Glossary of how basic terms are used in this book introduction


ADMINISTRATION OF DRUGS FOR PROGRAMMING



Download 4.84 Kb.
View original pdf
Page35/276
Date07.11.2018
Size4.84 Kb.
1   ...   31   32   33   34   35   36   37   38   ...   276
ADMINISTRATION OF DRUGS FOR PROGRAMMING
The distribution into the brain of a drug is dependent upon many factors. Under microscopic-level inspection, one discovers a person’s brain is physically constructed to allow certain molecules to enter into the brain in certain complex ways. Just because a substance is put into the blood doesn’t mean it gets into brain tissue.
Researchers have discovered such drug properties such as lipid solubility, the ionization, its tissue-protein bonding abilities, and its molecular size all play a role in how well drugs get into the brain. Further, the
Cerebrospinal Fluid (CSF) which will be discussed indepth in Chapter 8 can play a role in drug absorption.
Several studies during the 1960’s showed that the removal of drugs or substances from the CSF, can reduce the effective concentration of a drug in the extracellular spaces which make up perhaps 12% of the brain’s volume.
These physical factors are not the only factors involved.
Researchers have repeatedly discovered that different people respond to mind-changing drugs in many different ways--including two different people having opposite responses to the same drug. There have been a number of studies about this phenomena, including: (SarwerFoner, 1957), (Henninger, et. al., 1965), (Rickels & Downing,
1966), (McNair et al., 1966). Over the years, it has been discovered that a person’s mental abilities, expectations, prior drug experience, age, sex, race, personality traits, and personality types can all potentially influence how a mind-altering drug will effect a person. For instance, a sedative drug administered to an extroverted confident athlete caused the athlete to feel anxiety and disorientation. In contrast, an introverted nervous intellectual felt calmness when the same drug was administered. Particle size of the drug and the rate of dissolution will help determine the rate at which a drug is absorbed (and eliminated) into the body. For instance,
Page 38 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler
3/1/2007
http://www.whale.to/b/sp/springmeier.html

when colloidal silver has been produced by a process that yields small particles, it will cleanse the body, while larger particles of colloidal silver will kill a person. Different companies and different preparations of the same drug may have different outcomes upon the body. The persistence of a drug in the body is calculated by programmers using half-lives of a drug. This means that at one half-life, one half of a drug is left in the body. At two half lives, one-half of one-half is left or (1/4). At three half-lives there will be 1/8 left of original drug. In other words, the rate of elimination decreases with time. When heroin is processed into morphine, its characteristics change. The heroin takes affect quicker, but doesn’t last as long as morphine. This is because of enzyme mechanisms in the liver and how they react to the morphine in contrast to the heroin. Different drugs react differently with the complex enzyme mechanisms of the liver. Phenobarbital amazingly increases the enzyme content of the endoplasmic reticulum with habitual use of the drug. Phenobarbital will then enhance a particular type of toxicity. Low doses do not hurt the body, but there is a threshold where damage from phenobarbital will begin occurring to the liver and kidneys. This is a sampling of why it is important that the
Illuminati use extremely skilled medical personnel in the application of programming drugs. The programmers are far more skilled than most legitimate therapists in understanding how much of what drug to give to which alter personality. The mental makeup of an alter will influence how that alter will respond to drugs. Some deeper alters can resist drug influence due to training. Some deeper alters are so fine-tuned that they only need small doses. With their superior knowledge of how a System of Multiple Personalities has been created within a victim’s mind, the programmers have a distinct edge over deprogrammers in how to administer drugs. On top of that the programmers, place in all types of programming to prevent anyone but the programmers (or approved people) from administering drugs. An example of how strong the mind can be over drugs--is when the programmers "SET THE STAGE", "PRESENT THE SCRIPT’ and then use Seconal to obtain deeply embedded programming commands. Setting the stage is a programming term for talking to the victim in such a way that the mind is receptive for what the programmer wants the victim’s mind to do. Presenting the script is the actual set of commands that the programmer gives to the victim. For instance, the programmer functioning as a hypnotist tells the victim that a powerful sedative will be given but that part of the mind will be strong enough to overcome the sedative effect of seconal. The victim is instructed "WHEN YOU HEAR THE WORD [trigger power code word, for instance: ZEBRA COME FORTH]...YOU WILL RESPOND TO WHAT I AM
SAYING." The seconal is given and the person is placed in an isolation chamber. A good programmer skilled in hypnotism can actually get a victim’s mind to respond under the influence of seconal in an isolation chamber.
Then the programmer will lay in deeply embedded commands while the person is in a sleep deeper than a twilight sleep. When the human body receives several different kinds of drugs, sometimes drugs compete with each other during the excretion/elimination phase. This may create a buildup or a retention of one of the drugs.
As discussed in Vol. 2, the programmers don’t like to use combinations of several drugs because it complicates things. There is still a great deal of unknowns concerning adverse drug reactions. Some people do not show an allergic response to a drug until it is administered several times. Because of the potential for allergic reactions or side effects, the Programmers are helped because the programming centers, according to ex-programmers are extremely well stocked with different drugs, & the Programmer can if need be shift to an alternative programming drug. Most slaves are programmed to stay away from the use of drugs, except those drugs that the programmer/handler approves. By reducing the use of drugs of all kinds, the problem of adverse drug reactions, and other complications is reduced for the programmers. Some people who are health freaks who stay away from drugs are actually carrying out a front program for their programmers.


