works is the mot<strong>to</strong> of the game. When slaves are picked up,the men picking them up are called Draconi<strong>an</strong> enforcers. Both authorsof this book are very familiar with some of these men. <strong>The</strong>y are oftenbig male Monarch slaves. A popular <strong>Illuminati</strong> access point is <strong>to</strong> grabthe right h<strong>an</strong>d with the enforcers thumb in the area between thevictim’s thumb <strong>an</strong>d index finger. <strong>The</strong> pressure will be strong enough <strong>to</strong>leave a bruise after the access. At different times in different statesthere have been patterns <strong>to</strong> what kind of car they drive. <strong>The</strong>y oftentake the cars from cooperating dealerships, so that there is no licensenumber <strong>to</strong> trace. <strong>The</strong>y also use s<strong>to</strong>len license plates on their cars. In1993, in NY they were using brown volkswagens. In the Oregon area(especially Portl<strong>an</strong>d), a full time Monarch slave enforcer named Rexdrives his large red pickup or at times someone else’s other vehicle (likehis <strong>Illuminati</strong> boss’s white pickup truck). He will carry a gun <strong>an</strong>d a cattleprod. <strong>The</strong> cars in some places have been often red or black. A white orsilver car sometimes is used <strong>to</strong> denote someone of r<strong>an</strong>k. Whenlimousines are used <strong>to</strong> pick up slaves, they may switch license platesregularly because the plates contain access codes. This was onereason the establishment beg<strong>an</strong> allowing people <strong>to</strong> cus<strong>to</strong>mize theirown license plates! When one w<strong>an</strong>ts <strong>to</strong> control a group of people, as aleader of a country Machiavelli’s book is great. Some of thoseprinciples c<strong>an</strong> be scaled down <strong>to</strong> working with individuals. Fritz hasobserved that almost across the board, if slaves are left within a noncultfamily, relatives will consistently misperceive what is happening in485


the slave’s life. Switches between personalities are reinterpreted <strong>to</strong> fitthe world view of the observer--the multiple is merely perceived as“moody” <strong>an</strong>d “irrational”. Half-way decent cover s<strong>to</strong>ries will generallysuffice <strong>to</strong> cover the slave’s activities for the mafia, the CIA, <strong>an</strong>d thesat<strong>an</strong>ic cult they belong <strong>to</strong>. <strong>The</strong> slave merely needs <strong>to</strong> pull up a goodfront alter for public consumption, for people w<strong>an</strong>t <strong>to</strong> think the best ofeveryone. <strong>The</strong> public will watch the 7-Sw<strong>an</strong>s fairy tale where a magicalcoat turns sw<strong>an</strong>s in<strong>to</strong> a princess, never guessing that a news s<strong>to</strong>ry fargreater is happening all around them. One way <strong>to</strong> control a person is<strong>to</strong> identify who the key people are in their life <strong>an</strong>d then influence thosepeople. Some of the work in controlling Monarch slaves goes onbehind the scenes, even without the slave ever realizing it. A number ofMonarch slaves have been m<strong>an</strong>euvered in<strong>to</strong> marriages without actualmind-control even being necessary. One of the items <strong>to</strong> successfullycontrolling people is that they know who they are taking orders from. Inthe military, officers get frustrated because they end up gettingconflicting orders from conflicting jurisdictions. This happens with thecontrol of Monarch slaves <strong>to</strong>o, when <strong>to</strong>o m<strong>an</strong>y chiefs <strong>an</strong>d not enoughindi<strong>an</strong>s are around. When a slave ends up serving several h<strong>an</strong>dlerswithin a short period of time they c<strong>an</strong> get really messed up. This isbecause the slaves receive severe abuse <strong>an</strong>d their programming c<strong>an</strong>be splintered <strong>an</strong>d destroyed if not h<strong>an</strong>dled correctly. Of course, theslave takes the blame, but that doesn’t eliminate the problem. If ah<strong>an</strong>dler w<strong>an</strong>ts a better ch<strong>an</strong>ce of his slave functioning smoothly, theslave shouldn’t be tampered with by lots of h<strong>an</strong>dlers. This commonsense logic of m<strong>an</strong>agement seems <strong>to</strong> have been missed by a largenumber of h<strong>an</strong>dlers. One thing c<strong>an</strong> be said, someone who is acommon drug dealer had better not tamper with <strong>an</strong> <strong>Illuminati</strong> Motherof Darkness alter slave if they w<strong>an</strong>t <strong>to</strong> stay alive. It appears that slavesare seldom tampered with without permission. Another ingredient incontrolling people is knowing what your competition is going <strong>to</strong> do.Because the cults work with the intelligence agencies, they often knowwho, what, where, when, <strong>an</strong>d how their enemies are going <strong>to</strong>challenge them. <strong>The</strong> authors of this book could write a book on howthe <strong>Illuminati</strong>/intelligence agencies have watched them. People suchas therapists <strong>an</strong>d ministers who challenge the Monarch trauma-basedprogramming have nice growing dossiers in CIA files. A note should bemade that the Americ<strong>an</strong> intelligence agencies tat<strong>to</strong>oed some of theirslaves with blue Monarch butterflies, bluebirds, or roses for identificationpurposes. <strong>The</strong> bluebird relates <strong>to</strong> the CIA project name Project Bluebird.Some sat<strong>an</strong>ic cults ta<strong>to</strong>o the “sign of the great Beast” on the heads ofvictims. <strong>The</strong>y also place scars with occult designs on their victims. <strong>The</strong><strong>Illuminati</strong> slaves, who are hierarchy members of the <strong>Illuminati</strong>, are nottat<strong>to</strong>oed, although a hard-<strong>to</strong>-see scar consisting of dots in a tri<strong>an</strong>gle onthe third eye is done <strong>to</strong> some members. <strong>The</strong> prohibition against markingup one’s body is not consistently enforced in the <strong>Illuminati</strong>--it seems thisst<strong>an</strong>dard is enforced more with the women th<strong>an</strong> the male <strong>Illuminati</strong>486


members. CIA slaves have received the Butterfly ta<strong>to</strong>os from the ageof about 11 on up.PLANNING A TYPICAL INTELLIGENCE OPERATION, or the STANDARDTEXTBOOK TECHNIQUES OF A MODERN INTELLIGENCE AGENCY.<strong>The</strong> following points are of a scenario which was developed as followsby the author: Fritz observed how the CIA were carrying out <strong>an</strong>operation <strong>to</strong> recapture a Monarch slave who was trying <strong>to</strong> escape.<strong>The</strong>se activities follow st<strong>an</strong>dard spook textbook methods, <strong>an</strong>d forinst<strong>an</strong>ce, fit the same patterns of <strong>an</strong> intelligence operationcodenamed Operation Sphinx described in detail in the book By Wayof Deception. By exposing how <strong>an</strong> operation is put <strong>to</strong>gether perhaps itwill become clearer how the CIA moni<strong>to</strong>r <strong>an</strong> asset they fear isescaping.POINT 1. An event that looked like <strong>an</strong> accident was pl<strong>an</strong>ned. <strong>The</strong> eventwas impossible <strong>to</strong> miss. This c<strong>an</strong> include car accidents, people wavingone down <strong>to</strong> tell you that you have a flat tire, etc.POINT 2. <strong>The</strong>y studied their prey <strong>to</strong> determine his/her routine. <strong>The</strong>y willwatch a residence intently <strong>to</strong> determine the person’s routine <strong>an</strong>d takeadv<strong>an</strong>tage of this.POINT 3. <strong>The</strong>n <strong>an</strong> insignific<strong>an</strong>t accidental event is pl<strong>an</strong>ned. Repeatedly,in the m<strong>an</strong>y Monarch people the authors have known, the tiniestinsignific<strong>an</strong>t points in people’s lives are being m<strong>an</strong>ipulated. (Bear inmind the intelligence people are carried away <strong>an</strong>d overdo much ofwhat they do, even over pl<strong>an</strong>ning some of their ops.)POINT 4. <strong>The</strong> chief is given the order <strong>to</strong> “hit at convenience.” <strong>The</strong>y arewatching <strong>an</strong>d probing <strong>to</strong> discover a weak point, <strong>an</strong>d when they find aweak point they will strike at convenience.POINT 5. Listening devices are installed. (<strong>The</strong> <strong>Illuminati</strong>’s intelligenceagencies are illegally moni<strong>to</strong>ring the Jives of Americ<strong>an</strong>s with bugs thatgo up <strong>to</strong> 2 Ghz. Comp<strong>an</strong>ies like Tektronics which work with the CIA areselling counters which won’t detect bugs at 2 Ghz. In other words, whatis mainly sold the public is inadequate, but BK Precision does sell acounter which goes past 2 Ghz. for those who w<strong>an</strong>t <strong>to</strong> know when theyare being illegally spied upon. Since MI-6 & the CIA cooperate, the CIAc<strong>an</strong> simply say that their Americ<strong>an</strong> intelligence information is from MI-6.It may be illegal for the CIA <strong>to</strong> spy in the U.S.-ha! no one s<strong>to</strong>ps them,487


ut British MI-6 c<strong>an</strong> legally spy on Americ<strong>an</strong> citizens.) <strong>The</strong> intell. groupsthemselves use BABBLERS, which are electronic devices that emit noise& chatter & destroy the effectiveness of bugs.POINT 6. Teams of experts are brought in <strong>to</strong> brains<strong>to</strong>rm about theoperation. <strong>The</strong> people called in on a case will be coordinated by ateam or teams. One of these teams will consist of various experts whosecombined brains will give great ability <strong>to</strong> pl<strong>an</strong>.POINT 7. <strong>The</strong> person will be watched by moving in <strong>an</strong> observer in<strong>to</strong> <strong>an</strong>earby building.POINT 8. An intelligence wom<strong>an</strong> or m<strong>an</strong> will be sent door <strong>to</strong> door sellingperfume or something else--perhaps they will pose as Jehovah’sWitnesses.POINT 9. <strong>The</strong> door <strong>to</strong> door undercover intelligence person will be verypersonable, very nice <strong>to</strong> talk <strong>to</strong>.POINT 10. <strong>The</strong> team will take all the surveill<strong>an</strong>ce information <strong>an</strong>d spendhours going over every detail, <strong>an</strong>d they will debate <strong>an</strong>d get tense asthey hash out the signific<strong>an</strong>ce of certain intelligence pieces ofinformation as they work out a pl<strong>an</strong> of action.POINT 11. <strong>The</strong> Intelligence people will take adv<strong>an</strong>tage of the socialneeds of someone close <strong>to</strong> their prey. <strong>The</strong>y might give his wife someopportunities for fun things away from the house. <strong>The</strong>y know how <strong>to</strong>take adv<strong>an</strong>tage very quickly & smoothly of the social needs of peoplewho are around a Monarch slave. (<strong>The</strong>y put used car salesmen <strong>to</strong>shame.)POINT 12. <strong>The</strong> intelligence people have the capability <strong>to</strong> enter withoutkeys.POINT 13. <strong>The</strong>y practice “motionless following.” That me<strong>an</strong>s theyfollowed people in shifts. <strong>The</strong>y will follow by tag teams so <strong>to</strong> speak, <strong>an</strong>duse car phones.POINT 14. <strong>The</strong>y like <strong>to</strong> use “trade” occupations as a cover.POINT 15. <strong>The</strong> m<strong>an</strong> will give a business card which had <strong>an</strong> actual office,etc. but which was a front. <strong>The</strong>y will be willing <strong>to</strong> give a business card--which is a real address, but only a CIA front. <strong>The</strong> day they realize theyare exposed, the phone will quit working. H<strong>an</strong>dlers <strong>an</strong>d men within theNetwork often use business cards <strong>an</strong>d other cards they carry in theirwallets as codes indicating various things. In intelligence operations,the agents will take their “intelligence--that is the info they have488


collected, <strong>an</strong>d put it through 4 steps. 1) “direction”, who is going <strong>to</strong>collect what where. 2) “collection”, the actual spying. 3) “processing”,<strong>an</strong>alyzing <strong>an</strong>d integrating what they have collected, <strong>an</strong>d 4)“dissemination”, distributing (via reports, talks, charts) the <strong>an</strong>alyzed <strong>an</strong>drewritten reports <strong>to</strong> their cus<strong>to</strong>mers. Most of the intelligence groupshave a reputation for dis<strong>to</strong>rting the truth in the third stage <strong>to</strong> fit theiragency’s “party line”. Count St.-Germain (169?-1784) is a goodexample of <strong>an</strong> intelligence officer. He was one of the leading <strong>Illuminati</strong>of his time. He did alchemy for Louis XV, <strong>an</strong>d magic for the Masonicleader Karl, prince of Hesse. He spied for the Dutch <strong>an</strong>d the French,<strong>an</strong>d who knows who else. His fundamental allegi<strong>an</strong>ce was <strong>to</strong> theMystery Religions of the <strong>Illuminati</strong>. Modern day examples are LordVic<strong>to</strong>r Rothschild, one of the leaders of MI-6, Sir Dick Goldsmith White,Jewish, Mason, & leader of MI-6 from 5 6-69, Sir John Rennie leader ofMI-6 from 69-73 whose son Charles Tatham Ogilvy Rennie was a known,major drug runner, Major General Sir John Sinclair, of the <strong>Illuminati</strong>, MI-6chief from ‘53-56. MI-S has had a number of <strong>Illuminati</strong>/Freemasonscalled Direc<strong>to</strong>r-Generals (rather th<strong>an</strong> Chiefs) running it <strong>to</strong>o. Nigel West,a pseudonym for a m<strong>an</strong> who worked for MI-6 devoted <strong>an</strong> entirechapter in his book MI-S about how Hugh As<strong>to</strong>r <strong>an</strong>d Vic<strong>to</strong>r Rothschildr<strong>an</strong> Britain’s double agent division. ALL, I repeat ALL of the Germ<strong>an</strong>agents spying on Engl<strong>an</strong>d during W.W. II were double-agents actuallyworking for the British. If <strong>an</strong>yone tried <strong>to</strong> work for the Germ<strong>an</strong>’s secretservice who wasn’t disloyal, that person could only work for theGerm<strong>an</strong>s IF they turned in<strong>to</strong> a double agent for the British. Today,almost every one working against MI-5, MI-6 <strong>an</strong>d the <strong>Illuminati</strong>’s NewWorld Order, is a double agent. This book may be followed by <strong>an</strong>umber of similar books by double agents of the New World Order’sNetwork.CIA OPERATIONS INVOLVING GEORGE WHITEGeorge White, working for the MK Ultra <strong>Mind</strong> Control program suppliedduring the 1950s a long list of prostitutes <strong>to</strong> the CIA for study. During the1950s, the CIA was refining its knowledge of what makes a prostitutetick. How do you use them? How do you train them? How do youteach them <strong>to</strong> do both espionage <strong>an</strong>d seduction. What are theelements of seduction? All these sciences were refined. For inst<strong>an</strong>ce, ifa prostitute stays longer th<strong>an</strong> she is paid for, she will shock the john, <strong>an</strong>dhe will find his ego greatly boosted. With the right methods, theprostitute agent c<strong>an</strong> elicit all types of secrets from the vulnerable male.With the ability <strong>to</strong> create Black Widow Spiders (deadly seductiveMonarch alters), the <strong>Illuminati</strong> gained one more sure method <strong>to</strong> controlothers. Seduction <strong>an</strong>d then blackmail. <strong>The</strong> CIA, just as FBI J. EdgarHoover did, keeps detailed files on sexual preferences. It supplies what489


people w<strong>an</strong>t, but the supply comes with a price that the individual isnow under blackmail.B - BLACKMAILThis dirty game has been honed <strong>to</strong> a fine art, which is a st<strong>an</strong>dardfeature of the <strong>Illuminati</strong>/intelligence groups. <strong>The</strong> CIA term for blackmailis <strong>an</strong> “OK FIX.” When they use a person’s past sins <strong>to</strong> force someone <strong>to</strong>do something they refer <strong>to</strong> this as “biographic leverage.” Any weakpoint in a person c<strong>an</strong> <strong>an</strong>d will be exploited. Sexual entrapment forblackmail is referred <strong>to</strong> as a ‘HONEY TRAP”. Black widow alters arebeing trained <strong>an</strong>d sent out for this purpose. Blackmail of the slavebegins when it is beginning <strong>to</strong> get verbal. At 3, the cults will tell a childthey have a bomb pl<strong>an</strong>ted inside them, that the cult c<strong>an</strong> de<strong>to</strong>nate ifthey don’t obey. In order <strong>to</strong> blackmail, or threaten, you have <strong>to</strong> havesomething <strong>to</strong> threaten the person with. Men are frequently entrappedby sexual behavior which is criminal. Sometimes they are alsoentrapped by murder. <strong>The</strong> Monarch slave will be allowed <strong>to</strong> havechildren so that they c<strong>an</strong> be blackmailed in<strong>to</strong> complying <strong>to</strong> save thechildren or gr<strong>an</strong>dchildren. <strong>The</strong> Monarch slave in turn may be used <strong>to</strong>blackmail others. Certain alters are trained in this. A Monarch Betamodel is highly trained in seduction <strong>an</strong>d will seduce a m<strong>an</strong>. <strong>The</strong>n <strong>an</strong>alter which feigns death will take the body <strong>an</strong>d the m<strong>an</strong> will bethreatened for having killed the wom<strong>an</strong>. M<strong>an</strong>y politici<strong>an</strong>s <strong>an</strong>d ministersare operating under blackmail <strong>to</strong>day. When Jimmy Swaggart’ s ministryfell, over 200 Assembly of God ministers called headquarters <strong>an</strong>dconfessed that they had similar problems. <strong>The</strong> extent that blackmail isbeing used by the NWO would boggle people’s minds. Porn films aretaken of the Monarch victims, so that they c<strong>an</strong> be used <strong>to</strong> blackmailthe victim. Monarch victims are forced <strong>to</strong> commit ritual murders whichare pho<strong>to</strong>graphed <strong>an</strong>d then used <strong>to</strong> blackmail the poor mindcontrolledvictim. Perhaps, one of the cruelest forms of blackmail whichis carried routinely by h<strong>an</strong>dlers, is the threat <strong>to</strong> incarcerate the mindcontrolledslave in a mental hospital. <strong>The</strong> co-author Fritz has read <strong>an</strong>umber of books about the situation in America’s mental hospitals, <strong>an</strong>dsections of these books will literally make a person vomit from disgust.<strong>The</strong> legal climate in this nation has made it easy <strong>to</strong> stick someone elsein a mental hospital. Once there, they are routinely given tr<strong>an</strong>quilizersMellaril, Thorazine or Stelazine so that they c<strong>an</strong>’t rebel against the mostwretched conditions. Nadine Scolla was a nurse in a mental hospitalwho wrote <strong>an</strong> expose based on her diary while she worked. Her book isentitled Keeper of the Keys (Westlake Village, CA: F&J Publishing Corp.,1976) <strong>The</strong> following are quotes from her account of working in a mentalhospital, “How c<strong>an</strong> they allow such places <strong>to</strong> exist? <strong>The</strong>y really need <strong>to</strong>reform, but who is going <strong>to</strong> do it?.. .We’re supposed <strong>to</strong> be civilized <strong>an</strong>d490


yet m<strong>an</strong>y people are treated worse th<strong>an</strong> the lowest form of <strong>an</strong>imals.Who cares about these patients? (p. 15).. .Doc<strong>to</strong>rs receive onehundred thous<strong>an</strong>d dollars a year starting salary, <strong>an</strong>d the nursingpersonnel receive the highest pay in the profession, <strong>an</strong>d yet thepatients get the worst of care. (p. 19).. .I could see that the patientshad no rights here. (p.27)... [on page 49-50 she reports about a secrethospital grave yard where patients could be buried without <strong>an</strong>yoneknowing].. .Do you remember the young rape victim <strong>an</strong>d how theytreated her-the girl with beautiful olive skin <strong>an</strong>d long brown hair?... <strong>The</strong>yfilled the bath tub with cubes of large ice <strong>an</strong>d dropped her in<strong>to</strong> it. <strong>The</strong>yremoved her from that <strong>an</strong>d placed her in scalding hot water. Shecame out red as a lobster. Her body was badly blistered. This treatmentdidn’t help, so they decided upon shock treatment. ‘I never saw<strong>an</strong>ything so awful in all my life. <strong>The</strong>y forcibly strapped her down, tiedher h<strong>an</strong>ds <strong>an</strong>d legs, stuck the electrodes <strong>to</strong> her head <strong>an</strong>d placed a<strong>to</strong>ngue blade in her mouth. She couldn’t scream, wiggle, or do<strong>an</strong>ything. After the treatment.. .Tammey was dead. Her body was limpshewas still trapped in the chair. It was more th<strong>an</strong> I could take. I had <strong>to</strong>go off by myself <strong>an</strong>d cry.’ (p.51) I don’t underst<strong>an</strong>d how our localgovernment c<strong>an</strong> allow these people <strong>to</strong> be treated worse th<strong>an</strong> a dog inthe local pound. At least the <strong>an</strong>imals have their own cubicle <strong>an</strong>d theirown food dish. (p.73)” According <strong>to</strong> what Nadine Scolla was <strong>to</strong>ld, halfof the patients in mental hospitals are schizophrenics. A heftypercentage of these “schizophrenics” are really programmed multipleswho are being quietly discarded by the system. How m<strong>an</strong>y victims oftrauma-based <strong>to</strong>tal mind-control have ended up sent <strong>to</strong> mentalhospitals? M<strong>an</strong>y tens of thous<strong>an</strong>ds, maybe the exact number will neverbe known. America’s mental hospitals have also played <strong>an</strong> active rolein the programming <strong>an</strong>d the research for the programming.C - BRIBES<strong>The</strong>ir skill at bribes is <strong>an</strong> extension of underst<strong>an</strong>ding hum<strong>an</strong> nature, <strong>an</strong>dhum<strong>an</strong> needs <strong>an</strong>d w<strong>an</strong>ts. It works <strong>to</strong>gether with blackmail.D - <strong>The</strong> CONTROL of the MILIEUOne of the basic ideas of creating a mind-controlled slave, is <strong>to</strong> controlthe entire milieu of the slave. This is expressed in Nexus Seven. <strong>The</strong>environment of the slave is designed for what is called “s<strong>to</strong>ryimmersion.” A Monarch slave who has been given the basic Alice InWonderl<strong>an</strong>d <strong>an</strong>d Wizard of Oz programming will see objectsconnected <strong>to</strong> these s<strong>to</strong>ry lines in almost every s<strong>to</strong>re. Restaur<strong>an</strong>ts in491


Dallas <strong>an</strong>d S<strong>an</strong> An<strong>to</strong>nio (<strong>The</strong> Time Machine Restaur<strong>an</strong>ts) which areused <strong>to</strong> reinforce programming, have mirrors on their walls, doors <strong>an</strong>dceilings <strong>an</strong>d their waitresses dressed like programming scriptcharacters--such as Dorothy of the Wizard of Oz. It is no accident tha<strong>to</strong>ne of the leading Sat<strong>an</strong>ic singers calls himself Ozzy Ozburn, or that acertain Mexic<strong>an</strong> witch calls herself Oz. It is no accident that recently awitch wrote the book <strong>The</strong> Witches of Oz. It is no accident that the elitehave promoted the Wizard of Oz theme with television productadvertisements. It is no accident that the U.S. has Oz stamps, thattelevision has Oz car<strong>to</strong>ons, <strong>an</strong>d Oz characters are appearing all overthe place. For a while even K<strong>an</strong>sas had <strong>an</strong> Oz theme <strong>to</strong> their licenseplates (“L<strong>an</strong>d of Ahs”). Hillary Clin<strong>to</strong>n, (a 6th level <strong>Illuminati</strong> witch &sadistic Monarch slave h<strong>an</strong>dler) received a witch’s hat in <strong>an</strong>ticipationthat she would be called the wicked witch of the West, <strong>an</strong>d that MaryMatalin (who married Clin<strong>to</strong>n’s <strong>to</strong>p campaign advisor James Carville)had a pho<strong>to</strong>graph of Hillary Clin<strong>to</strong>n as the Wicked Witch of the West onher wall with the caption “I will get you, my pretty, <strong>an</strong>d your little dog<strong>to</strong>o!” <strong>The</strong> witch’s hat <strong>an</strong>d the caption both are popular with thesepeople associated with the White House because they are so rich intriple <strong>an</strong>d quadruple me<strong>an</strong>ings. <strong>The</strong> deadliest me<strong>an</strong>ing is that theMonarch Slaves that sexually service Hillary <strong>an</strong>d Bill Clin<strong>to</strong>n have Wizardof Oz programming. Hillary is really the Wicked Witch of the West! <strong>to</strong>these poor Beta slaves. <strong>The</strong> const<strong>an</strong>t bumping in<strong>to</strong> Wizard of Ozparaphernalia or pictures of it helps focus the slave’s mind on<strong>to</strong> theirWizard of Oz programming. MGM Gr<strong>an</strong>d recently built a multi-milliondollar pyramid complex with a theme park which is based on theWizard of Oz <strong>an</strong>d the Alice in Wonderl<strong>an</strong>d themes. <strong>The</strong> hotel at theMGM Gr<strong>an</strong>d is the world’s largest with 5,000 rooms, which shows thatmind-control is big business. A team of ac<strong>to</strong>rs dressed up in the Wizardof Oz theme like Dorothy <strong>an</strong>d her friends (Tin m<strong>an</strong> & Scarecrow) <strong>an</strong>dwalked on a yellow brick road constructed in the MGM complex.Emerald City is part of the theme park. <strong>The</strong> complex cost $1 billionaccording <strong>to</strong> the Las Vegas Review Journal, Dec. 19, ‘93 page Al. Thiscomplex is given the occult name Luxor, <strong>an</strong>d is at 3900 Las VegasBoulevard South. It has been advertised as the “Next Wonder of theWorld.” It’s a shame that the 1990’s big wonder is a programmingcenter. Another part of the control of the Milieu is labelled “pl<strong>an</strong>nedspont<strong>an</strong>eity” by the controllers. <strong>The</strong> Monarch victim repeatedly findsexperiences “just happening.” <strong>The</strong>se are the coincidences that are somystical that people feel there must be a higher signific<strong>an</strong>ce <strong>to</strong> theevent. M<strong>an</strong>y of these are well-staged events. A slave may try <strong>to</strong>escape marrying the person they are comm<strong>an</strong>ded <strong>to</strong> marry. <strong>The</strong>h<strong>an</strong>dlers stay one step ahead of the slave, <strong>an</strong>d through a series ofcoincidences introduce <strong>an</strong>other acceptable person. <strong>The</strong> slave in <strong>an</strong>effort <strong>to</strong> escape grabs the first available substitute who has beencoached on how <strong>to</strong> push all the correct green mental but<strong>to</strong>ns <strong>to</strong> getthe escapee <strong>to</strong> marry them. ‘<strong>The</strong> slave jumps from the frying p<strong>an</strong> in<strong>to</strong>492


