Monday 12 January 2015

Programming



Programming
“I was a stranger in my own life”. Cheryl Crow, Everyday is a Winding Road
The Basics
It’s important to know what mind control programming is, and what it’s not.
Mind Control is the control of a persons mind by another or others or society. Controlling the mind means that’s ones behavior and thoughts are controlled quickly, and overall, because the mind is where we adjudicate, process and action all our emotional, physical and intellectual input. However, in reality, it is the effect on one’s emotions and morality that actually affects us the most in the mind control, and the mind is where these are organized and, as written, action ourselves. Guilt, shame, horrendous loss, extreme gratitude, etc are the most powerful aspects in one’s life, and it is these very important emotions that the perpetrators manipulate in order to obtain control. Mind control therefore is not a brain implant, nor a Frankenstein-like mechanism. It is both emotional control, and fabricated and manipulated loyalty.

Societal Conditioning and Mind Control Programming
Nearly everyone is controlled in society in nearly every country in the world. The main reasons for control are political manipulation and economic exploitation. An economic system produces and sells/trades goods and services, and people have to adhere to this system in order to obtain benefit from it. All economic systems in the world, bar a couple of countries, have exploitative ones where one group of people obtains far more money than others for the amount of labour expended. People, are therefore, also mind controlled, or to use the socio-economic term, conditioned, to fit into this economy. The majority of people are conditioned by lies (e.g. “you live a wonderful life”, “you have a better life than…”) and violence (eg by police at demonstrations) and shame (eg if shoplifting) to adhere to this exploitation either as subjugated or exploiter. It affects everyone unless you can sell your labour and not be exploited, and you can divest your capital so that you aren’t exploiting others. Nearly everyone in society is deliberately unaware of the exploitation.

Mind control programming is quite different. It is interpersonal control. It is done by a specific individual or a small group of individuals to a victim. The mind is where the programming is kept and actioned, as similar to conditioning, but the programming is focused on the individual situation of the victim. The programmers will utilise the person’s relationship with a partner, family and friends (“a loved one”) in order to obtain and maintain control.
Mind Control Programming, or simply programming, firstly consists of complete destabilization where a person is forced to have no faith and trust in her/himself. S/he is tortured physically and psychologically by being put inside spinning machines, hung upside down, starved, water boarded, etc. S/he is then drugged and hypnotized till there is very little consciousness. Then the victim is placed in a staged setup, where the victim is lied to that s/he “has complete control to utilize all the choices available to him/her”. In reality s/he has no choices in a die or live scenario. S/he needs to defend her/himself in order to live, and people must necessarily die. This is self defence which is morally and legally defensible. However, she is lied to that s/he “deliberately killed” and is “a murderer and must suicide”. Then another group of perpetrators/or one perpetrator comes in and beguiles the victim that if “s/he gives control of her life to them/the handler, s/he then can be set free”. Of course the victim “chooses” this and becomes totally dependent upon the latest perpetrator/s. If s/he challenges any control s/he is taken back to the existentionalism of the awful situation and relives the suicidality. There are many scenarios a perpetrator/s will abuse, but the essence is the same. Supposedly “give your life to the saviours (really perpetrators) or suicide”.
 Secondly, s/he becomes extremely guilt ridden as s/he didn’t (really couldn’t) save the loved one, and then totally dependant upon programmers who deceive that he/she/they “saved her/him from their own suicide”. The emotions, ethical considerations and resulting subservience are deliberately intense and mean total control as the perpetrators had saved them from “death itself”. The programmers control the victim like a puppeteer because they caused and know the victim’s underlying “weaknesses” and how to restimulate any guilt. They will be the main perpetrators manipulating and exploiting the victim in the training, accessing, deployment and reprogramming of him/her. S/he/they will pass on important programming information to other perpetrators if need be. 
The parts are in a program, like stuck in a recording, and don’t know about choices or about another way of thinking or behaving. They don’t know it’s bad, as that is what they were trained to do. It’s not their fault, so there is no chastising them. It’s best to ignore programming, and explain to personalities who can change. Also it’s best to stop the programming that set up the control in the first place.

