Glossary of how basic terms are used in this book introduction


GLOSSARY OF HOW BASIC TERMS ARE USED IN THIS BOOK



Download 4.84 Kb.
View original pdf
Page14/276
Date07.11.2018
Size4.84 Kb.
1   ...   10   11   12   13   14   15   16   17   ...   276
GLOSSARY OF HOW BASIC TERMS ARE USED IN THIS BOOK
For those readers who are not familiar with these basic terms let us introduce you to the definitions under which this book uses them.
Alter-Our usage is trying to follow the programmers usage of this word. A dissociated part of the mind which has a seperate identity and is given cue codes by the mind-control programmers to trigger that dissociated part of the mind to come to the front of the mind. The alter’s identity may be a gem, rock, a tape recorder, a poodle, a white kitten, a dove, a horse, or even think of itself as a person or a demon. It all depends on its programming.
An alter is different from an alter fragment in that the alter fragment is a dissociated part of the mind which serves only a single purpose. The programmers will give an alter a history, and insure that shadow alters will provide a full range of accessible emotions. Sometimes the distinctions between alters and alter fragments is vague, but examples from the two ends of the spectrum are easy to tell apart. We use the word alter in this book to conform to what the programmers’ charts are encoding as alters. A typical main Mengele-created grid would be a grid of 13x13 principal A-coded alters, which is 169 principle alter personalities. In Illuminati systems, ceremonial "alters will consist of 3 alters placed on a spinning pedistal together into triad goddesses or gods.
That means that an A-coded alter on some levels is actually 3 alters spinning together, which must be locked in place to communicate with, and then rotated to communicate to the other two.
Beta--This is the second Greek letter, and it represents the sexual models and sexual alters that the Programmers are creating. The primitive part of the brain is involved in this type of programming. An early sexual abuse event will be used to anchor this programming. These sexual slaves will develop sexual abilities that are far beyond what the public is aware is even possible. They also receive the worst kind of abuse far beyond what most people’s imagination can picture. Beta alters generally see themselves as cats.
Page 12 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler
3/1/2007
http://www.whale.to/b/sp/springmeier.html


