The Illuminati Formula to Create an Undetectable
Total Mind Control Slave
CHAPTER 11 INTERNAL CONTROLS
By Fritz Springmeier & Cisco Wheeler
A - TEACHING OCCULT PHILOSOPHIES
Learning plays an important part in perception. The Programmers
try to get their victims to subscribe to philosophies and ideas that will
make it hard for them to rebel against their controllers. This is what is
termed indoctrination. The same methods of teaching that others find useful
are employed. Ways of thinking are incorporated by the slave via handlers,
programmers, and the cult they belong to. Everyone tries in their own way
to make sense of life. This is a natural brain function, so that the human
mind can understand how to deal with the future. The mind takes raw data,
and then applies some type of logic, and comes to conclusions. Once accepted,
these conclusions can be as hard as nails, and they will defy any attempt
to change them, even in the light of new evidence. If the Programmer is smart
enough, he can get an alter to logically believe anything. Once the belief
is embedded, it will remain there tenaciously. In the Illuminati, ‘great”
masters and adepts teach “hidden mysteries”. The slave feels the
authority that emanates from this teacher with special gifts and abilities.
The slave is hardly in a position to question the teachings being given from
on high. Circular reasoning, lies, and other tricks are used to convince the
person that the occult world is true. For instance, “God abandoned you,
therefore you need to cling to us, the only ones who would see any use in
you.” (The truth is that the cult staged a crisis where their actor
playing God abandoned the child to the cult’s abusiveness. The whole
event was simply cult abuse--with God taking the blame.) “We are trying
to fashion a better man, a man with far more capabilities than before, with
better genetics. Those who oppose us, are trying to keep humankind back in
the dark ages.” This is circular reasoning and outright lies. (They
are not interested in helping mankind, only destroying it.) To make occult
philosophies more palatable, the occult world attacks the character of anyone
whose life would dispute their false claims. They also use a great deal of
rationalization, where the end justifies the means. Many slaves have had to
sit and listen to their masters rationalize their brutality. Within the Illuminati,
ranks are achieved with much learning and ritual.
Within the Temple of Set, a member is required to read certain books. Fritz,
the co-author has a list of books a Temple of Set member is asked to read,
with the comments attached by the Temple of Set to each suggested title. In
their suggested/required reading Category 19 entitled “The Metamind”
is Metropolis by Thea von Harbou. Their comments are “An Expressionistic
portrait of a negative utopia in which humans are controlled by machines..
.the basis for many electronic/audio-visual ritual techniques employed by
the Church of Satan and further developed by the Temple of Set.” (p.
C21-2) Another is Physical Control of the Mind: Towards a Psychocivilized
Society by Jose M.R. Delgado. Their comments, “Delgado, Professor
of Physiology at Yale University, is one of the most distinguished authorities
in the field of Electrical/chemical Stimulation of the Brain (ESB). This book
is necessarily dated, but it is so well-written that it deserves to be perused
as a preface to more recent works on the subject.” (p.C-16?-2) The
Psychology of Anomalous Experience by Graham Reed. Their comments, “This
book addresses unusual, irregular, and puzzling experiences- deja’vu,
illusions, delusions, hallucinations, etc.-in terms of the mind’s normal
psychological processes of gathering, monitoring, processing, and storing
This is just a brief look to illustrate to the reader that leaders of groups
like the Temple of Set are avid students of mind-control. (An almost complete
membership list of this group at one point in time, is provided in Appendix
A.) The librarian of the Multnomah County Detention Ctr. shared with co-author
Fritz that Sheila, formerly second-in-command of the Bhagwan
Shree Rajneesh’s commune at Antelope, OR studied, via jail/prison
interlibrary loan, books on Hitler’s mind-control techniques. Many other
examples could be given of how mind-control is being studied and taught by
One more book on the Temple of Set’s reading list would be worthy to
point out, The Psychology of Man’s Possible Evolution by Peter
D. Ouspensky. Their comments, “Should be read especially by those members
whose magical ability is hampered by flaws in their balance factor....A series
of lectures which explain the Gurdjieff approach to the concept better than
G. himself was able to do.” There is an important link between Gurdjieff,
mind-control, MPD, etc. but the subject is big and needs to be further investigated.
Co-author Fritz has been investigating this link, including talking with leaders
of the most successful Gurdjieff commune. As with so many groups, what you
see, is not what you get.
TEACHING THE IDEOLOGIES OF WAR
One of the ways to control a person is to get them angry and then channel
that hate. Wars have been used for centuries by the oligarchies that run things
to control their people. Right now, the New World Order is carrying out a
Drug War, an Environmental War, and a Bosnian conflict for the express purpose
in their own plans to control us. They have a mock-alien invasion
planned to further justify more control over our lives. Over the
years, mankind has created an entire industry around warfare. There are long
traditions within military units, that for some reason must be “upheld”
by the men who serve in those units. When people buy into the philosophies
of war, they can generally be persuaded to give up or do anything to contribute
to that war. After all, any sacrifice will be minor compare to the large numbers
of bodies that will end up dead. One of the large purposes of the Monarch
type of trauma-based mind-control is to produce robotic soldiers who will
do anything. Normal military training is usually sufficient for most military
needs, so it is clear that Monarch slaves have some ulterior uses that the
military doesn’t want the public to know about.
VARIOUS DELTA FORCES
The military as well as other groups have created numerous delta teams, delta
forces, delta groups etc.
DELTA ASSASSINATION TEAMS
These teams are projects that the Satanic Hierarchy and the CIA collaborated
together on. The programming that was placed into people was ingenious and
very complex. As the program progressed over the years, the programming became
more sophisticated and past mistakes were improved upon. The Delta Teams were
programmed to carry out various assignments such as political assassinations.
The members of these teams are housewives and other ordinary people who
were programmed years ago. The Delta Teams are part of the CIA’s
psychic warfare bag of tricks. The CIA works so closely with the military
that the Delta Force is easily expected to be tied in with the CIA & U.S.
