Programming
“I was a stranger in my own life”. Cheryl Crow, Everyday is a Winding
Road
The Basics
It’s important to know what mind
control programming is, and what it’s not.
Mind Control is the control of a persons mind by another or others
or society. Controlling the mind means that’s ones behavior and thoughts are
controlled quickly, and overall, because the mind is where we adjudicate,
process and action all our emotional, physical and intellectual input. However,
in reality, it is the effect on one’s emotions and morality that actually
affects us the most in the mind control, and the mind is where these are
organized and, as written, action ourselves. Guilt, shame, horrendous loss,
extreme gratitude, etc are the most powerful aspects in one’s life, and it is
these very important emotions that the perpetrators manipulate in order to
obtain control. Mind control therefore is not a brain implant, nor a
Frankenstein-like mechanism. It is both emotional control, and fabricated and
manipulated loyalty.
Societal Conditioning and Mind Control Programming
Nearly everyone is controlled in
society in nearly every country in the world. The main reasons for control are political
manipulation and economic exploitation. An economic system produces and
sells/trades goods and services, and people have to adhere to this system in
order to obtain benefit from it. All economic systems in the world, bar a
couple of countries, have exploitative ones where one group of people obtains far
more money than others for the amount of labour expended. People, are therefore,
also mind controlled, or to use the
socio-economic term, conditioned, to fit into this economy. The majority of
people are conditioned by lies (e.g. “you live a wonderful life”, “you have a
better life than…”) and violence (eg by police at demonstrations) and shame (eg
if shoplifting) to adhere to this exploitation either as subjugated or exploiter.
It affects everyone unless you can sell your labour and not be exploited, and
you can divest your capital so that you aren’t exploiting others. Nearly
everyone in society is deliberately unaware of the exploitation.
Mind control programming is quite different. It is interpersonal
control. It is done by a specific individual or a small group of
individuals to a victim. The mind is where the programming is kept and actioned,
as similar to conditioning, but the programming is focused on the individual
situation of the victim. The programmers will utilise the person’s relationship
with a partner, family and friends (“a loved one”) in order to obtain and
maintain control.
Mind Control Programming, or simply
programming, firstly consists of complete destabilization where a person is
forced to have no faith and trust in her/himself. S/he is tortured physically
and psychologically by being put inside spinning machines, hung upside down,
starved, water boarded, etc. S/he is then drugged and hypnotized till there is
very little consciousness. Then the victim is placed in a staged setup, where
the victim is lied to that s/he “has complete control to utilize all the
choices available to him/her”. In reality s/he has no choices in a die or live
scenario. S/he needs to defend her/himself in order to live, and people must
necessarily die. This is self defence which is morally and legally defensible.
However, she is lied to that s/he “deliberately killed” and is “a murderer and
must suicide”. Then another group of perpetrators/or one perpetrator comes in
and beguiles the victim that if “s/he gives control of her life to them/the
handler, s/he then can be set free”. Of course the victim “chooses” this and
becomes totally dependent upon the latest perpetrator/s. If s/he challenges any
control s/he is taken back to the existentionalism of the awful situation and
relives the suicidality. There are many scenarios a perpetrator/s will abuse,
but the essence is the same. Supposedly “give your life to the saviours (really
perpetrators) or suicide”.
Secondly, s/he becomes extremely guilt ridden
as s/he didn’t (really couldn’t) save the loved one, and then totally dependant
upon programmers who deceive that he/she/they “saved her/him from their own
suicide”. The emotions, ethical considerations and resulting subservience are
deliberately intense and mean total control as the perpetrators had saved them
from “death itself”. The programmers control the victim like a puppeteer
because they caused and know the victim’s underlying “weaknesses” and how to
restimulate any guilt. They will be the main perpetrators manipulating and
exploiting the victim in the training, accessing, deployment and reprogramming
of him/her. S/he/they will pass on important programming information to other
perpetrators if need be.