Councils (llluminati)--The Illuminati has frequent meetings. Some of these meetings are organized to appear "acephalous" and "accidential" in their meetings, when in reality they are structured and planned. One group,
MJ-12 has gone by the following names: the Group, the Special Study Group, the Wise Men, the Operations
Coordinating Board (OCB), 5412 Committee, 303 Committee, 40 Committee, PI-40 Committee, and Policy
Planning Group (PCG). Some of the formal policy and ritual groups have names that all Illuminati members who have gotten high enough to learn, will recognize:
The Council of 3, Council of 5, Council of 7, Council of 9, The Grand Druid Council, The Committee of 300, and the Committee of 500 (known as Fortune 500). Many of the meetings are conclaves without formal names.
The Grand Druid Council is not something fictional, but an actual body of people who formally meet and whose membership, we have been trying to keep track of. The groups which make decisions to control this planet are networked together. Each decision has its own origin and route that it takes.
Delta--This is a Greek letter shaped like a triangle which symbolizes change in calculus. It has become a favorite word to use in naming things for the occult elite. Delta teams are 4 person assassination teams which usually are secret teams. Delta Forces is an elite unit that operates under the Joint chiefs of staff that is made up of highly trained total mind-controlled slaves. Delta models are slaves whose sole purpose is assassination.
Delta alters are alters within an Illuminati alter system which are programmed to be assassins. These alters are often some of the deepest in a system and in a Genie bottle or with Umbrella programming.
Deliverance ministry-(This book is about HOW the mind-control is done, it is not a textbook on solutions.) The use of the term deliverance ministry in this book connotates any person(s) who via faith in God is able to pray for divine help in a fashion that a victim is helped from demonic activity. A deliverance ministry is a natural outgrowth of a life in harmony and fellowship with Yahweh God. However, this is not to be confused with
Exorcism of the traditional Catholic or witchcraft nature in which certain spells and incantations are used in a prescribed method. "Deliverance" connotates divinely inspired faith, exorcism involves ritual. A deliverance ministry might perhaps teach a person about forgiveness, or how they can renounce an oath, or how to apply
Jesus Christ’s atoning blood to their life. In this fashion, the person finds deliverance through biblical spiritual principles rather than the efficacy of some ritual or hocus pocus spell. This book is in no way meant as a blanket endorsement of every spiritual warfare tactic. If anything, this book suggests that ministers learn more about mind-control, as well as grow stronger in their walk with Almighty God.
Illuminati--The Illuminati are 13 elite bloodlines which have manuevered themselves into control over this planet. They lead double lives, one for society and a hidden one which is based on a gnostic luciferian philosophy which consists of lots of blood rituals.
Monarch Programming--This was a specific Project carried out by secret elements of the U.S. government and intelligence groups. There were, according to someone a few years ago who had access to the computer(s) which contains all the names of active monitored human slaves, 40,000 actively monitored Monarch slaves.
However, this book uses the term generically to include all victims who have suffered this type of trauma-based mind-control. In the same way, that a brand name like "Hyster" is used to describe all lifts--when we use the term we use it in its broadest sense. This is the only way it can be used and technically correct, because as of this date, the authors have not seen who is on the active Monarch Program list of slaves.
System-- This term is used in several ways. It is frequently used to refer to a victim of total mind control because the victim consists of alters, programming, implant(s), internal computers, and numerous dissociative states which function together as a system. The word is also used in this book to refer to the body’s functional physiological units, such as the respiratory system. The word is also infrequently used to denote the established social-economic-political system controlling the world, also known insiders as the Network. Other standard meaning may also occasionally be used for the word.
Multiple Personality (DID)--Multiple personalities or MPD or Dissociative Identity Disorder is the situation where different dissociative parts of a single brain view themselves as separate persons. The DSM-IIIR definition of MPD is the guideline for determining MPD for this book.
Page 13 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler
3/1/2007
http://www.whale.to/b/sp/springmeier.html


New World Order-- The New World Order is the global design for a One-World-Government One-World-
Dictator and its constituents. Insiders call themselves the "network" and "the neighborhood".
Satanic Ritual Abuse (SRA)--This is used to represent all categories of ritual abuse which would be inspired by the desire to rob, kill, or destroy something worthwhile in a person, especially their freedom of thought. Many groups carrying out SRA do not mention Satan by that name. They may make Pacts to Baphomet, and call upon
Rex Mundi, or Belair, or Lucifer, or the Father of Light, God, or Kali or even "Jesus" or "Jesus Christ" (there are demons which call themselves "Jesus", who are not to be confused with Yeshua or Yehoshua ben Joseph who is known as Jesus Christ of Nazareth.) SRA is not a value judgement by the authors against some group, the victims themselves on some level know that he or she is being abused.
Switching--This is when one part (fragment) of the mind takes over from another, or in simple terms, this is when one alter personality (or alter fragment) takes the body from the alter which is holding the body.
Switching can occur via the Programmers’ codes for calling up alters, or by external or internal stimuli that trigger an alter to come out. Switching will usually cause at least a flicker of the eyes, and for outside observers, who know the different personalities, they will observe another personality take the body.
Page 14 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler
3/1/2007
http://www.whale.to/b/sp/springmeier.html


Pic p_cranial2.jpg pic p_basic-structure1.jpg
Page 15 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler
3/1/2007
http://www.whale.to/b/sp/springmeier.html


Pic p_records2.jpg
Page 16 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler
3/1/2007
http://www.whale.to/b/sp/springmeier.html




