2/10/2005 - -= The Beast =-
Baroogh Jawel Jehovah, Allah hoo akbar.
All unprotected people are all mind controlled puppets.
Use aluminum foil to protect yourself against the deadly cancer-micro-wave radiation.
This is the original http://whale.to/ page that disappeared.
the night of 25-1-2006 21:28 the following page was unreadable, the
link on the great whale dot t o site did not work and neather did the
search engine. The supercomputer can be used to let people update their
pages so that people can not retrieve the info when they are making
their Blogs. It used to be Big Brother section.
THE INFO ON THIS WORLD PEACE RADIO BLOG MUST REMAIN ON-LINE EVEN AFTER
MY DEATH, FOR WHICH I HAVE MADE PREPARATIONS FOR AS FAR AS POSSIBLE, SO
THIS SITE CAN NOT DISAPPEAR, EVEN IF I WOULD DISAPPEAR.
COPY THIS PAGE TO YOUR HARD DRIVE AND PUT IT ON C D ROM.
USE HTTRACK TO DOWNLOAD COMPLETE SITES TO YOUR HARD DISK.
ILL U MEAN AZI MAY HAVE BEGUN TAKING THE MOST VITAL INFO OF LINE, NOTE
THE SUPERCOMPUTER IN BRUSSELS (E U BUILDING) IS USED TO DO GLOBAL MIND
CONTROL, THE BEAST IN BRUSSELS IS ONE OF 9 BEAST COMPUTERS SCATTERED
STRATEGICALLY AROUND THE GLOBE.
TO SAY WE ARE AGAINST THE USE OF THESE COMPUTERS TO CONTROL PEOPLE LIKE
SLAVES, AND THE NEW WORLD ORDER BEHIND THE SCENES ALLOWS THIS WITH THE
INTENTION TO RIDICULE THE TRUTH AND USUALLY THE PEOPLE EXPOSING THEM
ARE THE ONLY PEOPLE TO TRUST. THE SUPERCOMPUTER IS ALWAYS BETWEEN THE
CONTROLLERS AND THE SLAVES (FOR EXAMPLE PROSTITUTES WITH A MONARCH
BUTTERFLY) AND THE SUPERCOMPUTER CAN SEND MESSAGES TO THEIR BRAINS (THE
SUPERCOMPUTER CAN SPEAK ALL LANGUAGES BY NOW) SEES WHAT THE VICTIM IS
SEEING, READ MINDS, AND, WHAT IS MORE IMPORTANT: GIVE THE EMOTIONS, THE
FEELINGS, THAT GO ALLONG WITH THAT MIND CONTROL THOUGHT. IT DOES THIS
USING MICRO WAVE HEARING, VOICE TO SKULL AND REMOTE NEURAL MONITORING
TECHNOLOGIES KEPT SECRET FROM THE PUBLIC, BECAUSE THE METHODS VIOLATE
SEVERAL INTERNATIONAL LAWS.
ONLY WAY TO STOP THESE INSANE PEOPLE MIGHT BE TO GIVE THE BEAST SOME
WATER OR USE A LARGE MAGNET TO GIVE PEOPLE BACK THEIR TRUE
Not in our name dot org.
The original article about the 'Beast', the super-computer, can also be found on other web-sites, like:
Please spread the info all over the web, if you do not want to become a
mind controlled slave of people who are trying to do as much evil as
possible, terrorists such as Nazi-bush, that bush bush, another chopper
shot down in Iraq.
The following is the original article that used to be on Whale dot to:
The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave by Fritz Springmeier & Cisco Wheeler
Chapter 11 Science No. 11--Internal Controls
A. Teaching Occult Philosophies
Teaching The Ideologies Of War
Various Delta Forces
Delta Assassination Teams
Delta Force First Earth Battalion Green Berets Bo Gritz
B. Internal Computers--Perfect Delegation; Internal Computers Which Auto-Control A Slave
Internal Computers Which Auto-Control A Slave
Color Codes And Ribbons
How Monarch Slaves Are Designed To Interface With The Unix System Of The Beast Computers
Components Of The Controls Some of the T.V. shows & movies, which served as Monarch programming scripts
C. Internal Hierarchies
A. Teaching Occult Philosophies
Learning plays an important part in perception. The Programmers try to
get their victims to subscribe to philosophies and ideas that will make
it hard for them to rebel against their controllers. This is what is
termed indoctrination. The same methods of teaching that others find
useful are employed. Ways of thinking are incorporated by the slave via
handlers, programmers, and the cult they belong to.
tries in their own way to make sense of life. This is a natural brain
function, so that the human mind can understand how to deal with the
future. The mind takes raw data, and then applies some type of logic,
and comes to conclusions. Once accepted these conclusions can be as
hard as nails, and they will defy any attempt to change them, even in
the light of new evidence. If the Programmer is smart enough, he can
get an alter to logically believe anything. Once the belief is
embedded, it will remain there tenaciously.
In the Illuminati,
"great" masters and adepts teach "hidden mysteries". The slave feels
the authority that emanates from this teacher with special gifts and
abilities. The slave is hardly in a position to question the teachings
being given from on high. Circular reasoning, lies, and other tricks
are used to convince the person that the occult world is true. For
instance, "God abandoned you, therefore you need to cling to us, the
only ones who would see any use in you." (The truth is that the cult
staged a crisis where their actor playing God abandoned the child to
the cult’s abusiveness. The whole event was simply cult abuse--with God
taking the blame.)
