INTRODUCTION by Fritz Springmeier
After Project Monarch Beta Kitten victim Candy Jones’s husband Donald Bain deprogrammed her enough that she could participate in writing a book exposing some of what had been done to her, the CIA's secret was out. A year after publishing "The Control of Candy Jones Hypnotism and the CIA", MK-Ultra' horrible history was exposed.
Ever since then, the intelligence agencies and the Illuminati have been carrying out damage control. Their biggest damage control campaign has enlisted the power of Hollywood and the controlled Media. This campaign is known as the False Memory Syndrome campaign.
The handlers of mind-controlled slaves carry around a black or grey 3 ring notebook or a lap top computer with the access codes and triggers. Some of the programmers and handlers have this all memorized. The deepest parts, core/gems/executive committee, false trinity etc. are charted in esoteric language such as Enochian, Hebrew (which is considered magical), and Druid symbols.
I have never gotten the opportunity to look at one of these, although a number of the slaves who I’ve talked with have while they were being programmed. These notebooks have color-coded graphs showing the arrangement of alters, the structure of the system, the training of the alters, the history of the alters and other details.
All the primary tortures carried out on a slave are coded using dates/no.s so that the memories can be pulled up by the programmers. There is a standard set of hand signals, gestures, and codes that allow a handler to work with someone else’s slave, but the accepted code among the handlers is to leave another man’s slave alone. As one leading psychiatrist put it, “Different ideologies use the same methodologies of mind control.” The Illuminati have secretly put in base programming that allows them ultimate control over many of the other groups’
slaves.
Programmed slaves who have worked for the military as mind-controlled slaves have witnessed their files expunged and sanitized. The New World Order in 1981 made training films for their novice programmers. Monarch slave Cathy O’Brien was used to make both the film “How to Divide a Personality” and “How To Create a Sex Slave.” Two Huntsville porn photographers
were among those used to help NASA and the NWO create these training films.
It’s on public record that MK ULTRA, the mind control research which CIA director Admiral Stansfield Turner admitted to in 1977 spent millions of dollars studying Voodoo, witchcraft, and psychics. On August 3, 1977, at a Senate hearing the then CIA director Admiral Stansfield Turner disclosed that the CIA had been conducting mind control on countless numbers of unsuspectingvictims for years, without their knowledge or consent. These CIA mind control operations were carried out with the participation of a least 185 scientists and at least 80 American institutions, including prisons, pharmaceutical companies, hospitals, and 44 medical colleges & universities. Many of America’s most prestigious institutes of medical research, had cooperated with the CIA. as well as numerous big name corporations.
Casey admitted that day that the CIA did mind-control consisting of drugs, hypnosis & electro shock. A few of the victims of the Monarch Project were even awarded financial compensation for their misery. But what was admitted was admitted in the spirit of covering up the extent of the full truth. The compensation was actually hush money, because victims were given “gag orders” by judges not to talk about what had happened to them.
Monarch Methods of Mind Control & Programming
TABLE OF CONTENTS
A. Genetics & dissociative abilities
B. Availability
C. Physical & Mental requirements
D. List of organizations carrying out programming
E. 4 foundational steps for programming
F. Step 1. Spiritual requirements, Moon Child ceremonies,
traumatization in vitro
G. Step 2. Trauma by premature birth
H. Step 3. Love bombing/love bondingII. The Traumatization & Torture of the Victim
A. A site for torture of children, NOTS China Lake
B. What trauma does, the creation of PTSD & DID (MPD)
C. How the torture is carried out, types of trauma
D. How MPD works
E. The Core
F. The Anchoring ExperienceIII. The Use of Drugs
A. A list of drugs used
B. A brief history of use
C. Applications for drugs to control a slave
IV. The Use of Hypnosis
A. Dissociation, trance, & its historical use
B. How to program with hypnosis
C. How to boost creativity of victim with hypnosis
D. Keeping the mind dissociative
E. Keeping the mind in a programming state
F. Hypnotic triggers & cues
G. Hypnosis in programs & other uses
V. The Skill of Lying, The Art of Deceit
A. Overview
B. The use of fiction
C. The use of lies externally, incl. covers and fronts
D. The use of internal deceptions, incl. the art of hiding things in
a system
VI. The Use of Electricity & Electronics
A. For torture
B. For memory deletion
C. For implanting thoughts
D. Electronic communication & control
VII. Engineering & Structuring Of An MPD System
A. Structuring of MPD worlds
B. The creation of roles
C. Building in layered defenses
D. Building backup systems
VIII. Body Manipulation & Programming
A. Scarring the brain stem
B. Split brain work
C. Medical technologies
D. Histamines
E. The use of body programs
IX. Mind Manipulation by Psychological Programming
Methods:
Behavior Modification, Psychological Motivation & NLP
A. Observing a satanic family conditioning their children
B. Behavior modification, obedience training
C. Isolation
D. Repetition
E. Psychological motivators, md. pride/needs/wants
F. Neuro-linguistic programming
G. The inversion of pain & pleasure
X. Spiritual Control Techniques, Possession, Trances, Etc.
A. Using spiritual principles against a person
B. How the Monarch program miniturizes what is done on a
large scale
C. Dehumanization
D. Fear
E. The use of guilt, shame, ridicule & anger
F. Teaching that the master is God
G. Portals, Focal Points
H. Vows & oaths
I. The use of demon possession, layering in, etc.
J. The use of “angel” alters
K. The misuse of Scripture
L. Theta programming
XI. Internal Controls
A. Teaching occult philosophies & ideologies
B. Internal computers
C. Internal hierarchies
XII. External Control
A. Monitoring (Asset control)
B. The art of blackmail
C. Bribes
D. The Control of the Milieu E. Bonding & twinning
F. Peer pressure