1950s Till Present- The Development of Programming
This form of mind control had been abused for centuries and is called by the archaic term “brainwashing”. All major militaries including the English, Americans, Russians, Australians, Germans and Chinese abused it up until the 1950s.
In the 1950s in North America, the C.I.A. moved Nazi German mind control brainwashing “experts” to the U.S. and employed Ewen Cameron, the then head of the World Psychiatric Association, to develop mind control so that the victim was completely not aware of being abused, and to be more robotic. With much awful experimentation, especially on students at McGill University in Montreal, Canada, but also in the U.S., Cameron and the Germans developed the MKUltra (Mind Kontrol Ultra) project which abused dissociation and robotic terminology into the now called “programming”. Dissociation is a natural defence by one’s psyche to isolate any trauma into an area that can be worked on later. It can sometimes mean the formation of a personality who can hold the trauma, and if this personality is out and takes over the body, the host person falls into a state of amnesia. The personality has all the attributes of being human in terms of senses and doing things. What the programming researchers theorised, and later succeeded in doing, is producing a personality that not only held the trauma, but was able to change the loyalty of the personality from within the host victim to an external being i.e. a perpetrator. Instead of naturally being loyal to the host, and sitting in the psyche waiting for a peaceful time to address the pain, the personality was to be goaded towards control by the external programmers, and also, the severe dislike of the now host victim. When torturing the victim as usual, the perpetrators now watched for a personality developing. They placed the pain of the setups and the deceived servitude on this personality instead of with the victim him/herself. The perpetrators now had control of someone else inside the victim, and then caused dislike of the host by another staged setup. This resulted in a personality, who could act like a normal human being when out, but because s/he was dissociated, was separated and unknown to the host. The personality also takes over when out, as the trauma is the most deep seated within the personality, and the host goes into amnesia and not knowing about the “missing time”. This personality was also totally subservient to the perpetrators, and disliked the host so that s/he would not tell the host anything. The perpetrators had a totally deceived, loyal and obligated personality, and had all of his/her human attributes ready to be trained. This was/is inside a victim who knew nothing of the victimization. Because the trauma was deep inside and tucked away in a personality it was more difficult to work on than if it was simply trauma to be addressed. Also because the abuse is in a separate section that cannot communicate to the host, the victim has no memory of the abuse. And as the victim was amnesic, when the personality was out, s/he cannot recall what they were abused for. Having a controlled and quite distinct “mini” personality, rather than a full on person, lent to the renaming of the brainwashing to the more robotic “programming”. The criminal organizations also became more demanding and exacting, and wanted robotic behaviour from its victims. A cue such as a date, colour or sensation (auditory, visual, tactile and other means) sets off a specific behaviour such as “return to the perpetrator”, “don’t disclose”, etc. Also “activating words” became more robotic such as “sleeper awake” when the personality was to take over the body and be fully out. Therefore, to return to Cheryl Crow’s song, it is very easy to be a stranger in your own life if external perpetrators own and abuse a personality inside of you that you’re not aware of. This condition is what scared people when they saw the films The Exorcist and Alien. On screen were victims who had entities living inside them, and had their own motivations including hatred of the host, and were controlled by foreigners/externally. In reality, external perpetrators had perverted the dissociation process in order to produce a manipulated victim who had no idea of being abused in order to make large amounts of money for someone else. If they started to know about the personality they would suffer from intense thoughts of suicide and so didn’t.

Not Complicated
Programming also isn’t rocket science. Anyone with an understanding of dissociation and the development of split personalities can see how the programming is done. It is the perversion of dissociation and personalities. Instead of tricking a person to be eternally grateful to a perpetrator, a perpetrator tricks a dissociated personality. People, when usually dealing with trauma, encapsulate it in a dissociated form and personalities. The trauma is left in a natural state and is to be worked on later when there is a peaceful time. Then the pain is felt and understood, and the holding dissociation and personalities disappear. The personality is reunited to the host person who is then in a more peaceful disposition. However, what the perpetrators do is pervert this. Firstly, they separate a personality from the host by staged setups where the personality is further traumatized and beguiled into giving complete sovereignty to an external perpetrator because the perpetrator supposedly “saved him/her from total death”. The personality is further separated from the host by being told lies that that the host “hates it”, and in turn learns to hate the host victim and any support people. They will work only for perpetrators whom the personality is manipulated to think “are saviours”. Further traumatisation occurs if the personality disobeys. The following conditions enable programming, accessing and deployment by an external handler. Firstly, there is a psychologically split personality from the host person, who is lied to that “the outside world and the host person is horrible”; secondly, the part is suicidally guilt ridden and completely beholden to an external and directing perpetrator; thirdly, s/he is trained in skills to benefit a criminal organization; fourthly, has cues related to specific behaviours and becomes like a robot who can be accessed and deployed instantaneously by an external operator, and lastly, has a host person who is totally unaware of the split personality and is not aware of lost time because the emotional trauma is deeply installed beyond the consciousness of the person. In my case, for example, I had controlled personalities who could ring from a public telephone in Indonesia and ask the operator for a reverse charge call to a mobile phone in Australia, and then be told what to do (observe Muslim people) without my conscious knowledge at all.

