A Summary of the Abuse and Criminality
“One may walk over the highest
mountain one step at a time”. - John Wanamaker
This is an outline of the main ways
they abused us. Even though it may seem overwhelming to read about them
altogether, it is beneficial to succinctly know how we were actually abused.
(Further in the webpage are detailed descriptions and understandings of the
various aspects of the abuse). Firstly, the perpetrators wish to deceive us
that we “were not harmed”, “are suffering from delusional thinking” and that
“we were saved, cared for and looked after”, etc. When we look specifically at
the abuse, this is the exact opposite. We were/are stopped from having any
freedom to truly do what we wish. This includes not following their orders, and
in whatever way they couched the order such as “It would help your mum, your
country, etc to go to this place” or “you would enjoy seeing the tropics”, etc.
We suffered awfully from their extreme torture, drugging, lying and
manipulation in the mind control programming process and its maintenance. We
also suffered badly from their enforced deployment, and being put in life
threatening situations such as at places where people of our nationality, race
and religion were murdered. Even if the deployment was for generally good
reasons e.g. surveying the level of terrorism against Australia,
because we had no say in whether we wanted to be deployed, this is immoral and
illegal. Then there are the dreadful effects such as Post Traumatic Stress
Disorder (PTSD), Dissociative Identity Disorder (DID), physical scarring,
having long term physical health issues such as kidney and liver issues, etc.
We were also deliberately stopped from knowing that we are/were abused by
psychological techniques such as manipulated dissociation, intensive drugging,
etc. In terms of the criminality, the perpetrators should be taken to court and
tried for hideous and long term crimes such as psychological and physical
torture and hurt; for deliberately placing people in harm’s way; for the severe
death threats to oneself and loved ones; and the killing of victims by enacting
suicide programming within them; etc.
Secondly, supporters like
therapists and friends are sincerely concerned for our welfare and would like
to know what actually happened to us. This summary helps with this. Thirdly,
there is very little information on the topic in order to contradict the
perpetrators’ lies, and to support survivors and our supporters. Such
information about GOCMP itself, let alone GOCMP in Australia, can’t be found in a
doctor’s office or in books. There is information about government mind control
in the U.S. and Canada on the web thankfully; and information on
ritual abuse (including in Australia)
which describes the same forms of programming mind control and mentions abuse
such as child pornography (see for example
http://survivingritualabuseaustralia.blogspot.com/). Most, if not all,
Australian survivors of ritual abuse, suffer/ed from GOCMP in Australia and overseas. We usually
go through a process of being aware of firstly, the ritual abuse, and then
seeing there was more abuse which was paramilitary, organized crime, government
related, etc. The main aims of this webpage are to inform, expose and validate
that there is GOCMP operating in Australia, and that Australian
ritual abuse survivors may quite likely be abused by very secretive criminals
involved in a secret paramilitary organisation and organised crime.
The main areas of abuse are: the
deliberate exploitation of family and friendship dynamics in order to produce
victims; the mind control programming and its drugging, torture, trauma,
dissociation and manipulation; the training which included torture, trauma and
manipulation; the accessing that maintained control, deployed victims and directed
victims to areas of further abuse; the enforced deployment that may include
being killed; the intentional amnesia and non awareness of being abused; the
side-effects of the abuse such as PTSD, DID (Dissociative Identity Disorder),
physical scarring and madness, and which the perpetrators did not mind
happening; and robbing us of our lives where we had no personal choice and
fulfillment. The distinguishing aspects of the organisation/abuse are the
deliberate exploitation of generational family dynamics to produce victims; and
the mind control programming, training, accessing and deployment. Other abusive
organizations may have generational organised crime such as the Mafia and
outlawed motorcycle gangs, but they do not abuse non aware victims. Other abusive
organisations may have mind control such as extreme right wing terrorists and
fanatical fundamentalist religious organisations, but they do not have
deliberately produced and totally non conscious victims.
The Deliberate
Exploitation of Family and Friendship Dynamics.
“Stephanie says, that She wants to
know Why she's given half her life to people she hates now” (Stephanie Says,
The Velvet Underground)
The first way people are abused is
by the deliberate exploitation of family and friendship dynamics. The
perpetrators see partnerships, reproduction and close friendships as the main
way to obtain more victims. Within a family it is very difficult, especially as
a child and teenager, to stop the programming, training and deployment when
surrounded by family perpetrators and victims. Most victims have at least two
generations of organisation affected individuals on both sides of the
parenting. Usually at least one parent is a conscious and deliberate
perpetrator. There are families where both parents are victims, and may not
know that they or their children are being abused. However, there is a
conscious perpetrator lurking somewhere in the family such as a grandparent,
auntie, etc who would direct the abuse. Family perpetrators have access to
practically everything concerning the victim including the time, the outward
appearance of “(supportive, non-harming) family” local knowledge of other
perpetrators to whom the family perpetrator will collaborate with to program
and deploy the victim. Added to these are the local perpetrators who are at
child care centres, schools, churches and other local institutions, and living
in the neighbourhood. This oppressive atmosphere allows little to no means of
escaping. Most survivors need to leave the area of their original abuse in
order to escape.
Victims are also basically
predetermined products of deliberate marriage and reproduction strategies.
