As satanic as efficient. As secret as powerful. As ugly as the NWO – can get. Illuminati CIA mind control. Commonly known as MK-Ultra, which it is part of, or more specifically: Project Monarch. From the Book of the Dead to DNA Double Helix programming. From Hell to Hell.
Deutsche Version / German Version
I am not writing about my personal experience, I am writing about a NWO technique called mind programming. While constant mass mind programming in the form of propaganda, subliminal attacks and (covert) technology abounds, this article is about a more specific kind of programming of the mind.
Warning:
Some content of this article may trigger. If this article has an uncomfortable effect on you, you may have undergone Monarch programming. Please read with care.

The Book of Dead
One of the earliest writings giving reference to occultism is the Egyptian Book of the Dead, a compilation of rituals explicitly describing methods of torture and intimidation (to create trauma), the use of potions (drugs) and the casting of spells (hypnotism), ultimately resulting in the total enslavement of the initiate. These have been the main ingredients for a part of occultism known as Satanism, throughout the ages.
MKUltra, MIND SPACE APOCALYPSE
This brain technique with surprisingly ancient roots, further developed with kind assistance of nazi ‘doctors’ flown via paperclip into CIA, is based on departementalisation induced via severe trauma.
One of the earliest writings giving reference to occultism is the Egyptian Book of the Dead, a compilation of rituals explicitly describing methods of torture and intimidation (to create trauma), the use of potions (drugs) and the casting of spells (hypnotism), ultimately resulting in the total enslavement of the initiate.
In 1976, an whistleblower and victim of MK-Ultra mind programming published the book ‘The Control of Candy Jones’.
In 1976 a book by Donald Bain titled “The Control of Candy Jones” was published by Playboy Press. This one-of-a-kind book is the story Candy Jones, who was America’s leading cover girl during the forties and fifties. In 1960 Jones fell on hard times and agreed to act as a courier for the CIA. An excellent subject for hypnosis, Jones became the plaything of a CIA psychiatrist who used her to exhibit his mastery of mind-control techniques. This psychiatrist used hypnosis and drugs to develop a second personality within Jones over a period of 12 years. This second personality took the form of a courier who could be triggered by telephone with particular sounds, and after the mission was completed and the normal personality resumed, did not remember anything. These missions were elaborate, and frequently involved world travel to deliver messages. According to the book, Jones and other victims were once even subjected to torture at a seminar at CIA headquarters, as a means of demonstrating this psychiatrist’s control over his subjects.
NameBase NewsLine

After marrying a radio talk-show host and amateur hypnotist, her trauma induced and Illuminati programmed second personality emerged.
Jones married New York radio talk-show host Long John Nebel in 1972. An amateur hypnotist, Nebel stumbled onto her secret personality, and began unravelling the story over many subsequent sessions. Author Donald Bain, a family friend, was invited to reconstruct the story from more than 200 hours of taped sessions between Jones and Nebel. Various researchers have confirmed some pieces of the story, but Bain did not name the major CIA psychiatrist involved, nor did he name a second psychiatrist who Martin Cannon recently identified this second psychiatrist as the late William Kroger, who was an associate of Louis West, Martin Orne, and another MKULTRA veteran, H.J. Eysenck.
NameBase NewsLine
While MKUltra is a proven program – as in multitude of projects – by CIA after some previously secret records have been released – most information has been successfully destroyed during multiple elaborate operations MKUltra, and specifically mind programming, is one of the most potent, ugly and dangerous ‘weapons’ of NWO against humanity.
Whatever the truth is behind Candy Jones — and it’s difficult to see the book as an elaborate hoax — there’s no question that hypnotist George Estabrooks raised issues that the CIA took seriously in secret research for at least 25 years. The MKULTRA implementing documents specified that “additional avenues to the control of human behavior” were to include “radiation, electroshock, various fields of psychology, sociology, and anthropology, graphology, harassment substances, and paramilitary devices and materials.” The word “radiation” gave the Advisory Committee on Human Radiation Experiments a reason to request a search of records on human experimentation from the CIA. Their final report, released last October, expressed dissatisfaction with the CIA’s response, and recommended that the CIA get their act together so that legitimate requests can be accommo-dated better in the future. One problem is the compartmentation of the CIA’s record-keeping systems. Another is that the CIA immediately decided that the Committee’s purview was restricted only to ionizing radiation — the type of radiation of interest in nuclear testing, as opposed to the electromagnetic and sound waves that might be used for mind control. Finally, those documents that the CIA did release were heavily redacted. The Committee noted that they had “received numerous queries about MKULTRA and the other related programs from scholars, journalists, and citizens who have been unable to review the complete record.” In fact, most of the MKULTRA records were destroyed in 1973 by the order of Richard Helms, who waived an internal CIA regulation to do so. It was also the practice of MKULTRA to maintain as few records as possible. If ESP, waves, implants, satanic ritual abuse and post-hypnotic robots aren’t sufficient, recently the subject of mind control has been of the credibility enjoyed by victims of alien abduction, researcher Julianne McKinney promotes the view that the entire UFO phenomenon was created by the secret state. A more thorough researcher, Martin Cannon, also promotes this view. In a long monograph titled “The Controllers,” he explains the UFO phenomenon as a “screen memory” cover story induced by U.S. intelligence to protect their own mind-control experiments.
NameBase NewsLine

