-Caveat Lector-

>
> http://mercury.spaceports.com/~persewen/table_of_contents.htm
>
>     ---------------------------------------------------------------
>
>                The Illuminati Formula Used to Create an
>                Undetectable Total Mind Controlled
>                Slave.
>
>                by Cisco Wheeler and Fritz Springmeier
>
>                 [construction_2.gif (6262 bytes)] Under
>                              Construction
>
>                            TABLE OF CONTENTS
>
>                Introduction
>                
>.............................................................................................................................................
>
>                THE 12 MAJOR SCIENCES OF MONARCH
>                MIND-CONTROL
>
>                I. THE SELECTION & PREPARATION OF THE
>                VICTIM
>
>                A. Genetics & dissociative abilities
>
>                B. Availability
>
>                C. Physical & Mental requirements
>
>                D. List of organizations carrying out
>                programming
>
>                B. 4 foundational steps for programming
>
>                F. STEP 1. Spiritual requirements, Moon
>                Child ceremonies, traumatization in
>                vitro
>
>                G. STEP 2. Trauma by premature birth
>
>                H. STEP 3. Love bombing/love bonding
>
>                I. STEP 4. Severing the "core" of the
>                mind
>
>                J. Further considerations
>
>                II. THE TRAUMATIZATION & TORTURE OF THE
>                VICTIM
>                
>...............................................................................................
>
>                A. A site for torture of children, NOTS
>                China Lake
>
>                B. What trauma does, the creation of
>                PTSD & DID (MPD)
>
>                C. How the torture is carried out, types
>                of trauma
>
>                D. How MPD works
>
>                E. The Core
>
>                F. The Anchoring Experience
>
>                III. THE USE OF DRUGS
>                A. A list of drugs used
>                B. A brief history of use
>                C. Applications for drugs to control a
>                slave
>
>                IV. THE USE OF HYPNOSIS
>                
>.......................................................................................................................................................
>
>                A. Dissociation, trance, & its
>                historical use
>
>                B. How to program with hypnosis
>
>                C. How to boost creativity of victim
>                with hypnosis
>
>                D. Keeping the mind dissociative
>
>                E. Keeping the mind in a programming
>                state
>
>                F. Hypnotic triggers & cues
>
>                G. Hypnosis in programs & other uses
>
>                V. THE SKILL OF LYING, THE ART OF DECEIT
>                
>....................................................................................................................
>
>                A. Overview
>
>                B. The use of fiction
>
>                C. The use of lies externally, incl.
>                covers and fronts
>
>                D. The use of internal deceptions, incl.
>                the art of hiding things in a system
>
>                VI. THE USE OF ELECTRICITY & ELECTRONICS
>                
>.................................................................................................................
>
>
>
>                A. For torture
>
>                B. For memory deletion
>
>                C. For implanting thoughts
>
>                D. Electronic communication & control
>
>
>
>                VII. ENGINEERING & STRUCTURING OF AN MPD
>                SYSTEM
>
>                A. Structuring of MPD worlds
>
>                B. The creation of roles
>
>                C. Building in layered defenses D.
>                Building backup systems
>
>                VIII. BODY MANIPULATION & PROGRAMMING
>                
>................................................................................................................
>
>                A. Scarring the brain stem
>
>                B. Split brain work
>
>                C. Medical technologies
>
>                D. Histamines
>
>                E. The use of body programs
>
>                IX. MIND MANIPULATION BY PSYCHOLOGICAL
>                PROGRAMMING METHODS:
>
>                BEHAVIOR MODIFICATION, PSYCHOLOGICAL
>                MOTIVATION & NLP
>                ..............................................................
>
>                A. Observing a satanic family
>                conditioning their children
>                B. Behavior modification, obedience
>                training
>                C. Isolation
>                D. Repetition
>                E. Psychological motivators, md.
>                pride/needs/wants
>                F. Neuro-linguistic programming
>                G. The inversion of pain & pleasure
>
>                X. SPIRITUAL CONTROL TECHNIQUES,
>                POSSESSION TRANCES, ETC
>                
>...............................................................................
>
>                A. Using spiritual principles against a
>                person
>                B. How the Monarch program miniturizes
>                what is done on a large scale
>                C. Dehumanization
>                D. Fear
>                E. The use of guilt, shame, ridicule &
>                anger
>                F. Teaching that the master is God
>                G. Portals, Focal Points
>                H. Vows & oaths
>                I. The use of demon possession, layering
>                in, etc.
>                J. The use of "angel" alters
>                K. The misuse of Scripture
>                L. Theta programming
>
>                XI. INTERNAL CONTROLS
>                
>................................................................................................................................................................
>                A. Teaching occult philosophies &
>                ideologies
>                B. Internal computers
>                C. Internal hierarchies
>
>                XII. EXTERNAL CONTROLS
>                
>................................................................................................................................................................
>                A. Monitoring (Asset control)
>                B. The art of blackmail
>                C. Bribes
>                D. The Control of the Milieu
>                E. Bonding & twinning
>                F. Peer pressure
>
>
>
>                Appendix I -- The Programmers
>
>
>
>                Appendix II -- The programming Sites
>
>
>
>                Bibliography
>
>                Index
>
>                Back to Index Page
>
>

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to