Print Friendly, PDF & Email

As satanic as efficient. As secret as powerful. As ugly as the NWO – can get. Illuminati CIA mind control. Commonly known as MK-Ultra, which it is part of, or more specifically: Project Monarch. From the Book of the Dead to DNA Double Helix programming. From Hell to Hell.

Deutsche Version / German Version

I am not writing about my personal experience, I am writing about a NWO technique called mind programming. While constant mass mind programming in the form of propaganda, subliminal attacks and (covert) technology abounds, this article is about a more specific kind of programming of the mind.

Some content of this article may trigger. If this article has an uncomfortable effect on you, you may have undergone Monarch programming. Please read with care.

The Book of Dead

One of the earliest writings giving reference to occultism is the Egyptian Book of the Dead, a compilation of rituals explicitly describing methods of torture and intimidation (to create trauma), the use of potions (drugs) and the casting of spells (hypnotism), ultimately resulting in the total enslavement of the initiate. These have been the main ingredients for a part of occultism known as Satanism, throughout the ages.


This brain technique with surprisingly ancient roots, further developed with kind assistance of nazi ‘doctors’ flown via paperclip into CIA, is based on departementalisation induced via severe trauma.

One of the earliest writings giving reference to occultism is the Egyptian Book of the Dead, a compilation of rituals explicitly describing methods of torture and intimidation (to create trauma), the use of potions (drugs) and the casting of spells (hypnotism), ultimately resulting in the total enslavement of the initiate.

In 1976, an whistleblower and victim of MK-Ultra mind programming published the book ‘The Control of Candy Jones’.

In 1976 a book by Donald Bain titled “The Control of Candy Jones” was published by Playboy Press. This one-of-a-kind book is the story Candy Jones, who was America’s leading cover girl during the forties and fifties. In 1960 Jones fell on hard times and agreed to act as a courier for the CIA. An excellent subject for hypnosis, Jones became the plaything of a CIA psychiatrist who used her to exhibit his mastery of mind-control techniques. This psychiatrist used hypnosis and drugs to develop a second personality within Jones over a period of 12 years. This second personality took the form of a courier who could be triggered by telephone with particular sounds, and after the mission was completed and the normal personality resumed, did not remember anything. These missions were elaborate, and frequently involved world travel to deliver messages. According to the book, Jones and other victims were once even subjected to torture at a seminar at CIA headquarters, as a means of demonstrating this psychiatrist’s control over his subjects.

NameBase NewsLine
The Manchurian Candidate, 1962

After marrying a radio talk-show host and amateur hypnotist, her trauma induced and Illuminati programmed second personality emerged.

Jones married New York radio talk-show host Long John Nebel in 1972. An amateur hypnotist, Nebel stumbled onto her secret personality, and began unravelling the story over many subsequent sessions. Author Donald Bain, a family friend, was invited to reconstruct the story from more than 200 hours of taped sessions between Jones and Nebel. Various researchers have confirmed some pieces of the story, but Bain did not name the major CIA psychiatrist involved, nor did he name a second psychiatrist who Martin Cannon recently identified this second psychiatrist as the late William Kroger, who was an associate of Louis West, Martin Orne, and another MKULTRA veteran, H.J. Eysenck.

NameBase NewsLine

While MKUltra is a proven program – as in multitude of projects – by CIA after some previously secret records have been released – most information has been successfully destroyed during multiple elaborate operations MKUltra, and specifically mind programming, is one of the most potent, ugly and dangerous ‘weapons’ of NWO against humanity.

Whatever the truth is behind Candy Jones — and it’s difficult to see the book as an elaborate hoax — there’s no question that hypnotist George Estabrooks raised issues that the CIA took seriously in secret research for at least 25 years. The MKULTRA implementing documents specified that “additional avenues to the control of human behavior” were to include “radiation, electroshock, various fields of psychology, sociology, and anthropology, graphology, harassment substances, and paramilitary devices and materials.” The word “radiation” gave the Advisory Committee on Human Radiation Experiments a reason to request a search of records on human experimentation from the CIA. Their final report, released last October, expressed dissatisfaction with the CIA’s response, and recommended that the CIA get their act together so that legitimate requests can be accommo-dated better in the future. One problem is the compartmentation of the CIA’s record-keeping systems. Another is that the CIA immediately decided that the Committee’s purview was restricted only to ionizing radiation — the type of radiation of interest in nuclear testing, as opposed to the electromagnetic and sound waves that might be used for mind control. Finally, those documents that the CIA did release were heavily redacted. The Committee noted that they had “received numerous queries about MKULTRA and the other related programs from scholars, journalists, and citizens who have been unable to review the complete record.” In fact, most of the MKULTRA records were destroyed in 1973 by the order of Richard Helms, who waived an internal CIA regulation to do so. It was also the practice of MKULTRA to maintain as few records as possible. If ESP, waves, implants, satanic ritual abuse and post-hypnotic robots aren’t sufficient, recently the subject of mind control has been of the credibility enjoyed by victims of alien abduction, researcher Julianne McKinney promotes the view that the entire UFO phenomenon was created by the secret state. A more thorough researcher, Martin Cannon, also promotes this view. In a long monograph titled “The Controllers,” he explains the UFO phenomenon as a “screen memory” cover story induced by U.S. intelligence to protect their own mind-control experiments.