Project monarch
Project MONARCH could be best described as a form of structured dissociation and occultic integration, in order to compartmentalize the mind into multiple personalities within a systematic framework.
During this process, a Satanic ritual, usually including Cabalistic mysticism, is performed with the purpose of attaching a particular demon or group of demons to the corresponding alter(s).
Of course, most skeptics would view this as simply a means to enhance trauma within the victim.negating any irrational belief that demonic possession actually occurs.
Another way of examining this convoluted victimization of body and soul is by looking at it as a complex computer program: A file (alter) is created through trauma, repetition and reinforcement. In order to activate (trigger) the file, a specific access code or password (cue or command) is required.
Trance Bambi
The victim/survivor is called a “slave” by the programmer/handler, who in turn is perceived as “master” or “god.”

Disney movies and cartoons are used in a twofold manner: desensitizing the majority of the population, using subliminals and neuro-linguistic programming, and deliberately constructing specific triggers and keys for base programming of highly-impressionable MONARCH children.
In Illuminati Structured MPD Systems, the willow tree represents the occultic powers of Druidism.

The intrinsic imagery of the tree’s branches, leaves and root systems are very significant.
Witchcraft ritual abuse seeks to “attach” evil entities (spirits of abusers and demons) to dissociated identities to harass and control victims for their entire lives. Claims, curses, covenants, hexes, vexes, etc. are used to forever malevolently define victims as evil, physically or mentally ill, socially devalued and isolated, sexually enslaved, a murderer, a cult member, a witch.
Mental health and law enforcement professionals working with severe trauma are increasingly seeing victims of torture for the purpose of installation of more covert mind control, that is, mind control that was “installed” in a deeply dissociated (without conscious awareness) state, and controls the person from these unconscious, dissociated, states of mind
see Boyd, 1991; Coleman, 1994; Hersha, Hersha, Griffis, & Schwarz, 2001; Katchen & Sakheim, 1992; Keith, 1998; Marks, 1979; Neswald & Gould, 1993; Neswald, Gould, & Graham-Costain, 1991; Noblitt & Perskin, 2000; Oksana, 2001; Ross, 2000; Ryder, 1992; Rutz, 2001; Sheflin & Opton, 1978; Smith, 1993; Weinstein, 1990

Dissociative identity disorder (DID), previously known as multiple personality disorder (MPD), is a mental disorder characterized by the maintenance of at least two distinct and relatively enduring personality states. This is accompanied by memory gaps beyond what would be explained by ordinary forgetfulness (Wikipedia)
Trauma-based mind control programming can be defined as systematic torture that blocks the victim’s capacity for conscious processing (through pain, terror, drugs, illusion, sensory deprivation, sensory over-stimulation, oxygen deprivation, cold, heat, spinning, brain stimulation, and often, near-death), and then employs suggestion and/or classical and operant conditioning (consistent with well-established behavioral modification principles) to implant thoughts, directives, and perceptions in the unconscious mind, often in newly-formed trauma-induced dissociated identities, that force the victim to do, feel, think, or perceive things for the purposes of the programmer.
Installed program (examples: ‘Double Helix’,’Carousel’) “triggers”, “cues”, and “access codes” allow the programmer easy access to programmed personalities and program structures to install or change commands, messages, and information, and to retrieve information, all out of victims’ conscious awareness.
Survivors of ritual abuse who re-associate their history of abuse usual begin to recover their memories of abuse from between 30 and 50 years of age. It is generally many years more before the survivor becomes aware of mind control programming and its ongoing effects on her or him.
Unconscious personalities perceive themselves as trapped within, or attached to, these structures, both visually (in internal imagery), and somatically (in experiences of pain, suffocation, electroshock, etc.).
Structures are installed in early childhood, generally between 2 and 5 years of age. Torture and drugs are applied beyond the endurance of all of the already-formed personalities, which usually requires that the child be taken near death. The intent is to bury all memory for the event deeply in the unconscious mind, below the level of consciousness of all personalities.