"We are trying to fashion a better man, a
man with far more capabilities than before, with better genetics. Those
who oppose us, are trying to keep humankind back in the dark
ages." This is circular reasoning and outright lies. (They are
not interested in helping mankind, only destroying it.)
make occult philosophies more palatable, the occult world attacks the
character of anyone whose life would dispute their false claims. They
also use a great deal of rationalization, where the end justifies the
means. Many slaves have had to sit and listen to their masters
rationalize their brutality.
Within the Illuminati, ranks
are achieved with much learning and ritual. Within the Temple of Set ,
a member is required to read certain books. Fritz, the co-author has a
list of books a Temple of Set member is asked to read, with the
comments attached by the Temple of Set to each suggested title.
In their suggested/required reading Category 19 entitled "The Metamind"
is Metropolis by Thea von Harbou. Their comments are "An
Expressionistic portrait of a negative utopia in which humans are
controlled by machines.. .the basis for many electronic/audio-visual
ritual techniques employed by the Church of Satan and further developed
by the Temple of Set ." (p. C21-2)
Another is Physical
Control of the Mind: Towards a Psychocivilized Society by Jose M.R.
Delgado. Their comments, "Delgado, Professor of Physiology at Yale
University , is one of the most distinguished authorities in the field
of Electrical/chemical Stimulation of the Brain (ESB). This book is
necessarily dated, but it is so well-written that it deserves to be
perused as a preface to more recent works on the subject." (p.C-16?-2)
The Psychology of Anomalous Experience by Graham Reed. Their comments,
"This book addresses unusual, irregular, and puzzling experiences- dejà
vu, illusions, delusions, hallucinations, etc.-in terms of the mind’s
normal psychological processes of gathering, monitoring, processing,
and storing information." (ibid.)
This is just a brief look to
illustrate to the reader that leaders of groups like the Temple of Set
are avid students of mind-control. (An almost complete membership list
of this group at one point in time, is provided in Appendix A.) The
librarian of the Multnomah County Detention Ctr. shared with co-author
Fritz that Sheila, formerly second-in-command of the Bhagwan Shree
Rajneesh’s commune at Antelope, OR studied, via jail/prison
interlibrary loan, books on Hitler’s mind-control techniques.
Many other examples could be given of how mind-control is being studied
and taught by these groups. One more book on the Temple of Set ’s
reading list would be worthy to point out, The Psychology of Man’s
Possible Evolution by Peter D. Ouspensky. Their comments, "Should be
read especially by those members whose magical ability is hampered by
flaws in their balance factor....A series of lectures which explain the
Gurdjieff approach to the concept better than G. himself was able to
There is an important link between Gurdjieff,
mind-control, MPD, etc. but the subject is big and needs to be further
investigated. Co-author Fritz has been investigating this link,
including talking with leaders of the most successful Gurdjieff
commune. As with so many groups, what you see, is not what you get.
Teaching The Ideologies Of War
One of the ways to control a person is to get them angry and then
channel that hate. Wars have been used for centuries by the oligarchies
that run things to control their people. Right now, the New World Order
is carrying out a Drug War, an Environmental War, and a Bosnian
conflict for the express purpose in their own plans to control us. They
have a mock-alien invasion planned to further justify more control over
Over the years mankind has created an entire
industry around warfare. There are long traditions within military
units, that for some reason must be "upheld" by the men who serve in
those units. When people buy into the philosophies of war, they can
generally be persuaded to give up or do anything to contribute to that
war. After all, any sacrifice will be minor compare to the large
numbers of bodies that will end up dead.
One of the large
purposes of the Monarch type of trauma-based mind-control is to produce
robotic soldiers who will do anything. Normal military training is
usually sufficient for most military needs, so it is clear that Monarch
slaves have some ulterior uses that the military doesn’t want the
public to know about.
Various Delta Forces
The military as well as other groups have created numerous delta teams, delta forces, delta groups etc.
Delta Assassination Teams
These teams are projects that the Satanic Hierarchy and the CIA
collaborated together on. The programming that was placed into people
was ingenious and very complex. As the program progressed over the
years, the programming became more sophisticated and past mistakes were
improved upon. The Delta Teams were programmed to carry out various
assignments such as political assassinations. The members of these
teams are housewives and other ordinary people who were programmed
The Delta Teams are part of the CIA’s psychic
warfare bag of tricks. The CIA works so closely with the military that
the Delta Force is easily expected to be tied in with the CIA &
The system tapped
Frank Burns to create the Delta Force. Frank Burns was a Green Beret.
What kind of things did Frank get involved with AFTER joining the
military? Hold on. Frank Burns was an S D S (Students for a Democratic
Society--an Illuminati organization) organizer. He was also deep into
Zen Buddhism, which is the same as mysticism. Frank Burns as an officer
also studied under the Esalen Institute. The Esalen Institute is
at Big Sur , California and is the American equivalent of the infamous
Tavistock Institute. The Esalen Institute created "sensitivity
training" programs for the business world under the title
"Organizational Development (OD). Esalen people were brought in to Fort
Ord where Frank Burns was the commander and began training people. The
army promoted Burns to work in the Chief of Staffs office as a "senior
organizational effectiveness consultant", which allowed Burns to
introduce Esalen programs all through the army. This could not
have accidentally happened.
Frank Burns in a conversation with
a two-star General about the need for "wholistic" soldiers coined the
slogan "Be all that you can be in the army." Burns phraseology began
the army’s recruiting slogan. It refers to the Human Potential Movement
that the army has incorporated from the New Age movement. The army is
moving toward becoming an occult fighting force that practices
witchcraft with its warfare. Some of the units moving that direction
are Psy-Op operations, which has included Satanists within its officers.