Deeper insights into the illuminati formula by fritz
Chapter 4. science no. 4 - hypnosis
Chapter 5: science no. 5 - the skill of lying, the art of deceit
Chapter 6: science no. 6-the use of electronics & electricity
Chapter 11: science no. 11- internal controls
Appendix 1 - programmers/researchers
Section c. the four types of "clones" that are used by the illuminati,
Warning, read this first before reading the book.
Introduction by fritz
Glossary of how basic terms are used in this book
Chapter 1. science no. 1 - selection & preparation of the victim
Breeding good subjects for hypnosis-hypnosis as it relates to selection & preparation of the
Training the unborn child
Common illuminati work with twins
Selection of adult candidates for mind-control
U.s. govt. mind-control level 1.
U.s. govt. mind-control level 2.
U.s. govt. mind-control level 3.
U.s. govt. mind-control level 5
Testing young children to plan the programming.
Chapter 2.science no. 2--the traumatization & torture of the victim
Daily abuse works best for programming
Anger-management-programming traumas
Silence programming traumas to teach silence
Torture for no-write
A trauma to develop animal alters
Trauma to isolate the victim
Chapter 3. science no. 3 the use of drugs
More programming drugs (these were not listed in the vol.2 formula book)
Stabilizing the programming
Extensive research done to influence human memory by drugs
The basic phases of memory
Hiding the codes
Programming with lsd-25 (lysergic acid diethylamide)
Chemically triggering natural instinctual drives
Sexual stimulation-programming
Understanding the basics about hypnosis
The power of hypnosis
Understanding the deeper mechanics of hypnosis
Programming aids
Using holograms as an access aid
Preparing the brain
Early training for slaves
Magical training on the starlight level
The monarch programming script for over the rainbow
Deep trance programming
Color programming
The association of colorful sights, sounds, rhythm & dance.
Light & color
Special colors
Healing by correct vibrations & rays
Using hypnosis to heal the slave after abuse.
Hypnotic codes, cues and triggers
Monarch mind-control codes
B. beta (sexual)
C. chi (return to cult)
E. epsilon (animal alters)
I. janus-alex call backs (end-times)
J.>> omicron programming
M. songs & nursery rhymes
O. sample codes for alters.
P. catholic programming (by jesuits etc.)
Q. mensa programming (by mensa)
S. scriptures used in programming (cont. from vol. 2. chap. 10)
T. alien programming
Program codes during 1972-1976 for dr. green
The illuminati.
The establishment, the system.
Deception diminishes power
Be wise as serpents
Disinformation to make their double-agents look good
Names of types of disinformation agents
Tricking suspects
The names of deception tricks
One of the greatest deceptions of all time: disney
Observations about how the illuminati like to hide behind perfect
Contents in the disney deception section of chapter 5.
B. an overview
C. who was walt disney?
Personal details
Occult porn king
As a witness before congress
A possible chronology of events surrounding walt disney's illegitimate birth
Walt disney’s character
D. who was roy o. disney?
E. who was roy b. disney?
The battle between the two disney factions
F. what do we know about the disney family in general?
G. a history of disney
Claude debussy
Some disney people of interest.
Warren beatty
Stephen bollenbach
The tommy dorsey band
Rich h. frank
The osmond brothers
Michael ovitz
Frank g. wells
Some of disney’s blatantly occult movies.
H. disney & its mob connections
Some mob history.
How the disney executives have figured out how to steal land all across the u.s.
Disney and the government
J. disney & mind control
Disney vacations for the elite
Disneyana for the programmed & obsessed.
Mind-control features in disney movies.
K. detailed script on how the disney film fantasia is used for programming
Types of sources
Section e. auxiliary uses of electronics & electromagnetic waves
Glossary of terms for understanding electronic mind control
B1. three typical implant victims
B2. documentation of implants.
B3. gwen towers
Section c. specific implants
Brief chronology of audio implants
Basics of how the implants can function
Uses of the implants
Part. b. secretly implanted audio implants.
Cochlear implants
C2. body manipulating implants