The system tapped Frank Burns to create the Delta Force.
Frank Burns was a Green Beret. What kind of things did Frank get involved
with AFTER joining the military? Hold on. Frank Burns was an SDS (Students
for a Democratic Society--an Illuminati organization) organizer.
He was also deep into Zen Buddhism, which is the same as mysticism. Frank
Burns as an officer also studied under the Esalen Institute.
The Esalen Institute is at Big Sur, California and is the American equivalent
of the infamous Tavistock Institute. The Esalen Institute created “sensitivity
training” programs for the business world under the title “Organizational
Development (OD). Esalen people were brought in to Fort Ord where Frank Burns
was the commander and began training people. The army promoted Burns to work
in the Chief of Staffs office as an “senior organizational effectiveness
consultant”, which allowed Burns to introduce Esalen programs all through
the army. This could not have accidently happened. Frank Burns in a conversation
with a two-star General about the need for “wholistic” soldiers
coined the slogan “Be all that you can be in the army.”
Burns phraseology began the army’s recruiting slogan. It refers to the
Human Potential Movement that the army has incorporated from the New Age movement.
The army is moving toward becoming an occult fighting force that practices
witchcraft with its warfare. Some of the units moving that direction are
Psy-Op operations, which has included Satanists within its officers. The Delta
Force network of various Generals and other high ranking officers is merely
one facet of the drive by the Illuminati to transform the American army into
something akin to occultic warriors that will be as fierce as the Nazi Death
head units. Bear in mind that George Bush, commander-in-chief of Burn’s
Armed Forces has come from an Illuminati family/ & the Ill. Skull &
Bones chapter that was part of the secret support for Hitler. They have been
using as an insignia that they themselves (the Skull & Boners) call “the
Death Head”. It is not surprising then that support for the Delta Team
activities has come from the very top. Frank Burns set out to create a warrior
monk. Lt. Col. Jim Channon, in Delta Forces, also put forward
the idea. Channon visited more than 130 New Age groups in California doing
what was called “social experimentation.” It is an idea that the
occult have repeatedly carried out. Hitler’s S.S. were an special elite
group of warrior monks from which about 3,000 went through religious initiations.
(As the war progressed the primary focus of the S.S. shifted from being the
Black Order to merely being a reliable military group called the Waffen SS.)
There were 3 levels of initiation, the last reserved for the hard-core Satanists
at the top. The Nazi initiation seems to have been an attempt to get the force
of the Vril. The Ordensburgen (Castles of the Order) were training centers
for the elite Nazis, including the S.S. (Having been in the military, I know
first hand that the success of the S.S. and Waffen S.S. units in being fierce
warriors is attributed by some of our leading military men to their training
to be warrior-monks.) One group of the S.S. called Knights of Poseidon
volunteered themselves for castration, in an experiment to change them back
to the supermen of the mythical and magical Hyperborea. Some of the best Sufi
organizations were warrior monks. Burns and his Task Force Delta generated
the First Earth Battalion, which is an occult military
unit trained in martial arts, and witchcraft. Men who are selected
for First Earth Battalion are given an occult initiation which includes the
“I have the capacity and therefore the duty to contribute to
the development of myself, my associates, and our planet, simultaneously
now! I take personal responsibility for generating evolutionary conspiracies
as a regular part of my work. I will select and create conspiratorial mechanisms
that are not costly in time or resources because I am aware of the five
channels available to me (such as radio, television, and word of mouth.)
I will organize a self-supporting high commando group that will create and
perform evolutionary breakthrough actions on behalf of people and planet.
One people, one planet. I will then pass this concept on to others who are
capable of generating further self-organizing commando teams."
What ever happened to defending this nation? Military units such as the First
Earth Battalion although they are supported by American tax dollars are not
here to protect America. They are global minded. They are here to protect
an occult world government. They are out there actively promoting the
New World Order. Several years ago, Egendorf states that $4.5 million (which
came from you and I, and other Americans) had already been spent on Delta
Force’s 80 different projects. The Green Beretsis
another organization that has been heavily targeted by the Satanists, to indoctrinate
and recruit. The Green Berets are increasingly moving toward being warrior-monk
group. Many of them are now programmed multiples.
One man who is being looked up to by many American Patriots and Christian
Patriots as the leader to help them oppose the New World Order is Bo
Gritz. He was a recent presidential candidate. Bo Gritz was
a Green Beret and a Delta Force commander. Bo Gritz is very proud
of the fact that he wrote the manual for the Delta Forces. He also
worked for the CIA. Bo Gritz is one of the military’s best
programmed multiples, and perhaps one of the most dangerous. Insiders
have told me he IS the most dangerous. Numerous insiders both for and against
Bo, have talked about Bo Gritz, and that he is a programmed multiple.
According to Bo Gritz’s campaign literature for President he was a
commander in Delta Forces. Reproduced on a previous page is Bo’s own
presidential campaign literature where he states that he is “Intelligence
Officer & Reconnaissance Chief, Delta Force.” He is also “Chief,
Special Activities, U.S. Army General Staff, the Pentagon” and “Principle
Agent, National Security Council, Intelligence Support Activity”. Under
qualifications Bo states that he is a “Security & Counter-terrorist
Specialist.” Within the government, they are already referring to Christians
who are against the NWO as terrorists. Bo is their greatest counter-intelligence
counter-terrorist they have. He came in like a storm and took control of the
Patriot movement, and it has been like pulling teeth to warn patriots about
who he is.
Bo Gritz himself was a Green Beret, and was used to assassinate 300 people.
His blood lust caused him at one point during the Vietnam War to shoot 30
prisoners in cold blood. I also heard Bo talk about say being Temple recommend
Mormon. That means he was at that time in good standing with the LDS [Later
Day Saints] Mormon church so that he could go to the Temple and participate
in its rituals. Those who are alert realize that the temple rituals are like
Masonic and Witchcraft rituals. Now he is no longer a Mormon, but he still
continues in the military philosophy he believes in. Bo Gritz is going around
the nation teaching SPIKE training to anyone who wants martial arts skills.