The Delta Force network of various Generals and other high ranking
officers is merely one facet of the drive by the Illuminati to
transform the American army into something akin to occultic warriors
that will be as fierce as the Nazi Death head units. Bear in mind that
George Bush, commander-in-chief of Burn’s Armed Forces has come from an
Illuminati family/ & the Ill. Skull & Bones chapter that was
part of the secret support for Hitler. They have been using as an
insignia what they themselves (the Skull & Boners) call "the Death
It is not surprising then that support for the Delta
Team activities has come from the very top. Frank Burns set out to
create a warrior monk. Lt. Col. Jim Channon, in Delta Forces, also put
forward the idea. Channon visited more than 130 New Age groups in
California doing what was called "social experimentation." It is an
idea that the occult have repeatedly carried out.
S.S. were a special elite group of warrior monks from which about 3,000
went through religious initiations. (As the war progressed the primary
focus of the S.S. shifted from being the Black Order to merely being a
reliable military group called the Waffen SS.) There were 3 levels of
initiation, the last reserved for the hard-core Satanists at the top.
The Nazi initiation seems to have been an attempt to get the force of
The Ordensburgen (Castles of the Order) were
training centers for the elite Nazis, including the S.S. (Having been
in the military, I know first hand that the success of the S.S. and
Waffen S.S. units in being fierce warriors is attributed by some of our
leading military men to their training to be warrior-monks.) One group
of the S.S. called Knights of Poseidon volunteered themselves for
castration, in an experiment to change them back to the supermen of the
mythical and magical Hyperborea. Some of the best Sufi
organizations were warrior monks.
Burns and his Task Force
Delta generated the First Earth Battalion, which is an occult military
unit trained in martial arts, and witchcraft. Men who are selected for
First Earth Battalion are given an occult initiation which includes the
following oath: "I have the capacity and therefore the duty to
contribute to the development of myself, my associates, and our planet,
simultaneously now! I take personal responsibility for generating
evolutionary conspiracies as a regular part of my work. I will select
and create conspiratorial mechanisms that are not costly in time or
resources because I am aware of the five channels available to me (such
as radio, television, and word of mouth.) I will organize a
self-supporting high commando group that will create and perform
evolutionary breakthrough actions on behalf of people and planet. One
people, one planet. I will then pass this concept on to others who are
capable of generating further self-organizing commando teams.’’
What ever happened to defending this nation? Military units such as the
First Earth Battalion although they are supported by American tax
dollars are not here to protect America. They are global minded. They
are here to protect an occult world government. They are out there
actively promoting the New World Order.
Several years ago,
Egendorf states that $4.5 million (which came from you and I, and other
Americans) had already been spent on Delta Force’s 80 different
The Green Berets is another organization that has
been heavily targeted by the Satanists, to indoctrinate and recruit.
The Green Berets are increasingly moving toward being warrior-monk
group. Many of them are now programmed multiples. One man who is being
looked up to by many American Patriots and Christian Patriots as the
leader to help them oppose the New World Order is Bo Gritz.
was a recent presidential candidate. Bo Gritz was a Green Beret and a
Delta Force commander. Bo Gritz is very proud of the fact that he wrote
the manual for the Delta Forces. He also worked for the CIA. Bo Gritz
is one of the military’s best programmed multiples, and perhaps one of
the most dangerous. Insiders have told me he IS the most dangerous.
Numerous insiders both for and against Bo, have talked about Bo Gritz,
and that he is a programmed multiple.
According to Bo Gritz’s
campaign literature for President he was a commander in Delta Forces.
Reproduced on a previous page is Bo’s own presidential campaign
literature where he states that he is "Intelligence Officer &
Reconnaissance Chief, Delta Force." He is also "Chief, Special
Activities, U.S. Army General Staff, the Pentagon" and "Principle
Agent, National Security Council, Intelligence Support Activity". Under
qualifications Bo states that he is a "Security & Counter-terrorist
Within the government, they are already
referring to Christians who are against the NWO as terrorists. Bo is
their greatest counter-intelligence counter-terrorist they have. He
came in like a storm and took control of the Patriot movement, and it
has been like pulling teeth to warn patriots about who he is.
Bo Gritz himself was a Green Beret, and was used to assassinate 300
people. His blood lust caused him at one point during the Vietnam War
to shoot 30 prisoners in cold blood. I also heard Bo talk about say
being Temple recommend Mormon. That means he was at that time in good
standing with the LDS Mormon church so that he could go to the Temple
and participate in its rituals.
Those who are alert realize
that the temple rituals are like Masonic and Witchcraft rituals. Now he
is no longer a Mormon. But he still continues in the military
philosophy he believes in. Bo Gritz is going around the nation teaching
SPIKE training to anyone who wants martial arts skills. Bo has done an
excellent job in identifying for the New World Order every person in
the nation who could threaten their plans for a martial law NWO
takeover. Bo Gritz likes to call attention that he is one of this
country’s foremost counter-terrorist agents. This is true. The New
World Order believes patriots and Christians are terrorists, because
they stand in the way of the world’s acceptance of their world
dictator. Bo Gritz has done a great deal to infiltrate and neutralize
the opposition to the New World Order. He has been their best
B. Internal Computers--Perfect Delegation;
Internal Computers Which Auto-Control A Slave
a master has to constantly spend time whipping and motivating his
slave, as well as forever watching that the slave doesn’t escape or do
shoddy work, or physically or verbally injure the master, then
controlling the slave can end up to be a full time job. When the master
gets too much involved in the control process, he ceases to be master,
and becomes a slave to the control process.
intelligence agencies knew that they would have to create mind control
slaves who could police themselves. If the master has to constantly
guard his slave, the slave will be more trouble than he is worth.