the fire. Things which validate the programming <strong>an</strong>d the mysticalbeliefs of the cult will be repeatedly introduced. <strong>The</strong> skill in introducingthese secretly in<strong>to</strong> the life of the slave are amazing. <strong>The</strong>re is no limit <strong>to</strong>what c<strong>an</strong> be attempted, <strong>an</strong>d some of these staged events are worthyof Houdini. <strong>The</strong> occult world has placed their symbols all over theUnited States. <strong>The</strong> most esteemed institutions such as Walt Disney arefountains of the occult. Walt Disney movies are steeped in magic, <strong>an</strong>dyet Americ<strong>an</strong> society is so drowned in the occult, they have beendesensitized <strong>to</strong> how it permeates Americ<strong>an</strong> culture. <strong>The</strong> concept of“Sacred knowledge” versus “prof<strong>an</strong>e knowledge” is introduced. If theslave should escape, the first choice is <strong>to</strong> send someone who c<strong>an</strong> pickthem up. I have heard of slaves escaping from Europe on the pl<strong>an</strong>e,only <strong>to</strong> be picked up by a h<strong>an</strong>dler when they l<strong>an</strong>d in New York. Mt.Shasta’s programming site, accessed by helicopter, specializes inreprogramming escaped slaves. Jerry Lee Lewis has a no<strong>to</strong>riousreputation among the Network as being exceptionally sadistic inreprogramming escapees. However, if the slave is not needed, <strong>an</strong>d isw<strong>an</strong>ting out--tens of thous<strong>an</strong>ds of them have been locked up inmental hospitals as par<strong>an</strong>oid schizophrenics. In the mental hospitalsthey c<strong>an</strong> continue <strong>to</strong> get drugs <strong>an</strong>d electro-shock--the very things thatcaused their problems in the first place. <strong>The</strong> insiders have a name forthese slaves, they call them “broken butterflies”. If the slave tries <strong>to</strong> go<strong>to</strong> court, according <strong>to</strong> some the Non Compos Mentis Law preventsthem from testifying against their abusers. At <strong>an</strong>y rate, with or withoutthis law it would not be easy for a victim <strong>to</strong> get his testimony accordedthe respect it deserves. If they get psychiatric help--their therapist c<strong>an</strong>not tell <strong>an</strong>yone about what they have suffered, <strong>an</strong>d the therapist ishamstrung about what they c<strong>an</strong> do in court for the client. Recently, 15states have created statutes of limitations on sadistic rape. This is inresponse <strong>to</strong> all the Monarch slaves who have begun recoveringmemories. ·<strong>The</strong> extent that entire culture <strong>an</strong>d society protect theMonarch Programming is enormous. Anyone admitting MPD (aka DID)is in fear of being labelled crazy <strong>an</strong>d losing some of their rights <strong>an</strong>d theirjob. Because the conspiracy (the Network) is so vast, <strong>an</strong> examination ofhow the <strong>Illuminati</strong> controls society would be needed <strong>to</strong> cover thesubject of milieu control. This would take <strong>an</strong> entire book. <strong>The</strong> reader isencouraged <strong>to</strong> read some of Fritz Springmeier’s other works whichexpose how the <strong>Illuminati</strong>’ s control extends over all levels of society.Most people have settled their minds on this issue without getting thefacts. When the real facts are shown, it blows people’s minds. Some ofthe easiest <strong>an</strong>d everyday items <strong>to</strong> show people, are simply a dollar bill--with its <strong>Illuminati</strong> symbol on the back, <strong>an</strong>d a c<strong>an</strong> of vegetables whichhas a bar code on it. Every bar code has 3 secret <strong>an</strong>d non-functionalnumbers in the bar code, which are 666. <strong>The</strong> silent hammer that strikesout at the Monarch slave is that everywhere they go, the occult worldis there. Several cars are named after Sat<strong>an</strong>. <strong>The</strong> name Saturn, <strong>an</strong>dBelair are well-known as occult names for Sat<strong>an</strong>. When Freemasonry’s493


greatest philosopher/<strong>Illuminati</strong> <strong>Mind</strong>-control Programmer/Gr<strong>an</strong>d DruidCouncil member M<strong>an</strong>ly P. Hall wrote Cabalistic Keys <strong>to</strong> the Lord’sPrayer (Los Angeles, CA: <strong>The</strong> Philosophical Research Society, 1964, p.10) he wrote “Saturn = Hallowed be thy name.” <strong>The</strong> men who headthese au<strong>to</strong> m<strong>an</strong>ufacturing comp<strong>an</strong>ies are in the <strong>Illuminati</strong>. <strong>The</strong>re is noquestion that they were NOT ignor<strong>an</strong>t of the signific<strong>an</strong>ce of thesenames. M<strong>an</strong>y other occult names of big signific<strong>an</strong>ce <strong>to</strong> the <strong>Illuminati</strong>involving eagles have been placed on cars. Electra is a recent carnamed after a demon. Viper is a slow <strong>an</strong>d deadly creature, why wouldone w<strong>an</strong>t <strong>to</strong> use it <strong>to</strong> name a car? Viper is also the name of <strong>an</strong>import<strong>an</strong>t demon. Viper is found in Black Widow Monarch slaves. Somereaders may begin <strong>to</strong> feel that things are being stretched. <strong>The</strong>connections of numerous car names <strong>to</strong> the occult could be exposed,but that is not the purpose of this book. We will quote straight from acomp<strong>an</strong>y their own expl<strong>an</strong>ation for their car’s name in this nextparagraph, simply <strong>to</strong> make the point, whether other perceive it or not,the Monarch slaves have <strong>to</strong> exist in a world full of sat<strong>an</strong>ic/occultsymbology that ordinary people don’t underst<strong>an</strong>d. Mazda’s president,Norimasa Furuta, published a book in 1990 which it intended <strong>to</strong> give <strong>to</strong>all its employees. <strong>The</strong> book explains its purpose “...we have written abooklet <strong>to</strong> explain how MAZDA became the name of our corporation<strong>an</strong>d what it me<strong>an</strong>s in order <strong>to</strong> help everyone who is related <strong>to</strong> MAZDAenh<strong>an</strong>ce their creativity <strong>an</strong>d develop their potential.” <strong>The</strong> bookentitled <strong>The</strong> Globe: In Search of the Origins of Mazda, goes on <strong>to</strong>explain about the founder of Mazda car comp<strong>an</strong>y, Matsuda Jujiro,who is heralded as a great seer who “believed in himself, in his friends,<strong>an</strong>d in heaven, <strong>an</strong>d he achieved a truly global vision.” Mazdacomp<strong>an</strong>y’s book <strong>The</strong> Globe then explains that the comp<strong>an</strong>y nameMazda comes from the god Ahura-Mazda which was the “god of light”<strong>an</strong>d the “god of wisdom” according <strong>to</strong> the book. Jujiro believed thatMazda represents the “origin of civilization.” <strong>The</strong> “god of light” (Lucifer)is often credited for starting civilization by those who aren’t Christi<strong>an</strong>s.<strong>The</strong> name Mazda according <strong>The</strong> Globe symbolizes “unlimited possibility<strong>an</strong>d stimulates people’s dreams.” Mazda’s book puts down in writingtheir New Age goals <strong>to</strong> “establish peace for m<strong>an</strong>kind with a globalpoint of view,” <strong>an</strong>d “a spiritual foundation” <strong>to</strong>ward which <strong>to</strong> work<strong>to</strong>ward a “new age.” <strong>The</strong> book further states civilization started in Egypt<strong>an</strong>d that Christi<strong>an</strong>ity evolved from the pag<strong>an</strong> mystery religions. Anotherbook associated with Mazda cars, is the book <strong>The</strong> Me<strong>an</strong>ing of Lifegiven <strong>to</strong> everyone who test-drives a Mazda--that was as long as booksupplies last. I quote the book “...the time when regions <strong>an</strong>d continentsexisted keeping a certain dist<strong>an</strong>ce from each other is a thing of thepast.... We are eager <strong>to</strong> tr<strong>an</strong>smit the me<strong>an</strong>ing of MAZDA <strong>to</strong> the childrenof MAZDA who will create a new MAZDA... With a strong desire forpeace <strong>an</strong>d through the production <strong>an</strong>d sale of au<strong>to</strong>mobiles <strong>an</strong>dmachine <strong>to</strong>ols, MAZDA has adv<strong>an</strong>ced on a course <strong>to</strong> unite the peopleof the world” [bold added] (pp 78-79.) An adept of the <strong>Illuminati</strong> is494


taught about Ahura Mazda. He would know that Mazda was thePersi<strong>an</strong> God of Light who was also known as Ormus--which is <strong>an</strong>othername for the Preiure de Sion, which is a powerful group protecting the13th <strong>Illuminati</strong> Bloodline. Some of the names of cars which could betriggering <strong>to</strong> SRA survivors include the Demon, the Vagabond, DodgeRam (Goat of Mendes), Buick’s Phoenix, Ford’s Cobra, Mercury’sCougar, Eagle Jeeps, the Le Baron Eagle Logo, Navistar Eagle Truck(which may have Eagle mud flaps, <strong>an</strong>d Goodyear Eagle GT tires). Formost of us <strong>an</strong> eagle is a symbol of what is noble <strong>an</strong>d beautiful.His<strong>to</strong>rically, the eagle <strong>an</strong>d the snake have been the logo of the tribe ofD<strong>an</strong>, considered the “black sheep” of the 12 tribes. <strong>The</strong> Prophet Hoseasaid, “Set the trumpet <strong>to</strong> thy mouth. He shall come as <strong>an</strong> eagle againstthe house of the LORD, because they have tr<strong>an</strong>sgressed my coven<strong>an</strong>t,<strong>an</strong>d trespassed against my law.” (HOS 8:1) And the Prophet Obadiahsaid, “Though thou exalt thyself as the eagle, <strong>an</strong>d though thou set thynest among the stars, thence will I bring thee down, saith the Lord.” (OB1:4) <strong>The</strong> co-authors of this book didn’t create <strong>Illuminati</strong> his<strong>to</strong>ry nor theirsymbols. We are only reporting on them. We would like the eaglesimply <strong>to</strong> represent what is noble <strong>an</strong>d fearfully made by God. Indeed,in some verses like in Isaiah the eagle has a positive connotation.However, the construct, the refraining that is done by the <strong>Illuminati</strong>upon these symbols is that the eagle represents Sat<strong>an</strong>’s empire. <strong>The</strong>Assyri<strong>an</strong>, Rom<strong>an</strong>, <strong>an</strong>d Nazi empires used the eagle. <strong>The</strong> <strong>Illuminati</strong> pointthese things out <strong>to</strong> their initiates, <strong>an</strong>d ask, “Is this a symbol ofChristi<strong>an</strong>ity, or the power of our lineages which ruled those empires?” Itis not the co-authors desire <strong>to</strong> interpret what Hosea <strong>an</strong>d Obadiahme<strong>an</strong>t. Nor is it our desire <strong>to</strong> dissuade <strong>an</strong>yone from buying the carsmentioned above. Our only point is that the survivor lives in a world ofoccult symbols <strong>an</strong>d occult programming triggers. How do youconvince someone <strong>to</strong> quit fearing the power of their abusers when ithas its symbols on their money, their c<strong>an</strong>ned food, their cars, <strong>an</strong>d theirchurches? (Yes, there are such things as All-Seeing Eyes in somechurches <strong>an</strong>d Masonic logos on others, <strong>an</strong>d other occult symbols.Hislop’s <strong>The</strong> Two Babylons is devoted <strong>to</strong> showing all the pag<strong>an</strong>symbology in the Catholic church.) Are we exaggerating? Fritz wentin<strong>to</strong> one fast food restaur<strong>an</strong>t <strong>an</strong>d the cups <strong>an</strong>d placemats had awizard throwing occult energy balls with occult symbols, the next fastfood place had place mats showing the King Arthur s<strong>to</strong>ry which is <strong>an</strong>extremely import<strong>an</strong>t myth for the <strong>Illuminati</strong> (the quest for the Grail!), thenext fast food place had place mats giving children instructions onhow <strong>to</strong> hypnotize your parents, the next one had a Wizard of Oztheme, <strong>an</strong>d the next one was selling occult movies. Fritz kept theseplace mats <strong>to</strong> use in his talks! This nation is immersed in the occult <strong>an</strong>dso desensitized they don’t realize it. <strong>The</strong> public thinks nothing of aGargoyle Coloring/Activity book. This type of thing is commonplace inAmeric<strong>an</strong> society. If one examines Golden Book’s GargoyleColoring/Activity book (1995) still being sold, you will find Gargoyle495


demons named after geographic locations that the child c<strong>an</strong> color,you will find a Magus with a Book of Spells that the child c<strong>an</strong> color. Foractivities, the child c<strong>an</strong> duplicate pictures, work codes, matchshadows with their figures, match objects <strong>an</strong>d images, <strong>an</strong>d work withrobot heads of which several c<strong>an</strong> be placed on one body. All theseactivities reinforce the type of skills that the programmers w<strong>an</strong>t childrenunder mind-control <strong>to</strong> have. <strong>The</strong> book has castles, robots, a sentenceabout a kitten which is a code about a computer disk, <strong>an</strong>d mazes. Aperfect book for the programmers <strong>to</strong> give a child, <strong>an</strong>d the naive publicwalks by these kinds of books on their s<strong>to</strong>re shelves everyday. <strong>The</strong><strong>Illuminati</strong>’s mind-control goes on in part right in front of America’s nose,<strong>an</strong>d they don’t see it. One of the saddest things for Monarch mindcontrolsurvivors is that the Programmers are so systematic in destroyingeverything of beauty <strong>an</strong>d value in life. Everything conceivable that c<strong>an</strong>be degraded will be. This mind-control has spread like <strong>an</strong> unseenc<strong>an</strong>cer <strong>to</strong> every segment of life, <strong>an</strong>d threatens <strong>to</strong> destroy this nationfrom the inside out. Imagine that every time you heard your ownnational <strong>an</strong>them that it reinforced your mind-control programming?That is the life of these victims of mind-control. We wish the Americ<strong>an</strong>people could realize that George Bush <strong>an</strong>d Bill Clin<strong>to</strong>n are on the sameteam. Both are descend<strong>an</strong>ts of the <strong>to</strong>p 13 <strong>Illuminati</strong> bloodlines, bothare <strong>to</strong>tally corrupt morally, both are in<strong>to</strong> the occult, <strong>an</strong>d both weretrained by the same person in subliminal l<strong>an</strong>guage techniques. <strong>The</strong>best in subliminal l<strong>an</strong>guage techniques is said <strong>to</strong> be Tony Robins, <strong>an</strong>dhe is who the elite got <strong>to</strong> train both George Bush <strong>an</strong>d Bill Clin<strong>to</strong>n.Monarch <strong>Mind</strong> Controlled Slaves have been created since the late 1940s. Since the early ‘60s, Monarch Slaves have been specially createdfor Americ<strong>an</strong> presidents. <strong>The</strong>se models are called Presidential Models.<strong>The</strong>re are now living about 600 people (Monarch slaves) who werecreated in<strong>to</strong> Presidential Models. That is a large harem. PresidentialModels fit a particular set of physical st<strong>an</strong>dards, not one of thePresidential sex slaves has been black. President Kennedy, Johnson,Nixon, Ford, Bush, Reag<strong>an</strong> <strong>an</strong>d Clin<strong>to</strong>n have all been slave h<strong>an</strong>dlers.M<strong>an</strong>y slaves have some deeper alters who have a realization that theirPresidents are in on the corruption, how does that make them feel? <strong>The</strong>cults which program pay particular attention <strong>to</strong> show the child, men inpolice uniforms <strong>an</strong>d ministers of churches which are participating withthe cult. This has the effect of embedding in the mind of the victim thatthere is no escape--that the entire structure of society is secretly incahoots with the programmers. Not all policemen nor all ministers aredirty, but because of the Monarch program, the entire structure ofAmeric<strong>an</strong> society has been seriously compromised <strong>to</strong> the extent that allsec<strong>to</strong>rs are infiltrated <strong>an</strong>d contaminated. Unfortunately, the worst fearsof the victims, are in reality close <strong>to</strong> the truth. <strong>The</strong> Monarch victim isfurther victimized because no-one w<strong>an</strong>ts <strong>to</strong> believe them in howcontrolled Americ<strong>an</strong> society has become. <strong>The</strong> truth is we are on theverge of losing civilization as we know it, <strong>an</strong>d entering in<strong>to</strong> a dark496


sadistic slave-master society that will make Hitler’s Third Reich look likechild play. What part of our lives are not controlled. We go <strong>to</strong> our jobs--our boss is naturally given the right <strong>to</strong> control us. For m<strong>an</strong>y centuries, theMachiavelli<strong>an</strong> elite have provided the masses with “Bread <strong>an</strong>d Circus”.That me<strong>an</strong>s “keep the people feed <strong>an</strong>d entertained <strong>an</strong>d they will notrebel.” After Americ<strong>an</strong>s come home they are kept busy withentertainment. <strong>The</strong> only exception <strong>to</strong> their work, <strong>an</strong>d TV watching, aretheir trips <strong>to</strong> their churches. Even the various religions are secretly underelite control. See Fritz’s Be Wise As Serpents book for <strong>an</strong> 800 pageexpose of how the various Christi<strong>an</strong> groups <strong>an</strong>d New Age Religions arecontrolled. <strong>The</strong> point is that people are kept busy <strong>an</strong>d occupied, <strong>an</strong>dthey seldom try <strong>to</strong> step outside of the path that the elite w<strong>an</strong>t them <strong>to</strong>stay in. A slave’s front system will be a normal busy person for years,while the deeper alters serve their various functions for the elite. <strong>The</strong>re issimply little that occurs that shakes the routine that gets established. Ifthe h<strong>an</strong>dler doesn’t live with the slave himself, he will often place<strong>an</strong>other slave as the spouse, <strong>to</strong> oversee the slave. <strong>The</strong> marriagecouple’s deeper alters spy on each other. <strong>The</strong> schools that the slaveswill go <strong>to</strong> are often controlled by the abusers. Some of the moreobvious ones are Gro<strong>to</strong>n, a school for the elite’s children, <strong>an</strong>d S<strong>an</strong>taClara University <strong>an</strong>d Williamette University used by the <strong>Illuminati</strong> <strong>to</strong> traintheir politici<strong>an</strong>s for public office. <strong>The</strong> Beta <strong>The</strong>ta Pi is a political fraternitythrough which quite a few <strong>Illuminati</strong> politici<strong>an</strong>s have joined. <strong>The</strong> Jesuitschools throughout the United States are used for abuse <strong>an</strong>dprogramming. Note, that Bill Clin<strong>to</strong>n went <strong>to</strong> the Jesuit university inWashing<strong>to</strong>n, D.C. called George<strong>to</strong>wn University. A number of themilitary school that parents ship their elementary boys off <strong>to</strong> are usedby the elite for the ongoing abuse <strong>an</strong>d programming of slaves. <strong>The</strong><strong>Illuminati</strong> foundation, the W.K. Kellogg Foundation, gave the initialfunding for the Quest Program for the public schools. <strong>The</strong> QuestProgram is being adopted by various public schools. It also goes by thenames Skills for Adolescence, Skills for Growing, <strong>an</strong>d Skills for Living. Oneof the early editions of Quest had <strong>an</strong> exercise called “eleva<strong>to</strong>r” wherethe teacher uses visualization <strong>an</strong>d guided imagery. <strong>The</strong> teacher placesher school children in a mild hypnotic tr<strong>an</strong>ce described in the Questliterature as “a quiet contemplative mood.” <strong>The</strong>n the teacher tells thestudents, “You are on <strong>an</strong> eleva<strong>to</strong>r.” Each but<strong>to</strong>n on the eleva<strong>to</strong>rrepresents <strong>an</strong> age of the child. When the students push a but<strong>to</strong>n, theeleva<strong>to</strong>r takes them back <strong>to</strong> experiences at that age. It is not possiblein the scope of this book <strong>to</strong> cover how every sec<strong>to</strong>r of our lives arecontrolled. Those who are interested need <strong>to</strong> read some of FritzSpringmeier’s other writing including Be Wise As Serpents. However, itwould be appropriate <strong>to</strong> cover how television shows <strong>an</strong>d Hollywoodare intimately linked <strong>to</strong> Monarch <strong>Mind</strong>-Control programming. A greatdeal that is coming out of Hollywood is linked <strong>to</strong> mind-control in somefashion. Some of the hottest entertainers are Monarch slaves, such asMadonna, a Marilyn Monroe replacement. Co-author Fritz was given a497


catalog <strong>to</strong> Vidimax, which is <strong>an</strong> New Jersey occult porn video club bysomeone w<strong>an</strong>ting <strong>to</strong> help his research. This cult video club sells actuallysnuff films. <strong>The</strong>y sell the real life footage of c<strong>an</strong>nibalism, virgin sacrifices,occult rituals, <strong>an</strong>d worse. When Madonna was a teenage slave withthe name Louise Chiccone living in NY East Village, a real life film wasmade of her being raped (a setup), <strong>an</strong>d then her cult family taking therapist <strong>an</strong>d sacrificing him. Vidimax sells this for $19 <strong>to</strong> their members.Some of their videos are live footage of how kidnapped people havebeen <strong>to</strong>rtured in<strong>to</strong> becoming slaves. One of the catalog listing says,“<strong>to</strong>rtured until their wills are broken <strong>an</strong>d they become Olga’s submissiveslaves!...WARNING EXTREME GRAPHIC VIOLENCE...BACK BY POPULARDEMAND.” By the way, the <strong>Illuminati</strong> have their own private porndistribution. M<strong>an</strong>y people ask, “Why do they need mind-controlledslaves?” Part of the <strong>an</strong>swer is they need them <strong>to</strong> make their sick porn.<strong>The</strong> his<strong>to</strong>ry of the connections between the entertainment world <strong>an</strong>dthe occult <strong>an</strong>d royalty go far back. One group of people known fortheir travelling entertainment, the gypsies, have some interestingparallels with the <strong>Illuminati</strong> bloodlines. A gypsy proverb is, “If you w<strong>an</strong>t<strong>to</strong> stay survive, you must be a devil.” Both groups have kept theirbloodlines <strong>an</strong>d their identity. Both are secretive. Both groups livedouble lives. Gypsy children will be given a secret magical name, <strong>an</strong>da name <strong>to</strong> use for outsiders. Gypsy children are often baptized in amagical circle. Both groups are in<strong>to</strong> the occult, such as c<strong>an</strong>nibalism,black magic, the evil eye, <strong>an</strong>d white slavery. <strong>The</strong> gypsies believe inChar<strong>an</strong>i, a big bird consumed by fire who rises from the ashes. <strong>The</strong><strong>Illuminati</strong> call this the Phoenix. Both groups have a secret code thatallows them <strong>to</strong> do <strong>an</strong>ything <strong>to</strong> outsiders (who are called “Gadja” bygypsies me<strong>an</strong>ing “enemy”). <strong>The</strong> gypsies originated in India <strong>an</strong>dmigrated west <strong>to</strong> Ir<strong>an</strong> <strong>an</strong>d Turkey <strong>an</strong>d then <strong>to</strong> Greece <strong>an</strong>d then in<strong>to</strong>western Europe in the 1400s just prior <strong>to</strong> <strong>an</strong> occult revival in Europe. <strong>The</strong>largest gypsy tribe in India is Ghor. <strong>The</strong>y follow Durga (Kali). Other tribesalso worship Kali under different names such as the Black Virgin forwhich they make <strong>an</strong> effigy called “Bibiaca” which simply me<strong>an</strong>s“lady”. Gypsies made up early groups of travelling entertainers. SirFr<strong>an</strong>cis Bacon, who wrote under the pen name of Shakespeare, wasthe founder/leader of the Rosicruci<strong>an</strong>s of his time. (<strong>The</strong> proof of whoShakespeare was is in several books, for inst<strong>an</strong>ce, see Alfred Dodd’sresearch in his excellent book Fr<strong>an</strong>cis Bacon ‘s Personal Life S<strong>to</strong>ry.) <strong>The</strong>previous two paragraphs are offered as examples of how close theoccult world <strong>an</strong>d entertainment have been over the centuries. <strong>The</strong>his<strong>to</strong>ry of the two worlds coincide for m<strong>an</strong>y centuries back, so itshouldn’t come as a surprise that <strong>to</strong>day’s entertainment industry is stillclosely linked <strong>to</strong> the occult world, nor should it come as a surprise thatthe <strong>Illuminati</strong> have made sure they have control over the industry.During W.W.II, the entire country was mobilized for the war effort <strong>an</strong>dHollywood was recruited so <strong>to</strong> speak <strong>to</strong> help with the war effort. Forinst<strong>an</strong>ce, car<strong>to</strong>ons were created as training films <strong>an</strong>d as war498


propag<strong>an</strong>da. <strong>The</strong> military hired thous<strong>an</strong>ds of entertainers for USOCamp Shows, Inc. which was under the Special Services Division of theU.S. Army. Bob Hope, who worked for MI-6, British overseas intelligence,was the leading entertainer for USO <strong>to</strong>urs. After the war broke out hewent on 12 major overseas <strong>to</strong>urs which <strong>to</strong>ok him <strong>an</strong>d his beautiful troopof stunning knock-out girls <strong>to</strong> every front of the war--from the quietfronts like P<strong>an</strong>ama <strong>to</strong> places like Italy <strong>an</strong>d North Africa. To make a longs<strong>to</strong>ry short, Bob Hope was used <strong>to</strong> run messages <strong>to</strong> programmedmultiples for British & Americ<strong>an</strong> Intelligence. Later, after the war BobHope became a slave h<strong>an</strong>dler. In some of Fritz’s other writings, BobHope’s connections <strong>to</strong> the <strong>Illuminati</strong> are gone in<strong>to</strong>. U.S.O. magici<strong>an</strong>swere found <strong>to</strong> be the most overall popular USO show. <strong>The</strong> InternationalBrotherhood of Magici<strong>an</strong>s is intimately connected <strong>to</strong> the occult world<strong>an</strong>d puts out a magazine <strong>The</strong> Linking Ring. Under the auspices of theUSO (controlled by military intelligence) the country western industry’sroots developed. <strong>The</strong> country western industry became a front for drugrunning, money laundering <strong>an</strong>d white slavery for the Programmers ofMonarch <strong>to</strong>tal <strong>Mind</strong>-controlled slaves. <strong>The</strong> USO also created at least200 b<strong>an</strong>ds, from which came Lawrence Welk’s b<strong>an</strong>d, Sam Donahue’sb<strong>an</strong>d, Claude Thombill’s b<strong>an</strong>d, <strong>an</strong>d Guy Lombardo’s b<strong>an</strong>d <strong>to</strong> name afew. Over the last 45 years perhaps the most popular place for couriers<strong>to</strong> be signalled <strong>to</strong> meet was by someone holding a bird in a cage or ata shop with birdcages. <strong>The</strong> allusion <strong>to</strong> carrier pigeons is so obvious. Lookat a caption “Speaking of WRENS” with a car<strong>to</strong>on from Bob Hope’sbook I Never Left Home (NY: Simon & Schuster, 1944) written in 1944during the middle of W.W. II. <strong>The</strong> car<strong>to</strong>on shows Bob chasing a girl witha bird cage <strong>an</strong>d saying, “Tweet, Tweet, Tweet.” Hypnotic comm<strong>an</strong>dsare given 3 times. What seems like a harmless car<strong>to</strong>on, is more like asignal telling people that Bob Hope is in charge of a flock of carrierpigeons (couriers), which we know he was. When talking <strong>to</strong> a group ofsoldiers during the war, Bob said, “In London the bobbies caught a guywalking around in the fog with a bird cage giving the mating call butthe Americ<strong>an</strong> counsel got me.”Walter Bowart in his researcher’s edition of Operation <strong>Mind</strong> Controldiscusses the case of two W.W. II vets, who had their W.W. II memorieserased by the military using drugs, hypnosis <strong>an</strong>d behavior modification,before they were released from the army in 1947. This is found inCassiday, Karen <strong>an</strong>d Judith A. Lyons. “Recall of Traumatic MemoriesFollowing Cerebral Vascular Accident” Journal of Traumatic Stress. NY:Plenum Pub. Vol. 5, No. 4, Oct. 1992, p. 627. <strong>The</strong> point is that evidence is499