The parts are in a program, like
stuck in a recording, and don’t know about choices or about another way of thinking
or behaving. They don’t know it’s bad, as that is what they were trained to do.
It’s not their fault, so there is no chastising them. It’s best to ignore
programming, and explain to personalities who can change. Also it’s best to stop
the programming that set up the control in the first place.
1950s Till Present- The Development of Programming
This form of mind control had been
abused for centuries and is called by the archaic term “brainwashing”. All
major militaries including the English, Americans, Russians, Australians, Germans
and Chinese abused it up until the 1950s.
In the 1950s in North America, the
C.I.A. moved Nazi German mind control brainwashing “experts” to the U.S. and
employed Ewen Cameron, the then head of the World Psychiatric Association, to
develop mind control so that the victim was completely not aware of being
abused, and to be more robotic. With much awful experimentation, especially on
students at McGill University in Montreal,
Canada, but also in the U.S., Cameron
and the Germans developed the MKUltra (Mind Kontrol Ultra) project which abused
dissociation and robotic terminology into the now called “programming”.
Dissociation is a natural defence by one’s psyche to isolate any trauma into an
area that can be worked on later. It can sometimes mean the formation of a
personality who can hold the trauma, and if this personality is out and takes
over the body, the host person falls into a state of amnesia. The personality
has all the attributes of being human in terms of senses and doing things. What
the programming researchers theorised, and later succeeded in doing, is
producing a personality that not only held the trauma, but was able to change
the loyalty of the personality from within the host victim to an external being
i.e. a perpetrator. Instead of naturally being loyal to the host, and sitting
in the psyche waiting for a peaceful time to address the pain, the personality
was to be goaded towards control by the external programmers, and also, the
severe dislike of the now host victim. When torturing the victim as usual, the
perpetrators now watched for a personality developing. They placed the pain of
the setups and the deceived servitude on this personality instead of with the
victim him/herself. The perpetrators now had control of someone else inside the
victim, and then caused dislike of the host by another staged setup. This resulted
in a personality, who could act like a normal human being when out, but because
s/he was dissociated, was separated and unknown to the host. The personality
also takes over when out, as the trauma is the most deep seated within the personality,
and the host goes into amnesia and not knowing about the “missing time”. This
personality was also totally subservient to the perpetrators, and disliked the
host so that s/he would not tell the host anything. The perpetrators had a
totally deceived, loyal and obligated personality, and had all of his/her human
attributes ready to be trained. This was/is inside a victim who knew nothing of
the victimization. Because the trauma was deep inside and tucked away in a
personality it was more difficult to work on than if it was simply trauma to be
addressed. Also because the abuse is in a separate section that cannot
communicate to the host, the victim has no memory of the abuse. And as the
victim was amnesic, when the personality was out, s/he cannot recall what they
were abused for. Having a controlled and quite distinct “mini” personality,
rather than a full on person, lent to the renaming of the brainwashing to the
more robotic “programming”. The criminal organizations also became more demanding
and exacting, and wanted robotic behaviour from its victims. A cue such as a
date, colour or sensation (auditory, visual, tactile and other means) sets off
a specific behaviour such as “return to the perpetrator”, “don’t disclose”,
etc. Also “activating words” became more robotic such as “sleeper awake”
when the personality was to take over the body and be fully out. Therefore, to
return to Cheryl Crow’s song, it is very easy to be a stranger in your own life
if external perpetrators own and abuse a personality inside of you that you’re
not aware of. This condition is what scared people when they saw the films The
Exorcist and Alien. On screen were victims who had entities living inside them,
and had their own motivations including hatred of the host, and were controlled
by foreigners/externally. In reality, external perpetrators had perverted the
dissociation process in order to produce a manipulated victim who had no idea
of being abused in order to make large amounts of money for someone else. If
they started to know about the personality they would suffer from intense
thoughts of suicide and so didn’t.