One of the main internal structures, (of which there are many) within the system is shaped like a double-helix, consisting of seven levels. Each system has an internal programmer which oversees the “gatekeeper” (demons?) who grant or deny entry into the different rooms.
A few of the internal images predominantly seen by victims/survivors are are detailed below.
Some Code
As one would expect, mind programing code relates heavily on common principles employed by NWO related entities:
- trees
- the Cabalistic “Tree of Life,” with adjoining root systems
- infinity loops
- ancient symbols and letters
- spider webs
- mirrors or glass shattering
- masks
- castles
- mazes
- demons/monsters/aliens
- sea shells
- butterflies
- snakes
- ribbons
- bows
- flowers
- hour glasses
- clocks
- robots
- chain-of-command diagrams
- schematics of computer circuitry boards

In order to keep MKULTRA from being easily detected, the CIA segmented its sub-projects into specialized fields of research and development at universities, prisons, private laboratories and hospitals. Of course, they were rewarded generously with government grants and miscellaneous funding.
Next. Cathy O’Brian.
My name is Cathleen (Cathy) Ann O’Brien, born l2l4l57 in Muskegon, Michelin. I have prepared this book for your review and edification concerning a little known tool that “our” United States Government is covertly, illegally, and unconstitutionally using to implement the New World Orper_ (One World Government). This well documented tool is a sophisticated and advanced form of behaviour modification (brainwashing) most commonly known as MIND CONTROL. My first hand knowledge of this TOP SECRET U.S. Government Psychological Warfare technique is drawn from my personal experience as a White House “Presidential Model’ mind-control slave. Much of the information enclosed herein has been corroborated and validated through brave and courageous “clean” members of the law enforcement, scientific, and IntelligenCe communities familiar with this case. These individuals’ efforts helped me to understand and corroborate what happened after a lifetime of systematic physical and psychological torture orchestrated to modify my behaviour through totally controlling my.mind. Some of these courageous individuals are employed by the very system that controlled me and live in fear of losing their jobs; their families, or their lives. They have gone as far as they dare towards publicly exposing this tool of the^engineers of Ihe New World Order–to no avail.
TranceFormation of America, Cathy O’Brien, 1995
Cathy O’Briens introduction to her book is intriguing. Another knowledgeable source concerning mind programming are Cisco Wheeler and Fritz Springmeier:
The Carousel in real life is used as a device to teach dissociation, and how the alters are to go up and down in trance. Sometimes you will see parents who seem to be so loving having their children ride for long periods on a carousel. They might actually be programming them in dissociation. An internal carousel is built into an internal system. Mirrors and shadows are placed around and perhaps in it. The carousel spins and moves up and down repeatedly. In the center of the carousel, the Programmers often place something or someone important. They will often put this at the bottom of the DNA double helix and have the double helix elevator shaft coming up the center of the carousel. The carousel’s bottom side will set on top of the system’s switching mechanism. And the core will sometimes be placed in the center of the carousel somewhat underneath it. The switching mechanism is the main control for turning the system (the Grandfather clock so to speak.) The carousel may have umbrella programming immediately on top of it. (This could be Illuminati Delta alters, which can be one of the deepest things put in.) The carousel must be approached from the back side. At times an internal key, which often looks like an old key is needed to enter the Carousel. Many Illuminati systems are given a key or set of keys, and at times when they enter therapy the front alters give this to their therapist not knowing what the key is, but knowing it is important. The co-authors believe that these keys are carousel keys. A false trinity will be assigned to guard this, which will consist of the False Prophet, The Beast or Dragon, and the Hoofed One. The false prophet and the Beast (dragon) come out of the book of Revelations. The Hoofed One is a rare occult term for Satan, not to be confused with the popular usage of the Horned One in the occult. The two terms are different. If several carousels are built into a system, then they will have other guards than the false trinity. In many Illuminati systems, there are 13 silent splits made from the core called silences, and at this time during the splitting process guards are made to the Carousel/core.
Carousel
The Illuminati Formula Used to Create an
Undetectable
Total Mind Controlled Slave
Cisco Wheeler and Fritz Springmeier

