Tag Archives: NWO

Biochip implants

Couple of articles about biochip implants:

16-1

Image Source

Big Brother Gets Under Your Skin

By Julie Foster

© 2000 WorldNetDaily.com

Source: WorldNet Daily

http://www.wnd.com/news/article.asp?ARTICLE_ID=17834

Big Brother Gets Under Your Skin: Ultimate ID Badge, Transceiver Implanted In Human

New implant technology currently used to locate lost pets has been adapted for use in humans, allowing implant wearers to emit a homing beacon, have vital bodily functions monitored and confirm identity when making e-commerce transactions.

Applied Digital Solutions, an e-business to business solutions provider, acquired the patent rights to the miniature digital transceiver it has named “Digital Angel®.” The company plans to market the device for a number of uses, including as a “tamper-proof means of identification for enhanced e-business security.”

Digital Angel® sends and receives data and can be continuously tracked by global positioning satellite technology. When implanted within a body, the device is powered electromechanically through the movement of muscles and can be activated either by the “wearer” or by a monitoring facility.

“We believe its potential for improving individual and e-business security and enhancing the quality of life for millions of people is virtually limitless,” said ADS Chairman and Chief Executive Officer Richard Sullivan. “Although we’re in the early developmental phase, we expect to come forward with applications in many different areas, from medical monitoring to law enforcement. However, in keeping with our core strengths in the e-business to business arena, we plan to focus our initial development efforts on the growing field of e-commerce security and user ID verification.”

Dr. Peter Zhou, chief scientist for development of the implant and president of DigitalAngel.net, Inc, a subsidiary of ADS, told WorldNetDaily the device will send a signal from the person wearing Digital Angel® to either his computer or the e-merchant with whom he is doing business in order to verify his identity.

In the future, said Zhou, computers may be programmed not to operate without such user identification. As previously reported in WND, user verification devices requiring a live fingerprint scan are already being sold by computer manufacturers. Digital Angel® takes such biometric technology a giant step further by physically joining human and machine.

But e-commerce is only one field to which Digital Angel® applies. The device’s patent describes it as a rescue beacon for kidnapped children and missing persons. According to Zhou, the implant will save money by reducing resources used in rescue operations for athletes, including mountain climbers and skiers.

Law enforcement may employ the implant to keep track of criminals under house arrest, as well as reduce emergency response time by immediately locating individuals in distress.

The device also has the ability to monitor the user’s heart rate, blood pressure and other vital functions.

“Your doctor will know the problem before you do,” said Zhou, noting peace of mind is possible for at-risk patients who can rest in the knowledge that help will be on the way should anything go wrong.

Indeed, peace of mind is Digital Angel®’s main selling point.

“Ideally,” the patent states, “the device will bring peace of mind and an increased quality of life for those who use it, and for their families, loved ones, and associates who depend on them critically.”

Referring to the threat of kidnapping, the patent goes on to say, “Adults who are at risk due to their economic or political status, as well as their children who may be at risk of being kidnapped, will reap new freedoms in their everyday lives by employing the device.”

Digital Angel®’s developer told WND demand for the implant has been tremendous since ADS announced its acquisition of the patent in December.

“We have received requests daily from around the world for the product,” Zhou said, mentioning South America, Mexico and Spain as examples.

One inquirer was the U.S. Department of Defense, through a contractor, according to Zhou. American soldiers may be required to wear the implant so their whereabouts and health conditions can be accessed at all times, said the scientist.

Illustration of application of Digital Angel(R) from DigitalAngel.net website.

As of yet, there is no central DigitalAngel.net facility that would do the job of monitoring users — the task will most likely fall to the entities marketing the device, said Zhou. For example, if a medical group decides to market Digital Angel® to its patients, that group would set up its own monitoring station to check on its device-users.

Likewise, militaries employing the implant will want to maintain their own monitoring stations for security purposes.

But for critics, military use of the implant is not at the top of their list of objections to the new technology. ADS has received complaints from Christians and others who believe the implant could be the fulfillment of Biblical prophecy.

The Book of Revelation states all people will be required to “receive a mark in their right hand, or in their foreheads: And that no man might buy or sell, save he that had the mark.” (Rev. 13: 16-17)

In an increasingly cashless society where identity verification is essential for financial transactions, some Christians view Digital Angel®’s ID and e-commerce applications as a form of the biblical “mark of the beast.”

But Zhou dismisses such objections to the implant.

“I am a Christian, but I don’t think [that argument] makes sense,” he told WND. “The purpose of the device is to save your life and improve the quality of life. There’s no connection to the Bible. There are different interpretations of the Bible. My interpretation is, anything to improve the quality of life is from God. The Bible says, ‘I am the God of living people.’ We not only live, we live well.”

Sullivan, responding to religious objections to his product, told WorldNetDaily no one will be forced to wear Digital Angel®.

“We live in a voluntary society,” he said. According to the CEO, individuals may choose not to take advantage of the technology.

Zhou alluded to some Christians’ objection to medicine per se, adding such opposition wanes when the life-saving, life-improving benefits of technology are realized.

“A few years ago there may have been resistance, but not anymore,” he continued. “People are getting used to having implants. New century, new trend.”

Zhou compared Digital Angel® to pacemakers, which regulate a user’s heart rate. Pacemakers used to be seen as bizarre, said Zhou, but now they are part of everyday life. Digital Angel® will be received the same way, he added.