Not Complicated
Programming also isn’t rocket
science. Anyone with an understanding of dissociation and the development of
split personalities can see how the programming is done. It is the perversion
of dissociation and personalities. Instead of tricking a person to be eternally
grateful to a perpetrator, a perpetrator tricks a dissociated personality. People,
when usually dealing with trauma, encapsulate it in a dissociated form and
personalities. The trauma is left in a natural state and is to be worked on
later when there is a peaceful time. Then the pain is felt and understood, and
the holding dissociation and personalities disappear. The personality is
reunited to the host person who is then in a more peaceful disposition.
However, what the perpetrators do is pervert this. Firstly, they separate a
personality from the host by staged setups where the personality is further
traumatized and beguiled into giving complete sovereignty to an external
perpetrator because the perpetrator supposedly “saved him/her from total
death”. The personality is further separated from the host by being told lies
that that the host “hates it”, and in turn learns to hate the host victim and
any support people. They will work only for perpetrators whom the personality
is manipulated to think “are saviours”. Further traumatisation occurs if the
personality disobeys. The following conditions enable programming, accessing
and deployment by an external handler. Firstly, there is a psychologically
split personality from the host person, who is lied to that “the outside world
and the host person is horrible”; secondly, the part is suicidally guilt ridden
and completely beholden to an external and directing perpetrator; thirdly, s/he
is trained in skills to benefit a criminal organization; fourthly, has cues
related to specific behaviours and becomes like a robot who can be accessed and
deployed instantaneously by an external operator, and lastly, has a host person
who is totally unaware of the split personality and is not aware of lost time
because the emotional trauma is deeply installed beyond the consciousness of
the person. In my case, for example, I had controlled personalities who could
ring from a public telephone in Indonesia and ask the operator for a reverse
charge call to a mobile phone in Australia, and then be told what to do (observe
Muslim people) without my conscious knowledge at all.
Some basic descriptions: Programming is usually very black or white
thinking; is about things that are not you eg suicide and/or killing someone
close to you; very rigid thoughts; extremely irrational; derogatory towards
yourself, partner, counsellor, family, survivors, friends; causes confusion so
that you don’t think well; is always on the side of a perpetrator, especially
the handler, or a group of perpetrators; and is about extraordinary actions such
as suicide and/or killing someone.
Different Usage of the Word ‘Programming’ and specific Explanations
Programming consists of three main
areas, and the word ‘programming’ can change meaning depending upon grammatical
usage. For examples, there is the programming
(process) where the victim is programmed or indoctrinated; and there is the
programming (system) where the
indoctrination is placed within ones mind. Thirdly, there is the (overall) programming or the general
mind control where one is totally enslaved. The perpetrators want a victim who
is like a programmed robot. The aim of
the indoctrination is to entrap the person into being totally submissive and
involves a lot of torture and trickery to instill intense lies, fears and
dependence. Programming the victim is methodical and follows a pre-organised
plan that corresponds to age and abilities. The programming torture happens in
all areas: physical e.g. beatings, food deprivation, scarring of skin, locked
in a small nonlit room for days and electrocution; emotional and sexual e.g.
multiple and child rape; and psychological e.g. family deprivation. The lies
are: supposed “worthlessness without the group/perpetrators”; that perpetrators
"love" you; the outside world e.g. counsellors and loving family and
friends "hates and disbelieves you"; you will "always be
alone"; you "enjoyed the violence"; etc.
The Programming Process
The process of installing the
programming consists of torture, trauma and trickery. It includes drugging,
hypnosis, electrocution, being forced to watch horrible videos, etc. The first
steps of torture, drugging and hypnosis dangerously impair the person’s ability
to see things clearly, to act rationally on it, and to escape and fight the
torture and deception. S/he is forced to have no confidence in her/himself at
all. The victim can be lied to by hypnotic suggestion that “there is family
present”, there is “a gun”, that s/he is “killing someone”, etc. The drugging
also makes the victim susceptible to lies told by the perpetrators and the
inability to see what is really happening. Electrocution, particularly in the
genital and anal areas, is abused in order to threaten, control and punish.
