Glossary of how basic terms are used in this book introduction


UNDERSTANDING THE DEEPER MECHANICS of HYPNOSIS



Download 4.84 Kb.
View original pdf
Page47/276
Date07.11.2018
Size4.84 Kb.
1   ...   43   44   45   46   47   48   49   50   ...   276
UNDERSTANDING THE DEEPER MECHANICS of HYPNOSIS
Let us suppose for the sake of discussion that as you are reading this, it is supper time. You are hungry. You’ve starved yourself all day, and even though you are on a strict diet, you are trying to think of a good restaurant to go to. Now let’s see, as your mind scans the different possibilities, it thinks of some that are close, some that are quick. some that have lots of easy parking and others that have good looking waitresses. Mechanically, your thought processes went like this: a. Particular sensations and chemicals cause the mind to feel what it mentally describes as a pang of hunger.
This is perceived as an important need. b. The mind has a process that we can call an Intention System that creates specific intention messages that are sent throughout the brain. It stores these Intentions temporarily. If an intention is not freshly created and restacked at the top of the clutter of intentions in the intention store, then it gets buried underneath the "mind cluttered desk of things to do" and forgotten. In our example, the mind is searching its memory banks for options on how to satisfy its hunger. c. The mind must decide upon one particular course of action. The mind quits focusing on other matters, and concentrates upon deciding which course of action to take. The mind has now activated all kinds of what some researchers call "demons". Because we are not talking about spiritual demons, but rather we are referring to units of cognitive processes--which are very similar to UNIX computer demons--we will refer to these demons by the name "cognitive demon processes." Some of these cognitive demon processes are action demons and some are word demons, and some are recognition demons.
Recognition Cognitive Demon Processes go running through the mind, "shouting" the wishes of the Intention store. A number of lower level cognitive demon processes wake up and make themselves known if they identify with what the recognition demon is shouting about. Many may think they match the request, but other demon processes check them out to see how close they match. Now the checkers come up with a list of cognitive demon processes who are concerned with eating at restaurants, who have woken up and are all scrambling for attention. Cognitive demon processes establish themselves in families, and develop relationships that are automatic. (Cognitive Demons do not die, but some go to sleep and others can get somewhat rusty in their relationships.) The "demons" that respond to the shouting of our recognition demon go through a series of "interviews" with a hierarchy of other demon processes, and soon the messenger demon can rush back to the
Intention Store with the name of the choices available.
All this happens extremely quick. If the mind did not set up a series of automatic cognitive demon processes that become habits, (called K-lines) it would find itself involved in the conscious relearning of trivial matters that would make it impossible to get much accomplished. Every skill would have to be constantly relearned. A person might easily end up spending all day dressing. As long as the mind remains in a static environment, where habits work, it’s great. But life is such a changing environment, that our entrenched habits can cause the mind to pull up a cognitive demonic process out of habit, when it is neither wanted nor appropriate.
Emotions and needs (which are tied to our emotions) will trigger the mind to search out cognitive demon processes. For instance, if our emotional need for someone we are looking for is great, let’s say a wife waiting for a long expected war-husband, it may send a need down the brain for the cognitive demons that are attached to the identification of the long-awaited person, and the mind triggers itself to see his face in the crowd at the busy railway station before its owner arrives.
Page 50 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler
3/1/2007
http://www.whale.to/b/sp/springmeier.html