surfacing from various locations that the U.S. government was carryingout mind-control during WW II. This was done under the auspices ofBritish Intelligence (MI-6) during W.W. II. When C<strong>an</strong>ada entered theW.W. II with Britain, one of the best british secret agent training schoolswas set up between Whitly, Ont. <strong>an</strong>d Oshawa, Ont. on Lake Ontario’snorth shore across from the U.S.-C<strong>an</strong>. border. <strong>The</strong> site was calledIntrepid Park. Agents called it “the camp” or “the farm”. Today, the CIAhave their own “farm” (Camp Perry). <strong>The</strong> official British name for this spycamp was British Security Coordination Special Training School No. 103& Hydra. STS 103. It was also known as Camp X. British SOE (SpecialOperations Executive) set itself in NYC. Americ<strong>an</strong>s from the FBI <strong>an</strong>d OSSwent <strong>to</strong> Camp X for training, as well as the SOE,SIS, BSC, <strong>an</strong>d theC<strong>an</strong>adi<strong>an</strong> RCMP. <strong>The</strong> British were already using mind-control at thisstage. <strong>The</strong> connections are endless. Edgar Allen Poe, who was in<strong>to</strong> theoccult <strong>an</strong>d worked for British intelligence wrote <strong>The</strong> Raven. VincentPrice starred in Hollywood’s version of the Raven, <strong>an</strong>d passages of thebook have been used as codes for a number of Monarch slaves, whohad <strong>to</strong> memorize portions of the book with their pho<strong>to</strong>graphicmemories. Warner Communications came out with the book/& movie“Sybil” which is about a wom<strong>an</strong> with multiple personalities. <strong>The</strong> book<strong>an</strong>d movie “Sybil” are full of mental slides (misinformation de<strong>to</strong>urs arecalled “slides” by the CIA) <strong>to</strong> prevent people from looking <strong>an</strong>d thinkingin the right directions concerning MPD. Structured MPD (DID) like Sybil’s,occurs only from very specific trauma-based programming. Even thename Sybil is <strong>an</strong> occult name, although the idea that occult wasinvolved in creating Sybil’s MPD is not hinted at. <strong>The</strong> chief fin<strong>an</strong>cialpower behind Warner Communications was the <strong>Illuminati</strong>/PilgrimSociety member Eugene R. Black, retired head of the World B<strong>an</strong>k.Warner Communications is headquartered at Rockefeller Plaza, <strong>an</strong>dhas produced quite a few occult movies <strong>an</strong>d occult books, forinst<strong>an</strong>ce their movie about a demon “It Lives Again.” When Monarchslaves watch television, the shows they watch c<strong>an</strong> relate <strong>to</strong> theirprogramming in the following ways.1. First, m<strong>an</strong>y of the shows have code words or programming scenarioswhich are deliberately in the shows <strong>to</strong> control the slaves: such as StarWars, Star Trek, <strong>The</strong> Wizard of Oz, the Love Boat, F<strong>an</strong>tasy Isl<strong>an</strong>d, I Dreamof Je<strong>an</strong>ie (Delta Genie in the bottle programming, <strong>an</strong>d “YOUR WISH ISMY COMMAND” type trigger), <strong>The</strong> Little Princess, the Miss UniverseContest 1995, Duck Tails (created <strong>to</strong> control child slaves, withdeliberate triggers such as “earthquack”), Bobby’s World car<strong>to</strong>on,Steven Spielberg’s Tiny Toons, My Fair Lady (used in several of the slavefinishing schools), ET (for alien programming), etc.2. Some of the shows which are supposedly pure fiction show elements500


of actual <strong>Illuminati</strong> ceremonies, <strong>Illuminati</strong> his<strong>to</strong>ry, drug running methods,etc., such Bell, Book & C<strong>an</strong>dle, Burn Witch Burn, Curse of <strong>The</strong> Voodoo,Equinox, M<strong>an</strong>os, <strong>The</strong> H<strong>an</strong>ds of Fate, Witchcraft ‘70, as Spirits of theLiving Dead, Fr<strong>an</strong>kenstein, Night of the Living Dead, Bewitched (withactual witches as ac<strong>to</strong>rs). Raising Cain shows <strong>to</strong>rture <strong>an</strong>d MPD.Hellraiser 3 depicts “gatekeepers.”3. Some of the shows portray the Monarch <strong>to</strong>tal mind-control program(!): Telephon, <strong>The</strong> M<strong>an</strong>churi<strong>an</strong> C<strong>an</strong>didate, Videodrome, Labyrinth,Tr<strong>an</strong>cer II, <strong>The</strong> Attack of the Robots, Dr. Goldfoot & the Bikini Machine,Attack of the Puppet People, <strong>The</strong> War of the Zombies, Colossus-<strong>The</strong>Forbin Project, <strong>an</strong>d <strong>The</strong> Point of No Return starring J<strong>an</strong>e Fonda’sBridgett, who is connected <strong>to</strong> the OTO. (By the way, Monarch mindcontrolledslaves have been shown the movie “Telephon” <strong>to</strong>emphasize <strong>to</strong> them that their minds are controlled by their h<strong>an</strong>dlers,<strong>an</strong>d for them not <strong>to</strong> forget it.)4. M<strong>an</strong>y of the movies <strong>an</strong>d shows use Monarch slaves as ac<strong>to</strong>rs &performers: such as Ros<strong>an</strong>ne Barr, Bette Mittler, Marilyn Monroe, LorettaLynn, Crystal Gayle <strong>an</strong>d possibly Wayne New<strong>to</strong>n (a child singingprotege, who never wrote a check for himself in his life). <strong>The</strong>y also uselots of slave h<strong>an</strong>dlers such as Fr<strong>an</strong>k Sinatra, Peter Lawford, & Bob Hope.And occasionally the use programmers such as An<strong>to</strong>n LaVey, Jerry LeeLewis. Cisco, the co-author of this book, while in the <strong>Illuminati</strong>, wasgiven repeated reason <strong>to</strong> believe that Elvis Presley was also a Multipleprogrammed by the <strong>Illuminati</strong>. We know that at times he went by codenames, one which is publicly known was John Burrows. His group,called the Memphis Mafia, have talked about his ability <strong>to</strong> go in<strong>to</strong>altered states of consciousness, even seem dead. Recently, <strong>an</strong>other<strong>Illuminati</strong> slave, also stated that Elvis was <strong>an</strong> <strong>Illuminati</strong> slave. Cisco pointsout that Elvis’ twin brother was dead at his birth, <strong>an</strong>d that Elvis knewthat this gave him double spiritual power (according <strong>to</strong> <strong>Illuminati</strong>beliefs). <strong>The</strong> <strong>Illuminati</strong> will often kill a twin, so that the other will get thepower of two souls. From what we underst<strong>an</strong>d, Elvis Presley’sh<strong>an</strong>dler/programmer was a Col. Tom Parker. Elvis belonged <strong>to</strong> a teamof 4 <strong>Illuminati</strong> men. Elvis is publicly known <strong>to</strong> have studied yoga,numerology, drugs, <strong>an</strong>d received some new age spiritual training in <strong>an</strong>academy overlooking Pasadena, CA. He was <strong>an</strong> active member in the<strong>The</strong>osophical Society. After Elvis Presley supposedly died, the SunInternational Corp. came out with <strong>an</strong> Elvis Presley album called Orion,with the winged-sun-disk on its cover. <strong>The</strong> winged-sun-disk is <strong>an</strong>import<strong>an</strong>t Egypti<strong>an</strong> magical symbol used by the OTO, <strong>The</strong>osophicalSociety etc. Mae Boren Ax<strong>to</strong>n, known as the Gr<strong>an</strong>d Dame of Nashville,played a pivotal role in Elvis Presley’s life. Elvis & the Beatles werechosen by the <strong>Illuminati</strong> <strong>to</strong> introduce rock music <strong>to</strong> the United States.<strong>The</strong>re is no doubt about Elvis’ <strong>an</strong>d the Beatles’ musical talent. Elvis’close friend Wayne New<strong>to</strong>n is highly suspected as also being a slave.501


Elvis worked with Burt Reynolds <strong>an</strong>d Jerry Lee Lewis who also connect inwith the <strong>Illuminati</strong>’s mind-control operations. <strong>The</strong> authors are puzzledwhy Elvis’ grave, which had millions of dollars spent on its security, hashis name misspelled? We are also puzzled why Elvis, who repeatedlystated he w<strong>an</strong>ted <strong>to</strong> be buried beside his mother, is buried beside hisfather, who he privately stated wasn’t even his real father. Why has noone ever tried <strong>to</strong> collect insur<strong>an</strong>ce on Elvis’ death? Once again, itseems, the front s<strong>to</strong>ries that the public hears are full of inconsistencies.We believe that some people in the <strong>Illuminati</strong> know the true s<strong>to</strong>ry aboutElvis Presley. For sure Elvis’ mysterious mind-control programmer/h<strong>an</strong>dlerCol. Tom Parker would know.STAR TREK, THE NEXT GENERATION<strong>The</strong> original series of Star Trek had lost money, but in September, 1987 <strong>an</strong>ew series called Star Trek, <strong>The</strong> Next Generation was started with $1million dollars budgeted for each of its 24 episodes. <strong>The</strong> episodespushed the <strong>Illuminati</strong>’s agenda in every show. People were beingaroused <strong>to</strong> bombard Paramount with requests for a new Star Trek. BobJustm<strong>an</strong> who worked with Roddenberry said, “When I left Star Trek in1968 it was a disaster. It was a failure as far as the network wasconcerned.” That is because it didn’t make money. Hollywood tells us itmakes these movies because they are what the public w<strong>an</strong>t <strong>an</strong>d thatthey have <strong>to</strong> go where the money is--the closer truth is that Hollywoodmakes movies that push <strong>an</strong> agenda--Hollywood makes movies thatHollywood w<strong>an</strong>ts <strong>to</strong> make. And since Star Trek was part of the NWO’smind-control, the show <strong>an</strong>d it successors had <strong>to</strong> go on. How import<strong>an</strong>tis Star Trek? A witness has talked about Boeing workers sneaking offtheir jobs <strong>an</strong>d hiding in the tunnels underneath the hugh Seattle Boeingpl<strong>an</strong>t so they could watch Star Trek shows. This enormous Boeing pl<strong>an</strong>tis used for rituals <strong>an</strong>d mind-control. This Boeing building is enormous, forit is where they have assembly lines <strong>to</strong> build the hugh jets, like the 747s,707s, etc. An extensive maze of tunnels lays underneath the mainbuilding, large enough <strong>to</strong> accommodate all the tens of thous<strong>an</strong>ds ofworkers on <strong>an</strong>y shift. It is interesting who was associated with theproduction of Star Trek: <strong>The</strong> Next Generation. Script writers for the NextGeneration had a Star Trek Bible <strong>to</strong> write from. <strong>The</strong>se script writersincluded such persons as Al<strong>an</strong> Adler, Dennis Putnam Bailey, threeGrays, Debra Mclntrye, Ronald Moore, Gr<strong>an</strong>t Rosenberg, R<strong>an</strong>deeRussell, Bry<strong>an</strong> Stewart. <strong>The</strong>se are common names within the <strong>Illuminati</strong>.Coca-cola, <strong>an</strong> <strong>Illuminati</strong>-run corporation, was one of the majoradvertisers for Star Trek, <strong>an</strong>d the god-m<strong>an</strong> Dalai Lama of Tibet, who is aStar Trek f<strong>an</strong>, visited the cast of Star Trek in 1988 in Hollywood <strong>an</strong>d gothis picture taken with members of the cast. Probert who worked withStar Trek productions also worked with Walt Disney’s Imagineering502


subsidiary. Here are some of the Star Trek scenes:A Wizard of Oz head is shown on a show.Data is a hum<strong>an</strong>oid with <strong>an</strong> on-off switch who c<strong>an</strong> s<strong>to</strong>re vastamounts of data. His memories c<strong>an</strong> be so strong that personalities inthose memories fight for control of Data. (See the episode aired1/23/89).Holodeck creations of people (hum<strong>an</strong>s who are mirror images) whoare aware of themselves. This is a well-used concept for programmingMonarch alters. <strong>The</strong> first episode with this aired 1/1 1/88 <strong>an</strong>d got severalawards--<strong>an</strong> Emmy Award, <strong>an</strong>d <strong>an</strong> award from the George FosterPeabody Award board. A few other items which will show the readerthe occult agenda of Star Trek, the Next Generation <strong>an</strong>d how it fits in<strong>to</strong>the mind-control programming (dates that the show aired are inparenthesis): a Reptili<strong>an</strong> Race called Tellisi<strong>an</strong>s (10/12/87), aCosmological Egg-from the cabalistic magical world view (10/26/87), abrain sc<strong>an</strong>ned by a probe (11/9/87), age regression, reverse aging <strong>an</strong>dmemory loss (2/8/88), <strong>an</strong>droid duels & a crystalline body (1/18/88), arace of computer opera<strong>to</strong>rs (2/1/88), <strong>an</strong> ozone hole in the atmospherekills a pl<strong>an</strong>et (2/15/88), a matriarchal oligarchy--shades of the Motherof Darkness’s oligarchy (1/25/88), people who are only holographicprojections (4/11/88), a cyberneticist & <strong>an</strong>droids (2/13/89), doubles(mirror images) (4/3/89), half-hum<strong>an</strong> half-robot people (5/8/89), clonesof people (5/22/89), a holodeck person who doesn’t know his lastname (6/19/89), Betazoids (11/13/89), <strong>an</strong>d a drug which causeshysterical par<strong>an</strong>oia (7/17/89). Colorado is the area where traumabasedalien-theme programming is carried out with a mock UFO.Gas<strong>to</strong>n, one of the programmers in that area, is turning out <strong>to</strong>p secretMonarchs with solometric systems. NORAD <strong>an</strong>d Colorado Springs <strong>an</strong>dseveral other Colorado locations are major headquarters for end-timecall back programming. Interestingly, they have placed the Star TrekF<strong>an</strong> Club in Colorado.VIDEODROMEThis recent movie portrays Monarch <strong>Mind</strong> Control <strong>an</strong>d S&M. <strong>Mind</strong>controlledslaves are frequently used <strong>to</strong> create S&M films. <strong>The</strong><strong>Illuminati</strong>’s S&M porn film industry has been booming for over 4decades. (Compare the name Videodrome with Vidimax mentionedabove.) <strong>The</strong> porn films done of a particular Monarch slave who is usedas a porn star will be coded according <strong>to</strong> the code name given <strong>to</strong> the503


star. Let’s say they call the Star “Lily”, then the porn movies will becataloged Lily 1, Lily 2, Lily 3, etc. This type of porn involves a great dealof real <strong>to</strong>rture, humiliation, <strong>an</strong>d actual deaths of people. This type ofporn is portrayed in the Hollywood movie Videodrome. <strong>The</strong> maincharacter in Videodrome represents what a mind-controlled slavewould see. <strong>The</strong> main character Max is <strong>to</strong>ld, “I w<strong>an</strong>t you <strong>to</strong> open up <strong>to</strong>me.” He then feels intense pain <strong>an</strong>d doubles up <strong>an</strong>d falls down, <strong>an</strong>dsubmits, “all right.” <strong>The</strong>n he is ordered <strong>to</strong> “Give us ch<strong>an</strong>nel 83.” He thenproceeds under the mind-control <strong>to</strong> kill two partners, who he haspreviously liked <strong>an</strong>d with whom he has had no quarrels. He is further<strong>to</strong>ld, “You are <strong>an</strong> assassin for Videodrome. <strong>The</strong>y c<strong>an</strong> program you. <strong>The</strong>yc<strong>an</strong> make you do what they w<strong>an</strong>t.” Interestingly, the name of thebr<strong>an</strong>d of cigars smoked on the show are named Medicis. He is <strong>to</strong>ld, “Tobecome the new flesh you must kill the old flesh.” This is the type ofsuicide programming given Monarch slaves. He is ordered, “Come <strong>to</strong>Mickey.” Mickey happens <strong>to</strong> be part of Mickey Mouse programming<strong>an</strong>d one of the nicknames of the programmer Michael Aquino. He isthen shown a picture of suicide. <strong>The</strong>n the hypnotic comm<strong>an</strong>d, “Come<strong>to</strong> Mickey” is said three times. “Long live the new flesh.” <strong>The</strong> movie<strong>an</strong>nounces, “<strong>The</strong> battle for the mind of North America will be fought inVideodrome.”TRANCER IIThis is also billed as a “cult classic”. Who decides what is a “cultclassic”? At <strong>an</strong>y rate, this is <strong>an</strong>other film which depicts part of theMonarch <strong>to</strong>tal mind-control. We will not take the space <strong>to</strong> coverindepth, but will <strong>to</strong>uch on a few items here. <strong>The</strong> main character isMcKnowlty which sounds a lot like MK Ultra. Is it a play on words? Itcould be. A council like the <strong>Illuminati</strong>’ s with lifetime appointments is inthe film. <strong>The</strong> persons under control in Tr<strong>an</strong>cer II bear some resembl<strong>an</strong>ce<strong>to</strong> the Monarchs. Some of the l<strong>an</strong>guage that is used is lifted from thel<strong>an</strong>guage h<strong>an</strong>dlers use. “FOLLOW MY INSTRUCTIONS, SLEEP, SLEEP,SLEEP” a person is instructed. “RABBIT SPEAKING”, “YOU BELONG IN AGREEN WORLD.” <strong>The</strong> movie also has Freeze codes which are a color.KRULLThis 1983 movie with Ken Marshall <strong>an</strong>d Lysette Anthony is just one moreexample of hundreds of Hollywood movies which show some aspect ofthe <strong>Illuminati</strong> &/or their mind-control. Krull is <strong>an</strong> isl<strong>an</strong>d ruled by sorcery. Aprince searches for a magic ornament <strong>to</strong> save his bride <strong>an</strong>d theirkingdom. <strong>The</strong> film has a poppy field, castles, <strong>an</strong> All-Seeing-Eye, armies504


of robots, Sat<strong>an</strong>, <strong>an</strong>d other features that a Monarch internal world willbe set up with. A person c<strong>an</strong> turn in<strong>to</strong> a dog, pig or lion.THE LITTLE PRINCESSThis Shirley Temple movie was just one of m<strong>an</strong>y Hollywood films used forprogramming. <strong>The</strong> princess has a nice “dream”. Slaves areprogrammed <strong>to</strong> view their service in the real world as dreams, <strong>an</strong>d theirf<strong>an</strong>tasy worlds in their internal mind as reality. <strong>The</strong> Princess has a scenewith hot cross buns <strong>an</strong>d ravens. This scene was used for programming.<strong>The</strong> Princess sits on a throne. <strong>The</strong>re are fairies <strong>an</strong>d a joker, which areused in programming. <strong>The</strong> father is said <strong>to</strong> be dead, but is not dead inthis movie---thus creating the type of reversal that the programmers like<strong>to</strong> work in<strong>to</strong> the minds of slaves. A rich genie helps the princess, <strong>an</strong>dwhen she finds her Daddy, she wakes him up with a kiss <strong>an</strong>d a song.<strong>The</strong> girl’s name is Sarah, a name which appears within a number ofMonarch system’s as <strong>an</strong> alter name.MISS UNIVERSE CONTEST<strong>The</strong> broadcast of the 1995 Miss Universe Contest did a very unusualfreeze-framing of the show while it was on. <strong>The</strong> screen was mysteriouslyfreeze-framed 9 times, this was a trigger for <strong>Illuminati</strong> Mothers ofDarkness alters. A Mother of Darkness type throne was sat upon by thewinner of the contest. An all-seeing-eye was flashed up on the screenwith the code A MAY ZING written on it. This is the type of puns that theprogrammers enjoy. <strong>The</strong> winners of the contest came from INDIA,CANADA, <strong>an</strong>d the USA. <strong>The</strong> order <strong>an</strong>d names of those countries have<strong>to</strong> do with end times programming. <strong>The</strong> names were a code <strong>to</strong> certainMothers of Darkness systems. India wore a Mother of Darkness typegarment. C<strong>an</strong>ada wore black <strong>an</strong>d white, <strong>an</strong>d USA wore Red. Miss Indiagave <strong>an</strong>other code during the interviews, “If someone w<strong>an</strong>ts <strong>to</strong> putmonkey’s on your back, if you st<strong>an</strong>d up they get on your back.”THE MANCHURIAN CANDIDATEIn 1958, the author Richard Condon had his novel <strong>The</strong> M<strong>an</strong>churi<strong>an</strong>C<strong>an</strong>didate published which describes <strong>an</strong> Americ<strong>an</strong> Army serge<strong>an</strong>t,who is captured <strong>an</strong>d programmed <strong>to</strong> assassinate on the cue of aqueen of diamonds of a deck of cards. Richard Condon’ s ability <strong>to</strong>think about the potential of behavior modification <strong>an</strong>d hypnosis, had505


allowed him <strong>to</strong> stumble upon what had actually been going for over adecade. Fr<strong>an</strong>k Sinatra bought the movie rights for this book, let themovie out briefly <strong>an</strong>d then squelched the second release of the film.Fr<strong>an</strong>k Sinatra has been a slave h<strong>an</strong>dler. He has h<strong>an</strong>dled Bob Hope’sslaves, when Bob Hope has lent them <strong>to</strong> the Rat Pack (which consistedof De<strong>an</strong> Martin, Fr<strong>an</strong>k, Sammy Davis, Jr. Peter Lawford & Joey Bishop).Fr<strong>an</strong>k Sinatra spends time with the Rockefellers <strong>an</strong>d the Rothschilds.Both he <strong>an</strong>d De<strong>an</strong> Martin have h<strong>an</strong>dled slaves. De<strong>an</strong> Martin wasdescribed by <strong>The</strong> Hollywood Reporter as a “hypnotically attractive,homegrown Americ<strong>an</strong> monster.” In Fritz’s previous writings he hasexposed how Peter Lawford & Sammy Davis, Jr. were sat<strong>an</strong>ists. De<strong>an</strong>had the audacity <strong>to</strong> w<strong>an</strong>t <strong>to</strong> bring out a slave on his T.V. show on alease in a tiger outfit. As mentioned previously, the sexual alters seethemselves as kittens or cats <strong>an</strong>d are given obedience training with thetype of collar De<strong>an</strong> w<strong>an</strong>ted <strong>to</strong> bring them out on stage with ontelevision. <strong>The</strong> television network s<strong>to</strong>pped it. As Fr<strong>an</strong>k Sinatra grew up,his parents always had money. His mother was a cigar-smoking cruelfoul-mouth wom<strong>an</strong>, who performed illegal abortions. She got caugh<strong>to</strong>nce <strong>an</strong>d had <strong>to</strong> face the penalty on Feb. 27, ‘39 in a Hudson SpecialSessions Court. Fr<strong>an</strong>k’s hero was Benjamin “Bugsy” Siegel, boss ofMurder, Inc. About 30% of the dirty work for the <strong>Illuminati</strong> is carried outby the Mafia. <strong>The</strong> <strong>Illuminati</strong> have their own death squads which aresuperior <strong>to</strong> the Mafia, but individuals must approach one of the<strong>Illuminati</strong> councils for approval <strong>to</strong> assassinate. Often it is easier forsomeone in the <strong>Illuminati</strong> just <strong>to</strong> put out <strong>an</strong> unauthorized contract th<strong>an</strong><strong>to</strong> go through proper ch<strong>an</strong>nels. Bugsy associated with all the Mafiaheads including Charlie “Lucky” Luci<strong>an</strong>o who controlled mindcontrolledslave Marilyn Monroe. Both Fr<strong>an</strong>k Sinatra <strong>an</strong>d CIA mindcontrolprogrammer William Joseph Bry<strong>an</strong>, Jr. (aka William JosephBryon, <strong>an</strong>d William Jenning Bry<strong>an</strong> III, etc.) were members of the TommyDorsey B<strong>an</strong>d. Bry<strong>an</strong> programmed people while he was with the AirForce as Chief of Medical Survival Training which was the Air Force’scovert mind-control section. Later he opened up his ownhypnotherapy Institute on Sunset Strip in Hollywood where heprogrammed some people in the <strong>Illuminati</strong> who are ac<strong>to</strong>rs. He also wasthe person who programmed Sirh<strong>an</strong> Sirh<strong>an</strong> <strong>to</strong> be involved in the RobertKennedy assassination. He also hypnotised Alvert Di Salvo. After Bry<strong>an</strong>died in spring, 1977, the CIA cle<strong>an</strong>ed out all of his files including hishome files. Bry<strong>an</strong> was fat, 6’ 1 1/2”, <strong>an</strong>d a Sat<strong>an</strong>ic priest in the OldRom<strong>an</strong> Catholic church. This is same sat<strong>an</strong>ic church that WilliamSchnoebelen was a Sat<strong>an</strong>ic priest in, before giving his life <strong>to</strong> Christ. (BillSchnoebelen tells his own s<strong>to</strong>ry in Lucifer Dethroned. Chino, CA: ChickPublications, 1993.) Schnoebelen was offered a slave but turned downthe opportunity <strong>to</strong> be a h<strong>an</strong>dler. In William J. Bry<strong>an</strong>, Jr.’s book entitled<strong>The</strong> Chosen One <strong>The</strong> Art of Jury Selection, Bry<strong>an</strong> teaches how <strong>to</strong> usehypnosis on jury members <strong>to</strong> win one’s case. On the back of the bookhe states about himself, “In addition Dr. Bry<strong>an</strong> served as <strong>an</strong> Electronics506


