Glossary of how basic terms are used in this book introduction


Download 4.84 Kb.
View original pdf
Size4.84 Kb.
1   ...   153   154   155   156   157   158   159   160   ...   276
Tyson II Corporate Offices, McLean, VA furnishes polygraph operators for the intelligence agencies, esp.
Office of Security which is responsible for CIA polygraph examinations.
E3. ATTACKS on INDIVIDUALS and objects.
A victim of electronic mind-control in VA in a letter describing her torment writes, "I no longer have the stabbing pain in my back when I go in my back yard, as I did in Richmond; however, the pain from some type of directed energy weapon(s) is just as severe here as it was in Richmond. These electrical rays coming through the airways of my home cause me all kinds of physical pain and illnesses. They kill my house-plants; they kill my shrubs; they kill my vegetables and flowers in my garden; and most of all, they cause me tremendous amount of discomfort, as well as harassment. "Can you imagine having electrical rays directed at your bottom day and night, 365 days of the year. Can you imagine what it must be like to live around oversexed
SCUM?...This technology is based on Scalar Technology and the Schumann Resonances or Frequencies. It is my understanding that the Schu-mann Frequencies from 0 to 30 hertz can affect every nerve, every gland, every muscle and every emotion of a human being. In other words, a person in my neighborhood can beam these rays into my home and control my body and I am having to suffer from their stupid appetites..." (letter in author’s files) Oscilloscopes have confirmed that some Direct ELF/VLF attacks have come from only a few feet.
Electromagnetic attacks sometimes hit the victims entire body, like defibrillator paddles. Masers (microwave equivalents to a laser are used for electromagnetic attacks that cause burns that look like "cigarette burns", favorite target areas are genitals, face and nose. The average power density can be at an rf such as 400_u_w/cm².
Let’s quote another victim, whose letter is also in my files. At first years ago, they began using waves that were in the infrared spectrum that were barely discernable. The waves would target her and then latch on. Over the years they have gotten more sophisticated and more sadistic. She writes, "From time to time the field broadcast from my own head was in a ‘field’ about me, but, with the added feature of ‘harrassment’ voices also being broad-cast. These ‘harassment’ voices had taken a downright filthy tone, being blasphemous words, and venally oriented.... Before I was hit with the full-blown sadistic torture program I was awakened one night by a feeling of my head being raped. A light went on in my brain and I heard voices discussing me and cruelly laughing saying, "There, got her.".. .The first added torture (accompanied by filty langauge, the language is all filth, obscenities, threats and intimidation) was a genital-urinary prod, pulsing about twice per second, and causing nearly incessant urination..., new added features ... are body bangs and head bangs.. .The arrogance with which they announce what torture will be next is unbelievable... .Other sleep deprivation techniques are loud noises, and the interposing of visual phenomena. They seem to have devised a computer imaging which taps the visual nerves--these are like bad dreams. I have had almost no normal dreaming since this system was locked onto me.
Over the years she got to understand her harassers better. They have called themselves "social workers" and referred to her as "the package." They have enjoyed talking about her in front of her, and harassing her by talking to each other in public about the things she thought about the previous night. Finally, one more account of a victim who is constantly harassed. "I am being tortured with synthetic telepathy of emotive and voice bytes played over and over again in my brain to positively or negatively reinforce and ultimately con-trol my behavior. I get the sound on my left temporal lobe and in the right and left ear canals. I also get microwaved when I sleep and have vibratory pulsating fields on my lower spine, genitals, stomach, brain, feet or wherever. It is always in combination with the lower spine and something else. This seems to create an amnesiacal deep sleep with no feeling of pain. If I wake up suddenly (and this is the only chance I have of finding out what they are doing to me) I sometimes feel pain when the vibrations stop."
Page 172 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler

