Glossary of how basic terms are used in this book introduction



Download 4.84 Kb.
View original pdf
Page174/276
Date07.11.2018
Size4.84 Kb.
1   ...   170   171   172   173   174   175   176   177   ...   276
Reporting Alters.
The construction of reporting alters is very straightforward behavior modification. For programming reporting alters, they use purpose fragment splits. In other words, these reporting alters are not given the full range and exposure to life, but they experience life from the vantage of their single purpose. Some therapists are reporting that they are converting reporting alters over by giving them ice cream. They are most likely only dealing with fronts. Since most therapists only deal with front alters, and front systems, these front reporting alters may even be set up so that these therapists think they have converted the reporting alters. The truth is that most of these reporting alters are fragments that don’t know what hunger is. All the ice cream in the world is going to mean anything to them. (Cisco will deal with these issues in her part of this book.) The point is simply, these are special purpose fragments who only see life from the vantage point of their little job.
Now we will explain what first and second stage reporting alters are, and then how they are created. Some of the first stage reporting alters are trained to respond to 3-taps, some to telephone calls, lights, and some to codes.
The first stage alters are children from 6 to 10. In an Illuminati system there will be families of reporting alters.
Every level ("section") will have at least one group (family) of reporting alters. The second stage reporting alters are also children from 6 to 10, and they are taught to want Daddy’s or Mommy’s love. Girl systems seek "Daddy" (the Master) and boy systems often seek "Mommy" (the Master). They are taught to talk about therapy issues, programming issues, and movements by the system. They are linked to the computers, and the eye of the computer. Just to hear "Daddy’s voice" is gratification to them.
At stage 1 of the creation of reporting alters, they are the result of the sensory deprivation tank, and are taken from the dissociated part of the mind that feels like it doesn’t have a body, or that it is nothing. Stage 1
Reporting-special-purpose fragments of the mind are painfully shocked in some sensory deprivation environment when the hear 3 taps. The pain ceases when they open the door. They continue to be locked in place in the mind and painfully shocked until they learn the lesson, which is that the pain stops when the door is opened. Over and over they are taught, THE PAIN STOPS WHEN THE DOOR IS OPENED. When they hear tapping they want the pain to stop (probably they abreact their previous tortures) and they open the door to stop the pain. They have only one job, stop the pain by opening the door when three taps (or whatever other trigger/code/signal they are programmed for.)
Stage 2 Reporting-special-purpose alters are given a fuller view of life. They are the watchers in the system.
They were created under such horrible torture that they left the body and hover over the body. These are Out-of-
Body alters. They are also placed in a fogged room, where they are taught to become one with the fog. They are also told ghost stories like Casper the Ghost. Through the combination of all these programming tactics and techniques, they learn to be invisible. They hover over their assigned position in the system, invisible to all the
Page 186 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler
3/1/2007
http://www.whale.to/b/sp/springmeier.html

other alters of that section. These alters have excellent rapid recall. They have none of the Straw Man programming that Gatekeeper receive to make them think they are stupid.
To reinforce the programming, the reporting alters are always treated kindly when they obey. (If you get one that hasn’t been, suspect a plant, a setup.) Internal protector alters are given the job to insure that reporting alters never miss a call, or never miss responding to a cue. They will go to work and punish lax Stage 1 alters. Again, several therapists claim to have gotten reporting alters to defect from their jobs, but haven’t dealt with their protector alters who are taskmasters. If the taskmasters haven’t been dealt with, then suspect a ruse to get the therapist to think all is well. The reason this subject is dealt with here, is that some of the top well known therapists have spread information contrary to what is actually happening. That doesn’t mean that there may not be an exception to the rule, but the Illuminati is not so stupid as to make reporting alters that defect because someone offered them an ice-cream cone.
Reporting alters are very hard to convert, because during their lifetime they are treated nicely. They experience a nice life if they behave (its the other alters that suffer.) The Stage 1 reporting alter merely says HELLO and waits for the response HELLO PRINCESS. This is a standard format. If the HELLO PRINCESS occurs, the mind automatically in a flash switches to the Stage 2 reporting alter.
To reinforce the original programming, which would lose its effect over time, the programmer hypnotically command the reporting alters to think of their programming when they see certain objects, for instance, certain types of men’s clothing, animals, certain cigarettes or lighters, certain trees etc. Everyday life is used then to reinforce their programming. The Stage 1 alters are also trained to have back-up amnesia, where they forget what they have done after they have responded to the cue. Once the job is done, the job is forgotten. Like the
Vol. 2 book reported, reporting alters can perceive themselves in various shapes and figures, and they can be locked up in eggs or other containers also. The Stage 2 alters look forward to Daddy or Mommy coming.
Cisco’s system, which helped at the programming level, verifies that during the 50’s, 60’s, 70’s and 80’s none of the slaves got free. The Illuminati was not the least bit concerned about losing a slave. They had not lost a mind-controlled slave in centuries, so the recent victories in a few slaves getting their freedom in recent years are a historical first. Many therapist who make great therapeutic claims are not freeing their slaves at all, but these slaves continue to be used by their masters. The masters just laugh at the deceptions they have pulled over legitimate but naive therapists. Their reporting alters are a key to their control and they have numerous reporting alters in families spread throughout a standard reporting system. If one realizes that the same mentality that created Stalin’s USSR, or that created Big Brother is at work here, you will realize that they need a spy-in-the- camp on every block so to speak. Everybody watches everyone. They make many spies within a system of alters. The reporting alters are given some script such as "You can diffuse from supersolidity to insubstance, you can grow big or small, and can change shape to any for you wish." This makes it easier for them to go through the internal system.