Vaccines are another good comparison, said the scientist, who noted,

“Both save your life. When vaccines came out, people were against them. But now we don’t even think about it.”

Digital Angel®, Zhou believes, could become as prevalent as a vaccine.

“Fifty years from now this will be very, very popular. Fifty years ago the thought of a cell phone, where you could walk around talking on the phone, was unimaginable. Now they are everywhere,” Zhou explained.

Just like the cell phone, Digital Angel® “will be a connection from yourself to the electronic world. It will be your guardian, protector. It will bring good things to you.”

“We will be a hybrid of electronic intelligence and our own soul,” Zhou concluded.

In the process of merging with Destron Fearing Corp., a manufacturer and marketer of electronic and visual identification devices for animals, DigitalAngel.net is scheduled to complete a prototype of the dime-sized implant by year’s end. Company executives hope to make the device affordable for individuals, though no cost projections have been made.

ADS, DigitalAngel.net’s parent company, received a special “Technology Pioneers” award from the World Economic Forum for its contributions to “worldwide economic development and social progress through technology advancements.”

The World Economic Forum, incorporated in 1971 with headquarters in Geneva, is an independent, not-for-profit organization “committed to improving the state of the world.” WEF is currently preparing for its “China Business Summit” in Beijing next month for the purpose of forging new economic alliances with the communist nation.

Source

 

A Chip for Your Thoughts

by John Hanchette

Gannett News Service © copyright 2000

Second of three parts

Source: Asbury Park Press

http://www.app.com/news/app/story/0,2110,273813,00.html

May 15, 2000

Privacy advocates fear that as rapid advances are made in technology, the personal lives of Americans may be shadowed by a cloud no bigger than a computer chip.

MicroStrategy founder Michael Saylor proposes uploading information direct to people’s brains via computer chip. One proposal, drawn from a recent science fiction film, is close to reality.

Michael Saylor the 35-year-old founder of MicroStrategy, who perhaps is most famous for watching his personal net stock worth drop $6 billion in a single morning without whimpering is involved with the concept.

Saylor wants to beam information directly into your mind; he calls it “telepathic intelligence.”

Saylor would do it by having a tiny transmitter surgically implanted in your skull or by sewing a computer chip into your wrist and having it transmit to an embedded radiolike device near your ear bones.

His computers already process a mammoth amount of data; pertinent portions would be tailored to your life and interests, then transmitted to brain or ear instantaneously 24 hours a day, seven days a week.

Your stock is tanking sell. You’re on the wrong street turn here. Your spouse wrecked the other car call the insurance company. Your house is being burglarized call the cops. The doctor called in your prescription visit the pharmacy.

“I don’t know who in their right mind would let somebody implant this in their head,” says Fordham University Law School professor Joel Reidenberg, an expert on information privacy. “To the extent that we begin to create a system of automatons responding to chip implants in people’s brains, we will be destroying the foundations of a democratic society.

“Without question, there would be a great opportunity for mischief here.”

MicroStrategy spokesmen confirm that Saylor “sees potential in the future of such a chip” and that the firm’s Strategy.com subsidiary a network of “customer intelligence channels” that sends 300,000 people some 2 million personalized messages a week is working long term on the idea.

But MicroStrategy spokesman Michael Quint said this would be what computer business calls “opt-in”: “”It’s all permission marketing. If you’re talking about the privacy thing, we’d need to get the permission of the customer or the consumer.”

Reidenberg is not impressed: “The notion that it’s “permission marketing only’ is a hoax. There’s no way a citizen in our society can make an intelligent, informed decision about the risks of these implants, which

would be sold through very sophisticated marketing by organizations with large economic interests whose goals are not to promote the public interest. That’s a very scary vision for a democratic society.

“Forget the health and safety issues. Assume they figure out how not to kill people when they put it in. The information-control aspects are beyond what George Orwell could have dreamed about.”

Not everyone is upset by this techno-vision.

When online prankster Bill Cross a few months ago put up a hoax Web site that offered $250 for letting surgeons insert an electronic chip under the right palm for cashless purchases, he was stunned at the response. People signed up for the nonexistent implant “in droves,” he says.

And the techno-vision is reality.

Three months ago Applied Digital Solutions a publicly traded firm based in Palm Beach announced it had developed a high-tech transceiver chip, thinner than a dime, that could be implanted in flesh and used as a tracking device by transmitting the person’s whereabouts to a global positioning satellite.

Trademarked as the “Digital Angel,” the chip could be inserted in children at the behest of parents who fear kidnappers or in elderly parents at the behest of children who fear those afflicted with Alzheimer’s will wander off. The chip can hold medical and financial information.

Applied Digital says the implant would be voluntary, making the privacy issue moot.

But David Sobel, general counsel for the Electronic Privacy Information Center in Washington, D.C., worries the device could evolve into a workplace requirement one that “would dwarf polygraphs and drug testing.”

And more than 500,000 pets now carry between their shoulder blades an implanted, scannable computer chip carrying owner and vaccination data.

“The technology is there to implant chips allowing programming of devices, like in your pacemaker,” says Washington privacy consultant Robert Gellman, who calls Saylor’s idea “Big Brother on steroids.”

Says Gellman: “I keep thinking one day soon they’ll be able to beam commercials into your pacemaker that warn, “Buy our product, or we’re going to skip a couple of heartbeats.’ Think of all the people who believe the CIA is beaming rays into their heads already.”

