The URANTIA Board Community

 

Go Back   The URANTIA Board Community > GENERAL FORUMS > WORLD POWERS & INFLUENCES
FAQ Members List Calendar Mark Forums Read

Reply
 
Thread Tools Display Modes
  #81  
Old 02-05-2005, 03:47 PM
ShadowWolf's Avatar
ShadowWolf ShadowWolf is offline
Member
 
Join Date: Apr 2004
Posts: 159
ShadowWolf is on a distinguished road
Default Re: Illuminanti

I am sorry I don't have a link for this article.




The Illuminati Formula to Create an Undetectable Total Mind Control Slave
CHAPTER 11 INTERNAL CONTROLS
By Fritz Springmeier & Cisco Wheeler
http://educate-yourself.org/mc/illumformula11chap.shtml
A - TEACHING OCCULT PHILOSOPHIES
Learning plays an important part in perception. The Programmers try to get their victims to subscribe to philosophies and ideas that will make it hard for them to rebel against their controllers. This is what is termed indoctrination. The same methods of teaching that others find useful are employed. Ways of thinking are incorporated by the slave via handlers, programmers, and the cult they belong to. Everyone tries in their own way to make sense of life. This is a natural brain fun-ction, so that the human mind can understand how to deal with the future. The mind takes raw data, and then applies some type of logic, and comes to conclusions. Once accepted, these conclusions can be as hard as nails, and they will defy any attempt to change them, even in the light of new evidence. If the Programmer is smart enough, he can get an alter to logically believe anything. Once the belief is embedded, it will remain there tenaciously. In the Illuminati, ‘great” masters and adepts teach “hidden mysteries”. The slave feels the authority that emanates from this teacher with special gifts and abilities.
The slave is hardly in a position to question the teachings being given from on high. Circular reasoning, lies, and other tricks are used to convince the person that the occult world is true. For instance, “God abandoned you, therefore you need to cling to us, the only ones who would see any use in you.” (The truth is that the cult staged a crisis where their actor playing God abandoned the child to the cult’s abusiveness. The whole event was simply cult abuse--with God taking the blame.) “We are trying to fashion a better man, a man with far more capabilities than before, with better genetics. Those who oppose us, are trying to keep humankind back in the dark ages.” This is circular reasoning and outright lies. (They are not interested in helping mankind, only destroying it.) To make occult philosophies more palatable, the occult world attacks the character of anyone whose life would dispute their false claims. They also use a great deal of rationalization, where the end justifies the means. Many slaves have had to sit and listen to their masters rationalize their brutality. Within the Illuminati, ranks are achieved with much learning and ritual.

Within the Temple of Set, a member is required to read certain books. Fritz, the co-author has a list of books a Temple of Set member is asked to read, with the comments attached by the Temple of Set to each suggested title. In their suggested/required reading Category 19 entitled “The Metamind” is Metropolis by Thea von Harbou. Their comments are “An Expressionistic portrait of a negative utopia in which humans are controlled by machines.. .the basis for many electronic/audio-visual ritual techniques employed by the Church of Satan and further developed by the Temple of Set.” (p. C21-2) Another is Physical Control of the Mind: Towards a Psychocivilized Society by Jose M.R. Delgado. Their comments, “Delgado, Professor of Physiology at Yale University, is one of the most distinguished authorities in the field of Electrical/chemical Stimulation of the Brain (ESB). This book is necessarily dated, but it is so well-written that it deserves to be perused as a preface to more recent works on the subject.” (p.C-16?-2) The Psychology of Anomalous Experience by Graham Reed. Their comments, “This book addresses unusual, irregular, and puzzling experiences- deja’vu, illusions, delusions, hallucinations, etc.-in terms of the mind’s normal psychological processes of gathering, monitoring, processing, and storing information.” (ibid.)

This is just a brief look to illustrate to the reader that leaders of groups like the Temple of Set are avid students of mind-control. (An almost complete membership list of this group at one point in time, is provided in Appendix A.) The librarian of the Multnomah County Detention Ctr. shared with co-author Fritz that Sheila, formerly second-in-command of the Bhagwan Shree Rajneesh’s commune at Antelope, OR studied, via jail/prison interlibrary loan, books on Hitler’s mind-control techniques. Many other examples could be given of how mind-control is being studied and taught by these groups.

One more book on the Temple of Set’s reading list would be worthy to point out, The Psychology of Man’s Possible Evolution by Peter D. Ouspensky. Their comments, “Should be read especially by those members whose magical ability is hampered by flaws in their balance factor....A series of lectures which explain the Gurdjieff approach to the concept better than G. himself was able to do.” There is an important link between Gurdjieff, mind-control, MPD, etc. but the subject is big and needs to be further investigated. Co-author Fritz has been investigating this link, including talking with leaders of the most successful Gurdjieff commune. As with so many groups, what you see, is not what you get.

TEACHING THE IDEOLOGIES OF WAR
One of the ways to control a person is to get them angry and then channel that hate. Wars have been used for centuries by the oligarchies that run things to control their people. Right now, the New World Order is carrying out a Drug War, an Environmental War, and a Bosnian conflict for the express purpose in their own plans to control us. They have a mock-alien invasion planned to further justify more control over our lives. Over the years, mankind has created an entire industry around warfare. There are long traditions within military units, that for some reason must be “upheld” by the men who serve in those units. When people buy into the philosophies of war, they can generally be persuaded to give up or do anything to contribute to that war. After all, any sacrifice will be minor compare to the large numbers of bodies that will end up dead. One of the large purposes of the Monarch type of trauma-based mind-control is to produce robotic soldiers who will do anything. Normal military training is usually sufficient for most military needs, so it is clear that Monarch slaves have some ulterior uses that the military doesn’t want the public to know about.

VARIOUS DELTA FORCES
The military as well as other groups have created numerous delta teams, delta forces, delta groups etc.

DELTA ASSASSINATION TEAMS
These teams are projects that the Satanic Hierarchy and the CIA collaborated together on. The programming that was placed into people was ingenious and very complex. As the program progressed over the years, the programming became more sophisticated and past mistakes were improved upon. The Delta Teams were programmed to carry out various assignments such as political assassinations. The members of these teams are housewives and other ordinary people who were programmed years ago. The Delta Teams are part of the CIA’s psychic warfare bag of tricks. The CIA works so closely with the military that the Delta Force is easily expected to be tied in with the CIA & U.S. intelligence.

DELTA FORCE
The system tapped Frank Burns to create the Delta Force. Frank Burns was a Green Beret. What kind of things did Frank get involved with AFTER joining the military? Hold on. Frank Burns was an SDS (Students for a Democratic Society--an Illuminati organization) organizer. He was also deep into Zen Buddhism, which is the same as mysticism. Frank Burns as an officer also studied under the Esalen Institute. The Esalen Institute is at Big Sur, California and is the American equivalent of the infamous Tavistock Institute. The Esalen Institute created “sensitivity training” programs for the business world under the title “Organizational Development (OD). Esalen people were brought in to Fort Ord where Frank Burns was the commander and began training people. The army promoted Burns to work in the Chief of Staffs office as an “senior organizational effectiveness consultant”, which allowed Burns to introduce Esalen programs all through the army. This could not have accidently happened. Frank Burns in a conversation with a two-star General about the need for “wholistic” soldiers coined the slogan “Be all that you can be in the army.” Burns phraseology began the army’s recruiting slogan. It refers to the Human Potential Movement that the army has incorporated from the New Age movement. The army is moving toward becoming an occult fighting force that practices witchcraft with its warfare. Some of the units moving that direction are Psy-Op operations, which has included Satanists within its officers. The Delta Force network of various Generals and other high ranking officers is merely one facet of the drive by the Illuminati to transform the American army into something akin to occultic warriors that will be as fierce as the Nazi Death head units. Bear in mind that George Bush, commander-in-chief of Burn’s Armed Forces has come from an Illuminati family/ & the Ill. Skull & Bones chapter that was part of the secret support for Hitler. They have been using as an insignia that they themselves (the Skull & Boners) call “the Death Head”. It is not surprising then that support for the Delta Team activities has come from the very top. Frank Burns set out to create a warrior monk. Lt. Col. Jim Channon, in Delta Forces, also put forward the idea. Channon visited more than 130 New Age groups in California doing what was called “social experimentation.” It is an idea that the occult have repeatedly carried out. Hitler’s S.S. were an special elite group of warrior monks from which about 3,000 went through religious initiations. (As the war progressed the primary focus of the S.S. shifted from being the Black Order to merely being a reliable military group called the Waffen SS.) There were 3 levels of initiation, the last reserved for the hard-core Satanists at the top. The Nazi initiation seems to have been an attempt to get the force of the Vril. The Ordensburgen (Castles of the Order) were training centers for the elite Nazis, including the S.S. (Having been in the military, I know first hand that the success of the S.S. and Waffen S.S. units in being fierce warriors is attributed by some of our leading military men to their training to be warrior-monks.) One group of the S.S. called Knights of Poseidon volunteered themselves for castration, in an experiment to change them back to the supermen of the mythical and magical Hyperborea. Some of the best Sufi organizations were warrior monks. Burns and his Task Force Delta generated the First Earth Battalion, which is an occult military unit trained in martial arts, and witchcraft. Men who are selected for First Earth Battalion are given an occult initiation which includes the following oath:
“I have the capacity and therefore the duty to contribute to the development of myself, my associates, and our planet, simultaneously now! I take personal responsibility for generating evolutionary conspiracies as a regular part of my work. I will select and create conspiratorial mechanisms that are not costly in time or resources because I am aware of the five channels available to me (such as radio, television, and word of mouth.) I will organize a self-supporting high commando group that will create and perform evolutionary breakthrough actions on behalf of people and planet. One people, one planet. I will then pass this concept on to others who are capable of generating further self-organizing commando teams."

What ever happened to defending this nation? Military units such as the First Earth Battalion although they are supported by American tax dollars are not here to protect America. They are global minded. They are here to protect an occult world government. They are out there actively promoting the New World Order. Several years ago, Egendorf states that $4.5 million (which came from you and I, and other Americans) had already been spent on Delta Force’s 80 different projects. The Green Berets is another organization that has been heavily targeted by the Satanists, to indoctrinate and recruit. The Green Berets are increasingly moving toward being warrior-monk group. Many of them are now programmed multiples.

One man who is being looked up to by many American Patriots and Christian Patriots as the leader to help them oppose the New World Order is Bo Gritz. He was a recent presidential candidate. Bo Gritz was a Green Beret and a Delta Force commander. Bo Gritz is very proud of the fact that he wrote the manual for the Delta Forces. He also worked for the CIA. Bo Gritz is one of the military’s best programmed multiples, and perhaps one of the most dangerous. Insiders have told me he IS the most dangerous. Numerous insiders both for and against Bo, have talked about Bo Gritz, and that he is a programmed multiple.

According to Bo Gritz’s campaign literature for President he was a commander in Delta Forces. Reproduced on a previous page is Bo’s own presidential campaign literature where he states that he is “Intelligence Officer & Reconnaissance Chief, Delta Force.” He is also “Chief, Special Activities, U.S. Army General Staff, the Pentagon” and “Principle Agent, National Security Council, Intelligence Support Activity”. Under qualifications Bo states that he is a “Security & Counter-terrorist Specialist.” Within the government, they are already referring to Christians who are against the NWO as terrorists. Bo is their greatest counter-intelligence counter-terrorist they have. He came in like a storm and took control of the Patriot movement, and it has been like pulling teeth to warn patriots about who he is.

Bo Gritz himself was a Green Beret, and was used to assassinate 300 people. His blood lust caused him at one point during the Vietnam War to shoot 30 prisoners in cold blood. I also heard Bo talk about say being Temple recommend Mormon. That means he was at that time in good standing with the LDS [Later Day Saints] Mormon church so that he could go to the Temple and participate in its rituals. Those who are alert realize that the temple rituals are like Masonic and Witchcraft rituals. Now he is no longer a Mormon, but he still continues in the military philosophy he believes in. Bo Gritz is going around the nation teaching SPIKE training to anyone who wants martial arts skills. Bo has done an excellent job in identifying for the New World Order every person in the nation who could threaten their plans for a martial law NWO takeover.

Bo Gritz likes to call attention that he is one of this country’s foremost counter-terrorist agents. This is true. The New World Order believes patriots and Christians are terrorists, because they stand in the way of the world’s acceptance of their world dictator. Bo Gritz has done a great deal to infiltrate and neutralize the opposition to the New World Order. He has been their best counter-terrorist agent.

B - INTERNAL COMPUTERS
PERFECT DELEGATION; INTERNAL COMPUTERS WHICH AUTO-CONTROL A SLAVE

If a master has to constantly spend time whipping and motivating his slave, as well as forever watching that the slave doesn’t escape or do shoddy work, or physically or verbally injure the master, then controlling the slave can end up to be a full time job. When the master gets too much involved in the control process, he ceases to be master, and becomes a slave to the control process. The intelligence agencies knew that they would have to create mind control slaves who could police themselves. If the master has to constantly guard his slave, the slave will be more trouble than he is worth. Many successful people have gained their success because they knew how to delegate. The most successful supervisor is the one who can delegate the best. The programmers had to find ways to cut their supervisory requirements to the bone if they were to make owning a Monarch slave worthwhile. The method chosen was to build “computers” into the slave’s mind that would internally regulate everything.

They do this by taking hundreds of the alters and dehumanizing them and turning them into parts of a computer. For instance, the shutter on the All-seeing eye of the computer, which is seen in the mind like a camera shutter, is a child alter who job is to open and shut. (Another primal part is inside the eye’s pupil.) This shutter part knows what goes on in all the system subconsciously but if discovered by a therapist and pulled to the front of the mind will not be able to vocalize about the system. The software for this “computer” could be programmed into it, and all the individual programming of every alter can then be tied back to the computer. In other words, each alter would be programmed on how to view life, to act, to think, and to fun-ction in their job. This programming would be linked to a computer. The programmers invented the perfect method to decentralize their control over their slaves and yet still supervise with the tightest of control.

Each alter is linked to a computer (internal-not an external one) built from a foundation of fear and trauma. Since each section of alters was to remain secret, each section of alters for a slave is given its own computer, and then linking computers were built to link the various sections, and then finally a major backup computer is built, and then finally the internal Beast computer. Bear in mind that this is all built internally in the mind of the victim. We are not talking about actual physical computers built out of physical microchips, wires, condensers etc. If the programmer concentrates on a single point when giving instructions he will get better results. Rather than complicating things for the slave, you gain power over the slave (and any subordinate) if you can give simple clear instructions. For this reason, a large share of the alters in an alter system are given very clear straight forward jobs.