Deeper insights into the illuminati formula by fritz
Chapter 4. science no. 4 - hypnosis
Chapter 5: science no. 5 - the skill of lying, the art of deceit
Chapter 6: science no. 6-the use of electronics & electricity
Chapter 11: science no. 11- internal controls
Appendix 1 - programmers/researchers
Section c. the four types of "clones" that are used by the illuminati,
Warning, read this first before reading the book.
Introduction by fritz
Glossary of how basic terms are used in this book
Chapter 1. science no. 1 - selection & preparation of the victim
Breeding good subjects for hypnosis-hypnosis as it relates to selection & preparation of the
Training the unborn child
Common illuminati work with twins
Selection of adult candidates for mind-control
U.s. govt. mind-control level 1.
U.s. govt. mind-control level 2.
U.s. govt. mind-control level 3.
U.s. govt. mind-control level 5
Testing young children to plan the programming.
Chapter 2.science no. 2--the traumatization & torture of the victim
Daily abuse works best for programming
Anger-management-programming traumas
Silence programming traumas to teach silence
Torture for no-write
A trauma to develop animal alters
Trauma to isolate the victim
Chapter 3. science no. 3 the use of drugs
Administration of drugs for programming
More programming drugs (these were not listed in the vol.2 formula book)
Stabilizing the programming
Extensive research done to influence human memory by drugs
The basic phases of memory
Hiding the codes
Programming with lsd-25 (lysergic acid diethylamide)
Chemically triggering natural instinctual drives
Sexual stimulation-programming
Understanding the basics about hypnosis
The power of hypnosis
Understanding the deeper mechanics of hypnosis
Programming aids
Using holograms as an access aid
Preparing the brain
Early training for slaves
Magical training on the starlight level
The monarch programming script for over the rainbow
Deep trance programming
Color programming
The association of colorful sights, sounds, rhythm & dance.
Light & color
Special colors
Healing by correct vibrations & rays
Using hypnosis to heal the slave after abuse.
Hypnotic codes, cues and triggers
Monarch mind-control codes
B. beta (sexual)
C. chi (return to cult)
E. epsilon (animal alters)
I. janus-alex call backs (end-times)
J.>> omicron programming
M. songs & nursery rhymes
O. sample codes for alters.
P. catholic programming (by jesuits etc.)
Q. mensa programming (by mensa)
S. scriptures used in programming (cont. from vol. 2. chap. 10)
T. alien programming
Program codes during 1972-1976 for dr. green
The illuminati.
The establishment, the system.
Deception diminishes power
Be wise as serpents
Disinformation to make their double-agents look good
Names of types of disinformation agents
Tricking suspects
The names of deception tricks
One of the greatest deceptions of all time: disney
Observations about how the illuminati like to hide behind perfect
Contents in the disney deception section of chapter 5.
B. an overview
C. who was walt disney?
Personal details
Occult porn king
As a witness before congress
A possible chronology of events surrounding walt disney's illegitimate birth
Walt disney’s character
D. who was roy o. disney?
E. who was roy b. disney?
The battle between the two disney factions
F. what do we know about the disney family in general?
G. a history of disney
Claude debussy
Some disney people of interest.
Warren beatty
Stephen bollenbach
The tommy dorsey band
Rich h. frank
The osmond brothers
Michael ovitz
Frank g. wells
Some of disney’s blatantly occult movies.
H. disney & its mob connections
Some mob history.
How the disney executives have figured out how to steal land all across the u.s.
Disney and the government
J. disney & mind control
Disney vacations for the elite
Disneyana for the programmed & obsessed.
Mind-control features in disney movies.
K. detailed script on how the disney film fantasia is used for programming
Types of sources
Section e. auxiliary uses of electronics & electromagnetic waves
Glossary of terms for understanding electronic mind control
B1. three typical implant victims
B2. documentation of implants.
B3. gwen towers
Section c. specific implants
Brief chronology of audio implants
Basics of how the implants can function
Uses of the implants
Part. b. secretly implanted audio implants.
Cochlear implants
C2. body manipulating implants
