-Caveat Lector- from: http://mercury.spaceports.com/~persewen/table_of_contents.htm <A HREF="http://mercury.spaceports.com/~persewen/table_of_contents.htm">Table_of_ contents</A> ----- Da whole book at site. Om K ----- The webmaster of Illuminati News presents: The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave. by Cisco Wheeler and Fritz Springmeier Under Construction TABLE OF CONTENTS Introduction ........................................................................ ..................................................................... THE 12 MAJOR SCIENCES OF MONARCH MIND-CONTROL I. THE SELECTION & PREPARATION OF THE VICTIM A. Genetics & dissociative abilities B. Availability C. Physical & Mental requirements D. List of organizations carrying out programming B. 4 foundational steps for programming F. STEP 1. Spiritual requirements, Moon Child ceremonies, traumatization in vitro G. STEP 2. Trauma by premature birth H. STEP 3. Love bombing/love bonding I. STEP 4. Severing the "core" of the mind J. Further considerations II. THE TRAUMATIZATION & TORTURE OF THE VICTIM ........................................................................ ....................... A. A site for torture of children, NOTS China Lake B. What trauma does, the creation of PTSD & DID (MPD) C. How the torture is carried out, types of trauma D. How MPD works E. The Core F. The Anchoring Experience III. THE USE OF DRUGS A. A list of drugs used B. A brief history of use C. Applications for drugs to control a slave IV. THE USE OF HYPNOSIS ........................................................................ ........................................................................ ....... A. Dissociation, trance, & its historical use B. How to program with hypnosis C. How to boost creativity of victim with hypnosis D. Keeping the mind dissociative E. Keeping the mind in a programming state F. Hypnotic triggers & cues G. Hypnosis in programs & other uses V. THE SKILL OF LYING, THE ART OF DECEIT ........................................................................ ............................................ A. Overview B. The use of fiction C. The use of lies externally, incl. covers and fronts D. The use of internal deceptions, incl. the art of hiding things in a system VI. THE USE OF ELECTRICITY & ELECTRONICS ........................................................................ ......................................... A. For torture B. For memory deletion C. For implanting thoughts D. Electronic communication & control VII. ENGINEERING & STRUCTURING OF AN MPD SYSTEM A. Structuring of MPD worlds B. The creation of roles C. Building in layered defenses D. Building backup systems VIII. BODY MANIPULATION & PROGRAMMING ........................................................................ ........................................ A. Scarring the brain stem B. Split brain work C. Medical technologies D. Histamines E. The use of body programs IX. MIND MANIPULATION BY PSYCHOLOGICAL PROGRAMMING METHODS: BEHAVIOR MODIFICATION, PSYCHOLOGICAL MOTIVATION & NLP .............................................................. A. Observing a satanic family conditioning their children B. Behavior modification, obedience training C. Isolation D. Repetition E. Psychological motivators, md. pride/needs/wants F. Neuro-linguistic programming G. The inversion of pain & pleasure X. SPIRITUAL CONTROL TECHNIQUES, POSSESSION TRANCES, ETC ........................................................................ ....... A. Using spiritual principles against a person B. How the Monarch program miniturizes what is done on a large scale C. Dehumanization D. Fear E. The use of guilt, shame, ridicule & anger F. Teaching that the master is God G. Portals, Focal Points H. Vows & oaths I. The use of demon possession, layering in, etc. J. The use of "angel" alters K. The misuse of Scripture L. Theta programming XI. INTERNAL CONTROLS ........................................................................ ........................................................................ ................ A. Teaching occult philosophies & ideologies B. Internal computers C. Internal hierarchies XII. EXTERNAL CONTROLS ........................................................................ ........................................................................ ................ A. Monitoring (Asset control) B. The art of blackmail C. Bribes D. The Control of the Milieu E. Bonding & twinning F. Peer pressure Appendix I -- The Programmers Appendix II -- The programming Sites Bibliography Index Mail me GUEST BOOK [ Sign my GuestBook ] - [ Read my GuestBook ] [ GuestBook by TheGuestBook.com ] Back to Index Page ----- Aloha, He'Ping, Om, Shalom, Salaam. Em Hotep, Peace Be, Omnia Bona Bonis, All My Relations. Adieu, Adios, Aloha. Amen. Roads End Kris DECLARATION & DISCLAIMER ========== CTRL is a discussion and informational exchange list. Proselyzting propagandic screeds are not allowed. Substance—not soapboxing! These are sordid matters and 'conspiracy theory', with its many half-truths, misdirections and outright frauds is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credeence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://home.ease.lsoft.com/archives/CTRL.html http:[EMAIL PROTECTED]/ ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om