Because their jobs are so straightforward, these alters will often remain fragments, rather than alter parts with full blown personalities. The programmers don’t cloud the issue. An undeveloped alter will be given one single clear, basic job. By stringing 1,000’s of alters together with single tasks, a highly sensitive system of alters can be created. Each piece of the System is separated by some degree of dissociation to make it a separate piece. By dividing the mind so much, it is incapable of fighting what has been done to itself. Before we begin describing the technical details of an internal computer, bear in mind that every Monarch System is unique and yet they all follow certain patterns & methodologies. Most of the models for the first few decades follow these patterns, some of the newer ones have more updated imagery.

POWER SOURCES
In an Illuminati System, a computer is created for each section of alters. That computer will be given a “power source”, which if unscrewed like a light bulb will go out. The light from one of these power sources might be emerald blue or emerald green or other color. The reader may want to refer to Chapter 4 for the codes to understand the structuring of the various computers and systems.

COLOR CODES & RIBBONS
In a standard 13x13x13 Illuminati alter system, 13 colors were used, and each computer was given a color. These would be pink, orange, yellow, white, red, brown, blue, green, black, purple, silver, gold and platinum, and clear. Color programming is reported to have been developed at UCLA. Whatever the case, Systems all over the United States have color programming. The hierarchy of colors in a System is often as follows (from top power down): Platinum, Gold, Silver, Purple, Black, Red, Green, Brown, White, Orange, Yellow, Pink. Clear is also used as a color for secret areas of the system. This hierarchy of color coding can be switched. The internal programmers can reassign colors if they need to, in order to protect the programming. Alters, sections, and parts of the computer are all color coded. The color coding for alters is not the same just because the alters are in the same section. The color coding within the Illuminati Mind Control is fairly consistent, however a sample of an alternative Illuminati color scheme will also be provided.

A survey of colors is as follows:
CLEAR. Secret or shell alters who can take on any color are coded clear. These are alters who serve as images or as a stage for other alters. This would include “Guardian of the Vail” alters.

GOLD. This color is for the supreme leadership in the System, which includes the Grand Druid Council.

SILVER. This color is for the Satanic alters who perform high level Satanic rituals. The Mothers of Darkness have silver coding.

PURPLE. These alters see themselves as the abusers, rather than the Illuminati. These alters were involved with the programming. They have been taught to forget the abuse and to reframe it in their mind as training.

BLACK. These alters were born out of Satanic ritual, and are Moon children. The Delta and Beta alters are black coded. They do the dirty work for the cult, such as blackmail and assassination.

RED. These altars see themselves as witches. They were born out of witchcraft ritual, believe they have great spiritual power, and tend to deny that they have been abused.

GREEN or EMERALD GREEN. These cat altars recognize they have been abused. They still see themselves as belonging to the cult family, and deny that they have been abused to protect their cult family.

BLUE ALTERS. Clones, armies and the ribbons appear to have blue coding. These alters will go so far as to hurt the body to protect it from leaking information or deprogramming.

WHITE. ‘These are Atlantean alters who have been given Aryan type racial nonsense to think they are superior. They believe in genetic engineering, and a master race.

ORANGE. These special protector alters are scouts who warn of danger from internal or external threats.

YELLOW. These are the strong Christian alters of which there will only be a few in the System. They help serve as a balancing point to control the System as well as to hide what the System is all about.

PINK. These are core related alters. They maintain the true feelings of the true self apart from the cult programming and the cult family’s programming. These alters are viewed as weak because they are emotional and often break down and weep. They are fragile emotionally.

An alternative color scheme that is used:
DARK EMERALD GREEN. This color is assigned to the AntiChrist-Satan alter(s). Green is the occult color for Satan and happens to be the most sacred color. Few people outside of Satanists know that Green is more sacred for them than any other color.

LIGHT GREEN. The gods and goddess alters which are triads which fun-ction in

Illuminati ceremonies get this color coding.
WHITE. The internal programmers who come around in white robes get this color assigned to them, as if they are doctors or angels of light.

RED. Sexual alters are given the natural color of sex and arousal red.

BLACK. Connecting alters that are Nexus alters between various system parts.

PINK. Reporting alters.

DARK BLUE. Non hierarchy cult alters.

LIGHT BLUE. Alters in charge of the way the system runs, such as the judges.

YELLOW. Alters which are ritually and sexually twinned with alters of other systems.

ORANGE. Guard alters which are heavily programmed for obedience.

VIOLET-PURPLE. Front alters and small child alters placed into boxes.

CLEAR. Shell alters to deceive the outside world.

GOLD. The traumatized alters upon which the programming is built on.

Joseph Mengele and the programmers who worked with and under him, used a large dollhouse with 26 rooms. Each of the rooms were painted with one of the 13 different colors in order to build into the child’s mind, the 13 front and the 13 back computers. The internal computers worked off of color codes, as well as other codes. A dollhouse was used to instill into the child’s minds the compartments of the computer. Each room was done up in a different color. One particular room was a secret room, and this represents the secret world of Petra which is hidden behind two large rocks. This secret world is coded the color clear. Besides the special color clear, the following colors appear in the system: Gold, Silver, Purple, Black, Red, Green, Blue, Brown, White, Orange, Yellow, and Pink. Each color has meaning and a rank. Just as the hour glasses could be turned, the color coding can be switched in rank. This is why in some systems there is a “Computer Operator Black”, a “Computer Operator Green”, and a “Computer Operator Purple”, etc. During the programming a black box with needles and wires which attach to the body for electroshock is used. While electro shocking the victim, colored scarfs coming out of a box are shown to the child.

The scarfs would help form the imagery needed to build colored ribbons internally. Alters would be created using the Tall Book of Make Believe story of the Pancake people. Using this as a base or foundation, the alters would then be dehumanized one step further into thinking they were ribbons--such as ticker tape, which could transmit information from one computer to another area of the mind. The Ribbons had the ability to travel between the different levels and to transmit messages through the System, especially to the computers. It is believed they could do this because they were spirit. When a System is accessed by a programmer, one procedure is to obtain a Ribbon alter and then inform the Ribbon what he wants. The ribbons transmit messages to the internal computers. The ribbons on older systems use morse code. Who are the Ribbons? The Ribbons are the beginning of the Luciferian alter-like demons and alters. They are primarily the message bearers from the computers to the different computers, levels and alters. The Ribbons might have angelic names (Michael, Gabriel, etc.). The word angel means messenger. The ribbons serve a very similar fun-ction. They transmit ticker tape with morse code messages. They are at work most of the time for a System.

A sample cover story for what they guard--which is the main computer with the gems and the core, is that the ribbons guard the System’s “Garden of Eden”. Some more of the cover story that may be given is this: Ribbons were supposedly formed out of the dust of the ground and were placed in the Garden of Eden to create every pleasant tree. (See Genesis 1.) The ribbons relate to the Tree of Life. But to eat of the Tree of Knowledge of Good and Evil will cause death. The name of the first river of four in the garden is Pashon. Out of the first river come four heads. The River Pashon has gold, ballium, onyx, rubies, diamonds and precious stones. These gems are the programs the dwarfs mine. If the System has charismatic programming, the alters will have porcelain face programming. In this case each ribbon’s color will match the color of the stones in the masks--that is yellow, white, blue, green, purple, red and black. The colors of the ribbons correlate or match the colors of the Dollhouse rooms. What do ribbons do? The Ribbons serve the programmers and the computers, who in turn serve the evil master Spirits. Things that the Ribbons do for the computers have been identified as follows:
a. The Ribbons eat from the system’s internal “Tree of Good and Evil”.,

b. Ribbon programming consists of several things--where they reside, who they are and what they are to protect.,

c. Ribbons must protect the computers in order to protect their own life. The Ribbons will be programmed to believe that reversing the computer will reverse the Ribbons’ life. The ribbons themselves operate with mechanical hearts (not human hearts). The cover stories may include the following: All Ribbons are hid behind a little girl, who is a front for them & who tells the creation story. The little girl will tell the creation story which included the Ribbons. Behind her runs a silver cord. The silver cord has to do with heart programming. The silver cord has 3 strands that cannot be broken as per ECL 4:12. This silver cord goes off if the Ribbons are touched. Ribbons are set up so that suicide programming is triggered if they are cut. Actually, french braiding conceals a 4th strand.

In review as stated, during the programming, a box with colored scarfs was shown the child while severe electro-shock was given to the body. A colored scarf represents a ribbon which runs a message from a colored room to a similar colored alter. In a System which is structured into families and cities and worlds and sections, these “geographically different” structures in the mind of the victim can be connected via the color coding. In other words, the alters are structured into a 3-D cube structure. Then a fourth dimension (the color coding) is added to tie in all of the three dimensions.

A central computer was placed in at the bottom of the mind. Using various techniques the victim is brought to the deepest altered state possible, and a computer is built into the mind via hypnosis and alters. This can be done by freezing the entire body and just keeping the head active. Or it can be done by bringing the body to a comatose state where the heart is beating faintly. This step can only be done under the strictest medical supervision. The memory storage area for the computers include the Emerald City Library (staying with the Wizard of Oz theme) which contains alters who only fun-ction is to memorize & retain with photographic memories, pages and pages of information. The layout with codes of the entire system can be stored in a storage bank, so the programmer could access this area if his own records were lost. The libraries contain the historical genealogies of satanic iniquity from early ancient times to present. This ancient occult information has been reported by at least half a dozen Illuminati slaves as being retained internally by demons.

HOW MONARCH SLAVES ARE BEING DESIGNED TO INTERFACE WITH THE UNIX SYSTEM OF THE BEAST COMPUTERS
In line with what is being done by the Illuminati around the world with their network of computers--the computers have access codes similar to 666 666 666, and back out and close down codes similar to 999 999 999. These are the codes that the UNIX universal system uses, and the Monarch slaves are being created with codes that interface with the UNIX system for computers. (On some systems if the computer is shutdown it will request an input code of 666fff666fff666fff666...This can then be reversed F6F6F6F6F6F6F6F6F6F6.) The UNIX system is being used to allow the New World Order’s big BEAST computers to communicate with any known computer, including the minds of their Monarch mind-controlled slaves. In the 1960s, the U.S. Department of Defense began linking computers together into a superhighway now developed into the Internet.

Hundreds of thousands of computers around the world are tied in. Like buildings in a city, each computer has its own unique address. Most of these addresses are registered at the Network Information Center in Menlo Park, CA. Individuals can also be registered at the NIC too. The U.S. Military links into the system with their Arpanet and Milnet networks, which tie together such divergent things as MIT computers, West Point computers, NORAD computers, Alr Force Systems Command Space Division computers at El Segundo, CA and U.S. Army DARCOM at Seckenheim, Ger. (to name a few). These are all being tied together to form one vast electronic brain. There are nine secret BEAST computers of the New World Order, at the time this was written. “Big Bertha” is the nickname of the BEAST computer located at the secret military installation called Dreamland at the secret Groom Lake, NV test site facility. Papoose Lake is referred to as S-4.

The other super-secret facilities in the area are named S-2, S-6, and S-66. This area has become the Illuminati’s prime programming facility for turning out Monarch slaves, and the Monarch slaves which are turned out from this area have turned out to be the worst basket cases. In other words, the programming is very severe which is carried out in this area. This area has also been used for the space program, for the U-2 & SR-71, for the CIA’s A-12 spy plane, for the Stealth fighters (Lockheed F-1 17A Attack plane) and bombers, the Aurora, and for the U.S. government’s “Above Top Secret” flying saucers. The Big Bertha computer (named after the Illuminati Mother-of-Darkness Bertha Krupp) can be talked to in half a dozen languages and will answer a person back in the language they speak.

On a daily basis, airplanes fly into the Groom Lake facility. The callname of flights bringing workers and people go by the call name “Janet”. About 12 Janet flights come into the facility everyday. These flights are usually Boeing 737s and arrive from places like a secure terminal run by EG&G at McCarran Alrport in Las Vegas and from the military’s Palmdale, CA facility. These 737s are unmarked except for a red stripe running down the fuselage. Large military C-130 arrive with cargo, and Illuminati dignitaries arrive in smaller twin-engine craft. Victims for the programming are brought in via planes, & other routes.

One of the BEAST computers occupies three floors of the headquarters of the European Economic Community building in Brussels, not far from the important Illuminati Mother-of-Darkness worldwide headquarters castle near the France-Belgium border near Muno, Belgium. Another BEAST computer is in Luxembourg. In observing the operations of the Illuminati, it has been seen that telephone area codes are used as part of a mind-controlled slave’s code. We do not understand everything about their codes, but it does tie in with other things that are happening. Every person in the world has been assigned an 18 digit tracking number, which consists of 3 groups of 6 numbers. The first 3 numbers assigned in the BEAST computer to everyone are 666. The next is one’s national code. The U.S. national code is 110. Then the next 3 numbers are you telephone area code, and then finally your 9 digit Social Security number. The code then is 666 + Nation code + Tel. area code + social security no. = BEAST I.D. no. for an individual. According to Dwight Kinman’s book The World’s Last Dictator, 2nd ed., (Woodburn, OR: Solid Rock Books, p. 256) VISA has already begun issuing VISA cards using the BEAST 18 digit number.

When an American makes a bank transaction on an autoteller within a matter of seconds, the BEAST has been informed of the activity. These computers use UNIX. The particular programs for the economic transactions just described are a worldwide computer network called SWIFT (Society For Worldwide Interbank Financial Transactions). The SWIFT works off of the UNIX system and can communicate with any computer. It was developed by AT&T and uses C language. (Bear in mind that there are dialects of UNIX, such as the standard AT&T UNIX and for instance Berkeley UNIX. The UNIX system uses both timesharing and multitasking. The mind of a Monarch slave also does both multitasking and time sharing. One of the nice UNIX features, is “protected memory”, which is also part of the Monarch programming. A kernal is what the UNIX programmers call a “protected person”. It is very similar to the internal “person” (alter) who helps the Monarch slave’s programming fun-ctions. The big item about UNIX is that it has permissions granted. This is similar to the Monarch programming. Permissions are granted to 3 types of entities. The Top Programmer or “god” as he is called, of the UNIX System receives what is called the individual permission.