C3. visual/holographic implants
How they work
Typesfiber optics
Artificial lenses
Holographic or h-insert
C4. memex/brain link implants
Interface devices
Organic bioprocessors linked to viruses
C5. torture/nerve & muscle stimulation implants
C6. tracking & i.d. implants
Section d. direct monitoring & manipulation of the brain/mind
Tesla waves used to read minds & implant voices
D2. voices / or thoughts sent electronically directly into the mind
Summary of elf wave mind control capabilities
Section e. auxiliary uses of electronics & electromagnetic waves.
E2. polygraphs for monitoring programming and mission accomplishments
Liquid crystals
Bed coils standardized for mind-control potential
E4. virtual reality.
Chapter 7: the science of structuring
A. structuring of mpd worlds
Control alters called processors
The ferris-wheel subsystem
Data entry points
Testing alters to see if they can be used.
Assassination models (delta models).
Authority factors are maximized
Monkey alters.
Presidential models.
Prostitute models.
Reporting alters.
Repunzel alter.
Internal wall alters.
Structuring with the grand druid council.
Structuring the shadow alters
Structuring in the mirrors
Structuring the tapestry
Chapter 8: the science of body manipulation & programming
A. cranial manipulation
Cranial blood pressure has been kept a secret
Cerebral spinal fluid kept secret
The chinese secret occult society connection
The ancient egyptian connection
Another example
The japanese connection
The early european occult connection
Nineteenth century occult connection
The witchcraft connection
The modern american occult connection
Osteopathy and chiropractic
Bone & skull structure
Cerebrospinal fluid
Transcendental meditation (tm) & the hindu connection
The 3-in-one school connection.
B. genetic engineering
What we’ve covered
Chapter 9: the science of mind manipulation by psychological
Programming to hide revealing dreams
Programming language
Effects of programming
Perception clouds memory
Chapter 10: the 10th science — using spiritual things to control a
Part a. intro on the importance of spiritual programming tactics
Part b. the history of the programmed golem
Part c. the 3 foundations: loss of identity, fear, and demons
Understanding the relationship between fear & demons
Demon possession & spirit guards
The use of giving demonic assistance to entrap.
The use of occult focal points.
Does it glorify demons to cast them out?
Part d. a complete chronology of how the victim experiences the early spiritual
Part e. specific programming maneuvers. the manipulation of near-death-
Hiding the internal self-helper
Interject disks
White gold, other information
B. internal computers
Installation of the standard programming.
Front programs of front computer.
Programmer access to the computer areas.
C. internal hierarchies
The internal hierarchies form rationales
Chapter 12 science no. 12-external controls
Asset control
Building families and communities that have interwoven programming
Boarding schools & body programming.
When controls fail, the final solution.
Dirty psychiatrists involved with mind control
Dirty tavistock controllers
Remote viewing mind-research
List of programmers (continuation from the list given in vol. 2)
What to look for.
Michael aquino, a military/cult mind-control programmer
Personal history.
Understanding the church of set
Understanding some of aquino’s programming.
Sequelae of abuse
Appendix b. the programming sites
Appendix 3. clones, synthetics, organic robotoids and doubles
Summary of the four methods.
Section a. the "future shock" that this topic subjects the common person to.
Section b. instructions on how to clone a person.
A technique--instructions how to clone a human:
Section c. the four types of ‘clones’ that are used by the illuminati:
C3. organic robotoids.
How the memory of a person is transferred for the organic robotoids.
C4. doubles (look alikes).
Section d. secret cloning sites (see also appendix b, where d.u.m. bases are listed.)
Oregon’s underground secret cloning facility
Further investigations at dulce’s underground cloning facility


Share with your friends:
1   ...   31   32   33   34   35   36   37   38   ...   276


The database is protected by copyright ©userg.info 2017
send message

    Main page

bosch
camera
chevrolet
epson
fiat
Honda
iphone
mitsubishi
nissan
Panasonic
Sony
volvo
yamaha