Other attacks/problems:
• Infra-sound attack
• magnets repelled from the cranium
• They use a "Gun" which sends an electromagnetic field which stops a car.
The Russians have been noted to have created a "wood-pecker" signal, the American version of this is the
American Buzzsaw. These signals are designed to interface with the mind. And systems are designed to be carried in helicopters, or to be placed on the ground. These signals are broadcast by multiple carriers which hop from frequency to frequency anywhere from 4 MHz to 30 MHz. With the switching of these frequencies, they are creating what is know as a Levinson Transform, named after Norman Levinson. VLF (Very low frequency waves) will cause bizarre behavior in people. (They use 0 to 400 Khz for mind-control operations. The signals are apparently broken up into pieces and triangulated upon a target. Morse codes are used on some slaves to trigger them, which is sent via a number of methods. Victims often have the myelin sheathing of the brain disappearing, which is diagnosed as Multiple Sclerosis. MS has increased 100 fold over the past few years. Pre- conditioning is done by chemicals to the neuro-receptors in the brain and spine. When moving in a car or inside a store it is harder for a victim to be targeted. Also, as readers can imagine, signals being beamed from some tower or satellite will be blocked by large thicknesses of concrete, lead and -steel. In other words, there are some situations that provide limited shelter to the victims of implant body suits and syntel.
There is a complex symbiosis between mankind and the attributes of this planet. We are a life-form whose life is attuned to our environment. The human body at the cellular level has its physiological rhythms which are very attuned to the earth’s electric and magnetic fields. When cosmic radiation cycles undergo unusual modifications, including cycle inversions, the metabolism in crabs and the oxygen consumption cycles in carrots, potatoes - shellfish and rats changes. The geomagnetic field helps protect us from cosmic rays. It has been shown that solar flares influence human behavior, and psych wards have an increase in problem behavior during solar flares. The human body is a complex set of rhythms. Permit me to recall some of these rhythms for the reader: Alpha rhythms, Blood Hormone rhythms, Body temperature rhythms (which fluctuate 3º on 24 hour cycle), Cell mitosis rhythms, Cellular DNA & RNA synthesizing rhythms, Cerebral-spinal fluid rhythms, Circadian rhythms, Enzyme rhythms, Food utilization rhythms, Menstrual & Sexual -rhythms, Pulse rates, Seasonal rhythms, and Urine Electrolyte Disposal rhythms. The 60-pulse-per-second power grids (of AC) that are spread over the earth, as well as numerous other man-made activities are disrupting the 7-8 hertz frequency of the earth.
There are some side-effects to our tampering with the magnetic and electrical fields of this planet, and some of these side effects may be the disruption or change of the circadian -rhythms (as well as some of the other rhythms of the human body and mind.) In fact, two researchers have research that shows how human nerve cells are affected by ELF fields. (See Becker, Dr. Robert O. Cross-Currents: The Perils of Electropollution, The
Promise of Electromedicene. LA: Jeremy Tarcher, 1990, p. 233.) It was discovered by CIT researchers that the human brain has magnetite. Salmon, homing pigeons, whales, and honeybees also have magnetite, a type crystalline iron, which allows them to sense the earth’s magnetic field for finding their way around. The CIT researchers published their finding about mag-netite in human brains in the journal Proceedings of the National
Academy of Sciences.

