Monday, November 12, 2012

Recognizing and Classifying Programming

http://www.whale.to/b/monday4.html                      
Recognizing and Classifying Programming
A discussion by Pamela J. Monday, Ph.D., LPC and Denny Hilgers

(Note from the authors: The purpose of this article is to assist interested parties in recognizing and identifying the complex nature of mind control programming. While therapeutic techniques are mentioned, it is assumed that only experienced therapists under expert supervision will use these techniques, and only in the context of ongoing psychotherapy.)

 

Many Sadistic Ritual Abuse Survivors who have been diagnosed as having Multiple Personality Disorder (SRA/MPD), have been programmed in systematic, complex ways. By programming, we mean that the human, in a dissociated or altered mind state, has been systematically and deliberately taught lessons, attitudes, beliefs, behaviors, and responses to specific cues ("triggers") so as to respond on command in ways that benefit the person/groups responsible for the programming. There has been much controversy about whether the human mind functions as a computer; many clinicians believe that it is impossible to "program" the human brain. However, we have learned from survivors, including those whose job within a cult/organized group, was to "program" others, that indeed, it is possible to instill very complex information in the unconscious mind, and to use this information to ensure control of the human by controlling the mind.
Survivors have told us that a group of programmers may travel from location to location, teaching members of various "cults" or other organized groups how to program their victims so as to ensure optimal mind control. By programming an SRA/MPD’s system, the programmer can maintain constant contact with the survivor. This contact permits knowledge of a victim’s location at any time and also allows manipulation of the victim to perform acts he/she would ordinarily be unwilling to do. Programmed mind control reinforces the lesson survivors tell us that all cult victims are taught, namely, that he/she cannot escape from the cult or perpetrating group. The programming is done in very complex ways so as to maximize the use of amnestic barriers between personalities, thereby preventing any one personality from having all of the information about how they are being controlled. Knowledge is power; by compartmentalizing knowledge throughout the system (i.e., the mind), the programmer or programming group has power over the victim. Reducing amnestic barriers between personalities so that they can cooperate and share knowledge; finding the original memory of how the personality was created and thus uncovering the programming information (including how programming was done as well as perpetrator identity and triggers); and using imagery, cognitive restructuring, and other empowering therapeutic interventions to help the patient get back control over their own mind are all basic therapeutic goals. However, the sophisticated programming that we are seeing in some survivors makes our task very difficult.
Programming occurs after the creation of a new personality via the usual techniques of trauma and torture. While there is some evidence that with sophisticated computer equipment that creates altered states of consciousness via audio waves or manipulation of the visual field, a trauma base for programming is no longer necessary, the vast majority of our patients will have personalities created through torture. Survivors report that one form of programming involves the use of a physical image, for example, a picture or portion of a video. In an hypnotic state, the personality readily accepts this image as reality in his/her life. It is speculated that the "internal landscapes" that patients see inside have been created in part through the use of these visual images that have been internalized as reality. This may explain why survivors have similar "landmarks" within their internal landscapes such as a castle, carousel, Kabul, umbrella, puppet, cave, etc., that, when drawn and compared with the drawings from other survivors, look very much alike in design and detail.
Many survivors report that they have internal computers that control information within their systems (this has especially been reported from survivors who report "military" mind control programming). The internalized computer usually lies deeply hidden within the unconscious but over time, its presence may be revealed to the victim. As communication between personalities and between levels proceeds, someone inside may know about the Internal Programmer, or Information System Specialist, the Controller, or simply the one who’s job it is to program the system. Within the internal computer, grids and "clone" grids (or duplicators) house the different programs. Visualize a piece of graph paper (grids) with the space within each square having several programs within it. "Clones" are back-ups, so that if an entire grid, or even one program, is neutralized (deprogrammed), a replacement is spontaneously generated. Thus, it is vital that the duplicators be dealt with as programs are erased or decoded.
Within a complete system, there are usually many levels and combinations of programs. The victim most likely will have no knowledge of their internal programmer because as programming commences, erasure codes, block codes, stop codes, and "brain switch" commands (having to do with right/left hemisphere functioning) have been put in to prohibit disclosure of deeply buried information about the internal computer. On each level, there most likely will be a computer and a back-up computer. As communication between personalities and levels increases, it is possible to obtain the different codes from controllers inside the system on each level so that "deprogramming" using codes (such as number, alphabet or rhyme codes) can occur. This can be very dangerous, however, because there are booby traps and safeguards within the system that are programmed in to prevent any outside source from getting into the system.
It helps to think of the programming as a very sophisticated Nintendo game, where there are many levels, secrets, and hazards. It is vital to proceed with caution, and with the full cooperation of the client, as only they can know where the dangers lie. Understand that as you get close to secret or hidden information that will help you move deeper into the system, the danger of internal or external harm to the client increases. Suicide programming will often be set off, and should be expected.
Survivors report that programmers place "Gatekeepers" and "Blockers" in the system to protect hidden information, often by keeping you from reaching the inside people who can help decode the system. These must be found and removed in order to proceed with therapy. They may be identified by direct questioning, or they may appear as "guards" in the internal landscape, standing by a door or wall, or literally in front of a gate or other physical barrier. Some of these gatekeepers and blockers may be personalities or they may be perceived as "spirits". This is especially true with individuals who may have been abused by groups purporting to worship Satan. (For a Biblical understanding of the role of gatekeepers who block the "doorway", See John 10). The use of imagery to bind or enclose the gatekeepers is often useful.