Engineer in the Navy in World War II, was Direc<strong>to</strong>r of all Medical SurvivalTraining for the United States Air Force, <strong>an</strong>d a leading expert onbrainwashing.” William J. Bry<strong>an</strong> was the technical direc<strong>to</strong>r for Fr<strong>an</strong>kSinatra’s movie <strong>The</strong> M<strong>an</strong>churi<strong>an</strong> C<strong>an</strong>didate. It was hoped that themovie would scare Americ<strong>an</strong>s in<strong>to</strong> thinking that the enemy (thecommunists) was carrying out mind-control.THE SIMPSON CARTOONS<strong>The</strong>re are episodes of the Simpsons which blat<strong>an</strong>tly promote theFreemasons, the <strong>Illuminati</strong> <strong>an</strong>d even show items of the Monarch mindcontrolsuch as “following the Yellow Brick Road.” <strong>The</strong> episodes arequite revealing. Aspects of <strong>Illuminati</strong> programming c<strong>an</strong> also be seen inthe movie “Spirits of the Dead”, where spirit copies of one’s abusers areplaced in<strong>to</strong> the slave, <strong>an</strong>d the movie “Cat Girl”, where a beautiful girl isturned in<strong>to</strong> a killer beast. Several movies have come out showing theconcept of creating robotic people such as the 1920’s movie Golem,the 1966 movie Cyborg 2087, <strong>an</strong>d the movie Fr<strong>an</strong>kenstein. According<strong>to</strong> <strong>Illuminati</strong> his<strong>to</strong>ry, the Collins <strong>Illuminati</strong> bloodline did pre-2Oth centuryexperiments <strong>to</strong> create a Fr<strong>an</strong>kenstein, <strong>an</strong>d Mary Shelley’s novel isactually secretly based on their research. <strong>The</strong> Rothschilds have carriedout successful production of synthetic people this century. This is all inaccord with the black magic goal of controlling bodies, whether live ordead. <strong>The</strong> 90 mm. “Night of the Living Dead” expresses the sat<strong>an</strong>icblack magic goal <strong>to</strong> control bodies. And if the <strong>Illuminati</strong> c<strong>an</strong>’t controltheir slaves, the final solution, if nothing else works, is <strong>to</strong>- as the CIA say-“terminate with extreme prejudice” (a.k.a “Executive Action”), like theydid <strong>to</strong> Mary Pinchot Meyer on Oct. 13, 1964, Princess Grace Kelly &countless others.E - TWINNING & BONDINGTwo Sisters-of-Light (the level before Mothers-of-Darkness) will beplaced before a m<strong>an</strong>y-faced mirror with intense lights <strong>an</strong>dprogrammed <strong>to</strong> see each other as inseparable. <strong>The</strong>y become twins,<strong>an</strong>d are programmed <strong>to</strong> die if the other one dies. <strong>The</strong>y are taught <strong>to</strong>be one in body, mind, <strong>an</strong>d soul. <strong>The</strong>y are bonded in m<strong>an</strong>y ways,including <strong>to</strong>rturing each other, <strong>an</strong>d sexual bonding. <strong>The</strong> traumabonding that they undergo will consist of a. being put in life or deathsituations <strong>to</strong>gether, b. given programming scripts which intertwine & fillin <strong>to</strong> complete each other <strong>to</strong> make a whole, c. are placed in jobs thatrequire <strong>to</strong>tal compli<strong>an</strong>ce with the programming in order <strong>to</strong> survive, d.are bonded <strong>to</strong>gether <strong>to</strong> other people. <strong>The</strong> scripture “A house divided507


against itself c<strong>an</strong>not st<strong>an</strong>d” (MT 12:25, MK 3:25) is used <strong>to</strong> programpeople <strong>to</strong> stay in line with what the team is doing. High level fourpersonfemale teams <strong>an</strong>d a four-person males team are programmed<strong>to</strong> work <strong>to</strong>gether after the Anti-Christ takes over. <strong>The</strong>se types of teamsform the male-female component of a larger 3-part team. With theadvent of adv<strong>an</strong>ced medical technology the <strong>Illuminati</strong> are now able<strong>to</strong> make quintriplets, impl<strong>an</strong>t the eggs in surrogates, <strong>an</strong>d then switchthe identical children during their lifetimes. This type of high levelsubterfuge is going on, <strong>an</strong>d it makes the identities of some slavescomplicated <strong>to</strong> say the least. Readers may w<strong>an</strong>t <strong>to</strong> get some of thearticles Fritz has written about the clones, synthetic people, org<strong>an</strong>icrobo<strong>to</strong>ids, <strong>an</strong>d double look-alikes that the Rothschilds <strong>an</strong>d the rest ofthe <strong>Illuminati</strong> families are engaged in creating. <strong>The</strong> twinningprogramming is very complex <strong>an</strong>d detailed. Within the Rothschildbloodlines--the 5 family lines that beg<strong>an</strong> with Mayer Amschel’s 5 sonsgoing <strong>to</strong> 5 capitals- network/bond their female slaves <strong>to</strong>gether withGennifer-Sally-Elsie-Sarah-Penelope programming. (<strong>The</strong> 6th son <strong>to</strong> finishthe red schield hexagram is/was a bastard.) This is all part of a complexsat<strong>an</strong>ic world mind that is being created. This is the Adam Kadmon.Twins (& teams) claim <strong>to</strong> be telepathic with each other, <strong>an</strong>dobservations of slaves, has tended <strong>to</strong> support that claim. M<strong>an</strong>ytherapists have failed <strong>to</strong> take the twinning part of the programmingin<strong>to</strong> account. Twins must be deprogrammed <strong>to</strong>gether for best results, ifone is left out they may try <strong>to</strong> impede therapy.F. PEER PRESSUREAt the beginning of the programming, the Programmers are dealingwith a small inf<strong>an</strong>t who is unable <strong>to</strong> verbalize <strong>to</strong> others about theirabuse. <strong>The</strong>y are further frightened in every way, <strong>an</strong>d <strong>to</strong>rtured, <strong>an</strong>dgiven behavior modification <strong>to</strong> teach them <strong>to</strong> remain silent. Evenwithout all these strong threats which always exist, the child would notcapable of fighting back. <strong>The</strong> child will naturally think this is the way theworld is, <strong>an</strong>d of course, the programmers are reinforcing the idea thatthis is the heritage or path that the child is supposed <strong>to</strong> be following.<strong>The</strong> dissociative parts of the child do not fully comprehend that beingsexually assaulted daily by their father is wrong. <strong>The</strong>y are being misledby their abuser that it is correct, that that is their purpose in life. <strong>The</strong>child is never given a ch<strong>an</strong>ce <strong>to</strong> realize that it has a right <strong>to</strong> refuse. It isconditioned <strong>to</strong> obedience. <strong>The</strong> abuse seems <strong>to</strong> be just <strong>an</strong>other part ofthings that belong <strong>to</strong> the world of adults. For children, adults do m<strong>an</strong>ythings beyond comprehension, at times ridiculous. And they seem <strong>to</strong>need no reason <strong>to</strong> do these things, except for the fact that they areadults. Other adults that come <strong>an</strong>d go are also particip<strong>an</strong>ts in theabuse, so the child doesn’t grasp that he c<strong>an</strong> be defended by other508


adults. <strong>The</strong> programmers are always doing unexpected things <strong>to</strong> thechild, so the child quits trying <strong>to</strong> figure life out, <strong>an</strong>d fatalisticallycomplies with what it is expected <strong>to</strong> do. Children all over the worldgrow up in <strong>an</strong> adult world, <strong>an</strong>d are at the mercy of adults.As the alters begin <strong>to</strong> experience life, they are generally in situationswhere the attitudes of the people around them, reinforce theirprogramming. Boys are <strong>to</strong>ld by society in general <strong>to</strong> take their lumps inlife “like a m<strong>an</strong>”. <strong>The</strong>y are taught <strong>to</strong> fight their own battles, <strong>an</strong>d not <strong>to</strong>whine. Few boys risk the shame that comes from talking about theirabuse. Society is not kind <strong>to</strong> “whiners”. Females are permitted <strong>to</strong> showemotions, without the social s<strong>an</strong>ctions levied on males. If the childvictim of mind-control comes from a family where only one of theparents is a particip<strong>an</strong>t in the abuse, then what often happens is thatthe cle<strong>an</strong> parent, will never even discuss abuse issues with their child.Few adults ever really discuss abuse issues with children. <strong>The</strong> child isgenerally isolated from their peers as much as possible by the child’sh<strong>an</strong>dler’s <strong>an</strong>d programmers. <strong>The</strong>y place other children that belong <strong>to</strong>the cult in the child’s life <strong>to</strong> report on what the child is doing. When thechild victim begins <strong>to</strong> “stretch their wings” so <strong>to</strong> speak <strong>an</strong>d meet otherpeople, there are very few people that will threaten the control of theprogrammers. When the slave does find a good therapist <strong>to</strong> makefriends with, this friendship will trigger all kinds of programming,unresolved issues around adults, trust, etc. <strong>The</strong> slave feels doublebinded.If they move <strong>to</strong>ward health <strong>an</strong>d freedom, it creates m<strong>an</strong>ymore problems th<strong>an</strong> staying in slavery. <strong>The</strong>y need <strong>to</strong>see the bigger picture. <strong>The</strong>y need <strong>to</strong> be given something positive <strong>to</strong>live for outside of the slavery. Psychiatrists are not permitted by theirboards <strong>to</strong> get personally involved in their clients lives. Traditionaltherapy doesn’t address some of the issues that will s<strong>to</strong>p the slave fromw<strong>an</strong>ting <strong>to</strong> gain freedom. Internal peer pressure from multitudes ofprogrammed loyal deeper alters, <strong>an</strong>d external peer pressure from cultchildren the victim is bonded <strong>to</strong>, begins <strong>to</strong> exert <strong>an</strong> overpowering forcefor the child <strong>to</strong> stay on the beaten path. Few people ever buck thesystem, <strong>an</strong>d go against peer pressure. Someone as hurt <strong>an</strong>d docile as aslave is going <strong>to</strong> w<strong>an</strong>t accept<strong>an</strong>ce, <strong>an</strong>d is not likely going <strong>to</strong> w<strong>an</strong>t <strong>to</strong>step out of line with society <strong>an</strong>d their peers. Until society admits thatthere is a problem with mind-control, it will be a d<strong>an</strong>gerous thingsocially for a child slave <strong>to</strong> admit <strong>to</strong> what the victim is actuallyexperiencing every day.509


Are there <strong>an</strong>y HAGABARDS or MOSES?Now the reader has the FORMULA for the mind control. Now what?<strong>The</strong>se programmed multiples continue <strong>to</strong> eat away at the moral fiberevery one of America’s Institutions like <strong>an</strong> army of termites. On theoutside the structures still look strong, but they are being readied <strong>to</strong>collapse, for the reign of the <strong>Illuminati</strong>’s AntiChrist. <strong>The</strong>re is a series ofbooks called the <strong>Illuminati</strong> books which are a fictional account of howthe <strong>Illuminati</strong> run the world. In the novels, the <strong>Illuminati</strong> run essentiallyeverything--which is actually what is happening. <strong>The</strong> hero, Hagabardfights against this <strong>an</strong>cient conspiracy. Who isn’t familiar with the Biblicalexample of the elite ruler, who leaves his place of royalty <strong>to</strong> lead <strong>an</strong>ation in slavery <strong>to</strong> freedom? this hero’s name is Moses. He also freesthe people spiritually from the spiritual bonds of their hermetic magicalculture. If there are <strong>an</strong>y Hagabards or Moses’ or Aarons out there, it istime <strong>to</strong> buck this World System. “LET OUR PEOPLE GO. LET OURCHILDREN GO.” Thus saith the LORD, Let my people go, that they mayserve Me. (EX 8:1b)510


Appendix 1 - <strong>The</strong> ProgrammersShort LIST of some addresses of abusers who are part of the NETWORKa.k.a. NEW WORLD ORDERAddresses may not be current but are my last address for them. This information mayhave mistakes, this is only <strong>to</strong> display <strong>to</strong> readers that the veil of secrecy is no longerholding up for the <strong>Mind</strong> Control Programmers.AC/DC sat<strong>an</strong>ic Rock B<strong>an</strong>d, 11 Leonminster Rd., Morden, Surrey SM4,Engl<strong>an</strong>dAde, Henry. CIA & drug dealer & Monarch slave abuser, 1663County Rd. 13, Waterloo, IN 46793Aga Kh<strong>an</strong> IV, H.H. Prince Karim. Sat<strong>an</strong>ist & leader of Ismaili Muslims,Aiglemont, 60270 Gouvieux. Fr<strong>an</strong>ceAlabama Country Music group, sat<strong>an</strong>ists <strong>an</strong>d Monarch slaveh<strong>an</strong>dlers, Box 529, Ft. Payne, AL 35967Baily, John, slave abuser, 1525 Pine St., Office 10. Redding, CA 96001Barnes, Don, slaveabuser & in co. sherriff office, 7309 Grove Rd.,Frederick, MD 21701 301-694-2152; 1513 Cedarcrest Ln, Frederick, MD21702301-663-8316Benson, Ezra Taft, sat<strong>an</strong>ist/leader of LDS church. Church of JesusChrist, Administration Bldg., 47 E. S. Temple. Salt Lake City, UT 84415Bowers, Wilbur D., Ipsimus in Illum. & Monarch programmer & CIAdrug dealer. 1735 NE 11th, Bend, OR 97701 ph. 503-EV2-5162 (EV for‘evergreen’)Brown, Edmund G. (Jerry). Jr., Illum. sat<strong>an</strong>ist & CA politici<strong>an</strong> & slaveabuser. 700 S. Flower St., #600, Los Angeles, CA 90017 (phns 415-928-6346, 415-928-5073)Brown, Charlie. Air Force Intell. & murderer & Monarch slave abuser,Box 8. Greenbrier, TNBundy, McGeorge, Illum., 133 East 18th St., NY, NY 10021 Bus. 212-371-3200Byrd, Robert C.. Sat<strong>an</strong>ist <strong>an</strong>d mind-control programmer & Sen. fromW.VA, 311 Senate Hart Office Bldg., Washing<strong>to</strong>n. D.C. 20501511


Clin<strong>to</strong>n, Hillary. <strong>Illuminati</strong> witch & mind-control slave h<strong>an</strong>dler,(address besides White House) Rose Law Firm, 120 E. 4tn St., Little Rock.Ark. 72201Cochr<strong>an</strong>, H<strong>an</strong>k CIA drug kingpin. Hendersonville. TN, 615-824-7011Cox, Wayne, Sat<strong>an</strong>ic High Priest & Monarch h<strong>an</strong>dler & d<strong>an</strong>gerousserial killer, Rt. l. Box 84, Chatham, LA 71226D<strong>an</strong>te, Michael (Michael Vitti). Monarch slave abuser <strong>an</strong>d pornmaker, 3485 C<strong>an</strong>on Drive. Beverly Hills, CA 90212 218-858-9425; Or<strong>an</strong>ge,CA 92665, 714637-0590Day, Brad, slave abuser & coke pusher. 5300 Las Pabl<strong>an</strong>os NW.Albuquerque, NM 87107Drake, Jim (<strong>an</strong>d son), slave abuser & porn/drug dist., 11173 N.Kendall Dr. #F105, Miami, FL 33176Fonda, Peter. RR #38, Livings<strong>to</strong>n, MT 59047Fonda, J<strong>an</strong>e, c/o Fonda Films, P.O. Box 1198, S<strong>an</strong>ta Monica, CA90406Gavoruhk, John, Police chief working for Illum. protects Monarchprogrammers/h<strong>an</strong>dlers. 121 Partridge Circle. Wintersprings, FL 32708305-699-0618Grace, J. Peter, business leader & illuminati. CCAGW, 1301Connecticut Ave., NW. #400, Washing<strong>to</strong>n, DC 20036Grateful Dead, sat<strong>an</strong>ic cult rock b<strong>an</strong>d <strong>an</strong>d <strong>Illuminati</strong> cocainedistribu<strong>to</strong>rs. P.O. Box 1566, Main Office St., Montclair, N.J. 07043Greene, Jack, CIA & white slavery & Monarch slave abuser &country entertainer, Box 485A Goodlettsviiie, TN 615-859-3284Haggard, Merle, slave abuser & country singer. P.O. Box 536, PaloCedro, CA 96073Hestbeck, Vaughn. Monarch abuser & D<strong>an</strong>ish cocaine distr., 515Rhapsody Paquet Cruises. 1007 N. Americ<strong>an</strong> Way, Miami, FL 33176Hope, Bob, slave owner <strong>an</strong>d slave h<strong>an</strong>dler w/ intelligence agencies,3808 Riverside Dr., Burb<strong>an</strong>k, CA 91505Hous<strong>to</strong>n, Alex, sat<strong>an</strong>ist & Monarch programmer & CIA, 1155 Ridge512


Hill Rd., Goodlettsville, TN 37072 615-859-3543Hummell, Ed, Monarch programmer, Cattlem<strong>an</strong>’s Steak & SeafoodCo., 10260 S.W. Nimbus Ave. Suite M-3, Tigard, OR 97223 503-620-7824(also Las Vegas?)Humperdink, Englebert, Castro Valley. CA 94546 510-733-6085King Ju<strong>an</strong> Carlos I, King of Spain <strong>an</strong>d <strong>Illuminati</strong>, Palacio de laZarzuela, Madrid. SpainKISS, sat<strong>an</strong>ic rock b<strong>an</strong>d, 6363 Sunset Blvd., #417, Los Angeles, CA90028Kissinger, Henry, <strong>Illuminati</strong> & P2 Freemason, 1800 K. St., NW. #400.Washing<strong>to</strong>n. D.C. 20006Kreskin, occultist, P.O. Box 1383, West Caldwell, NJ 07006L<strong>an</strong>g, Vel<strong>to</strong>n, white slavery & drug running, 264 Bluegrass Dr.,Hendersonville, TN 37075 615-824-6076 (also at Twitty City 615-822-3210)Lewis, Jerry Lee, Monarch slave programmer & musici<strong>an</strong>, P.O. Box3864. Memphis, TN 37173; 3324 Lynchburg St. Memphis, TN 38134 901-388-1135MacLaine, Shirley, actress/author/New Age occultist, 8899 BeverlyBlvd., Los Angeles. CA 90048Madonna, sat<strong>an</strong>ist & monarch slave, 75 Rockefeler Plaza, New York,NY 10019M<strong>an</strong>son, Charles, sat<strong>an</strong>ist & monarch slave <strong>an</strong>d monarch slaveh<strong>an</strong>dler, Corcor<strong>an</strong> Prison, 1002 Diary Ave., Corcor<strong>an</strong>, CA 93212Martin, Di<strong>an</strong>e, CIA drug dealer & Monarch slave abuser, 45-641 F.Apap<strong>an</strong>e St., Keneoke, HA 96744McKee, Lloyd, drug dealer & Monarch slave abuser, 6501 Meoqui,Albuquerque, NM, 87107; 3000 Colonnade Ct. NW. Albuquerqe, NM87107 505-345-4194McOuinn, Mike, slave h<strong>an</strong>dler & money launderer, Miami, FL 305-386-1512 & 305-251-5320Meadows, Hal, dir. of the CIA near death mind-control513


programming center. Swiss Villa Ampetheater, Box 27, Lampe, MO65681Merritt, Jeff, CIA drug runner & slave abuser, St. Thomas, US VirginIsl<strong>an</strong>ds, 809-744-4000Mitterr<strong>an</strong>d, Fr<strong>an</strong>cois Maurice Marie, <strong>Illuminati</strong> & close friend <strong>to</strong>Rothschilds & Pres. of Fr<strong>an</strong>ce, Palais de l‘Elysée. 55-57 rue du FaubourgSaint-Honoré. 75008 Paris, Fr<strong>an</strong>ceNelson, Willie, singer & monarch slave h<strong>an</strong>dler. P.O. Box 33280,Austin. TX 78784Nunn, Sam. IlIuminati, 303 Senate Dirksen Office Bldg., Washing<strong>to</strong>n.D.C. 20510O’Brien, Earl. CIA Monarch abuser, 12614 Lakeshore, Gr<strong>an</strong>d Haven,Ml 49417Overstreet, Tommy, CIA & white slavery. P.C. Box 41103, Nashville, TN37204Par<strong>to</strong>n, Dolly, sat<strong>an</strong>ist. Crockett Road, Rt. #1. Brentwood, TN 37027Pope John Paul II (aka Karol Wojtyla), <strong>Illuminati</strong> & Freemason.Apos<strong>to</strong>lic Palace, Vatic<strong>an</strong> CityPride, Charley, slave abuser & white slavery & country singer & CIA.c/o Chardon Inc., 3198 Royal Ln., #204, Dallas, TX 75229Prophet, Ronnie, Sat<strong>an</strong>ist & Monarch slave runner, 1030 17th Ave. N.,Nashville, TN 37208 615-321-0539Queen Beatrix (Wilhelmina Armgard). <strong>Illuminati</strong> & Queen, of theNetherl<strong>an</strong>ds, Binnen Huf 19. <strong>The</strong> Hague 2513 AA. <strong>The</strong> Netherl<strong>an</strong>dsReynolds, Dr. Herbert H., <strong>Illuminati</strong> & Univ. CEO, Baylor Univ., WacoTX 76798; 336 Guittard Ave. Waco, TX 76706 817-753-4011Riley, Ken, CIA & Neo-nazi & Loretta Lynn’s h<strong>an</strong>dler/road m<strong>an</strong>ager,Rt. 3, Rosebrook Ct., Gallatin, TN 37066Rockefeller, Winthrop Illumnati kingpin & porn dealer. WinrockFarms, MorriI<strong>to</strong>n, AR 72110 501-727-5481Rorick, David (a.k.a. Dave Roe), sat<strong>an</strong>ist & white slavery, 1211Mallard, Fr<strong>an</strong>klin, TN, 37064514


Rose, Iv<strong>an</strong>, CIA & White slavery & Monarch abuser, RR 2, Mt.Pleas<strong>an</strong>t Rd., Spart<strong>an</strong>sburg, PA 16434 814-694-2496Ry<strong>an</strong>, Dr. Michael N., one of Illum.’s coverup doc<strong>to</strong>r who patchesup slaves, 353 New Shackle Is. Rd., Hendersonville. TN 37075, 615-824-8475, 615-824-8496Smith, D<strong>an</strong>, car & drug dealer & slave abuser, P.O. Box 262. NewMartinsville, W. VA 26155Stevens, Jim, Monarch slave abuser & drug runner, 1726 N.Magnolia, Ocala, FL 32670 904-622-1966 904-622-2139T<strong>an</strong>is, Bob, CIA & Air Force Intell., Monarch abuser & Mafia &pornographer, 7278 N. Lakeshore, West Olive. MI 49460Train, Russell, Club of Rome, 1803 Kalorma Sq., Washing<strong>to</strong>n, D.C.,20008-4021 202-332-5800Trump, Donald. <strong>Illuminati</strong>, 725 Fifth Ave. New York, NY 10022V<strong>an</strong>derpool, Darcy, Monarch programmer, 2620 Regatta Dr. # -116, Las Vegas, NV 891 702-242-4222Walker, Jimmy, Monarch save abuser/pornographer, 904 CarswellWaycroos, GA 31501 912-285-5594Warlock, Billy, ac<strong>to</strong>r, 9200 Sunset Blvd., #625, Los Angeles, CA 90069Westberry, Kent, songwriter, sat<strong>an</strong>ist & white slavery. 359 Lee Road,Cot<strong>to</strong>nTown, TN 37048>Air America, CIA front, works out of Tulsa;Nederl<strong>an</strong>d, TX;Berea, OH. & Jackson, MS. <strong>The</strong> Tulsa addresss is 1419 S. 135th EastAve., Tulsa, OK 74108-4131 918-234-3041Cargill, Inc., large grain cartell run by Illum. P.O. Box 9300, 15407McGinty Rd, Minne<strong>to</strong>nka, MN 55440Dungeon Master, Desmodus Inc., hard gay porn, s & m publisher,Box 11314. S<strong>an</strong> Fr<strong>an</strong>cisco, CA 94101515