Spousal victims can be “fresh blood” as happened in my family where the old man
deliberately went from Sydney to a very isolated town in New South Wales
(Bourke) to find a very insecure woman (my mum) in order that she be programmed
and moved very far from her family. Non
aware victims can also be programmed to marry others who are similar and there
are handlers who control this marriage. Perpetrators often marry other
perpetrators and their children have to deal with both sets of perpetrator
parents. The main perpetrators in the family start indoctrinating the children
early in order to achieve control.
Control is mapped out already and you have no say in the horrible
torture and exploitation done to you. This is done because you are surrounded
by perpetrators in the family, or other victims who cannot escape because they
are programmed or are too fearful. To the perpetrators, the only reason you are
born is to be abused by an illegal money making cartel and power obsessed
despots “who worship” hideous beings (ritual abuse). Your perpetrator
parent/parents/grandparent/etc. sell you to cartels and you are abused for
organized pedophilia, for paramilitary exercises, for medical experimentation,
etc. Later, in your adult life, the abuse will be chosen as well. This is an
enforced heterosexual marriage (even if you are gay/lesbian) to someone already
abused or a perpetrator, and employment usually in an occupation that is setup
for their money making such as teaching for organized pedophilia or butchering
for dissecting body parts. As an adult and parent victim, you will then be part
of the cycle of the generations of perpetrators and victims, even if you are
deliberately made oblivious to it all by programming.
To use my family as an example of
this. As said, the old man, the only perpetrator in the immediate family (as he
wanted be involved and knew about the abuse) travelled in the mid fifties from Sydney to western NSW to
find an insecure woman to marry and bring her back to the coast in order to
produce a family and have more victims. Being insecure she would not be able to
fight programming by firstly believing in herself. She was also 800 kms away
from supportive family if she did believe something was wrong and wanted to
escape. My brother and I were brought up near Kiama and Wollongong, and like Mum, were programmed to
firstly not know about how we were abused, and then were trained in particular
roles in order to make money for the old man and the other perpetrators. My
brother married someone whom the old man thought could be dissociative enough
to be mind controlled, and which he then went about to do. They had a child who
was also mind controlled, and again, the old man, oversaw his mind control, and
the mind control of his eventual wife and child. The whole family is mind controlled and
unaware of any abuse done to them, and are trained in ways that suit their
physical and intellectual abilities so that they make money for the
perpetrators. These jobs include making illicit drugs and disposing bodies.
This is different from other
organized crime such as the mafia, local gangs, outlawed motorcycle gangs, etc.
Perpetrators are drawn to these organizations because they want to commit
crime. They are consciously wishing to be perpetrators. The perpetrators do not
wish to have non conscious victims in their organizations and do not abuse
them. They desire to have a gang of conscious and willing outlaws committing
crime together. MC perpetrators will abuse people who don’t wish to perpetrate
and will keep them amnesic (not conscious) to their abuse. It is the mind
control programming that produces amnesic victims and differentiates these
perpetrators from criminal gangs which do not have the programming and which
only allow gang members desiring criminal activity. Because of the abilities
and power that mc perpetrators have developed over the years, they are the “top
dogs” in local, national and international “turfs” and small time criminal
groups are monitored so that there is no competition and no large scale
accumulation of wealth and power. If there is, they are killed off in ways
which are intended to leave no evidence, and which are sometimes done by
programmed amnesic victims so that there are therefore no murderers, apart from
the knowing victims’ handlers.
Within the family, perpetrators
will create and abuse divisions in order to “divide and conquer”. Individual
victims will be pitted against each other and it is the perpetrators who are
seen supposedly as “the saviours”. Main perpetrators will also even make
themselves “the best saviour”. For example, a major perpetrator at the local
high school, a teacher, set it up that she “saved me from my father” and which
was another lie.
Mind Control
Programming
Mind control is control of
someone’s thoughts, behaviour, beliefs and actions. In other words, control of
the person. Nearly everyone in the world is mind controlled in that there are
very few people who can do what they want when they want. Even rich people, who
have the monetary ability to do as they wish, have socio-economic conditioning
that they can only have this so called freedom by the exploitation of others.
This conditioning is societal and comes from the socio-economic aspects of an
economy such as private enterprise capitalism. The conditioning is done mainly
in the family, school and workplace and is above board and known by society.
Mind control programming is very
different and is done directly on the person. There is control of someone’s
thoughts, behaviour, beliefs and actions, but is done by one perpetrator to a
victim, or one perpetrator to a perpetrator (when the second perpetrator wishes
to be more a perpetrator). It is one-to-one relationship based, rather than
done by society and its institutions. It is also very secretive as it is
illegal. It usually consists of intense torture, drugging, manipulation and
trickery. Brainwashing is the old term for it. It is called programming these
days as the aim is to make a human being into a robot with cues and actions.
Programming consists of three main
areas, and the word ‘programming’ can change meaning depending upon grammatical
usage. For examples, there is a programming process where the victim is
programmed or indoctrinated; and there is a programming system where the
indoctrination is placed within ones mind and acts like a machine. Thirdly,
there is the overall (programming) mind control slavery where one is totally
controlled.
The perpetrators want a victim who
is like a non conscious programmed robot.
The aim of the indoctrination is to entrap the person into being totally
submissive and involves a lot of torture and trickery to instill intense lies,
fears and dependence. Programming is methodical and follows a pre-organised
plan that corresponds to age and abilities. The programming torture happens in
all areas: physical e.g. beatings, food deprivation, scarring of skin, locked
in a small non-lit room for days and electrocution; emotional and sexual e.g.
multiple and child rape; and psychological e.g. family deprivation. The lies
are: supposed “worthlessness without the group/perpetrators”; that perpetrators
"love" you; the outside world e.g. counsellors and loving family and
friends "hates and disbelieves you"; you will "always be
alone"; you "enjoyed the violence"; etc.