The next permission is called group permission, and it is given to insiders who work with the system. The final permission type is the world, which has very limited access. The parallel between this and the Monarch programming is surprising. In some cases the programmers may have matched things on a one-to-one correspondence. The Monarch program also has a Top Programmer who is called “god” to the System. He has total control over the system. His programming permissions can not be deprogrammed out by others who might want to usurp his power. Hidden from the casual user of the UNIX system are the Daemons and Demons. The UNIX programmers decided to use the old english spelling for demon = Daemon. These are computer processes which work secretly behind the scenes and are given actual demonic names--some corresponding to actual names of historically known demons, such as Asmodeus. Asmodeus is also a demon which is placed into many Monarch slaves. In the UNIX system these demons are treated like persons in the computer’s user director. Demons in the computer system do not have to log onto the computer, but they work behind the scenes and are given the same powers that people users are given.

They are set up in the same structure as how the computer treats people. Permission in the UNIX system is granted using an 8 bit count with 0 through 7. The three kinds of permission are the read, write, and execute permissions. If no permission were granted in any way the UNIX system would indicate” “on the screen which means 000000 000 or nine 0’s. The super user called god is given the code 777 which means super user. However, the permission of 666 gives the user the power to everything the 777 permission gives, except that the 777 permission allows the god the master programmer) to execute not executable programs. The Postmaster Demon is the head demon, and his permission level in UNIX is 666. (In the Monarch Programming “Mr. Postman” is a code word used internationally.) The most important part of the BEAST system is its communication power. The Electronic Mail System of the BEAST allows it to communicate worldwide, and along with electronic mail comes levels of permission to view or work with the electronic mail. The super user (god) is called Root. A programmer on the Beast must get permission. His program must get permission. That program that gives permission must also get permission. In other words, there are levels of permission that must be gone through.

This is similar to the Monarch program. For instance, the alters personalities which would control the body during Illuminati gatherings have very tight access permission. It is very hard to access these hierarchy personalities. Both the UNIX system (and the Monarch programming) creates “children” by “spinning”. The “child” spins off. When the “child” is finished it is “killed” in UNIX lingo. When the programmers created child processes in the computer, they were having problems with the child processes killing the parent processes. The same type of problems have had to be dealt with in the Monarch programming. The initial programmer is often the biological parent of the child, and this parent is very responsible for extreme tortures being applied to the child who is being programmed--not to mention all of the expendible children, who are killed in front of the child to highlight the reality of the trauma. The natural reaction of the child being created is to hate the programmer. Naturally, the Monarch programming had to overcome that natural tendency, which it does very successfully. The UNIX system uses an internal clock within its computer system. The UNIX clock is called CRON. CRON checks files to see if the programmer has put in any files to run.

The UNIX system uses data bus lines, which are like the Monarch programming ribbons, which go through the system. These ribbons or data bus lines take information and commands from the computers to other computers. Within the UNIX system, insiders have revealed that the Daemon (Demon) processes of all the UNIX systems have a security flaw. That flaw is that the Postmaster Daemon has access to them in spite of who the god is of that particular UNIX computer system. So while owners, who purchase UNIX systems think that they have exclusive control over their system, an external Postmaster Daemon coming from the Beast could use its permission levels to over ride the power of the local owner of the system. The Monarch system has a similar feature, the Illuminati programmers know how to access the base or primal anchors to the programming and yank out any programming they want. All the slaves of these lesser groups such as the CIA, Church of Satan, Mafia, etc. can all be reprogrammed rather quickly to serve the Illuminati, if they are not already due to the Illuminati programmers extra knowledge on how to get into the base programming. In these many ways, the UNIX system serves both real computers and also for the internal computers of some slaves’ mind.

The slave’s system becomes a computer system. It fun-ctions as a series of computers that are connected to the master computer which is sunk into the mind at the lowest hypnotic level, which is a level often placed even below an internal “hell pit”. To access the different computers, combinations of cards were used for the codes (numbers are also used. See Chapter 4.). Various parts of a Monarch system correspond to what any computer would have. A microprocessor register has 3 sections on a computer to make it fun-ctional. In Monarch Systems, you would find these 3 represented by
1. stored data in the library and alters with photographic memories,

2. an instruction section with codes, and

3. stacking mechanisms.

Linked to all this were a crystal, clock, hour glasses, a compass and an entire demonic command structure. The eye in front of the big computer will be protected by legions of spirits. The front big computer runs front quadrants and the back computer runs the deeper quadrants. The software so to speak for the Omega programming (computer) may be set up to include a stacking program called the Potter’s Wheel. The Potter’s Wheel is a misuse of the Bible, and is a type of programming that the Charismatic/pentecostal movement carries out. The Mormons and the Catholics have their own distinctive “software” programs. An initial stacking mechanism would work by telling alters to “Stand in Order according to rank and serial no.” Another code along with a hand signal would place the Gatekeeper alters up on the Potter’s wheel for their “creator” to work on them. A group of alters could be taught to go up on their Potter’s wheel by seeing a pattern of dominoes. It is whatever the programmer decides.

The dominoes were used for coding, but they also had the programming feature of being able to tie alters together so that if the System is tampered with out of sequence, a domino effect would take place. This domino effect is for one program to set off another program to set off another program. Soon the Monarch slave’s mind is trying to deal with dozens of suicide programs running simultaneously, along with perhaps other programs such as scrambling programs. For instance, one story line used is the mice run up and down and open up new levels of programming and are tied to the pendulum/clock mechanism. The mice can activate the hour glass, and a gold-winged green skirted fairy Whisper balances the hour glass on her wings. If the slave goes toward freedom, the slave’s mind triggers programs of all kinds, and the mind ends up not knowing if it was coming or going with all the different programs which activate. A more exhaustive look at all the craziness and activity of the Omega & Gamma programs which activate to defend the Illuminati’s Mind Control are given in other chapters. The programming has been designed that if it was taken out improperly, it is to come back Seven times Seven stronger. This is also a clue that the programming is partly a demonic manifestation, cf. MT 12:43-45 et al.

COMPONENTS OF THE CONTROLS
At the center of the System are the mechanisms that control it, such as the Master Computer, the All-Seeing Eye, the Compass, the Master Clock, and the Quadrants that tie in together. The System may have 3 hourglasses spinning on axes. These hour glasses can also be called matrixes, which are on your standard 3 axes, a X axis, a Y axis & a Z axis. The worlds are various sections of these matrixes.

There are backup worlds & mirror image worlds. Occasionally, there will be a double system. Some of the more important alter System are even far more complex than a double System or a double Double System. Each alter is split so that every alter has another alter created from it. Then there are demonic doubles--demonic mirror images in the System. The double images shown in the picture are very real when describing our System. Some therapists have noticed “Satanic Guardian Angels” which talk to their patients. They do not know what to make of these. Some classify them as hallucinations, because they do not have any room in their belief system for demonology. These are the demons that do control the multiple’s mind. Thor, with his hugh hammer is a painful demon. Thor’s image is made of cast iron & carried an iron mallet. Thor is a black strong figure. When his hammer strikes, the slave gets split brain headaches. Programmers can use the story of the Giant with the Hammer in the Ozma of Oz book (pp. 141-155) to give the imagery when programming. A special series of sweeping motions with both hands will relieve the split brain programming, but some alters can only tolerate these hand signals being done by the master. By the way, Thor is an important protector in Satanic/occult beliefs, & the religion of Thor now has equal stature/popularity in Germany as the Lutheran church.

The programs are put into a System and given codes. These programs use Greek, Hebrew and Druidic letters (or other esoteric languages) in their activation codes. Actually, these alphabets also are the way these people numbered with, and the Greek, Hebrew & Druid letters were used as numbers. These programs could be called Utility Programs, because they fun-ction much like the utility programs of a computer. Along with all the programming comes cover programming. Generally, front stories cover almost everything in a System. Dominos have been used in Monarch programming as the basis for what is called a “Mother Board” in actual computers. Telephone tones key in on a slave’s computer matrix. At times, telephone tones in everyday life will make slaves accidently wacky. All computers run off of base 2--which uses the numbers 0, and 1. 0 and 1 can be represented as on and off. In the programming, they were represented by “He Loves Me”, “He Loves Me Not.” The Programmers, especially Dr. Mengele, enjoyed taking a daisy and pulling its petals off one at a time. First petal, “I love you”. Second Petal, “I love you not.” IF the last daisy petal was “I love you not--then the child was dramatically killed in front of other children to be programmed. The Illuminati’s method of death--skinning alive--has been developed into a fine art, for both programming and ceremonies. A drawing of this skinning procedure by a witness is on pg. 338. The daisy game, which was scary for a child, heightened the victim’s attention. Matrixes were built upon this deadly game.

How did it feel to be programmed with Mengele’s “I love you, I love you not” programming? A victim recalls, “The child was placed in a cage exposed and naked. The low voltage wires were rigged to the metal of the cage. The child experienced a continual erratic or sporadic prolonged voltage of shock until the heart would pulsate and the anxiety level of the child became out of control. “Then the Dr. would enter the scene with his sneering taunting smile while holding a daisy in his hands. The sporadic voltage would continue to flow through the child’s body. As the shock continued, the Dr. stood before the child pulling petals off the daisy. His only communication was voiced in these words, “LOVE YOU, LOVE YOU NOT, LOVE YOU, LOVE YOU NOT,” while pulling off the daisy petals. This action would drive the child crazy because the child knows full well if that last petal is pulled off it meant death. The child that is not loved is skinned alive before the other children. “...we can now begin to understand that the expendable children were in other cages placed all around us for the eye to see. They went through the same process as we watched.

When the last petal of the daisy was pulled from the flower they were killed. Then the terror of what we had just experienced through the seeing and hearing, let us know we were next, but when? By the time the doctor got to “He loves me not” some children no longer knew fear. Their ashes were taken from the crematorium and used in the garden for fertilizer, as a reminder to all what happens to unloved children. “In the clinical room, the lights were used to program the day’s events. The bright light continually flaashed starting with 7 lights, then six dots, then five dots, then four dots, then three, then two dots, then 1 dot. In the blindness of the lights, we could hear the doctor’s voice, “LOVE YOU, LOVE YOU NOT.” over and over again. A child could have a false trust when the lights flaashed 7 dots. By the time one dot was flaashing, the child’s terror had once again risen. The doctor never pulled the last petal off for us, but we can’t forget how he teased us. He smiled and walked away, ‘NO, I LOVE YOU.’ and walked away.” If we use L=I love you and N=I love you not, we can build the following matrix for the internal computer:
L

N

L

N

L

N

1

2

3

4

5

6
2 3 4 5 6 1
3 4 5 6 1 2
4 5 6 1 2 3
5 6 1 2 3 4
6 1 2 3 4 5

This type of configuration can even be tied to color programming, and to dominoes, where the numbers are represented as the dots on a domino. By making numbers into dots--the numbers can be represented by lights in the same patterns of black domino dots. This means that dominos can be used to program a child, and who would suspect anything about dominoes?

Another thing that lends itself well to use as a programming code are a deck of cards. Many slaves have this. It can be tied in with the Alice In Wonderland story. When cards are used, a section (also called a world or city) of alters will be given its own computer. To access that computer, a code consisting of several things including 2 cards can be used. In review of what Chapter 4 said about codes, often double codes are employed--what is meant by that is that suppose we have 13 important alters in a section. They will designate each of these “A” alters. Then they number them each 1 through 13. But then they will double code them so that as we count up, we also count down.

Then they attach a generic level number to them, say 2,000. So putting this together we have Emerald Green 2001-13a for our first alter, then next is Emerald Green 2002-12a, the next is Emerald Green 2003-11a, and so on. Then the magical name of the alter or the Tribal name of the alter can be attached onto this to complete an access code. While it seems perhaps complex at first, all an alter is remembering is a color, a common section no. and their rank no. and their file letter, and their magical name. (The name to pull them up--will not be their name for public use.) Alice In Wonderland, the Wizard of Oz and the Tall Book of Make Believe played a fundamental role as “software” in a System. The Wizard of Oz stories are often used to show how & what structures to put in the small victim’s internal world. The stories even teach HOW to create an internal world and its parts. Some of the T.V. shows & movies, which served as Monarch programming scr-ipts (i.e. the software) include:
Batman

Bewitched

Bobby’s World Cartoons (deliberate triggers)

Dameon/Omen movies

Disney movies (all of them, some with deliberate triggers)

Duck Tails Cartoon (deliberate triggers)

ET (used in alien programming)

Fantasy Island (deliberate triggers)

Ghost Busters (used for “who ya’ gonna call” theme)

Love Boat (used for mind control of cruise prostitutes)

My Fair Lady (finishing school for slaves, such as Youngstown, OH)

Star Wars

Steven King Horror Movies

Tiny Toons Cartoons of Steven Speilberg (deliberate triggers)

Wizard of Oz movies

Some of the books which were used as programming scr-ipts, which haven’t been mentioned yet, are the Dead Sea Scrolls, the Egyptian Book of the Dead (satanic rituals follow closely the rituals of the Egyptian Book of the Dead), Steven King novels, & Wilbur Smith’s. The Mother Goose nursery rhymes were used prolifically for internal codes in slaves. Now that we have discussed the widely used “soft ware” available to the programmers, we don’t want to forget the root program, the tree which was used as a method of organizing the various programs, just like a computer’s subdirectories branch out more subdirectories. If the programming is tampered with, the slave will want to cut the tree--however, since the tree is in them, this means they will want very badly to cut their arms, especially their veins. The programming is not guarded as much as the computers. Everything guards the BEAST computer including deaf alters who have to be communicated with using a hand number code system. Such a code might resemble finger signing 1,2,3,4,5,10 = 15 & following this with a shutdown code which simply reverses the access equation. Surrounding the central All-seeing-eye will be alters & programs with insanity, fear, hopelessness, cutting, burning, aloneness, etc. Strong demonic forces are attached to these alters & programs.

They also can trigger the slave to have abusive behavior as punishment. A System is given a life force which is able to regenerate a system, the jokers who protected the programming, and you have the alpha-numeric codes, the cards, and dominoes (represented by a dice) that formed the access codes to parts of the System. The alters will often feel the heartbeat (which may be an alter) associated with the computer In the background is a Luciferian blue light. This Satanic light empowers the Joker. It along with the Joker and the internal programmers give a System the ability to regenerate itself. One can shut down internal computers which run programming to the levels of the System using the same codes that the original programmers use, but until one also takes care of the 13 Jokers & the faceless white-coated programmers who control the Omega Programming, then the back up computers can regenerate the programming & rebuild the system.

