The Illuminati Formula Used To Create An Undetectable Total Mind Controlled Slave
The Illuminati Formula Used To Create An Undetectable Total Mind Controlled Slave
The Illuminati Formula Used To Create An Undetectable Total Mind Controlled Slave
412
The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave
413
The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave
public use.) Alice In Wonderland, the Wizard of Oz and the Tall Book of
Make Believe played a fundamental role as software in a System. The
Wizard of Oz stories are often used to show how & what structures to
put in the small victims internal world. The stories even teach HOW to
create an internal world and its parts. Some of the T.V. shows & movies,
which served as Monarch programming scripts (i.e. the software)
include:
Batman
Bewitched
Bobbys World Cartoons (deliberate triggers)
Dameon/Omen movies
Disney movies (all of them, some with deliberate triggers)
Duck Tails Cartoon (deliberate triggers)
ET (used in alien programming)
Fantasy Island (deliberate triggers)
Ghost Busters (used for who ya gonna call theme)
Love Boat (used for mind control of cruise prostitutes)
My Fair Lady (finishing school for slaves, such as Youngstown, OH)
Star Wars
Steven King Horror Movies
Tiny Toons Cartoons of Steven Speilberg (deliberate triggers)
Wizard of Oz movies
Some of the books which were used as programming scripts, which
havent been mentioned yet, are the Dead Sea Scrolls, the Egyptian
Book of the Dead (satanic rituals follow closely the rituals of the
Egyptian Book of the Dead), Steven King novels, & Wilbur Smiths. The
Mother Goose nursery rhymes were used prolifically for internal codes in
slaves. Now that we have discussed the widely used soft ware
available to the programmers, we dont want to forget the root
program, the tree which was used as a method of organizing the
various programs, just like a computers subdirectories branch out more
subdirectories. If the programming is tampered with, the slave will want
to cut the tree--however, since the tree is in them, this means they will
want very badly to cut their arms, especially their veins. The
programming is not guarded as much as the computers. Everything
guards the BEAST computer including deaf alters who have to be
communicated with using a hand number code system. Such a code
might resemble finger signing 1,2,3,4,5,10 = 15 & following this with a
shutdown code which simply reverses the access equation.
Surrounding the central All-seeing-eye will be alters & programs with
insanity, fear, hopelessness, cutting, burning, aloneness, etc. Strong
demonic forces are attached to these alters & programs. They also can
trigger the slave to have abusive behavior as punishment. A System is
given a life force which is able to regenerate a system, the jokers who
protected the programming, and you have the alpha-numeric codes,
Digitized by knowledgefiles.com
414