If the gatekeepers see themselves as spirits, they can be particularly difficult. They may present as individuals who are just "passing through" the body, and are not afraid of harm to the body because they will just" go to the next body." Sometimes they present as very aggressive; at times these aggressive ones may be personalities who are projecting themselves as spirits because of their deep guilt; identifying with the "evil" spirit is a way of gaining mastery and control, and should be dealt with in typical therapeutic fashion. If your therapy includes knowledge of and use of spiritual information and imagery, this would be a good place to use it.
Some of the booby traps you may run across include personalities whose job it is to direct you off course and provide false information. Others may ask you questions or try to get you to ask them questions (making you think you’re getting somewhere) only to find that what they are doing is setting a suicide or self-mutilation program in motion. An example is a client who, when she heard the phrase, "Why did the chicken cross the street?" would self-destruct. Another asked the therapist, "How old are you?" (response) "When’s your birthday?", etc., and the answers were triggers for the internal self-destruct program. The personality asking the questions had no knowledge of why she was asking them, only that she "had to".
Many MPD patients report having a "stairwell system" internally. The stairwells are what connect the different levels. Sometimes the internal people will locate a stairwell that is sealed up, and a gatekeeper is there. Deal with the gatekeeper, break the seal, and proceed down to the next level.
As you proceed through the levels, you may find that at the first couple of levels, you will get much flooding and spinning. The programs you may be dealing with are the "Tornado" or "Whirlwind" programs. The tornadoes function to create confusion and disorganization and a sense of being lost, being out of control. Tornadoes float around the different systems. Visual imagery of walls around the tornadoes to enclose them has often been useful. The "whirlwind" spins inward, "sucking one in" instead of outward; the result is to create a sensation of shutting down, shutting up, and feeling as if the person is going to die.
The various systems that have been reported and worked by these authors include differing levels of complexity. Systems include: Spider Web, Carousel, Pool of Death, Communication, Kabbala, Puppet, Pentagram, Tornado, Castle, Galaxy, Flower, Scrabble, and Umbrella systems. Associated with "military" mind control programming are: Double Helix, Solometric, Cave and Well, and the Mensa systems. Space limitations prevent discussion of each of these systems, but illustrations of the difficulties in working with some of these systems follow.
The Pentagram (or star) system is often connected to the Tornado system. Rituals are tied to this system. There are many cult-created alters within this system. You may see personalities who are re-enacting rituals (such as attempting to kill the host’s cat, etc.) Traumatic memories reveal Satanic ritual abuse themes.
The Castle system involves internal imagery of a castle containing a drawbridge, moat, turrets, gargoyles, dungeon, secret passageways, torture chamber, and lots of rooms. Child alters are often hidden in the dungeon. Lots of programs can be contained within the castle, and many booby traps can be present that must be overcome.
The Spider Web system is very complex. Communication between personalities proceeds through the strands. In order to break the negative communication, the strands must be broken, but understand that the internal self-helpers often also must communicate through the strands. You will often find a black widow spider (symbolic of the "black widows" used by Satanists to recruit new members, especially in churches and in clubs where youth congregates) with victims getting "stuck" in the web. Viper is a spirit associated with this system (see Isaiah 59:5 for the Biblical basis of this system). Gatekeepers are present; you may also find eggs, personalities names "Viper" or "Devourer" or those who binge and purge. In order to break this program, it is important to break the connectors (the silk strands) that connect the webs and hold them in place; remember to destroy the clone strands so new webs can’t be spun. In this program, the clones immediately spin new webs that are double connected and more difficult to remove. If the "viper" is present, the tail and fangs can be removed (they contain poison) and the poison in the eggs can be removed (trapped personalities as well as "demons" are often found in the eggs).
The Flower system involves criss-cross programming, i.e., three or four people may have been programmed together so that one person only has a piece of the programming. In order to get to that piece, you must have access to the other piece which resides in another person. Internally, the flower system may show up as flowers with lots of colors, with the bud representing one person, the stem and flower representing other people. This system is often connected to other systems such as Pi, Umbrella, Triangle and Star.
The Mensa system (reportedly involving military and Illuminati programming) involves lots of numbers and sequences along with bar codes and union force codes. Union force would have to do with a set of numbers that would equal another set to come up with yet another set: e.g., a+b=c, b+c=a, c+b=a. A person could be programmed to respond to this very complex code. These codes are extremely difficult to discover in order to neutralize responses to the codes. The Mensa system will often have the Double Helix system within it. This system is connected with DNA; the patient has usually had lots of blood transfusions. Programming reportedly has been done through medical abuse by hospitals and doctors. Hospitalization is generally required to work with this system, as it is so complex and so may suicide programs are involved.
The Carousel is usually found in the center of the Double Helix. Within the carousel there are mirrors and a shadow system. There is a key in the center of the carousel. The carousel spins and moves up and down repeatedly. The function of this program is to add confusion and avoidance. The mirrors and shadows are within the carousel which help prevent further deprogramming. Often the use of special light to light up the right path through the mirrors and shadows in order to reach the key has been helpful. Spiritual Interventions can be helpful here, as three "floating spirits" (False Prophet, Hoofed One, and Dragon) are frequently found in this program.
The Scrabble system contains letters, numbers, and mathematical exponents. This is a very detailed system, with no room for error. A sequence of numbers or letters might set off this programming. For example, if the therapist writes a series of numbers such as "31133113", "13113311", or "11331313", and the patient responds to one or all of these series of numbers, you may have the Scrabble system. There is a lot of torture and trauma associated with this program because it is so sophisticated and difficult to learn. As programming proceeds, any mistakes made by the survivor will be severely punished.

No comments:

Post a Comment