Deeper insights into the illuminati formula by fritz
Chapter 4. science no. 4 - hypnosis
Chapter 5: science no. 5 - the skill of lying, the art of deceit
Chapter 6: science no. 6-the use of electronics & electricity
Chapter 11: science no. 11- internal controls
Appendix 1 - programmers/researchers
Section c. the four types of "clones" that are used by the illuminati,
Warning, read this first before reading the book.
Introduction by fritz
Glossary of how basic terms are used in this book
Chapter 1. science no. 1 - selection & preparation of the victim
Breeding good subjects for hypnosis-hypnosis as it relates to selection & preparation of the
Training the unborn child
Common illuminati work with twins
Selection of adult candidates for mind-control
U.s. govt. mind-control level 1.
U.s. govt. mind-control level 2.
U.s. govt. mind-control level 3.
U.s. govt. mind-control level 5
Testing young children to plan the programming.
Chapter no. 2--the traumatization & torture of the victim
Daily abuse works best for programming
Anger-management-programming traumas
Silence programming traumas to teach silence
Torture for no-write
A trauma to develop animal alters
Trauma to isolate the victim
Chapter 3. science no. 3 the use of drugs
Administration of drugs for programming
More programming drugs (these were not listed in the vol.2 formula book)
Stabilizing the programming
Extensive research done to influence human memory by drugs
The basic phases of memory
Hiding the codes
Programming with lsd-25 (lysergic acid diethylamide)
Chemically triggering natural instinctual drives
Sexual stimulation-programming
Understanding the basics about hypnosis
The power of hypnosis
Understanding the deeper mechanics of hypnosis
Programming aids
Using holograms as an access aid
Preparing the brain
Early training for slaves
Magical training on the starlight level
The monarch programming script for over the rainbow
Deep trance programming
Color programming
The association of colorful sights, sounds, rhythm & dance.
Light & color
Special colors
Healing by correct vibrations & rays
Using hypnosis to heal the slave after abuse.
Hypnotic codes, cues and triggers
Monarch mind-control codes
B. beta (sexual)
C. chi (return to cult)
E. epsilon (animal alters)
I. janus-alex call backs (end-times)
J.>> omicron programming
M. songs & nursery rhymes
O. sample codes for alters.
P. catholic programming (by jesuits etc.)
Q. mensa programming (by mensa)
S. scriptures used in programming (cont. from vol. 2. chap. 10)
T. alien programming
Program codes during 1972-1976 for dr. green
The illuminati.
The establishment, the system.
Deception diminishes power
Be wise as serpents
Disinformation to make their double-agents look good
Names of types of disinformation agents
Tricking suspects
The names of deception tricks
One of the greatest deceptions of all time: disney
Observations about how the illuminati like to hide behind perfect
Contents in the disney deception section of chapter 5.
B. an overview
C. who was walt disney?
Personal details
Occult porn king
As a witness before congress
A possible chronology of events surrounding walt disney's illegitimate birth
Walt disney’s character
D. who was roy o. disney?
E. who was roy b. disney?
The battle between the two disney factions
F. what do we know about the disney family in general?
G. a history of disney
Claude debussy
Some disney people of interest.
Warren beatty
Stephen bollenbach
The tommy dorsey band
Rich h. frank
The osmond brothers
Michael ovitz
Frank g. wells
Some of disney’s blatantly occult movies.
H. disney & its mob connections
Some mob history.
How the disney executives have figured out how to steal land all across the u.s.
Disney and the government
J. disney & mind control
Disney vacations for the elite
Disneyana for the programmed & obsessed.
Mind-control features in disney movies.
K. detailed script on how the disney film fantasia is used for programming
Types of sources
Section e. auxiliary uses of electronics & electromagnetic waves
Glossary of terms for understanding electronic mind control
B1. three typical implant victims
B2. documentation of implants.
B3. gwen towers
Section c. specific implants
Brief chronology of audio implants
Basics of how the implants can function
Uses of the implants
Part. b. secretly implanted audio implants.
Cochlear implants
C2. body manipulating implants
C3. visual/holographic implants
How they work
Typesfiber optics
Artificial lenses
Holographic or h-insert
C4. memex/brain link implants
Interface devices
Organic bioprocessors linked to viruses
C5. torture/nerve & muscle stimulation implants
C6. tracking & i.d. implants
Section d. direct monitoring & manipulation of the brain/mind
Tesla waves used to read minds & implant voices
D2. voices / or thoughts sent electronically directly into the mind
Summary of elf wave mind control capabilities
Section e. auxiliary uses of electronics & electromagnetic waves.
Liquid crystals
Bed coils standardized for mind-control potential
E4. virtual reality.
Chapter 7: the science of structuring
A. structuring of mpd worlds
Control alters called processors
The ferris-wheel subsystem
Data entry points
Testing alters to see if they can be used.
Assassination models (delta models).
Authority factors are maximized
Monkey alters.
Presidential models.
Prostitute models.
Reporting alters.
Repunzel alter.
Internal wall alters.
Structuring with the grand druid council.
Structuring the shadow alters
Structuring in the mirrors
Structuring the tapestry
Chapter 8: the science of body manipulation & programming
A. cranial manipulation
Cranial blood pressure has been kept a secret
Cerebral spinal fluid kept secret
The chinese secret occult society connection
The ancient egyptian connection
Another example
The japanese connection
The early european occult connection
Nineteenth century occult connection
The witchcraft connection
The modern american occult connection
Osteopathy and chiropractic
Bone & skull structure
Cerebrospinal fluid
Transcendental meditation (tm) & the hindu connection
The 3-in-one school connection.
B. genetic engineering
What we’ve covered
Chapter 9: the science of mind manipulation by psychological
Programming to hide revealing dreams
Programming language
Effects of programming
Perception clouds memory
Chapter 10: the 10th science — using spiritual things to control a
Part a. intro on the importance of spiritual programming tactics
Part b. the history of the programmed golem
Part c. the 3 foundations: loss of identity, fear, and demons
Understanding the relationship between fear & demons
Demon possession & spirit guards
The use of giving demonic assistance to entrap.
The use of occult focal points.
Does it glorify demons to cast them out?
Part d. a complete chronology of how the victim experiences the early spiritual
Part e. specific programming maneuvers. the manipulation of near-death-
Hiding the internal self-helper
Interject disks
White gold, other information
B. internal computers
Installation of the standard programming.
Front programs of front computer.
Programmer access to the computer areas.
C. internal hierarchies
The internal hierarchies form rationales
Chapter 12 science no. 12-external controls
Asset control
Building families and communities that have interwoven programming
Boarding schools & body programming.
When controls fail, the final solution.
Dirty psychiatrists involved with mind control
Dirty tavistock controllers
Remote viewing mind-research
List of programmers (continuation from the list given in vol. 2)
What to look for.
Michael aquino, a military/cult mind-control programmer
Personal history.
Understanding the church of set
Understanding some of aquino’s programming.
Sequelae of abuse
Appendix b. the programming sites
Appendix 3. clones, synthetics, organic robotoids and doubles
Summary of the four methods.
Section a. the "future shock" that this topic subjects the common person to.
Section b. instructions on how to clone a person.
A technique--instructions how to clone a human:
Section c. the four types of ‘clones’ that are used by the illuminati:
C3. organic robotoids.
How the memory of a person is transferred for the organic robotoids.
C4. doubles (look alikes).
Section d. secret cloning sites (see also appendix b, where d.u.m. bases are listed.)
Oregon’s underground secret cloning facility
Further investigations at dulce’s underground cloning facility

Share with your friends:
1   ...   153   154   155   156   157   158   159   160   ...   276

The database is protected by copyright © 2017
send message

    Main page