Glossary of how basic terms are used in this book introduction


Download 4.84 Kb.
View original pdf
Size4.84 Kb.
1   ...   159   160   161   162   163   164   165   166   ...   276
Within the system of alters, certain alters are selected to be PROCESSORS. As a system is used certain alters are destroyed, disconnected, or regulated. Certain codes are used or changed. A SYSTEM PARAGUARD is what is used to decipher codes and to distinguish what is currently happening in a system.
Page 179 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler

Most Illuminati systems are configured with a Universe or Star base system. In other words, the model for all that is put in uses clusters of stars, galaxies, etc. This is used in conjunction with grids that are shaped in various configurations. The ultimate master of the slave, some Illuminati kingpin who is a programmer or working closely with programmers, will design the system so that the entire structure of the system points to himself and
Satan. The alters will be geographically set up in their internal world to worship the master to whom they must give their body, soul and spirit.
A cube or double-cube system is a closed system. The programmers who use cubes love to build boxes within boxes. The smallest middle box of the system may contain the Life force of the system. Those who love paper trails, will see the occult basis for the standard Illuminati cube shape of a system portrayed on page 83 of
Clausen Commentaries on Morals & Dogma, which was put out by the Supreme Council of the World of 33º of
Freemasonry in 1974. This Masonic book explains that the cube represent man and the pyramid is divinity.
Divinity within a man would be constructed by placing a pyramid within a cube, which is shown in a picture on page 83. You will also notice in this Masonic book that the 2 Grand Masters on page 83 are wearing crowns that have 13 jewels. The crowns serve the same purpose that rings patterned on a similar pattern represent. Crowns and rings represent authority, and it is common within the mystery religions to place 12 or 13 gems within crowns and rings. The reason that this is important, is that some important Masonic/Illuminati secrets are here, and these secrets also pertain to how the Mystery Religions (the Illum. & Freemasonry) construct an alter system.
Within the Illuminati (which is the continuation of the mystery religions of Babylon) the ring has for many centuries represented divinity. The mystery religions’ higher understanding was that God had a ring with his name on it that showed His authority and exercised power over the earth, and that Satan imitated this many-fold in all the mystery religions that he created. For thousands of years, within the various mystery religions, hierophants have been wearing rings with particular secret symbols. The zodiac signs were assigned different stones, gems. For instance, the 12 gems of Rev. 21:18-20, which are the usual gems placed within an Illuminati alter system would correspond to the astrological signs as follows:
Jasper «»Pisces Sapphire «»Aquarius Chalcedony «» Cancer Emerald «» Taurus Sardonyx «» Scorpio
Chrysolyte Saggittarius Beryl «» Leo Topaz «» Gemini Chrysoprasus «» Capricorn Jacinth «» Amethyst «»
The creation of a Monarch system’s gems is in imitation of the rings of Lucifer and God (as the Illuminati understand it). This ring of gems is able to control the fruit of the trees (programs) and change the internal weather. It is based upon the story that is told the alter system that is being made about how God had a ring.
Until His hand swept the heaven of air (1st heaven) fruit could not fall and die, because nothing could die.
Satan and his followers like rings because they want to be godlike. (That doesn’t mean all Satanists understand their own history.) When an alter is concerned about "Don’t lose the ring", the alter may be referring to the ring of the gems that surrounds the pyramid at the base of the mind. This ring of gem alters may be referred to as the
ETERNAL RING, and the RING OF FIRE. The achievement of divinity by a human was what constituted the hermetic marriage of the mysteries. This was the ultimate achievement by mankind. This was symbolized by a gold ring.
Within the Illuminati (which is a continuation of the Mystery Religions) rings are used for bonding (marriage commitments) and a sign of majesty or rank (such as your Masonic rings, and the ring Pharaoh gave Joseph, &
King Saul’s ring, & special papal rings allowed cardinals & abbots.) The Pope has 3 significant rings, one of which is for ceremonies, and another the important Fisherman’s Ring, which is still used as the Pope’s seal.
Within the Illuminati alter systems the 7 seals of Babylon are placed into a system. The cube with a pyramid was portrayed at the 14th Masonic Degree (the Perfect Elu degree). The 4 horsemen & the seals of Babylon are talked about at the 17th Masonic degree (Knight of the East & West). Also deep within a system may be the
Page 180 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler

Ring of Fire.
Within the pyramid, which is within the ring of those 12 gems mentioned in Rev. 21, is the ETERNAL LIFE
FORCE, a green light coming from Lucifer. In other words, the secret heart of the system is based upon the original lie, that man could become an eternal god. The Illuminati alter structure has at its heart the original lie.
An example of how rings and demonology and authority intersect, can be seen in the Grimoire of the Testament of Solomon where a ring is said to have been given to Solomon which enabled him to learn the names of demons.
Rings and chains around the neck are also worn for the extremely secret reason that the wearer is identifying himself with Lucifer who was bound by God by a ring of fire and was chained in the abyss. This is what is really behind high ranking Illuminati Freemason & clergyman Robert Schuler’s chain around his neck. The highest levels of the Illuminati have the understanding that Lucifer lost his power when Christ bound him, and that in identification with him, they wear gold chains around their neck, etc. Don’t expect to read this in the material that occult world is permitted to read, these are high level secrets. Remember, there are many different levels of occultism, and Satanism. (In the early middle ages, Christians borrowed the idea of having marriage rings from the pagan Germans & Romans. The determination of what finger to wear it on (what has become known as the ring finger), was chosen by the ancient witches because that was considered the only healing finger. Christians of course, by and large, know nothing of the pagan origins and symbology of the rings they wear.) This author has noted that many of the handlers, programmers, & Illuminati adepts wear rings. Some of the rings are quite big.