Deeper insights into the illuminati formula by fritz
Chapter 4. science no. 4 - hypnosis
Chapter 5: science no. 5 - the skill of lying, the art of deceit
Chapter 6: science no. 6-the use of electronics & electricity
Chapter 11: science no. 11- internal controls
Appendix 1 - programmers/researchers
Section c. the four types of "clones" that are used by the illuminati,
Warning, read this first before reading the book.
Introduction by fritz
Chapter 1. science no. 1 - selection & preparation of the victim
Breeding good subjects for hypnosis-hypnosis as it relates to selection & preparation of the
Training the unborn child
Common illuminati work with twins
Selection of adult candidates for mind-control
U.s. govt. mind-control level 1.
U.s. govt. mind-control level 2.
U.s. govt. mind-control level 3.
U.s. govt. mind-control level 5
Testing young children to plan the programming.
Chapter 2.science no. 2--the traumatization & torture of the victim
Daily abuse works best for programming
Anger-management-programming traumas
Silence programming traumas to teach silence
Torture for no-write
A trauma to develop animal alters
Trauma to isolate the victim
Chapter 3. science no. 3 the use of drugs
Administration of drugs for programming
More programming drugs (these were not listed in the vol.2 formula book)
Stabilizing the programming
Extensive research done to influence human memory by drugs
The basic phases of memory
Hiding the codes
Programming with lsd-25 (lysergic acid diethylamide)
Chemically triggering natural instinctual drives
Sexual stimulation-programming
Understanding the basics about hypnosis
The power of hypnosis
Understanding the deeper mechanics of hypnosis
Programming aids
Using holograms as an access aid
Preparing the brain
Early training for slaves
Magical training on the starlight level
The monarch programming script for over the rainbow
Deep trance programming
Color programming
The association of colorful sights, sounds, rhythm & dance.
Light & color
Special colors
Healing by correct vibrations & rays
Using hypnosis to heal the slave after abuse.
Hypnotic codes, cues and triggers
Monarch mind-control codes
B. beta (sexual)
C. chi (return to cult)
E. epsilon (animal alters)
I. janus-alex call backs (end-times)
J.>> omicron programming
M. songs & nursery rhymes
O. sample codes for alters.
P. catholic programming (by jesuits etc.)
Q. mensa programming (by mensa)
S. scriptures used in programming (cont. from vol. 2. chap. 10)
T. alien programming
Program codes during 1972-1976 for dr. green
The illuminati.
The establishment, the system.
Deception diminishes power
Be wise as serpents
Disinformation to make their double-agents look good
Names of types of disinformation agents
Tricking suspects
The names of deception tricks
One of the greatest deceptions of all time: disney
Observations about how the illuminati like to hide behind perfect
Contents in the disney deception section of chapter 5.
B. an overview
C. who was walt disney?
Personal details
Occult porn king
As a witness before congress
A possible chronology of events surrounding walt disney's illegitimate birth
Walt disney’s character
D. who was roy o. disney?
E. who was roy b. disney?
The battle between the two disney factions
F. what do we know about the disney family in general?
G. a history of disney
Claude debussy
Some disney people of interest.
Warren beatty
Stephen bollenbach
The tommy dorsey band
Rich h. frank
The osmond brothers
Michael ovitz
Frank g. wells
Some of disney’s blatantly occult movies.
H. disney & its mob connections
Some mob history.
How the disney executives have figured out how to steal land all across the u.s.
Disney and the government
J. disney & mind control
Disney vacations for the elite
Disneyana for the programmed & obsessed.
Mind-control features in disney movies.
K. detailed script on how the disney film fantasia is used for programming
Types of sources
Section e. auxiliary uses of electronics & electromagnetic waves
Glossary of terms for understanding electronic mind control
B1. three typical implant victims
B2. documentation of implants.
B3. gwen towers
Section c. specific implants
Brief chronology of audio implants
Basics of how the implants can function
Uses of the implants
Part. b. secretly implanted audio implants.
Cochlear implants
C2. body manipulating implants
C3. visual/holographic implants
