Glossary of how basic terms are used in this book introduction


Installation of the Standard Programming



Download 4.84 Kb.
View original pdf
Page237/276
Date07.11.2018
Size4.84 Kb.
1   ...   233   234   235   236   237   238   239   240   ...   276
Installation of the Standard Programming.
The Illuminati take a screen about 6’ by 6’. On the screen is a grid with a Greek or English letter. In front of the screen are colored flashing lights. The flashing colored lights prevent the conscious mind from seeing the screen, but the subconscious mind sees the grid. An Alpha symbol or capital A with tails at the base will be shown on the grid screen for Alpha programming. A Beta or B will be shown for the Beta Programming screen.
The programming that is placed in using the different programming associated with various Greek and English alphabets can be read about in Chapter 4 of the Volume 2 Formula book and Chapter 4 in this book. The victim is strapped into a chair with their head locked in place and their eyes forced open. They must endure the flashing lights and the subliminal grid and letter on the screen.
There is a paper trail that they are using flashing lights for hypnotic control of a subject in order to place in messages at the subconscious. One of the pieces of the paper trail was an article "New Device To Induce
Hypnosis Developed" in the Chicago Tribune (June 7, 1959). The article was about a Dr. William Kroger, who had tested the use of flashing lights on 200 obstetric patients at the Edgewater hospital in Chicago. Interestingly, this Dr. Kroger lived in Beverly Hills, CA and worked with a Sidney Schneider of Skokie, IL.
Schneider was skilled in electronics and Kroger was an obstetrician. The article said, "The pulsing pattern in reality an electronic brain wave ‘achieves control’ of the brain’s alpha rhythm, thus inducing a drowsy state, according to Dr. Kroger." "The apparatus...operates on the principal of subliminal and photic stimulation of brain waves...about 30 per cent of the subjects who had received no explanation or had no knowledge of what the brain wave synchronizer would do were hypnotized to various degrees." Now these type of machines are available to any bozo who knows where they are sold.
Another piece of the paper trail is a government study by the Defense Intelligence Agency of July 1972, entitled
Biological Effects of Electromagnetic Radiation (Radiowaves and Microwaves) --Eurasian and Communist
Countries, ST-CS-01-169-72. DIA,, July, 1972, pp. 77-86. This study, of which this author has a copy, in part
VI is written about "Light and Color as a Means of Altering Human Behavior." Although the report claims the communists are the ones who are using flashing light and color to alter human behavior, the real inventors were the Illuminati, and both the Americans and Russians are using flashing colored lights for programming.
This DIA study also reports on an American symposium held in the at Tulane Univ., Covington, LA in 1957 concerning the effects of flickering light on the brain. The participants of the 1957 American symposium drew up a paper with 11 conclusions, which included a. flickering light interferes with the human nervous system, b. flickering light can put a person to sleep or into a trance, c. flickering light can interfere with the brains s alpha waves, and d. "photo driving of the EEG by periodic flicker is a well known phenomenon although many subjects do not show the effect..."
During the ’50’s through at least the ’70’s, the Illuminati used flickering lights to place into the subconscious the grids used for the various computers. Each block on the grid would have codes, programs, memory and alters attached to it. In other words, dissociated parts of the mind become parts which are built into computers.
The mind of victim is hijacked by the programmer.
To fully understand what the computers are, we must understand the mind-set of the programmers. The programmers are looking to Lucifer for their inspiration. An imitation of God’s Book of Life for people, is for
Lucifer to construct an internal computer that will contain all the history of all the alters. It might be helpful if some items that were in the illustrated Guidebook and in the Vol. 2 book were briefly touched upon again, as we discuss how the internal computers are made. Remember, that a computer is placed one per layer (section) and that they also build in back up computers, and that the computers have coded memories stored in them, as well as coded programs.
The deepest computer is called the Beast computer, and it has an eye (the all-seeing-eye) that opens and shuts like a camera lens. It can go behind the veil, and this is in mockery of the rent veil of the Holy of Holies. When the internal computers are built, the Illuminati use a doll house with different colored rooms for the child to
Page 251 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler
3/1/2007
http://www.whale.to/b/sp/springmeier.html