Some basic descriptions: Programming is usually very black or white thinking; is about things that are not you eg suicide and/or killing someone close to you; very rigid thoughts; extremely irrational; derogatory towards yourself, partner, counsellor, family, survivors, friends; causes confusion so that you don’t think well; is always on the side of a perpetrator, especially the handler, or a group of perpetrators; and is about extraordinary actions such as suicide and/or killing someone.

Different Usage of the Word ‘Programming’ and specific Explanations
Programming consists of three main areas, and the word ‘programming’ can change meaning depending upon grammatical usage. For examples, there is the programming (process) where the victim is programmed or indoctrinated; and there is the programming (system) where the indoctrination is placed within ones mind. Thirdly, there is the (overall) programming or the general mind control where one is totally enslaved. The perpetrators want a victim who is like a programmed robot.  The aim of the indoctrination is to entrap the person into being totally submissive and involves a lot of torture and trickery to instill intense lies, fears and dependence. Programming the victim is methodical and follows a pre-organised plan that corresponds to age and abilities. The programming torture happens in all areas: physical e.g. beatings, food deprivation, scarring of skin, locked in a small nonlit room for days and electrocution; emotional and sexual e.g. multiple and child rape; and psychological e.g. family deprivation. The lies are: supposed “worthlessness without the group/perpetrators”; that perpetrators "love" you; the outside world e.g. counsellors and loving family and friends "hates and disbelieves you"; you will "always be alone"; you "enjoyed the violence"; etc.

The Programming Process
The process of installing the programming consists of torture, trauma and trickery. It includes drugging, hypnosis, electrocution, being forced to watch horrible videos, etc. The first steps of torture, drugging and hypnosis dangerously impair the person’s ability to see things clearly, to act rationally on it, and to escape and fight the torture and deception. S/he is forced to have no confidence in her/himself at all. The victim can be lied to by hypnotic suggestion that “there is family present”, there is “a gun”, that s/he is “killing someone”, etc. The drugging also makes the victim susceptible to lies told by the perpetrators and the inability to see what is really happening. Electrocution, particularly in the genital and anal areas, is abused in order to threaten, control and punish. Other physical torture is being suspended from cages, handcuffed and being put next to a revolving saw, locked away in a basement, etc.  The perpetrators in the last thirty years or so have been abusing specifically made horrible videos which have the scenarios the handler wants to abuse. 

The perpetrators then produce a staged setup where the victim is confronted with a no choice situation involving the life and death of him/herself and “loved ones”.  The victim is placed in a deliberately guilt induced situation where s/he is forced to kill in order to save her/himself or others. The situation deliberately does not have a choice. In an example of one scenario, the victim has to shoot the loved one (Mum, brother, nephew, etc) or s/he will be shot by “the loved one”. S/he understandably shoots the loved one to save her/himself. This is legally and morally acceptable as it is self defence. In one scenario, the victim is drugged and hypnotised, strapped to a seat, electrocuted especially in the anal and genital areas in order to sit still and not move, and has his/her eyes taped open. S/he is forced to watch videos on a computer screen of the simulated setups of “loved ones killing him/her” which s/he thinks is real and understandably shoots the “loved one”. Another example is a young boy who when drugged is lied to that his “Mum has a gun” and which he believes. It is in fact a stick and the drugged and non conscious Mum thinks she has a “pen”. Again he has every right to hit back and stop the gun being shot as this is what he was led to believe and because of self defence. However the perpetrators manipulate the scenarios so that the victim is made to feel extremely guilt ridden and suicidal.