NameBase NewsLine
Monarch – a powerful Illuminati symbol

Project monarch

Project MONARCH could be best described as a form of structured dissociation and occultic integration, in order to compartmentalize the mind into multiple personalities within a systematic framework.

During this process, a Satanic ritual, usually including Cabalistic mysticism, is performed with the purpose of attaching a particular demon or group of demons to the corresponding alter(s).

Of course, most skeptics would view this as simply a means to enhance trauma within the victim.negating any irrational belief that demonic possession actually occurs. 

Another way of examining this convoluted victimization of body and soul is by looking at it as a complex computer program: A file (alter) is created through trauma, repetition and reinforcement. In order to activate (trigger) the file, a specific access code or password (cue or command) is required.

Trance Bambi

The victim/survivor is called a “slave” by the programmer/handler, who in turn is perceived as “master” or “god.” 

A trigger to me. Bambi.

Disney movies and cartoons are used in a twofold manner: desensitizing the majority of the population, using subliminals and neuro-linguistic programming, and deliberately constructing specific triggers and keys for base programming of highly-impressionable MONARCH children
In Illuminati Structured MPD Systems, the willow tree represents the occultic powers of Druidism.

Druistic willow tree

The intrinsic imagery of the tree’s branches, leaves and root systems are very significant.

Witchcraft ritual abuse seeks to “attach” evil entities (spirits of abusers and demons) to dissociated identities to harass and control victims for their entire lives. Claims, curses, covenants, hexes, vexes, etc. are used to forever malevolently define victims as evil, physically or mentally ill, socially devalued and isolated, sexually enslaved, a murderer, a cult member, a witch.

Mental health and law enforcement professionals working with severe trauma are increasingly seeing victims of torture for the purpose of installation of more covert mind control, that is, mind control that was “installed” in a deeply dissociated (without conscious awareness) state, and controls the person from these unconscious, dissociated, states of mind

see Boyd, 1991; Coleman, 1994; Hersha, Hersha, Griffis, & Schwarz, 2001; Katchen & Sakheim, 1992; Keith, 1998; Marks, 1979; Neswald & Gould, 1993; Neswald, Gould, & Graham-Costain, 1991; Noblitt & Perskin, 2000; Oksana, 2001; Ross, 2000; Ryder, 1992; Rutz, 2001; Sheflin & Opton, 1978; Smith, 1993; Weinstein, 1990
Mukti Alamsyah
Dissociative identity disorder (DID), previously known as multiple personality disorder (MPD), is a mental disorder characterized by the maintenance of at least two distinct and relatively enduring personality states. This is accompanied by memory gaps beyond what would be explained by ordinary forgetfulness (Wikipedia)

Trauma-based mind control programming can be defined as systematic torture that blocks the victim’s capacity for conscious processing (through pain, terror, drugs, illusion, sensory deprivation, sensory over-stimulation, oxygen deprivation, cold, heat, spinning, brain stimulation, and often, near-death), and then employs suggestion and/or classical and operant conditioning (consistent with well-established behavioral modification principles) to implant thoughts, directives, and perceptions in the unconscious mind, often in newly-formed trauma-induced dissociated identities, that force the victim to do, feel, think, or perceive things for the purposes of the programmer.

Installed program (examples: ‘Double Helix’,’Carousel’) “triggers”, “cues”, and “access codes” allow the programmer easy access to programmed personalities and program structures to install or change commands, messages, and information, and to retrieve information, all out of victims’ conscious awareness.

Survivors of ritual abuse who re-associate their history of abuse usual begin to recover their memories of abuse from between 30 and 50 years of age. It is generally many years more before the survivor becomes aware of mind control programming and its ongoing effects on her or him.

Unconscious personalities perceive themselves as trapped within, or attached to, these structures, both visually (in internal imagery), and somatically (in experiences of pain, suffocation, electroshock, etc.).

Structures are installed in early childhood, generally between 2 and 5 years of age. Torture and drugs are applied beyond the endurance of all of the already-formed personalities, which usually requires that the child be taken near death. The intent is to bury all memory for the event deeply in the unconscious mind, below the level of consciousness of all personalities

Mass hypnosis and brain conditioning. Both researched by Nazis and perfectionned by CIA.