Many successful people have gained their success because they knew how
to delegate. The most successful supervisor is the one who can delegate
the best. The programmers had to find ways to cut their supervisory
requirements to the bone if they were to make owning a Monarch slave
method chosen was to build "computers" into the slave’s mind that would
internally regulate everything. They do this by taking hundreds of the
alters and dehumanizing them and turning them into parts of a
computer. For instance, the shutter on the All-seeing eye of the
computer, which is seen in the mind like a camera shutter, is a child
alter who's job is to open and shut. (Another primal part is inside the
eye’s pupil.) This shutter part knows what goes on in all the system
subconsciously but if discovered by a therapist and pulled to the front
of the mind will not be able to vocalize about the system. The software
for this "computer" could be programmed into it, and all the individual
programming of every alter can then be tied back to the computer.
other words, each alter would be programmed on how to view life, to
act, to think, and to function in their job. This programming would be
linked to a computer. The programmers invented the perfect method
to decentralize their control over their slaves and yet still supervise
with the tightest of control. Each alter is linked to a computer
(internal-not an external one) built from a foundation of fear and
trauma. Since each section of alters was to remain secret, each section
of alters for a slave is given its own computer, and then linking
computers were built to link the various sections, and then finally a
major backup computer is built, and then finally the internal Beast
in mind that this is all built internally in the mind of the victim. We
are not talking about actual physical computers built out of physical
microchips, wires, condensers etc. If the programmer concentrates on a
single point when giving instructions he will get better results.
Rather than complicating things for the slave, you gain power over the
slave (and any subordinate) if you can give simple clear instructions.
For this reason, a large share of the alters in an alter system are
given very clear straight forward jobs. Because their jobs are so
straightforward, these alters will often remain fragments, rather than
alter parts with full blown personalities.
programmers don’t cloud the issue. An undeveloped alter will be given
one single clear, basic job. By stringing 1,000’s of alters together
with single tasks, a highly sensitive system of alters can be created.
Each piece of the System is separated by some degree of dissociation to
make it a separate piece. By dividing the mind so much, it is incapable
of fighting what has been done to itself. Before we begin describing
the technical details of an internal computer, bear in mind that every
Monarch System is unique and yet they all follow certain patterns &
methodologies. Most of the models for the first few decades follow
these patterns, some of the newer ones have more updated imagery.
an Illuminati System, a computer is created for each section of alters.
That computer will be given a "power source", which if unscrewed like a
light bulb will go out. The light from one of these power sources might
be emerald blue or emerald green or other color. The reader may want to
refer to chapter 4 for the codes to understand the structuring of the
various computers and systems.
Color Codes And Ribbons
a standard 13x13x13 Illuminati alter system, 13 colors were used, and
each computer was given a color. (Color Programming) These would be
pink, orange, yellow, white, red, brown, blue, green, black, purple,
silver, gold and platinum, and clear.
programming is reported to have been developed at UCLA. Whatever the
case, Systems all over the United States have color programming.
The hierarchy of colors in a System is often as follows (from top power
down): Platinum, Gold, Silver, Purple, Black, Red, Green, Brown, White,
Orange, Yellow, Pink. Clear is also used as a color for secret areas of
the system. This hierarchy of color coding can be switched. The
internal programmers can reassign colors if they need to, in order to
protect the programming. Alters, sections, and parts of the computer
are all color coded. The color coding for alters is not the same just
because the alters are in the same section. The color coding within the
Illuminati Mind Control is fairly consistent, however a sample of an
alternative Illuminati color scheme will also be provided. A survey of
colors is as follows:
Secret or shell alters who can take on any color are coded clear. These
are alters who serve as images or as a stage for other alters. This
would include "Guardian of the Vail" alters.
GOLD. This color is for the supreme leadership in the System, which includes the Grand Druid Council.
SILVER. This color is for the Satanic alters who perform high level Satanic rituals. The Mothers of Darkness have silver coding.
These alters see themselves as the abusers, rather than the Illuminati.
These alters were involved with the programming. They have been taught
to forget the abuse and to reframe it in their mind as training.
These alters were born out of Satanic ritual, and are Moon children.
The Delta and Beta alters are black coded. They do the dirty work for
the cult, such as blackmail and assassination.
These altars see themselves as witches. They were born out of
witchcraft ritual, believe they have great spiritual power, and tend to
deny that they have been abused.
or EMERALD GREEN. These cat altars recognize they have been abused.
They still see themselves as belonging to the cult family, and deny
that they have been abused to protect their cult family.
ALTERS. Clones, armies and the ribbons appear to have blue coding.
These alters will go so far as to hurt the body to protect it from
leaking information or deprogramming.
‘These are Atlantean alters who have been given Aryan type racial
nonsense to think they are superior. They believe in genetic
engineering, and a master race.
ORANGE. These special protector alters are scouts who warn of danger from internal or external threats.
These are the strong Christian alters of which there will only be a few
in the System. They help serve as a balancing point to control the
System as well as to hide what the System is all about.
These are core related alters. They maintain the true feelings of the
true self apart from the cult programming and the cult family’s
programming. These alters are viewed as weak because they are emotional
and often break down and weep. They are fragile emotionally.
An alternative color scheme that is used:
EMERALD GREEN. This color is assigned to the AntiChrist-Satan alter(s).