visualize what is being done. Each room in the dollhouse has a different color. Each family of alters (a group of alters that are on the grid together) has the exact same color code. In the Vol. 2 book, we showed the color coding differently--we showed the color coding running diagonally across the grid, it can be done in any fashion, but generally the color code for a single family (alters a-through-in on the chart) is the same, and the cover program to hide it is that the colors run diagonally. What that means is that an entire family of alters, say alters Mary 1 through Mary 13 will all be connected by a color ribbon alter (who works just for them) back to that same color of computer room. All the family get the same programming, although they hold separate memories.
This will help therapists understand the behavior & programming patterns of various alters. The Beta and Delta alters, who as the readers realizes live in entirely a deep trance imaginary life, have entirely negative programming in their computer section. The Betas and Deltas have two ribbons per alter, which is an exception to the rule. This is so they can function together--espionage, seduction, and assassination all go together.
Another type of alter who gets two ribbons are the 13th alters which connect two levels. These poor alters have so much programming going off, and mixed signals, that they are real basket cases.
When a system is seen in its entirety, the more powerful system hierarchy and Illuminati hierarchy alters will be coded with Platinum, Gold, White, Purple, Bronze & Silver. Front alters who will be helpful will be coded pink and yellow. Orange alters will be perceived as helping alters, but they are actually guards, protectors, and they protect sections of the system below them, which they usually can’t see, and often don’t know that they guard.
Alters coded brown, tan, grey, or clear will give the therapist & support team fits, because they are full of deceptions & cover programs, and illusions. Host alters or key front alters may have a clear or white diamond as their gemstone. Alters who cover things up may have obsidian as their gemstone. Other alters who play along with the programming may have such gemstones as Fire Opal, Topaz, and Turquoise. (Also see Vol. 2 , p. 328-
29.)