JOKERS
If the computers are given cards as access codes--it works in well to create Jokers who are wild cards within the system, which can imitate anything. The Jokers have a Luciferian form. Luciferian is the term that the programmers used. This means that it is spirit. Because the Jokers are Spirit, they can take any form they need to and they can do what they want to do, until they are bound & cast out with the rest of their hierarchy of demons. The Jokers will pop up when a victim tries to study the codes & programming that direct that victim’s life. Around this cult core are the jewels (which are the programs the dwarfs mine). Remember the story of Snow White and the Seven dwarfs? Also swirling around Silence are ribbons which we will discuss later.

TREES
The trees bud at certain times. This is one way the imagery of the tree to connect to the time that rituals are to happen. If the tree is barren of leaves (no programs--i.e. deprogrammed), then the system is to grow more leaves.

C - INTERNAL HIERARCHIES
The programmers build chains of command within the groups of alters that they create. They credit themselves with bringing order out of chaos. When a system of multiple personalities thinks of rebelling, they are in the similar situation as a colony wanting freedom from its mother country. Can we govern ourselves, and what governing structures can we keep--since the structure itself is colonial? Can the mind work together to help itself? The concerns are legitimate questions. And yes, the multiple’s mind can fun-ction outside of the control of the programmer’s hierarchial arrangement, but not without alters taking on different job assignments. In the slave’s hierarchal chain of command, adult alters are assigned to insure that child alters don’t get out, unless the abusers want a child alter out. Likewise, commander alters are needed to keep the switching smooth, and to keep things orderly. Subordinate alters are taught to submit to their king, or governor, or queen alter. Immense power and indoctrination is given to the key cult alters ruling a system. The internal hierarchial arrangement means that the host alter coming into therapy (often a Christian) may not be as completely open as therapists think. They must play an internal game of going toward health while not pushing the buttons of deeper more powerful alters. A lot of internal politics may go on. A front alter may promise a deeper alter secrecy in order to consult with it.
This makes for all kinds of triangulation and manipulation within the alter system itself. The entire hierarchy of alters has a lot invested in protecting the core from trauma, which was why the core was split in the beginning. Traditional therapy goes after the core & the multiplicity that protects it, thus insuring resistence from the entire hierarchy incl. front alters, who in MPD systems seeking help are often close to the core. The core self is best not directly pursued by the therapist, but gently encouraged on its own to reconnect.

Fritz Springmeier & Cisco Wheeler

__________________
ShadowWolf
**************************************************
A seeker who asks a question is ignorant -- for a moment.
The seeker who fails to ask the question is ignorant -- forever.
Reply With Quote
  #82  
Old 02-05-2005, 03:52 PM
ShadowWolf's Avatar
ShadowWolf ShadowWolf is offline
Member
 
Join Date: Apr 2004
Posts: 159
ShadowWolf is on a distinguished road
Default Re: Illuminanti

I don't have a link for this one either. But this is a real scary prospect, I think.

Project Monarch

Ron Patton





Nazi Mind Control

Amidst the subtle cerebral circumvention of the gullible populace, through a multitude of manipulated mediums, lies one of the most diabolical atrocities perpetrated upon a segment of the human race; a form of systematic mind control which has permeated every aspect of society for almost fifty years. To objectively ascertain the following, one may need to re-examine preconceived ideologies relating to the dualistic nature of mankind.

Resolving the philosophical question of whether we are inherently good or inherently evil is tantamount in shaping our perception of reality; specifically, the spiritual variable within the equation of life.

This exposition is substantiated by declassified U.S. government documents, individuals formerly connected to the U.S. intelligence communities, historical writings, researchers knowledgeable in mind control, publications from mental health practitioners, and interviews taken from survivors unwittingly subjected to a highly complex form of trauma-based mind control known as MONARCH programming.

A word of caution for survivors of intensively systematic mind control and/or some form of ritualized abuse: There are numerous "triggers" in this article. It is therefore recommended not to read it unless appropriate support systems are in place or if you have a thoroughly reintegrated personality.



A Brief History of Control

The Mystery Religions of ancient Egypt, Greece, India and Babylon helped lay the foundation for occultism, meaning "hidden knowledge." One of the earliest writings giving reference to occultism is the Egyptian Book of the Dead, a compilation of rituals explicitly describing methods of torture and intimidation (to create trauma), the use of potions (drugs) and the casting of spells (hypnotism), ultimately resulting in the total enslavement of the initiate.[1] These have been the main ingredients for a part of occultism known as Satanism, throughout the ages.

During the 13th Century, the Roman Catholic church increased and solidified its dominion throughout Europe with the infamous Inquisition. Satanism survived this period of persecution, deeply entrenching itself under the veil of various esoteric groups.

In 1776, a Bavarian Jesuit by the name of Adam Weishaupt was commissioned by the House of Rothschild to centralize the power base of the Mystery Religions into what is commonly known as the Illuminati, meaning "Enlightened Ones." This was an amalgamation of powerful occultic bloodlines, elite secret societies and influential Masonic fraternities, with the desire to construct the framework for a "New World Order." The outward goal of this Utopia was to bring forth universal happiness to the human race. However, their underlying intention was to gradually increase control over the masses, thus becoming masters of the planet.

The Anglo Alliance

By the 19th century, Great Britain and Germany were recognized as the primary geographic areas of Illuminati control. It then should be of little surprise to know the first work in Behavioral Science research was established in England in 1882, while much of the early medical and psychiatric techniques involved in mind control were pioneered at the Kaiser Wilhelm Institute in Germany.

The Tavistock Institute of Human Relations was set up in London in 1921 to study the "breaking point" of humans. Kurt Lewin, a German psychologist, became the director of the Tavistock Institute in 1932, about the same time Nazi Germany was increasing its research into neuropsychology, parapsychology and multi-generational occultism. Interestingly, a progressive exchange of scientific ideas was taking place between England and Germany, most notably in the field of eugenics: the movement devoted to "improving" the human species through the control of hereditary factors in mating. The nefariously enigmatic union between the two countries was bonded, partly through the Order of the Golden Dawn, a secret society which consisted of many high ranking officials in the Nazi party and British aristocracy.

Top SS Nazi officer Heinrich Himmler, was in charge of a scientific project called Lebersborn, which included selective breeding and adoption of children, a peculiarly large number of twins among them.[2] The purpose of the program was to create a super-race (Aryans) who would have total allegiance to the cause of the Third Reich (New World Order). Much of the preliminary experimentation concerning genetic engineering and behavior modification was conducted by Dr. Josef Mengele at Auschwitz, where he coldly analyzed the effects of trauma-bonding, eye-coloring and "twinning" upon his victims. Beside the insidious surgical experimentation performed at the concentration camp, some of the children were subjected to massive amounts of electroshock. Sadly, many of them did not survive the brutality.

Concurrently, "brain-washing" was carried out on inmates at Dachau, who were placed under hypnosis and given the hallucinogenic drug mescaline. During the war, parallel behavioral research was led by Dr. George Estabrooks of Colgate University. His involvement with the Army, CID, FBI and other agencies remains shrouded in secrecy. However, Estabrooks would occasionally "slip" and discuss his work involving the creation of hypno-programmed couriers and hypnotically-induced split personalities.[3]

After WWII, the U.S. Department of Defense secretly imported many of the top German Nazi and Italian Fascist scientists and spies into the United States via South America and the Vatican. The code name for this operation was Project PAPERCLIP.[4] One of the more prominent finds for the U.S. was German General Reinhard Gehlen. Hitler's Chief of Intelligence against Russia. Upon arriving in Washington D.C. in 1945, Gehlen met extensively with President Truman, General William "Wild Bill" Donovan, Director of the Office of Strategic Services(OSS) and Allen Dulles, who would later become the stalwart head of the CIA. The objective of their brain-storming sessions was to reorganize the nominal American intelligence operation, transforming it into a highly-efficient covert organization. The culmination of their efforts produced the Central Intelligence Group in 1946, renamed the Central Intelligence Agency (CIA) in 1947.

Reinhard Gehlen also had profound influence in helping to create the National Security Council, from which the National Security Act of 1947 was derived. This particular piece of legislation was implemented to protect an unconscionable number of illegal government activities, including clandestine mind control programs.


The Evolution of Project MKULTRA

With the CIA and National Security Council firmly established, the first in a series of covert brain-washing programs was initiated by the Navy in the fall of 1947. Project CHATTER was developed in response to the Soviet's "successes" through the use of "truth drugs." This rationale, however was simply a cover story if the program were to be exposed. The research focused on the identification and testing of such drugs for use in interrogations and the recruitment of agents.[5] The project was officially terminated in 1953.

The CIA decided to expand their efforts in the area of behavior modification, with the advent of Project BLUEBIRD, approved by director Allen Dulles in 1950. Its objectives were to; (1) discover a means of conditioning personnel to prevent unauthorized extraction of information from them by known means, (2) investigate the possibility of control of an individual by application of special interrogation techniques, (3) investigate memory enhancement and (4) establish defensive means for preventing hostile control of agency personnel. In August 1951, Project BLUE BIRD was renamed Project ARTICHOKE, which evaluated offensive uses of interrogation techniques, including hypnosis and drugs The program ceased in 1956. Three years prior to the halt of Project ARTICHOKE, Project MKULTRA came into existence on April 13, 1953 along the lines proposed by Richard Helms, Deputy Director of Central Intelligence (DDCI) with the rationale of establishing a "special funding mechanism of extreme sensitivity."[6]

The hypothetical etymology of "MK" may possibly stand for "Mind Kontrolle." The obvious translation of the German word "Kontrolle" into English is "control."[7] A host of German doctors, procured from the post war Nazi talent pool, were an invaluable asset toward the development of MKULTRA. The correlation between the concentration camp experiments and the numerous sub-projects of MKULTRA are clearly evident. The various avenues used to control human behavior under MKULTRA included radiation, electroshock, psychology, psychiatry, sociology, anthropology, graphology, harassment substances and paramilitary devices and materials "LSD" being the most widely dispensed "material". A special procedure, designated MKDELTA, was established to govern the use of MKULTRA abroad. MKULTRA/DELTA materials were used for harassment, discrediting or disabling purposes.[8]

Of the 149 subprojects under the umbrella of MKULTRA having been identified, Project MONARCH, officially begun by the U.S. Army in the early 1960's (although unofficially implemented much earlier) appears to be the most prominent and is still classified as TOP SECRET for "National Security" reasons.[9] MONARCH may have ulminated from MKSEARCH subprojects, such as operation SPELLBINDER, which was set up to create "sleeper'' assassins (i e. "Manchurian candidates") who could be activated upon receiving a key word or phrase while in a post-hypnotic trance. Operation OFTEN, a study which attempted to harness the power of occultic forces was possibly one of several cover programs to hide the insidious reality of Project MONARCH.

Definition and Descr-iption

The name MONARCH is not necessarily defined within the context of royal nobility, but rather refers to the monarch butterfly. When a person is undergoing trauma induced by electroshock, a feeling of light-headedness is evidenced; as if one is floating or fluttering like a butterfly. There is also a symbolic representation pertaining to the transformation or metamorphosis of this beautiful insect: from a caterpillar to a cocoon (dormancy, inactivity ), to a butterfly (new creation) which will return to its point of origin. Such is the migratory pattern that makes this species unique.

Occultic symbolism may give additional insight into the true meaning Psyche is the word for both "soul" and "butterfly" coming from the belief that human souls become butterflies while searching for a new reincarnation. [10]

Some ancient mystical groups, such as the Gnostics, saw the butterfly as a symbol of corrupt flesh. The "Angel of Death" (remember Mengele?) in Gnostic art works was portrayed crushing the butterfly.[11] A marionette is a puppet that is attached to strings and is controlled by the puppet master, hence MONARCH programming is also referred to as the "Marionette Syndrome." "Imperial Conditioning" is another term used, while some mental health therapists know it as "Conditioned Stimulus Response Sequences."

Project MONARCH could be best described as a form of structured dissociation and occultic integration, in order to compartmentalize the mind into multiple personalities within a systematic framework. During this process, a Satanic ritual, usually including Cabalistic mysticism, is performed with the purpose of attaching a particular demon or group of demons to the corresponding alter(s). Of course, most skeptics would view this as simply a means to enhance trauma within the victim. negating any irrational belief that demonic possession actually occurs.

Alters and Triggers

Another way of examining this convoluted victimization of body and soul is by looking at it as a complex computer program: A file (alter) is created through trauma, repetition and reinforcement. In order to activate (trigger) the file, a specific access code or password (cue or command) is required. The victim/survivor is called a "slave" by the programmer/handler, who in turn is perceived as "master" or "god." About 75% are female, since they possess a higher tolerance for pain and tend to dissociate easier than males. Subjects are used mainly for cover operations, prostitution and pornography; involvement in the entertainment industry is notable.

A former military officer connected to the DIA, told this writer, "In the 'big picture' these people [MONARCH victims] are in all walks of life, from the bum on the street to the white-collar guy". In corroboration, a retired CIA agent vaguely discussed the use of such personnel to be used as "plants" or "chameleons" for the purpose of infiltrating a designated group, gathering information and/or injecting an ulterior agenda. There are an inordinate amount of alters in the victim/survivor with numerous back-up programs, mirrors and shadows. A division of light-side (good) and dark-side (bad) alters are interwoven in the mind and rotate on an axis.

One of the main internal structures, (of which there are many) within the system is shaped like a double-helix, consisting of seven levels. Each system has an internal programmer which oversees the "gatekeeper" (demons?) who grant or deny entry into the different rooms. A few of the internal images predominately seen by victims/survivors are trees, the Cabalistic "Tree of Life," with adjoining root systems, infinity loops, ancient symbols and letters, spider webs, mirrors or glass shattering, masks, castles, mazes, demons/monsters/aliens, sea shells, butterflies, snakes, ribbons, bows, flowers, hour glasses, clocks, robots, chain-of-command diagrams and/or schematics of computer circuitry boards.

Bloodlines and Twinning

A majority of the victims/survivors come from multi-generational Satanic families (bloodlines) and are ostensibly programmed "to fill their destiny as the chosen ones or chosen generations"(a term coined by Mengele at Auschwitz). Some are adopted out to families of similar origin. Others used in this neurological nightmare are deemed as the "expendable ones" (non-bloodliners), usually coming from orphanages, foster care homes, or incestuous families with a long history of pedophilia. There also appears to be a pattern of family members affiliated with government or military intelligence agencies.

Many of the abused come from families who use Catholicism, Mormonism, or charismatic Christianity as a "front" for their abominable activities (though members of other religious groups are also involved.) Victims/survivors generally respond more readily to a rigid religious (dogmatic, legalistic) hierarchical structure because it parallels their base programming. Authority usually goes unchallenged, as their will has been usurped through subjective and command-oriented conditioning.