Eli Lilly & Co., <strong>Illuminati</strong> drug co., Lilly Corporate Center, Indi<strong>an</strong>apolis,IN 46285Machinery International, Inc., CIA front, 302 Fall Cr Dr.. Richardson,TX 75080 214-234-2969Rothschild Pediatric Group, 4770 S. I 10 Service Rd., Metairie, L.A70001 504-887-1133Rothschild Pedatric Group, 1970 Ormond Blvd., Destreh<strong>an</strong>, LA 70047504-784-6036Southern Air Tr<strong>an</strong>sport, CIA front, 6400 N.W. 36th, Miami, FL 33166Summit Aviation, CIA front, Summit Airport, Middle<strong>to</strong>wn, Delaware19709 302-834-5400INTRODUCTORY REMARKSFor <strong>an</strong>y recipe you need a cook. So who has been cooking up theRECIPE for making Monarch Slaves? <strong>The</strong> authors felt that after readingthe recipe, that some readers would be interested in learning aboutthe master chefs who make hum<strong>an</strong> robots using trauma-based mindcontrol.According <strong>to</strong> <strong>an</strong> ex-Programmer, the Programmers fordecades have been treated like royalty whenever they step foot on<strong>to</strong>a military base, or enter a hospital that carries out mind-control. <strong>The</strong>yare always expected. Generally, the comm<strong>an</strong>ding general on a basewould met them <strong>an</strong>d escort the programmer in a limo. If the basecomm<strong>an</strong>der couldn’t make it, <strong>an</strong> import<strong>an</strong>t physici<strong>an</strong> might take hisplace. <strong>The</strong> programmers have keys, <strong>an</strong>d codes <strong>to</strong> get in<strong>to</strong> specialareas. After m<strong>an</strong>y thous<strong>an</strong>ds of Americ<strong>an</strong>s died in WW II fightingNazism, our government’s intelligence agencies (incl. the militaryintelligence groups) in cooperation with the <strong>Illuminati</strong> <strong>an</strong>d its people inthe Vatic<strong>an</strong>, smuggled 10,000 of the worst Nazi-fascist war criminals in<strong>to</strong>this country. This is on public record now. Part of this was underOperation Paperclip. <strong>The</strong> DoD (Dept. of Defense) also worked atsmuggling Nazi mind-control programmers under Project 63. Every W.W.II veter<strong>an</strong> who fought ought <strong>to</strong> be <strong>an</strong>gry that after putting his life on theline for “democracy” <strong>an</strong>d freedom, <strong>an</strong>d supposedly defeating theNazis, our government brought in men like the S.S.’ s infamous butcherDr. Joseph Mengele <strong>to</strong> program Americ<strong>an</strong> children with trauma-basedmind-control like he had in the concentration camps. In fact, Fritz hasworked with <strong>an</strong> <strong>Illuminati</strong> victim of Joseph Mengele, who wasprogrammed in Germ<strong>an</strong>y in a concentration camp, <strong>an</strong>d then516


smuggled <strong>to</strong> the U.S. via C<strong>an</strong>ada by Jesuits working with the <strong>Illuminati</strong>.Once in the U.S., this person continued <strong>to</strong> be programmed byMengele, who went by m<strong>an</strong>y names including Dr. Green. He isdescribed in detail in part d. of this Appendix. We must begin <strong>to</strong> getbeyond the fronts <strong>an</strong>d covers that the programmers have for theworld. Jewish professor Ernst Bergm<strong>an</strong>n, of the infamous LeipzigUniversity, is also surprisingly <strong>an</strong> strong advocate of Nazism. His mainbook is A National Socialist Philosophy of Culture. He writes, “A newtype of m<strong>an</strong>kind is being developed.” He is mentioned here so thatpeople s<strong>to</strong>p looking at labels, <strong>an</strong>d start looking at what is really goingon. One of the principle goals of Nazism was <strong>to</strong> remake m<strong>an</strong>kind. <strong>The</strong>Ahnerbe of the Nazis was set up <strong>to</strong> do genetic research <strong>an</strong>dexperiments. And one element of that was <strong>to</strong> be able <strong>to</strong> create theprefect obedient mind-controlled slave. A first gl<strong>an</strong>ce at the lies <strong>to</strong>ld usby our press will give one the impression Nazism was <strong>an</strong>ti-communist,nationalistic, & Christi<strong>an</strong>. However, a close look at Hitler <strong>an</strong>d <strong>to</strong>day’sNazi leadership, will reveal that Nazism is Socialism (or Marxism, exactlywhat communism is about) <strong>an</strong>d that Nazism is not nationalistic, butinternational in its view. Further, it is Sat<strong>an</strong>ic <strong>an</strong>d based on the Nordicmystery beliefs (Odin, Thor, etc.). It is not based on Christi<strong>an</strong>ity. <strong>The</strong> VrilSociety was the mother of the Nazi party. “Vril” me<strong>an</strong>s the Light Force.What Light force? Lucifer the light bearer’s light force. <strong>The</strong> true natureof Nazism is being concealed. When Hitler came <strong>to</strong> pl<strong>an</strong>, he wasplaced in<strong>to</strong> power in accord<strong>an</strong>ce with the <strong>Illuminati</strong> pl<strong>an</strong> which wasspelled out in writing. This pl<strong>an</strong> said, “Nowadays if <strong>an</strong>y state raise aprotest against us it is only pro forma (provided in adv<strong>an</strong>ce) at ourdiscretion <strong>an</strong>d by our direction, for their <strong>an</strong>ti-semitism is indispensable <strong>to</strong>us for the m<strong>an</strong>agement of our lesser brethren.” <strong>Illuminati</strong> internationalb<strong>an</strong>kers brought Hitler <strong>to</strong> power, <strong>an</strong>d <strong>Illuminati</strong> kingpins like Rockefeller,Onassis <strong>an</strong>d the King of Sweden traded with the Nazis. Spain stayedneutral during the war <strong>to</strong> serve as a conduit of supplies <strong>to</strong> keep Hitler’swar going.Hitler was a particip<strong>an</strong>t in rituals where hum<strong>an</strong> sacrificeswere carried out. He himself killed a number of men by pulling theirhearts out of their bodies while they were alive. One Monarch slaveremembers his father, who was powerful in the <strong>Illuminati</strong>, describinghow Hitler killed a m<strong>an</strong> in front of him by pulling his heart out. Some ofHitler’s key advisors <strong>an</strong>d key men were in the <strong>Illuminati</strong>. <strong>The</strong>re are alsolots of tie ins with the OTO, the Vril Society, the Thule Society, theSociety of Green Men. <strong>The</strong> head of the Tibet<strong>an</strong> Monks that Hitlerimported <strong>to</strong> help him lead Germ<strong>an</strong>y was known as <strong>The</strong> M<strong>an</strong> with theGreen Glove. <strong>The</strong> monks were posted in Berlin, Munich, <strong>an</strong>dNuremberg. By the way, the NWO is still using Tibet<strong>an</strong> Monks. Have youever watched how much travel the Dalai Lama gets in? And did younotice that Tibet<strong>an</strong> Monks were imported in the Bakaa Valley Coloradoby a U.N. leader? <strong>The</strong> Mishpuka (Jewish Mafia) leader Pritzker who livesin seclusion on Haulon Rd., Libertyville, IL 60048 on a 1300 acre piece ofexpensive real estate, had the Dalai Lama consecrate a shrine for him.517


Haulon Rd. has two access points, a northern <strong>an</strong>d a southern. (<strong>The</strong>road was bought by Pritzker <strong>an</strong>d is guarded. Pritzker has been active inChicago for the Mishpuka. He is reported <strong>to</strong> have spent millionsrenovating his house, where for some reason, dead bodies keepshowing up on its estate grounds.) Our political leaders have beenaware that Nazi <strong>Mind</strong>-control experts were imported after the war. Forinst<strong>an</strong>ce, some of the Nazi war criminals smuggled in became some ofRichard Nixon’s personal friends, Even the Mossad were fully aware thatthous<strong>an</strong>ds upon thous<strong>an</strong>ds of the worst monsters that the world hasknown were smuggled in<strong>to</strong> the U.S. for the <strong>Illuminati</strong> by the Vatic<strong>an</strong>, theIntelligence Agencies, <strong>an</strong>d other groups. <strong>The</strong> Rothschilds <strong>an</strong>d NelsonRockefeller forced the Jewish Zionist leadership in Israel <strong>to</strong> keep silentabout the Nazis who were smuggled in<strong>to</strong> the U.S. after W.W. II. In returnfor Israel’s silence <strong>an</strong>d the Mossad’s silence about the thous<strong>an</strong>ds ofhigh level sat<strong>an</strong>ic Nazis who were brought in<strong>to</strong> the U.S., the nation ofIsrael was allowed. <strong>The</strong>y made a deal, according <strong>to</strong> high level insiders.Nelson Rockefeller had enormous power in South America. In June1945, when the U.N. was being set up at S<strong>an</strong> Fr<strong>an</strong>cisco, NelsonRockefeller attended. While Nelson Rockefeller was there, he busiedhimself with directing the South Americ<strong>an</strong> delegates. Rockefeller’s blocof 19 Latin Americ<strong>an</strong> countries had more U.N. votes th<strong>an</strong> Europe’s ninemembers. Rockefeller was a key person, if the Zionist’s w<strong>an</strong>ted the U.N.<strong>to</strong> vote so that the nation of Israel could be established. <strong>The</strong> Zionistleadership used what they thought was blackmail, if you don’t let Israelbe established we will expose how you are smuggling nazi warcriminals in<strong>to</strong> the U.S. Of course, the <strong>Illuminati</strong> w<strong>an</strong>ted Israel <strong>to</strong> becreated--so those in the Zionist leadership who knew the bigger pl<strong>an</strong>sof the <strong>Illuminati</strong>, knew that the <strong>Illuminati</strong>-run CIA wasn’t giving up<strong>an</strong>ything. If <strong>an</strong>yone asks why the Mossad didn’t expose MI-6 <strong>an</strong>d theCIA’s extensive hiring of Nazi war criminals, they say <strong>to</strong>day that theywere using it for blackmail <strong>to</strong> get Israel what it needed. Those in theknow, realize that is just <strong>an</strong> excuse. <strong>The</strong> Mossad has hired its own shareof Nazi criminals, <strong>an</strong>d at some point learned mind-controlprogramming from the CIA, perhaps even from Mengele (Dr. Green).<strong>The</strong> Nazis used Croats <strong>an</strong>d White Russi<strong>an</strong>s <strong>to</strong> carry out some of theirgenocide policies. Not all of the monsters of W.W. II were Germ<strong>an</strong>,m<strong>an</strong>y were White Russi<strong>an</strong> collabora<strong>to</strong>rs. Essentially every White Russi<strong>an</strong>War Criminal from W.W. II that survived the war was placed on oneNATO payroll or <strong>an</strong>other. <strong>The</strong> U.S. intelligence even hired Germ<strong>an</strong> SSadministra<strong>to</strong>rs. Why? Because U.S. intelligence is controlled by the<strong>Illuminati</strong>. <strong>The</strong> White Russi<strong>an</strong> Nazis were settled in the NY-NJ area,especially in South River, NJ. One of the worst monsters was St<strong>an</strong>kievichwho ended up living in Richmond Hills <strong>an</strong>d working for the CIA. He gota job working for Radio Liberty in NY! Isn’t that ironic that “RadioLiberty” has hired such monsters. Does our government put outpropag<strong>an</strong>da or is it really the champion of freedom that it portrays itself<strong>to</strong> be? <strong>The</strong> Nazi mayor of Minsk was brought over by the CIA <strong>an</strong>d given518


a job at the N.Y. Library of running the Slavic desk. One of the chiefWhite Russi<strong>an</strong> war criminals, the Vor Komm<strong>an</strong>do Moskau chief recruiterwas made head over a NY county medical society. John Foster Dulles,brother of the direc<strong>to</strong>r of the CIA, was trustee of the RockefellerFoundation. <strong>The</strong> Rockefeller Foundation was a particip<strong>an</strong>t in Nazi mindcontrol research done by Mengele <strong>an</strong>d others for the Kaiser WilhelmMedical Institute in Berlin. After the war, John Foster Dulles helpedsmuggle Nazis in<strong>to</strong> this country, including those who were <strong>Illuminati</strong><strong>Mind</strong>-control experts. Bill Casey, later direc<strong>to</strong>r of the CIA, was also busyhelping bring in Nazi war criminals after the war. He served on theInternational Rescue Committee in NY which he used <strong>to</strong> bring Nazis in<strong>to</strong>New York. Prior <strong>to</strong> the war jewish Germ<strong>an</strong> scientists were smuggled in<strong>to</strong>New York through the Arnold & Constable S<strong>to</strong>re, which housed the ADLon the <strong>to</strong>p floor. <strong>The</strong> South Americ<strong>an</strong> countries, especially Argentina,ruled by the Perons, was connected <strong>to</strong> both the <strong>Illuminati</strong> in Germ<strong>an</strong>y<strong>an</strong>d the <strong>Illuminati</strong> in the states. M<strong>an</strong>y germ<strong>an</strong>s went <strong>to</strong> Argentina, <strong>an</strong>dthey simply continued doing what they had done in the past. Sat<strong>an</strong>ismworking under the veil of Nazism was very strong in Argentina wherem<strong>an</strong>y of the Germ<strong>an</strong> <strong>Illuminati</strong> leaders moved after the war. Anotherplace that the Germ<strong>an</strong>s loved <strong>to</strong> move <strong>to</strong> was Oregon, especiallyPortl<strong>an</strong>d, OR. <strong>The</strong> head of Hitler’s intelligence was the brilli<strong>an</strong>t ReinhardGehlen who worked for the CIA after the war. He is <strong>Illuminati</strong>. Hisbrother was Doe Winters who lived in Pullach after the war. Mengele,(the Dr. Black of Monarch Programming, who was <strong>an</strong> <strong>Illuminati</strong> Gr<strong>an</strong>dMaster himself) would occasionally visit Doe Winter’s Pullach residence.To renovate the image of Nazi criminals, they became Anti-communistcrusaders. A group of fascists from Asia <strong>an</strong>d Europe were taken by U.S.Intelligence <strong>an</strong>d molded in<strong>to</strong> the WACL (World Anti-CommunistLeague). And we of the sheppel (sheep) were given more Hegali<strong>an</strong>dialectics. Those of us who still care about hum<strong>an</strong>ity’s freedom, <strong>an</strong>dthat hum<strong>an</strong> spirit not <strong>to</strong> be broken by the elite’s <strong>to</strong>tal mind control,have got <strong>to</strong> get beyond labels, <strong>an</strong>d the media’s propag<strong>an</strong>da, <strong>an</strong>d thefalse fronts.OUTLINE of Appendix 1.a. Introduc<strong>to</strong>ry remarksb. Underst<strong>an</strong>ding the programmersc. A list of known programmersd. Dr. Greene. Dr. WhiteUnderst<strong>an</strong>ding the PROGRAMMERSM<strong>an</strong>y men have contributed <strong>to</strong> the research of trauma-based mindcontrol. <strong>The</strong> men who learned how <strong>to</strong> <strong>to</strong>rture during the <strong>an</strong>cient519


Babyloni<strong>an</strong> days, during the Rom<strong>an</strong> days <strong>an</strong>d during the Medievaldays passed their secrets <strong>to</strong> the rulers of the secret Mystery Religions.Some of the 13 <strong>Illuminati</strong> bloodlines trace their his<strong>to</strong>ry back <strong>to</strong> the<strong>an</strong>cient times of Babylon. Because the programmers are driven by thespirit-world, they are very jealous <strong>an</strong>d competitive <strong>to</strong>wards each other.It is a dog-eat-dog world amongst them. <strong>The</strong> demonic forces within inthem are in competition <strong>to</strong>o. Yes, the programmers have had theirfriction, their jealousies & power struggles with each other. Some ofthese inner battles have been fought with <strong>an</strong>d over their mindcontrolledslaves. When two programmers work on a single slave, theymight both put in their own secret back doors <strong>to</strong> insure that the slaveremains loyal <strong>to</strong> himself rather th<strong>an</strong> other programmer. <strong>The</strong>re has alsobeen ongoing tension between the half-blooded & full blooded<strong>Illuminati</strong> programmers. Because each of the various programmingcenters specializes in perhaps a dozen types of programming,programmers go <strong>to</strong> different programming centers. <strong>The</strong> props for thescripts are often kept at the programming centers. <strong>The</strong> programmerswill dress according <strong>to</strong> the script they are giving the victims, whichmight me<strong>an</strong> they may be dressed as the Wizard of Oz, a Nazi, a doc<strong>to</strong>rin a white coat, a white rabbit costume, a corrig<strong>an</strong> sweater as Mr.Rogers, or in the nude. One of the most cruelest evil geniuses in recenttimes was Dr. Mengele. Dr. Mengele used 3,000 twins during the time of1943-1944 for research. Most of these twins died. <strong>The</strong> twins were chosenout of the vast numbers of people who were brought in <strong>to</strong> the Germ<strong>an</strong>concentration camps. By the time W.W. II ended, Mengele knew agreat deal about how <strong>to</strong> <strong>to</strong>rture children in order <strong>to</strong> get them <strong>to</strong> bond<strong>to</strong>tally with him. Even <strong>to</strong>day some of the survivors of his horribleexperiments believe that Mengele loved children. <strong>The</strong>y love him astheir father. Mengele also developed the ability <strong>to</strong> create artificialtwinning between two people. Mengele carried his violin with himwhen he came on<strong>to</strong> military bases. His violin hid his color b<strong>an</strong>ds <strong>an</strong>dprobes for color programming. Other men worked with Dr. Mengele<strong>an</strong>d soon became programmers in their own right. Dr. Cameron ofC<strong>an</strong>ada became a Monarch mind-controlled slave programmerknown as Dr. White. Another programmer who was not a full bloodedgenerational Sat<strong>an</strong>ist was Gog known as Dr. Blue. Heinrich Mueller isknown as Dr. Blue. Dr. Blue lived in the northwest area <strong>an</strong>d has twosons--their programming <strong>an</strong>d cult nicknames are Teddy Bear(<strong>The</strong>odore) <strong>an</strong>d Robin Hood (Michael). Two programmers knownsuccessively as Dr. Black are L.W. <strong>an</strong>d W.B. A protege of L. W. is EdHummel who works in states such as Texas <strong>an</strong>d Oregon. Ed wasoriginally from Texas, <strong>an</strong>d W. <strong>an</strong>d B. were originally from Oklahomabefore they beg<strong>an</strong> working in the Northwest. Two of the most ruthlessprogrammers on the West coast areJerry Lee Lewis <strong>an</strong>d Michael Aquino. <strong>The</strong>se two men are as coldblooded as they come, r<strong>an</strong>king right beside Mengele in their ability <strong>to</strong><strong>to</strong>rture. Michael Aquino (DOB 10/16/46, 2430 Leavenworth St., S<strong>an</strong>520


Fr<strong>an</strong>cisco, plus other addresses), because he was in militaryintelligence. was in a position <strong>to</strong> pass on his diabolical programmingabilities <strong>to</strong> dozens of military officers. His wife works with him, <strong>an</strong>d hername is Lilith Sinclair (DOB 4/21/42). Michael Aquino has travelled allover the U.S. doing programming. Michael Aquino used Cathy O’Brienas the star victim in his training video which teaches military officershow <strong>to</strong> create Monarch mind-controlled slaves. One of the old timeprogrammers (early 1950s-80’s) who worked as a psychiatrist insouthern California went by the programming name of Sid. <strong>The</strong>principle <strong>Illuminati</strong> programmers were known as Dr. Black, Dr. White, Dr.Green, <strong>an</strong>d Dr. Blue. <strong>The</strong>y oversaw the training of thous<strong>an</strong>ds of parttimeprogrammers. <strong>The</strong> better programmers are able <strong>to</strong> get in<strong>to</strong> themind of the victim much like Colombo (Peter Falk), who is, by the way,in his personal life part of this all. <strong>The</strong> reader needs <strong>to</strong> underst<strong>an</strong>d that avictim who is given the Monarch mind-control may have a number ofprogrammers, but the slave will be trained <strong>to</strong> only respond <strong>to</strong> thevoices of a limited number of users. If someone tries <strong>to</strong> use a slave <strong>an</strong>dhas the wrong voice, it could trigger suicide programming. A hum<strong>an</strong>robot may have alters which c<strong>an</strong> rescue the body from a suicide alter,but the message will be clear <strong>to</strong> the mind-controlled slave that it shouldstay away from non-approved users or face possible suicide. We havenow entered <strong>an</strong> era where second <strong>an</strong>d third generation robotic mindcontrolled slaves are programming. <strong>The</strong> programmed are now doingmuch if not most of the programming. This me<strong>an</strong>s m<strong>an</strong>y of theprogrammers are men with MPD. Some programmers are hard-coremilitary men who see <strong>an</strong>y type of “discipline” or “training” as good ifthe end product produces better obeying soldiers. <strong>The</strong>se hard-coremilitary men have lost <strong>an</strong>y proper boundaries on what is O.K. fortraining. This explains why the whole apparatus <strong>to</strong> create mindcontrolledslaves is turning out new slaves at <strong>an</strong> alarming rate. <strong>The</strong> smallnumber of victims who are painstakingly saved by de-programming<strong>an</strong>d therapy is slight compared <strong>to</strong> the number of new slaves beingcreated. Over two million Americ<strong>an</strong>s have been programmed bytrauma-based mind control since 1947, & the CIA admitted its <strong>Mind</strong>Control publicly in 1970, <strong>an</strong>d yet the existence of the mind-control is stillsecret <strong>to</strong> the general public. Doc<strong>to</strong>rs such as Dr. Gaefsky, at theBethesada Naval Hospital <strong>an</strong>d Dr. Beecher at Harvard, under theauspices of the CIA worked <strong>to</strong> perfect the use of drugs <strong>to</strong> mind-controlpeople. Dr. Jensen, was the CIA programmer who programmed C<strong>an</strong>dyJones (birth name Jessica Wilcox, <strong>an</strong>d CIA alias Arlene Gr<strong>an</strong>t), thefamous sex object of males during W.W. II. C<strong>an</strong>dy Jones was aMonarch carrier pigeon (courier) for the CIA. C<strong>an</strong>dy Jones receivedsome of her programming at <strong>The</strong> Farm which is the CIA’s Camp Peary.Dr. William Jennings Bry<strong>an</strong> also helped the CIA in programming. NavalPsychologist Lt. Comdr. Thomas Narut contributed his ideas on how <strong>to</strong>develop mind-controlled assassins. Some of the assembly-line Deltaassassination teams are using programming techniques based on521


Narut’s programming research. A Dr. James Monroe also worked forthe CIA in <strong>Mind</strong> Control programming. READERS ARE ASKED TOREMEMBER THAT SOMETIMES SEVERAL PEOPLE MAY HAVE THE SAMENAME. Disclaimer: <strong>The</strong> readers are asked <strong>to</strong> check thesepeople/names out for themselves before drawing <strong>an</strong>y finalconclusions, maybe the leopard has ch<strong>an</strong>ged his spots.MONARCH MIND CONTROL PROGRAMMERSMorse AllenLt. Col. John Alex<strong>an</strong>derRichard Dabney AndersonMichael Aquino (program cover name Malcolm, also known <strong>to</strong>some children as Mickey, Betty Ford is his mother, Illum, bloodline,married <strong>to</strong> Lilith Sinclair)As<strong>to</strong>rArmstrongBill BennettWilbur Bowers (program cover name Billy Boy, a Rothschild)Dr. William Jennings Bry<strong>an</strong>BurchamBurnell-High<strong>to</strong>werSen. Robert C. ByrdDr D Ewen Cameron (program cover name Dr. White)Sue CarperJoe CircoMark CircoWayne CoxDr. Bernard Diamond522


Michael Del<strong>an</strong>ey (prog. covr name Robin HoodRussell G. FrazierGas<strong>to</strong>nBeth George (a Rothschild)Clair GeorgeDr Sydney GottliebCol. Wilson GreenJohn Gunter (program cover name Little John)HagginHarrick in Denver, Co.Col. Height (sp.?)Lawrence HinkleAlex Hous<strong>to</strong>nEd HummelDr. Harris IsbellDr. JensenJohnsonSteve KilgoreKris Kris<strong>to</strong>phersonHelga LaRoucheH<strong>an</strong>k LevineJerry Lee LewisDr. John Lilly523


Col. M<strong>an</strong>assahIrby M<strong>an</strong>drellHal MeadowsDr. Meiers (program cover name <strong>The</strong> Jolly Green Gi<strong>an</strong>t)Seward Prosser Mellon (program cover name Governor)Dr. Josef Mengele (program cover name Dr. Green)Dr. Joseph A. MeyerTed V. MikelsDr. James MonroeHeinrich Mueller (program cover name Dr. Blue)<strong>The</strong>odore son of Heinrich Mueller (program cover name Teddy Bear)Nath<strong>an</strong>Lt. Comdr. Thomas NarutDr. Martin T. Or<strong>an</strong>geOwensCol. Tom ParkerPattersonPete PetersonKen RileyRockefellerDavid Long RothschildGuy de RothschildSavorAlden Sears524


Dr. StarMaj. Str<strong>an</strong>geStrongSuttenfussCol. TaylorLeo TaylorDarcy V<strong>an</strong>derpoolWeirKent WestberryLeo Wheeler (program cover name Dr. Black, a Collins)Robert WhitlowHarold WolffSources:Fritz Springmeier’s Newsletters Oct. 15, 1993; Dec. 1, ‘93; Feb, ‘94; J<strong>an</strong>.,1995; March-April, 1995; “Perpetra<strong>to</strong>rs” (Monograph), 1993 by Cathy O’Brien,Fritz Springmeier’s own list of people from Survivors, In Search For theM<strong>an</strong>churi<strong>an</strong> C<strong>an</strong>didateCOUNTRY MUSIC INDUSTRY PERPETRATORS involved <strong>an</strong>dknowledgeable of Monarch <strong>Mind</strong> Control(Most are involved with the CIA’s drug running network.)Henry AdeAlabama b<strong>an</strong>dAtl<strong>an</strong>taB<strong>an</strong>d<strong>an</strong>aLynn Anderson525


Jerry BarlowBoxcar WillieRay BurdetteGlen CampbellAce C<strong>an</strong>onDee ClarkRoy ClarkDavid Allen CoePat CornHelen CorneliousWayne CoxDave DeBoltPenny DehavenCharlie Dick<strong>The</strong> DriftersRoy DruskyNarvel Felts<strong>The</strong> Four GuysR<strong>an</strong>dy <strong>an</strong>d Rudy GatlinJim GlaserVern GosdinJack GreeneMerle Haggard526


Alex Hous<strong>to</strong>n (<strong>an</strong>d Elmer)Englebert HumperdinkWaylon JenningsGeorge Jones<strong>The</strong> JuddsMerle KilgoreBuddy KillenVel<strong>to</strong>n L<strong>an</strong>gH<strong>an</strong>k LevineJerry Lee LewisErnest Ray LynnRonnie LutricJack MacFaddenReggie MaclaughlinBrent MagorMarty MartellGeorge MoffetLorrie Morg<strong>an</strong>Bonnie NelsonWillie NelsonOakridge BoysMerril OsmundTommy OverstreetJerry <strong>an</strong>d Arlene Petty527


Ray PillowCharlie PrideRonnie ProphetJe<strong>an</strong>nie PruettGiles ReevesDave Roe (Rorick)Dave Rol<strong>an</strong>d (<strong>an</strong>d Sugar)TG SheppardH<strong>an</strong>k SnowRonnie S<strong>to</strong>nem<strong>an</strong>Jimmy SturrJimmy SwaggartMel TillisBuck TrentLeroy V<strong>an</strong>DykeJim VestMack VickoryBilly WalkerCharlie WalkerJim WebbDottie WestShelly WestKent Westberry528


Bobby Whit<strong>to</strong>nMichael McArthur, a recent convert from Sat<strong>an</strong>ism who helped abductchildren provided first h<strong>an</strong>d testimony that the following are involved inabductions of children:“Chucky” (aka ,,Mike,” aka “Peters”’) --FBI hit m<strong>an</strong> in Div. 5 of FBI,involved also with Inslaw CaseNichol Harrah - FBI agent who abducts children for sacrificeLinda Krieg - Sat<strong>an</strong>ist working for FBIKen L<strong>an</strong>ning - FBI agent who abducts children for sacrifice whileclaiming SRA doesn’t existNick O’Hara - FBI hit m<strong>an</strong>, sat<strong>an</strong>ist, who has covered FBI childkidnapping by murdering witnessesKepe Richardson - CIA agent who abducts children for sacrificeIn addition <strong>to</strong> all this, the following are a few of the CIA people who areboth SLAVE HANDLERS <strong>an</strong>d DRUG DEALERS, who haven’t gotten theirnames mentioned yet:Pat BowlinGeorge Bush & sonSue Carper (not known if she deals drugs). She does direct CIAoperations <strong>an</strong>d the Norwegi<strong>an</strong> Caribbe<strong>an</strong> Lines.H<strong>an</strong>k Cochr<strong>an</strong>, a drug overlordAl<strong>an</strong> DullesDi<strong>an</strong>e Martin of HawaiiIrby M<strong>an</strong>drell who controls other family members who are slavessuch as Barbara, Louise, & Iriene.Jim Maynard, CIA covert ops BelizeJeff Meritt, St. Thomas, U.S. Virgin Is.529