A personal note
For personal reasons, one could only phantom what those reasons might be, I became particularly interested in the – as I have been told at 14 by somebody who said ‘I am from the real Illuminati’ – ‘spiritual’ program with the name ‘Double Helix’.
As can be noted from the ‘Carousel’ program summary above, the double helix is a central construct of other programs too.
The double helix pattern is used as an elevator shaft running up and down the worlds created for the alters. In general, each world lays at a trance level. The double-helix is put in at programming sites where they have full medical facilities, such as Letterman Hospital, Presideo, CA. The codes up and down the elevator are alpha-numeric with lots of numbers. Because the way the double helix shape twists, one can ride the elevator and get off a level 1, 3, 5, 7, 9 but you have to ride it the other way to get off at 2, 4, 6, 8, 10, 12. Because the double helix is the centerpiece of how the different physiological states of the mind are being layered, taking the victim down to these different physiological states and levels is very risky and by the time it is through it involves lots of blood transfusions for the victim. The Caduceus is a double helix with snakes at the top. The Caduceus is an occult symbol used in ancient Babylon, ancient Hindu India, and by Chinese occultists. Mercury in occult lore carries a staff called a caduceus. Mercury’s staff is a cabalistic symbol. William Heller’s book on the Kabbalah on page 78 states, “Mercury’s staff, called Caduceus, and made of intertwined black-and-white twin serpents, heralds more forthcoming splits into duality. Once again, it reflects the ambivalent mind, its conscious, and subconscious states, its waking thoughts and imaginative dreams.” So according to cabalistic doctrine, the caduceus represents the various states of the mind.
Double Helix
The Illuminati Formula Used to Create an
Undetectable
Total Mind Controlled Slave
Cisco Wheeler and Fritz Springmeier
Magic Information Technology
I have been often astonished by the connection between Unix operating system terms and CIA mind programming ones.
Terms like daemon, trigger, core, alter, shell, level are common to both Unix/Linux and Monarch.
daemon
Merriam-Webster Dictionary
an evil spirit, a source or agent of evil, harm, distress or ruin
mythology : a supernatural being whose nature is intermediate between that of a god and that of a human being
daemon : a software program or process that runs in the background
My earliest experience in computer science – which by disfortune is also the connection to MK-Ultra – was with Cobol. Cobol? What a name.
A team drawn from several computer manufacturers and the Pentagon develop COBOL—an acronym for Common Business-Oriented Language. Many of its specifications borrow heavily from the earlier FLOW-MATIC language. Designed for business use, early COBOL efforts aimed for easy readability of computer programs and as much machine independence as possible. Designers hoped a COBOL program would run on any computer for which a compiler existed with only minimal modifications. Howard Bromberg, an impatient member of the committee in charge of creating COBOL, had this tombstone made out of fear that the language had no future. However, COBOL survives to this day. A study in 1997 estimated that over 200 billion lines of COBOL code was still in existence, accounting for 80% of all business software code.
Cobol (1960), Timeline of Computer History, CHM
While Cobol survives (well) until today, a new operating system was born only 9 years later. For people in the know, the basis for the internet, embedded devices, the IOT, whatever important in IT is still UNIX – full of daemons, triggers, cores, alters, shells, levels.
AT&T Bell Labs programmers Kenneth Thompson and Dennis Ritchie develop the UNIX operating system on a spare DEC minicomputer. UNIX combined many of the timesharing and file management features offered by Multics, from which it took its name. (Multics, a project of the mid-1960s, represented one of the earliest efforts at creating a multi-user, multi-tasking operating system.) The UNIX operating system quickly secured a wide following, particularly among engineers and scientists, and today is the basis of much of our world’s computing infrastructure.
Unix (1969), Timeline of Computer History, CHM
From Cobol to Unix. And its open source variant, Linux.
The fact is that most people today are using Linux without ever knowing it — whether on their phones, online when using Google, Facebook, Twitter, GPS devices, and maybe even in their cars, or when using cloud storage for personal or business use. While the presence of Linux on all of these systems may go largely unnoticed by consumers, the role that Linux plays in this market is a sign of how critical it has become.
Linux behind the scenes, Sandra Henry-Stocker
13 pillars of 666
The H-Root Server (H.ROOT-SERVERS.NET ) is operated by the U.S. Army Research Laboratory (ARL), formerly known as the Ballistics Research Laboratory (BRL), which has a long history of being a leader in the computing and networking arenas. BRL was the home of the world’s first electronic digital computer, ENIAC, and one of the first 50 sites to have a web server on the Internet. Many BRL/ARL researchers were involved in the early development of UNIX, the Internet and TCP/IP protocols (including the DNS). RSSAC023 24 BRL was one of the first and one of the most well connected nodes on the ARPANET/MILNET in the late 1970s and early 1980s. As such, BRL volunteered to host one of the original root servers – both to assist in the further development of the DNS and to provide a root server for the MILNET in the event that MILNET had to be disconnected from the Internet. Currently, ARL is home to one of the world’s largest supercomputing facilities and resides on the high-speed Defense Research and Engineering Network (DREN), which ARL scientists helped design. To this day, ARL continues to operate a root name server as a service to the Internet community.
History of the Root Server System, ICANN
There are 13 root DNS servers globally. Without them, there is no internet. 13 – UNIX and Linux powered – pillars as the core of a system that Hebrews could translate as 666 – the world wide web, the spiderweb.

