Glossary of how basic terms are used in this book introduction


Download 4.84 Kb.
View original pdf
Size4.84 Kb.
1   ...   209   210   211   212   213   214   215   216   ...   276
Christians are called upon to guard what was spiritually entrusted to them by the using the Holy Spirit (2 TIM
1:14). The Illuminati do a mirror image of this, by layering in spirits (evil ones) to guard things in the system.
For instance, in the VoL 2 book, the programming parallels to the movie Labyrinth were discussed in chapter 5.
It was mentioned how the dogs portrayed guardians. Demons named Toto are layered in to protect the spinner kittens. If one were to try to activate the spinner kittens without going through the proper chain of command & codes, the guardian demons known as Totos, or after Dorothy’s Toto will be activated. The spinner’s in fact are often called "Dorothys".
Some other examples of guardians spirits that are placed into a system are Bes, the spirit that rules the dwarfs;
Geb, the voice behind the earth God in a system; Pan, who has various roles, including being a protector of the green wood; and Shu, which is the voice "behind the wind" which controls the internal weather within a alter
Page 235 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler

system’s world. The foundations of a system are the demons layered in at the beginning. Spirits of Confusion,
Despair, Torment are called down by the programmers and laid in. Lying and Perverse Spirits are brought in too.
At first this may seem like very subjective sci-fi to the reader. Hopefully, after the programming rituals are described in detail, and a basic foundation concerning what demons are is laid, the reader will have received a more systematic understanding of the topic. The goal is teach the reader programming as a programmer would understand it. The victim should not be made ashamed of demonic attachments. That serves no spiritual benefit for the victim, and only contributes more guilt and shame, and adds to the problem of giving them hope. The victim has been a helpless victim.
"Mystery" demons (which is not their actual name) are placed into the child when they are innocent babies. Part of the power of the mystery demons, is that they are able to remain anonymous within their host’s body. They remain in the host secretly generally for the person’s lifetime. These mystery demons have to answer to their chain of command. Within a victim’s alter parts, are demons which have their own ranks and commanders.
Christians who carry out deliverances will deal those commanders.
The Catholic Church, which has been so active in trauma-based mind-control and in placing in the Spirits of
Legion into a victim, had one of their clergy write, "Evil is Someone, Someone who is multiple and who name is legion..." (Mauriac, Francois. Life of St. Margaret of Cortona.) The Catholic Church’s official public stance is that Demon possession is rare. On Aug. 15, 1972, Pope Paul VI put out a motu proprio which abolished the order of exorcist. This office had already become rather rare, and besides included men who were mind-control programmers. Cases of "demonic possession" of Catholics are occasionally taken to places like Georgetown
Hospital in Wash. D.C. which is run by Jesuits working in tandem with the CIA. Accounts of exorcisms of
Catholics are filled with clues that the victims of "demonic possession" are victims also of trauma-based occult- based mindcontrol.
This writer, trying to explain a difficult subject (demonology), feels fortunate to be able to recommend a book which does a good job of explaining it, this is Howard O. Pittman’s book Demons. (Foxworth, MS:
Philadelphian Pub. House, c. 1988). I originally read the book in 1992, and have had it recommended by those who work in the area of demonology. The book is written by a devout Christian who worked 28 years in the field of law enforcement during his life. The book explains such things as: how man is made in the image of
God (and as such is a clone, so to speak of God;) How demon possession has come about due to man’s sovereign will allowing it; & How demons can interact with the physical world.
He explains how Satan despatches orders from his throne which go through a chain of command, and how special emphasis is placed on Christians. He explains the forms of demons, their expertise, how they can read minds, and how they have no love for their master, and no love for themselves. Nor does their master have any love for them. (I, Fritz Springmeier, your author have discovered in talking to people for years, that it is essential for people to grasp that the mind of Satan is devoid of love, and that where love doesn’t seek its own,
Satan’s mind always has his own interest in both mind & action. Everything in his world system is functioning for a goal of his, they are not random events, because he is a control-freak.)
Pittman describes warring demons--which look like giant humans and are the cream of Satan’s crop.’ These warring demons are assigned to formulate wars upon the earth. While Pittman is a spirit-led Christian, it is interesting that a non-Christian historian/author William Bramley, (of the Gods of Eden), who believes that the "aliens" were viewed as angels, has found traces of proof that the aliens (angels) were involved in the creation of wars down through the history of mankind. "Now the Spirit speaketh expressly, that in the latter times some shall depart from the faith, giving heed to seducing spirits and doctrines of devils; Speaking lies in hypocrisy; having their conscience seared with a hot iron;" 1 TIM 4:1-2.
Pittman writes about 1 TIM 4:1-2, "In this passage of scripture, we are told that in the last days the devils would have their own doctrine. We know that if the Bible tells us that devils would have their own doctrines, then, most assuredly the Bible would tell us what these doctrines would be. Evidence of what the devils will be
Page 236 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler

teaching is found in the following passage of scripture: ‘But he knowing their thoughts, said unto them, Every kingdom divided against itself is brought to desolation; and a house divided against a house falleth. If Satan also be divided against himself, how shall his kingdom stand? Because ye say that I cast out devils through
Beelzebub.’ (Luke 11:17-18)
From this very scripture, it is clear what the devils will be teaching as doctrine. They will be teaching that
THERE ARE NO SUCH BEINGS AS DEMONS! Where are these demons teaching their doctrine? They are teaching it in the churches to the Christians! They are teaching their doctrine to the very ones who have the potential to believe that these demons are real and can expose these beings. If Satan did try to reveal himself and his helpers, then his house would be divided." Pittman warns, "From congregation to congregation, from one church to another church throughout all this land, we find preacher after preacher playing down the existence of demons and even the existence of Satan! Then, there are others who, when they admit that Satan and his demons are real, deemphasize their importance and capability. Not only are local ministers doing this, but many
Christian authors are doing this through their books...The false doctrines of devils are intended to enhance the anonymity of Satan and his angels. Much of this misteaching is spread through good Christians who have been sold a lie and really believe what they say.’’ The Word of God is clear that not one sin entered into this world without Satan. Every sin committed by mankind is (according to the Word of God) the result and influence of
Satan. However, because Satan and his demons are masters at deception and at staying behind the scenes, and remaining anonymous they are not discovered. They are better at such deception than the intelligence agencies that are Illuminati fronts, and to give credit where due, the NSA, CIA, and MI-6 are good at what they do.
The programmer will be looking for methods to open up a person to demons, and he will be setting up scenarios so that the victim will reject the Spirit of God in their life. 1 JN 5:18 teaches that a person’s identity in Christ protects against the wicked one, so the victim’s identity in Christ will be stolen very soon by the programmers.
According to the Word of God, submission and humility before God are also said to be protections against evil spirits.(cf. JS 4:7, & 1 PTR 5:6,8,9). Resistance to catching demons, involves a person "not giving place" to the demons, (Eph. 4:27) and to be strengthened by Christ (Phil. 4:13). How does this happen? The Word of God teaches us that the Spirit of God in our life repels demons naturally. A close walk of fellowship with the Spirit of God is one spiritually natural immune-builder. We need to get Christ deeper and deeper into our lives.
However, the programmer will deflect this, and say that submission and humility before God means to submit to some church authority, and of course this church authority will be part of the mind-control abuse system.