The process of installing the
programming consists of torture, trauma and trickery. It usually begins with
much torture, drugging, hypnosis, electrocution, being forced to watch horrible
videos, etc. The physical torture is being suspended from cages, handcuffed and
being put next to a revolving saw, locked away in a basement, etc.
Electrocution, particularly in the genital and anal areas, is abused in order
to threaten, control and punish. These methods dangerously impair the person’s
ability to see things clearly, to act rationally on it, and to escape and
fight. The victim is then lied to by drugging and hypnotic suggestion. Common
lies are that “there is family present”, there is “a gun”, that s/he is
“killing someone”, etc. Perpetrators in the last thirty years or so have been
abusing specifically made horrible videos which have the scenarios the handler
wants to abuse.
After the victim is what the
perpetrators call “pliable”, they then produce a setup where the victim is
confronted with a no choice situation involving the life and death of
him/herself and “loved ones”. The victim
is placed in a deliberately guilt induced situation where s/he is forced to
kill in order to save her/himself or others. The situation deliberately does
not have a choice. In an example of one scenario, the victim “has to shoot the
loved one (Mum, brother, nephew, etc) or s/he will be shot by the loved one”. S/he
understandably shoots the loved one to save her/himself. This is legally and
morally acceptable as it is self defence. In one scenario, the victim is
drugged and hypnotised, strapped to a seat, electrocuted especially in the anal
and genital areas in order to sit still and not move, and has his/her eyes
taped open. S/he is forced to watch videos on a computer screen of the
simulated setups of “loved ones killing him/her” which s/he thinks is real and
understandably shoots the “loved one”. Another example is a young boy who when
drugged is lied to that his “Mum has a gun” and which he believes. It is in
fact a stick and the drugged and non conscious Mum thinks she has a “pen”.
Again he has every right to hit back and stop the gun being shot as this is what
he was led to believe and because of self defence. However the perpetrators
manipulate the scenarios so that the victim is made to feel extremely guilt
ridden and suicidal.
When at this suicidal level,
another perpetrator then steps in and lies that “s/he will save the victim”.
The “saving” is within sweet talking and supposed “support”. The victim feels
better because s/he has been “saved” and even becomes grateful. However, it is
really only on condition that the victim effectively obeys what the perpetrator
says. The victim is caught again and has no choice. S/he is either suicidal or
accepting of the perpetrator’s demands. The perpetrator then becomes the
handler and controller of the victim. The handler will in future abuse this
programming setup to guilt trip the victim/survivor about how s/he “saved the
victim/survivor” and how the victim must do as the handler says. The handler
will also add more lies further on such as “helping you with something” and the
victim believes this because the handler had supposedly helped him/her before.
The suicidality that the victim has when not obeying the handler’s orders e.g.
when not contacting, stems back to this no choice setup. The programming is all
lies and a setup. The handler knew that the victim was being tortured and was
part of its organising. S/he knew s/he was not a “saviour” but was abusing this
setup for his/her own devious control.
Dissociation is deliberately
abused. The perpetrator/trainer wishes to produce a “split personality” and
control him/her. The abuse of trauma also has the desired effect of
dissociation and the creation of a separate personality. Extreme and repeated
trauma naturally makes people dissociate and form a personality where the
trauma is kept until it can be worked on. In programming, the personality
contains the trauma of the extreme pain, the guilt and dependence upon, and
ultimately slavery to, the handler. The handler/trainer will look to see if a
dissociated personality has “popped out” in the process and will goad him/her
into submission and separation from other personalities and the host person
him/herself. The trauma is in the most deep seated personal state as the victim
is severely drugged and extremely pliable. The traumatised and tricked
personality is therefore separated from the victim and is controlled by the
handler. This is how the perpetrators can control and direct a victim without
them knowing what is happening. When being abused, the personality takes over
as the trauma is the most deep seated within the personality, and is accessed
and deployed without the victim’s host state knowing. The personality is also
taught to dislike the person and to be totally loyal to the perpetrator/s and
the organisation. The controlled part is therefore not conscious to the person
because it is separated and does not follow the person’s wishes and life. In
fact the personality is controlled instead by external perpetrators and the
personality cannot tell the person what is going on. This is how programming,
accessing and deployment work without the victim knowing.
Over time these programming setups
are repeated in order to produce more personalities. Each personality has its
own roles and tasks from upholding the programming, to contacting handlers, to
producing drugs, courier military information, etc. Together the parts form a
synchronised system that will act like a machine, maintain the programming
system, and act on the perpetrators’ orders including assassination. And all
without our knowledge. Very sadly many
victims have gone to his/her death not knowing what abuse was done to him/her.
This is because the perpetrators have deliberately stopped awareness by
programmed dissociation and control of personalities only within the
subconscious of the person.
