Glossary of how basic terms are used in this book introduction



Download 4.84 Kb.
View original pdf
Page276/276
Date07.11.2018
Size4.84 Kb.
1   ...   268   269   270   271   272   273   274   275   276
FINAL NOTES.
As this author’s reflects back on what’s gone into this first part, he can’t help thinking about how God will reveal all things that are secret. (See Dan, 2:22 and other verses). The prophet Daniel called him the revealer of secrets." The secrets which are revealed in this book are minuscule compared to what God Almighty will reveal in His day. And as this author reflects back he realizes that there is so much more that could be said.
This author has neglected to get my information about the Clintons into this. For instance, this author interviewed a woman who went to school with Hillary, and two of Hillary’s mind-control victims. Our establishment media have neglected to tell the American people about Bill Clinton’s roots & ties in Hot Springs,
Ark.
Hot Springs is a city that has forty-seven thermal springs which have brought the jet set from all over the world.
The mafia syndicate & their nightclubs made Hot Springs a hot bed of vice, gambling, prostitution. During the
1920’s the territory so popular with organized crime, that they classified the territory "neutral ground" like they did Hollywood. In the early 1960’s, Hot Springs had the largest illegal gambling operations in the entire U.S.
Billy’s uncle Roy was a politician in Arkansas’s legislature connected to all this mess. And Bill Clinton’s uncle
Raymond Clinton, who had a Buick dealership, was tied to all this corruption.
Bill & his brother Roger’s cocaine habits are well known by those familiar with them, as well as their wild parties at the Coachman’s Inn, Little Rock, Ark. What are not known are Hillary & Bill’s membership in the secret Illuminati.
And for some reason some of their more intimate associates are also not known, such as Charles "Chip"
Whitmore, a Satanist & programmer. Chip & Bill have met often on a weekly basis over the years. This continues, for instance when Bill was in England so was Chip, when Bill went to Florida so did Chip. Chip played drums with mind-control programmer Jerry Lee Lewis. He was also a friend of Jack Ruby. (It’s a small world at the top of corruption.) Chip owns Cash McCool’s Tavern. He is 5’6, glasses for his poor eyesight, has good hearing, and has a filthy mouth. He changes the car he owns & drives every 3-5 months. Chip had a programmed girl murder a man, and then the Network got him off of his murder charges. Chip’s family’s Villa
Mare in Little Rock was pictured in the opening shots of Designing Women.
Page 294 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler
3/1/2007
http://www.whale.to/b/sp/springmeier.html


Chip Whitm ore has been in charge of assassinations in his area, and controls the local law enforcement in
Arkansas. Jack Stevens, said to be the largest investment banker in Little Rock, is CIA/part of the Network. He exchanged information with Chip via their mutual black cleaning lady. Further, Whitmore & Stevens tie in with a string of corruption that extends into the Assembly of God churches & other parts of Churchianity.
Over Chip is a Dr. Paul Palmer. The media just gives us glimpses of the depth of occult corruption. For instance,
Insight magazine
Feb. 26, ’96, page 48, in an article by Suzanne Fields had a photo of Hillary’s backside wearing what appeared to be a golden dragon on her black coat when she went to court to talk about the Rose
Law Firm billing records. She has sometimes been called the Dragon lady for good reasons. Will today’s modern equivalents to shamans, our psychiatric community help protect us from murderers like Chip
Whitmore? Not likely.
The Biographical Directory of Fellows and Members of the American Psychiatric Association reveals that in
1957 there were 7,104 American members in the American Psychiatric Association. Of those 7,104, a total of
1,253 had moved to America from Germany and Eastern Europe. This helps us understand the enormous influence Operation Paperclip had on America. Operation Paperclip was the CIA’s project to smuggle Nazi criminals into our nation, some of which have now made Penn’s campus infamous. No wonder the False
Memory Spindrome got started at Pennsylvania University. We were warned by a psychiatrist in a Weekly
World News story of Jan. 9, 1996 about a strange new sleeping disorder where people die after seeing a hooded robe figure chase them. This new "Deadly Dream Syndrome" sounds strongly like mind-control. Perhaps there is no way to have given the readers anything but a drop in the bucket.
Some of the details that got left out on the way include: the Seventh-Day Adventist church’s secret cooperation with the government to supply young men (1,500) for government experiments called Operation Whitecoat; how the Dept. of Energy set up hotlines for victims of radiation experiments, in other words the fox is in control of where the victim goes for help;
Peter A. Petito, "Mr. Intelligence" in Italy, and his connections to the Network;
William Randolph Hearst’s costume parties and his half dozen homes like San Simeon;
Torrance, CA’s Penthouses and Disney’s mind-control; the Masonic peace sign of uplifted hands with wrists crossed in the film 1984; the movie Army of Darkness with its mirror image programming, "London Bridges falling down" programming ditty, etc.; how FEMA works with the 6th Army that Aquino was part of, how Voodooism uses Waterfalls for healing such as at Sardo, Haiti; how Mothers of Darkness alters are trained to love a marble, fed the marble, care for it, and then to shatter it with a hammer until its fine like salt and then to repeat the process and only split the marble but not crush it as part of their training to program; how a certain torture is done to make the victim think they have a butterfly as a head with the head of the butterfly in their third eye area; how scribbling is used to anchor programming in child victims; programmed soul-ties to aliens;
Page 295 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler
3/1/2007
http://www.whale.to/b/sp/springmeier.html