Physical identification characteristics on victims/survivors often include multiple electrical prod scars and/or resultant moles on their skin. A few may have had various parts of their bodies mutilated by knives, branding irons, or needles, Butterfly or occult tattoos are also common. Generally, bloodliners are less likely to have the subsequent markings, as their skin is to "remain pure and unblemished."

The ultimate purpose of the sophisticated manipulation of these individuals may sound unrealistic, depending upon our interpretive understanding of the physical and spiritual realms. The deepest and darkest alters within bloodliners are purported to be dormant until the "Anti-Christ~' is revealed. These "New World Order" alters supposedly contain call-back orders and instructions to train and/or initiate a large influx of people (possibly clones or "soulless ones"), thereby stimulating social control programs into the new millennium.

Non-biological "twinning" is yet another bizarre feature observed within MONARCH programming. For instance, two young non related children would be ceremoniously initiated in a magical "soul-bonding" ritual so they might be "inseparably paired for eternity" (possibly another Mengele connection?). They essentially share two halves of the programmed information, making them interdependent upon one another. Paranormal phenomenon such as astral projection, telepathy, ESP, etc. appear to be more pronounced between those who have undergone this process.



ALPHA. Regarded as "general" or regular programming within the base control personality; characterized by extremely pronounced memory retention, along with substantially increased physical strength and visual acuity. Alpha programming is accomplished through deliberately subdividing the victims personality which, in essence, causes a left brain-right brain division, allowing for a programmed union of L and R through neuron pathway stimulation.

BETA. Referred to as "sexual" programming. This programming eliminates all learned moral convictions and stimulates the primitive sexual instinct, devoid of inhibitions. "cat" alters may come out at this level.

DELTA. This is known as "killer" programming, originally developed for training special agents or elite soldiers (i.e. Delta Force, First Earth Battalion, Mossad, etc.) in covert operations. Optimal adrenal output and controlled aggression is evident. Subjects are devoid of fear; very systematic in carrying out their assignment. Self-destruct or suicide instructions are layered in at this level.

THETA considered to the "psychic" programming. Bloodliners (those coming from multi-generational Satanic families) were determined to exhibit a greater propensity for having telepathic abilities than did non-bloodliners. Due to its evident limitations, however, various forms of electronic mind control systems were developed and introduced, namely, bio-medical human telemetry devices (brain implants), directed-energy lasers using microwaves and/or electromagnetics. It is reported these are used in conjunction with highly-advanced computers and sophisticated satellite tracking systems.

OMEGA. A "self-destruct" form of programming, also known as "Code Green." The corresponding behaviors include suicidal tendencies and/or self-mutilation. This program is generally activated when the victim/survivor begins therapy or interrogation and too much memory is being recovered.

GAMMA. Another form of system protection is through "deception" programming, which elicits misinformation and misdirection. This level is intertwined with demonology and tends to regenerate itself at a later time if inappropriately deactivated.

Method and Components

The initial process begins with creating dissociation within the subject, usually occurring from the time of birth to about six years. This is primarily achieved through the use of electroshock (ECT) and is at times performed even when the child is in the mother's womb. Due to the severe trauma induced through ECT, sexual abuse and other methods, the mind splits off into alternate personalities from the core. Formerly referred to as Multiple Personality Disorder, it is presently recognized as Dissociative Identity Disorder and is the basis for MONARCH programming. Further conditioning of the victim's mind is enhanced through hypnotism, double-bind coercion, pleasure-pain reversals, food, water, sleep and sensory deprivation, along with various drugs which alter certain cerebral fun-ctions.

The next stage is to embed and compress detailed commands or messages within the specified alter. This is achieved through the use of hi-tech headsets, in conjunction with computer-driven generators which emit inaudible sound waves or harmonics that affect the RNA covering of neuron pathways to the subconscious and unconscious mind. "Virtual Reality" optical devices are sometimes used simultaneously with the harmonic generators projecting pulsating colored lights, subliminals and split-screen visuals. High voltage electroshock is then used for memory dissolution.

Programming is updated periodically and reinforced through visual, auditory and written mediums. Some of the first programming themes included the Wizard of Oz and Alice and Wonderland, both heavily saturated with occultic symbolism. Many of the recent Disney movies and cartoons are used in a two-fold manner: desensitizing the majority of the population, using subliminals and neuro-linguistic programming, and deliberately constructing specific triggers and keys for base programming of highly-impressionable MONARCH children.

A prime example of how subliminal programming works is by looking at the recent Disney cinematic sensation Pochahontas, curiously billed as their "33rd" (highest degree in Scottish Rite Freemasonry) animated movie. In the movie, Grandmother Willow is a mystical 400 year old tree who counsels the motherless Pochahontas to listen to her heart and help her realize all the answers lie within. Grandmother Willow is constantly talking in "double-speak" and using reversals" (i.e. "Sometimes the right path is not the easiest one"; the esoteric derivative being: the left path [the path that leads to destruction] is the easiest one.

In Illuminati Structured MPD Systems, the willow tree represents the occultic powers of Druidism. The intrinsic imagery of the tree's branches, leaves and root systems are very significant, as some of the dark spiritual proper ties associated with the Willow Tree Programming are: (I) The branches are used to whip victims in rituals for "cleansing" purposes, (2) A willow tree can endure severe weather disturbances (i.e. storms) and is known for it's pliability or flexibility. Victims/Survivors of the programming describe the willow's branches wrapping around them, with no hope of escape, (3) The deep root system of the willow tree makes the victim/survivor feel as if they are falling deeper and deeper into an abyss while in a hypnotic trance.

Music plays an instrumental role in programming, through combinations of variable tones, rhythms and words. Frightmeister Stephen King's numerous novels and subsequent movies, are purported by credible sources to be used for such villainous purposes. One of his latest books, Insomnia, features a picture of King with the trigger phrase "WE NEVER SLEEP," (indicative of someone with MPD/ DID) below an all-seeing eye. A partial list of other mediums used to reinforce base programming are:

Pinnochio, Sleeping Beauty, Snow White, Beauty and the Beast, Aladdin, The Little Mermaid, The Lion King, E. T., Star Wars, Ghost Busters, Trancers II, Batman, Bewitched, Fantasy Island, Reboot, Tiny Toons, Duck Tails, The Dead Sea Scrolls and The Tall Book of Make Believe.

A few movies which depict or portray some aspect of MONARCH programming are Hellraiser 3, Raising Cain, Labyrinth, Telefon, Johnny Mneumonic, Point of No Return, The Lawnmower Man and Closet Land.

Programmers and Places

It's difficult to figure out who the original programmer of this satanic project was, due to the substantial amount of disinformation and cross-contamination propagated by the "powers that be." The two that went by the color-coded name of Dr. Green are a Jewish doctor named Dr. Gruenbaum, who supposedly collaborated with the Nazis during WWII, and Dr. Josef Mengele, whose trademark of cold blooded and calculating brutality has not only scarred the souls of survivors from Auschwitz, but also a countless number of victims throughout the world. Mengele's direct involvement at the infamous Auschwitz concentration camp was suspiciously downplayed during the Nuremberg Trials, and consequently no intensified effort by the U.S. and it's allies was directed toward his capture.[13]

As a means to confuse serious investigators as to his whereabouts, U.S. officials would report Mengele being a non-threatening, recluse in Paraguay or Brazil, or that he was simply dead (the "Angel of Death" miraculously must have come back to life at least five different times). His unprecedented research, at the expense of thousands of lives, undoubtedly was a significant bonus to U.S. interests, Besides using the pseudonym of Dr. Green, survivors knew him as Vaterchen (daddy), Schoner Josef (beautiful Joseph), David and Fairchild. A gracefully handsome man of slight stature, Mengele would disarm people with his gentle demeanor,while at other times, he would explode into violent rages.[14] Other characteristics remembered by survivors were the cadence of his shiny black boots as he paced back and forth and his I-love-you/l-love-you-not" daisy game. When he pulled off the last daisy petal, he would maliciously torture and kill a small child in front of the other child he was programming. Distraught survivors also recalled being thrown naked into cages with monkeys, who were trained to viciously abuse them. Evidently, Mengele enjoyed reducing people to the level of animals. He also would purposely restrain his victims from crying, screaming, or showing any excessive emotion.

Dr. D. Ewen Cameron, also known as Dr. White, was the former head of the Canadian, American and World Psychiatric Associations. Because of Cameron's extensive experience and credentials, the ClA's Allen Dulles funneled millions of dollars throughout organizations like the society for the Investigation of Human Ecology, which Cameron ruthlessly presided over. Experimentations were conducted at several locations in Montreal, mostly at McGill University, St Mary's Hospital and Allan Memorial Institute.

Besides the conventional methods of psychiatric tyranny, such as electroshock drug injections and lobotomies, Cameron conceived the technique of "psychic driving," wherein unsuspecting patients were kept in a drug induced coma for several weeks and administered a regimen of electroshocks, while electronic helmets were strapped to their heads and repetitive auditory messages were transmitted at variable speeds.[15]

Many of those exploited were abused children which had been run through the Roman Catholic orphanage system.

Not surprisingly, Dr Cameron has been conveniently left out of most psychiatric journals. This may have been, in fact, largely due to Project MKULTRA being publicly exposed in 1970, through lawsuits filed by Canadian survivors and their families. The CIA and Canadian government settled out of court so as not to be required to officially admit to any wrongdoing.

A former U.S. Army Lt. Col. in the DIA's Psychological Warfare Division, Michael Aquino, is the latest in a line of alleged government-sponsored sadists. Aquino, an eccentric genius, founded the Temple of Set, an offshoot of Anton LaVey's Church of Satan. His obsession with Nazi pagan rituals and his hypnotic manipulation of people made him an ideal candidate for the position of "Master Programmer." Aquino was connected with the Presidio Army Base day care scandal, in which he was accused child molestation. Much to the dismay of the young victims' parents, all charges were dismissed. Code-named "Malcolm", Aquino developed training tapes on how to create a MONARCH slave and worked as a liaison between Government/Military Intelligence and various criminal organizations and occult groups in the distribution of MONARCH slaves.[16]

Heinrich Mueller was another important programmer who went under the code names "Dr. Blue" or "Gog." He apparently has two sons who have carried on the trade. The original "Dr. Black" was apparently Leo Wheeler, the nephew of deceased General Earle G. Wheeler, who was the commander of the Joint Chiefs of Staffs during the Vietnam War. Wheeler's protege, E. Hummel is active in the Northwest, along with W. Bowers (from the Rothschild bloodline).

Other alleged master mind manipulators, past and present, are: Dr. Sydney Gottleib, Lt. Col John Alexander, Richard Dabney Anderson (USN), Dr. James Monroe, Dr. John Lilly, Lt. Comdr. Thomas Narut, Dr William Jennings Bryan, Dr. Bernard L. Diamond, Dr. Martin T. Orne, Dr. Louis J. West, Dr Robert J. Lifton, Dr. Harris Isbel and Col. Wilson Green

In order to keep MKULTRA from being easily detected, the CLA segmented its subprojects into specialized fields of research and development at universities, prisons, private laboratories and hospitals. Of course, they were rewarded generously with government grants and miscellaneous funding.

The names and locations of some of the major institutions involved in MONARCH programming experimentation were/are: Cornell, Duke, Princeton, UCLA, University of Rochester, MIT, Georgetown University Hospital, Maimonides Medical Center, St. Elizabeth's Hospital (Washington D.C.), Bell Laboratories, Stanford Research Institute, Westinghouse Friendship Laboratories, General Electric, ARCO and Manking Research Unlimited, The "final product" was/is usually created on military installations and bases, where maximum security is required. Referred to as (re) programming centers or near-death trauma centers, the most heavily identified are:

China Lake Naval Weapons Center, The Presidio, Ft. Dietrick, Ft. Campbell, Ft. Lewis, Ft. Hood, Redstone Arsenal, Offutt AFB, Patrick AFB, McClellan AFB, MacGill AFB, Kirkland AFB, Nellis AFB, Homestead AFB, Grissom AFB, Maxwell AFB and Tinker AFB Other places recognized as major programming sites are Langley Research Center, Los Alamos National Laboratories, Tavistock Institute and areas in or by Mt. Shasta, CA, Lampe, MO and Las Vegas, NV.

Notable Names

One of the first documented cases of a MONARCH secret agent was that of the voluptuous 1940's model, Candy Jones. The book, The Control of Candy Jones, (Playboy Press) portrays her 12 years of intrigue and suspense as a spy for the CIA. Jones, whose birth name is Jessica Wilcox, apparently fit the physiological profile as to be one of the initial experiments or human guinea pigs under the government's "scientific" project, MKULTRA.

The most publicized case of MONARCH monomania has surfaced through the book TRANCE Formation of America: The True Life Story of a ClA Slave by Cathy O'Brien. On the back cover it emphatically states, "Cathy O'Brien is the only vocal and recovered survivor of the Central Intelligence Agency's MKULTRA Project Monarch mind control operation." This documented autobiography contains compelling accounts of O'Brien's years of unrelenting incest and eventual introduction into Project MONARCH by her perverted father. Along with co-author Mark PhiIlips, her rescuer and deprogrammer, Cathy covers an almost unbelievable array of conspiratorial crime: forced prostitution (white slavery) with those in the upper echelons of world politics, covert assignments as a "drug mule" and courier, and the country-western music industry's relationship with illegal CIA activities.

Paul Bonaci a courageous survivor who endured almost two decades of degradation under Project MONARCH, has disclosed strong corroborating evidence of widescale crimes and corruption from the municipal/state level all the way up to the White House.[17] He has testified about sexually-abused males selected from Boy's Town in Nebraska and taken to nearby Offut AFB, where he says they were subjected to intense MONARCH programming, directed mainly by Commander Bill Plemmons and former Lt. Col. Michael Aquino.[18] After thoroughly tormenting the young boys into mindless oblivion, they were used (along with girls) for pornography and prostitution with several of the nation's political and economic power brokers. Bonnaci recalled being transported from the Air Force base via cargo planes to McClelland AFB in California. Along with other unfortunate adolescents and teenagers, he was driven to the elite retreat, Bohemian Grove. The perpetrators took full advantage of these innocent victims, committing unthinkable perversions in order to satisfy their deviant lusts. Some victims were apparently murdered, further traumatizing already terrified and broken children.