Saylor bothers privacy advocates in another way.

He wants the government to make the huge Medicare database available online so it easily could be compiled and searched by his firm to discover dangerous medications and unsafe physicians, about whom you would be warned.

“Give me your medical records, and I will give you more life,” Saylor says.

“Privacy advocates should take him seriously,” said Evan Hendricks, publisher of the watchdog Privacy Times. “He’s putting out his own version of “Mein Kampf.’ Saylor is very genuine, I think. The more data they have, the more strategic decisions they can make.”

Source

Climate Change: Washington’s New World Order Weapons

Could chemtrails be part of this agenda?:

HAARP-QSL

Climate Change: Washington’s New World Order Weapons
by Michel Chossudovsky
Professor of Economics, University of Ottawa,
Author of The Globalization of Poverty, second edition,
Common Courage Press, 2000

November 26, 2000

The Americans and the Russians have developed capabilities to manipulate the World’s climate.
Dr. Rosalie Bertell confirms that “US military scientists are working on weather systems as a potential weapon.”

IT’S NOT ONLY GREENHOUSE GAS EMISSIONS: WASHINGTON’S NEW WORLD ORDER WEAPONS HAVE THE ABILITY TO TRIGGER CLIMATE CHANGE

The important debate on global warming under UN auspices provides but a partial picture of climate change; in addition to the devastating impacts of greenhouse gas emissions on the ozone layer, the World’s climate can now be modified as part of a new generation of sophisticated “non-lethal weapons.” Both the Americans and the Russians have developed capabilities to manipulate the World’s climate.

In the US, the technology is being perfected under the High-frequency Active Aural Research Program (HAARP) as part of the (“Star Wars”) Strategic Defence Initiative (SDI). Recent scientific evidence suggests that HAARP is fully operational and has the ability of potentially triggering floods, droughts, hurricanes and earthquakes. From a military standpoint, HAARP is a weapon of mass destruction. Potentially, it constitutes an instrument of conquest capable of selectively destabilising agricultural and ecological systems of entire regions.

While there is no evidence that this deadly technology has been used, surely the United Nations should be addressing the issue of “environmental warfare” alongside the debate on the climatic impacts of greenhouse gases.

Despite a vast body of scientific knowledge, the issue of deliberate climatic manipulations for military use has never been explicitly part of the UN agenda on climate change. Neither the official delegations nor the environmental action groups participating in the Hague Conference on Climate Change (CO6) (November 2000) have raised the broad issue of “weather warfare” or “environmental modification techniques (ENMOD)” as relevant to an understanding of climate change.

The clash between official negotiators, environmentalists and American business lobbies has centered on Washington’s outright refusal to abide by commitments on carbon dioxide reduction targets under the 1997 Kyoto protocol.1 The impacts of military technologies on the World’s climate are not an object of discussion or concern. Narrowly confined to greenhouse gases, the ongoing debate on climate change serves Washington’s strategic and defense objectives.

“WEATHER WARFARE”

World renowned scientist Dr. Rosalie Bertell confirms that “US military scientists are working on weather systems as a potential weapon. The methods include the enhancing of storms and the diverting of vapor rivers in the Earth’s atmosphere to produce targeted droughts or floods.”2 Already in the 1970s, former National Security advisor Zbigniew Brzezinski had foreseen in his book “Between Two Ages” that:

“Technology will make available, to the leaders of major nations, techniques for conducting secret warfare, of which only a bare minimum of the security forces need be appraised… Techniques of weather modification could be employed to produce prolonged periods of drought or storm.”

Marc Filterman, a former French military officer, outlines several types of “unconventional weapons” using radio frequencies. He refers to “weather war,” indicating that the U.S. and the Soviet Union had already “mastered the know-how needed to unleash sudden climate changes (hurricanes, drought) in the early 1980s.”3 These technologies make it “possible to trigger atmospheric disturbances by using Extremely Low Frequency (ELF) radar [waves].” 4

A simulation study of future defense “scenarios” commissioned for the US Air Force calls for:

“US aerospace forces to ’own the weather’ by capitalizing on emerging technologies and focusing development of those technologies to war-fighting applications. From enhancing friendly operations or disrupting those of the enemy via small-scale tailoring of natural weather patterns to complete dominance of global communications and counterspace control, weather-modification offers the war fighter a wide-range of possible options to defeat or coerce an adversary… In the United States, weather-modification will likely become a part of national security policy with both domestic and international applications. Our government will pursue such a policy, depending on its interests, at various levels. 5

THE HIGH-FREQUENCY ACTIVE AURAL RESEARCH PROGRAM (HAARP)

The High-Frequency Active Aural Research Program (HAARP) based in Gokoma Alaska –jointly managed by the US Air Force and the US Navy– is part of a new generation of sophisticated weaponry under the US Strategic Defense Initiative (SDI). Operated by the Air Force Research Laboratory’s Space Vehicles Directorate, HAARP constitutes a system of powerful antennas capable of creating “controlled local modifications of the ionosphere”. Scientist Dr. Nicholas Begich –actively involved in the public campaign against HAARP– describes HAARP as:

“A super-powerful radiowave-beaming technology that lifts areas of the ionosphere [upper layer of the atmosphere] by focusing a beam and heating those areas. Electromagnetic waves then bounce back onto earth and penetrate everything — living and dead.” 6