Other physical torture is being suspended from cages, handcuffed and being put
next to a revolving saw, locked away in a basement, etc. The perpetrators in the last thirty years or
so have been abusing specifically made horrible videos which have the scenarios
the handler wants to abuse.
The perpetrators then produce a
staged setup where the victim is confronted with a no choice situation
involving the life and death of him/herself and “loved ones”. The victim is placed in a deliberately guilt
induced situation where s/he is forced to kill in order to save her/himself or
others. The situation deliberately does not have a choice. In an example of one
scenario, the victim has to shoot the loved one (Mum, brother, nephew, etc) or
s/he will be shot by “the loved one”. S/he understandably shoots the loved one
to save her/himself. This is legally and morally acceptable as it is self
defence. In one scenario, the victim is drugged and hypnotised, strapped to a
seat, electrocuted especially in the anal and genital areas in order to sit
still and not move, and has his/her eyes taped open. S/he is forced to watch
videos on a computer screen of the simulated setups of “loved ones killing
him/her” which s/he thinks is real and understandably shoots the “loved one”.
Another example is a young boy who when drugged is lied to that his “Mum has a
gun” and which he believes. It is in fact a stick and the drugged and non
conscious Mum thinks she has a “pen”. Again he has every right to hit back and
stop the gun being shot as this is what he was led to believe and because of
self defence. However the perpetrators manipulate the scenarios so that the
victim is made to feel extremely guilt ridden and suicidal.
When at this suicidal level another
perpetrator then steps in and lies that “s/he will save the victim”. The
“saving” is within sweet talking and supposed “support”. The victim feels
better because s/he has been “saved” and even becomes grateful. However it is
really only on condition that the victim effectively obeys what the perpetrator
says. The victim is caught (again) and has no choice. S/he is either suicidal
or accepting of the perpetrator’s demands. The perpetrator then becomes the
handler and controller of the victim. The handler will in future abuse this
programming setup to guilt trip the victim/survivor about how s/he “saved the
victim/survivor” and how the victim must do as the handler says. The handler
will also add more lies further on such as “helping you with something”, and
the victim believes this because the handler had supposedly helped him/her
before. The suicidality, that the victim has when not obeying the handler’s
orders, stems back to this no choice setup. The programming is all lies and a
setup. The handler knew that the victim was being tortured and was part of its
organising. S/he knew s/he was not a “saviour” but was abusing this setup for
his/her own devious control.
Dissociation is deliberately
abused. The perpetrator/trainer wishes to produce a “split personality” and
control him/her. Alongside the abuse of trauma for torturing it also has a
desired effect of dissociation and the creation of a separate personality.
Extreme and repeated trauma naturally makes people dissociate and form a
personality where the trauma is kept until it can be worked on. In programming,
the personality contains the trauma of the extreme pain, the guilt and
dependence upon and ultimately slavery to the handler. The handler/trainer will
look to see if a dissociated personality has “popped out” in the process and
will goad him/her into submission and separation from other personalities and
the host person him/herself. The trauma is in the most deep seated personal
state as the victim is severely drugged and extremely pliable. The traumatised
and tricked personality is therefore separated from the victim and is
controlled by the handler. This is how the perpetrators can control and direct
a victim without him/her consciously knowing what is happening. When being
abused, the personality takes over as the trauma is the most deep seated within
the whole person and the host goes into amnesia. and is accessed and deployed
without the victim’s host state knowing. The personality is also taught to
dislike the person and to be totally loyal to the perpetrator/s and organisation.
The controlled part is therefore not conscious to the person because it is firstly
separated by psychological dissociation, in a different and specific traumatic
state to the host person’s wishes and life, and also can be setup to hate the
host person. Instead, the personality is directly controlled by external
perpetrators, and the personality cannot tell the host person what is going on.
This is how programming, accessing and deployment mainly work.
The programming has specific stages
of indoctrination that are generally called core and secondary/ tertiary/etc
layers. For children this can start in the womb, and for kidnapped people
(those indoctrinated by marriage and friendship) it starts at the age they were
kidnapped. The core stages have particularly very heavy and continual torture.