C3. visual/holographic implants
How they work
Typesfiber optics
Artificial lenses
Holographic or h-insert
C4. memex/brain link implants
Interface devices
Organic bioprocessors linked to viruses
C5. torture/nerve & muscle stimulation implants
C6. tracking & i.d. implants
Section d. direct monitoring & manipulation of the brain/mind
Tesla waves used to read minds & implant voices
D2. voices / or thoughts sent electronically directly into the mind
Summary of elf wave mind control capabilities
Section e. auxiliary uses of electronics & electromagnetic waves.
E2. polygraphs for monitoring programming and mission accomplishments
Liquid crystals
Bed coils standardized for mind-control potential
E4. virtual reality.
Chapter 7: the science of structuring
A. structuring of mpd worlds
Control alters called processors
The ferris-wheel subsystem
Data entry points
Testing alters to see if they can be used.
Assassination models (delta models).
Authority factors are maximized
Monkey alters.
Presidential models.
Prostitute models.
Repunzel alter.
Internal wall alters.
Structuring with the grand druid council.
Structuring the shadow alters
Structuring in the mirrors
Structuring the tapestry
Chapter 8: the science of body manipulation & programming
A. cranial manipulation
Cranial blood pressure has been kept a secret
Cerebral spinal fluid kept secret
The chinese secret occult society connection
The ancient egyptian connection
Another example
The japanese connection
The early european occult connection
Nineteenth century occult connection
The witchcraft connection
The modern american occult connection
Osteopathy and chiropractic
Bone & skull structure
Cerebrospinal fluid
Transcendental meditation (tm) & the hindu connection
The 3-in-one school connection.
B. genetic engineering
What we’ve covered
Chapter 9: the science of mind manipulation by psychological
Programming to hide revealing dreams
Programming language
Effects of programming
Perception clouds memory
Chapter 10: the 10th science — using spiritual things to control a
Part a. intro on the importance of spiritual programming tactics
Part b. the history of the programmed golem
Part c. the 3 foundations: loss of identity, fear, and demons
Understanding the relationship between fear & demons
Demon possession & spirit guards
The use of giving demonic assistance to entrap.
The use of occult focal points.
Does it glorify demons to cast them out?
Part d. a complete chronology of how the victim experiences the early spiritual
Part e. specific programming maneuvers. the manipulation of near-death-
Hiding the internal self-helper
Interject disks
White gold, other information
B. internal computers
Installation of the standard programming.
Front programs of front computer.
Programmer access to the computer areas.
C. internal hierarchies
The internal hierarchies form rationales
Chapter 12 science no. 12-external controls
Asset control
Building families and communities that have interwoven programming
Boarding schools & body programming.
When controls fail, the final solution.
Dirty psychiatrists involved with mind control
Dirty tavistock controllers
Remote viewing mind-research
List of programmers (continuation from the list given in vol. 2)
What to look for.
Michael aquino, a military/cult mind-control programmer
Personal history.
Understanding the church of set
Understanding some of aquino’s programming.
Sequelae of abuse
Appendix b. the programming sites
Appendix 3. clones, synthetics, organic robotoids and doubles
Summary of the four methods.
Section a. the "future shock" that this topic subjects the common person to.
Section b. instructions on how to clone a person.
A technique--instructions how to clone a human:
Section c. the four types of ‘clones’ that are used by the illuminati:
C3. organic robotoids.
How the memory of a person is transferred for the organic robotoids.
C4. doubles (look alikes).
Section d. secret cloning sites (see also appendix b, where d.u.m. bases are listed.)
Oregon’s underground secret cloning facility
Further investigations at dulce’s underground cloning facility


Share with your friends:
1   ...   170   171   172   173   174   175   176   177   ...   276


The database is protected by copyright ©userg.info 2017
send message

    Main page

bosch
camera
chevrolet
epson
fiat
Honda
iphone
mitsubishi
nissan
Panasonic
Sony
volvo
yamaha