Dr. Rosalie Bertell depicts HAARP as “a gigantic heater that can cause major disruption in the ionosphere, creating not just holes, but long incisions in the protective layer that keeps deadly radiation from bombarding the planet.” 7

MISLEADING PUBLIC OPINION

HAARP has been presented to public opinion as a program of scientific and academic research. US military documents seem to suggest, however, that HAARP’s main objective is to “exploit the ionosphere for Department of Defense purposes.” 8 Without explicitly referring to the HAARP program, a US Air Force study points to the use of “induced ionospheric modifications” as a means of altering weather patterns as well as disrupting enemy communications and radar.9

According to Dr. Rosalie Bertell, HAARP is part of an integrated weapons’ system, which has potentially devastating environmental consequences:

“It is related to fifty years of intensive and increasingly destructive programs to understand and control the upper atmosphere. It would be rash not to associate HAARP with the space laboratory construction which is separately being planned by the United States. HAARP is an integral part of a long history of space research and development of a deliberate military nature. The military implications of combining these projects is alarming. The ability of the HAARP / Spacelab/ rocket combination to deliver very large amount of energy, comparable to a nuclear bomb, anywhere on earth via laser and particle beams, are frightening. The project is likely to be “sold” to the public as a space shield against incoming weapons, or, for the more gullible, a device for repairing the ozone layer. 10

In addition to weather manipulation, HAARP has a number of related uses:

“HAARP could contribute to climate change by intensively bombarding the atmosphere with high-frequency rays… Returning low-frequency waves at high intensity could also affect people’s brains, and effects on tectonic movements cannot be ruled out. 11.

More generally, HAARP has the ability of modifying the World’s electro-magnetic field. It is part of an arsenal of “electronic weapons” which US military researchers consider a “gentler and kinder warfare”.12

WEAPONS OF THE NEW WORLD ORDER

HAARP is part of the weapons arsenal of the New World Order under the Strategic Defense Initiative (SDI). From military command points in the US, entire national economies could potentially be destabilized through climatic manipulations. More importantly, the latter can be implemented without the knowledge of the enemy, at minimal cost and without engaging military personnel and equipment as in a conventional war.

The use of HAARP — if it were to be applied– could have potentially devastating impacts on the World’s climate. Responding to US economic and strategic interests, it could be used to selectively modify climate in different parts of the World resulting in the destabilization of agricultural and ecological systems.

It is also worth noting that the US Department of Defense has allocated substantial resources to the development of intelligence and monitoring systems on weather changes. NASA and the Department of Defense’s National Imagery and Mapping Agency (NIMA) are working on “imagery for studies of flooding, erosion, land-slide hazards, earthquakes, ecological zones, weather forecasts, and climate change” with data relayed from satellites. 13

POLICY INERTIA OF THE UNITED NATIONS

According to the Framework Convention on Climate Change (UNFCCC) signed at the 1992 Earth Summit in Rio de Janeiro: “States have in accordance with the Charter of the United Nations and the principles of international law, the responsibility to ensure that activities within their jurisdiction or control do not cause damage to the environment of other States or of areas beyond the limits of national jurisdiction.” 14

It is also worth recalling that an international Convention ratified by the UN General Assembly in 1997 bans “military or other hostile use of environmental modification techniques having widespread, long-lasting or severe effects.”15 Both the US and the Soviet Union were signatories to the Convention. The Convention defines “’environmental modification techniques’ as referring to any technique for changing–through the deliberate manipulation of natural processes–the dynamics, composition or structure of the earth, including its biota, lithosphere, hydrosphere and atmosphere or of outer space.” 16

Why then did the UN –disregarding the 1977 ENMOD Convention, as well as its own charter, decide to exclude from its agenda climatic changes resulting from military programs?

EUROPEAN PARLIAMENT ACKNOWLEDGES IMPACTS OF HAARP

In February 1998, responding to a report of Mrs. Maj Britt Theorin –Swedish MEP and longtime peace advocate–, the European Parliament’s Committee on Foreign Affairs, Security and Defense Policy held public hearings in Brussels on the HAARP program.17 The Committee’s “Motion for Resolution” submitted to the European Parliament:

“Considers HAARP by virtue of its far-reaching impact on the environment to be a global concern and calls for its legal, ecological and ethical implications to be examined by an international independent body…; [the Committee] regrets the repeated refusal of the United States Administration… to give evidence to the public hearing into the environmental and public risks [of] the HAARP program.” 18.

The Committee’s request to draw up a “Green Paper” on “the environmental impacts of military activities”, however, was casually dismissed on the grounds that the European Commission lacks the required jurisdiction to delve into “the links between environment and defense”. 19 Brussels was anxious to avoid a showdown with Washington.

FULLY OPERATIONAL

While there is no concrete evidence of HAARP having been used, scientific findings suggest that it is at present fully operational. What this means is that HAARP could potentially be applied by the US military to selectively modify the climate of an “unfriendly nation” or “rogue state” with a view to destabilizing its national economy.

Agricultural systems in both developed and developing countries are already in crisis as a result of New World Order policies including market deregulation, commodity dumping, etc. Amply documented, IMF and World Bank “economic medicine” imposed on the Third World and the countries of the former Soviet block has largely contributed to the destabilization of domestic agriculture. In turn, the provisions of the World Trade Organization (WTO) have supported the interests of a handful of Western agri-biotech conglomerates in their quest to impose genetically modified (GMO) seeds on farmers throughout the World.