Cognitive Demon Processes live in close proximity to other demons, and when one gets excited, others in the area do too, although their excitement may be much less. If a cognitive demon is being used a great deal, it will be on its toes, but little used demons can go to sleep, and somehow need to be hollowed at very loud to wake up.
The Intention System after a while will set itself on autopilot for certain mental functions, which frees the conscious mind for other problems. The conscious mind can only focus on a small amount of material--it is like a computer which has limited memory. It is constantly in a state of redeployment, and the Intentions system has only a small sway over how the Attention part of the mind decides to focus. The Attention part constantly asks itself, which tasks can be relegated to habit. Then when the Intention system sends out cognitive search demons, they do not have to involve the conscious mind, because everything that is habitual is set up like a script, with families of "cognitive demon processes" already knowing the roles/relationships they are to play. (Again,
Behavior modification is used to strengthen the relationships of demonic processes, and to make some well used and awake, so that certain behaviors become habits.) When our minds meditate or go into a hypnotic trance, what is occurring is that our conscious mind is delegating its limited computing memory for the focus of its attention upon one object. What happens to the cognitive demon processes that would normally take instructions from the conscious mind?
During meditation the untrained cognitive demon processes bubble up to the top of the conscious mind.
However, the opposite happens during hypnosis. During hypnosis, the mind has made the decision (for whatever reasons) to accept control statements from the hypnotist. The mind has surrendered or at least temporarily or partially abdicated his or her position as the master of his or her Intention System. Some of this power is given away. The hypnotist now has access and control over many or all the cognitive demonic processes, including some that the person would not normally activate. Cognitive demon processes that are asleep or deeply buried can be accessed by the hypnotist, in a much quicker direct way than the Intention System would. By suggesting that the subject has a cat on his lap, the hypnotist is actually causing the recognition cognitive demon processes to wake up and act out their jobs to such an extent that the subject sees a cat. By suggesting that the subject’s body stiffen, the hypnotist has gained control over those cognitive action demons that cause the body to stiffen.
Age-regression brings up demons that are associated with the subject’s childhood.
Although it is unpopular to admit publicly that the hypnotist has power over the subject, a close look at the process of how hypnosis works at the neuronal "cognitive demon process" level shows that the hypnotist has indeed been given power. In fact, the hypnotist has been given power to activate cognitive units of demon processes that the mind itself would allow to remain inactive or asleep. The mind would not normally use its ability to activate them. Today, it is politically incorrect to admit that the hypnotist has power to make an individual do what they wouldn’t normally want to do, but unfortunately hypnosis does give this power.