Bo has done an excellent job in identifying for the New World Order every
person in the nation who could threaten their plans for a martial law NWO
Bo Gritz likes to call attention that he is one of this country’s foremost
counter-terrorist agents. This is true. The New World Order believes patriots
and Christians are terrorists, because they stand in the way of the world’s
acceptance of their world dictator. Bo Gritz has done a great deal to infiltrate
and neutralize the opposition to the New World Order. He has been their
best counter-terrorist agent.
B - INTERNAL COMPUTERS
PERFECT DELEGATION; INTERNAL COMPUTERS WHICH AUTO-CONTROL A SLAVE
If a master has to constantly spend time whipping and motivating his slave,
as well as forever watching that the slave doesn’t escape or do shoddy
work, or physically or verbally injure the master, then controlling the slave
can end up to be a full time job. When the master gets too much involved in
the control process, he ceases to be master, and becomes a slave to the control
process. The intelligence agencies knew that they would have to create mind
control slaves who could police themselves. If the master has to constantly
guard his slave, the slave will be more trouble than he is worth. Many successful
people have gained their success because they knew how to delegate. The most
successful supervisor is the one who can delegate the best. The programmers
had to find ways to cut their supervisory requirements to the bone if they
were to make owning a Monarch slave worthwhile. The method chosen was to build
“computers” into the slave’s mind that would internally
They do this by taking hundreds of the alters and dehumanizing them and turning
them into parts of a computer. For instance, the shutter on the All-seeing
eye of the computer, which is seen in the mind like a camera shutter, is a
child alter who job is to open and shut. (Another primal part is inside the
eye’s pupil.) This shutter part knows what goes on in all the system
subconsciously but if discovered by a therapist and pulled to the front of
the mind will not be able to vocalize about the system. The software for this
“computer” could be programmed into it, and all the individual
programming of every alter can then be tied back to the computer. In other
words, each alter would be programmed on how to view life, to act, to think,
and to function in their job. This programming would be linked to a computer.
The programmers invented the perfect method to decentralize their control
over their slaves and yet still supervise with the tightest of control.
Each alter is linked to a computer (internal-not an external one) built from
a foundation of fear and trauma. Since each section of alters was to remain
secret, each section of alters for a slave is given its own computer, and
then linking computers were built to link the various sections, and then finally
a major backup computer is built, and then finally the internal Beast computer.
Bear in mind that this is all built internally in the mind of the victim.
We are not talking about actual physical computers built out of physical microchips,
wires, condensers etc. If the programmer concentrates on a single point when
giving instructions he will get better results. Rather than complicating things
for the slave, you gain power over the slave (and any subordinate) if you
can give simple clear instructions. For this reason, a large share of the
alters in an alter system are given very clear straight forward jobs.
Because their jobs are so straightforward, these alters will often remain
fragments, rather than alter parts with full blown personalities. The programmers
don’t cloud the issue. An undeveloped alter will be given one single
clear, basic job. By stringing 1,000’s of alters together with single
tasks, a highly sensitive system of alters can be created. Each piece of the
System is separated by some degree of dissociation to make it a separate piece.
By dividing the mind so much, it is incapable of fighting what has been done
to itself. Before we begin describing the technical details of an internal
computer, bear in mind that every Monarch System is unique and yet they all
follow certain patterns & methodologies. Most of the models for the first
few decades follow these patterns, some of the newer ones have more updated
In an Illuminati System, a computer is created for each section of alters.
That computer will be given a “power source”, which if unscrewed
like a light bulb will go out. The light from one of these power sources might
be emerald blue or emerald green or other color. The reader may want to refer
4 for the codes to understand the structuring of the various computers
COLOR CODES & RIBBONS
In a standard 13x13x13 Illuminati alter system, 13 colors were used, and each
computer was given a color. These would be pink, orange, yellow, white, red,
brown, blue, green, black, purple, silver, gold and platinum, and clear. Color
programming is reported to have been developed at UCLA. Whatever
the case, Systems all over the United States have color programming. The hierarchy
of colors in a System is often as follows (from top power down): Platinum,
Gold, Silver, Purple, Black, Red, Green, Brown, White, Orange, Yellow, Pink.
Clear is also used as a color for secret areas of the system. This hierarchy
of color coding can be switched. The internal programmers can reassign colors
if they need to, in order to protect the programming. Alters, sections, and
parts of the computer are all color coded. The color coding for alters is
not the same just because the alters are in the same section. The color coding
within the Illuminati Mind Control is fairly consistent, however a sample
of an alternative Illuminati color scheme will also be provided.
A survey of colors is as follows:
CLEAR. Secret or shell alters who can take on any color are coded clear.
These are alters who serve as images or as a stage for other alters. This
would include “Guardian of the Vail” alters.
GOLD. This color is for the supreme leadership in the System, which includes
the Grand Druid Council.
SILVER. This color is for the Satanic alters who perform high level Satanic
rituals. The Mothers of Darkness have silver coding.
PURPLE. These alters see themselves as the abusers, rather than the Illuminati.
These alters were involved with the programming. They have been taught to
forget the abuse and to reframe it in their mind as training.
BLACK. These alters were born out of Satanic ritual, and are Moon children.
The Delta and Beta alters are black coded. They do the dirty work for the
cult, such as blackmail and assassination.
RED. These altars see themselves as witches. They were born out of witchcraft
ritual, believe they have great spiritual power, and tend to deny that they
have been abused.
GREEN or EMERALD GREEN. These cat altars recognize they have been abused.
They still see themselves as belonging to the cult family, and deny that
they have been abused to protect their cult family.
BLUE ALTERS. Clones, armies and the ribbons appear to have blue coding.