This system is made identical with
all victims so that other handlers and programmers can access and manipulate
all victims. The programming has specific stages of indoctrination that are
generally called core and then secondary/tertiary/etc layers. For children this
can start in the womb, and for kidnapped people such as a new wife, it starts
at the age they were kidnapped. The core stages have particularly very heavy
and continual torture. The progression is one of destroying trust and of
perpetrator obedience. There is also specific training in organisation roles
e.g. how to be a sexual slave, etc. At certain ages programming is put in for
returning, not disclosing, etc. After continual torture and setups and
producing personalities, the perpetrators set up a system of programs within
ones being. Firstly the organisation produces a personality or part of a person
who has a name, a specific cue and a corresponding behaviour. These parts are
then assembled into a system. Firstly it has parts that do things singularly
for the handler/organisation. Parts are told to “report in”, to “spy on
people”, etc. Secondly there are parts whose job it is to “keep the system in
tact”. If programming has been undone there are parts whose job it is to
“rebuild the programming”. It also has to act like a whole in the sense of
being a machine. The parts must cooperate with each other to do what the
perpetrators want and must also stop parts who are escaping.
This control of the person is
basically called mind control. It is mind control as it comes mainly from the
mind. This is where we think and from where we act on what is fed to us. It is
also essentially a conditioning process. We are conditioned by pain and
deception to do something for the organisation. The mind control can also be
quite simple in its operation. A cue such as a date, colour or sensation
(auditory, visual, tactile and other means) sets off a specific behaviour such
as “return to the perpetrator”, “don’t disclose”, etc. However, as seen, the
control really is in the underlying emotions and ethical areas. The
perpetrators want fearful, guilt ridden and extremely grateful personalities to
control the victim. Programming also isn’t rocket science. Anyone with an
understanding of dissociation and the development of split personalities can
see how the programming is done. The following conditions enable programming,
accessing and deployment by an external handler: Firstly, a split personality
who is lied to that the host person is “horrible” and is guilt ridden and
beholden to an external perpetrator; and secondly, a host person who is unaware
of the split personality. When the personality has cues related to specific
behaviours, s/he becomes like a robot who can be accessed and deployed
instantaneously by an external operator without the victim knowing. In my case
I had perpetrator controlled non conscious parts who could ring from a public
telephone in Indonesia and
ask the Australian operator for a reverse charge call to a mobile phone in Australia
(the handler) and be told what to do, and all without my knowledge.
Training
Once we are programmed and under
their control, we are taught how to do the activities that brings monetary and
other benefits to the perpetrators. It encompasses military training, learning
to kill, stealing, couriering information and objects, making illicit drugs,
cutting up people, disposing people, being sexual, being experimented on, etc.
There are two main levels of training. The fundamental level encompasses skills
generally abused within the organization and which can be accessed by all
perpetrators. These include: basic presentation to the perpetrators, couriering
information and other things such as illicit drugs; organized pedophilia;
looking for social unrest; remembering information; etc. The second level
corresponds to ones abilities whether they be intellectual, physical, etc.
Victims who are intelligent are trained in photographic memory in order to
courier intricate information, to observe social groups, etc; Victims who are
physically well built are trained in how to dissect bodies and carry them, etc.
Training is done in particular areas that
facilitate the type of training demanded of the victim. For military training,
military barracks, mines, and large open fields assist to train a victim in
field warfare, scaling walls, using military equipment, etc. For drug
manufacture, chemist premises and offices are utilized; for experimentation,
doctor’s offices are used; etc. Perpetrators who are doctors, chemists,
brigadiers, etc will find and sell appropriate space to be abused. I was abused
by a doctor in the suburb I grew up in, Berkeley,
near Wollongong,
NSW, for medical experimentation in the early 1970s. The doctor abused the
consultation room for experimenting on me.
As written, the fundamental and
general training for victims is for basic and universal purposes such as
contacting/accessing, checking to see if the programming is “operational”,
couriering information and objects such as illicit drugs, learning how to
“sexually please” for child pornography and prostitution; looking for social
unrest, especially organised socialism and neonazism/thuggery; remembering
information; and seeing if victims within the family and community are
escaping. The programmers in the initial stages look for traits that the victim
has in terms of intelligence, expression and physicality. The programmers want
victims who can remember a lot of specific information and especially having a
photographic memory. They want to transmit a lot of particular information such
as an illegal drug consignment on a specific ship across a long distance and
abuse couriers with good photographic memory and expression to travel far and
describe such a delivery. I once had to travel from Brisbane,
Australia to Vilnius, Lithuania
and describe in detail an illegal silo used for storing illegal armaments to
generals there. Programmers also abuse a victim’s physicality for their own
ends. If someone is very strong they can be abused to haul dead bodies of
people the perpetrators don’t want such as asylum seekers.
The most fearful, vulnerable and
hidden personalities in the system i.e. those that are most loyal, are trained
in the most important tasks to suit the perpetrators especially with accessing
and killing. These personalities are also trained to maintain the programming
with tasks such as reporting to the programmer/handler if the host is escaping
or undoing programming; rebuilding the programming especially at nighttime when
everyone is asleep; confuse the victim so that deprogramming does not happen;
and step in and stop any escaping.
Suicidal Thoughts
When the programming is challenged,
such as not travelling to courier information or when remembering the abuse,
the victim starts to feel suicidal for no known reason. S/he also has specific
ways of killing him/herself even though s/he does not consciously remember how
s/he learnt them. What is happening is that the programmed responses from the
victim were programmed to come on. During the programming s/he made a “vow”
that s/he “would suicide by a specific way” because s/he is not “helping the
handler” who supposedly “saved her from suicide and horrible people”. These
demands by the handler are lies and the handler knows s/he is being deceptive.
The handler set up these false situations and does not need to be listened to.
If they do come on and you are having difficulty, ring a crisis line or
ambulance and go straight to emergency.