Deeper insights into the illuminati formula by fritz
Chapter 4. science no. 4 - hypnosis
Chapter 5: science no. 5 - the skill of lying, the art of deceit
Chapter 6: science no. 6-the use of electronics & electricity
Chapter 11: science no. 11- internal controls
Appendix 1 - programmers/researchers
Section c. the four types of "clones" that are used by the illuminati,
Warning, read this first before reading the book.
Introduction by fritz
Glossary of how basic terms are used in this book
Chapter 1. science no. 1 - selection & preparation of the victim
Breeding good subjects for hypnosis-hypnosis as it relates to selection & preparation of the
Training the unborn child
Common illuminati work with twins
Selection of adult candidates for mind-control
U.s. govt. mind-control level 1.
U.s. govt. mind-control level 2.
U.s. govt. mind-control level 3.
U.s. govt. mind-control level 5
Testing young children to plan the programming.
Chapter 2.science no. 2--the traumatization & torture of the victim
Daily abuse works best for programming
Anger-management-programming traumas
Silence programming traumas to teach silence
Torture for no-write
A trauma to develop animal alters
Trauma to isolate the victim
Chapter 3. science no. 3 the use of drugs
Administration of drugs for programming
More programming drugs (these were not listed in the vol.2 formula book)
Stabilizing the programming
Extensive research done to influence human memory by drugs
The basic phases of memory
Hiding the codes
Programming with lsd-25 (lysergic acid diethylamide)
Chemically triggering natural instinctual drives
Sexual stimulation-programming
Understanding the basics about hypnosis
The power of hypnosis
Programming aids
Using holograms as an access aid
Preparing the brain
Early training for slaves
Magical training on the starlight level
The monarch programming script for over the rainbow
Deep trance programming
Color programming
The association of colorful sights, sounds, rhythm & dance.
Light & color
Special colors
Healing by correct vibrations & rays
Using hypnosis to heal the slave after abuse.
Hypnotic codes, cues and triggers
Monarch mind-control codes
B. beta (sexual)
C. chi (return to cult)
E. epsilon (animal alters)
I. janus-alex call backs (end-times)
J.>> omicron programming
M. songs & nursery rhymes
O. sample codes for alters.
P. catholic programming (by jesuits etc.)
Q. mensa programming (by mensa)
S. scriptures used in programming (cont. from vol. 2. chap. 10)
T. alien programming
Program codes during 1972-1976 for dr. green
The illuminati.
The establishment, the system.
Deception diminishes power
Be wise as serpents
Disinformation to make their double-agents look good
Names of types of disinformation agents
Tricking suspects
The names of deception tricks
One of the greatest deceptions of all time: disney
Observations about how the illuminati like to hide behind perfect
Contents in the disney deception section of chapter 5.
B. an overview
C. who was walt disney?
Personal details
Occult porn king
As a witness before congress
A possible chronology of events surrounding walt disney's illegitimate birth
Walt disney’s character
D. who was roy o. disney?
E. who was roy b. disney?
The battle between the two disney factions
F. what do we know about the disney family in general?
G. a history of disney
Claude debussy
Some disney people of interest.
Warren beatty
Stephen bollenbach
The tommy dorsey band
Rich h. frank
The osmond brothers
Michael ovitz
Frank g. wells
Some of disney’s blatantly occult movies.
H. disney & its mob connections
Some mob history.
How the disney executives have figured out how to steal land all across the u.s.
Disney and the government
J. disney & mind control
Disney vacations for the elite
Disneyana for the programmed & obsessed.
Mind-control features in disney movies.
K. detailed script on how the disney film fantasia is used for programming
Types of sources
Section e. auxiliary uses of electronics & electromagnetic waves
Glossary of terms for understanding electronic mind control
B1. three typical implant victims
B2. documentation of implants.
B3. gwen towers
Section c. specific implants
Brief chronology of audio implants
Basics of how the implants can function
Uses of the implants
Part. b. secretly implanted audio implants.
Cochlear implants
C2. body manipulating implants
C3. visual/holographic implants
How they work
Typesfiber optics
Artificial lenses
Holographic or h-insert
C4. memex/brain link implants
Interface devices
Organic bioprocessors linked to viruses
C5. torture/nerve & muscle stimulation implants
C6. tracking & i.d. implants
Section d. direct monitoring & manipulation of the brain/mind
Tesla waves used to read minds & implant voices
D2. voices / or thoughts sent electronically directly into the mind
Summary of elf wave mind control capabilities
Section e. auxiliary uses of electronics & electromagnetic waves.
E2. polygraphs for monitoring programming and mission accomplishments
Liquid crystals
Bed coils standardized for mind-control potential
E4. virtual reality.
Chapter 7: the science of structuring
A. structuring of mpd worlds
Control alters called processors
The ferris-wheel subsystem
Data entry points
Testing alters to see if they can be used.
Assassination models (delta models).
Authority factors are maximized
Monkey alters.
Presidential models.
Prostitute models.
Reporting alters.
Repunzel alter.
Internal wall alters.
Structuring with the grand druid council.
Structuring the shadow alters
Structuring in the mirrors
Structuring the tapestry
Chapter 8: the science of body manipulation & programming
A. cranial manipulation
Cranial blood pressure has been kept a secret
Cerebral spinal fluid kept secret
The chinese secret occult society connection
The ancient egyptian connection
Another example
The japanese connection
The early european occult connection
Nineteenth century occult connection
The witchcraft connection
The modern american occult connection
Osteopathy and chiropractic
Bone & skull structure
Cerebrospinal fluid
Transcendental meditation (tm) & the hindu connection
The 3-in-one school connection.
B. genetic engineering
What we’ve covered
Chapter 9: the science of mind manipulation by psychological
Programming to hide revealing dreams
Programming language
Effects of programming
Perception clouds memory
Chapter 10: the 10th science — using spiritual things to control a
Part a. intro on the importance of spiritual programming tactics
Part b. the history of the programmed golem
Part c. the 3 foundations: loss of identity, fear, and demons
Understanding the relationship between fear & demons
Demon possession & spirit guards
The use of giving demonic assistance to entrap.
The use of occult focal points.
Does it glorify demons to cast them out?
Part d. a complete chronology of how the victim experiences the early spiritual
Part e. specific programming maneuvers. the manipulation of near-death-
Hiding the internal self-helper
Interject disks
White gold, other information
B. internal computers
Installation of the standard programming.
Front programs of front computer.
Programmer access to the computer areas.
C. internal hierarchies
The internal hierarchies form rationales
Chapter 12 science no. 12-external controls
Asset control
Building families and communities that have interwoven programming
Boarding schools & body programming.
When controls fail, the final solution.
Dirty psychiatrists involved with mind control
Dirty tavistock controllers
Remote viewing mind-research
List of programmers (continuation from the list given in vol. 2)
What to look for.
Michael aquino, a military/cult mind-control programmer
Personal history.
Understanding the church of set
Understanding some of aquino’s programming.
Sequelae of abuse
Appendix b. the programming sites
Appendix 3. clones, synthetics, organic robotoids and doubles
Summary of the four methods.
Section a. the "future shock" that this topic subjects the common person to.
Section b. instructions on how to clone a person.
A technique--instructions how to clone a human:
Section c. the four types of ‘clones’ that are used by the illuminati:
C3. organic robotoids.
How the memory of a person is transferred for the organic robotoids.
C4. doubles (look alikes).
Section d. secret cloning sites (see also appendix b, where d.u.m. bases are listed.)
Oregon’s underground secret cloning facility
Further investigations at dulce’s underground cloning facility


Share with your friends:
1   ...   43   44   45   46   47   48   49   50   ...   276


The database is protected by copyright ©userg.info 2017
send message

    Main page

bosch
camera
chevrolet
epson
fiat
Honda
iphone
mitsubishi
nissan
Panasonic
Sony
volvo
yamaha