These alters will go so far as to hurt the body to protect it from leaking
information or deprogramming.
WHITE. ‘These are Atlantean alters who have been given Aryan type
racial nonsense to think they are superior. They believe in genetic engineering,
and a master race.
ORANGE. These special protector alters are scouts who warn of danger from
internal or external threats.
YELLOW. These are the strong Christian alters of which there will only
be a few in the System. They help serve as a balancing point to control
the System as well as to hide what the System is all about.
PINK. These are core related alters. They maintain the true feelings of
the true self apart from the cult programming and the cult family’s
programming. These alters are viewed as weak because they are emotional
and often break down and weep. They are fragile emotionally.
An alternative color scheme that is used:
DARK EMERALD GREEN. This color is assigned to the AntiChrist-Satan alter(s).
Green is the occult color for Satan and happens to be the most sacred color.
Few people outside of Satanists know that Green is more sacred for them
than any other color.
LIGHT GREEN. The gods and goddess alters which are triads which function
Illuminati ceremonies get this color coding.
WHITE. The internal programmers who come around in white robes get this
color assigned to them, as if they are doctors or angels of light.
RED. Sexual alters are given the natural color of sex and arousal red.
BLACK. Connecting alters that are Nexus alters between various system
PINK. Reporting alters.
DARK BLUE. Non hierarchy cult alters.
LIGHT BLUE. Alters in charge of the way the system runs, such as the judges.
YELLOW. Alters which are ritually and sexually twinned with alters of
ORANGE. Guard alters which are heavily programmed for obedience.
VIOLET-PURPLE. Front alters and small child alters placed into boxes.
CLEAR. Shell alters to deceive the outside world.
GOLD. The traumatized alters upon which the programming is built on.
Joseph Mengele and the programmers who worked with and under him, used
a large dollhouse with 26 rooms. Each of the rooms were painted with one
of the 13 different colors in order to build into the
child’s mind, the 13 front and the 13 back computers. The internal
computers worked off of color codes, as well as other codes. A dollhouse was
used to instill into the child’s minds the compartments of the computer.
Each room was done up in a different color. One particular room was
a secret room, and this represents the secret world of Petra
which is hidden behind two large rocks. This secret world is coded the color
clear. Besides the special color clear, the following colors appear in the
system: Gold, Silver, Purple, Black, Red, Green, Blue, Brown, White, Orange,
Yellow, and Pink. Each color has meaning and a rank. Just as the hour glasses
could be turned, the color coding can be switched in rank. This is why in
some systems there is a “Computer Operator Black”, a “Computer
Operator Green”, and a “Computer Operator Purple”, etc.
During the programming a black box with needles and wires which attach to
the body for electroshock is used. While electro shocking the victim, colored
scarfs coming out of a box are shown to the child.
The scarfs would help form the imagery needed to build colored ribbons
internally. Alters would be created using the Tall Book of Make
Believe story of the Pancake people. Using this as a base or foundation,
the alters would then be dehumanized one step further into thinking they
were ribbons--such as ticker tape, which could transmit information from
one computer to another area of the mind. The Ribbons had the ability to
travel between the different levels and to transmit messages through the System,
especially to the computers. It is believed they could do this because they
were spirit. When a System is accessed by a programmer, one procedure is to
obtain a Ribbon alter and then inform the Ribbon what he wants. The ribbons
transmit messages to the internal computers. The ribbons on older systems
use morse code. Who are the Ribbons? The Ribbons are the beginning of the
Luciferian alter-like demons and alters. They are primarily the message bearers
from the computers to the different computers, levels and alters. The Ribbons
might have angelic names (Michael, Gabriel, etc.). The word angel means messenger.
The ribbons serve a very similar function. They transmit ticker tape with
morse code messages. They are at work most of the time for a System.
A sample cover story for what they guard--which is the main computer with
the gems and the core, is that the ribbons guard the System’s “Garden
of Eden”. Some more of the cover story that may be given is
this: Ribbons were supposedly formed out of the dust of the ground and were
placed in the Garden of Eden to create every pleasant tree. (See Genesis 1.)
The ribbons relate to the Tree of Life. But to eat of the Tree of Knowledge
of Good and Evil will cause death. The name of the first river of four in
the garden is Pashon. Out of the first river come four heads. The River Pashon
has gold, ballium, onyx, rubies, diamonds and precious stones. These gems
are the programs the dwarfs mine. If the System has charismatic programming,
the alters will have porcelain face programming. In this case each ribbon’s
color will match the color of the stones in the masks--that is yellow, white,
blue, green, purple, red and black. The colors of the ribbons correlate or
match the colors of the Dollhouse rooms. What do ribbons do? The Ribbons serve
the programmers and the computers, who in turn serve the evil master Spirits.
Things that the Ribbons do for the computers have been identified as follows:
a. The Ribbons eat from the system’s internal “Tree of Good
b. Ribbon programming consists of several things--where they reside, who
they are and what they are to protect.,
c. Ribbons must protect the computers in order to protect their own life.
The Ribbons will be programmed to believe that reversing the computer will
reverse the Ribbons’ life. The ribbons themselves operate with mechanical
hearts (not human hearts). The cover stories may include the following:
All Ribbons are hid behind a little girl, who is a front for them &
who tells the creation story. The little girl will tell the creation story
which included the Ribbons. Behind her runs a silver cord. The silver cord
has to do with heart programming. The silver cord has 3 strands that cannot
be broken as per ECL 4:12. This silver cord goes off if the Ribbons are
touched. Ribbons are set up so that suicide programming is triggered if
they are cut. Actually, french braiding conceals a 4th strand.
In review as stated, during the programming, a box with colored scarfs was
shown the child while severe electro-shock was given to the body. A colored
scarf represents a ribbon which runs a message from a colored room to a similar
colored alter. In a System which is structured into families and cities and
worlds and sections, these “geographically different” structures
in the mind of the victim can be connected via the color coding. In other
words, the alters are structured into a 3-D cube structure. Then a fourth
dimension (the color coding) is added to tie in all of the three dimensions.