The training also exacts a huge
toll on our senses and abilities especially when it has to be in a robotic and
exact fashion.
Accessing
Accessing is when the nonconscious
victim reports to a perpetrator. This happens when a controlled personality,
whom the victim is unaware of and inside him/herself, is beguiled and/or
threatened to report to a perpetrator. The victim, during this accessing, goes
amnesic (suffering from amnesia or spacing out totally) as the controlled
personality takes over the person. The controlled personality rings or meets
face to face with a perpetrator, usually the handler. The victim (host) is
deliberately not allowed to know of this contact and accessing.
The accessing, is usually done at
least once a week, when the personality, must report by telephone (and using
reverse charge calling) or face to face. This also occurs if the victim is
overseas and s/he is given exact numbers to remember and ring corresponding to
the country s/he is in and how to call reverse charge from there. The routine
accessing is used to deploy, check on whether the deployment is occurring,
check on whether the programming is in tact, and generally see if the victim is
being controlled. If the programming is coming apart the handler will tell the
parts, whose jobs are to repair the programming, to do such. This is awful for
the victim/survivor as s/he can never escape when continuous accessing occurs.
I have gone to isolated Indonesian islands where there are no public telephones
in order to try and stop accessing. I only had the vague notion that I was
being accessed and because parts could not tell me when the accessing occurred
I had to simply try my luck and stay somewhere for a while without a public
telephone.
During periods of undertaking tasks
such as couriering information the accessing can be increased so that the
perpetrator is sure the tasks have been done properly. Also if the programming
is coming apart, the handler will contact a perpetrator near to where the
victim is and send the perpetrator to reaccess and reprogram the victim so that
the victim continues to be deployed. This happened in Indonesia in Northern
Sulawesi where I was stopping deployment. The handler in Brisbane contacted a perpetrator in Jakarta
and sent her to Bunaken
Island in order to find
me, reaccess me and reprogram me. Annoyingly it worked, but I was still able to
get away later J
The victim/survivor is placed into
this state by the perpetrators deliberately using trained cues such as being
touched in a specific place and words such as “sleeper awake” or “blue insect”
etc. The programming system comes on fully and the outer shell/consciousness of
the person disappears. S/he then does tasks such as informing, receiving
information, cutting up bodies, etc.
Deployment of the
Victim
This happens when a victim is
nonconsciously controlled by a handler and other perpetrators. The victim is
trained in skills and knowledge beneficial to the organisation, and is able to
be deployed. Essentially it means the perpetrators control and deploy an expert
and informed person who does not know s/he is abused. S/he could be travelling
to Europe to be a tourist when in fact s/he is
couriering very secretive military information concerning illegal arms. S/he is
also the best possible courier because even s/he does not s/he is being abused.
So even if s/he is asked any questions by law enforcement, s/he does not know
what is happening, and is the perfect cover for the perpetrators. With the host
(non aware part) of the victim, even abnormal happenings, such as an unusual
trip to Broome on the other side of Australia, and in the unattractive
wet season, seemingly had a “reason” as it had an “interesting golf
course”. In reality, the underlying
perpetrators accessing the victim, had told the victim, whom they knew liked
golfing, that it would be an “appealing place to visit”. The victim doesn’t know
where this voice came from, but feels it is true and something like a dream.
S/he believes it as it’s internal, and is not a terrible thought. Anyway, how
can visiting Broome be bad? In reality,
what happened is that the host person had followed directions to a specific
market, and again, was told by accessing and in the subconscious, to be
“dressed in specific colours”. A perpetrator spotted the colours, had tapped
her thrice on the left side of the back and the host had spaced out into a
subconscious personality and walked with the perpetrator to a car where the
personality had told the perpetrator that a boat named ….. was to arrive at the
Broome harbour from Vietnam
on …… and had illicit drugs.
The following areas of deployment
denote that the victim was programmed and was/is amnesic and not knowledgeable
of the abuse. Sometimes perpetrators will abuse conscious victims who have been
threatened with their lives or those of a partner, family or friend, if they
don’t undertake deployment, and they also are victims.
Exploited for Illegal Products: production, experimentation, couriering
the actual products, or couriering information concerning them
Illegal products, such as illegally
obtained espionage information on a radical student organization, are very
lucrative. Also, the more illegal the product such as illicit drugs and child
pornography, the more lucrative it is. There is a huge list of products and
objects that the organizations wish to obtain. These include: kidnapping ritual
abuse victims who are killed in elaborate homicidal ceremonies; illegal arms
and their production, trade, storage, couriering information concerning them;
and human experimentation especially with bacterial warfare. Illicit drugs and their production, trade,
couriering information concerning them; couriering them (“mule”) and human
experimentation with their development and manufacture. Organised pedophilia
including child pornography and child prostitution, and includes being the
programmed child and adult roles. Illegal experimentation for human robotics,
and for developing the programming itself. Illegal abuse for programming others
(part of the staged programming scenarios). Programmed to be minor roles in
homicidal films (“snuff movies”). Programmed to be the model for showing how
programming works for perpetrators. Illegal body parts and their dismemberment,
trade, storage and couriering information concerning them. Illegally obtained
espionage information – programmed to observe left wing student activists,
specific groups who are opposed/different to hegemonic groups such as Muslim
people, Indigenous people, refugees, migrants, opposition political parties
e.g. socialist parties
Exploited for Legal Products obtained illegally
This includes stealing artworks,
jewellery and other expensive items held privately and publically; (illegal)
human experimentation for legal pharmaceutical drugs; and assassins of
landowners so that their mining and agricultural land is now owned (indirectly
through control of receiving family).