The progression is one of destroying trust and of implementing perpetrator
obedience. The most “effective” personalities, i.e. most dependent and
controlled, are given the worst roles such as maintaining the system and making
sure all personalities are doing their jobs.
Indoctrination occurs within all
aspects of the organization either in the home, other member's houses, meeting
places, etc. Specific programming areas where there are torturing machines, etc
can be in the back of a handler’s house, institutions (e.g. schools), etc. The
perpetrators try to disguise the programming room as much as possible and keep
them out of public view. Places of programming are locked rooms and basements,
especially at farmhouses, school auditoriums, isolated buildings such as on
islands or uninhabited roads, in mines, etc. There is in Brisbane
in the eastern suburbs and on the Brisbane
River a programming room
that’s in a boatshed. It’s run by a handler and perpetrators bring in the
drugged victims at night by boat which is parked underneath the shed. There is
a hole in the floor and a ladder is suspended down so that victims are told to
“clamber up” into the room. Throughout the night the victim is tortured by a
female handler but no one can hear because of the soundproofing. The neighbours
and passers by think it is just a “boatshed”, but it isn’t. The victim is also
deceived because s/he was not taken there by the usual way e.g. car. I kept
getting memory of a boat and a boatshed with understanding this
programming/torture place and then realised what and where it is.
Broadly, there are two main programming
processes. These are the general and the specific. The general is done by cult
members particularly those in the family. E.g. a young boy can be raped in a
cult ceremony by his father and also have his head dunked under water until he
acquiesces. The revolting father did both to me. General indoctrination methods
involve lies e.g. "mum will be killed', deceipt, threats e.g. "you
will be tracked down if you escape", false promises e.g. "the cult
will provide for you", false guilt e.g. "you owe the organisation as
it 'helped you'", etc. The specific is done by trained indoctrinators
called "trainers", "programmers" or “handlers”. The
handlers have organized steps and styles that correspond to the age, gender,
abilities and situation of the victim. E.g. a newly married and non cult
background wife will be indoctrinated from the beginning and at her age’s
abilities. A two year old boy will be programmed within his abilities as a two
year old boy. Tasks and roles will also be attempted to be instilled. The
handler also produces identical programming to other victims/survivors of the
same age.
The programming consists of setups
where a victim/survivor is deliberately placed in a no choice scenario that
usually involves family and friends or simulations of “family” and “friends”.
The setups could be on screen, in a staged play, or real depending upon where
the victim is and how much the family are involved. The “family” or “friends”
could be on a screen and the victim/survivor is strapped into a chair so they
cannot escape and their eyes are taped open. They are forced to watch the
simulation on screen. In the last thirty or more years perpetrators have been
abusing videos and three dimensional images (similar to Wii technology) on screen
to play out the scenarios. These are particularly abused when they do not have
the real family at the setup. For example, I was being abused in Brisbane and my family lived in Wollongong and the perpetrators and handler
would try and deceive me that my family “was there”. They were actors on a
screen and not my family. In a different situation, the victim could be placed
in a play like setting similar to a staged drama. Perpetrators maybe acting as
“family” or “friends” and stand around the victim playing out the setup. The
real family could also be there. If they are innocent as mine are they too are
drugged, hypnotized and programmed. They are also manipulated in the scenario.
If they are perpetrators they will be conscious of what is going on.
The setups are of awful life or
death situations involving supposed “family” or “friends” of the victim. The
victim is placed in a deliberately guilt induced situation where s/he is forced
to kill in order to save her/himself or others. The situation deliberately does
not have a choice. In an example of one scenario, the victim has to shoot the
loved one (Mum, brother, nephew, etc) or s/he will be shot by the loved one.