When at this suicidal level another perpetrator then steps in and lies that “s/he will save the victim”. The “saving” is within sweet talking and supposed “support”. The victim feels better because s/he has been “saved” and even becomes grateful. However it is really only on condition that the victim effectively obeys what the perpetrator says. The victim is caught (again) and has no choice. S/he is either suicidal or accepting of the perpetrator’s demands. The perpetrator then becomes the handler and controller of the victim. The handler will in future abuse this programming setup to guilt trip the victim/survivor about how s/he “saved the victim/survivor” and how the victim must do as the handler says. The handler will also add more lies further on such as “helping you with something”, and the victim believes this because the handler had supposedly helped him/her before. The suicidality, that the victim has when not obeying the handler’s orders, stems back to this no choice setup. The programming is all lies and a setup. The handler knew that the victim was being tortured and was part of its organising. S/he knew s/he was not a “saviour” but was abusing this setup for his/her own devious control.

Dissociation is deliberately abused. The perpetrator/trainer wishes to produce a “split personality” and control him/her. Alongside the abuse of trauma for torturing it also has a desired effect of dissociation and the creation of a separate personality. Extreme and repeated trauma naturally makes people dissociate and form a personality where the trauma is kept until it can be worked on. In programming, the personality contains the trauma of the extreme pain, the guilt and dependence upon and ultimately slavery to the handler. The handler/trainer will look to see if a dissociated personality has “popped out” in the process and will goad him/her into submission and separation from other personalities and the host person him/herself. The trauma is in the most deep seated personal state as the victim is severely drugged and extremely pliable. The traumatised and tricked personality is therefore separated from the victim and is controlled by the handler. This is how the perpetrators can control and direct a victim without him/her consciously knowing what is happening. When being abused, the personality takes over as the trauma is the most deep seated within the whole person and the host goes into amnesia. and is accessed and deployed without the victim’s host state knowing. The personality is also taught to dislike the person and to be totally loyal to the perpetrator/s and organisation. The controlled part is therefore not conscious to the person because it is firstly separated by psychological dissociation, in a different and specific traumatic state to the host person’s wishes and life, and also can be setup to hate the host person. Instead, the personality is directly controlled by external perpetrators, and the personality cannot tell the host person what is going on. This is how programming, accessing and deployment mainly work.

The programming has specific stages of indoctrination that are generally called core and secondary/ tertiary/etc layers. For children this can start in the womb, and for kidnapped people (those indoctrinated by marriage and friendship) it starts at the age they were kidnapped. The core stages have particularly very heavy and continual torture. The progression is one of destroying trust and of implementing perpetrator obedience. The most “effective” personalities, i.e. most dependent and controlled, are given the worst roles such as maintaining the system and making sure all personalities are doing their jobs.

Indoctrination occurs within all aspects of the organization either in the home, other member's houses, meeting places, etc. Specific programming areas where there are torturing machines, etc can be in the back of a handler’s house, institutions (e.g. schools), etc. The perpetrators try to disguise the programming room as much as possible and keep them out of public view. Places of programming are locked rooms and basements, especially at farmhouses, school auditoriums, isolated buildings such as on islands or uninhabited roads, in mines, etc. There is in Brisbane in the eastern suburbs and on the Brisbane River a programming room that’s in a boatshed. It’s run by a handler and perpetrators bring in the drugged victims at night by boat which is parked underneath the shed. There is a hole in the floor and a ladder is suspended down so that victims are told to “clamber up” into the room. Throughout the night the victim is tortured by a female handler but no one can hear because of the soundproofing. The neighbours and passers by think it is just a “boatshed”, but it isn’t. The victim is also deceived because s/he was not taken there by the usual way e.g. car. I kept getting memory of a boat and a boatshed with understanding this programming/torture place and then realised what and where it is.

Broadly, there are two main programming processes. These are the general and the specific. The general is done by cult members particularly those in the family. E.g. a young boy can be raped in a cult ceremony by his father and also have his head dunked under water until he acquiesces. The revolting father did both to me. General indoctrination methods involve lies e.g. "mum will be killed', deceipt, threats e.g. "you will be tracked down if you escape", false promises e.g. "the cult will provide for you", false guilt e.g. "you owe the organisation as it 'helped you'", etc. The specific is done by trained indoctrinators called "trainers", "programmers" or “handlers”. The handlers have organized steps and styles that correspond to the age, gender, abilities and situation of the victim. E.g. a newly married and non cult background wife will be indoctrinated from the beginning and at her age’s abilities. A two year old boy will be programmed within his abilities as a two year old boy. Tasks and roles will also be attempted to be instilled. The handler also produces identical programming to other victims/survivors of the same age.