A central computer was placed in at the bottom of the mind. Using various
techniques the victim is brought to the deepest altered state possible, and
a computer is built into the mind via hypnosis and alters. This can be done
by freezing the entire body and just keeping the head active. Or it can be
done by bringing the body to a comatose state where the heart is beating faintly.
This step can only be done under the strictest medical supervision. The memory
storage area for the computers include the Emerald City Library
(staying with the Wizard of Oz theme) which contains alters who only function
is to memorize & retain with photographic memories, pages and pages of
information. The layout with codes of the entire system can be stored in a
storage bank, so the programmer could access this area if his own records
were lost. The libraries contain the historical genealogies of satanic
iniquity from early ancient times to present. This ancient occult information
has been reported by at least half a dozen Illuminati slaves as being retained
internally by demons.
HOW MONARCH SLAVES ARE BEING DESIGNED TO INTERFACE WITH THE UNIX SYSTEM OF
THE BEAST COMPUTERS
In line with what is being done by the Illuminati around the world with their
network of computers--the computers have access codes similar to 666 666 666,
and back out and close down codes similar to 999 999 999. These are the codes
that the UNIX universal system uses, and the Monarch slaves are being created
with codes that interface with the UNIX system for computers. (On some systems
if the computer is shutdown it will request an input code of 666fff666fff666fff666...This
can then be reversed F6F6F6F6F6F6F6F6F6F6.) The UNIX system is being used
to allow the New World Order’s big BEAST computers to communicate with
any known computer, including the minds of their Monarch mind-controlled slaves.
In the 1960s, the U.S. Department of Defense began linking computers together
into a superhighway now developed into the Internet.
Hundreds of thousands of computers around the world are tied in. Like buildings
in a city, each computer has its own unique address. Most of these addresses
are registered at the Network Information Center in Menlo Park, CA. Individuals
can also be registered at the NIC too. The U.S. Military links into the system
with their Arpanet and Milnet networks, which tie together such divergent
things as MIT computers, West Point computers, NORAD computers, Alr Force
Systems Command Space Division computers at El Segundo, CA and U.S. Army DARCOM
at Seckenheim, Ger. (to name a few). These are all being tied together to
form one vast electronic brain. There are nine secret BEAST computers
of the New World Order, at the time this was written. “Big Bertha”
is the nickname of the BEAST computer located at the secret military installation
called Dreamland at the secret Groom Lake, NV test site facility. Papoose
Lake is referred to as S-4.
The other super-secret facilities in the area are named S-2, S-6, and S-66.
This area has become the Illuminati’s prime programming facility for
turning out Monarch slaves, and the Monarch slaves which are turned out from
this area have turned out to be the worst basket cases. In other words, the
programming is very severe which is carried out in this area. This area has
also been used for the space program, for the U-2 & SR-71, for the CIA’s
A-12 spy plane, for the Stealth fighters (Lockheed F-1 17A Attack plane) and
bombers, the Aurora, and for the U.S. government’s “Above Top
Secret” flying saucers. The Big Bertha computer (named after the Illuminati
Mother-of-Darkness Bertha Krupp) can be talked to in half
a dozen languages and will answer a person back in the language they speak.
On a daily basis, airplanes fly into the Groom Lake facility. The callname
of flights bringing workers and people go by the call name “Janet”.
About 12 Janet flights come into the facility everyday. These flights are
usually Boeing 737s and arrive from places like a secure terminal run by EG&G
at McCarran Alrport in Las Vegas and from the military’s Palmdale, CA
facility. These 737s are unmarked except for a red stripe running down the
fuselage. Large military C-130 arrive with cargo, and Illuminati dignitaries
arrive in smaller twin-engine craft. Victims for the programming are brought
in via planes, & other routes.
One of the BEAST computers occupies three floors of the headquarters of the
European Economic Community building in Brussels, not far from the important
Illuminati Mother-of-Darkness worldwide headquarters castle near the France-Belgium
border near Muno, Belgium. Another BEAST computer is in Luxembourg.
In observing the operations of the Illuminati, it has been seen that telephone
area codes are used as part of a mind-controlled slave’s code. We do
not understand everything about their codes, but it does tie in with other
things that are happening. Every person in the world has been assigned
an 18 digit tracking number, which consists of 3 groups of 6 numbers.
The first 3 numbers assigned in the BEAST computer to everyone are 666. The
next is one’s national code. The U.S. national code is 110. Then the
next 3 numbers are you telephone area code, and then finally your 9 digit
Social Security number. The code then is 666 + Nation code + Tel. area code
+ social security no. = BEAST I.D. no. for an individual. According to Dwight
Kinman’s book The World’s Last Dictator, 2nd ed., (Woodburn,
OR: Solid Rock Books, p. 256) VISA has already begun issuing VISA cards using
the BEAST 18 digit number.
When an American makes a bank transaction on an autoteller within a matter
of seconds, the BEAST has been informed of the activity. These computers use
UNIX. The particular programs for the economic transactions just described
are a worldwide computer network called SWIFT (Society For Worldwide Interbank
Financial Transactions). The SWIFT works off of the UNIX system and can communicate
with any computer. It was developed by AT&T and uses C language. (Bear
in mind that there are dialects of UNIX, such as the standard AT&T UNIX
and for instance Berkeley UNIX. The UNIX system uses both timesharing and
multitasking. The mind of a Monarch slave also does both multitasking and
time sharing. One of the nice UNIX features, is “protected memory”,
which is also part of the Monarch programming. A kernal is
what the UNIX programmers call a “protected person”. It is very
similar to the internal “person” (alter) who helps the Monarch
slave’s programming functions. The big item about UNIX is that it has
permissions granted. This is similar to the Monarch programming. Permissions
are granted to 3 types of entities. The Top Programmer or “god”
as he is called, of the UNIX System receives what is called the individual
The next permission is called group permission, and it is given to insiders
who work with the system. The final permission type is the world, which has
very limited access. The parallel between this and the Monarch programming
is surprising. In some cases the programmers may have matched things on a
one-to-one correspondence. The Monarch program also has a Top Programmer who
is called “god” to the System. He has total control over the system.