Deeper insights into the illuminati formula by fritz
Chapter 4. science no. 4 - hypnosis
Chapter 5: science no. 5 - the skill of lying, the art of deceit
Chapter 6: science no. 6-the use of electronics & electricity
Chapter 11: science no. 11- internal controls
Appendix 1 - programmers/researchers
Section c. the four types of "clones" that are used by the illuminati,
Warning, read this first before reading the book.
Introduction by fritz
Glossary of how basic terms are used in this book
Chapter 1. science no. 1 - selection & preparation of the victim
Breeding good subjects for hypnosis-hypnosis as it relates to selection & preparation of the
Training the unborn child
Common illuminati work with twins
Selection of adult candidates for mind-control
U.s. govt. mind-control level 1.
U.s. govt. mind-control level 2.
U.s. govt. mind-control level 3.
U.s. govt. mind-control level 5
Testing young children to plan the programming.
Chapter 2.science no. 2--the traumatization & torture of the victim
Daily abuse works best for programming
Anger-management-programming traumas
Silence programming traumas to teach silence
Torture for no-write
A trauma to develop animal alters
Trauma to isolate the victim
Chapter 3. science no. 3 the use of drugs
Administration of drugs for programming
More programming drugs (these were not listed in the vol.2 formula book)
Stabilizing the programming
Extensive research done to influence human memory by drugs
The basic phases of memory
Hiding the codes
Programming with lsd-25 (lysergic acid diethylamide)
Chemically triggering natural instinctual drives
Sexual stimulation-programming
Understanding the basics about hypnosis
The power of hypnosis
Understanding the deeper mechanics of hypnosis
Programming aids
Using holograms as an access aid
Preparing the brain
Early training for slaves
Magical training on the starlight level
The monarch programming script for over the rainbow
Deep trance programming
Color programming
The association of colorful sights, sounds, rhythm & dance.
Light & color
Special colors
Healing by correct vibrations & rays
Using hypnosis to heal the slave after abuse.
Hypnotic codes, cues and triggers
Monarch mind-control codes
B. beta (sexual)
C. chi (return to cult)
E. epsilon (animal alters)
I. janus-alex call backs (end-times)
J.>> omicron programming
M. songs & nursery rhymes
O. sample codes for alters.
P. catholic programming (by jesuits etc.)
Q. mensa programming (by mensa)
S. scriptures used in programming (cont. from vol. 2. chap. 10)
T. alien programming
Program codes during 1972-1976 for dr. green
The illuminati.
The establishment, the system.
Deception diminishes power
Be wise as serpents
Disinformation to make their double-agents look good
Names of types of disinformation agents
Tricking suspects
The names of deception tricks
One of the greatest deceptions of all time: disney
Observations about how the illuminati like to hide behind perfect
Contents in the disney deception section of chapter 5.
B. an overview
C. who was walt disney?
Personal details
Occult porn king
As a witness before congress
A possible chronology of events surrounding walt disney's illegitimate birth
Walt disney’s character
D. who was roy o. disney?
E. who was roy b. disney?
The battle between the two disney factions
F. what do we know about the disney family in general?
G. a history of disney
Claude debussy
Some disney people of interest.
Warren beatty
Stephen bollenbach
The tommy dorsey band
Rich h. frank
The osmond brothers
Michael ovitz
Frank g. wells
Some of disney’s blatantly occult movies.
H. disney & its mob connections
Some mob history.
How the disney executives have figured out how to steal land all across the u.s.
Disney and the government
J. disney & mind control
Disney vacations for the elite
Disneyana for the programmed & obsessed.
Mind-control features in disney movies.
K. detailed script on how the disney film fantasia is used for programming
Types of sources
Section e. auxiliary uses of electronics & electromagnetic waves
Glossary of terms for understanding electronic mind control
B1. three typical implant victims
B2. documentation of implants.
B3. gwen towers
Section c. specific implants
Brief chronology of audio implants
Basics of how the implants can function
Uses of the implants
Part. b. secretly implanted audio implants.
Cochlear implants
C2. body manipulating implants
C3. visual/holographic implants
How they work
Typesfiber optics
Artificial lenses
Holographic or h-insert
C4. memex/brain link implants
Interface devices
Organic bioprocessors linked to viruses
C5. torture/nerve & muscle stimulation implants
C6. tracking & i.d. implants
Section d. direct monitoring & manipulation of the brain/mind
Tesla waves used to read minds & implant voices
D2. voices / or thoughts sent electronically directly into the mind
Summary of elf wave mind control capabilities
Section e. auxiliary uses of electronics & electromagnetic waves.
E2. polygraphs for monitoring programming and mission accomplishments
Liquid crystals
Bed coils standardized for mind-control potential
E4. virtual reality.
Chapter 7: the science of structuring
A. structuring of mpd worlds
Control alters called processors
The ferris-wheel subsystem
Data entry points
Testing alters to see if they can be used.
Assassination models (delta models).
Authority factors are maximized
Monkey alters.
Presidential models.
Prostitute models.
Reporting alters.
Repunzel alter.
Internal wall alters.
Structuring with the grand druid council.
Structuring the shadow alters
Structuring in the mirrors
Structuring the tapestry
Chapter 8: the science of body manipulation & programming
A. cranial manipulation
Cranial blood pressure has been kept a secret
Cerebral spinal fluid kept secret
The chinese secret occult society connection
The ancient egyptian connection
Another example
The japanese connection
The early european occult connection
Nineteenth century occult connection
The witchcraft connection
The modern american occult connection
Osteopathy and chiropractic
Bone & skull structure
Cerebrospinal fluid
Transcendental meditation (tm) & the hindu connection
The 3-in-one school connection.
B. genetic engineering
What we’ve covered
Chapter 9: the science of mind manipulation by psychological
Programming to hide revealing dreams
Programming language
Effects of programming
Perception clouds memory
Chapter 10: the 10th science — using spiritual things to control a
Part a. intro on the importance of spiritual programming tactics
Part b. the history of the programmed golem
Part c. the 3 foundations: loss of identity, fear, and demons
Understanding the relationship between fear & demons
Demon possession & spirit guards
The use of giving demonic assistance to entrap.
The use of occult focal points.
Does it glorify demons to cast them out?
Part d. a complete chronology of how the victim experiences the early spiritual
Part e. specific programming maneuvers. the manipulation of near-death-
Hiding the internal self-helper
Interject disks
White gold, other information
B. internal computers
Front programs of front computer.
Programmer access to the computer areas.
C. internal hierarchies
The internal hierarchies form rationales
Chapter 12 science no. 12-external controls
Asset control
Building families and communities that have interwoven programming
Boarding schools & body programming.
When controls fail, the final solution.
Dirty psychiatrists involved with mind control
Dirty tavistock controllers
Remote viewing mind-research
List of programmers (continuation from the list given in vol. 2)
What to look for.
Michael aquino, a military/cult mind-control programmer
Personal history.
Understanding the church of set
Understanding some of aquino’s programming.
Sequelae of abuse
Appendix b. the programming sites
Appendix 3. clones, synthetics, organic robotoids and doubles
Summary of the four methods.
Section a. the "future shock" that this topic subjects the common person to.
Section b. instructions on how to clone a person.
A technique--instructions how to clone a human:
Section c. the four types of ‘clones’ that are used by the illuminati:
C3. organic robotoids.
How the memory of a person is transferred for the organic robotoids.
C4. doubles (look alikes).
Section d. secret cloning sites (see also appendix b, where d.u.m. bases are listed.)
Oregon’s underground secret cloning facility
Further investigations at dulce’s underground cloning facility


Share with your friends:
1   ...   233   234   235   236   237   238   239   240   ...   276


The database is protected by copyright ©userg.info 2017
send message

    Main page

bosch
camera
chevrolet
epson
fiat
Honda
iphone
mitsubishi
nissan
Panasonic
Sony
volvo
yamaha