S/he understandably shoots the loved one to save her/himself. This is legally
and morally acceptable as it is self defence. In one situation, the victim is
drugged and hypnotized, strapped to a seat, electrocuted especially in the anal
and genital areas in order to sit still and not move, and has his/her eyes
taped open. S/he is forced to watch videos on a computer screen of the
simulated setups of “loved ones killing him/her” which s/he thinks is real and
understandably shoots the “loved one”. Another example is a young boy who when
drugged is lied to that his “Mum has a gun” and which he believes. It is in
fact a stick and the drugged and non conscious Mum thinks she has a “pen”.
Again he has every right to hit back and stop the gun being shot as this is
what he was led to believe and because of self defence. However the
perpetrators manipulate the scenarios so that the victim is made to feel
extremely guilt ridden and suicidal. The drugging, hypnosis and physical pain
e.g. electrocution stop the victim seeing clearly what is happening, of being
rational about it, and running away from the setup altogether.
A Programming System
“There’s someone in my head and it’s not
me” (Pink Floyd, Brain Damage)
The Programming System is basically
the “personal construction” of the indoctrination. It is an actual
psychological entity within a person. It consists of personalities who have
been produced in the programming process and are all beholden to the handler
and other perpetrators. The personalities are produced by either torturing and
tricking the host her/himself (as from the “core”), or by producing a
personality on top of a personality by torturing and tricking an already
existing personality.
The programming system has layers
and departments which fulfill the perpetrators’ aims. These are firstly to maintain itself as close to its original
state as possible. The original state consists of when the personalities
were made and so they have the original trauma and allegiance. Over time
personalities can see that they are abused and will want to both come back to
the host and dismiss the programming. The handler and perpetrators are aware of
this, and will try to get the personalities to an original state by getting
obedient system personalities to endanger those thinking of escaping. The
handler and perpetrators will also yell at, and force, the breakaway
personalities to “do as they are told” when being accessed by phone or in a
programming setting. Lastly they will torture the breakaway personalities in
the programming setting to try and get them back to an original state.
The personalities are strictly forbidden to talk with the
host victim, unless it is to say that which the handler and perpetrators
want “are good”, and in a disguised form that does not let on that it’s
programming. They are not to disclose to
genuine support e.g. a counsellor, a Lifeline counsellor; etc, and if caught,
they are not to disclose to competing criminal opposition, and nor the police.
They are to undertake the specific
deployment tasks, such as couriering information, and the general day to day tasks such as observing if the programming
is dismantling and report it next time they are accessed. They are to contact/ be accessed regularly e.g.
every Sunday morning or Saturday afternoons, and for when they are doing specific
tasks. They are to listen to the handlers and other perpetrators and do what they say, and to “shut down/suicide” if all of these
are being stopped or challenged.
To the host victim, this system and
the abuse, does not exist. S/he thinks
s/he is living a “normal” life. The personalities cannot talk with the host
victim. The only time they can is to leave “thoughts” with the host victim. An
example of this is “it would be great to visit Broome” which is really to
courier drug information to Broome. However, for the host victim this thought
is seen as “normal subconscious whispering thoughts” because how could there be
anyone inside of her/him? Also when the personalities are out and take over the
body, such as when being accessed or deployed, they leave the host victim in an
amnesic state where s/he cannot recall what happened. The amnesia is very
strong, as the trauma that caused it, was way too powerful.
Personalities can be accessed in two main ways. Firstly, there is general accessing that can be utilized
by any perpetrator as the handler has taught personalities to accept cues that
relate to any perpetrator accessing the system For example, one abused on me was three taps
on the back of the left hand shoulder and the “colour blue” was said. This sent
me into an accessed state where I was either told or gave information. Then
there are specific cues that relate
only to the handler or main controlling perpetrator. These are when the handler
is accessing regularly or when the victim is being abused for a specific
deployment. Accessing is usually done by public
phone (as different to a private one which has a record of calls eg a Telstra
statement). If not being deployed, the
victim/survivor has to check in once a week by public phone to see if the
programming is working and to be deployed if need be. Once deployed, the
victim/survivor still has to ring once a week, even if overseas. This again is
to check if the programming is still “extant” (working), if the deployment is
still happening, and if the victim/survivor is to be deployed elsewhere.