Green is the occult color for Satan and happens to be the most sacred
color. Few people outside of Satanists know that Green is more sacred
for them than any other color.
LIGHT GREEN. The gods and goddess alters which are triads which function in Illuminati ceremonies get this color coding.
WHITE. The internal programmers who come around in white robes get this color assigned to them, as if they are doctors or angels of light.
RED. Sexual alters are given the natural color of sex and arousal red.
BLACK. Connecting alters that are Nexus alters between various system parts. PINK. Reporting alters.
DARK BLUE. Non hierarchy cult alters.
LIGHT BLUE. Alters in charge of the way the system runs, such as the judges.
YELLOW. Alters which are ritually and sexually twinned with alters of other systems.
ORANGE. Guard alters which are heavily programmed for obedience.
VIOLET-PURPLE. Front alters and small child alters placed into boxes.
CLEAR. Shell alters to deceive the outside world.
GOLD. The traumatized alters upon which the programming is built on.
Mengele and the programmers who worked with and under him, used a large
dollhouse with 26 rooms. Each of the rooms were painted with one of the
13 different colors in order to build into the child’s mind, the 13
front and the 13 back computers. The internal computers worked off of
color codes, as well as other codes. A dollhouse was used to
instill into the child’s minds the compartments of the computer. Each
room was done up in a different color.
particular room was a secret room, and this represents the secret world
of Petra which is hidden behind two large rocks. This secret world is
coded the color clear.
the special color clear, the following colors appear in the system:
Gold, Silver, Purple, Black, Red, Green, Blue, Brown, White, Orange,
Yellow, and Pink. Each color has meaning and a rank. Just as the hour
glasses could be turned, the color coding can be switched in rank. This
is why in some systems there is a "Computer Operator Black", a
"Computer Operator Green", and a "Computer Operator Purple", etc.
the programming a black box with needles and wires which attach to the
body for electroshock is used. While electro shocking the victim,
colored scarfs coming out of a box are showed to the child. The scarfs
would help form the imagery needed to build colored ribbons internally.
Alters would be created using the Tall Book of Make Believe story of
the Pancake people. Using this as a base or foundation, the alters
would then be dehumanized one step further into thinking they were
ribbons--such as ticker tape, which could transmit information from one
computer to another area of the mind. The Ribbons had the ability
to travel between the different levels and to transmit messages through
the System, especially to the computers. It is believed they could do
this because they were spirit.
a System is accessed by a programmer, one procedure is to obtain a
Ribbon alter and then inform the Ribbon what he wants. The ribbons
transmit messages to the internal computers. The ribbons on older
systems use morse code.
are the Ribbons? The Ribbons are the beginning of the Luciferian
alter-like demons and alters. They are primarily the message bearers
from the computers to the different computers, levels and alters. The
Ribbons might have angelic names (Michael, Gabriel, etc.). The word
angel means messenger. The ribbons serve a very similar function. They
transmit ticker tape with morse code messages. They are at work most of
the time for a System. A sample cover story for what they guard--which
is the main computer with the gems and the core, is that the ribbons
guard the System’s "Garden of Eden". Some more of the cover story
that may be given is this: Ribbons were supposedly formed out of the
dust of the ground and were placed in the Garden of Eden to create
every pleasant tree. (See Genesis 1.) The ribbons relate to the Tree of
Life. But to eat of the Tree of Knowledge of Good and Evil will cause
name of the first river of four in the garden is Pashon. Out of the
first river come four heads. The River Pashon has gold, ballium, onyx,
rubies, diamonds and precious stones. These gems are the programs the
dwarfs mine. If the System has charismatic programming, the alters will
have porcelain face programming. In this case each ribbon’s color will
match the color of the stones in the masks--that is yellow, white,
blue, green, purple, red and black. The colors of the ribbons
correlate or match the colors of the Dollhouse rooms. What do ribbons
do? The Ribbons serve the programmers and the computers, who in turn
serve the evil master Spirits.
Things that the Ribbons do for the computers have been identified as follows:
a. The Ribbons eat from the system’s internal "Tree of Good and Evil".,
b. Ribbon programming consists of several things--where they reside, who they are and what they are to protect.,
c. Ribbons must protect the computers in order to protect their own life.
Ribbons will be programmed to believe that reversing the computer will
reverse the Ribbons’ life. The ribbons themselves operate with
mechanical hearts (not human hearts). The cover stories may
include the following: All Ribbons are hid behind a little girl, who is
a front for them & who tells the creation story. The little girl
will tell the creation story which included the Ribbons. Behind her
runs a silver cord. The silver cord has to do with heart programming.
The silver cord has 3 strands that cannot be broken as per ECL 4:12.
This silver cord goes off if the Ribbons are touched. Ribbons are set
up so that suicide programming is triggered if they are cut.
Actually, french braiding conceals a 4th strand.
review as stated, during the programming, a box with colored scarfs was
shown the child while severe electro-shock was given to the body. A
colored scarf represents a ribbon which runs a message from a colored
room to a similar colored alter. In a System which is structured into
families and cities and worlds and sections, these "geographically
different" structures in the mind of the victim can be connected via
the color coding.
other words, the alters are structured into a 3-D cube structure. Then
a fourth dimension (the color coding) is added to tie in all of the
three dimensions. A central computer was placed in at the bottom of the
mind. Using various techniques the victim is brought to the deepest
altered state possible, and a computer is built into the mind via
hypnosis and alters. This can be done by freezing the entire body and
just keeping the head active. Or it can be done by bringing the body to
a comatose state where the heart is beating faintly. This step can only
be done under the strictest medical supervision.
memory storage area for the computers include the Emerald City Library
(staying with the Wizard of Oz theme) which contains alters who's only
function is to memorize & retain with photographic memories pages
and pages of information. The layout with codes of the entire system
can be stored in a storage bank, so the programmer could access this
area if his own records were lost. The libraries contain the historical
genealogies of satanic iniquity from early ancient times to present.
ancient occult information has been reported by at least half a dozen
Illuminati slaves as being retained internally by demons.