His programming permissions can not be deprogrammed out by others who might
want to usurp his power. Hidden from the casual user of the UNIX system are
the Daemons and Demons. The UNIX programmers decided to use the old english
spelling for demon = Daemon. These are computer processes which work secretly
behind the scenes and are given actual demonic names--some corresponding to
actual names of historically known demons, such as Asmodeus. Asmodeus
is also a demon which is placed into many Monarch slaves. In the UNIX system
these demons are treated like persons in the computer’s user director.
Demons in the computer system do not have to log onto the computer, but they
work behind the scenes and are given the same powers that people users are
They are set up in the same structure as how the computer treats people.
Permission in the UNIX system is granted using an 8 bit count with 0 through
7. The three kinds of permission are the read, write, and execute permissions.
If no permission were granted in any way the UNIX system would indicate”
“on the screen which means 000000 000 or nine 0’s. The super user
called god is given the code 777 which means super user. However, the permission
of 666 gives the user the power to everything the 777 permission gives, except
that the 777 permission allows the god the master programmer) to execute not
executable programs. The Postmaster Demon is the head demon, and his permission
level in UNIX is 666. (In the Monarch Programming “Mr. Postman”
is a code word used internationally.) The most important part of the BEAST
system is its communication power. The Electronic Mail System of the BEAST
allows it to communicate worldwide, and along with electronic mail comes levels
of permission to view or work with the electronic mail. The super user (god)
is called Root. A programmer on the Beast must get permission. His program
must get permission. That program that gives permission must also get permission.
In other words, there are levels of permission that must be gone through.
This is similar to the Monarch program. For instance, the alters personalities
which would control the body during Illuminati gatherings have very tight
access permission. It is very hard to access these hierarchy personalities.
Both the UNIX system (and the Monarch programming) creates “children”
by “spinning”. The “child” spins off. When the “child”
is finished it is “killed” in UNIX lingo. When the programmers
created child processes in the computer, they were having problems with the
child processes killing the parent processes. The same type of problems have
had to be dealt with in the Monarch programming. The initial programmer is
often the biological parent of the child, and this parent is very responsible
for extreme tortures being applied to the child who is being programmed--not
to mention all of the expendible children, who are killed in front of the
child to highlight the reality of the trauma. The natural reaction of the
child being created is to hate the programmer. Naturally, the Monarch programming
had to overcome that natural tendency, which it does very successfully. The
UNIX system uses an internal clock within its computer system. The UNIX clock
is called CRON. CRON checks files to see if the programmer has put in any
files to run.
The UNIX system uses data bus lines, which are like the Monarch programming
ribbons, which go through the system. These ribbons or data bus lines take
information and commands from the computers to other computers. Within the
UNIX system, insiders have revealed that the Daemon (Demon) processes of all
the UNIX systems have a security flaw. That flaw is that the Postmaster Daemon
has access to them in spite of who the god is of that particular UNIX computer
system. So while owners, who purchase UNIX systems think that they have exclusive
control over their system, an external Postmaster Daemon coming from the Beast
could use its permission levels to over ride the power of the local owner
of the system. The Monarch system has a similar feature, the Illuminati programmers
know how to access the base or primal anchors to the programming and yank
out any programming they want. All the slaves of these lesser groups such
as the CIA, Church of Satan, Mafia, etc. can all be reprogrammed rather quickly
to serve the Illuminati, if they are not already due to the Illuminati programmers
extra knowledge on how to get into the base programming. In these many ways,
the UNIX system serves both real computers and also for the internal computers
of some slaves’ mind.
The slave’s system becomes a computer system. It functions as a series
of computers that are connected to the master computer which is sunk into
the mind at the lowest hypnotic level, which is a level often placed even
below an internal “hell pit”. To access the different computers,
combinations of cards were used for the codes (numbers are also used. See
Various parts of a Monarch system correspond to what any computer would have.
A microprocessor register has 3 sections on a computer to make it functional.
In Monarch Systems, you would find these 3 represented by
1. stored data in the library and alters with photographic memories,
2. an instruction section with codes, and
3. stacking mechanisms.
Linked to all this were a crystal, clock, hour glasses, a compass and an
entire demonic command structure. The eye in front of the big computer will
be protected by legions of spirits. The front big computer runs front quadrants
and the back computer runs the deeper quadrants. The software so to speak
for the Omega programming (computer) may be set up to include a stacking program
called the Potter’s Wheel. The Potter’s Wheel is a misuse of the
Bible, and is a type of programming that the Charismatic/pentecostal movement
carries out. The Mormons and the Catholics have their own distinctive “software”
programs. An initial stacking mechanism would work by telling alters to “Stand
in Order according to rank and serial no.” Another code along with a
hand signal would place the Gatekeeper alters up on the Potter’s wheel
for their “creator” to work on them. A group of alters could be
taught to go up on their Potter’s wheel by seeing a pattern of dominoes.
It is whatever the programmer decides.
The dominoes were used for coding, but they also had the programming feature
of being able to tie alters together so that if the System is tampered with
out of sequence, a domino effect would take place. This domino effect is for
one program to set off another program to set off another program. Soon the
Monarch slave’s mind is trying to deal with dozens of suicide programs
running simultaneously, along with perhaps other programs such as scrambling
programs. For instance, one story line used is the mice run up and down and
open up new levels of programming and are tied to the pendulum/clock mechanism.