In Hebrew, the language of the kabbalah, the world wide web is 666. And web associates to spider. And spider? Google? And the flies. Are we collectively the flies? Interesting.
Not an answer – but interesting. The connection between technology and black magic is neither to apparent nor do I have watertight proof. But it is intriguing and plausible.
And wasn’t spiderweb a symbolism used in CIA Illuminati mind programming?
Satan inside
With artificial intelligence we are summoning the demon. You know all those stories where there’s the guy with the pentagram and the holy water and he is like… yeah sure he can control the demon.. doesn’t work out.
Elon Musk, MIT 2014
In essence, CIA MK-Ultra aka Illuminati mind programming tech is satanic at its core. The nice ‘present’ one gets from it is helpers of satan trying to f*** around with ones mind.

And as one quickly understands after little research the NWO is of Luciferian belief – and Lucifer is:
Name for the Devil, the more common meaning in English, “Lucifer” is the rendering of the Hebrew word הֵילֵל (transliteration: hêylêl; pronunciation: hay-lale)[2] in Isaiah (Isaiah 14:12) given in the King James Version of the Bible. The translators of this version took the word from the Latin Vulgate, which translated הֵילֵל by the Latin word lucifer (uncapitalized), meaning “the morning star, the planet Venus”, or, as an adjective, “light-bringing”. As a name for the planet in its morning aspect, “Lucifer” (Light-Bringer) is a proper name and is capitalized in English. In Greco-Roman civilization, it was often personified and considered a god and in some versions considered a son of Aurora (the Dawn). A similar name used by the Roman poet Catullus for the planet in its evening aspect is “Noctifer” (Night-Bringer).
Lucifer, Wikipedia
The Night Bringer. Behind the NWO, in this construct of pyramids in pyramids is thought to be an entity called Illuminati. The most widespread execution group is thought to be with the high level (33rd secret degree and up) masonic entities.

There is a hidden OS in all newer Intel chips
The common factor of above are their heavy reliance on techniques like numbers, symbols, mental structures. All based on black magic principles.
Mind programming is occult technology. And information technology?

Is there a connection between technology and alchemy, between operating systems and mind programming, between computer chips and dark symbolism? Are the internet of things, robots and virtual reality opening a link to what the al-Qorʾān calls djinns? Does hardware have a soul?
We’ll Be Lucky If They Enslave Us as Pets
Elon Musk on Superintelligent Robots