It is important to understand the linkage between the economic, strategic and military processes of the New World Order. In the above context, climatic manipulations under the HAARP program (whether accidental or deliberate) would inevitably exacerbate these changes by weakening national economies, destroying infrastructure and potentially triggering the bankruptcy of farmers over vast areas. Surely national governments and the United Nations should address the possible consequences of HAARP and other “non-lethal weapons” on climate change.

NOTES

1. The latter calls for nations to reduce greenhouse gas emissions by an average of 5.2 percent to become effective between 2008 and 2012. See Background of Kyoto Protocol at http://www.globalwarming.net/gw11.html

2. The Times, London, 23 November 2000.

3. Intelligence Newsletter, December 16, 1999.

4. Ibid.

5. Air University of the US Air Force, AF 2025 Final Report, http://www.au.af.mil/au/2025/ (emphasis added).

6. Nicholas Begich and Jeane Manning, The Military’s Pandora’s Box, Earthpulse Press, http://www.xyz.net/~nohaarp/earthlight.html See also the HAARP home page at http://www.haarp.alaska.edu/

7. See Briarpatch, January, 2000. (emphasis added).

8. Quoted in Begich and Manning, op cit.

9. Air University, op cit.

10. Rosalie Bertell, Background of the HAARP Program, 5 November, 1996, http://www.globalpolicy.org/socecon/envronmt/weapons.htm

11. Begich and Manning, op cit.

12. Don Herskovitz, Killing Them Softly, Journal of Electronic Defense, August 1993. (emphasis added). According to Herskovitz, “electronic warfare” is defined by the US Department of Defense as “military action involving the use of electromagnetic energy…” The Journal of Electronic Defense at http://www.jedefense.com/ has published a range of articles on the application of electronic and electromagnetic military technologies.

13. Military Space, 6 December, 1999.

14. UN Framework Convention on Climate Change, New York, 1992. See complete text at http://www.unfccc.de/resource/conv/conv_002.html (emphasis added).

15. See Associated Press, 18 May 1977.

16. Environmental Modification Ban Faithfully Observed, States Parties Declare, UN Chronicle, July, 1984, Vol. 21, p. 27.

17. European Report, 7 February 1998.

18. European Parliament, Committee on Foreign Affairs, Security and Defense Policy, Brussels, doc. no. A4-0005/99, 14 January 1999.

19. EU Lacks Jurisdiction to Trace Links Between Environment and Defense, European Report, 3 February 1999.

Copyright by Michel Chossudovsky, Ottawa, November, 2000.

All rights reserved. Permission is granted to post this text on non-commercial community internet sites, provided the essay remains intact and the copyright note is displayed. To publish this text in printed and/or other forms contact the author at:

Michel Chossudovsky
Department of Economics,
University of Ottawa, Ottawa, K1N6N5

chossudovsky@videotron.ca,
(Altern. E-mail: chossudovsky@sprint.ca)
fax: 1-514-425-6224
voice mail: 1-613-562-5800, ext. 1415

Source

Video about HAARP:

Senator Murkowski asks questions about the impending dismantling of the HAARP facility in Alaska. Basically the defense related research has been done, they are moving on to other ways of managing the problems the ionosphere poses for radio communication, and nobody wants to pay the $5 Million a year to keep it running for academic research.

Breaking the Chain – Breaking free of cult programming: Equipment Frequently Used by Trainers

Here is some info about the equipment Illuminati trainers use:

Appendix

Equipment Frequently Used by Trainers

It may help therapists to realize the equipment that trainers use. If their client describes these items, which may appear quite sophisticated, believe them. The cult has become quite technologically advanced.

Training room: the average training room is a neutral colored room, with walls painted either a dull gray, white, or beige. Some may be painted in various colors, as part of color coding. They are often located in secret underground rooms, or basements of large private residences, and will be entered from the main building through a covered doorway. Impromptu training rooms may be set up during military exercises outdoors, in covered canvas tents.

Trainers: the Illuminati have a rule: there must always be a minimum of two trainers working with a person. This prevents a trainer from being either too severe, or permissive, or developing too close a bond with the subject; the watchful eye of the other trainer prevents this. Younger trainers are paired with older, more experienced trainers. The older trainer will teach the younger, who does most of the actual work. If the younger is unable to finish a task, or loses heart, the older one will step in.

Head trainers: will teach, they will also work with the council leaders and hierarchy. All members are required to come in for a “tune up” (reinforcing programming), even top leaders, from time to time.

EEG machine: will often have abbreviated hookups for quick use. Used extensively with brain wave programming; also to verify that a certain alter is out when called up. May be used to verify deep trance state before initiating deep programming. Trainers are taught to read these readouts.

Trainer’s table: a large table, frequently steel covered with plastic, or easily cleaned material. On the sides at intervals are restraints for arms, legs, neck to prevent movement.

Trainer’s chair: large chair with arm rests. Will have restraints as above at intervals to restrain movement while person sits in chair.

Shock equipment: models and types are quite varied, depending on age and company. Most have a set of rubber covered wires, with electrodes that may be connected with Velcro, rubber (steel tips imbedded under finger and toe nail beds), or gel pads (larger body areas such as chest, arms, legs). Some are tiny electrodes, which can be taped next to eyes, or placed within genitalia. These are connected to the “shock box”, which has controls that can determine amount of electricity , and frequency, if interval shocks are desired.