Personal accessing is when a perpetrator is personally interacting
with the victim/survivor. This occurs when couriering information, being
reprogrammed, being deployed in other tasks, etc. and has face to face contact with
a perpetrator.
These are the basic aspects of the
programming so that it is in a state ready for deployment.
Basic Training In another section of the programming system lie the
personalities trained to do specific tasks for making the money. Nearly all
child victims are trained in how to be a sexual slave. Organised pedophilia, in
terms of child prostitution and child pornography, is a very lucrative way of
making money. Other fundamental jobs
that victims are trained for are couriering simple information; for observing
the local suburbs, workplaces, churches, etc for signs of radicalism e.g.
socialist movements or extremism in any form; etc.
Specific Training
As the victim gets older, the
perpetrators look for particular skills s/he has that can be exploited. Intelligent
people are trained in photographic memory in order to remember complicated pictures
and draw and describe them later; and in sociological skills in order to
observe social groups for signs of resistance or social attitudes especially
towards Westerners, etc. Physically powerful people are trained in dissecting
and carrying human bodies; and in moving heavy amounts of drugs and contraband
equipment, etc.
Training can be done anywhere that cannot be seen by the public.
This includes homes, private mines and farms, etc. Sometimes if the perpetrators
can control public areas which assist the specific training such as a military
barrack for military training then these are abused. Perpetrator controlled
school facilities, hospitals, etc are other examples of where they train.
Again, because there is the non
consciousness of the personalities and the system, and the punishment if they
talk to the host, the organization has a skilled worker who is trained to
produce a lot of money and is totally unaware of being abused. The industries
people are abused in are criminal and secretive. The personalities are owned by external
perpetrators, and can only come back to being owned by the host when s/he
realizes that the abuse happened/is happening, and supports the personalities
in freeing them from the perpetrators.
Ongoing Maintenance or Disruption of Deprogramming
Programmers/handlers/perpetrators
attempt to maintain the programming by reprogramming, guilt tripping, causing
fear and false praise. Reprogramming is when a victim/survivor is brainwashed
again by drugging, hypnosis, electrocution and other forms of torture, and
setups with false information. New handler loyal personalities are created
especially when there is a “changeover” of handlers, and when older
personalities are not buying into the abuse. Existent personalities are also
reprogrammed to form “addon” personalities who again become handler loyal. New
personalities are also created by either from “scratch” or by “adding on”, if a
handler wants to train them in new roles, or for any other purposes. Guilt
tripping is also abused a lot when personalities are refusing to do tasks. The
handler and perpetrators lie that they “saved” the personality/ies in the
original or subsequent programming scenarios, and personalities should “feel
guilt”, and do as the handler and perpetrators say. When a personality has done
his/her job, the perpetrators, including the handler will praise him/her for a
doing “such a good job” and makes the personality feel worthwhile. Another
method to continue programming, accessing and deployment is to arouse fear
within personalities. For example, a fear that “your mother will die” etc, and
that “only the perpetrators can save her”. All these are lies, but to
personalities, especially of a young age, they seem real and will maintain
loyalty by the parts to the perpetrators. An internal (within the programming
itself) method of maintaining programming is when there is any problem facing
the victim/survivor, the handler makes out that s/he “will solve it for you if
you contact” him/her.
At the same time they wish to
disrupt any deprogramming, support and escaping by internal and external means.
Inside the system, the most loyal personalities do jobs that disturb any
progress such as doing the exact opposite to any deprogramming and restoring
programs to their original state by threatening personalities undoing programs.
Loyal personalities must also manufacture fake programs and handlers to give
the impression that programming is still continuing. In this way two things are
supposed to happen. Personalities will recontact a real handler/perpetrator in
order to get rid of the (fake) perpetrator/handler, or it gets “the system back
into the loop of there being programs” and necessitating contact with a
perpetrator/handler. Externally when being accessed, perpetrators, especially
the handler, will yell and abuse the personalities to stop deprogramming. They
will try and keep them fearful and loyal.