How Monarch Slaves Are Designed To Interface With The Unix System Of The Beast Computers
line with what is being done by the Illuminati around the world with
their network of computers--the computers have access codes similar to
6 6 6 6 6 6 6 6 6, and back out and close down codes
similar to 9 9 9 9 9 9 9 9 9.
are the codes that the UNIX universal system uses, and the Monarch
slaves are being created with codes that interface with the UNIX system
for computers. (On some systems if the computer is shutdown it will
request an input code of
6 6 6 f f f 6 6 6 f f f 6 6 6 f f f... This can then be reversed F 6 F 6 F 6 F 6 F 6 F 6 F 6 F 6 F 6 F 6.)
SO, to turn off your internal compputer: point your finger at your forehead (for example on the toilet) and think 9 9 9 9 9 9 9 9 9
and listen if you hear a request for the close out and back down code 6
6 6 F F F three times and repeat 9 9 9 three times to be on the safe
side. If you would not have an internal computer this will have no
effect, so checkking would be wise.
UNIX system is being used to allow the New World Order’s big BEAST
computers to communicate with any known computer, including the minds
of their Monarch mind-controlled slaves. In the 1960s, the U.S.
Department of Defense began linking computers together into a
superhighway now developed into the Internet. Hundreds of thousands of
computers around the world are tied in. Like buildings in a city, each
computer has its own unique address. Most of these addresses are
registered at the Network Information Center in Menlo Park, CA.
Individuals can also be registered at the NIC too.
U.S. Military links into the system with their Arpanet and Milnet
networks, which tie together such divergent things as M I T computers,
West Point computers, NORAD computers, Air Force Systems Command Space
Division computers at El Segundo, CA and U.S. Army DARCOM at
Seckenheim, Germany (to name a few). These are all being tied together
to form one vast electronic brain.
are nine secret BEAST computers of the New World Order, at the time
this was written. "Big Bertha" is the nickname of the BEAST computer
located at the secret military installation called Dreamland at the
secret Groom Lake, NV test site facility. Papoose Lake is referred to
as S-4. The other super-secret facilities in the area are named S-2,
8-6, and S-66. This area has become the Illuminati’s prime programming
facility for turning out Monarch slaves, and the Monarch slaves which
are turned out from this area have turned out to be the worst basket
other words the programming is very severe which is carried out in this
area. This area has also been used for the space program, for the U-2
& S R-71, for the C I Ate its A-12 spy plane, for the Stealth
fighters (Lockheed F-1 17A Attack plane) and bombers, the Aurora, and
for the U.S. government’s "Above Top Secret" flying saucers. The Big
Bertha computer (named after the Illuminati Mother-of-Darkness Bertha
Krupp) can be talked to in half a dozen languages and will answer a
person back in the language they speak.
a daily basis, airplanes fly into the Groom Lake facility. The callname
of flights bringing workers and people go by the call name "Janet".
About 12 Janet flights come into the facility everyday. These flights
are usually Boeing 737s and arrive from places like a secure terminal
run by E G & G at McCarran Alrport in Las Vegas and from the
military’s Palmdale, CA facility. These 737s are unmarked except for a
red stripe running down the fuselage. Large military C-130 arrive with
cargo, and Illuminati dignitaries arrive in smaller twin-engine craft.
Victims for the programming are brought in via planes, & other
of the BEAST computers occupies three floors of the headquarters of the
European Economic Community building in Brussels, not far from the
important Illuminati Mother-of-Darkness worldwide headquarters castle
near the French-Belgian border near Muno, Belgium. Another BEAST
computer is in Luxembourg. In observing the operations of the
Illuminati, it has been seen that telephone area codes are used as part
of a mind-controlled slave’s code. We do not understand everything
about their codes, but it does tie in with other things that are
9 9 9
person in the world has been assigned an 18 digit tracking number,
which consists of 3 groups of 6 numbers. The first 3 numbers assigned
in the BEAST computer to everyone are 6 6 6.
next is one’s national code. The U.S. national code is 110. Then the
next 3 numbers are your telephone area code, and then finally your 9
digit Social Security number.
code then is 6 6 6 + Nation code + Telephone area code + social
security number = BEAST I Dentification number for an individual.
to Dwight Kinman’s book The World’s Last Dictator, 2nd ed., (Woodburn,
OR: Solid Rock Books, p. 256) VISA has already begun issuing VISA cards
using the BEAST 18 digit number. When an American makes a bank
transaction on an autoteller within a matter of seconds the BEAST has
been informed of the activity. These computers use UNIX.
particular programs for the economic transactions just described are a
worldwide computer network called S W I F T (Society For Worldwide
Interbank Financial Transactions). The SWIFT works off of the UNIX
system and can communicate with any computer. It was developed by A T
& T and uses C language. (Bear in mind that there are dialects of
UNIX, such as the standard AT&T UNIX and for instance Berkeley
UNIX. The UNIX system uses both timesharing and multitasking. The
mind of a Monarch slave also does both multitasking and time sharing.
of the nice UNIX features, is "protected memory", which is also part of
the Monarch programming. A kernal is what the UNIX programmers call a
"protected person". It is very similar to the internal "person" (alter)
who helps the Monarch slave’s programming functions. The big item
about UNIX is that it has permissions granted. This is similar to the
Monarch programming. Permissions are granted to 3 types of entities.