The mice can activate the hour glass, and a gold-winged green skirted fairy
Whisper balances the hour glass on her wings. If the slave goes toward freedom,
the slave’s mind triggers programs of all kinds, and the mind ends up
not knowing if it was coming or going with all the different programs which
activate. A more exhaustive look at all the craziness and activity of the
Omega & Gamma programs which activate to defend the Illuminati’s
Mind Control are given in other chapters. The programming has been designed
that if it was taken out improperly, it is to come back Seven times Seven
stronger. This is also a clue that the programming is partly a demonic manifestation,
cf. MT 12:43-45 et al.
COMPONENTS OF THE CONTROLS
At the center of the System are the mechanisms that control it, such as the
Master Computer, the All-Seeing Eye, the Compass, the Master Clock, and the
Quadrants that tie in together. The System may have 3 hourglasses spinning
on axes. These hour glasses can also be called matrixes, which are on your
standard 3 axes, a X axis, a Y axis & a Z axis. The worlds are various
sections of these matrixes.
There are backup worlds & mirror image worlds. Occasionally, there will
be a double system. Some of the more important alter System are even far more
complex than a double System or a double Double System. Each alter is split
so that every alter has another alter created from it. Then there are demonic
doubles--demonic mirror images in the System. The double images shown
in the picture are very real when describing our System. Some therapists have
noticed “Satanic Guardian Angels” which talk to their patients.
They do not know what to make of these. Some classify them as hallucinations,
because they do not have any room in their belief system for demonology. These
are the demons that do control the multiple’s mind. Thor,
with his hugh hammer is a painful demon. Thor’s image is made of cast
iron & carried an iron mallet. Thor is a black strong figure. When his
hammer strikes, the slave gets split brain headaches. Programmers can use
the story of the Giant with the Hammer in the Ozma of Oz book (pp. 141-155)
to give the imagery when programming. A special series of sweeping motions
with both hands will relieve the split brain programming, but some alters
can only tolerate these hand signals being done by the master. By the way,
Thor is an important protector in Satanic/occult beliefs, & the religion
of Thor now has equal stature/popularity in Germany as the Lutheran church.
The programs are put into a System and given codes. These programs use
Greek, Hebrew and Druidic letters (or other esoteric languages) in their
activation codes. Actually, these alphabets also are the way these people
numbered with, and the Greek, Hebrew & Druid letters were used as numbers.
These programs could be called Utility Programs, because they function much
like the utility programs of a computer. Along with all the programming comes
cover programming. Generally, front stories cover almost everything
in a System. Dominos have been used in Monarch programming as the basis for
what is called a “Mother Board” in actual computers. Telephone
tones key in on a slave’s computer matrix. At times, telephone tones
in everyday life will make slaves accidently wacky. All computers run off
of base 2--which uses the numbers 0, and 1. 0 and 1 can be represented as
on and off. In the programming, they were represented by “He Loves Me”,
“He Loves Me Not.” The Programmers, especially Dr. Mengele, enjoyed
taking a daisy and pulling its petals off one at a time. First petal, “I
love you”. Second Petal, “I love you not.” IF the last daisy
petal was “I love you not--then the child was dramatically killed in
front of other children to be programmed. The Illuminati’s method
of death--skinning alive--has been developed into a fine art, for both
programming and ceremonies. A drawing of this skinning procedure by a witness
is on pg. 338. The daisy game, which was scary for a child, heightened the
victim’s attention. Matrixes were built upon this deadly game.
How did it feel to be programmed with Mengele’s “I love you,
I love you not” programming? A victim recalls, “The child was
placed in a cage exposed and naked. The low voltage wires were rigged to the
metal of the cage. The child experienced a continual erratic or sporadic prolonged
voltage of shock until the heart would pulsate and the anxiety level of the
child became out of control. “Then the Dr. would enter the scene with
his sneering taunting smile while holding a daisy in his hands. The sporadic
voltage would continue to flow through the child’s body. As the shock
continued, the Dr. stood before the child pulling petals off the daisy. His
only communication was voiced in these words, “LOVE YOU, LOVE YOU NOT,
LOVE YOU, LOVE YOU NOT,” while pulling off the daisy petals. This action
would drive the child crazy because the child knows full well if that last
petal is pulled off it meant death. The child that is not loved is skinned
alive before the other children. “...we can now begin to understand
that the expendable children were in other cages placed all around us for
the eye to see. They went through the same process as we watched.
When the last petal of the daisy was pulled from the flower they were killed.
Then the terror of what we had just experienced through the seeing and hearing,
let us know we were next, but when? By the time the doctor got to “He
loves me not” some children no longer knew fear. Their ashes were
taken from the crematorium and used in the garden for fertilizer, as a reminder
to all what happens to unloved children. “In the clinical room,
the lights were used to program the day’s events. The bright light continually
flashed starting with 7 lights, then six dots, then five dots, then four dots,
then three, then two dots, then 1 dot. In the blindness of the lights, we
could hear the doctor’s voice, “LOVE YOU, LOVE YOU NOT.”
over and over again. A child could have a false trust when the lights flashed
7 dots. By the time one dot was flashing, the child’s terror had once
again risen. The doctor never pulled the last petal off for us, but we can’t
forget how he teased us. He smiled and walked away, ‘NO, I LOVE YOU.’
and walked away.” If we use L=I love you and N=I love you not, we can
build the following matrix for the internal computer:
This type of configuration can even be tied to color programming, and to
dominoes, where the numbers are represented as the dots on a domino. By making
numbers into dots--the numbers can be represented by lights in the same patterns
of black domino dots. This means that dominos can be used to program a child,
and who would suspect anything about dominoes?