Drugs: any number of opiates, barbiturates, hypnotics, sedatives, anesthetic agents. Resuscitative drugs, antidotes are also kept, clearly labeled and indexed. Many drugs, especially experimental ones, are only known by code names, such as “alphin 1”.

CPR equipment: in case person has adverse reaction to drugs or programming. At times, a child alter will come out inadvertently during a programming sequence, and will be overdosed with the drugs meant for adult alters. The trainers must give it the antidote, and resuscitate it, just as if a real child is out. They are well aware of this fact, and will severely punish child alters, to teach them to come out only when called out.

Virtually reality headsets: the keystone in recent years. Many programming sequences utilize holographic images, and virtual reality set ups, including assassination programs, where the person realistically “kills” another human
being. These virtual disks are far more advanced than those in video arcades.
Body building equipment: used in military training to increase fitness, lean body mass.

Steel instruments: used to insert into orifices, cause pain

Stretch machine: used as punishment, “stretches ” person without breaking bones. Extremely painful.

Trainer’s grids and projectors: used to project grids on wall or ceiling.

Movie projector: to show movies, although new VR disks are replacing these computer: collect and analyze data; keep computer grid on person’s system. Current military computer access codes will be used to download into governmental computers.

trainer’s journals: contain indexed copies of subject’s systems, including key alters, command codes, etc.

Comfort objects: used to comfort subject afterwards. May be toy or candy for child alters, or oils for massage. Warm towels, or beverages may be given, as the trainer “bonds with” and comforts person they worked with. This is probably the most important part of the training process, as the trainer explains calmly, kindly how well the person did, how proud they are of them.

Source

Breaking the Chain – Breaking free of cult programming Part 15

And here it is, the final chapter with our info packet with the Illuminati:

Chapter Fifteen

Core splits, Denial programming, the last Five Steps of Discipline Virtual Reality Programming

Virtual reality programming (VR) is a form of programming that has become more and more widely used in the past few decades. It involves the person being placed in VR headsets and suit while a cult created VR disk is used to run the program. It can be used to create 3D and holographic images, and especially is useful in scripted programming, and target practice sequences for assassin training. Under hypnosis , the person will really believe they are in the scene.

Virtually any scenario can be recreated. Images to be “burned in” will be shown on the VR disk, and reinforced repetitively during the programming sequence. Some trainers feel it removes the element of “human error” in training, and use it quite extensively. VR programming, like any other programming, means going inside and finding out the distortions that were placed in the parts that went through the programming, allowing them to see how they were deceived, and dealing with the trauma associated with the programming.

Denial Programming:

Denial programming begins with the first experiences the infant goes through in life. The child has been horrendously wounded and traumatized, yet the next morning, the adults around him are acting normally, as if nothing had happened. They are modeling a lifestyle of denial for the infant and young child. This is reinforced later by the child being told:

“It was just a bad dream” (oh, how the child wants to believe this lie. It makes the pain less to think it didn’t really happen)

“It’s just your imagination; it isn’t really happening” (which is again embraced as an escape from the horror). Denial will also be fed by the adults around the child telling them that they will never be believed if they disclose. There will be set ups to teach the child what they see and hear, and to teach the child to trust outside adults to tell them their reality.

A typical set up will go like this:

The adult will hold an object such as an orange in their hand, and ask the young child, about age two or three, “what is this?”. The child will quickly respond, “oh, an orange!” The child will be shocked, and told, “no, it’s an apple.” The child will be confused, because what they are looking at is obviously an orange. It is the color orange, smells like an orange, looks like an orange. The question will be repeated. The child may answer again,” an orange,” and will be shocked again. Finally, the child, unsure and not wanting to be punished, will say, “an apple,” and be praised.

The purpose of this exercise is to teach the child to not trust their own reality, and look to outside adults or leaders to tell them what reality really is.

That is the basis of denial: the person learns to not trust their own reality, because of punishment and fear when they have spoken the truth.

Alters will be created as the child grows, whose purpose is to deny the cult abuse. If any leakage or breakthrough occurs, the denial alter’s job is to create a plausible explanation: it was a nightmare, a book the person read, a movie they saw, etc. These alters will read and quote literature that refutes SRA. THESE ALTERS OFTEN BELIEVE THAT THEY ARE SAVING THE LIFE OF THE SURVIVOR. They have been told that if the survivor remembers, and believes the abuse, the survivor will be killed, or the denial alter will be severely punished or shattered for not doing their job. These parts have a vested interest in their job: they believe their very existence and they body’s survival, depend upon them.

Suggestions:

Arguing with a denial alter will not work, since they are not motivated by logic, but fear. A better approach is to ask them what they fear if the person remembers. This will open up the deception and lies that were ground in. They may be protecting the survivor from suicidal alters behind them, who are programmed to kick in if denial is broken through. Allowing them to vent their concerns, and enlisting the aid of helpers or cognitives who do not have suicidal or denial programming will help. Showing them reality in a gentle way, allowing them to “listen in” on others who share will go a long way.