The programming consists of setups where a victim/survivor is deliberately placed in a no choice scenario that usually involves family and friends or simulations of “family” and “friends”. The setups could be on screen, in a staged play, or real depending upon where the victim is and how much the family are involved. The “family” or “friends” could be on a screen and the victim/survivor is strapped into a chair so they cannot escape and their eyes are taped open. They are forced to watch the simulation on screen. In the last thirty or more years perpetrators have been abusing videos and three dimensional images (similar to Wii technology) on screen to play out the scenarios. These are particularly abused when they do not have the real family at the setup. For example, I was being abused in Brisbane and my family lived in Wollongong and the perpetrators and handler would try and deceive me that my family “was there”. They were actors on a screen and not my family. In a different situation, the victim could be placed in a play like setting similar to a staged drama. Perpetrators maybe acting as “family” or “friends” and stand around the victim playing out the setup. The real family could also be there. If they are innocent as mine are they too are drugged, hypnotized and programmed. They are also manipulated in the scenario. If they are perpetrators they will be conscious of what is going on. 

The setups are of awful life or death situations involving supposed “family” or “friends” of the victim. The victim is placed in a deliberately guilt induced situation where s/he is forced to kill in order to save her/himself or others. The situation deliberately does not have a choice. In an example of one scenario, the victim has to shoot the loved one (Mum, brother, nephew, etc) or s/he will be shot by the loved one. S/he understandably shoots the loved one to save her/himself. This is legally and morally acceptable as it is self defence. In one situation, the victim is drugged and hypnotized, strapped to a seat, electrocuted especially in the anal and genital areas in order to sit still and not move, and has his/her eyes taped open. S/he is forced to watch videos on a computer screen of the simulated setups of “loved ones killing him/her” which s/he thinks is real and understandably shoots the “loved one”. Another example is a young boy who when drugged is lied to that his “Mum has a gun” and which he believes. It is in fact a stick and the drugged and non conscious Mum thinks she has a “pen”. Again he has every right to hit back and stop the gun being shot as this is what he was led to believe and because of self defence. However the perpetrators manipulate the scenarios so that the victim is made to feel extremely guilt ridden and suicidal. The drugging, hypnosis and physical pain e.g. electrocution stop the victim seeing clearly what is happening, of being rational about it, and running away from the setup altogether. 