The Top Programmer or "god" as he is called, of the UNIX System
receives what is called the individual permission. The next permission
is called group permission, and it is given to insiders who work with
the system. The final permission type is the world, which has very
limited access. The parallel between this and the Monarch programming
is surprising. In some cases the programmers may have matched things on
a one-to-one correspondence. The Monarch program also has a Top
Programmer who is called "god" to the System. He has total control over
the system. His programming permissions can not be deprogrammed out by
others who might want to usurp his power. Hidden from the casual
user of the UNIX system are the Daemons and Demons.
UNIX programmers decided to use the old English spelling for demon =
Daemon. These are computer processes which work secretly behind the
scenes and are given actual demonic names--some corresponding to actual
names of historically known demons, such as Asmodeus. Asmodeus is also
a demon which is placed into many Monarch slaves. In the UNIX
system these demons are treated like persons in the computer’s user
director. Demons in the computer system do not have to log onto the
computer, but they work behind the scenes and are given the same powers
that people users are given. They are set up in the same structure as
how the computer treats people.
in the UNIX system is granted using an 8 bit count with 0 through 7.
The three kinds of permission are the read, write, and execute
permissions. If no permission were granted in any way the UNIX system
would indicate" "on the screen which means 000000 000 or nine
0’s. The super user called god is given the code 7 7 7 which
means super user. However, the permission of 6 6 6 gives the user the
power to everything the 7 7 7 permission gives, except that the 7 7 7
permission allows the god the master programmer to execute not
executable programs. The Postmaster Demon is the head demon, and
his permission level in UNIX is 6 6 6. (In the Monarch Programming "Mr.
Postman" is a code word used internationally.) The most important part
of the BEAST system is its communication power. The Electronic Mail
System of the BEAST allows it to communicate worldwide, and along with
electronic mail comes levels of permission to super user (god) is
called Root. A programmer on the Beast must get permission. His
program must get permission. That program that gives permission must
also get permission. In other words, there are levels of permission
that must be gone through. This is similar to the Monarch
program. For instance, the alters personalities which would control the
body during Illuminati gatherings have very tight access permission. It
is very hard to access these hierarchy personalities.
the UNIX system (and the Monarch programming) creates "children" by
"spinning". The "child" spins off. When the "child" is finished it is
"killed" in UNIX lingo. When the programmers created child
processes in the computer, they were having problems with the child
processes killing the parent processes. The same type of problems have
had to be dealt with in the Monarch programming. The initial programmer
is often the biological parent of the child, and this parent is very
responsible for extreme tortures being applied to the child who is
being programmed--not to mention all of the expendible children, who
are killed in front of the child to highlight the reality of the
trauma. The natural reaction of the child being created is to hate the
programmer. Naturally, the Monarch programming had to overcome that
natural tendency, which it does very successfully.
UNIX system uses an internal clock within its computer system. The UNIX
clock is called CRON. CRON checks files to see if the programmer has
put in any files to run. The UNIX system uses data bus lines, which are
like the Monarch programming ribbons, which go through the system.
These ribbons or data bus lines take information and commands from the
computers to other computers.
the UNIX system, insiders have revealed that the Daemon (Demon)
processes of all the UNIX systems have a security flaw. That flaw is
that the Postmaster Daemon has access to them in spite of who the god
is of that particular UNIX computer system. So while owners, who
purchase UNIX systems think that they have exclusive control over their
system, an external Postmaster Daemon coming from the Beast could use
its permission levels to over ride the power of the local owner of the
Monarch system has a similar feature, the Illuminati programmers know
how to access the base or primal anchors to the programming and yank
out any programming they want. All the slaves of these lesser groups
such as the CIA, Church of Satan, Mafia, etc. can all be reprogrammed
rather quickly to serve the Illuminati, if they are not already due to
the Illuminati programmers extra knowledge on how to get into the base
programming. In these many ways, the UNIX system serves both real
computers and also for the internal computers of some slaves’ mind.
slave’s system becomes a computer system. It functions as a series of
computers that are connected to the master computer which is sunk into
the mind at the lowest hypnotic level, which is a level often placed
even below an internal "hell pit". To access the different computers,
combinations of cards were used for the codes (numbers are also used.
See Chapter 4.). Various parts of a Monarch system correspond to what
any computer would have. A microprocessor register has 3 sections on a
computer to make it functional.
Monarch Systems, you would find these 3 represented by 1. stored data
in the library and alters with photographic memories, 2. an instruction
section with codes, and 3. stacking mechanisms.
to all this were a crystal, clock, hour glasses, a compass and an
entire demonic command structure. The eye in front of the big computer
will be protected by legions of spirits. The front big computer runs
front quadrants and the back computer runs the deeper quadrants.