Another thing that lends itself well to use as a programming code are a deck
of cards. Many slaves have this. It can be tied in with the Alice In Wonderland
story. When cards are used, a section (also called a world or city) of alters
will be given its own computer. To access that computer, a code consisting
of several things including 2 cards can be used. In review of what Chapter
4 said about codes, often double codes are employed--what is meant by that
is that suppose we have 13 important alters in a section. They will designate
each of these “A” alters. Then they number them each 1 through
13. But then they will double code them so that as we count up, we also count
Then they attach a generic level number to them, say 2,000. So putting this
together we have Emerald Green 2001-13a for our first alter, then next is
Emerald Green 2002-12a, the next is Emerald Green 2003-11a, and so on. Then
the magical name of the alter or the Tribal name of the alter can be attached
onto this to complete an access code. While it seems perhaps complex at first,
all an alter is remembering is a color, a common section no. and their rank
no. and their file letter, and their magical name. (The name to pull them
up--will not be their name for public use.) Alice In Wonderland, the Wizard
of Oz and the Tall Book of Make Believe played a fundamental role as “software”
in a System. The Wizard of Oz stories are often used to show how & what
structures to put in the small victim’s internal world. The stories
even teach HOW to create an internal world and its parts. Some of the T.V.
shows & movies, which served as Monarch programming scripts (i.e. the
Bobby’s World Cartoons (deliberate triggers)
Disney movies (all of them, some with deliberate
Duck Tails Cartoon (deliberate triggers)
ET (used in alien programming)
Fantasy Island (deliberate triggers)
Ghost Busters (used for “who ya’ gonna
Love Boat (used for mind control of cruise prostitutes)
My Fair Lady (finishing school for slaves, such
as Youngstown, OH)
Steven King Horror Movies
Tiny Toons Cartoons of Steven Speilberg (deliberate
Wizard of Oz movies
Some of the books which were used as programming scripts, which haven’t
been mentioned yet, are the Dead Sea Scrolls, the Egyptian
Book of the Dead (satanic rituals follow closely the rituals of the
Egyptian Book of the Dead), Steven King novels, & Wilbur
Smith’s. The Mother Goose nursery rhymes were
used prolifically for internal codes in slaves. Now that we have discussed
the widely used “soft ware” available to the programmers, we don’t
want to forget the root program, the tree which was used as a method of organizing
the various programs, just like a computer’s subdirectories branch out
more subdirectories. If the programming is tampered with, the slave will want
to cut the tree--however, since the tree is in them, this means they will
want very badly to cut their arms, especially their veins. The programming
is not guarded as much as the computers. Everything guards the BEAST computer
including deaf alters who have to be communicated with using a hand number
code system. Such a code might resemble finger signing 1,2,3,4,5,10 = 15 &
following this with a shutdown code which simply reverses the access equation.
Surrounding the central All-seeing-eye will be alters & programs with
insanity, fear, hopelessness, cutting, burning, aloneness, etc. Strong demonic
forces are attached to these alters & programs.
They also can trigger the slave to have abusive behavior as punishment. A
System is given a life force which is able to regenerate a system, the jokers
who protected the programming, and you have the alpha-numeric codes, the cards,
and dominoes (represented by a dice) that formed the access codes to parts
of the System. The alters will often feel the heartbeat (which may be an alter)
associated with the computer In the background is a Luciferian blue light.
This Satanic light empowers the Joker. It along with the Joker and the internal
programmers give a System the ability to regenerate itself. One can shut down
internal computers which run programming to the levels of the System using
the same codes that the original programmers use, but until one also takes
care of the 13 Jokers & the faceless white-coated programmers who control
the Omega Programming, then the back up computers can regenerate the programming
& rebuild the system.
If the computers are given cards as access codes--it works in well to create
Jokers who are wild cards within the system, which can imitate anything. The
Jokers have a Luciferian form. Luciferian is the term that the programmers
used. This means that it is spirit. Because the Jokers are Spirit, they can
take any form they need to and they can do what they want to do, until they
are bound & cast out with the rest of their hierarchy of demons. The Jokers
will pop up when a victim tries to study the codes & programming that
direct that victim’s life. Around this cult core are the jewels (which
are the programs the dwarfs mine). Remember the story of Snow White and the
Seven dwarfs? Also swirling around Silence are ribbons which we will discuss
The trees bud at certain times. This is one way the imagery of the tree to
connect to the time that rituals are to happen. If the tree is barren of leaves
(no programs--i.e. deprogrammed), then the system is to grow more leaves.
C - INTERNAL HIERARCHIES
The programmers build chains of command within the groups of
alters that they create. They credit themselves with bringing order out of
chaos. When a system of multiple personalities thinks of rebelling, they are
in the similar situation as a colony wanting freedom from its mother country.
Can we govern ourselves, and what governing structures can we keep--since
the structure itself is colonial? Can the mind work together to help itself?
The concerns are legitimate questions. And yes, the multiple’s mind
can function outside of the control of the programmer’s hierarchial
arrangement, but not without alters taking on different job assignments. In
the slave’s hierarchal chain of command, adult alters are assigned to
insure that child alters don’t get out, unless the abusers want a child
alter out. Likewise, commander alters are needed to keep the switching smooth,
and to keep things orderly. Subordinate alters are taught to submit to their
king, or governor, or queen alter. Immense power and indoctrination is given
to the key cult alters ruling a system. The internal hierarchial arrangement
means that the host alter coming into therapy (often a Christian) may not
be as completely open as therapists think. They must play an internal game
of going toward health while not pushing the buttons of deeper more powerful
alters. A lot of internal politics may go on. A front alter may promise a
deeper alter secrecy in order to consult with it.
This makes for all kinds of triangulation and manipulation within the alter
system itself. The entire hierarchy of alters has a lot invested in protecting
the core from trauma, which was why the core was split in the beginning. Traditional
therapy goes after the core & the multiplicity that protects it, thus
insuring resistence from the entire hierarchy incl. front alters, who in MPD
systems seeking help are often close to the core. The core self is best not
directly pursued by the therapist, but gently encouraged on its own to reconnect.
All information posted on this web site is
the opinion of the author and is provided for educational purposes only.
It is not to be construed as medical advice. Only a licensed medical doctor
can legally offer medical advice in the United States. Consult the healer
of your choice for medical care and advice.