Deeper insights into the illuminati formula by fritz
Chapter 4. science no. 4 - hypnosis
Chapter 5: science no. 5 - the skill of lying, the art of deceit
Chapter 6: science no. 6-the use of electronics & electricity
Chapter 11: science no. 11- internal controls
Appendix 1 - programmers/researchers
Section c. the four types of "clones" that are used by the illuminati,
Warning, read this first before reading the book.
Introduction by fritz
Glossary of how basic terms are used in this book
Chapter 1. science no. 1 - selection & preparation of the victim
Breeding good subjects for hypnosis-hypnosis as it relates to selection & preparation of the
Training the unborn child
Common illuminati work with twins
Selection of adult candidates for mind-control
U.s. govt. mind-control level 1.
U.s. govt. mind-control level 2.
U.s. govt. mind-control level 3.
U.s. govt. mind-control level 5
Testing young children to plan the programming.
Chapter no. 2--the traumatization & torture of the victim
Daily abuse works best for programming
Anger-management-programming traumas
Silence programming traumas to teach silence
Torture for no-write
A trauma to develop animal alters
Trauma to isolate the victim
Chapter 3. science no. 3 the use of drugs
Administration of drugs for programming
More programming drugs (these were not listed in the vol.2 formula book)
Stabilizing the programming
Extensive research done to influence human memory by drugs
The basic phases of memory
Hiding the codes
Programming with lsd-25 (lysergic acid diethylamide)
Chemically triggering natural instinctual drives
Sexual stimulation-programming
Understanding the basics about hypnosis
The power of hypnosis
Understanding the deeper mechanics of hypnosis
Programming aids
Using holograms as an access aid
Preparing the brain
Early training for slaves
Magical training on the starlight level
The monarch programming script for over the rainbow
Deep trance programming
Color programming
The association of colorful sights, sounds, rhythm & dance.
Light & color
Special colors
Healing by correct vibrations & rays
Using hypnosis to heal the slave after abuse.
Hypnotic codes, cues and triggers
Monarch mind-control codes
B. beta (sexual)
C. chi (return to cult)
E. epsilon (animal alters)
I. janus-alex call backs (end-times)
J.>> omicron programming
M. songs & nursery rhymes
O. sample codes for alters.
P. catholic programming (by jesuits etc.)
Q. mensa programming (by mensa)
S. scriptures used in programming (cont. from vol. 2. chap. 10)
T. alien programming
Program codes during 1972-1976 for dr. green
The illuminati.
The establishment, the system.
Deception diminishes power
Be wise as serpents
Disinformation to make their double-agents look good
Names of types of disinformation agents
Tricking suspects
The names of deception tricks
One of the greatest deceptions of all time: disney
Observations about how the illuminati like to hide behind perfect
Contents in the disney deception section of chapter 5.
B. an overview
C. who was walt disney?
Personal details
Occult porn king
As a witness before congress
A possible chronology of events surrounding walt disney's illegitimate birth
Walt disney’s character
D. who was roy o. disney?
E. who was roy b. disney?
The battle between the two disney factions
F. what do we know about the disney family in general?
G. a history of disney
Claude debussy
Some disney people of interest.
Warren beatty
Stephen bollenbach
The tommy dorsey band
Rich h. frank
The osmond brothers
Michael ovitz
Frank g. wells
Some of disney’s blatantly occult movies.
H. disney & its mob connections
Some mob history.
How the disney executives have figured out how to steal land all across the u.s.
Disney and the government
J. disney & mind control
Disney vacations for the elite
Disneyana for the programmed & obsessed.
Mind-control features in disney movies.
K. detailed script on how the disney film fantasia is used for programming
Types of sources
Section e. auxiliary uses of electronics & electromagnetic waves
Glossary of terms for understanding electronic mind control
B1. three typical implant victims
B2. documentation of implants.
B3. gwen towers
Section c. specific implants
Brief chronology of audio implants
Basics of how the implants can function
Uses of the implants
Part. b. secretly implanted audio implants.
Cochlear implants
C2. body manipulating implants
C3. visual/holographic implants
How they work
Typesfiber optics
Artificial lenses
Holographic or h-insert
C4. memex/brain link implants
Interface devices
Organic bioprocessors linked to viruses
C5. torture/nerve & muscle stimulation implants
C6. tracking & i.d. implants
Section d. direct monitoring & manipulation of the brain/mind
Tesla waves used to read minds & implant voices
D2. voices / or thoughts sent electronically directly into the mind
Summary of elf wave mind control capabilities
Section e. auxiliary uses of electronics & electromagnetic waves.
E2. polygraphs for monitoring programming and mission accomplishments
Liquid crystals
Bed coils standardized for mind-control potential
E4. virtual reality.
Chapter 7: the science of structuring
A. structuring of mpd worlds
The ferris-wheel subsystem
Data entry points
Testing alters to see if they can be used.
Assassination models (delta models).
Authority factors are maximized
Monkey alters.
Presidential models.
Prostitute models.
Reporting alters.
Repunzel alter.
Internal wall alters.
Structuring with the grand druid council.
Structuring the shadow alters
Structuring in the mirrors
Structuring the tapestry
Chapter 8: the science of body manipulation & programming
A. cranial manipulation
Cranial blood pressure has been kept a secret
Cerebral spinal fluid kept secret
The chinese secret occult society connection
The ancient egyptian connection
Another example
The japanese connection
The early european occult connection
Nineteenth century occult connection
The witchcraft connection
The modern american occult connection
Osteopathy and chiropractic
Bone & skull structure
Cerebrospinal fluid
Transcendental meditation (tm) & the hindu connection
The 3-in-one school connection.
B. genetic engineering
What we’ve covered
Chapter 9: the science of mind manipulation by psychological
Programming to hide revealing dreams
Programming language
Effects of programming
Perception clouds memory
Chapter 10: the 10th science — using spiritual things to control a
Part a. intro on the importance of spiritual programming tactics
Part b. the history of the programmed golem
Part c. the 3 foundations: loss of identity, fear, and demons
Understanding the relationship between fear & demons
Demon possession & spirit guards
The use of giving demonic assistance to entrap.
The use of occult focal points.
Does it glorify demons to cast them out?
Part d. a complete chronology of how the victim experiences the early spiritual
Part e. specific programming maneuvers. the manipulation of near-death-
Hiding the internal self-helper
Interject disks
White gold, other information
B. internal computers
Installation of the standard programming.
Front programs of front computer.
Programmer access to the computer areas.
C. internal hierarchies
The internal hierarchies form rationales
Chapter 12 science no. 12-external controls
Asset control
Building families and communities that have interwoven programming
Boarding schools & body programming.
When controls fail, the final solution.
Dirty psychiatrists involved with mind control
Dirty tavistock controllers
Remote viewing mind-research
List of programmers (continuation from the list given in vol. 2)
What to look for.
Michael aquino, a military/cult mind-control programmer
Personal history.
Understanding the church of set
Understanding some of aquino’s programming.
Sequelae of abuse
Appendix b. the programming sites
Appendix 3. clones, synthetics, organic robotoids and doubles
Summary of the four methods.
Section a. the "future shock" that this topic subjects the common person to.
Section b. instructions on how to clone a person.
A technique--instructions how to clone a human:
Section c. the four types of ‘clones’ that are used by the illuminati:
C3. organic robotoids.
How the memory of a person is transferred for the organic robotoids.
C4. doubles (look alikes).
Section d. secret cloning sites (see also appendix b, where d.u.m. bases are listed.)
Oregon’s underground secret cloning facility
Further investigations at dulce’s underground cloning facility

Share with your friends:
1   ...   159   160   161   162   163   164   165   166   ...   276

The database is protected by copyright © 2017
send message

    Main page