Exploited for Illegal Maintenance of Criminal Control
This means illegal ways are abused
in order to maintain control of the production, trade and couriering
information concerning illegal products. This means being programmed to
assassinate competing organized crime.
Exploited for Illegal Maintenance of Exploitative Socio-Economic
Control
This means abusing illegal methods
to maintain existing public methods of exploitative socio-economic control such
as private enterprise capitalism in the west. Being programmed for obtaining
information of radical groups such as student activists, Indigenous people,
migrants with alternative views, alternative political parties, etc. Victims
who have an interest in politics and are universities are usually deployed here.
Social destabilization such as the assassination of alternative political and
social leaders such as John Kennedy and John Lennon, and mass shootings so as
to give the impression that “society is crazy” and needs “stable leadership
from companies, the military and conservative politicians”. Victims are programmed to do mass shootings
and then to suicide themselves.
Taxation Reduction
e.g. Killing refugees so as to not
pay taxes for social security.
Exploited for Ritual Abuse Slavery
Victims are also exploited for
ritual abuse slavery. This means being forced to attend and participate in
elaborate ceremonies where people, including children and babies, are raped and
murdered. A ritual abuse ceremony, held at various times every year, are
supposed to represent the opposite of goodness, and so murder, rape and other
heinous crimes are performed to bolster the perpetrators megalomania and other
sordid beliefs. Victims have to dress up like animals, demons, clowns, etc and
act out accordingly. We also have to participate in the rapes and murdered and
are also raped and extremely humiliated.
How the Abuse Happens:
The Creation and Separation of the “Normal” Host State
and the Non Conscious Programming System
The abuse can only occur when there
is the creation of two personal conditions. These are the conscious “normal”
host state and the non conscious programming system. Secondly there needs to be
a huge separation between them so that the “normal” host state does not know
about the programming system. What perpetrators want firstly is a victim who
believes that s/he is having a “totally normal and fulfilling life” and no harm
is happening to her/him. However, underneath this host state, the victim
unknowingly has a non conscious programming system of personalities who
undertake tasks to fulfill the perpetrators’ greed and control of power.
Overall, the victim/survivor is motivated by the programming even though s/he
is not aware of it. Motivations include “saving a partner, family, friends, the
world, etc” and are deeply imbedded within the programming. The handlers and
other perpetrators are the supposed “saviours” and victims/survivors must again
supposedly “suicide” if they challenge “the oaths of loyalty”. The perpetrators
also wish to maintain both the host state’s belief that “nothing is wrong” and
the programming system’s directly fulfilling its tasks such as couriering
information.
The Conscious “Normal” Host State
- The Completely Dissociated and Amnesic State of the Victim/Survivor
“Well I thought my life was a
photograph On the family Christmas card, Kids all dressed in buttons and bows
And lined up in the yard” Joan Baez,
Play Me Backwards
The first way the perpetrators
deceive us in the abuse is the trickery that we “live very normal lives” and
“no harm has ever happened to us nor will happen”. The first reason for why we
cannot connect to knowing about the abuse is that we naturally dissociated
completely after we were programmed. The torture and trauma was so horrible we
naturally built walls of amnesia in order to contain the abuse and live “above
it”. Victims of rape, incest, etc in the wider community naturally dissociate
after the trauma, and as survivors we do too. What’s different to other extreme
trauma survivors is that the perpetrators deliberately want this separation so
that we cannot see that we are/were abused and find support to stop it. The
perpetrators deliberately want us to live blithely thinking we have a “very
good life”, and separate the host victim/survivor from the programming system
of personalities with their tasks/roles, and the history of being abused.
The perpetrators also deliberately
torture victims/survivors in three other ways in order to stop them from
knowing about the abuse. Firstly, they threaten the personalities severely if
they talk with the host victim/survivor about the programming, the deployment,
accessing, etc. They are not allowed to help the victim/survivor escape and are
punished horribly if they do. Secondly, the perpetrators torture the personalities
with suicide programming if the host starts to remember the abuse, disclose
about it, get support, etc. When memory surfaces about the abuse such as
paramilitary activities, specific programming voices come on that the victim
“must suicide by this specific way – e.g. driving off the road quickly”.
Thirdly, if we get triggered by seeing military activities on television or
have memory of child pornography, personalities are told to lie to us that
these “are fanciful ideas in ones mind and made up”. “How can an average
Australian working class woman ever see Iranian refugees in a camp? or know the
logistics of the local methamphetamine drug trade? etc”
Perpetrators will also work around
the person’s normal life in order to not cause suspicions that something is
wrong. They will abuse a victim’s travelling holidays or daily commuting for
couriering information. For examples, when I was living at Wollongong
and going to university in Sydney
I would be couriering information during the week between the two places. When
I was teaching in New Zealand
and coming back to Australia
for school holidays I would be couriering information between Auckland
and Sydney.
Perpetrators would also try to persuade victims to go to particular places that
would fall outside of the normal or even desirous, such as for a snow skier
“going on holiday to Vietnam”.
The perpetrators, when accessing the victim, would suggest to programmed parts
to ‘circulate’ this idea in the subconscious and the victim then would get some
inclination to go to Vietnam.