Carl MiselJim MitchellEarl O’BrienLinda ScaleBob T<strong>an</strong>nis w/ Air Force Intell. in Ml<strong>The</strong> Temple of Set. <strong>The</strong> Temple of Set (<strong>The</strong> Temple of Power) is builtupon mind-control. Since most of the members are either victims ofmind-control or perpetra<strong>to</strong>rs or both, it would be productive <strong>to</strong> give themembership of this org<strong>an</strong>ization. Dr. Flowers, the Gr<strong>an</strong>d Master of theOrder of the Trapezoid, may well be a programmer. In the least he is aslave h<strong>an</strong>dler. Some <strong>Total</strong> <strong>Mind</strong>-controlled slaves will have Order of theTrapezoid things internally. If they do, the therapist should recognizethat this is Temple of Set (Power) programming. <strong>The</strong> membership of theChurch of Set has been a closely guarded secret. Here it is. A fewwords of expl<strong>an</strong>ation are in order. Most of the names in the list are theactual names of people, but some people joined the Temple of Setunder aliases. For inst<strong>an</strong>ce Eddie W. H<strong>an</strong>ds is <strong>an</strong> alias for EdwardWayne Cox of Chatham, Louisi<strong>an</strong>a. E. Wayne Cox may have chosenthis alias because he runs <strong>an</strong> international business of selling left h<strong>an</strong>dstaken from victims of hum<strong>an</strong> sacrifice. <strong>The</strong> left h<strong>an</strong>d is called by theseSat<strong>an</strong>ists “the h<strong>an</strong>d of glory.” Although Sena<strong>to</strong>r Robert C. Byrd’s namedoesn’t appear on the Temple of Set’s formal membership, he properlyshould be included in <strong>an</strong>y membership list, because it was his legalexpertise that helped Aquino set up the Temple of Set so that it wouldbe legally protected by the Constitution. Behind this legal Sat<strong>an</strong>icorg<strong>an</strong>ization is a large amount of illegal Sat<strong>an</strong>ic activity, includingsacrifice, slavery, mind control, porn <strong>an</strong>d drugs. Sena<strong>to</strong>r Byrd is <strong>an</strong>example of how evil men c<strong>an</strong> pervert the use of the Constitution forevil. Another name which is not on the formal membership roster is JerryLee Lewis, but Jerry Lee Lewis works so closely with the Monarch slavesof the Temple of Set that he is <strong>an</strong> integral part of the Temple of Setsystem This secret membership list follows this pattern NAME OFPERSON-POSITION IN THE TEMPLE OF SET (i.e. r<strong>an</strong>k), PLACE OFRESIDENCE, OTHER OCCULT OR SECULAR FACTS ABOUT THE PERSON.Rom<strong>an</strong> numerals are used <strong>to</strong> identify Seti<strong>an</strong> r<strong>an</strong>ks, I have taken theliberty <strong>to</strong> abbreviate these rom<strong>an</strong> numerals in<strong>to</strong> our everyday numbers,such as VI° = 6°. Here is the PAST AND RECENT SECRET MEMBERSHIP INTHE TEMPLE OF SET (a spin-off of the Church of Sat<strong>an</strong>, <strong>an</strong>d recentlyreconstructed as the Temple of Power.):Alex, Fr<strong>an</strong>k R.--Seti<strong>an</strong> 1°, Illinois530


Alleé, John D.--Adept 2°, Mass., edi<strong>to</strong>r of sat<strong>an</strong>ic newsletterBrims<strong>to</strong>ne. Fr<strong>an</strong>k Sinatra f<strong>an</strong>.Anderson, Yol<strong>an</strong>da--Adept 2°, Calif. Adept at Black Magic. Sat<strong>an</strong>icpriestess.Aquino, Lilith Sinclair--Magistra Templi 40 Treasurer, she founded theLilith Gro<strong>to</strong> which was the largest <strong>an</strong>d longest-functioning Grot<strong>to</strong> of theLaVey’s Church of Sat<strong>an</strong>. On the T of S’s Council of nine, Of the Sinclairbloodline.Aquino, Michael--<strong>The</strong> vain Ipsissimus 6° of the Temple of Set, Missouri,Lt. Col. U.S. Army with high level security clear<strong>an</strong>ce, in MilitaryIntelligence <strong>an</strong>d army’s Psychic warfare battalion, Green Beret,member ACLU, Defense Intelligence College, <strong>an</strong>d prominent teacherof how <strong>to</strong> create Monarch slaves.Austen, David--Priest of Set 3°, London, Engl<strong>an</strong>d, Black Magici<strong>an</strong>who studies CrowleyBarrett, Ronald L., Jr.--Priest of Set 3°, Colorado, ex-Airborne R<strong>an</strong>ger,interested in alchemistryBennett, Clif<strong>to</strong>n B.--Seti<strong>an</strong> 1°, Colorado, studies Crowley, medievalSat<strong>an</strong>ism <strong>an</strong>d Kenneth AngerBerkey, C. Joseph, 3rd--Adept 2°, Virginia, does occult art <strong>an</strong>dpractices Enochi<strong>an</strong> MagicBlood, Linda--Wrote a book about her time with Michael Aquino<strong>an</strong>d the Temple of SetBlount, Larry D.--Seti<strong>an</strong> 1°, Texas, studies Friedrich Nietzche <strong>an</strong>dblack magicBozem<strong>an</strong>, Clay<strong>to</strong>n C.--Adept 2°, Oregon, Bradley, Curtis A.-Seti<strong>an</strong>1°, Colorado, Freemason, reads everything on vampiresBrowning, Willie--USAR officer in MlBuckm<strong>an</strong>, Samuel-Seti<strong>an</strong> 1°, Accra, Gh<strong>an</strong>a, West Africa, w<strong>an</strong>ts <strong>to</strong>spread black magic in West AfricaButch, William T.--Priest of Set 3°, Penn., Lt Comm<strong>an</strong>der of NavySEALs, studies <strong>an</strong>cient Egypti<strong>an</strong> Sat<strong>an</strong>ism531


Campbell, Adam N-Adept 2°, Melbourne, Vic<strong>to</strong>ria, Aust., sat<strong>an</strong>istinterested in politicsCh<strong>an</strong>dler, Kendal T.--Seti<strong>an</strong> 1°, Penn.. a musici<strong>an</strong> in<strong>to</strong> heavy metalmusicClark, Juli<strong>an</strong> R.-Priest of Set 3°. Engl<strong>an</strong>d, practicing hypnotherapist inLondon, has snakes for petsCruse, Roger D. 2nd-Seti<strong>an</strong> 1° , Georgia, interested has studiedClinical PsychologyDeCecco, R. Amn-Magistrer Templi 4°, Maine, on T of S’s Council ofNineDiCicco, Carm<strong>an</strong> J., Jr.-Seti<strong>an</strong> 1°. New Jersey, studies Bruce Lee,Machiavelli, <strong>an</strong>d An<strong>to</strong>n LaVey, likes Black Sabbath/OzzyDuNard-Phillips, Carolyne--Adept 2°, Missouri, Egypti<strong>an</strong> &Enochi<strong>an</strong>Magic, heads <strong>an</strong> Egypti<strong>an</strong> magic LodgeEgen, Sh<strong>an</strong>e M.-Seti<strong>an</strong> 1°, Welling<strong>to</strong>n, New Zeal<strong>an</strong>d, interested inHeavy Metal music, martial arts <strong>an</strong>d mind controlEngels, Georges-Seti<strong>an</strong> 1°, Belgium, practices Black MagicEv<strong>an</strong>s, Larry--Priest of Set 3°, Oklahoma, Sentinel of the Gates of HellPylonFarnsler, William E-Adept 2°, Texas,Felczak, John J--Adept 2°, Calif., has studied a wide variety ofoccult systemsFerguson, Rick A--Seti<strong>an</strong> 1°, Ohio,Flowers, N<strong>an</strong>cy K-Magistra Templi 4°, Texas, Edi<strong>to</strong>r of the Scroll of Set,part of the Bull of Ombos Pylon in Austin, TX.Flowers, Dr. Stephen E.-Magister Templi 4°, Texas, Gr<strong>an</strong>d Master ofOrder of the Trapezoid, expert of Runes <strong>an</strong>d Germ<strong>an</strong>ic occultismFox, D. Pete-Seti<strong>an</strong> 1°, Illinois, interested in Nazism’s occultismFriedel. Peter--Priest of Set 3°, West Ger. member of the Ordo Saturni(holds a high degree), 30° in the Scottish Rite, member of the Quatuor532


Coronati Lodge of London, generational sat<strong>an</strong>ist of the <strong>Illuminati</strong>,promotes Sat<strong>an</strong>ism’s growth in Europe.Gallo. Walter J.-Seti<strong>an</strong> 1°, New York, former painter. interested inCrowley <strong>an</strong>d NazismGibbs, Cynthia K.--Seti<strong>an</strong> 1°, Calif.,Goff, Joseph A-Adept 2°, Mich,Grady, James S-VirginiaGregoire, Raymond A-Priest of Set 3°. Wash, stateGrisé, Kevin M - Seti<strong>an</strong> 1°, hypnotherapist & rehab counselorGuliaeff, Nickolai N, Jr-Adept 2°, Calif.Gyori, John G, Jr.--Adept 2°, TexasH<strong>an</strong>d, Eddie W--Seti<strong>an</strong> 1°. Louisi<strong>an</strong>a (See previous art, in Oct. 15newsletter on Wayne Cox within the list of witch covens,)Hardee, Bry<strong>an</strong> C-Seti<strong>an</strong> 1°, Wyoming, was part of a guild ofmagici<strong>an</strong>s called the G.T.P,Hardy, Patty A--Priestess of Set 3°, Maine, likes <strong>to</strong> read RobertAn<strong>to</strong>n WilsonHaywood, Michael T--Seti<strong>an</strong> 1°, Illinois, (now perhaps in Pittsburg PA)Hearty, Marie L--Seti<strong>an</strong> 1°, Ontario, C<strong>an</strong>.,Hinson, Eulit M-Adept 2°, Black Magici<strong>an</strong> who studies Crowley,Aquino, the Golden Dawn, Nietzsche, vampirism, etc.J<strong>an</strong>tschik, Walter--Adept 2°, West Germ<strong>an</strong>y. Black Magici<strong>an</strong> whostudies vampirism, demonology, fraternal ordersJohnson, James R, Jr.--Adept 2°, Nevada.Johnson, Lynn (later married W.T. Butch)--high Seti<strong>an</strong> who left <strong>to</strong>form the Temple of NepthysJoyner, James C-Sec, of the Order of Leviath<strong>an</strong>, Baxley. GA533


Kalivoda, Kurt-Seti<strong>an</strong> 1°, Illinois, studied OTO black magicKeil, Jeffrey J-Seti<strong>an</strong> 1°, mmbr Rune-Gild,King, Stephen P--Seti<strong>an</strong> 1°, So. Carolina,Knowles, James L, Jr.--Seti<strong>an</strong> 1°, Minn., has studied Enochi<strong>an</strong> Magic.(<strong>The</strong> Knowles family is somewhat prominent.)Laakso, Petri-Seti<strong>an</strong> 1°, Finl<strong>an</strong>d. joined T of S as a young m<strong>an</strong> goingin<strong>to</strong> the Finish armed forcesL<strong>an</strong>ce, Rebecca C--Priestess of Set 3°, Calif., member of <strong>The</strong>Children which is a Sat<strong>an</strong>ic b<strong>an</strong>dLee, John--Seti<strong>an</strong> 1°, Queensl<strong>an</strong>d, Aust., interested in Nazism <strong>an</strong>d SSritualsLewis, James--ipsissimus 6°, Council of Nine, Baxley, Georgia, wasformerly with the Church of Sat<strong>an</strong>Lilly, James H, Jr --Seti<strong>an</strong> 1°, Lima, Peter J.--Seti<strong>an</strong> 1°Lynch, Scott C--Seti<strong>an</strong> 1°, Halifax, Nova Scotia, interested in Neo-Nazism <strong>an</strong>d the KKKMahoney, Michael--Seti<strong>an</strong> 1°, Mass.M<strong>an</strong>n, Dennis K-Priest of Set 3°, Order of the Trapezoid, <strong>an</strong>d Order ofthe Vampire, New York, USAR in Ml. propag<strong>an</strong>da expert <strong>an</strong>d <strong>an</strong>at<strong>to</strong>rneyMatthews, Lee J-Adept 2°, Conn., studies the Yezidee Sat<strong>an</strong>istsMcGr<strong>an</strong>ah<strong>an</strong>, Timothy L.--Adept 2°, IllinoisMensohel, Robert--Magister Templi 4°, Calif., Member of Mensa,computer whiz kid, edi<strong>to</strong>r Ruby TabletMoffatt, Robert H--Magister Templi 4°, Calif., co-fdr of T of S Councilof 9, edi<strong>to</strong>r SCROLL, operated Set-Amentet Pylon in LA. Moore, PatrickR.--Seti<strong>an</strong> 1°, FLNeilly, Robert W.-Magister Templi 4°, Ontario, C<strong>an</strong>ada, co-fdr T of 5,Chrmn Council of Nine, ESP researchNielsen, Ruth A.--Adept 2°, WI, ex-Catholic nun, in<strong>to</strong> magic, incl.hermetic magic <strong>an</strong>d computers534


Nourse, Andrew--Seti<strong>an</strong> 1°, MA, amateur radio, computerprogrammer, in<strong>to</strong> massage magic, Osbourne, Am<strong>an</strong>da--Adept 2°, CA,likes Stephen King Novels <strong>an</strong>d Star Trek, <strong>an</strong>d love horror filmsPage, Richard E--Seti<strong>an</strong> 1°, Ml, in<strong>to</strong> runic <strong>an</strong>d Enochi<strong>an</strong> magicParkin, An<strong>to</strong>ny--Adept 2°, L<strong>an</strong>cashire, Eng.. likes Nazi SS thingsPridgen, William D.--Adept 20, So. Cara., likes the works of Crowley,Lovecraft, Gr<strong>an</strong>t, R.A. Wilson, John Wheeler <strong>an</strong>d others. Radtke,Walter--Adept 2°, CA. experimental artist, interested in DaVinci, Tesla, VelikovskyReichensperger, Peter--Seti<strong>an</strong> 1°, mathematici<strong>an</strong>. Esoteric Order ofDagon. works with computersReynolds, Linda--Magistra Templi 4°, Tenn, co-leader of SeshenPylon, S<strong>an</strong> Fr<strong>an</strong>ciscoRietze, Perry A.--Seti<strong>an</strong> 1°, FL, Sat<strong>an</strong>ist interested in Sat<strong>an</strong>ic Bible,ritual magic, Egyp<strong>to</strong>logy, <strong>an</strong>d demonologyRigby, Michael S-Adept 2°, TXRivera, Peter N--Adept 2°, Calif., interested in the magical effects ofdrums <strong>an</strong>d musicRobinson, Robert W-Priest of Set 3°, UT. interested in snakes, studyingthe <strong>Illuminati</strong>, built ritual sites in Death Valley, explores Aztec ruins.Rowlett, Curtis A--Adept 2°, GA, interested in AleisterCrowley/<strong>The</strong>lemaRush, Jennifer--Adept 2°, N.S.W. Australia, uses Tarot cards as ahobbyRussell, Di<strong>an</strong>e--Seti<strong>an</strong> 1°, FL, practices Black Magic S<strong>an</strong>dling. Fr<strong>an</strong>cesS.--Adept 2°, Dorset, Eng.. interested in John Dee (Enochi<strong>an</strong>Magic). Crowley & LaVey. Does Black Magic rituals.Sass, James D--Seti<strong>an</strong> 1°, P.O. Box 666, Day<strong>to</strong>na Beach, FL 32115,Hard core black magici<strong>an</strong>.Saunders, Richard--Adept 2°, Engl<strong>an</strong>d. interested in Black Magic<strong>an</strong>d Chaos MagicSchumacher, Jeurgen--Seti<strong>an</strong> 1°, Germ<strong>an</strong>y, works Hatha Yoga, likesOdinism, studies hypno-therapy535


Scott, Eardley W--Seti<strong>an</strong> 1°, NJ, a drummer with a rock/jazz fusion,like Enochi<strong>an</strong> magic & its conversion <strong>to</strong> Seti<strong>an</strong> symbolismShull, Robert W--Adept 2°, VA,Snow, Heather L--Adept 2°, NM, artistSobolewski, R. Douglas--Seti<strong>an</strong> 1°, PA, Rosicruci<strong>an</strong> (AMORO) 8°,amateur astronomerSpriet. Patrick--Adept 2°, Belgium, interested in Nazism <strong>an</strong>d Egypt,multilingual in 5 l<strong>an</strong>guagesS<strong>to</strong>ut, Julie--Adept 2°, TX,Taylor, Lucifer E--Seti<strong>an</strong> 1°, MA, Exec, Sec. of Brims<strong>to</strong>ne, a journal ofthe Anc. Brotherhd of Sat<strong>an</strong>, 231 Kennedy Dr #130, Malden, MA 02148Thompson, El<strong>an</strong>a--Seti<strong>an</strong> 1°, OR, interested in the occult, sciencefiction <strong>an</strong>d <strong>an</strong>thropology esp. the Middle EastV<strong>an</strong> Patten, William P--Seti<strong>an</strong> 1°, NY, likes Heavy Metal music likeOzzy/Black Sabbath, reads Stephen King. studies NazismWatson, Amoid R--Seti<strong>an</strong> 1°, TX, interested in Egyp<strong>to</strong>logy, the YezidiSat<strong>an</strong>ists, Enochi<strong>an</strong> Magic, <strong>an</strong>d other things.Webb, Don--Adept 2°, TX,Weirich, Richard J--Seti<strong>an</strong> 1°Wendall, Margaret A--Magistra Templi 4°, CA, was a prominentmmbr of Ch. of Sat<strong>an</strong>, founded the Scroll of Set & has been its edi<strong>to</strong>rWhitaker, Colleen G--Honorary Seti<strong>an</strong>, OH, artist, interested in theTarot, Councillor & Ex, Dir, for Ch of Sat<strong>an</strong>Whitaker, Roger L--Honorary Seti<strong>an</strong>, OH, a film maker, likes horrorfilmsWinkhart, Rol<strong>an</strong>d--Priest of Set 3°, Germ<strong>an</strong>y, helps Peter Friedeloperate the Black Diamond Pylon in Germ<strong>an</strong>y for the T of SZajkowski, Marie M--Priestess of Set 3°, CA. Zimmer, Bri<strong>an</strong> E.-Adept 2°,OH.536


DR. GREEN (Dr. Joseph Mengele)<strong>The</strong> most signific<strong>an</strong>t programmer, perhaps one could give him the titleof the father of Monarch Programming was Joseph Mengele, <strong>an</strong> ex-Nazi Concentration Camp doc<strong>to</strong>r. Thous<strong>an</strong>ds of Monarch mindcontrolledslaves in the U.S. had “Dr. Green” as their chief programmer.Physically the doc<strong>to</strong>r was 5’8”, dark-brown hair, greenish brown eyes,<strong>an</strong>d gracefully h<strong>an</strong>dsome. He was a Dr. Jekyll-Mr. Hyde character whodisarmed people by his kindness. He was gentle <strong>an</strong>d quiet <strong>an</strong>dintelligent, while still having a very sadistic brutal side <strong>to</strong> him. JosephMengele was born in<strong>to</strong> a wealthy Sat<strong>an</strong>ic bloodline, <strong>an</strong>d became oneof the most powerful Sat<strong>an</strong>ists in the world. He was <strong>an</strong> expert ondemonology <strong>an</strong>d the Cabala. He was at least a Gr<strong>an</strong>d Master in the<strong>Illuminati</strong>, but how high he went up the hierarchy ladder is unknown <strong>to</strong>this author. Because he was part of the <strong>Illuminati</strong> <strong>an</strong>d their bodies arenot <strong>to</strong> have visible scars, Joseph Mengele did not take the SS ta<strong>to</strong>o onhis body when he joined the Nazi SS. Mengele became the campdoc<strong>to</strong>r at the famous Auschwitz Concentration Camp. JosephMengele was in a very key position as the camp doc<strong>to</strong>r at Auschitz. Hewas able <strong>to</strong> use countless thous<strong>an</strong>ds of people as guinea pigs forexperiments. One of the chief items that had <strong>to</strong> be charted in detailwas how much <strong>to</strong>rture various hum<strong>an</strong>s could take. <strong>The</strong> charts wereworked up so that the <strong>Illuminati</strong> would know exactly how much <strong>to</strong>rture<strong>an</strong>d how much nurturing <strong>to</strong> carry out in creating trauma-based mindcontrolledslaves. After Joseph grew up in Gunzberg with a familynoted for their secrecy, <strong>an</strong>d <strong>an</strong> abusive mother, he studied at Fr<strong>an</strong>kfurtam-Mainwhich is a sat<strong>an</strong>ic stronghold in Germ<strong>an</strong>y. He interned atLeipzig, a <strong>to</strong>wn known for being the site of modern leaming theories.Later he joined the SA <strong>an</strong>d then later the SS. At the end of W.W. LItheUnited States army <strong>to</strong>ok cus<strong>to</strong>dy of Mengele, <strong>an</strong>d the secret sat<strong>an</strong>istsof the sat<strong>an</strong>ic brotherhood, got Mengele quietly smuggled in<strong>to</strong> the U.S.Mengele was given a higher profile in South America <strong>to</strong> lead people <strong>to</strong>think that he spent his time in South America. Actually Mengele spent agreat deal of time travelling worldwide especially <strong>to</strong> places likeTavis<strong>to</strong>ck <strong>an</strong>d China Lake’s Naval Intelligence base where Monarchslaves were created from innocent children. Although Mengele didindeed live in Brazil, Argentina <strong>an</strong>d Paraguay a great deal ofmisinformation <strong>an</strong>d disinformation has been dumped on the world bythe CIA <strong>an</strong>d other groups working for the <strong>Illuminati</strong>. Mengele continued<strong>to</strong> love music <strong>an</strong>d d<strong>an</strong>cing throughout his life. He became a hum<strong>an</strong>puppetmaster who used music <strong>to</strong> program with. He liked both the violin<strong>an</strong>d the pi<strong>an</strong>o. He did lots of musical key-<strong>to</strong>nes programming. Some ofhis proteges also used music <strong>to</strong> program with. This bent <strong>to</strong>ward usingmusic then contributed <strong>to</strong> the fact that the Americ<strong>an</strong> country westernindustry is <strong>an</strong> outgrowth of the Monarch program. <strong>The</strong> country westernindustry is a cover for the drug running done via Monarch slaves.Another bent of Mengele’s also contributed <strong>to</strong> a direction that the537


Monarch program <strong>to</strong>ok. Mengele was fascinated by twins <strong>an</strong>dtwinning. Mengele experimented on thous<strong>an</strong>ds of twins, most of whodied from the <strong>to</strong>rture of the experiments. Science experiments needtwo groups, one of which is a control group. Twins make research easy.Mengele used them extensively. He was developing, along with someGerm<strong>an</strong> <strong>an</strong>d Itali<strong>an</strong> researchers, the capability <strong>to</strong> trauma bond people<strong>to</strong> their abuser <strong>to</strong> such <strong>an</strong> extent that the victim would be <strong>to</strong>tally loyal<strong>to</strong> their abuser. During episodes in the camps when Mengele savedpeople from execution by the S.S., some of those people remainedloyal <strong>to</strong> him <strong>to</strong> this day in spite of <strong>an</strong> awareness of how m<strong>an</strong>y peoplehe cruelly <strong>to</strong>rtured <strong>to</strong> death. Monarch slaves are programmed <strong>to</strong> thinkthey have a twin somewhere. M<strong>an</strong>y of them have been twinned in<strong>to</strong> 2person <strong>an</strong>d 4 person teams also. Mengele was known by people in thecamps by his victims as the Angel of Death, Vater (father), Vaterchen(daddy) <strong>an</strong>d Schoner Joseph (beautiful Joseph). Monarch mindcontrolledslave victims who were programmed by him know him bynames such as Doc<strong>to</strong>r Green, Papa, David <strong>an</strong>d Fairchild. Monarchslaves remember the cadence of his shiny black boots as he marchedback <strong>an</strong>d forth while programming them. Whether programming in alab, or experimenting on hum<strong>an</strong>s Dr. Mengele enjoyed reducingpeople <strong>to</strong> the level of <strong>an</strong>imals. However, m<strong>an</strong>y times his victims wererestrained from crying tears. Mengele is well-known by his Monarchvictims for his daisy game programming. He would pull off a daisy <strong>an</strong>dsay I love you.” <strong>The</strong>n he would pull of one <strong>an</strong>d say, I love you not.”When the last daisy petal came out I love you not,” he would then kill asmall child in front of the child he was programming. Mengele was inDallas during the killing of JFK, which was achieved by trained Monarchslaves. (In fact, the Beaumont, TX Enterprise on Mon. April 10, ’94 in theMetro Sect. B, on page B cont. <strong>to</strong> 4b reports that a sworn affidavit existswhere a m<strong>an</strong> connects Joseph Mengele with Kennedy’s death <strong>an</strong>d <strong>to</strong>have seen Mengele at the Texas Book Deposi<strong>to</strong>ry.) Luis Angel Castillowas just one of the Monarch mind-controlled slaves sent <strong>to</strong> kill JFK onNov. 22, ’63. A wom<strong>an</strong> from Germ<strong>an</strong>y named Mrs. Krebs, along with ahost of other programmers, worked with Mengele on the Kennedyassassination. In 1956, as part of the ongoing deception (<strong>an</strong>d alsoshowing the audacity of the <strong>Illuminati</strong>) Joseph Mengele applied <strong>an</strong>dgot <strong>an</strong> Argentine<strong>an</strong> foreign resident permit under his own name. Heeven travelled <strong>to</strong> Europe <strong>to</strong> various countries in 1956 using his ownname.DR. WHITE (Dr. D. Ewen Cameron)Dr. White was the cover name for D. Ewen Cameron (b. Dec. 24, 1901 -Sept. 8, 1967). He was born in Scotl<strong>an</strong>d, was tall, imposing, & blue eyed,liked whiskey, <strong>an</strong>d wore cus<strong>to</strong>m-made suits. He called women “Lassie.”His favorite book growing up was Fr<strong>an</strong>kenstein, it is said thatFr<strong>an</strong>kenstein inspired him <strong>to</strong> go in<strong>to</strong> psychiatry.538


Cameron was president of the powerful Americ<strong>an</strong> PsychiatricAssociation, <strong>an</strong>d later the president of the C<strong>an</strong>adi<strong>an</strong> PsychiatricAssociation, <strong>an</strong>d then later the first president of the World Associationof Psychiatrists. He was chairm<strong>an</strong> of the C<strong>an</strong>adi<strong>an</strong> Scientific Pl<strong>an</strong>ningCommittee. Dr. D. Ewen Cameron, of Montreal, C<strong>an</strong>ada was Dr. Whitewhen carrying out Monarch programming. Cameron tried <strong>to</strong> continuesome of Mengele’s eye color research in C<strong>an</strong>ada. Mengele was trying<strong>to</strong> discover for the Nazi’s how <strong>to</strong> make brown eyes blue. Cameronreceived funding from the <strong>Illuminati</strong>. Cameron also got funding fromthe CIA. <strong>The</strong> Rockefeller Foundation gave him $40,000 in 1943 <strong>to</strong> createthe Allen Memorial Institute for psychiatry, <strong>an</strong> <strong>Illuminati</strong> front. He beg<strong>an</strong>doing programming early in the 1950s. Cameron had served on thegruesome western front in W.W.I. As <strong>an</strong> <strong>Illuminati</strong> kingpin <strong>an</strong>dprogrammer, Cameron (Dr. White) was very sadistic <strong>an</strong>d cold blooded.He visited other programmers on the West Coast periodically. Oneleading c<strong>an</strong>adi<strong>an</strong> doc<strong>to</strong>r said that Cameron “was not possessed of thenecessary sense of hum<strong>an</strong>ity <strong>to</strong> be regarded as a good doc<strong>to</strong>r.” <strong>The</strong>m<strong>an</strong> was able <strong>to</strong> instill fear in<strong>to</strong> people by looking at them. He metfrequently with Allen Dulles, the head of the CIA. He travelledfrequently including making s<strong>to</strong>ps in Washing<strong>to</strong>n. M<strong>an</strong>y of the Monarchslaves on the east coast were victims of Cameron. He worked longhours at his mind-control work like a driven m<strong>an</strong>. In 1961, just one ofCameron’s institutions administered under his supervision 60,000electrical shocks <strong>to</strong> patients. This is just what was recorded at oneinstitution for one year. Who knows how m<strong>an</strong>y victims got electricalshocks <strong>an</strong>d programming by this m<strong>an</strong>? He worked with the Jesuit par<strong>to</strong>f the NWO in C<strong>an</strong>ada. Leonard Rubenstein was one of his trustedassist<strong>an</strong>ts. Cameron encouraged dissension among his staff in divide<strong>an</strong>d Conquer tactics <strong>to</strong> maintain his power. Cameron had a big egothat allowed him <strong>to</strong> steal other people’s work <strong>an</strong>d give himself creditfor it, in his publications.539