There are many methods
perpetrators, especially handlers, abuse to continue programming and stop
deprogramming, which may not be described here. The important thing to remember
is that perpetrators want to maintain programming because this is where the
complete loyalty lies, and where the accessing and deployment methods are.
Mind Control Slavery
“The silicon chip inside her head, Gets
switched to overload” (Boomtown Rats, I Don't Like Mondays)
When survivors talk about (the)
programming it usually refers to its detrimental effects and the survivor’s
mood, disposition, handling of a situation, phobias, callbacks, and deployment.
Programming is especially horrible when dealing with the perpetrators’ demands
to contact (accessing) and for deployment. One’s disposition is tunnel visioned
and black, and if it extends too long, may need hospitalization to take off the
stress and be safe. Programming feels very robotic, and it can be like a power
point has been turned on.
The reason for the quick acting
aspects is firstly because the programming process itself is a systematic and
extremely fast method of personal control. It abuses drugs, hallucinogens,
extreme dissociation, extreme torture and trickery, and within a couple of
hours perpetrators can have control. I have read authentic reports of people,
who were not from perpetrator families, but who unfortunately were in places
where programming could be done such as a backroom late at night at a police
station where the two staff members were really perpetrators. Two women, in
separate incidents, searched for years to try and understand what “the dark and
subconscious spinning and orders to contact unknown people” was about. It
wasn’t until they read what happened to programming victims/survivors, did they
understand what was actually going on and traced the “weirdness” back to a
police station in the inner west in Sydney when they filed reports of theft to
officers in a backroom two or three years before.
Programming has been verified by
many government reports and media articles. The abuse by Cameron and co.
working for the CIA was uncovered and documented many years ago and is part of
personal mind control history. The U.S. and Canadian governments have
released many reports over decades that have revealed historical and current
abuse especially by the CIA. The CIA did undertake experimentation on countless
innocent victims to perfect the mind control programming that exists today. It
was done ostensibly to “protect civilians during the Cold War with the
U.S.S.R.”. However, the fact that the people whom “the studies” were done on
did not know or were not signatures to the torture, completely rejects this
claim. These poor people and survivors had to endure extensive drugging with
highly hallucinogenic drugs, torture with electricity in the anal and genital
areas, and other extremely debilitating procedures.
Conclusion
In summarizing programming it is
again important to clarify what it is and what it isn’t.
Its not: Not a societal
conditioning process; Not a Frankenstein like process and result. Not an
overlay or physically embedding a computer inside ones brain.
It is: It is an interpersonal
control that abuses a persons specific love and fondness for a partner, family
and friends; It is based on deep emotional and moral considerations that
involve staged death/life scenarios; The programming process is based on
extensive drugging, torture and deception. It is a preplanned process with
specific outcomes that have to be achieved; It perverts and manipulates the
dissociation process in order to achieve non consciousness within the victim;
and the making of psychologically separate personalities. It’s a manipulation
and exploitation of ones deep feelings and thinking. Not really control of the
mind although this is what is achieved and means behaviourally the control of
the person, but is really the control of ones deep seated emotions such as
altruism, self interest and built on life/death scenarios. Pretending to “save
you” from something/someone fabricated or real. Abuse of drugs that makes
things seem real. Fabricated – either have someone in the family do something
like a drugged and non conscious mum thinking she is fellating her husband when
in fact she is fellating her son and the son being forced to believe that the
“mum is sexually abusing him” and that only the perpetrator father will “save
the son”. Or another fabrication of the victim being drugged and non conscious
and a perpetrator standing in for “the mother sexually abusing the victim”.
Most situations in programming are fabricated. There are fictitious situations
where a perpetrator says that “she will help you against an old perpetrator”
but this is false in terms of real helping. Both are perpetrators, and the
current one is still a perpetrator.
No comments:
Post a Comment