An insuitable actress of marginal talent (now deceased), a morally-corrupt T.V. evangelist, a heralded former Green Beret officer and a popular country-western singer are a few others likely having succumbed to MONARCH madness. Lee Harvey Oswald, Sirhan-Sirhan, Charlie Manson, John Hinckley Jr., Mark Chapman, David Koresh, Tim McVeigh and John Salvi are some notable names of infamy, strongly suspected of being pawns who were spawned by MKULTRA.

Deprogrammers and Exposers

Dr. Corydon Hammond, a Psychologist from the University of Utah, delivered a stunning lecture entitled "Hypnosis in MPD: Ritual Abuse" at the Fourth Annual Eastern Regional Conference on Abuse and Multiple Personality, June 25, 1992 in Alexandria, Virginia. He essentially confirmed the suspicions of the attentive crowd of mental health professionals, wherein a certain percentage of their clients had undergone mind control programming in an intensively systematic manner. Hammond alluded to the Nazi connection, military and CIA mind control research, Greek letter and color programming and specifically mentioned the Monarch Project in relation to a form of operative conditioning.

Shortly after his ground breaking speech, he received death threats. Not wanting to jeopardize the safety of his family, Dr. Hammond stopped disseminating any follow-up information, until recently.

Mark Phillips, a former electronics subcontractor for the Department of Defense, was privy to some of the top secret mind control activities perpetrated by the U.S. government. His inquisitive demeanor, strong conscience and heart-felt concern for Cathy O'Brien, a "Presidential Model' under Project MONARCH, prompted him to reveal the inner-workings of this grand deception beginning about 1991. As the story goes, he helped Ms. O'Brien escape from her captors and was able to deprogram her in about a years time in Alaska. The controversial Phillips has his share of critics who are skeptical of the veracity of his claims.

New Orleans therapist Valerie Wolf introduced two of her patients before the President's Committee on Human Radiation Experiments on March 15, 1995 in Washington D.C. The astonishing testimony made by these two brave women included accounts of German doctors, torture, drugs, electroshock, hypnosis and rape, besides being exposed to an undetermined amount of radiation. Both Wolf and her patients stated they recovered the memories of this CIA program without regression or hypnosis techniques.[19] Wolf presently devotes much of her time to counseling such survivors.

A former labor attorney for Atlantic Richfield Co., David E. Rosenbaum, conducted a nine. year investigation (1983-1992) concerning allegations of physical torture and coercive conditioning of numerous employees at an ARCO plant in Monaca, PA.[20] His clients, Jerry L. Dotey and Ann White, were victims of apparent radiation exposure; but as Mr. Rosenbaum probed deeper in the subsequent interview sessions, a "Pandora's Box" was unveiled. His most astonishing conclusion was that Jerry Dotey and Ann White were likely the off-spring of Adolf Hitler, based in part on the uncanny resemblance from photos (facial features; bone structure and size were taken into consideration). Rosenbaum also states, "They both exhibit feelings and experiences that indicate they are twins." Dotey and White were allegedly subjected to torture of many kinds while under drug induced hypnosis, with each one undergoing at least three training techniques by plant physicians.

Each victim was trained to enter into a hypnotic state upon the occurrence of specific stimuli, usually involving a "cue" word or phrase and trained to "remember to forget" what transpired in the hypnotic state. They were repeatedly subjected to identical stimulus-response sequence, to produce nearly automatic reactions to the particular status.

MKULTRA veteran, Dr. Bernard Diamond, Dr. Martin Orne and Dr. Josef Mengele regularly visited the ARCO plant, according to Rosenbaum. The special conditioning of Dotey and White was intended for the artificial creation of dual German personalities. Rosenbaum, who is Jewish, has maintained a deep friendship with the two, despite the seemingly precarious circumstances.

Other renowned therapists involved in deprogramming are Cynthia Byrtus, Pamela Monday, Steve Ogilvie, Bennett Braun, Jerry Mungadze and Colin Ross. Some Christian counselors have been able to eliminate parts of the programming with limited success. Journalists who have recently expounded on the subject matter in exemplary fashion are Walter Bowart, Operation Mind Control, Jon Rappoport, U.S. Government Mind-Control Experiments on Children and Alex Constantine, Psychic Dictatorship In The USA.

Conclusion

The most incriminating statement to date made by a government official as to the possible existence of Project MONARCH was extracted by Anton Chaitkin, a writer for the publication, The New Federalist. When former CIA Director William Colby was asked directly, "What about monarch?" he replied angrily and ambiguously, "We stopped that between the late 1960's and the early 1970's."

Suffice to say that society, in its apparent state of cognitive dissonance, is generally in denial of the over whelming evidence of this multifarious conspiracy. Numerous victims/ survivors of Project MONARCH are in desperate need of help. However, the great majority of people are too preoccupied with themselves to show any genuine compassion toward these severely wounded individuals. Apathy has taken over the minds of the masses, who choose to exist within the comforts of this world. Reality has thus become obscured by relativism and selfishness.

Although there has been some progress in deprogramming and reintegrating therapies, a much greater problem needs to be rectified. The Holy Bible addresses this problem as the fragmentation of the soul (Ezekiel 13:20). A spiritual restoration is what is truly needed (Psalm 23:3) but can only take place by completely trusting in Jesus Christ as the way to salvation (John 3:16; I Peter 3:1 and deliverance from demonic oppression and/or possession (Mark 16:17). The true humility of Christ and the love of God effectively counters the pride and hatred of Satan. Statistically, the road to recovery for these survivors of unimaginable depravity is a long and tedious one, but God is the ultimate healer and only within his time, through His strength and by His grace, can the captives be set free (Isaiah 61:1).

Endnotes
1. David L. Carrico, The Egyptian Masonic Satanic Connection, 1992
2. Walter H. Bowart, Operation Mind Control, Flatland Editions, 1994, p. 216
3. Martin Cannon, Mind Control and the American Government, Prevailing Winds Research, 1994, p. 19
4. Linda Hunt, Secret Agenda, St. Martin's Press, 1991
5. Final Report of the Select Committee to Study Governmental Operations, U.S. Senate, April 1976, p. 337
6. Ibid, p. 390
7. John Marks, The Search For The Manchurian Candidate, Times Books, 1979, pp 60-61
8. Final Report of the Select Committee to Study Governmental Operations, U.S. Senate, April 1976, p. 391 9. Mark Phillips and Cathy O'Brien, Project Monarch, 1993
10. Barbara G. Walker, The Woman's Dictionary of Symbols and Sacred Objects, Harper Collins, 1988
11. Marshall Cavendish, Man, Myth and Magic, 1995
12. Dr. Corydon Hammond, The Greenbaum Speech, 1992; Mark Phillips and Cathy O'Brien, Project Monarch Programming Definitions, 1993
13. Gerald L. Posner, Mengele: The Complete Story, McGraw-Hill, 1986
14. Lucette Matalon Lagnado, Dr. Josef Mengele and the Untold Story of the Twins of Auschwitz, Morrow, 1991
15. Gordon Thomas, Journey into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, Bantam Books, 1989
16. Cathy O'Brien and Mark Phillips, Trance Formation of America, 1995
17. John DeCamp, The Franklin Cover-Up, Child Abuse, Satanism and Murder in Nebraska, AWT Inc, 1992
18. Anton Chaitkin, "Franklin Witnesses Implicate FBI and U.S. Elites in Torture and Murder of Children", The New Federalist, 1993
19. Jon Rappoport, "CIA Experiments with Mind Control on Children", Perceptions Magazine, September/October 1995, p. 56
20. David E. Rosenbaum, Esq., First Draft Overview of Investigation of the Group, 1983-1993



Levels of MONARCH Programming [12]

Reprinted with permission from PARANOIA: The Conspiracy Reader. 1 year (4 issues) for $20 ($30 Int'l Airmail). Paranoia, PO Box 1041, Providence, RI 02901-1041. A compilation, "The Conspiracy Reader" (Citadel Press, 1999), is available from any bookstore.


__________________
ShadowWolf
**************************************************
A seeker who asks a question is ignorant -- for a moment.
The seeker who fails to ask the question is ignorant -- forever.
Reply With Quote
  #83  
Old 02-05-2005, 03:57 PM
ShadowWolf's Avatar
ShadowWolf ShadowWolf is offline
Member
 
Join Date: Apr 2004
Posts: 159
ShadowWolf is on a distinguished road
Default Re: Illuminanti

www.weatherwars.info

Recap

Weather Control

Television weatherman Scott Stevens (weatherwars.info) believes our weather is being controlled by outside sources. Stevens said he became convinced "something was playing in the sky" after studying visible satellite imagery that showed large weather systems with anomalous "punched out" sections and square clouds.

He pointed out that meteorologists currently struggle to provide forecasts longer than 72 hours for intense storms, suggesting their models are not accounting for the artificial conditions caused by weather manipulation. According to Stevens, the multitude of hurricanes that struck the southeastern United States appeared to be "on a schedule." He theorized that a "scalar imprint" within the hurricane clouds may demonstrate the "hand of man in a natural process."

With so many destructive storms hitting the U.S. last year, Stevens concluded that non-American entities may be controlling the weather. The Russian military has long claimed to have made significant technological advancements in its ability to modify the world's weather, and Stevens suggested we accept them at their word. The mechanism of their weather modifying technology may involve some kind of electromagnetic force, he speculated.


Related Articles

Melting Glaciers

Many climate scientists believe the melting of glaciers worldwide is a sign the planet has entered the first phase of global warming. According to Rajendra K. Pachauri, "If you go to the Himalayan peaks, the rate at which the glaciers are retreating is alarming. And this is not an isolated example. I've seen photographs of Mount Kilimanjaro 50 years ago and now. The evidence is visible." Read morehere.

The photos above show the extent to which Riggs Glacier in Muir Inlet at Alaska's Glacier Bay National Park has retreated. In 1941, the glacier was 2,000 feet thick. Now, vegetation grows on the mountains around the inlet where the glacier once stood. See more before and after glacier photos here.

Photos: U.S. Geological Survey and Bruce Molnia
__________________
ShadowWolf
**************************************************
A seeker who asks a question is ignorant -- for a moment.
The seeker who fails to ask the question is ignorant -- forever.
Reply With Quote
  #84  
Old 02-05-2005, 03:58 PM
ShadowWolf's Avatar
ShadowWolf ShadowWolf is offline
Member
 
Join Date: Apr 2004
Posts: 159
ShadowWolf is on a distinguished road
Default Re: Illuminanti

Innoculations - The True
Weapons Of Mass Destruction
Causing VIDS (Vaccine Induced Diseases) An Epidemic Of Genocide

By Rebecca Carley, M.D.