APPENDIX B - THE PROGRAMMING SITESSome MAJOR MIND-CONTROL PROGRAMMING SITES with expl<strong>an</strong>ationsof their programming. (Fritz Springmeier originally exposed m<strong>an</strong>y ofthese sites in 1993, so it is possible they have made some ch<strong>an</strong>ges sincethey were originally exposed. Most of these operated for years, <strong>an</strong>dmay still be operating. We are aware of that some of theirprogramming bases have been moved after exposure.) Besides thesemajor programming sites, there are countless minor ones. For inst<strong>an</strong>ce,some of the programming sites for water-beach <strong>to</strong>rtures have beenvisited by the co-authors, but are not listed. <strong>The</strong> massive Boeing Pl<strong>an</strong>t inthe Seatle, WA area with its large amount underground tunnels hasbeen used for programming, as well as the ARCO Beaver Valley Pl<strong>an</strong>tin Pennslyv<strong>an</strong>nia. So has the chapel at the Coast Guard Academy atNew London, Conn. which was built by A.W. Mellon of the Mellon<strong>Illuminati</strong> family via their Mellon Foundation. This list is not put forth ascomprehensive. Without question, this list is only the tip of the iceberg.29 Palms, CA-Area 51 (Dreaml<strong>an</strong>d, Groom Lake), NV--Area 51 is also known asDreaml<strong>an</strong>d. <strong>The</strong>re are a number of extensive underground facilities inthe area. This was one of the first genetic research facilities in the U.S.<strong>an</strong>d perhaps the first major genetic research facility. <strong>The</strong>people/workers & victims are brought in by airpl<strong>an</strong>e <strong>an</strong>d tube shuttle.<strong>The</strong> worst cases of UFO/alien type of Monarch programming is comingout of Area 51. <strong>The</strong> eggs from slaves are being harvested <strong>an</strong>d weirdgenetic creatures are being developed from hum<strong>an</strong> eggs which havebeen genetically mixed with other things.Bethseda, MD--<strong>The</strong> Bethesada Naval HospitalBingham, UT--A red brick house, which was a closed House ofProstitution. <strong>The</strong> building was used for KKK programming. Child pornwas produced in the basement, <strong>an</strong>d upstairs programmed child slavesserviced KKK members. <strong>The</strong> KKK activity in the area connects in withthe <strong>Illuminati</strong> controlled Kennecott Copper Co. (aka Utah Copper Co.)Russell G. Frazer, head of Bingham’s Klavern & doc<strong>to</strong>r for KennecottCopper Co. did the electro-shock <strong>to</strong> split personalities.Black Forest, Germ<strong>an</strong>y--Because the U.S-U.K. <strong>an</strong>d Germ<strong>an</strong>y do somuch programming, <strong>an</strong>d some of the people in the U.S. wereprogrammed in the U.K., Germ<strong>an</strong>y or Russia, it is worthwhile <strong>to</strong> mention540


some of the Germ<strong>an</strong> programming sites. A number of witnesses reportabout castles in the Black Forest which are used for programming &ritual. Basal, Sw. on the border with Germ<strong>an</strong>y is a import<strong>an</strong>t <strong>Illuminati</strong>center. Fr<strong>an</strong>kfurt, Berlin <strong>an</strong>d Zurich are all import<strong>an</strong>t programming/ritualsites. <strong>The</strong> Jesuits <strong>an</strong>d the Catholic churches are very active inprogramming in Germ<strong>an</strong>y.Boulder, CO--<strong>The</strong> headquarters for EMC, a type of electra-magneticmind control that is being broadcast <strong>to</strong> modify the thinking ofAmeric<strong>an</strong>s, <strong>an</strong>d <strong>to</strong> control slaves.Butner, N.C.--Center of Correctional Research, all types of mindcontrol are carried out <strong>an</strong>d experimented with on the inmates.Camp Peary, VA--<strong>The</strong> CIA’s <strong>The</strong> Farm is located on a narrow strip ofl<strong>an</strong>d between the York & James Rivers near Williamsburg, VA, used forprogramming CIA slaves. It has red brick buildings, <strong>an</strong>d looks similar <strong>to</strong> asmall college. <strong>The</strong> official cry<strong>to</strong>nym was ISOLATION. People who arebrought in who don’t know where they are for training are called BlackTrainees.China Lake Naval Research Base (Inyokern), CA-- This facility had acountry s<strong>to</strong>re, <strong>an</strong>d h<strong>an</strong>gers, <strong>an</strong>d a hospital (address for the hospital isthe code- 232 Naval Air Weapons Station) which all provided sites forprogramming. This site has been operational since the early 1950s.Large numbers of children (batches of 1000 or 2,000 or 3,000 childrenwere run through this facility at a time. This facility did much of theoriginal traumas <strong>an</strong>d mind-splitting <strong>to</strong>rtures that created the MPD.Other facilities then specialized in further programming that was thenlayered in on <strong>to</strong>p of the original China Lake programming. A greatdeal of dehum<strong>an</strong>ization in cages was done <strong>to</strong> large numbers of tinychildren at China Lake Naval Facility. Nimitz Hospital did drug testing ofthe children prior <strong>to</strong> their programming.Colorado Springs, CO--<strong>The</strong> ALEX system programming <strong>an</strong>d endtimesMilitary programming is coming out of Colorado Springs <strong>an</strong>d isconnected <strong>to</strong> NORAD. One of the Colorado sites is doing alienprogramming with mock UFOs.Dillsboro Nike Base--Monarch programming of m<strong>an</strong>y kindsDisneyl<strong>an</strong>d, CA--Disneyl<strong>an</strong>d has been <strong>an</strong> off hour site for <strong>Illuminati</strong><strong>an</strong>d sat<strong>an</strong>ic rituals for years. Programming has gone on usingDisneyl<strong>an</strong>d as one big prop for programming. M<strong>an</strong>y of the Disneymovies are used for programming, <strong>an</strong>d some Disney scripts areespecially tailored for Monarch slave programming. <strong>The</strong> Peter P<strong>an</strong>programming c<strong>an</strong> use the ship. <strong>The</strong> space programming c<strong>an</strong> use the541


space props. <strong>The</strong> sat<strong>an</strong>ic programming c<strong>an</strong> use the castles. Lots ofmirror programming is done at Disneyl<strong>an</strong>d, <strong>an</strong>d Disneyworld. <strong>The</strong>re isalso Magic Mountain programming, <strong>an</strong>d programming using theAround the World Dolls, <strong>an</strong>d its theme song. Some of Wizard of Oz <strong>an</strong>dthe Cinderella programming was also done at Disneyl<strong>an</strong>d usingcostumes. Preverbal children are taken <strong>to</strong> Disneyl<strong>an</strong>d <strong>to</strong> get themready for the scripts.Disneyworld, FL--Disneyworld was created as the easterncounterpart <strong>to</strong> the Disneyl<strong>an</strong>d programming site. One of the rides inDisneyworld plays “It’s a small, small world” which is Disneyl<strong>an</strong>ddeveloped programming theme.Ft. Campbell, KT--Base programs are placed in here.Ft. Detrick, MD--involved with medical/biological experimentationFt. Holabird, MD--This site is no longer in existence, but was the ArmyIntelligence School. CIC used the school. <strong>The</strong> place was known as “theBird.”Ft. Hood, TX--programming involving military uses of Delta Monarchslaves was done here.Ft. Huahuachua, AZ--HQ for Army Intelligence.Ft. Knox, KT--<strong>The</strong> 1st Earth Batt. was developed here.Ft. Lewis, WA--involved with the Psychic warfare part of theMonarch Programming.Ft. McClellen--Ft. Meade, MD--<strong>The</strong> National Security Agency was created on 4 Nov1952. Its headquarters were Fort Meade, VA. <strong>The</strong> National SecurityAgency (NSA) employs tens of thous<strong>an</strong>ds of employees <strong>an</strong>d has abudget larger th<strong>an</strong> the CIA. It has also been kept far more secret, whilethe CIA has been used as the fall guy <strong>to</strong> protect the National SecurityAgency’s reputation. In the late 1960’s, under Operation Minaret <strong>an</strong>dProgram Shamrock, the NSA <strong>an</strong>d its British counterpart GCHQ beg<strong>an</strong>moni<strong>to</strong>ring much of the communication within the USA <strong>an</strong>d UK. <strong>The</strong>NSA moni<strong>to</strong>rs all americ<strong>an</strong> calls via computers using trip words, specificnames, specific addresses, specific telephone numbers, etc. NSA hasseveral computer <strong>to</strong> record all the millions of conversations which thecomputers have examined <strong>an</strong>d deemed worthy of recording. How theNSA c<strong>an</strong> get <strong>an</strong>y use out of millions of recorded telephoneconversations is beyond me? What intelligence agency could542


adequately process so much information? <strong>The</strong>se org<strong>an</strong>izations nowmoni<strong>to</strong>r all communications within both countries. At least onecongressm<strong>an</strong> got upset that his phone was bugged by the NSA. (seeDavid Corn’s article, “<strong>The</strong> case of the bugged sena<strong>to</strong>r” in Nation, Feb.6, ‘89, p. 152.) <strong>The</strong> NSA has developed a fiberoptics network calledInternet computer network. An or<strong>an</strong>ge book is used <strong>to</strong> specify some ofthe NSA’s security levels. An inform<strong>an</strong>t in the National Security Agencystates that establishment newspapers like the Wall Street Journal <strong>an</strong>dthe New York Times are used <strong>to</strong> communicate secret messages whichare placed within w<strong>an</strong>t ads, buzz words in edi<strong>to</strong>rials, <strong>an</strong>d via othermethods. Because of some of what this person <strong>to</strong>ld me, I have givensome possible examples in this newsletter of how people might beusing the papers for secret messages. For inst<strong>an</strong>ce using MichaelJackson with his h<strong>an</strong>ds making some type of sign might be a signal.M<strong>an</strong>fried Adler <strong>an</strong>d the US Senate Committee investigating the CIAfound that 90% of the CIA’s secret messages are tr<strong>an</strong>smitted via themedia, with the aid of coded texts <strong>an</strong>d pictures. A raised forefinger ortwo raised forefingers while a speaker is talking me<strong>an</strong>s that themessage is a masonic message coming from a masonic speaker. <strong>The</strong><strong>Illuminati</strong> uses code words within the large establishment papers <strong>to</strong>warn their people what they are going <strong>to</strong> do with the economy. In thisway, people in the <strong>Illuminati</strong> c<strong>an</strong> take appropriate responses.Goddard Space Flight Center--NASA mirror-theme programmingGrissom AFB, IND--Hollywood, CA--One of the programmers/h<strong>an</strong>dlers in the Hollywoodarea is surprisingly An<strong>to</strong>n LaVey. This is one reason An<strong>to</strong>n LaVey hasfollowers who will carry out his very wishes. LaVey’s children of coursewere programmed <strong>to</strong>o. His own girls have been participating in thenude in sat<strong>an</strong>ic rituals since little children.Homestead AFB, FL--Kirkl<strong>an</strong>d AFB, NM--Lamp, MO--This has been the site of a CIA near-death traumacenter where slaves are programmed. It is <strong>an</strong> R&R center for the CIAwhere they c<strong>an</strong> have <strong>an</strong>y sexual perversion or drug they w<strong>an</strong>t. This hasbeen a large cocaine supply depot also. Hal Meadows was direc<strong>to</strong>r ofthis center which is deep in the woods surrounded by cabin chaletsoverlooking a small deep lake. A gravel road leads <strong>to</strong> the site which isfenced <strong>an</strong>d well-guarded. Hal Meadows address was Box 27, Lampe,MO 65681.L<strong>an</strong>gley, VA-- Slaves for the w<strong>an</strong>ts of intelligence.543


Las Vegas (sites in <strong>an</strong>d around Las Vegas), NV--MGM’s Gr<strong>an</strong>d Hotel<strong>an</strong>d <strong>The</strong>me park were built for programming, but there are also somesites outside of the city used. In the general area of Las Vegas inremote sites, the elite gather for slave auctions once a year whereMonarch slaves are sold <strong>an</strong>d traded. One of the favorite slave auctionsites was 20 miles out of Las Vegas <strong>an</strong>d 10 miles off the main road in<strong>to</strong>the site. <strong>The</strong> Mob is involved with Monarch slaves in Las Vegas. A blueeyed11 year old girl will go for $50,000. Toron<strong>to</strong>, C<strong>an</strong>ada is <strong>an</strong>otherregular site for Monarch slave auctions.McClell<strong>an</strong> AFB, CA--Very bad Child <strong>an</strong>d adult porn using Monarchvictims is distributed through this base as well as the other bases listed inthis list. A T.W. S<strong>an</strong>derson worked with Monarchs at this base.MacDill AFB, FL--Near Tampa, FLMaxwell AFB, AL --Montreal, Que., C<strong>an</strong>ada - McGill Univ., McGill Psychiatric TrainingNetwork, All<strong>an</strong> Memorial Inst., St. Mary’s Hosp.-- <strong>The</strong> Zombie Room(Sleep Room) in the basement, the Isolation chamber <strong>an</strong>d the GridRoom at St. Mary’s Hospital were used for programming.Mt. Shasta, CA--Underground facilities around this hugh mountain inthe Lake Shasta area are putting out Monarch programming thatmakes the people think they are in communication with aliens. Thisfacility is for <strong>to</strong>rturing & reprogramming captured runaway Monarchslaves. People are brought in<strong>to</strong> the area via helicopter, pl<strong>an</strong>e, or flyingsaucer. This site is probably the largest mind-control programmingcenter. It is in a remote wooded area. It is heavily guarded, has fences,<strong>an</strong>d a large contingent of black helicopters. Mt. Shasta is equippedwith state of the art high tech programming equipment. <strong>Mind</strong>controlledslaves who are soldiers are programmed <strong>an</strong>d trained at theMt. Shasta facility.Nashville, TN--<strong>The</strong>se sites work with the Country Western MusicIndustry which is actually a CIA front for moving drugs <strong>to</strong> fin<strong>an</strong>ce theirdirty black activities. Fiddler’s Inn, Nashville fits in with the MonarchProgramming.Papillion, NE--Patrick AFB,--Portl<strong>an</strong>d (Old OMSI, New OMSI, Bldg. Near Monarch Hotel at 8800 SE544


Sunnyside Rd., Mormon Temple, etc.), OR. <strong>The</strong> Old OMSI building had aback door on the west side in which slaves were taken in <strong>to</strong> the bot<strong>to</strong>mfloor <strong>an</strong>d reprogrammed. Although security guards aren’t visible, theyare there with electronic surveill<strong>an</strong>ce. <strong>The</strong> people running OMSI aretied in the <strong>Illuminati</strong>. <strong>The</strong> DC-3 airpl<strong>an</strong>e outside of the building was usedin the programming as a hypnotic trigger. <strong>The</strong> submarine dockedoutside of the new OMSI building is also used as a programminghypnotic <strong>to</strong>ol. <strong>The</strong> new Mormon Temple has <strong>an</strong> extremely high techunderground tunnel facility for programming built underneath it.Witnesses have collaborated their testimony on this high techprogramming site under the Portl<strong>an</strong>d Mormon Temple. Althoughbuilding pl<strong>an</strong>s are <strong>to</strong> be public information, the city of Lake Oswegomakes it very difficult <strong>to</strong> view the temple’s building pl<strong>an</strong>s. <strong>The</strong> pl<strong>an</strong>sshow that the foundation walls are far thicker th<strong>an</strong> <strong>an</strong>y conceivableearthquake would ever call for. <strong>The</strong> reason is that the foundation helpshouse <strong>an</strong> underground arena for the <strong>Illuminati</strong> & <strong>an</strong>d their guests <strong>to</strong>watch perverse shows.Presideo, CA (incl. Alcatraz, S<strong>an</strong> Fr<strong>an</strong>cisco)-- <strong>The</strong> <strong>Illuminati</strong> <strong>an</strong>dvarious Sat<strong>an</strong>ic cults used the Presideo for their programming. Splitbrain& other programming was done at Letterm<strong>an</strong> hospital. Fort Pointwas used for <strong>Illuminati</strong> ritual & programming, as well as a number ofchurches, underground gun emplacements <strong>an</strong>d the large circularGreek column art building at the Presideo. Alcatraz, ab<strong>an</strong>doned as aprison, was used for water <strong>to</strong>rtures <strong>an</strong>d other programming. Tunnelsconnected buildings, <strong>an</strong>d the Mule/Horse buildings <strong>an</strong>d the cemeteryalso were used. This is one of the older programming sites. Psychicwarfare activity also was experimented on in this area. Letterm<strong>an</strong>Hospital has been used for the initial drug testing of the inf<strong>an</strong>ts beforeprogramming. Lots of isolation programming in damp cold places wasdone at the Presideo. Lots of porn <strong>an</strong>d military programming have alsobeen done here.Reds<strong>to</strong>ne Arsenal, AL--S<strong>an</strong> An<strong>to</strong>nio, TX--Salt Lake City (Mormon Temple)--This underground facility works inconjunction with the Mormon hierarchy who are allowed <strong>to</strong> createslaves. <strong>The</strong> <strong>Illuminati</strong> put in base programming that still gives themultimate control beyond the control that the Mormon programminghas.Scotty’s Castle, Death Valley, CA--Mengele (Dr.Green)programmed in some of his “internal boxes” as well as other <strong>Illuminati</strong>programming was done at this site. Mengele had a large circular redbed in the castle which he s<strong>to</strong>cked with his little girl slaves, who already545


had kitten sexual alters. Scotty’s Castle is a castle located in DeathValley CA. It has a very interesting his<strong>to</strong>ry. To reach the castle one isrequired <strong>to</strong> drive through m<strong>an</strong>y miles of desert. If one drives <strong>to</strong> lnyoCounty, CA, the same county that has China Lake Naval TestingGrounds, <strong>an</strong>d Inyokern, <strong>an</strong>d then you drive on Hwy. 190 in<strong>to</strong> DeathValley National Monument (it is not a park or forest, dead valleys arecalled monuments), next you go north on a road after S<strong>to</strong>ve Pipe for 35miles. <strong>The</strong> m<strong>an</strong> who built Scotty’s Castle was Walter Perry Scott (1872-1954). Walter P. Scott was the son of <strong>an</strong> alcohol distiller <strong>an</strong>d horsebreeder in Kentucky. Walter did not get <strong>an</strong>y formal education. He lefthome <strong>an</strong>d went west where he worked as a mule driver, <strong>an</strong>d a waterboy. From there he became a horse wr<strong>an</strong>gler. Because of his talentwith horses Buffalo Bill made him the feature rider along with AnnieOakley in Buffalo Bill’s family show. <strong>The</strong> show travelled <strong>an</strong>d Scotty waswith it eleven years. During this time, Scotty made m<strong>an</strong>y import<strong>an</strong>tfriendships with men of power <strong>an</strong>d wealth. In 1900, Walter married <strong>an</strong>dleft the show. He got a lo<strong>an</strong> from Juli<strong>an</strong> Gerard, a NY b<strong>an</strong>ker, <strong>to</strong> goprospecting for gold which he failed <strong>to</strong> pay back. Juli<strong>an</strong> Gerard wasrepeatedly sending people <strong>to</strong> hassle Scotty <strong>to</strong> get his money back. In1905, Walter Scott (“Scotty”) scattered gold nuggets <strong>an</strong>d $100 bills fromN.Y. <strong>to</strong> L.A. Where he got all this gold <strong>an</strong>d $100 bills is a mystery, but itwasn’t from prospecting. <strong>The</strong> idea of finding a secret mine was veryobviously a cover for however Scotty m<strong>an</strong>aged <strong>to</strong> get his money.Scotty is well-known for his pench<strong>an</strong>t <strong>to</strong> throw away $20 gold pieces asif they were c<strong>an</strong>dy wherever he went. Nobody believed he had amine, str<strong>an</strong>gely the IRS never got interested in Scotty. Why? <strong>The</strong> IRSwent after Charles Caughlin who was exposing the elite, the b<strong>an</strong>kers,the Freemasons, etc. in the early 1930’s on his radio show. <strong>The</strong>re was noreason <strong>to</strong> suspect Caughlin of <strong>an</strong>y cheating on his Income Tax, <strong>an</strong>d theaudits found the IRS actually owed Caughlin money. However thenational papers printed front page s<strong>to</strong>ries of the IRS investigation, <strong>an</strong>dpractically ignored that the m<strong>an</strong> was exonerated. Yet, the IRS leftScotty alone. Hmmm. Although Scotty was married, he becameintimate friends with Albert Mussey Johnson (1872-1948), a Chicagomillionaire, who was v.p. from 1906 <strong>to</strong> 1926 of the National LifeInsur<strong>an</strong>ce Co. Albert M. Johnson was born in Ohio, <strong>an</strong>d lived inArk<strong>an</strong>sas <strong>an</strong>d Missouri before moving <strong>to</strong> Chicago. Johnson came out<strong>an</strong>d stayed in Death Valley. <strong>The</strong> stay helped his health, <strong>an</strong>d he <strong>an</strong>dScotty remained close friends. In 1924, construction secretly beg<strong>an</strong> ona castle in Death Valley. <strong>The</strong> best of materials were used <strong>an</strong>d thematerials had <strong>to</strong> be hauled clear out in the desert by truck <strong>to</strong>Grapevine C<strong>an</strong>yon where the castle sits. Hundreds of workers werehired. <strong>The</strong> castle got its kitchen tiles from Spain. Special rugs weremade on the Europe<strong>an</strong> isl<strong>an</strong>d of Majorca for the castle. Tiles for theincompleted pool came from the Mediterr<strong>an</strong>e<strong>an</strong>. M<strong>an</strong>y of thefurnishing of the castle came from cathedrals <strong>an</strong>d palaces in Spain<strong>an</strong>d Morocco. Draperies made for the castle were h<strong>an</strong>d-<strong>to</strong>oled in546


selected sheepskin leather. Sixty h<strong>an</strong>d-carved p<strong>an</strong>els, each of adifferent design, were installed in the music-room ceiling. A WelteMignon org<strong>an</strong> reported <strong>to</strong> have cost $160,000 --the finest of its kind inWestern United States was placed in the music room, even thoughScotty could not play the org<strong>an</strong>. Twelve bathrooms were installed.Several kitchens were installed. Tunnels <strong>an</strong>d secret rooms were builtunder the buildings. Around $2 million (dollars of that time period) werespent on building the castle, supposedly from Scotty’s “gold mine.” <strong>The</strong>castle became known as Scotty’s Castle. It is ideal as a Sat<strong>an</strong>ic ritualsite. It c<strong>an</strong> accommodate numerous people. It is remote. It has hiddenrooms <strong>an</strong>d areas <strong>an</strong>d tunnels. Tavis<strong>to</strong>ck, Engl<strong>an</strong>d--This has been theprimary programming center for Engl<strong>an</strong>d. <strong>The</strong> Rothschild programmerswork out of Tavis<strong>to</strong>ck. A large number of slaves in America have beenprogrammed there. Tavis<strong>to</strong>ck has been doing mind-control sincebefore W.W.ll. Under the supervision of London’s W Board & 20Committee MI6 <strong>an</strong>d MIS’s Section BIA r<strong>an</strong> double agents <strong>an</strong>d mindcontrolledspies/couriers during W.W. II. MI6 has had <strong>an</strong> office atCentury House, No. 100, Westminster Bridge Road. MI5 offices havebeen in part on Curzon St. MI5 has operated behind a number of fronts,incl. their fake travel agency Casuro Holidays. MI-5’s address for mail isRoom 055, <strong>The</strong> War Office, London. Special Intelligence Service (SIS)dealt with all types of mind control. Tavis<strong>to</strong>ck was under SIS. <strong>The</strong> Britishgovernment has had their own telephone exch<strong>an</strong>ge with a 222 prefix,which was later linked <strong>to</strong> <strong>an</strong>other secret exch<strong>an</strong>ge YTAN. Outsiderscould dial 222 8080 <strong>to</strong> get in<strong>to</strong> the secret govt. exch<strong>an</strong>ge. Men likemind-control expert/hypnotist Eric Trist worked for Tavis<strong>to</strong>ck. A six-m<strong>an</strong>team which wore black berets also helped w/ mind control atTavis<strong>to</strong>ck. Two people who became terrorists after their visits <strong>to</strong>Tavis<strong>to</strong>ck are Angela Davis <strong>an</strong>d S<strong>to</strong>ckley Carmichael who went <strong>to</strong> aconference at Tavis<strong>to</strong>ck entitled Dialectics of Liberation in 1967. It’smain building is a bl<strong>an</strong>d 6-s<strong>to</strong>ry building. <strong>The</strong> address is <strong>The</strong> TrainingOffice, <strong>The</strong> Tavis<strong>to</strong>ck Clinic, 120 Belsize L<strong>an</strong>e, London, UK NWs SBA. Tel.no. 071-435 7111. <strong>The</strong> chief exec. is An<strong>to</strong>n Obholzer. <strong>The</strong> Chair of Prof.Comm. is Nicholas Temple. Both are skilled in psychology. <strong>The</strong> Tavis<strong>to</strong>ckClinic was founded in 1920, <strong>an</strong>d in 1946 the Tavis<strong>to</strong>ck Institute wascreated as <strong>an</strong> independent body <strong>to</strong> assist the Tavis<strong>to</strong>ck Clinic. <strong>The</strong>Institute does more of the research. <strong>The</strong> Royal Free Hospital at theUniversity of London works with Tavis<strong>to</strong>ck Clinic, as well as the SciencePolicy Research Unit (SPRU) of Sussex University. A large number ofBriti<strong>an</strong>’s psychologist, social workers <strong>an</strong>d police get their training atTavis<strong>to</strong>ck. Tavis<strong>to</strong>ck has set themselves up as the authority on ritualabuse <strong>an</strong>d MPD (DID). In other words, the primary programming site, ispretending <strong>to</strong> be the leading institution trying <strong>to</strong> solve the problem!That’s a good cover.Tinker, AFB, OK--Tinkerbell programming is carried out here. Thisprogramming makes alters think they are like Tinkerbell in that they will547


never grow up or age.Titusville, FL--At the Kennedy Space Center. <strong>Mind</strong> control testing isdone, <strong>an</strong>d base programming such as the Wizard of Oz programmingis done here. Also NASA high tech programming is done here.Tulsa, OK--Believed <strong>to</strong> have <strong>an</strong> Alice In Wonderl<strong>an</strong>d theme <strong>to</strong> theirprogramming. Oral Roberts University is used for programming. <strong>The</strong>programming <strong>to</strong> infiltrate <strong>an</strong>d capture the Christi<strong>an</strong> church via thehealing/charismatic movement has centered around Tulsa <strong>an</strong>d OralRoberts University.Utah State Prison--<strong>The</strong> prison has carried out mind control for over 30years on their inmates for the intelligence agencies with the help of theU.S. government’s power <strong>to</strong> cover it up.Versailles, IL--Brain impl<strong>an</strong>ts are put in<strong>to</strong> Monarchs here.Washing<strong>to</strong>n, D.C. area--<strong>The</strong> basement of the Pentagon <strong>an</strong>d otherfacilities around Washing<strong>to</strong>n D.C. such as the Jesuit George<strong>to</strong>wn Univ.Hosp. are involved with <strong>Mind</strong>-Control. Presidential Models are moving in<strong>an</strong>d out of Washing<strong>to</strong>n, D.C. carrying messages <strong>an</strong>d performing theirsexual acts for the lusts of politici<strong>an</strong>s. <strong>The</strong>re is also a NASA <strong>Mind</strong>-controlProgramming Center in Washing<strong>to</strong>n D.C. Secret tunnels connect theWhite House <strong>to</strong> other buildings. <strong>The</strong>se tunnels are used <strong>to</strong> bring inslaves. Some secret rooms in the lower White House are set aside forrituals.Wright-Patterson AFB--Near Day<strong>to</strong>n, OH, Virtual reality programmingis carried out here.Youngs<strong>to</strong>wn, OH--<strong>The</strong> Youngs<strong>to</strong>wn Charm School has been run byIlluminatus Prosser Seward Mellon along with a U.S. Congressm<strong>an</strong>named Jim Traffic<strong>an</strong>t. <strong>The</strong> old s<strong>to</strong>ne building originally belonged <strong>to</strong> oneof the railroad elite. This school is for Beta models <strong>an</strong>d gives themadv<strong>an</strong>ce sexual charm training. This school produces about 6 newMonarch slaves every three days. Mafia deals are carried out on thesecond floor of the charm school. A slave who is beingtrained/programmed at the Charm school will take a course that last afew days. <strong>The</strong> first day may be spent h<strong>an</strong>ging in a dungeon which wasonce a basement wine celler. <strong>The</strong> <strong>to</strong>rture dungeon has all thetraditional <strong>to</strong>rture devices, a stretching rack, whips, h<strong>an</strong>ging chains,etc. In the dungeon rooms were a black Nubi<strong>an</strong> goat “Sat<strong>an</strong>”, a smalldonkey “Nester’, <strong>an</strong>d a small white pony “Trigger”, as well as dogs <strong>an</strong>dsnakes. <strong>The</strong> slave is taught silence in the dungeon as they aresubjected <strong>to</strong> bestiality.548