Some denial is the natural consequence of self protection from the horrors of abuse; not all denial is programming. But if denial is constantly blocking therapy, and causing it to come to a complete standstill; if the person becomes highly suicidal every time denial is set aside briefly, then the possibility needs to be considered. Safety, inner cooperation, and patience will go a long way in decreasing denial. As denial backs down, you can expect an immense amount of grieving as the truth is realized. Denial protected the survivor from the horrendous pain of the truth, and should be let go of extremely slowly and cautiously, with plenty of support during the grieving stage.

Core splits

Core splits are intentional traumatic splits created from the core personality.

The core may be literally “splintered” by overwhelming psychological and physical/spiritual trauma. The trauma needed to create a core split must be very early and psychologically devastating. Fetal splits may occur, but they are rarely a core split; instead, the core creates an alter, but remains.

Core splits are done between the ages of 18 months and three years. Usually at least one parent or main caretaker is involved in the trauma, because this creates the psychological devastation necessary to split the core. Physical trauma alone rarely causes core splits. The torture is intense and prolonged, until the child collapses. It may be shocking, stretching, being hung in a high place, or a combination of several techniques. Being placed in “shock boxes”, or near drowning are also used.

The techniques that create core splits are also dangerous, since they can also cause autism if the child cannot endure the programming. When I was in the cult, I fought to stop core splitting because occasionally children were lost or the foundational personality was too weakened.

The core may split into two, three, or up to eight splits internally. Each split will be a piece of the “core child”. The original core will not resurface after splitting. These splits are used by cult trainers to be used as templates to create systems within the child. A core split, or a split from one, will be a strong alter, and can be re-split many times in the programming process, to create a multifaceted and diverse system within.

Suggestions

Core splits represent intense foundational trauma. They will be the basis for later systems, which may be completely dissociated from the split as time goes on. Work on core splits should go very slowly, and only late in the therapy process when there is immense intrasystem cooperation. The survivor will need every internal resource to deal with these traumas, and plenty of outside therapeutic support.

It may mean hospitalization unless the survivor can keep the trauma from emerging too quickly, and the therapist and survivor can go extremely slow.

Other, less dissociated systems and fragments should be integrated.

Acknowledging the abuse cognitively will be the first step in dealing with core trauma. Letting more dissociated parts grieve about “hearing about” what happened may come next. Allowing feelings near the core to come close, a little at a time, with helpers and internal nurturers offering support will help.

These feelings should be titrated, and looked at a little at a time. Splits may be different ages, and may need to express themselves in different ways.

There may be “dream programming”, a “fantasy world”, or other flight from reality surrounding the core splits, that protects them from contact with the outside world, which is perceived as brutal and cold. Parts may be completely disconnected from outside reality in an effort to buffer pain.

Slow, patient nurturing and reality orientation will help these tremendously traumatized parts begin to join outer reality. Some parts will always have been aware of what happened, but won’t care to join the outside world.

Patience, allowing them to vent, will help most.

Steps of Discipline

Step seven: Not caring

This step will take the child further into a perpetrator role. The child will be forced to hurt others and prove their ability to not care during the process.

Step eight: Time travel

The child will be taught spiritual principles of “traveling” both internally and externally, with set ups, role playing, and guided exercises reinforced with trauma. The goal will be to reach “enlightenment”, an ecstatic state of dissociation reached after severe trauma.

Steps nine, ten, eleven

These will involve programming that will vary according to the child’s future role in the cult. Sexual trauma, learning to dissociate and increase cognition, decrease feeling will be emphasized in these steps.

Step twelve: ceremony of becoming at age twelve to thirteen, the child will be formally inducted into the cult and their adult role in a ceremony of “coming of age”. They will prove this ability by performing the role/job they have been training for, to the satisfaction of the trainer and leaders; by undergoing a special induction ceremony. The ritual and ceremony will be held with other children of the same age, who are dressed in white and given a prize as acknowledgement that they have completed the basics of their training successfully.

They will continue to be abused, even as adults, but the major traumatization and creation of system templates will have occurred by this age. Future training will refine what was already placed in the child by this age, or build upon the foundation.

Suggestions

Grieving the abuse, acknowledging the feelings associated with undergoing the trauma will be important. It will be necessary to deal with perpetrator guilt, since by this time the child will be a perpetrator, and will have identified with the adult role models around them. This can be difficult to do, since perpetration will horrify the survivor when they remember this. Supporting the survivor, remaining non judgmental, and encouraging acceptance of these parts is important. Pointing out that at the time, they saw no other options available will help. Realizing that perpetrator alters saved the child’s life, and that they had no other way to act, especially originally, the first time, will need to be pointed out. The survivor may feel hostile towards, or reviled by perpetrator alters, but they are the expression of the abuse and limited choices they were allowed. Grieving being a perpetrator will take time and caring support by others.

The End

Source

Breaking the Chain – Breaking free of cult programming Part 14

And few more chapters and our journey is over with the illuminati…

Chapter Fourteen

Spiritual Programming

**Note: this chapter includes discussion of both cult and Christian spirituality; do not read if these themes are triggering***

Any discussion of Illuminati programming would be lacking if it did not address spiritual programming. Most of the previous chapters have dealt with scientifically based, organized, structured programming.

But the Illuminati are first and foremost not scientists, but spiritual. The very foundation of the group is based on the occult. And they go to great lengths to grind in these occult beliefs in their people’s systems.

The amount of spiritual programming in the person’s systems will vary from person to person, and depends on the individual group, their religious heritage, the leader’s beliefs, and the trainers in the group.