1-29-5 Court Qualified Expert in VIDS and Legal Abuse Syndrome "One basic truth can be used as a foundation for a mountain of lies, and if we dig down deep enough in the mountain of lies, and bring out that truth, to set it on top of the mountain of lies; the entire mountain of lies will crumble under the weight of that one truth. And there is nothing more devastating to a structure of lies than the revelation of the truth upon which the structure of lies was built, because the shock waves of the revelation of the truth reverberate, and continue to reverberate throughout the Earth for generations to follow, awakening even those people who had no desire to be awakened to the truth." (by Delamar Duvaris as written in the preface of "Behold the Pale Horse" by William Cooper). The basic truth that served as the foundation for the mountain of lies known as vaccinations was the observation that mammals who recover from infection with microorganisms acquire natural immunity from further infections. Whenever T cells (the little packman cells which kill viruses, bacteria, and cancer cells, thus conferring cellular immunity) and B cells (antibody producing cells which confer humoral immunity) are activated by various substances foreign to the body called antigens, some of the T and B cells become memory cells. Thus, the next time the individual meets up with that same antigen, the immune system can be quickly triggered to demolish it. This is the process known as immunity. This truth gave birth to a beLIEf that if a foreign antigen was injected into an individual, that individual would then become immune to a future infection. This beLIEf, (you see the lie in the middle), was given the name, "vaccinations". What the promoters of vaccination failed to realize is that the respiratory tract of ALL mammals (since animals are just as devastated by these inoculations with disease as are humans) contain secretory IgA (an antibody which initiates the natural God given immune response) within the respiratory tract mucosa. Bypassing this mucosal aspect of the immune system by directly injecting organisms into the bloodstream leads to a corruption in the immune system itself. As a result, the pathogenic viruses or bacteria cannot be eliminated by the immune system and remain in the body, where they will further grow and/or mutate as the individual is exposed to ever more antigens and toxins in the environment which continue to assault the immune system. The mechanism by which the immune system is corrupted can best be realized when you understand that the two poles of the immune system (the cellular and humoral mechanisms) have a reciprocal relationship. Thus, when one is stimulated, the other is inhibited. Since vaccines activate the B cells to secrete antibody, the T cells are subsequently suppressed. This suppression of the cell mediated response is a key factor in the development of cancer and life threatening infections. In fact, the "prevention" of a disease via vaccination is, in reality, an inability to expel organisms due to the suppression of the cell-mediated response. Thus, rather than preventing disease; they actually prevent the disease from ever being resolved. The organisms continue circulating through the body, mutating and transforming into other organisms (as demonstrated by the work of Professor Antoine Bechamp), depending on the acidity and toxicity of the internal terrain of the body. Note that Bechamp proved that Louis Pasteur's "germ theory" of disease was incorrect due to this ability of organisms to transform and mutate based on the body's internal terrain (as Pasteur admitted on his deathbed). Thus, treatment of infection with antibiotics as well as "prevention" of disease with vaccines are both just examples of cutting off the branches of dis-ease, when the root of the cause is a toxic internal environment. However, since Pasteur's germ theory was conducive to the profits of the burgeoning pharmaceutical companies who only manage dis-ease, no mention of the work of Professor Bechamp has been made in medical school curricula. To make matters worse than the suppression of cellular immunity which occurs when vaccines are injected, adjuvants (which are substances added to vaccines to enhance the antibody response) can actually lead to serious side effects themselves. Adjuvants include oil emulsions, mineral compounds (which may contain the heavy metal aluminum), bacterial products, liposomes (which allow delayed release of substances), and squalene. The side effects of adjuvants themselves include hyperactivity of B cells leading to pathologic levels of antibody production, as well as allergic reaction to the adjuvants themselves (as demonstrated in Gulf War I soldiers injected with vaccines containing the adjuvant squalene, to which antibodies were found in many soldiers). Note that the pathologically elevated hyperactivity of antibody production caused by adjuvants also results in a distraction from the other antigens that the immune system encounters "naturally", which must be addressed to maintain health. This hyperactivity of the humoral (antibody producing) pole of the immune system is, in this author's opinion, the sole cause of all autoimmune diseases. The only thing which determines which autoimmune disease you develop is which tissues in your body are attacked by auto-antibodies. If the inside lining of the gastrointestinal tract (the mucosa) is attacked by auto-antibodies you develop leaky gut syndrome (which leads to food allergies when partially digested food particles are released into the bloodstream, are recognized as antigens foreign to the body, and elicit an antibody response against those food particles that becomes heightened every time that same food is eaten and released into the bloodstream partially digested again). Crohn's disease and colitis are also caused by auto-antibody attack on the mucosa of the GI tract itself. If the islet (insulin producing) cells of the pancreas are attacked by auto-antibodies, you develop insulin dependent (juvenile) diabetes. If the respiratory mucosa is attacked by auto-antibodies, you develop "leaky lung" syndrome where, just as with leaky gut, antigens recognized as foreign to the body which are inhaled are able to traverse the lining of the respiratory tract, causing the creation of antibodies against those antigens (usually dust, mold, pet or pollen antigens). When these substances are inhaled again, the allergic response producing constriction of the bronchioles is called asthma. If the components of the articular surface of the joints are attacked by auto-antibodies, you develop rheumatoid (or juvenile) arthritis. If the skin is attacked, you develop "leaky skin" syndrome, where contact antigens which could not otherwise traverse the skin are allowed in, leading to skin allergies to contact antigens. Additionally, depending on which level of the skin is attacked by auto-antibodies, (i.e., the epidermis or dermis), you develop eczema, psoriasis or scleroderma. If the kidney tissue is attacked by auto-antibodies, you develop one of the many types of nephritis, depending on which component of renal tissue is attacked (for example, with glomerulonephritis, the basement membrane of the glomerular apparatus within the kidney (which filters blood to form urine) is attacked by auto-antibodies, thus allowing protein to escape from the serum into the urine). If you develop auto-antibodies against thyroid gland tissue, you develop Grave's disease. If you develop auto-antibodies against the tissue of the thymus gland (which is crucial in T cell production and fun-ction), you develop myasthenia gravis. If you develop auto-antibodies against the very DNA in the nucleus of all cells, you develop systemic Lupus (thus, the potential autoimmune potential of DNA vaccines being developed now is self evident; worse yet, DNA components from these vaccines can be incorporated into your DNA, leading to actual genetic changes which could cause extinction of all (vaccinated) life on the Earth). And on, and on, and on. The brain and spinal cord can also be attacked with auto-antibodies (which this author refers to as vaccine induced encephalitis), leading to a variety of neurological diseases. The most severe of these, leading to death, are sudden infant death syndrome (SIDS) and most cases of "shaken baby syndrome". If components of the myelin sheath (the insulating covering of nerve fibers which allows proper nerve conduction) or the actual neurofilaments themselves are attacked by auto-antibodies, the resultant condition is determined solely by the location of the damage done. Such neurological conditions include but are not limited to minimal brain dysfun-ction, ADD/ADHD, learning disabilities, mental retardation, criminal behavior, the spectrum of pervasive developmental disorders (including autism), multiple sclerosis, Parkinson's, Lou Gehrig's disease, Guillen Barre,, seizure disorders, etc., etc. etc. (Please note that other toxins are also sometimes involved, such as: aspartame, Lymes and mercury in cases of MS; aspartame in seizures; or pesticides in cases of Parkinson's). Thus, when detoxing to reverse these diseases, these other substances must also be detoxed to obtain a full recovery. However, the corruption of the immune system caused by the injection of vaccines is a key component in these disease states leading to immune malfun-ction, and is the reason why an autistic child may also have leaky gut or eczema, etc. Note that myelin production, for the most part, does not begin until after birth. Most myelin is apparently laid down by age 5 years and usually completed by age 10 years, judging by the level of success at various ages in reversing autistic and other neurological VIDS symptoms that this author has observed in hundreds of children by detoxing the viruses with homeopathic nosodes, and repairing the immune corruption by simultaneous administration of bovine colostrum (i.e., after 10 years of age, the ability to stop and repair auto-antibody induced damage in the myelin sheath and neurofilaments themselves is dramatically decreased). Thus, the hyperactivity of the humoral arm of the immune system in autoimmune disease is caused by adjuvants added just for that purpose. However, the autoimmunity itself (i.e., antibody against self) has several mechanisms, including the following: 1. The antigens present in the culture media itself cannot be completely filtered and separated from the organisms cultured thereon. Thus, any antibodies formed against antigens from the culture cells themselves (for example myelin basic protein from chick embryos or the 13 vaccines which now contain aborted fetal cells) can cross-react to form an autoimmune reaction against the myelin basic protein in your myelin sheath, etc. 2. Molecular mimicry is due to similarity of proteins contained in organisms and mammals. (For example, the measles virus is made up of proteins similar to myelin basic protein; thus, antibodies formed against the measles virus antigens subsequently also cause an auto-antibody attack against myelin basic protein in the myelin sheath due to cross reactivity of these antibodies). 3. intentional inclusion of antigens in vaccines to cause formation of antibodies that attack specific hormones or races (for example, experiments done on women of childbearing age in the Philippines and probably other locations where HCG (human chorionic gonadotropin, the hormone produced when women first become pregnant) placed into vaccines given these women resulted in antibodies against the HCG hormone, and subsequent spontaneous abortion thus occurred when the women became pregnant. It is also this author's hypothesis that the epidemic of vitiligo in people of color (hypo pigmentation of skin caused by auto-antibody attack on melanocytes (melanin producing cells) in skin) is also occurring due to intentional inclusion of melanin in vaccines given to people of color. In addition to the above phenomena which lead to simultaneous depression of cellular immune fun-ction and hyperactivity of humoral immune fun-ction, vaccines also contain other toxic substances which can cause serious side effects themselves. The following ingredients are actually listed on the CDC website with this introductory statement: "Many things in today's world, including food and medicines, have chemicals added to them to prevent the growth of germs and reduce spoilage." Translation: you,re already toxic, so what's the big deal with adding more poison? This author's answer to that question is that any immunotoxin can end up being the "straw that breaks the immune system's back" in that individual, leading to dis-ease. This is where genetics is key; i.e., not that what disease you develop is actually caused by some "gene" in most cases; but rather that your genes determine the strength of your immune system (i.e., how many assaults your immune system can take before it reaches critical mass, and you develop a dis-ease). Some additional ingredients in vaccines (as listed by the CDC on their website) include antibiotics, aluminum gels, formaldehyde, monosodium glutamate (MSG), egg protein, and sulfites. Thus, we have antibiotics (which you could be allergic to); aluminum (highly involved in causing Alzheimer's disease); formaldehyde (a toxic carcinogenic substance used to pickle dead people); MSG ( a potent excitotoxin which, like aspartame, can cause seizures, brain tumors, etc.); egg protein (to which you could have a life threatening anaphylactic reaction); and sulfites (another toxin which we are advised not to consume much of orally, but in vaccines, it is injected directly into the blood stream). Is this not a veritable witch's brew of chemicals, organisms, and animal or human (aborted fetus) body parts? Note in this list that they do not mention the ethyl-mercury containing preservative thimerosol, which has been the only dangerous substance in vaccines to receive mainstream media attention (albeit most of that being disinformation) after the explosion in the rate of occurrence of autism in the last generation became self-evident proof that vaccines are the causative factor. For, although the scientists working for the medical mafia continue to use statistics to twist and spin their data to make us beLIEve that vaccines are not the cause, too many thousands of parents have watched their children enter the downward spiral into autism after their children received the vaccine which was the straw that broke the back of their child's immune system. No matter what the "white coats" tell these parents; they know the truth! Mercury (also in dental amalgam fillings) is a highly toxic heavy metal, has been documented to cause cancer, and can be absorbed through the digestive track, skin, and respiratory track. Mercury is 1,000 times more toxic than lead, and is second only to uranium as the most toxic metal. If children receive all recommended vaccines, they will receive 2,370 times the "allowable safe limit" for mercury in the first two years of life (as if there is such a thing as a "safe" amount of a toxic poison). Yet, even after Congressional hearings instigated by Congressman Dan Burton (whose own grandchild became autistic after receiving vaccines) resulted in the FDA requesting (not ordering) vaccine manufacturers to remove this toxic heavy metal from their products, mercury is still present in many vaccines. Although the symptoms of mercury poisoning are identical to the symptoms of autism, it should be noted that most children who descend into the hellish state known as autism do so after the MMR vaccine. The MMR vaccine is one of the few vaccines that do not contain mercury. Thus, it is self-evident that the removal of mercury will not make vaccines "safe". (This is why the mercury is the only thing being addressed at all; because when the people reading this paper realize that the very mechanism by which vaccines corrupt the immune system means that NO vaccine is safe and effective; there will be an evolution of consciousness where the structure of lies telling us vaccines are safe and effective disintegrates.) In the autistic community, this will lead to an exodus from the multiple autism groups saying it is all about the mercury or worse yet, that autism genes are "inherited", to the only group which has their focus on the actual problem. This group is named TAAP (the Autism Autoimmunity Project at www.taap.info/), and is led by April Oakes. In this author's opinion, it will be TAAP in alliance with the vaccine damaged soldiers and vets of the American Gulf War Veterans Association at www.agwva.org led by Peter Kawaja which, working together, will stop this holocaust on humanity called VIDS. The good news is that these VIDS can be reversed using natural remedies contained in the Hippocrates Protocol (www.drcarley.com). This "surgical strike" detoxification approach which has the potential to reverse ALL of the aforementioned conditions under the VIDS umbrella as long as detoxification is started early enough (before age 10 for neurological VIDS) will be the one truth put on top of the mountain of lies (that vaccines are safe and effective) that will cause the entire mountain of vaccine lies to crumble. Combined with a massive outpouring of public support to these two organizations, the root of the tree of vaccine evil will be exposed. Thus, the holocaust on humanity (where instead of people being put in concentration camps, the concentration camps are being put into the people) will finally be put to an end. Unfortunately, we can no longer pretend that this epidemic of VIDS is merely a "mistake" made by good intentioned, albeit misguided mad scientists. Because it's even worse than the above, folkswe are talking TREASON and CRIMES AGAINST HUMANITY, PETS, and even PLANTS, (which are also being genetically modified to create vaccines). The evidence for this is as follows: As concern for population growth started to grow and the final plans to bring in the New World Order were put in place, this lie called vaccines was transformed into pure evil, as it was realized that such delivery systems could be used to intentionally cause disease, which is now being done under the US Code, Title 50, Chapter 32, § 1520 and 1524. You can read it for yourself at your local library, or go to http://www.drcarley.com/Title%2050%20US%20Code.htm. This law has been in place since the 1960's, and it was last modified in April of 2000. The only stipulation made for experimentation on human subjects is that local civilian officials be notified 30 days before the experiment is started. Section 1524 adds that the Secretary of Defense may enter into agreements with the Secretary of Health and Human Services to provide support for vaccination programs through use of excess peacetime biological weapons (i.e., weapons of mass destruction). In April 2000, § 1520 (a) was passed to put alleged restrictions on the use of human subjects for testing of chemical or biological agents after a caller on C Span mentioned this law in 1999, which revealed this treasonous law to a huge audience of listeners (including this author, who has been including it in lectures and written materials since that call came into "Washington Journal"). However, the exceptions written to Title 50, chapter 32 under § 1520 subsection (b) in the 2000 law passed by our aiders and abettors of treason in Congress not only loophole back in a test carried out for "any peaceful purpose that is related to a medical, therapeutic, pharmaceutical, agricultural, industrial, or research activity"; but add that such biological and chemical warfare agents can now be also used for any law enforcement purpose, including "any purpose related to riot control" (just in case those C Span listeners should actually get off the couch at the horror of what the traitors in Washington, D.C. are doing to God's people). Subsection (c) of this law now mandates that "informed consent" be required. In reality, not a single vaccine has ever been tested for its long term side effects (including carcinogenic potential). Additionally, the intentional introduction of stealth viruses, (including man-made viruses that cause cancer, mycoplasma and the HIV virus), antigens which target certain races, (and surely a microchip in the future) into vaccines makes it self evident that informed consent is impossible, as it would initiate impeachment proceedings and war crimes trials against every "public servant" involved in perpetrating these crimes against the American people, in violation of the Nuremberg Code (which was written after the end of WW II to prevent the barbaric experiments that occurred in the Nazi concentration camps) . What most people don't know is that the top level mad scientists from Nazi Germany were actually brought to the United States through "Operation Paperclip", and have been continuing their work to this day in places like Brookhaven labs, Cold Spring Harbor and Plum Island in this author's backyard on Long Island. (To see the document proving that American scientists created the HIV virus, this author refers you to p. 442 of Death in the Air by Dr. Leonard G. Horowitz, where you can read the 1969 document in which the U.S. military/CIA and Rockefeller directed National Academy of Sciences-National Research Council (NAS-NRC) announced that a research program to explore the feasibility of "creating a new infective microorganismwhich would be refractory to the immunological and therapeutic processes upon which we depend to maintain our relative freedom from infectious disease" could be completed at a total cost of $10 million.) Yes, this is what your tax dollars are going towards, folks. But hang on to your hat, because it only gets worse. The most heinous, bone chilling and evil piece of this puzzle has been revealed to the world by an American hero named Peter Kawaja, who worked in the late 1980's as a security and counter terrorism expert for the United States government (a service for which he has been rewarded with the murder of his wife, torching of his home, issuance of a war crimes subpoena to (they thought) confiscate all his evidence, illegal IRS liens on all subsequent income, and multiple attempts on his own life, all funded by YOUR tax dollars). Please go to www.agwva.org/mission.htm and read some of the 34 counts that Mr. Kawaja brought against the domestic traitors to America (in both their individual and governmental capacities) in a federal lawsuit in which the perpetrators, again, used your tax dollars to hire themselves attorneys from the Department of "Justice" whose defense of their war criminal clients was that they are "immune, under color of law". (You can listen to Mr. Kawaja on one of his multiple internet radio shows, including "What's Ailing America?" which he co-hosts with this author at www.highway2health.net every Wednesday at 10 PM, EST. Dr. James R. Shannon, former director of the National Institute of Health reported in December, 2003 that "the only safe vaccine is one that is never used". However, the reverberating truth, "the shot heard round the world" which will lead to the evolution of consciousness necessary to stop the holocaust against humanity known as vaccinations, will be that not only are vaccinations not safe or effective, but that they are actually weapons of mass destruction being perpetrated upon humanity in the name of health, for the purpose of genocide and to bring in the New World Order. Part 2 of the genocidal plan could drop anytime with activation of the Model State Health Emergency Powers Act whenever the next fabricated terrorist attack using biological agents occurs. Worse yet, the Congressional traitors in Washington posing as public "servants" are doing all they can to pass "Codex" legislation which will make the natural remedies and supplements used in the Hippocrates Protocol developed by this author to reverse all dis-eases only available by prescr-iption. So, you didn't hear about that on your local news station either? Please go to the site of another American hero, John Hamill of the International Alliance for Health Freedom (who reversed his schizophrenia symptoms with these natural supplements and has dedicated his life to stop Codex from passing) at www.iahf.com . Wake up, America-it's getting very late.it is time for the mountain of lies to crumble. Please spread the world to everyone you know we can make it happen. The time to stop chopping at branches and get to the root of this evil is now. http://www.surfingtheapocalypse.net/cgi-bin/forum.cgi?read=51420



Disclaimer

http://www.rense.com/general62/inno.htm">Email This Article




MainPage
http://www.rense.com
__________________
ShadowWolf
**************************************************
A seeker who asks a question is ignorant -- for a moment.
The seeker who fails to ask the question is ignorant -- forever.
Reply With Quote
  #85  
Old 02-11-2005, 05:01 PM
rhermen's Avatar
rhermen rhermen is offline
Subscribed Member
 
Join Date: Jun 2004
Posts: 300
rhermen is on a distinguished road
Default Re: Illuminanti

ShadowWolf,

So, how do we correct all these things? Blaming others solves nothing. We all listen to the "experts" who tell us what we must do to be healthy and we have allowed ourselves and our children to be vaccinated. Father must have made provision...