One of the main internal structures, (of which there are many) within the system is shaped like a double-helix, consisting of seven levels. Each system has an internal programmer which oversees the “gatekeeper” (demons?) who grant or deny entry into the different rooms.

A few of the internal images predominantly seen by victims/survivors are are detailed below.

Some Code

As one would expect, mind programing code relates heavily on common principles employed by NWO related entities:

  • trees
  • the Cabalistic “Tree of Life,” with adjoining root systems
  • infinity loops
  • ancient symbols and letters
  • spider webs
  • mirrors or glass shattering
  • masks
  • castles
  • mazes
  • demons/monsters/aliens
  • sea shells
  • butterflies
  • snakes
  • ribbons
  • bows
  • flowers
  • hour glasses
  • clocks
  • robots
  • chain-of-command diagrams
  • schematics of computer circuitry boards

BIOS chip on MVS MV-1AX – pentagram inside

In order to keep MKULTRA from being easily detected, the CIA segmented its sub-projects into specialized fields of research and development at universities, prisons, private laboratories and hospitals. Of course, they were rewarded generously with government grants and miscellaneous funding.

Next. Cathy O’Brian.

My name is Cathleen (Cathy) Ann O’Brien, born l2l4l57 in Muskegon, Michelin. I have prepared this book for your review and edification concerning a little known tool that “our” United States Government is covertly, illegally, and unconstitutionally using to implement the New World Orper_ (One World Government). This well documented tool is a sophisticated and advanced form of behaviour modification (brainwashing) most commonly known as MIND CONTROL. My first hand knowledge of this TOP SECRET U.S. Government Psychological Warfare technique is drawn from my personal experience as a White House “Presidential Model’ mind-control slave. Much of the information enclosed herein has been corroborated and validated through brave and courageous “clean” members of the law enforcement, scientific, and IntelligenCe communities familiar with this case. These individuals’ efforts helped me to understand and corroborate what happened after a lifetime of systematic physical and psychological torture orchestrated to modify my behaviour through totally controlling my.mind. Some of these courageous individuals are employed by the very system that controlled me and live in fear of losing their jobs; their families, or their lives. They have gone as far as they dare towards publicly exposing this tool of the^engineers of Ihe New World Order–to no avail.

TranceFormation of America, Cathy O’Brien, 1995

Cathy O’Briens introduction to her book is intriguing. Another knowledgeable source concerning mind programming are Cisco Wheeler and Fritz Springmeier:

The Carousel in real life is used as a device to teach dissociation, and how the alters are to go up and down in trance. Sometimes you will see parents who seem to be so loving having their children ride for long periods on a carousel. They might actually be programming them in dissociation. An internal carousel is built into an internal system. Mirrors and shadows are placed around and perhaps in it. The carousel spins and moves up and down repeatedly. In the center of the carousel, the Programmers often place something or someone important. They will often put this at the bottom of the DNA double helix and have the double helix elevator shaft coming up the center of the carousel. The carousel’s bottom side will set on top of the system’s switching mechanism. And the core will sometimes be placed in the center of the carousel somewhat underneath it. The switching mechanism is the main control for turning the system (the Grandfather clock so to speak.) The carousel may have umbrella programming immediately on top of it. (This could be Illuminati Delta alters, which can be one of the deepest things put in.) The carousel must be approached from the back side. At times an internal key, which often looks like an old key is needed to enter the Carousel. Many Illuminati systems are given a key or set of keys, and at times when they enter therapy the front alters give this to their therapist not knowing what the key is, but knowing it is important. The co-authors believe that these keys are carousel keys. A false trinity will be assigned to guard this, which will consist of the False Prophet, The Beast or Dragon, and the Hoofed One. The false prophet and the Beast (dragon) come out of the book of Revelations. The Hoofed One is a rare occult term for Satan, not to be confused with the popular usage of the Horned One in the occult. The two terms are different. If several carousels are built into a system, then they will have other guards than the false trinity. In many Illuminati systems, there are 13 silent splits made from the core called silences, and at this time during the splitting process guards are made to the Carousel/core.

The Illuminati Formula Used to Create an
Total Mind Controlled Slave

Cisco Wheeler and Fritz Springmeier
DNA double-helix. An important Illuminati CIA MK-Ultra program

A personal note

For personal reasons, one could only phantom what those reasons might be, I became particularly interested in the – as I have been told at 14 by somebody who said ‘I am from the real Illuminati’ – ‘spiritual’ program with the name ‘Double Helix’.

As can be noted from the ‘Carousel’ program summary above, the double helix is a central construct of other programs too.