All children go to rituals, where they are dedicated from before birth as well as at intervals throughout their life. In these rituals, demonic entities are invoked, to coerce the person into servant hood, loyalty, and secrecy; as well as reinforce the programming being done.

Trainers will invoke demonic layering during programming sessions. This is done after acute trauma. The person is asked if they want more pain, and they will always say “no”. The trainer then offers them a way out: if they will accept a “protector” or “protectors” they won’t be hurt any more. The trainers will want this, knowing that with these “protectors’” they can shorten the training sessions. The protectors, or guardians, will reinforce the programming internally, without outside help. This concept will seem controversial to people who do not believe in spiritual realities, but I am only describing what the Illuminists believe, and their trainers practice.

Spiritual programming will also include: being forced to memorize rituals, THE BOOK OF ILLUMINATION, and other books which contain cult beliefs. The person will be saturated from infancy on, in classes and training sessions, with cult beliefs. They will go to rituals where the adults participate in spiritual worship, wearing robes, and giving obeisance to the group’s particular guardian deity. Moloch, Ashtaroth, Baal, Enokkim are demons who are commonly worshipped. The child may see a sacrifice, either real or a set-up, to these deities; animal sacrifices are common. The child will be forced to participate in the sacrifices, and will have to go through blood baptism.

They will be forced to take the heart, or other internal organs, out of an animal that has been sacrificed, and eat them. The adults, and leaders of the group, will place their hands on the child’s head, while it is drugged, and invoke demonic entities.

One ritual which is actually programming is the “resuscitation ritual”. In this ritual, the child may be heavily drugged, and shocked or tortured, to the point that his heart may stop. The head priest will then “resuscitate “ the child, using drugs, CPR, and incantations. When the child comes back, and is awake, he or she will be told that they were “brought back to life” by the demonic entity that the particular group worships, and that now the child owes it their life. They are told that if they ever tell, or try to get the demon to leave, they will return to the lifeless state they were in prior to resuscitation.

Spiritual “healings” due to the demonic are also common. Injuries caused by torture, or programming sessions, or even military exercises, will be healed almost instantaneously during invocations.

Jewel programming will often have demons loyal to the generational family spirits layered in. These are called the “family jewels”. The demons “guard them” and help protect the programming surrounding them.

In a sense, every ritual that a young child is part of, is an intense programming experience, as the child observes the adults around them, and imitates their behavior. The child will be severely punished if it falls asleep, and will be told that demons will kill it if it goes to sleep again during a ritual.

They are taught to be completely silent, no matter what they witness during the rituals. The child will witness things that seem utterly unbelievable, including faces appearing transformed by the demonic, channeling, other voices coming out of a leader’s mouth, reading of members, telling the future. Group guidance will often be given through channeling of a strong spirit or principality; members who can channel powerful spirits and survive are respected, and their guidance will be looked for.

Some groups will use scriptures negatively or program the child to hate Christian symbols and theology. Other groups will encourage the amnesic front to embrace a Christian lifestyle, while forcing the back alters to renounce and blaspheme the choices the front has made, to separate the two alter groups even further. The cult alters will be told that since they renounced Christianity, they have committed the “unpardonable sin” and can never be forgiven. They will be shown scriptures that supposedly back this up.

In moments of despair, during intense torture or isolation, a person will often cry out to God for help. The trainers or other cult members will often mock the person, telling the person that God has forgotten them, or ask “where is God now? He must hate you…..”

Any negative experience the person undergoes, will be used to reinforce the concept that they have been abandoned by God. The cult will gleefully point out the contradictions between what the person experiences, and what Christianity teaches should happen to them.

They may distort scriptures, or use false scriptures. They may distort Christian hymns, or use them in programming. A favorite hymn is “may the circle be unbroken”, since it can have two meanings.

Suggestions:

Spiritual programming can be some of the most damaging programming within a person’s systems, since it attempts to cut them off from the source of real healing. It is an intentional distortion of truth, with events calculated to teach and reinforce wrong concepts of God. Many survivors are unable to hear Christian terms, or are intensely triggered by any religious discussion.

The survivor and therapist need to realize that these negative reactions are the result of years of false teaching, pain, punishment, distortion and set-ups. It is important not to judge the parts of the person that are negative towards spirituality, or come out, proclaiming the power and benefits of cult spirituality. The survivor’s front may be horrified to hear or learn about parts that have these feelings, especially if they are a strong Christian. These parts inside are sharing the only reality they have ever known, and need time and patience to ground, and experience reality outside of the cult setting.

Demonic oppression may need to be dealt with, and even deliverance, to bring relief to a system that is being terrorized by the demonic.

Each therapist and survivor will need to come to terms with their own spiritual beliefs. I personally believe that a therapist needs to consider the possibility of the demonic, since this is what the survivor has been exposed to all their life. The cult certainly does believe it is real, and anyone who has been involved in a cult setting will have had experiences that are in-explainable by normal rational scientific principles.

The survivor needs hope, and healing. A positive spirituality based on love, gentleness, forgiveness, that is the opposite of the coercing, punitive, negative spirituality the survivor has known, will help immensely in the healing process. A spiritual belief system that offers hope, healing, grace, mercy, and affirmation will often give the survivor the support they need to go on during the often difficult process of healing.

To Be Continued…

Source