We have just <strong>to</strong>uched the surface of the vest network ofprogramming sites. Two examples of <strong>an</strong> entire series of programmingsites--1. the Coast <strong>to</strong> Coast campground resorts & 2. the Jesuit-runinstitutions, which are often programming sites incl. Jesuit College, WV.An example of the former is the Park City Diamond Caverns. KT Coast<strong>to</strong> Coast resort, which has had a sensory deprivation t<strong>an</strong>k, headphonesfor state of the art harmonic programming. etc. <strong>The</strong>se membershipcamp sites are used <strong>to</strong> program children. Nor have we <strong>to</strong>uched uponthe large numbers of programmed Russi<strong>an</strong>s & Eastern Europe<strong>an</strong>s thatare coming In<strong>to</strong> this nation. When this book was written more peopleimmigrated <strong>to</strong> the U.S. from Russia th<strong>an</strong> <strong>an</strong>ywhere else. Europe isteeming with prgmg sites. incl. the Vatic<strong>an</strong>. Sebulun Zuflucht inMarienheide, Ger. is about the only europe<strong>an</strong> attempt atdeprogramming.549


BIBLIOGRAPHY & SOURCES<strong>The</strong> co-authors brings lots of experience <strong>an</strong>d study with this subject in<strong>to</strong>the creation of this book. <strong>The</strong> sources that have contributed <strong>to</strong> theirknowledge would take a book as long as this <strong>to</strong> list every source thathas gotten them <strong>to</strong> their underst<strong>an</strong>ding of the subject.PRIMARY SOURCES ON PRIMARY SUBJECT-- TRAUMA-BASED TOTALMIND-CONTROL1. Numerous professional papers.2. Personal accounts about slaves (published).3. Unpublished paperwork, tapes, interviews of slaves.4. <strong>The</strong>rapists5. Books on <strong>Mind</strong>-control.6. Books on associated <strong>to</strong>pics, such as PTSD, the <strong>Mind</strong>, hypnosis, drugs,witchcraft, <strong>an</strong>d the various aspects of control.1. NUMEROUS PROFESSIONAL PAPERS.Carole Goettm<strong>an</strong>, George B. Greaves <strong>an</strong>d Philip M. Croons put out areference book Multiple Personality & Dissociation 1791-1992 AComplete Bibliography, 2nd edition. (Lutherville, MD: <strong>The</strong> Sidr<strong>an</strong> Press,1994). Co-author Fritz has gone through the Bibliography which lists in150 pages essentially all the articles ever published on MPD <strong>an</strong>dDissociation, <strong>an</strong>d he has read all that he could obtain via the largeresearch libraries. Dozens of the articles, <strong>an</strong>d m<strong>an</strong>y of the books whichappear in this complete bibliography have been read. Most of theprofessional literature on the subject is trash. During the 1970s,Americ<strong>an</strong>s got interested in Multiple Personalities, after having lostinterest in the subject as W.W. I got started. I believe the therapeuticcommunity was probably nudged by the military/intelligence agencies<strong>to</strong> lose interest when W.W. I broke out, <strong>an</strong>d that <strong>an</strong>yone who did getinterested got scooped up in<strong>to</strong> the government during W.W. II <strong>an</strong>d theCold War. Some of the helpful professional papers have been notatedin the book itself. A perusal of the index will provide part of the sourcesfor this book.550


2. ALL THE PERSONAL ACCOUNT (AUTO BIOGRAPHICAL ACCOUNTS)THAT ARE AVAILABLE.<strong>The</strong> list of au<strong>to</strong>-biographies (or biographies) of victims which wereconsulted include the following:CHASE, TRUDY. Chase. Trudy. When the Rabbit Howls. NY: Dut<strong>to</strong>n, 1987.DORSETT, SYBIL ISABEL. Schreiber, Flora Rheta. Sybil. Chicago, IL: HenryRegnery Co., 1973.FORD, SUE. Taylor, Brice with Patrick S<strong>to</strong>ne. (written as a novel).Starshine. Huntsville, AL: <strong>The</strong> Brice Taylor Foundation, 1995.JONES, CANDY. (born Jessica Wilcox). Bain, Donald. <strong>The</strong> Control ofC<strong>an</strong>dy Jones. Chicago: Playboy Press, 1976.LYNN, LORETTA. Vecsey, George with Loretta Lynn. Loretta Lynn A CoalMiner’s Daughter. Rockefeller Plaza, NY: Warner Books, 1976.MONROE, MARILYN. Pepi<strong>to</strong>ne, Lena. Marilyn Monroe Confidential AnIntimate Personal Account. NY: Simon & Schuster, 1979.O’BRIEN, CATHY. O’Brien, Cathy with Mark Phillips. Tr<strong>an</strong>ce FormationofAmerica, <strong>The</strong> True Life S<strong>to</strong>ry of a CIA Slave. Nashville, TN: GlobalTr<strong>an</strong>ce Formation Info, Ltd., 1995. Also Cathy O’Brien <strong>an</strong>d Mark Phillipsput out numerous monographs <strong>an</strong>d a number of articles in the Contactmagazine, which were also consulted in writing this book.STRATFORD, LAUREN. Sat<strong>an</strong> ‘s Underground: <strong>The</strong> Extraodinary S<strong>to</strong>ry ofOne Wom<strong>an</strong> ‘s Escape., 1991.WHEELER, CISCO. Wheeler, Cisco with Fritz Springmeier. <strong>The</strong>y KnowWhat <strong>The</strong>y Do, An Illustrated Guide <strong>to</strong> Monarch Programming-<strong>Mind</strong>Control. Oregon City, OR: Springme ier & Wheeler, 1995.OTHERS VICTIMS:Casey, J.F. & Wilson, L. <strong>The</strong> Flock. Alfred A. Knopf, 1991.551


LaCalle, TM. Voices. NY: Dodd, Mead, & Co., 1988.L<strong>an</strong>caster, E. & Polney, J. <strong>The</strong> Final Face of Eve. NY: McGraw-Hill, 1958.Schoenewolf, G. Jennifer <strong>an</strong>d her selves. NY: Donald I. Fine, 1991.Sizemore, C. & Pittillo, E. I’m Eve. Garden City, NY: Doubleday & Co.,1977.Smith, Michelle & Lawrence Padzer. Michelle Remembers: A S<strong>to</strong>ry ofSat<strong>an</strong>ic Possession.Thigpen, C.H. & Cleckley, H. <strong>The</strong> three faces of Eve. NY: McGraw-Hill,1957.3. UNPUBLISHED PAPERS, TAPES, & INTERVIEWS WITH VICTIMS.<strong>The</strong>se sources will have <strong>to</strong> remain confidential. Over a dozen <strong>Illuminati</strong>slaves provided notes from what they have found out about their lives<strong>an</strong>d mind-control systems. <strong>The</strong> co-authors have interviewed <strong>an</strong>dpersonally known dozens more, who have been visited with. Noteswere kept on some of these interviews. Fritz taped some of hisinterviews, <strong>an</strong>d in more th<strong>an</strong> one case got a computer disk of theperson’s life s<strong>to</strong>ry with colloborating evidence.4. THERAPISTS.Fritz is appreciative <strong>to</strong> the following therapists for the help he received:Dale Calvocade, Ukiah, CA, who helped me underst<strong>an</strong>d the religiouscovers better.Dr. Carol Clif<strong>to</strong>n, Portl<strong>an</strong>d, OR, who helped me underst<strong>an</strong>d the value ofpatience, kindness <strong>an</strong>d listening in helping victims help themselves.Dr. Loreda Fox, Denver, CO, who helped give a better underst<strong>an</strong>dingof the spiritual dimensions.Catherine Gould, TX, who helped me underst<strong>an</strong>d the role of alterswithin programs.Denny Hilgers, Pasadena, TX, who helped me underst<strong>an</strong>d the deepercodes, <strong>an</strong>d the deeper systems better, <strong>an</strong>d t h e import<strong>an</strong>ce of aperson’s identity.552


David W. Neswald, Irvine, CA, who helped me underst<strong>an</strong>d the primaltraumas better.R<strong>an</strong>dy Noblitt, Dallas, TX, who helped give a better underst<strong>an</strong>ding ofoverall picture, <strong>an</strong>d how some of the codes are constructed.Mark Phillips, Nashville, TN, who opened up a deeper underst<strong>an</strong>ding ofhow the Network operates, <strong>an</strong>d provided some direction for how weshould approach dealing with mind control.Doug Riggs, Tulsa, OK, who helped give a better underst<strong>an</strong>ding of thereligious fronts, <strong>an</strong>d who helped tremendously underst<strong>an</strong>d how thistrauma-based mind-control fits in with the Word of God.5. BOOKS (& LONG PAPERS) ON MIND-CONTROLBowart, Walter H. Operation <strong>Mind</strong>-Control, original edition <strong>an</strong>d the<strong>to</strong>tally revised Researchers edition of 1994, which carried the same title.Chavkin, Samuel. <strong>The</strong> <strong>Mind</strong> Stealers, Psychosurgery <strong>an</strong>d <strong>Mind</strong> Control.Westport, Conn: Lawrence Hill & Co., 1978.Estabrooks, G.H. Hypnotism. NY: EP. Dut<strong>to</strong>n, 1957.Lockwood, Craig. Other Altars, Roots <strong>an</strong>d Realities of Cultic <strong>an</strong>dSat<strong>an</strong>ic Ritual Abuse & Multiple Personality Disorder. Minneapolis, MN:CompCare Publishers, 1993.Marks, John. <strong>The</strong> Search For <strong>The</strong> “M<strong>an</strong>churi<strong>an</strong> C<strong>an</strong>didate” <strong>The</strong> CIA &<strong>Mind</strong> Control. NY: W.W. Nor<strong>to</strong>n & Co. (paperback version), 1991.Mediaecco. When <strong>The</strong> State Rapes, Part I & 2. Gorredijk, Netherl<strong>an</strong>ds,Thomas, Gordon. Journey in<strong>to</strong> Madness. NY: B<strong>an</strong>tam Books, 1989.White, John. Psychic Warfare, Fact or Fiction? (An investigation in<strong>to</strong> theuse of the mind as a military weapon.) Wellingborough,Northamp<strong>to</strong>nshire, UK: <strong>The</strong> Aquari<strong>an</strong> Press, 1990(?).De Laurence, edi<strong>to</strong>r. <strong>The</strong> Lesser Key of Solomon Goetia, <strong>The</strong> Book of EvilSpirits. Chicago, 1916.553


6. BOOKS ON ASSOCIATED TOPICS.Both authors have read m<strong>an</strong>y books on t<strong>an</strong>gent subjects. <strong>The</strong> list ofbooks that have been read <strong>an</strong>d researched prior <strong>to</strong> writing this wouldtake <strong>an</strong>other book <strong>to</strong> record. <strong>The</strong> co-author Fritz found himselfconsulting his own books, Be Wise As Serpents (1991), <strong>The</strong> Top 13<strong>Illuminati</strong> Bloodlines Vol. 1 (1995), <strong>an</strong>d Exodus 20:4-5 (1978). <strong>The</strong> coauthorspurchased <strong>an</strong>d read the 14 Oz books. <strong>The</strong>y also have <strong>an</strong>umber of the other books used for scripts such as, Mother GooseRhymes, <strong>The</strong> Tall Book of Make Believe, -Michael Aquino’s version ofStar Wars, etc., Snow White & the 7 Dwarfs, <strong>The</strong> Isl<strong>an</strong>d of the BlueDolphins, Through the Looking Glass, etc. Fritz purchased his own copyof <strong>The</strong> Graphic Work of M. C. Esher. NY: Ball<strong>an</strong>tine Books, 3rd edition,1972. in order <strong>to</strong> have on h<strong>an</strong>d the artwork which contains so m<strong>an</strong>ymirror images <strong>an</strong>d inversions <strong>an</strong>d is so often used for programming.As I, Fritz, sit down <strong>to</strong> provide the sources for the reader, it is apparentthat the task is beyond my time restraints. Knowledge accumulates. Ar<strong>an</strong>dom sample of just two of almost countless references looked at <strong>to</strong>come <strong>to</strong> the author’s level of underst<strong>an</strong>ding would be Je<strong>an</strong> L. Sut<strong>to</strong>n’sworkshop book Ritualistic Abuse of Children Identification <strong>an</strong>d CaseM<strong>an</strong>agement Strategies which was used in workshops for teachers <strong>an</strong>dchild services division people on Fri. Sept. 11, 1992 at 815 N.E. Davis St.,Portl<strong>an</strong>d, OR. Another example is <strong>The</strong> New Yorker’s, May 24, 1993,article “Remembering Sat<strong>an</strong>--Part II”. Neither one was referred <strong>to</strong> inwriting the book, but these two <strong>an</strong>d countless others over the yearsform the accumulation of underst<strong>an</strong>ding that is needed <strong>to</strong> tacklewriting a book on Multiple Personality Disorder (Dissociative IdentityDisorder).To be able <strong>to</strong> write this book, Fritz, the co-author has studied material,books, newspapers clippings, articles, etc. from the followingASSOCIATED TOPICS with a close estimate of the number of itemsstudied in each area: Aliens & UFOs (40 items), Amish-Mennonite (30items), Astronomy & astrology (25 items), Behavior Modification (12items), Black religions in the New World <strong>an</strong>d Africa (6 items), Brain (30items), Caballa (10 items at least), Computers (25 items), Computerl<strong>an</strong>guages (8 items), Crime (25 items), Demonology (30 -items),Druidism (20 items), ELF waves (20 items), Fairy Tales (7 items), FalseMemory Syndrome (5 items), Freemasonry (35 items), Holograms (6items), Hypnosis (12 items), Intelligence (20 items), Jesuits (6 items), KuKlux Kl<strong>an</strong> (15 items), Medical technology (15 items), Memory (20 items),Mental Hospitals (5 items), Military (10 items), <strong>Mind</strong> (25 items), Movies(20 items), NeuroLinguistic Programming (6 items), New World Order (50items), Particular Individuals such as the Rothschilds, Rockefellers,Collins, Mengele, Cameron, Wheeler, LaVey, Aquino, Elvis Presley, DorisDuke, <strong>an</strong>d m<strong>an</strong>y others mentioned in the book (50 items at least),554


Personality (25 items), Sat<strong>an</strong>ic Ritual Abuse (50 items), Spiritual warfare(40 items), Spying (25 items), Underwater research (40 items), Voodoo(3 items), Witchcraft (50 items). Some of the books that would havebeen cited if every detail had been footnoted c<strong>an</strong> be foundfootnoted in other writings by Fritz Springmeier. Also I, Fritz, have spenttime examining the Word of God <strong>to</strong> try <strong>to</strong> underst<strong>an</strong>d what God’swritten word revealed by His Spirit would teach me about this situation.<strong>The</strong>re are numerous Bible verses that pertain <strong>to</strong> the information in thisbook which are not referred <strong>to</strong> in this volume. <strong>The</strong> primary issuescreated by the traumas are a. identity issues, <strong>an</strong>d b. issues concerningfellowship with God. Much of the trauma <strong>an</strong>d programming is cloudthe issue of who the person really is, <strong>an</strong>d how they c<strong>an</strong> have abeneficial relationship <strong>to</strong> God Almighty. <strong>The</strong> Bill Gothard Basic YouthSeminar which the co-author Fritz has attended 6 times, has been veryhelpful <strong>to</strong> him <strong>to</strong> underst<strong>an</strong>d what the programmers do, <strong>an</strong>d how theystrip a person of what they need <strong>to</strong> be spiritually strong. In fact, Fritzknows a number of the programmers have attended the Bill GothardSeminar themselves, <strong>an</strong>d know how <strong>to</strong> use beneficial information forevil purposes. Likewise, the Christi<strong>an</strong> c<strong>an</strong> take the occult knowledge ofrevealed in this book <strong>an</strong>d use it for good instead of the evil that it wasdesigned for. <strong>The</strong> Institute has a hard volume reference book onResearch in Principles of Lfe as well as a workbook. Cisco, the other coauthor,has studied MPD, SRA, Bible issues, <strong>an</strong>d occult <strong>to</strong>pics indepth.Her personal knowledge added a depth <strong>to</strong> the book that could nothave been achieved without her. William Frost of S<strong>an</strong> An<strong>to</strong>nio, TX was agood friend of a tall le<strong>an</strong> Tex<strong>an</strong> named David Hill. David Hill had beentaken in by Mafia boss Joseph Bon<strong>an</strong>no, who was as a surrogate father<strong>to</strong> him. After David Hill became a Christi<strong>an</strong>, he used his first h<strong>an</strong>dknowledge of the Mafia, the occult world such as his Masonicexperience <strong>to</strong> put the pieces <strong>to</strong>gether about the NWO. He had justcompleted a very detailed m<strong>an</strong>uscript for a book exposing the NWO,when he was murdered. After David’s murder, William Frost was able <strong>to</strong>retrieve David’s m<strong>an</strong>uscript <strong>an</strong>d sent me a copy. <strong>The</strong> death was notruled a murder by the authorities, but men who have written lengthyexposes on the New World Order do not commit suicide before theyget their books published. It was keen-minded David Hill who warnedBilly Graham for m<strong>an</strong>y hours about the New World Order, only <strong>to</strong> be<strong>to</strong>ld by Billy Graham, that Billy was ‘a captive’ (Graham’s own words)of the New World Order. <strong>The</strong> information William Frost gave me aboutDavid Hill, was later verified in m<strong>an</strong>y ways by Joseph Bon<strong>an</strong>no’ssurprising au<strong>to</strong>biography A M<strong>an</strong> of Honor, Simon & Schuster, RockefellerCenter, N.Y., 1983. It’s somewhat unusual for Mafia chiefs <strong>to</strong> writeau<strong>to</strong>biographies. In it, Joseph Bon<strong>an</strong>no says he looked up <strong>to</strong> BillyGraham, <strong>an</strong>d that David Hill joined up with Billy Graham. In 1974, BillyGraham came <strong>to</strong> Joseph Bon<strong>an</strong>no’s house in Tuscon with David.Graham sent him a Christmas card every year, <strong>an</strong>d called him soonafter his wife died <strong>to</strong> offer condolences. <strong>The</strong>se things are mentioned on555


page 333 of his au<strong>to</strong>biography. David Hill’s m<strong>an</strong>uscript wasencouraging <strong>to</strong> me, Fritz, because he verified m<strong>an</strong>y of the same thingsthat I’d found. His m<strong>an</strong>uscript was quoted in Vol. 1 concerning the <strong>to</strong>pfamilies.Information about the names of programmers <strong>an</strong>d programming sites<strong>an</strong>d the Temple of Set membership has come from recovering victimsof Trauma-based mind-control. Information about <strong>Illuminati</strong> bloodlines,ritual sites, <strong>an</strong>d import<strong>an</strong>t buildings has also come from <strong>Illuminati</strong>members who are recovering from <strong>Illuminati</strong> mind-control. M<strong>an</strong>y morewitnesses <strong>to</strong> <strong>Illuminati</strong> <strong>Mind</strong>-control will come forward if people learnhow <strong>to</strong> help these people, <strong>an</strong>d <strong>to</strong> believe the things that havehappened <strong>to</strong> them. Now that this legitimate information is beingcirculated, it c<strong>an</strong> be expected that “witnesses” with bogusinformation/bogus memories will come forward <strong>to</strong> detract from thecredibility of this book.ILLUSTRATIONSChapter 2 title page--Reproduction of the cover of the program of theBohemi<strong>an</strong> Grove Cremation of Care Ritual.p. 45--Torture device, drawn by a recovering Monarch slave used bypermission of Denny Hilgers, Pasadena, TXp. 46--Ritual stick, drawn by a recovering victim of SRA, used bypermission of David Carrico, Ev<strong>an</strong>sville, Indi<strong>an</strong>a. Heart in a Jar, drawnby <strong>an</strong>other recovering victim of SRA, used by permission of DavidCarrico, Ev<strong>an</strong>sville, Indi<strong>an</strong>a.Chapter 4 title page--Hypnotic illusion drawings, adapted fromuncopyrighted material.p. 66--Spinning <strong>to</strong>p, common illusion, adapted from uncopyrightedmaterial.p. 88--Section Chart of “A” alters, created by Fritz Springmeierp. 91--Structure Chart, of color codes, alter runways, system structure,created by Fritz Springmeier based on information from a recoveringMonarch mind-control victim.p. 134--Cover Decision magazine.p. 168, 175-178--U.S. Patent4,858,612, public information, U.S. PatentOffice.Chapter 7 title page--Chart was drawn by Fritz Springmeier, it is based556


on <strong>an</strong> actual <strong>Illuminati</strong> <strong>Mind</strong> Controlled Slave’s system’s structure. <strong>The</strong>chart has modifications from the actual system’s structure, but closelyresembles it.p. 195--Chart drawn by Fritz Springmeier <strong>an</strong>d Cisco Wheeler of internalhour glass, x-y-z axes.p. 196--Worlds, domino program arr<strong>an</strong>gement, solemetric--drawn byFritz Springmeierp. 210-2 1 1-- “Common Structures” Illustration showing various internalsystems <strong>an</strong>d their relationships <strong>to</strong> each other, done by Fritz Springmeierbased upon various reports of recovering slaves whose systems matcheach other.p. 237-239, 241, 243--Designs. United Nations identity Fr<strong>an</strong>z Joseph. StarFleet Technical M<strong>an</strong>ual TM:3 79260. Ball<strong>an</strong>tine Books: NY, Nov. 1975(also on title page it states 1st edition STARDATE 7511.01.) <strong>The</strong> title page<strong>to</strong> this m<strong>an</strong>ual at first appear<strong>an</strong>ce seems <strong>to</strong> indicate that it was reallyprinted by the United Federation & the United Nations, with a stardateyear given. <strong>The</strong> actual dates, <strong>an</strong>d actual publisher are almostcamouflaged on the title page. p. 240, 242-- Star Trek, the NextGeneration Technical M<strong>an</strong>ual. Given <strong>to</strong> Fritz by a recovering Assist<strong>an</strong>tProgrammer.p. 244-246-- Warren magazine.p. 248--Intergalactic symbols, drawn by Fritz Springmeier, based onwhat slaves see in their heads.p. 252--Histamine molecule, graphics by Fritz Springmeier. Chapter 10title page--Top picture drawn by eyewitness Kim Stevens of Sat<strong>an</strong>icRitual. Bot<strong>to</strong>m picture was redrawn from the original drawing done bya member of the Ordo Saturnus in ritual, a Germ<strong>an</strong> br<strong>an</strong>ch of the<strong>Illuminati</strong>.p. 315-317--First Earth Battalion’s Training M<strong>an</strong>ual, US Army written byLTC Jim Ch<strong>an</strong>non.Chapter 11 title page--drawing of computer generated by computergraphics <strong>an</strong>d done by Fritz Springmeier p. 338--Portion of Shari’srestaur<strong>an</strong>t place mat with a maze <strong>an</strong>d Wizard of Oz theme.Chapter 12 title page--Bo Gritz’s own campaign broshure during thethe 1992 Presidential campaign which gives his biographicalinformation.557


p. 361--Newsweek cover with caption “Disney’s Dilemma C<strong>an</strong> theKingdom Keep Its Magic?”Appendix B title page. Drawing by victim of mind control from easternU.S. showing the skinning process of person. This skill is put <strong>to</strong> use forprogramming purposes. Appendix B. Pho<strong>to</strong>graphs of Presideo by FritzSpringmeier, Pho<strong>to</strong>graphs of Portl<strong>an</strong>d Mormon Temple by FritzSpringmeier, Pho<strong>to</strong>graphs of the Mother’s-of-Darkness castle Chateaudes Amerois, Belgium by Fritz Springmeier.558

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!