Mr. Greenjean’s (of Capt. Kangaroo) talk of Mr. Moon & how it was used for programming; the blood sacrifices under the Temple Mount on March 13th this year; the Masonic corruption in Arcadia, FL and the G. Pierce Wood Memorial Hospital; how secret meetings of the CIA have studied how UFOs could be used as "clever hostile propaganda" trick to take advantage of the populace’s gullibility; how Mengele’s family never claimed his bones--they knew they weren’t the real ones, and how the International Red Cross gave him an I.D.S. to travel with; South Africa’s occult Shu Shung Palace... maybe someone else will pick up where this author has left off, the mind-control is all around us!
[
back
] [
home
]
Page 296 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler
3/1/2007
http://www.whale.to/b/sp/springmeier.html


Deeper insights into the illuminati formula by fritz
Chapter 4. science no. 4 - hypnosis
Chapter 5: science no. 5 - the skill of lying, the art of deceit
Chapter 6: science no. 6-the use of electronics & electricity
Chapter 11: science no. 11- internal controls
Appendix 1 - programmers/researchers
Section c. the four types of "clones" that are used by the illuminati,
Warning, read this first before reading the book.
Introduction by fritz
Glossary of how basic terms are used in this book
Chapter 1. science no. 1 - selection & preparation of the victim
Breeding good subjects for hypnosis-hypnosis as it relates to selection & preparation of the
Training the unborn child
Common illuminati work with twins
Selection of adult candidates for mind-control
U.s. govt. mind-control level 1.
U.s. govt. mind-control level 2.
U.s. govt. mind-control level 3.
U.s. govt. mind-control level 5
Testing young children to plan the programming.
Chapter 2.science no. 2--the traumatization & torture of the victim
Daily abuse works best for programming
Anger-management-programming traumas
Silence programming traumas to teach silence
Torture for no-write
A trauma to develop animal alters
Trauma to isolate the victim
Chapter 3. science no. 3 the use of drugs
Administration of drugs for programming
More programming drugs (these were not listed in the vol.2 formula book)
Stabilizing the programming
Extensive research done to influence human memory by drugs
The basic phases of memory
Hiding the codes
Programming with lsd-25 (lysergic acid diethylamide)
Chemically triggering natural instinctual drives
Sexual stimulation-programming
Understanding the basics about hypnosis
The power of hypnosis
Understanding the deeper mechanics of hypnosis
Programming aids
Using holograms as an access aid
Preparing the brain
Early training for slaves
Magical training on the starlight level
The monarch programming script for over the rainbow
Deep trance programming
Color programming
The association of colorful sights, sounds, rhythm & dance.
Light & color
Special colors
Healing by correct vibrations & rays
Using hypnosis to heal the slave after abuse.
Hypnotic codes, cues and triggers
Monarch mind-control codes
B. beta (sexual)
C. chi (return to cult)
E. epsilon (animal alters)
I. janus-alex call backs (end-times)
J.>> omicron programming
M. songs & nursery rhymes
O. sample codes for alters.
P. catholic programming (by jesuits etc.)
Q. mensa programming (by mensa)
S. scriptures used in programming (cont. from vol. 2. chap. 10)
T. alien programming
Program codes during 1972-1976 for dr. green
The illuminati.
The establishment, the system.
Deception diminishes power
Be wise as serpents
Disinformation to make their double-agents look good
Names of types of disinformation agents
Tricking suspects
The names of deception tricks
One of the greatest deceptions of all time: disney
Observations about how the illuminati like to hide behind perfect
Contents in the disney deception section of chapter 5.
B. an overview
C. who was walt disney?
Personal details
Occult porn king
As a witness before congress
A possible chronology of events surrounding walt disney's illegitimate birth
Walt disney’s character
D. who was roy o. disney?
E. who was roy b. disney?
The battle between the two disney factions
F. what do we know about the disney family in general?
G. a history of disney
Claude debussy
Some disney people of interest.
Warren beatty
Stephen bollenbach
The tommy dorsey band
Rich h. frank
The osmond brothers
Michael ovitz
Frank g. wells
Some of disney’s blatantly occult movies.
H. disney & its mob connections
Some mob history.
How the disney executives have figured out how to steal land all across the u.s.
Disney and the government
J. disney & mind control
Disney vacations for the elite
Disneyana for the programmed & obsessed.
Mind-control features in disney movies.
K. detailed script on how the disney film fantasia is used for programming
Types of sources