If vaccinations are so toxic, then why haven't the majority of vaccinated people dropped dead from their extensive use? For many generations small pox, measles, polio, diptheria, rubella and others have been nearly eliminated. Notwithstanding the imperfections of these solutions and plenty of other mistakes we've made, life expectancy has increased overall, not declined. This hardly suggests a slow genocide--but I agree--vaccinations can easily be used as a way of "culling of the herd." There are many other possible vectors as well, which increasing evidence is showing, that public health is no longer the main concern of our so-called "experts." We may indeed have been used as unwitting guinea pigs. Lately, high level biologists have been disappearing or meeting with some very unfortunate accidents. Maybe they have been silenced to keep us from learning what they have discovered. There are links for this. here's one:

http://archive.columbiatribune.com/2...109news003.asp

Autism does seem to be on the rise, but this may not be the correct [or only] cause. The excuse of "Mercury Poisoning" may be an attempt at misdirection. I believe our very DNA structure is mutating from the usual two-stranded 46 chromosome double helix to something far more complex. Indeed, it has been suggested that three strands are appearing in the DNA of some very unique individuals and this information is being covered up as these people demonstrate some very unique capabilities.

Some of those who are diagnosed as autistic, may simply be so attuned to non-visual or non-verbal realities, they may have tuned out the grossly limited perception of reality predicated upon the ususal senses, and are aware of other realities which the rest of us cannot discern. Maybe they aren't "grounded" in this reality. Sorry, but I'm unable to provide links for these assertions at this time.

The govt is aware of this, in my opinion, and has attempted to gather all the "special" eggs in one basket for at least two generations now. Becoming more aware that something extraordinary is happening is the best we can do at this time, in my opinion, and be ready for anything that comes our way.
__________________
If you embrace the truth, the Truth will Embrace You!

Last edited by rhermen : 02-11-2005 at 06:08 PM.
Reply With Quote
  #86  
Old 02-15-2005, 11:15 PM
ShadowWolf's Avatar
ShadowWolf ShadowWolf is offline
Member
 
Join Date: Apr 2004
Posts: 159
ShadowWolf is on a distinguished road
Default Re: Illuminanti

I don’t know the answer or answers, nor do I pretend to, but I do know most folk are sleeping. Doing exactly as programmed and defiantly not paying attention, most seems to be sheeple. Our food is not natural anymore it is mostly processed and full of chemicals. Doctors do not know how to cure much, but they can treat all the symptoms. In my opinion they are drug pushers for the most part. We have the FDA approving things that have not been proven safe. Like take for example aspartamine, NutraSweet. It breaks down into wood grain alcohol and formaldehyde in our systems and cannot be flushed out of our system. They have approved drugs like mood elevators that now they are discovering can cause folk to go over the edge and teens to be suicidal. We have many new dis-eases here in the US that mostly don’t exist in other countries. Like Fibromyalgia, CIFIDS, ADD, ADHD Golf War syndrome (which has been linked to government drugs and vaccines, etc).



We have mostly garbage for news, mostly garbage for programming on TV, garbage mostly in the movies. We have engineered diseases like AIDS and SARS. Our children are not taught how to think, Heck when I was in school that was not the target either all them many years ago. And than instead of working earnestly on alternative energy we fight wars over oil. We can control the weather; we have mind control in various forms. A lot of stuff we see in the news is about wag the dog. We have slept so much that FEMA can come in and totally take over. We have allowed Bush way to much authority. We don’t have many friends anymore in the world. He is a wolf in sheep’s clothing, in my opinion. He looks good but sure is not doing well from where I stand. Areas like Social Security, national health, the deficit, etc. The Gov plays down UFO’s but knows an awfully lot about them. The gov. des not want us to own gold or many weeks in food storage. Farmers are not allowed anymore to grow food from unengineered seed. It has to be hybrid and most of that is treated so no matter what if you save some produce for seed next year it will not grow. Then there was 9/11, was it a terrorist attack or government sponsored? There is a large amount of evidence for the latter.



I see the age old fight between good and evil here. And evil is all around us. I think many of the churches have gone over, they certainly do not teach what one needs to do to walk righteously according to the bible. I think they are afraid if they did many would stop coming to church.



I think we are in the end times and here in the US we live in New Babylon. Not good for most of us in the US eh? Since in Revelations New Babylon is destroyed, also referred to as the great Harlot. I think to survive it wise to repent and make a 180 in behavior according to righteous living and behavior. I think it might be wise to return to a more Mosaic law diet. Most the foods we eat are acid producing and our bodies like to be alkaline. Good way for the PTB’s to keep us sick, sluggish and not paying attention, and our kids on Ritalin. It is time to work on forgiveness and walk the righteous path outlined in the bible. But that is my opinion.



The site the HeGoesB4Me posted about is a good one it has a lot of this stuff in there. It has a FBI training manual on the site about how to work with sheeple called the Quiet War http://users.gloryroad.net/~bigjim/silent_2.shtml. Worth taking a look see at it. This guy sums up very well what is going on from a good variety of angles. Is he right I have no idea, but I think he is close about what the illuminati have been up to. Makes sense to me anyway. Main page http://users.gloryroad.net/~bigjim/

Have a great day!



Holy father, maker of heaven and earth, through whom all things are made and all blessings come. I ask, if it is your will, that those seeking direction find it, that those seeking to find the truth find it. I ask this in the name of Yahushua your son Jesus Christ. Amen!
__________________
ShadowWolf
**************************************************
A seeker who asks a question is ignorant -- for a moment.
The seeker who fails to ask the question is ignorant -- forever.
Reply With Quote
  #87  
Old 02-16-2005, 07:52 AM
rhermen's Avatar
rhermen rhermen is offline
Subscribed Member
 
Join Date: Jun 2004
Posts: 300
rhermen is on a distinguished road
Default Re: Illuminanti

ShadowWolf said:
Quote:


I don’t know the answer or answers, nor do I pretend to, but I do know most folk are sleeping. Doing exactly as programmed and defiantly not paying attention, most seems to be sheeple.



Neither do I, but it has become very apparent that folks are waking up all over our world and are tired of being sheeple. A HUGE quest for TRUTH is taking place and I firmly believe that Our Father is behind it.

Quote:

Our food is not natural anymore it is mostly processed and full of chemicals. Doctors do not know how to cure much, but they can treat all the symptoms. In my opinion they are drug pushers for the most part.


Yep!! The focus has shifted from curing the malady to treating the symptoms and increasing the cost of the treatment.

Quote:

We have mostly garbage for news, mostly garbage for programming on TV, garbage mostly in the movies.


Yep!! As long as we're shown this external garbage on a screen, we don't have to deal with our own internal garbage. But unless we deal with our emotional baggage first, we cannot become spiritually mature as Our Father wishes.

Quote:
We have engineered diseases like AIDS and SARS.


These things pose as much as a threat to our world as terrorism or nuclear weapons. We have no shortage of weapons of mass destruction on our world. Only wisdom seems to be in short supply. There are probably more engineered diseases than these.

Quote:

Our children are not taught how to think, Heck when I was in school that was not the target either all them many years ago. I see the age old fight between good and evil here. And evil is all around us. I think many of the churches have gone over, they certainly do not teach what one needs to do to walk righteously according to the bible. I think they are afraid if they did many would stop coming to church.


This has been by design, so has television, and both are designed to keep us from realizing our own personal sovereignty so that we listen to the so-called experts. I mean no offense to you, ShadowWolf, but in my opinion the church and organized religion have also been used for this very same reason.

These things all have but one common purpose: to keep us from discovering the Father Within us. As a future educator, I intend to teach my students HOW to think, not WHAT to think. The evil isn't all around us, brother, it's inside of us and our reality reflects this clearly. The evil within is called ego. If we let go of our egos and turn to the Father Within, we don't need to be taught by the bible or any other book. Father will teach us Himself and there will be no more evil within or without.

Quote:

And than instead of working earnestly on alternative energy we fight wars over oil. We can control the weather; we have mind control in various forms. A lot of stuff we see in the news is about wag the dog. We have slept so much that FEMA can come in and totally take over. We have allowed Bush way to much authority. We don’t have many friends anymore in the world. He is a wolf in sheep’s clothing, in my opinion. He looks good but sure is not doing well from where I stand. Areas like Social Security, national health, the deficit, etc. The Gov plays down UFO’s but knows an awfully lot about them. The gov. des not want us to own gold or many weeks in food storage. Farmers are not allowed anymore to grow food from unengineered seed. It has to be hybrid and most of that is treated so no matter what if you save some produce for seed next year it will not grow. Then there was 9/11, was it a terrorist attack or government sponsored? There is a large amount of evidence for the latter.


Very well said!! It's all about those who have chosen to "play god" and their attempts to consolidate control over the sleeping masses. Well the masses are waking up...

Quote:

I think we are in the end times and here in the US we live in New Babylon.


The US has much to answer for, but end times? Sorry brother ShadowWolf, but I don't recognize any book as being the "Word of God" or the "Fifth Epochal Revelation" or any other such term for placing spiritual authority in a material object. Father has written His Word upon my soul and this is also true of everyone. We must discover for ourselves the TRUTH God has written upon our soul. This is the purpose of LIFE. Others may share their truth with us and it most certianly helps, but we must discover our own TRUTH. In my opinion, this is what free-will and personal sovereingty is all about.

If we can discover this, individually and globally, I see a new beginning for all of us, not the end.
__________________
If you embrace the truth, the Truth will Embrace You!

Last edited by rhermen : 02-17-2005 at 03:42 PM.
Reply With Quote
  #88  
Old 02-16-2005, 08:21 AM
ShadowWolf's Avatar
ShadowWolf ShadowWolf is offline
Member
 
Join Date: Apr 2004
Posts: 159
ShadowWolf is on a distinguished road
Default Re: Illuminanti

Amen!
__________________
ShadowWolf
**************************************************
A seeker who asks a question is ignorant -- for a moment.
The seeker who fails to ask the question is ignorant -- forever.
Reply With Quote
  #89  
Old 02-26-2005, 12:27 PM
rhermen's Avatar
rhermen rhermen is offline
Subscribed Member
 
Join Date: Jun 2004
Posts: 300
rhermen is on a distinguished road
Default Re: Illuminanti

Wow, I've been looking at the Silent Weapons for Quiet Wars at

http://users.gloryroad.net/~bigjim/silent_2.shtml website, and I don't know wether to be angry or afraid as so much of this "document" seems all to true...

May Father help us as these things are bound to become revealed sooner or later.

Quote:

Silent weapon technology has evolved from Operations Research (O.R.), a strategic and tactical methodology developed under the Military Management in England during World War II. The original purpose of Operations Research was to study the strategic and tactical problems of air and land defense with the objective of effective use of limited military resources against foreign enemies (i.e., logistics).
It was soon recognized by those in positions of power that the same methods might be useful for totally controlling a society. But better tools were necessary.


Quote:


Although the so-called "moral issues" were raised, in view of the law of natural selection it was agreed that a nation or world of people who will not use their intelligence are no better than animals who do not have intelligence. Such people are beasts of burden and steaks on the table by choice and consent.

Consequently, in the interest of future world order, peace, and tranquillity, it was decided to privately wage a quiet war against the American public with an ultimate objective of permanently shifting the natural and social energy (wealth) of the undisciplined and irresponsible many into the hands of the self-disciplined, responsible, and worthy few.



Quote:


The public cannot comprehend this weapon, and therefore cannot believe that they are being attacked and subdued by a weapon.

The public might instinctively feel that something is wrong, but that is because of the technical nature of the silent weapon, they cannot express their feeling in a rational way, or handle the problem with intelligence. Therefore, they do not know how to cry for help, and do not know how to associate with others to defend themselves against it.

When a silent weapon is applied gradually, the public adjusts/adapts to its presence and learns to tolerate its encroachment on their lives until the pressure (psychological via economic) becomes too great and they crack up.

Therefore, the silent weapon is a type of biological warfare. It attacks the vitality, options, and mobility of the individuals of a society by knowing, understanding, manipulating, and attacking their sources of natural and social energy, and their physical, mental, and emotional strengths and weaknesses.



Give me control over a nation's currency, and I care not who makes its laws. -- Mayer Amschel Rothschild, 1743 - 1812)



__________________
If you embrace the truth, the Truth will Embrace You!
Reply With Quote
  #90  
Old 02-26-2005, 12:53 PM
ShadowWolf's Avatar
ShadowWolf ShadowWolf is offline
Member
 
Join Date: Apr 2004
Posts: 159
ShadowWolf is on a distinguished road
Default Re: Illuminanti

I agree kind of scary ha?
__________________
ShadowWolf
**************************************************
A seeker who asks a question is ignorant -- for a moment.
The seeker who fails to ask the question is ignorant -- forever.
Reply With Quote
Reply


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is On


All times are GMT -6. The time now is 05:49 AM.


Powered by vBulletin Version 3.6.0
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
© The URANTIA BOARD 2004-2014 - All Rights Reserved - Hosted by The Shade Tree Network