How they work
Typesfiber optics
Artificial lenses
Holographic or h-insert
C4. memex/brain link implants
Interface devices
Organic bioprocessors linked to viruses
C5. torture/nerve & muscle stimulation implants
C6. tracking & i.d. implants
Section d. direct monitoring & manipulation of the brain/mind
Tesla waves used to read minds & implant voices
D2. voices / or thoughts sent electronically directly into the mind
Summary of elf wave mind control capabilities
Section e. auxiliary uses of electronics & electromagnetic waves.
E2. polygraphs for monitoring programming and mission accomplishments
Liquid crystals
Bed coils standardized for mind-control potential
E4. virtual reality.
Chapter 7: the science of structuring
A. structuring of mpd worlds
Control alters called processors
The ferris-wheel subsystem
Data entry points
Testing alters to see if they can be used.
Assassination models (delta models).
Authority factors are maximized
Monkey alters.
Presidential models.
Prostitute models.
Reporting alters.
Repunzel alter.
Internal wall alters.
Structuring with the grand druid council.
Structuring the shadow alters
Structuring in the mirrors
Structuring the tapestry
Chapter 8: the science of body manipulation & programming
A. cranial manipulation
Cranial blood pressure has been kept a secret
Cerebral spinal fluid kept secret
The chinese secret occult society connection
The ancient egyptian connection
Another example
The japanese connection
The early european occult connection
Nineteenth century occult connection
The witchcraft connection
The modern american occult connection
Osteopathy and chiropractic
Bone & skull structure
Cerebrospinal fluid
Transcendental meditation (tm) & the hindu connection
The 3-in-one school connection.
B. genetic engineering
What we’ve covered
Chapter 9: the science of mind manipulation by psychological
Programming to hide revealing dreams
Programming language
Effects of programming
Perception clouds memory
Chapter 10: the 10th science — using spiritual things to control a
Part a. intro on the importance of spiritual programming tactics
Part b. the history of the programmed golem
Part c. the 3 foundations: loss of identity, fear, and demons
Understanding the relationship between fear & demons
Demon possession & spirit guards
The use of giving demonic assistance to entrap.
The use of occult focal points.
Does it glorify demons to cast them out?
Part d. a complete chronology of how the victim experiences the early spiritual
Part e. specific programming maneuvers. the manipulation of near-death-
Hiding the internal self-helper
Interject disks
White gold, other information
B. internal computers
Installation of the standard programming.
Front programs of front computer.
Programmer access to the computer areas.
C. internal hierarchies
The internal hierarchies form rationales
Chapter 12 science no. 12-external controls
Asset control
Building families and communities that have interwoven programming
Boarding schools & body programming.
When controls fail, the final solution.
Dirty psychiatrists involved with mind control
Dirty tavistock controllers
Remote viewing mind-research
List of programmers (continuation from the list given in vol. 2)
What to look for.
Michael aquino, a military/cult mind-control programmer
Personal history.
Understanding the church of set
Understanding some of aquino’s programming.
Sequelae of abuse
Appendix b. the programming sites
Appendix 3. clones, synthetics, organic robotoids and doubles
Summary of the four methods.
Section a. the "future shock" that this topic subjects the common person to.
Section b. instructions on how to clone a person.
A technique--instructions how to clone a human:
Section c. the four types of ‘clones’ that are used by the illuminati:
C3. organic robotoids.
How the memory of a person is transferred for the organic robotoids.
C4. doubles (look alikes).
Section d. secret cloning sites (see also appendix b, where d.u.m. bases are listed.)
Oregon’s underground secret cloning facility
Further investigations at dulce’s underground cloning facility


Share with your friends:
1   ...   10   11   12   13   14   15   16   17   ...   276


The database is protected by copyright ©userg.info 2017
send message

    Main page

bosch
camera
chevrolet
epson
fiat
Honda
iphone
mitsubishi
nissan
Panasonic
Sony
volvo
yamaha