Section e. auxiliary uses of electronics & electromagnetic waves
Glossary of terms for understanding electronic mind control
B1. three typical implant victims
B2. documentation of implants.
B3. gwen towers
Section c. specific implants
Brief chronology of audio implants
Basics of how the implants can function
Uses of the implants
Part. b. secretly implanted audio implants.
Cochlear implants
C2. body manipulating implants
C3. visual/holographic implants
How they work
Typesfiber optics
Artificial lenses
Holographic or h-insert
C4. memex/brain link implants
Interface devices
Organic bioprocessors linked to viruses
C5. torture/nerve & muscle stimulation implants
C6. tracking & i.d. implants
Section d. direct monitoring & manipulation of the brain/mind
Tesla waves used to read minds & implant voices
D2. voices / or thoughts sent electronically directly into the mind
Summary of elf wave mind control capabilities
Section e. auxiliary uses of electronics & electromagnetic waves.
E2. polygraphs for monitoring programming and mission accomplishments
Liquid crystals
Bed coils standardized for mind-control potential
E4. virtual reality.
Chapter 7: the science of structuring
A. structuring of mpd worlds
Control alters called processors
The ferris-wheel subsystem
Data entry points
Testing alters to see if they can be used.
Assassination models (delta models).
Authority factors are maximized
Monkey alters.
Presidential models.
Prostitute models.
Reporting alters.
Repunzel alter.
Internal wall alters.
Structuring with the grand druid council.
Structuring the shadow alters
Structuring in the mirrors
Structuring the tapestry
Chapter 8: the science of body manipulation & programming
A. cranial manipulation
Cranial blood pressure has been kept a secret
Cerebral spinal fluid kept secret
The chinese secret occult society connection
The ancient egyptian connection
Another example
The japanese connection
The early european occult connection
Nineteenth century occult connection
The witchcraft connection
The modern american occult connection
Osteopathy and chiropractic
Bone & skull structure
Cerebrospinal fluid
Transcendental meditation (tm) & the hindu connection
The 3-in-one school connection.
B. genetic engineering
What we’ve covered
Chapter 9: the science of mind manipulation by psychological
Programming to hide revealing dreams
Programming language
Effects of programming
Perception clouds memory
Chapter 10: the 10th science — using spiritual things to control a
Part a. intro on the importance of spiritual programming tactics
Part b. the history of the programmed golem
Part c. the 3 foundations: loss of identity, fear, and demons
Understanding the relationship between fear & demons
Demon possession & spirit guards
The use of giving demonic assistance to entrap.
The use of occult focal points.
Does it glorify demons to cast them out?
Part d. a complete chronology of how the victim experiences the early spiritual
Part e. specific programming maneuvers. the manipulation of near-death-
Hiding the internal self-helper
Interject disks
White gold, other information
B. internal computers
Installation of the standard programming.
Front programs of front computer.
Programmer access to the computer areas.
C. internal hierarchies
The internal hierarchies form rationales
Chapter 12 science no. 12-external controls
Asset control
Building families and communities that have interwoven programming
Boarding schools & body programming.
When controls fail, the final solution.
Dirty psychiatrists involved with mind control
Dirty tavistock controllers
Remote viewing mind-research
List of programmers (continuation from the list given in vol. 2)
What to look for.
Michael aquino, a military/cult mind-control programmer
Personal history.
Understanding the church of set
Understanding some of aquino’s programming.
Sequelae of abuse
Appendix b. the programming sites
Appendix 3. clones, synthetics, organic robotoids and doubles
Summary of the four methods.
Section a. the "future shock" that this topic subjects the common person to.
Section b. instructions on how to clone a person.
A technique--instructions how to clone a human:
Section c. the four types of ‘clones’ that are used by the illuminati:
C3. organic robotoids.
How the memory of a person is transferred for the organic robotoids.
C4. doubles (look alikes).
Section d. secret cloning sites (see also appendix b, where d.u.m. bases are listed.)
Oregon’s underground secret cloning facility
Further investigations at dulce’s underground cloning facility


Share with your friends:
1   ...   268   269   270   271   272   273   274   275   276


The database is protected by copyright ©userg.info 2017
send message

    Main page

bosch
camera
chevrolet
epson
fiat
Honda
iphone
mitsubishi
nissan
Panasonic
Sony
volvo
yamaha