10.07.2015 Views

The Illuminati Formula Used to Create an Undetectable Total Mind ...

The Illuminati Formula Used to Create an Undetectable Total Mind ...

The Illuminati Formula Used to Create an Undetectable Total Mind ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

pressure <strong>to</strong> ch<strong>an</strong>ge attitudes. We discovered in the past thirty years, atechnique <strong>to</strong> influence, by clinical, hospital procedures, the thinkingprocesses of hum<strong>an</strong> beings. Brainwashing is formed out of a set ofdifferent elements ... hunger, fatigue, tenseness, threats, violence, <strong>an</strong>din more intense cases...drugs <strong>an</strong>d hypnotism. No one of these elementsalone c<strong>an</strong> be regarded as brain washing, <strong>an</strong>y more th<strong>an</strong> <strong>an</strong> apple c<strong>an</strong>be called apple pie. Other ingredients have <strong>to</strong> be added, <strong>an</strong>d acooking process gone through. So it is with brainwashing...” Hunter saidbrainwashing was a Red Chinese threat. He said that the chinese werethe ones using these tactics. In reality, this mind control was being donein the U.S. <strong>an</strong>d Hunter was a pawn <strong>to</strong> help justify the criminal activitiesof the programmers should they ever be found out behind their coverof “National security.” <strong>The</strong> h<strong>an</strong>dlers of mind-controlled slaves carryaround a black or grey 3 ring notebook or a lap <strong>to</strong>p computer with theaccess codes <strong>an</strong>d triggers. Some of the programmers <strong>an</strong>d h<strong>an</strong>dlershave this all memorized. <strong>The</strong> deepest parts, core/gems/executivecommittee, false trinity etc. are charted in esoteric l<strong>an</strong>guage such asEnochi<strong>an</strong>, Hebrew (which is considered magical), <strong>an</strong>d Druid symbols. Ihave never gotten the opportunity <strong>to</strong> look at one of these, although <strong>an</strong>umber of the slaves who I’ve talked with have while they were beingprogrammed. <strong>The</strong>se notebooks have color-coded graphs showing thearr<strong>an</strong>gement of alters, the structure of the system, the training of thealters, the his<strong>to</strong>ry of the alters <strong>an</strong>d other details. All the primary <strong>to</strong>rturescarried out on a slave are coded using dates/no.s so that thememories c<strong>an</strong> be pulled up by the programmers. <strong>The</strong>re is a st<strong>an</strong>dardset of h<strong>an</strong>d signals, gestures, <strong>an</strong>d codes that allow a h<strong>an</strong>dler <strong>to</strong> workwith someone else’s slave, but the accepted code among theh<strong>an</strong>dlers is <strong>to</strong> leave <strong>an</strong>other m<strong>an</strong>’s slave alone. As one leadingpsychiatrist put it, “Different ideologies use the same methodologies ofmind control.” <strong>The</strong> <strong>Illuminati</strong> have secretly put in base programmingthat allows them ultimate control over m<strong>an</strong>y of the other groups’slaves. This will be described within this book. For both the ease ofreading <strong>an</strong>d the ease of writing, I have dispensed with most footnotes.To provide my sources would double the size of the book, <strong>an</strong>d m<strong>an</strong>y ofthem are confidential. (In the past, when I have attempted creditinginformation, some people have gotten bruised feelings for having beenpassed over or for being named. When information comes in fromseveral sources, it becomes difficult <strong>to</strong> pass out credit.) I have madeconservative judgement calls about what material I could use. Most ofthis information has been verified by several reliable sources.Confidential eyewitnesses are often the only source, when there is sucha powerful conspiracy <strong>to</strong> keep this vast NWO mind control secret.Paper trails were not left or are not available. Programmed slaves whohave worked for the military as mind-controlled slaves have witnessedtheir files expunged <strong>an</strong>d s<strong>an</strong>itized. <strong>The</strong> New World Order in 1981 madetraining films for their novice programmers. Monarch slave CathyO’Brien was used <strong>to</strong> make both the film “How <strong>to</strong> Divide a Personality”10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!