Because noone knows about such brainwashing and abuse, the victim does not
think hearing these subconscious voices is weird and criminal, but only unusual
that s/he decided to “go to Vietnam
that year”. The reality is that s/he was delivering information between Sydney
and Ho Chi Min City concerning a drug shipment.
The Underlying Non
Conscious Programming System
Underneath the conscious victim, in
a non conscious area, lies the programmed system of personalities. As explained
before, the system is not allowed to be known to the victim/survivor. It is
where the oaths of suicidality were produced, where the roles and tasks were
trained, and where the accessing cues are. When a victim is accessed, all of
the host conscious self is stripped away, and out fully come the controlled
inner selves from the subconscious. These parts have been produced by
dissociation, but instead of normally and naturally dissociating into the host,
they have been manipulated and perverted to be controlled by external
perpetrators in the programming process. So inside a victim lie personalities
who are controlled by an external perpetrator, and will take over the whole
victim when s/he is ordered to by specific cues. It is/was these internal, but
still externally controlled personalities, which make victims horrified when
they saw/see films like The Exorcist and Alien. Inside the people on screen,
lay personalities not of their making or control, and who caused problems for
the host.
It is the underlying programming system
which has supreme control over a victim, instead of the host state. This is
because of two reasons. Firstly, the victim is in an inherent condition when
the programming is done, and secondly, programming consists of setups concerned
with saving people from death, which is a very primal and necessary
responsibility of a person. When the victim is drugged and hypnotized in the
programming, it causes the victim to be in an innate state like s/he was just
born. Therefore when the programming is challenged, because for example, s/he
did not return to the handler, it feels like the victim/survivor has this
totally encompassing suicidality that comes from within his/her core. To
rectify this, the survivor needs to see that being aware of this programming s/he
can control it. S/he can put her/himself in a safe place so that the suicidal
feelings will blow over, and they do. The programming system, if not understood
and checked, controls ones thoughts and actions. The deep-down programming is
based on setups that involve “saving people” and so victims will do anything to
save someone even if this saving is in a non conscious memory and causes
irrational behaviour and thinking. To a victim, there is nothing irrational
about the conduct and beliefs. S/he doesn’t know it’s programming, but rescuing
someone very dear to her/him. Therefore, within the non conscious programming,
the handler may tell the parts that “to save their mum a good idea is to go to
Hong Kong next week” even though the person does not like northern Asia and
instead wants to go to New Zealand next week. This idea about Hong
Kong circulates inside the system, and then percolates into the
consciousness of the victim. The personalities must tell the host without
causing alarms.
Common and Main Aspects
of the Abuse
Owned by Perpetrators
Personalities and the host maybe
deceived into thinking that “they control their lives”, but this is as further
from the truth as can be. Personalities were beguiled into taking an oath to
totally adhere to the perpetrators, especially the handler, or to die by
suicide. The survivor needs to be able to work on suicidality in order to
escape.
Non Consciousness
Victims do not know they are being
abused, and it is very difficult for us to find accounts of the abuse and
validation. The perpetrators want that the victim is not aware of the abuse
because then the victim will try and stop it. Some victims, like my brother,
have been programmed since birth, and may even be abused all his life. My mum
has been abused all her adult life, and only now, when in a nursing home, is
she not being deployed. People are abused in exploitative socio-economic
systems such as capitalism and communism, but people can find information
readily to show how they are exploited, and join support groups with fellow
activists to release their feelings about them and change society. Not so with
victims of GOCMP. There is now information on the web about GCMOP for North
American survivors and survivors generally, and this webpage aims to bring people
up to speed in Australia.
Constant Abuse
The perpetrators want profitable
outcomes in terms of money obtained from illegal drugs, pornography, arms, etc,
and will deploy victims as early and as often as they can. Victims are
constantly abused weekly in their local area for activities such as drug
production, being the adult or child in child pornography, observing groups who
are/might be opposed to the status quo such as The Australian Greens political
party or student activists. Again, they are programmed to undertake these tasks
either in a totally amnesic state such as the drug production and child
pornography, or in their “awake” state when the personalities are active and
undertaking their roles while the host state thinks s/he is simply doing normal
things. This second condition can happen when the personalities are observing
what is happening at the alternative political party and will report in later
to the handler about what happened at the meeting. When disclosing to the
handler about the meeting the host victim is totally amnesic and the
personality will be the only part of the victim who is totally out. Meanwhile
the host state has no idea what the personality did at the meeting and what the
personality told the handler. Because the personality is dissociated
(separated) from the host victim s/he can do things within his/her own
abilities. S/he has also been trained separately from the host victim, and
therefore, like all the personalities within the person, lives more or less “a
life of his/her own”.