The software so to speak for the Omega programming (computer) may be
set up to include a stacking program called the Potter’s Wheel. The
Potter’s Wheel is a misuse of the Bible, and is a type of programming
that the Charismatic/pentecostal movement carries out. The Mormons and
the Catholics have their own distinctive "software" programs.
initial stacking mechanism would work by telling alters to "Stand in
Order according to rank and serial no." Another code along with a hand
signal would place the Gatekeeper alters up on the Potter’s wheel for
their "creator" to work on them. A group of alters could be taught to
go up on their Potter’s wheel by seeing a pattern of dominoes. It is
whatever the programmer decides. The dominoes were used for coding, but
they also had the programming feature of being able to tie alters
together so that if the System is tampered with out of sequence, a
domino effect would take place. This domino effect is for one program
to set off another program to set off another program.
the Monarch slave’s mind is trying to deal with dozens of suicide
programs running simultaneously, along with perhaps other programs such
as scrambling programs. For instance, one story line used is the
mice run up and down and open up new levels of programming and are tied
to the pendulum/clock mechanism. The mice can activate the hour glass,
and a gold-winged green skirted fairy Whisper balances the hour glass
on her wings. If the slave goes toward freedom, the slave’s mind
triggers programs of all kinds, and the mind ends up not knowing if it
was coming or going with all the different programs which activate.
more exhaustive look at all the craziness and activity of the Omega
& Gamma programs which activate to defend the Illuminati’s Mind
Control are given in other chapters. The programming has been designed
that if it was taken out improperly, it is to come back Seven times
Seven stronger. This is also a clue that the programming is partly a
demonic manifestation, cf. MT 12:43-45 et al.
Components Of The Controls
the center of the System are the mechanisms that control it, such as
the Master Computer, the All-Seeing Eye, the Compass, the Master Clock,
and the Quadrants that tie in together. The System may have 3
hourglasses spinning on axes. These hour glasses can also be called
matrixes, which are on your standard 3 axes, a X axis, a Y axis & a
Z axis. The worlds are various sections of these matrixes. There are
backup worlds & mirror image worlds.
there will be a double system. Some of the more important alter System
are even far more complex than a double System or a double Double
System. Each alter is split so that every alter has another alter
created from it. Then there are demonic doubles--demonic mirror
images in the System. The double images shown in the picture are very
real when describing our System. Some therapists have noticed "Satanic
Guardian Angels" which talk to their patients. They do not know what to
make of these. Some classify them as hallucinations, because they do
not have any room in their belief system for demonology. These are the
demons that do control the multiple’s mind.
with his huge hammer is a painful demon. Thor’s image is made of cast
iron & carried an iron mallet. Thor is a black strong figure. When
his hammer strikes, the slave gets split brain headaches.
Programmers can use the story of the Giant with the Hammer in the Ozma
of Oz book (pp. 141-155) to give the imagery when programming. A
special series of sweeping motions with both hands will relieve the
split brain programming, but some alters can only tolerate these hand
signals being done by the master.
the way, Thor is an important protector in Satanic/occult beliefs,
& the religion of Thor now has equal stature/popularity in Germany
as the Lutheran church. The programs are put into a System and
given codes. These programs use Greek, Hebrew and Druidic letters (or
other esoteric languages) in their activation codes. Actually, these
alphabets also are the way these people numbered with, and the Greek,
Hebrew & Druid letters were used as numbers. These programs could
be called Utility Programs, because they function much like the utility
programs of a computer. Along with all the programming comes
front stories cover almost everything in a System. Dominos have been
used in Monarch programming as the basis for what is called a "Mother
Board" in actual computers. Telephone tones key in on a slave’s
computer matrix. At times, telephone tones in everyday life will make
slaves accidentally wacky. All computers run off of base 2--which
uses the numbers 0, and 1. 0 and 1 can be represented as on and off. In
the programming, they were represented by "He Loves Me", "He Loves Me
Not." The Programmers, especially Dr. Mengele, enjoyed taking a daisy
and pulling its petals off one at a time. First petal, "I love you".
Second Petal, "I love you not." IF the last daisy petal was "I love you
not"--then the child was dramatically killed in front of other children
to be programmed. The Illuminati’s method of death--skinning
alive--has been developed into a fine art, for both programming and
ceremonies. A drawing of this skinning procedure by a witness is on pg.
daisy game, which was scary for a child, heightened the victim’s
attention. Matrixes were built upon this deadly game. How did it feel
to be programmed with Mengele’s "I love you, I love you not"
programming? A victim recalls, "The child was placed in a cage exposed
and naked. The low voltage wires were rigged to the metal of the cage.
The child experienced a continual erratic or sporadic prolonged voltage
of shock until the heart would pulsate and the anxiety level of the
child became out of control. "Then the Dr. would enter the scene with
his sneering taunting smile while holding a daisy in his hands. The
sporadic voltage would continue to flow through the child’s body. As
the shock continued, the Dr. stood before the child pulling petals off
the daisy. His only communication was voiced in these words, "LOVE YOU,
LOVE YOU NOT, LOVE YOU, LOVE YOU NOT," while pulling off the daisy
petals. This action would drive the child crazy because the child knows
full well if that last petal is pulled off it meant death. The
child that is not loved is skinned alive before the other children.
"...we can now begin to understand that the expendable children were in
other cages placed all around us for the eye to see. They went through
the same process as we watched. When the last petal of the daisy was
pulled from the flower they were killed. Then the terror of what we had
just experienced through the seeing and hearing, let us know we were
next, but when? By the time the doctor got to "He loves me not" some
children no longer knew fear. Their ashes were taken from the
crematorium and used in the garden for fertilizer, as a reminder to all
what happens to unloved children.
the clinical room, the lights were used to program the day’s events.
The bright light continually flashed starting with 7 lights, then six
dots, then five dots, then four dots, then three, then two dots, then 1
dot. In the blindness of the lights, we could hear the doctor’s voice,
"LOVE YOU, LOVE YOU NOT." over and over again. A child could have a
false trust when the lights flashed 7 dots. By the time one dot was
flashing, the child’s terror had o