Deeper insights into the illuminati formula by fritz
Chapter 4. science no. 4 - hypnosis
Chapter 5: science no. 5 - the skill of lying, the art of deceit
Chapter 6: science no. 6-the use of electronics & electricity
Chapter 11: science no. 11- internal controls
Appendix 1 - programmers/researchers
Section c. the four types of "clones" that are used by the illuminati,
Warning, read this first before reading the book.
Introduction by fritz
Glossary of how basic terms are used in this book
Chapter 1. science no. 1 - selection & preparation of the victim
Breeding good subjects for hypnosis-hypnosis as it relates to selection & preparation of the
Training the unborn child
Common illuminati work with twins
Selection of adult candidates for mind-control
U.s. govt. mind-control level 1.
U.s. govt. mind-control level 2.
U.s. govt. mind-control level 3.
U.s. govt. mind-control level 5
Testing young children to plan the programming.
Chapter no. 2--the traumatization & torture of the victim
Daily abuse works best for programming
Anger-management-programming traumas
Silence programming traumas to teach silence
Torture for no-write
A trauma to develop animal alters
Trauma to isolate the victim
Chapter 3. science no. 3 the use of drugs
Administration of drugs for programming
More programming drugs (these were not listed in the vol.2 formula book)
Stabilizing the programming
Extensive research done to influence human memory by drugs
The basic phases of memory
Hiding the codes
Programming with lsd-25 (lysergic acid diethylamide)
Chemically triggering natural instinctual drives
Sexual stimulation-programming
Understanding the basics about hypnosis
The power of hypnosis
Understanding the deeper mechanics of hypnosis
Programming aids
Using holograms as an access aid
Preparing the brain
Early training for slaves
Magical training on the starlight level
The monarch programming script for over the rainbow
Deep trance programming
Color programming
The association of colorful sights, sounds, rhythm & dance.
Light & color
Special colors
Healing by correct vibrations & rays
Using hypnosis to heal the slave after abuse.
Hypnotic codes, cues and triggers
Monarch mind-control codes
B. beta (sexual)
C. chi (return to cult)
E. epsilon (animal alters)
I. janus-alex call backs (end-times)
J.>> omicron programming
M. songs & nursery rhymes
O. sample codes for alters.
P. catholic programming (by jesuits etc.)
Q. mensa programming (by mensa)
S. scriptures used in programming (cont. from vol. 2. chap. 10)
T. alien programming
Program codes during 1972-1976 for dr. green
The illuminati.
The establishment, the system.
Deception diminishes power
Be wise as serpents
Disinformation to make their double-agents look good
Names of types of disinformation agents
Tricking suspects
The names of deception tricks
One of the greatest deceptions of all time: disney
Observations about how the illuminati like to hide behind perfect
Contents in the disney deception section of chapter 5.
B. an overview
C. who was walt disney?
Personal details
Occult porn king
As a witness before congress
A possible chronology of events surrounding walt disney's illegitimate birth
Walt disney’s character
D. who was roy o. disney?
E. who was roy b. disney?
The battle between the two disney factions
F. what do we know about the disney family in general?
G. a history of disney
Claude debussy
Some disney people of interest.
Warren beatty
Stephen bollenbach
The tommy dorsey band
Rich h. frank
The osmond brothers
Michael ovitz
Frank g. wells
Some of disney’s blatantly occult movies.
H. disney & its mob connections
Some mob history.
How the disney executives have figured out how to steal land all across the u.s.
Disney and the government
J. disney & mind control
Disney vacations for the elite
Disneyana for the programmed & obsessed.
Mind-control features in disney movies.
K. detailed script on how the disney film fantasia is used for programming
Types of sources
Section e. auxiliary uses of electronics & electromagnetic waves
Glossary of terms for understanding electronic mind control
B1. three typical implant victims
B2. documentation of implants.
B3. gwen towers
Section c. specific implants
Brief chronology of audio implants
Basics of how the implants can function
Uses of the implants
Part. b. secretly implanted audio implants.
Cochlear implants
C2. body manipulating implants
C3. visual/holographic implants
How they work
Typesfiber optics
Artificial lenses
Holographic or h-insert
C4. memex/brain link implants
Interface devices
Organic bioprocessors linked to viruses
C5. torture/nerve & muscle stimulation implants
C6. tracking & i.d. implants
Section d. direct monitoring & manipulation of the brain/mind
Tesla waves used to read minds & implant voices
D2. voices / or thoughts sent electronically directly into the mind
Summary of elf wave mind control capabilities
Section e. auxiliary uses of electronics & electromagnetic waves.
E2. polygraphs for monitoring programming and mission accomplishments
Liquid crystals
Bed coils standardized for mind-control potential
E4. virtual reality.
Chapter 7: the science of structuring
A. structuring of mpd worlds
Control alters called processors
The ferris-wheel subsystem
Data entry points
Testing alters to see if they can be used.
Assassination models (delta models).
Authority factors are maximized
Monkey alters.
Presidential models.
Prostitute models.
Reporting alters.
Repunzel alter.
Internal wall alters.
Structuring with the grand druid council.
Structuring the shadow alters
Structuring in the mirrors
Structuring the tapestry
Chapter 8: the science of body manipulation & programming
A. cranial manipulation
Cranial blood pressure has been kept a secret
Cerebral spinal fluid kept secret
The chinese secret occult society connection
The ancient egyptian connection
Another example
The japanese connection
The early european occult connection
Nineteenth century occult connection
The witchcraft connection
The modern american occult connection
Osteopathy and chiropractic
Bone & skull structure
Cerebrospinal fluid
Transcendental meditation (tm) & the hindu connection
The 3-in-one school connection.
B. genetic engineering
What we’ve covered
Chapter 9: the science of mind manipulation by psychological
Programming to hide revealing dreams
Programming language
Effects of programming
Perception clouds memory
Chapter 10: the 10th science — using spiritual things to control a
Part a. intro on the importance of spiritual programming tactics
Part b. the history of the programmed golem
Part c. the 3 foundations: loss of identity, fear, and demons
Understanding the relationship between fear & demons
The use of giving demonic assistance to entrap.
The use of occult focal points.
Does it glorify demons to cast them out?
Part d. a complete chronology of how the victim experiences the early spiritual
Part e. specific programming maneuvers. the manipulation of near-death-
Hiding the internal self-helper
Interject disks
White gold, other information
B. internal computers
Installation of the standard programming.
Front programs of front computer.
Programmer access to the computer areas.
C. internal hierarchies
The internal hierarchies form rationales
Chapter 12 science no. 12-external controls
Asset control
Building families and communities that have interwoven programming
Boarding schools & body programming.
When controls fail, the final solution.
Dirty psychiatrists involved with mind control
Dirty tavistock controllers
Remote viewing mind-research
List of programmers (continuation from the list given in vol. 2)
What to look for.
Michael aquino, a military/cult mind-control programmer
Personal history.
Understanding the church of set
Understanding some of aquino’s programming.
Sequelae of abuse
Appendix b. the programming sites
Appendix 3. clones, synthetics, organic robotoids and doubles
Summary of the four methods.
Section a. the "future shock" that this topic subjects the common person to.
Section b. instructions on how to clone a person.
A technique--instructions how to clone a human:
Section c. the four types of ‘clones’ that are used by the illuminati:
C3. organic robotoids.
How the memory of a person is transferred for the organic robotoids.
C4. doubles (look alikes).
Section d. secret cloning sites (see also appendix b, where d.u.m. bases are listed.)
Oregon’s underground secret cloning facility
Further investigations at dulce’s underground cloning facility

Share with your friends:
1   ...   209   210   211   212   213   214   215   216   ...   276

The database is protected by copyright © 2017
send message

    Main page