A Programming System
“There’s someone in my head and it’s not me” (Pink Floyd, Brain Damage)
The Programming System is basically the “personal construction” of the indoctrination. It is an actual psychological entity within a person. It consists of personalities who have been produced in the programming process and are all beholden to the handler and other perpetrators. The personalities are produced by either torturing and tricking the host her/himself (as from the “core”), or by producing a personality on top of a personality by torturing and tricking an already existing personality.
The programming system has layers and departments which fulfill the perpetrators’ aims. These are firstly to maintain itself as close to its original state as possible. The original state consists of when the personalities were made and so they have the original trauma and allegiance. Over time personalities can see that they are abused and will want to both come back to the host and dismiss the programming. The handler and perpetrators are aware of this, and will try to get the personalities to an original state by getting obedient system personalities to endanger those thinking of escaping. The handler and perpetrators will also yell at, and force, the breakaway personalities to “do as they are told” when being accessed by phone or in a programming setting. Lastly they will torture the breakaway personalities in the programming setting to try and get them back to an original state.
The personalities are strictly forbidden to talk with the host victim, unless it is to say that which the handler and perpetrators want “are good”, and in a disguised form that does not let on that it’s programming. They are not to disclose to genuine support e.g. a counsellor, a Lifeline counsellor; etc, and if caught, they are not to disclose to competing criminal opposition, and nor the police. They are to undertake the specific deployment tasks, such as couriering information, and the general day to day tasks such as observing if the programming is dismantling and report it next time they are accessed. They are to contact/ be accessed regularly e.g. every Sunday morning or Saturday afternoons, and for when they are doing specific tasks. They are to listen to the handlers and other perpetrators and do what they say, and to “shut down/suicide” if all of these are being stopped or challenged.
To the host victim, this system and the abuse, does not exist. S/he thinks s/he is living a “normal” life. The personalities cannot talk with the host victim. The only time they can is to leave “thoughts” with the host victim. An example of this is “it would be great to visit Broome” which is really to courier drug information to Broome. However, for the host victim this thought is seen as “normal subconscious whispering thoughts” because how could there be anyone inside of her/him? Also when the personalities are out and take over the body, such as when being accessed or deployed, they leave the host victim in an amnesic state where s/he cannot recall what happened. The amnesia is very strong, as the trauma that caused it, was way too powerful. 
Personalities can be accessed in two main ways. Firstly, there is general accessing that can be utilized by any perpetrator as the handler has taught personalities to accept cues that relate to any perpetrator accessing the system  For example, one abused on me was three taps on the back of the left hand shoulder and the “colour blue” was said. This sent me into an accessed state where I was either told or gave information. Then there are specific cues that relate only to the handler or main controlling perpetrator. These are when the handler is accessing regularly or when the victim is being abused for a specific deployment. Accessing is usually done by public phone (as different to a private one which has a record of calls eg a Telstra statement). If not being deployed, the victim/survivor has to check in once a week by public phone to see if the programming is working and to be deployed if need be. Once deployed, the victim/survivor still has to ring once a week, even if overseas. This again is to check if the programming is still “extant” (working), if the deployment is still happening, and if the victim/survivor is to be deployed elsewhere.  Personal accessing is when a perpetrator is personally interacting with the victim/survivor. This occurs when couriering information, being reprogrammed, being deployed in other tasks, etc. and has face to face contact with a perpetrator.
These are the basic aspects of the programming so that it is in a state ready for deployment.
Basic Training In another section of the programming system lie the personalities trained to do specific tasks for making the money. Nearly all child victims are trained in how to be a sexual slave. Organised pedophilia, in terms of child prostitution and child pornography, is a very lucrative way of making money.  Other fundamental jobs that victims are trained for are couriering simple information; for observing the local suburbs, workplaces, churches, etc for signs of radicalism e.g. socialist movements or extremism in any form; etc.
Specific Training
As the victim gets older, the perpetrators look for particular skills s/he has that can be exploited. Intelligent people are trained in photographic memory in order to remember complicated pictures and draw and describe them later; and in sociological skills in order to observe social groups for signs of resistance or social attitudes especially towards Westerners, etc. Physically powerful people are trained in dissecting and carrying human bodies; and in moving heavy amounts of drugs and contraband equipment, etc.
Training can be done anywhere that cannot be seen by the public. This includes homes, private mines and farms, etc. Sometimes if the perpetrators can control public areas which assist the specific training such as a military barrack for military training then these are abused. Perpetrator controlled school facilities, hospitals, etc are other examples of where they train.
Again, because there is the non consciousness of the personalities and the system, and the punishment if they talk to the host, the organization has a skilled worker who is trained to produce a lot of money and is totally unaware of being abused. The industries people are abused in are criminal and secretive.  The personalities are owned by external perpetrators, and can only come back to being owned by the host when s/he realizes that the abuse happened/is happening, and supports the personalities in freeing them from the perpetrators.
Ongoing Maintenance or Disruption of Deprogramming
Programmers/handlers/perpetrators attempt to maintain the programming by reprogramming, guilt tripping, causing fear and false praise. Reprogramming is when a victim/survivor is brainwashed again by drugging, hypnosis, electrocution and other forms of torture, and setups with false information. New handler loyal personalities are created especially when there is a “changeover” of handlers, and when older personalities are not buying into the abuse. Existent personalities are also reprogrammed to form “addon” personalities who again become handler loyal. New personalities are also created by either from “scratch” or by “adding on”, if a handler wants to train them in new roles, or for any other purposes. Guilt tripping is also abused a lot when personalities are refusing to do tasks. The handler and perpetrators lie that they “saved” the personality/ies in the original or subsequent programming scenarios, and personalities should “feel guilt”, and do as the handler and perpetrators say. When a personality has done his/her job, the perpetrators, including the handler will praise him/her for a doing “such a good job” and makes the personality feel worthwhile. Another method to continue programming, accessing and deployment is to arouse fear within personalities. For example, a fear that “your mother will die” etc, and that “only the perpetrators can save her”. All these are lies, but to personalities, especially of a young age, they seem real and will maintain loyalty by the parts to the perpetrators. An internal (within the programming itself) method of maintaining programming is when there is any problem facing the victim/survivor, the handler makes out that s/he “will solve it for you if you contact” him/her. 
At the same time they wish to disrupt any deprogramming, support and escaping by internal and external means. Inside the system, the most loyal personalities do jobs that disturb any progress such as doing the exact opposite to any deprogramming and restoring programs to their original state by threatening personalities undoing programs. Loyal personalities must also manufacture fake programs and handlers to give the impression that programming is still continuing. In this way two things are supposed to happen. Personalities will recontact a real handler/perpetrator in order to get rid of the (fake) perpetrator/handler, or it gets “the system back into the loop of there being programs” and necessitating contact with a perpetrator/handler. Externally when being accessed, perpetrators, especially the handler, will yell and abuse the personalities to stop deprogramming. They will try and keep them fearful and loyal.
There are many methods perpetrators, especially handlers, abuse to continue programming and stop deprogramming, which may not be described here. The important thing to remember is that perpetrators want to maintain programming because this is where the complete loyalty lies, and where the accessing and deployment methods are.