Essentially it means the
perpetrators control and deploy an expert and informed person who does not know
s/he is abused. S/he could be travelling to Europe
to be a tourist when in fact s/he is couriering very secretive military
information concerning illegal arms. S/he is also the best possible courier
because even s/he does not she is being abused. So even if s/he is asked any
questions by law enforcement, s/he really does not know what is happening, and
is the perfect cover for the perpetrators. With the host, even abnormal
happenings, such as an unusual trip to Broome on the other side of Australia, and
in the unattractive wet season, seemingly had a “reason” as it had an
“interesting golf course”. In reality,
the perpetrators accessing the victim, had told the parts to circulate
information about golfing as they knew the victim liked golfing, and then it
would be an “appealing place to visit”. The victim doesn’t know where this
voice came from, but feels it is true and something like a dream. S/he believes
it as it’s internal, and is not a terrible thought. Anyway, how can visiting
Broome be bad? In reality, what happened
is that when in Broome, the everyday “normal” host person followed directions
he heard in his subconscious about going “to a specific market and dressing in
specific colours”. In reality he had been accessed and the subconscious parts
had been told to go to a specific market and dress in specific clothes. At the
market, a perpetrator was looking out for someone in the colours, tapped him
thrice on the left side of the back and the host had spaced out totally into a
subconscious personality. The personality walked with the perpetrator to a car
where the personality told the perpetrator that a boat named ….. was to arrive
at the Broome harbour from Vietnam
on …… and had illicit drugs. This was information the victim had been told in Perth when accessed there
and told to deliver to Broome. Victims are abused for couriering information
because the organisation does not want information about extremely profitable
goods going to anyone who could “steal” the goods. Even the most trusted
perpetrators in the organisation could grab the goods and sell them elsewhere,
and so the victim, who is totally unaware of the information, is abused. Any conscious
perpetrator passing or collecting information has had to prove s/he will not
cheat on the organization. When the programming is challenged, such as not
travelling to courier information or when remembering the abuse, the victim
starts to feel suicidal for no known reason. S/he also has specific ways of
killing him/herself even though s/he does not consciously remember how s/he
learnt them. These subterranean feelings seem to take over and s/he needs to be
hospitalised.
After/Side Effects
Even though the abuse is mainly non
conscious, personalities still carry the effects, especially psychological ones
like guilt, for when we were forced to murder, and physical ones like the large
scarring of skin when being tortured by a knife cutting our necks, and kidney
and liver issues from being experimented on by dangerous drugs, etc.. We are
easily triggered by scenes of the military, espionage, organised crime and
other violence on TV and film. We suffer from DID (Dissociative Identity
Disorder) and C-PTSD (Complex Post Traumatic Stress Disorder) a long time after
we escape.
During programming we were/are
tortured horribly with electric probes put into our anuses and in our genital
areas. There are also other probes used to stop us from trying to escape. We are
strapped onto a platform or chair with our eyes taped open and forced to watch
awful videos that supposedly represent our family “being killed”. Sometimes the
perpetrators will lie that “our family are present” in order to create a lying
scenario that “we are being killed by them and we must defend ourselves”.
Sometimes the real family are present and we are all placed in setups where we
have no choice but “to kill them in order to defend ourselves”. These
“killings” are morally and legally defencible because they are actions of self
defence. However, parts, especially young ones, do not know that it is legally
fine to kill in self defence, and carry extreme guilt which is exploited
horribly by the perpetrators who lie that they “saved them”.
The deployment is extremely
horrible. We can be sent to areas where we could be killed such as in Sulawesi, Indonesia
where Western foreigners were killed by Muslim extremists. We could be sent to
areas where the perpetrators have horrible enclosures of native victims who are
illegally experimented on for the effects of certain medicines and biological
warfare, such as just outside of Ujang Padang in Sulawesi, Indonesia.
The enclosures were awful with so many deaths and debilitating illnesses
affecting the people. Even though we are in an amnesic state, our parts still
see what has occurred and the memories stay with us. Then there are the
dreadful effects such as Complex Post Traumatic Stress Disorder (C-PTSD)
triggered by awful events we may see on TV or films such as military ventures,
organised crime, domestic violence, etc. Having Dissociative Identity Disorder
(DID) means that we need to gather our personalities together in order to have
a straightforward life. Parts may wish to do different things and so we need to
explain that we need to have togetherness in order to do daily activities.
Sometimes personalities can take over when we are stressed, and so we need to
watch that we do not become too stressed. Many victims also suffer from madness
and depression. They can have complete breakdowns and are forced to be
hospitalized for long periods. They do not know why they are in psychiatric
wards only that they have these completely unfathomable “murderous urges to
kill their child” This is in fact programming that if they start to become
aware they need to kill their family and themselves. We were also deliberately stopped from
knowing that we are/were abused by psychological techniques such as manipulated
dissociation, intensive drugging, etc. In terms of the criminality, the
perpetrators should be taken to court and tried for hideous and long term
crimes such as psychological and physical torture and hurt; for deliberately
placing people in harm’s way; for the severe death threats to oneself and loved
ones.
Then there is also physical
scarring such as rectal and genital harm and in other places where it is hard
to see such as the underside of arms, on the head under hair, etc. The most
atrocious harm done to people is the murder and attempted murder by the perpetrators
with “suicide programming”. Victims really need to work on suicide programming
in order to escape.
Lastly there is the robbing us of
our lives where we had no personal choice and fulfillment. Most
victims/survivors are programmed to do daily lives/occupations that will
benefit the perpetrators. This includes being a chemist for making illicit
drugs, for being a teacher to facilitate organized pedophilia, to being a
butcher to facilitate black market organ transplants to being a policeperson to
facilitate the killing of competitive organized crime, etc. The victim/survivor
may not know that s/he is abused in the perpetrators’ areas. Even if we were
able to do what we wished in our normal host lives in terms of occupation, in
other areas of our life, such as holidays or trips, we are non consciously
abused/programmed to courier information or illicit drugs; and during the week
we can be deployed to produce illicit drugs, to attend a left wing political
party, etc. Survivors call the abuse Mind Slavery as we did/do not have control
of our minds and ourselves. It is
different to physical slavery, but the effect is the same.