Mind Control Slavery
“The silicon chip inside her head, Gets switched to overload” (Boomtown Rats, I Don't Like Mondays)
When survivors talk about (the) programming it usually refers to its detrimental effects and the survivor’s mood, disposition, handling of a situation, phobias, callbacks, and deployment. Programming is especially horrible when dealing with the perpetrators’ demands to contact (accessing) and for deployment. One’s disposition is tunnel visioned and black, and if it extends too long, may need hospitalization to take off the stress and be safe. Programming feels very robotic, and it can be like a power point has been turned on. 
The reason for the quick acting aspects is firstly because the programming process itself is a systematic and extremely fast method of personal control. It abuses drugs, hallucinogens, extreme dissociation, extreme torture and trickery, and within a couple of hours perpetrators can have control. I have read authentic reports of people, who were not from perpetrator families, but who unfortunately were in places where programming could be done such as a backroom late at night at a police station where the two staff members were really perpetrators. Two women, in separate incidents, searched for years to try and understand what “the dark and subconscious spinning and orders to contact unknown people” was about. It wasn’t until they read what happened to programming victims/survivors, did they understand what was actually going on and traced the “weirdness” back to a police station in the inner west in Sydney when they filed reports of theft to officers in a backroom two or three years before.  

Programming has been verified by many government reports and media articles. The abuse by Cameron and co. working for the CIA was uncovered and documented many years ago and is part of personal mind control history. The U.S. and Canadian governments have released many reports over decades that have revealed historical and current abuse especially by the CIA. The CIA did undertake experimentation on countless innocent victims to perfect the mind control programming that exists today. It was done ostensibly to “protect civilians during the Cold War with the U.S.S.R.”. However, the fact that the people whom “the studies” were done on did not know or were not signatures to the torture, completely rejects this claim. These poor people and survivors had to endure extensive drugging with highly hallucinogenic drugs, torture with electricity in the anal and genital areas, and other extremely debilitating procedures.

Conclusion
In summarizing programming it is again important to clarify what it is and what it isn’t.
Its not: Not a societal conditioning process; Not a Frankenstein like process and result. Not an overlay or physically embedding a computer inside ones brain.
It is: It is an interpersonal control that abuses a persons specific love and fondness for a partner, family and friends; It is based on deep emotional and moral considerations that involve staged death/life scenarios; The programming process is based on extensive drugging, torture and deception. It is a preplanned process with specific outcomes that have to be achieved; It perverts and manipulates the dissociation process in order to achieve non consciousness within the victim; and the making of psychologically separate personalities. It’s a manipulation and exploitation of ones deep feelings and thinking. Not really control of the mind although this is what is achieved and means behaviourally the control of the person, but is really the control of ones deep seated emotions such as altruism, self interest and built on life/death scenarios. Pretending to “save you” from something/someone fabricated or real. Abuse of drugs that makes things seem real. Fabricated – either have someone in the family do something like a drugged and non conscious mum thinking she is fellating her husband when in fact she is fellating her son and the son being forced to believe that the “mum is sexually abusing him” and that only the perpetrator father will “save the son”. Or another fabrication of the victim being drugged and non conscious and a perpetrator standing in for “the mother sexually abusing the victim”. Most situations in programming are fabricated. There are fictitious situations where a perpetrator says that “she will help you against an old perpetrator” but this is false in terms of real helping. Both are perpetrators, and the current one is still a perpetrator.

No comments:

Post a Comment