The double helix pattern is used as an elevator shaft running up and down the worlds created for the alters. In general, each world lays at a trance level. The double-helix is put in at programming sites where they have full medical facilities, such as Letterman Hospital, Presideo, CA. The codes up and down the elevator are alpha-numeric with lots of numbers. Because the way the double helix shape twists, one can ride the elevator and get off a level 1, 3, 5, 7, 9 but you have to ride it the other way to get off at 2, 4, 6, 8, 10, 12. Because the double helix is the centerpiece of how the different physiological states of the mind are being layered, taking the victim down to these different physiological states and levels is very risky and by the time it is through it involves lots of blood transfusions for the victim. The Caduceus is a double helix with snakes at the top. The Caduceus is an occult symbol used in ancient Babylon, ancient Hindu India, and by Chinese occultists. Mercury in occult lore carries a staff called a caduceus. Mercury’s staff is a cabalistic symbol. William Heller’s book on the Kabbalah on page 78 states, “Mercury’s staff, called Caduceus, and made of intertwined black-and-white twin serpents, heralds more forthcoming splits into duality. Once again, it reflects the ambivalent mind, its conscious, and subconscious states, its waking thoughts and imaginative dreams.” So according to cabalistic doctrine, the caduceus represents the various states of the mind.

Double Helix
The Illuminati Formula Used to Create an
Total Mind Controlled Slave

Cisco Wheeler and Fritz Springmeier

Magic Information Technology

I have been often astonished by the connection between Unix operating system terms and CIA mind programming ones.

Terms like daemon, trigger, core, alter, shell, level are common to both Unix/Linux and Monarch.

an evil spirit, a source or agent of evil, harm, distress or ruin
mythology : a supernatural being whose nature is intermediate between that of a god and that of a human being
daemon : a software program or process that runs in the background

Merriam-Webster Dictionary

My earliest experience in computer science – which by disfortune is also the connection to MK-Ultra – was with Cobol. Cobol? What a name.

A team drawn from several computer manufacturers and the Pentagon develop COBOL—an acronym for Common Business-Oriented Language. Many of its specifications borrow heavily from the earlier FLOW-MATIC language. Designed for business use, early COBOL efforts aimed for easy readability of computer programs and as much machine independence as possible. Designers hoped a COBOL program would run on any computer for which a compiler existed with only minimal modifications. Howard Bromberg, an impatient member of the committee in charge of creating COBOL, had this tombstone made out of fear that the language had no future. However, COBOL survives to this day. A study in 1997 estimated that over 200 billion lines of COBOL code was still in existence, accounting for 80% of all business software code.

Cobol (1960), Timeline of Computer History, CHM

While Cobol survives (well) until today, a new operating system was born only 9 years later. For people in the know, the basis for the internet, embedded devices, the IOT, whatever important in IT is still UNIX – full of daemons, triggers, cores, alters, shells, levels.

AT&T Bell Labs programmers Kenneth Thompson and Dennis Ritchie develop the UNIX operating system on a spare DEC minicomputer. UNIX combined many of the timesharing and file management features offered by Multics, from which it took its name. (Multics, a project of the mid-1960s, represented one of the earliest efforts at creating a multi-user, multi-tasking operating system.) The UNIX operating system quickly secured a wide following, particularly among engineers and scientists, and today is the basis of much of our world’s computing infrastructure.

Unix (1969), Timeline of Computer History, CHM

From Cobol to Unix. And its open source variant, Linux.

The fact is that most people today are using Linux without ever knowing it — whether on their phones, online when using Google, Facebook, Twitter, GPS devices, and maybe even in their cars, or when using cloud storage for personal or business use. While the presence of Linux on all of these systems may go largely unnoticed by consumers, the role that Linux plays in this market is a sign of how critical it has become.

Linux behind the scenes, Sandra Henry-Stocker

13 pillars of 666

The H-Root Server (H.ROOT-SERVERS.NET ) is operated by the U.S. Army Research Laboratory (ARL), formerly known as the Ballistics Research Laboratory (BRL), which has a long history of being a leader in the computing and networking arenas. BRL was the home of the world’s first electronic digital computer, ENIAC, and one of the first 50 sites to have a web server on the Internet. Many BRL/ARL researchers were involved in the early development of UNIX, the Internet and TCP/IP protocols (including the DNS). RSSAC023 24 BRL was one of the first and one of the most well connected nodes on the ARPANET/MILNET in the late 1970s and early 1980s. As such, BRL volunteered to host one of the original root servers – both to assist in the further development of the DNS and to provide a root server for the MILNET in the event that MILNET had to be disconnected from the Internet. Currently, ARL is home to one of the world’s largest supercomputing facilities and resides on the high-speed Defense Research and Engineering Network (DREN), which ARL scientists helped design. To this day, ARL continues to operate a root name server as a service to the Internet community.

History of the Root Server System, ICANN

There are 13 root DNS servers globally. Without them, there is no internet. 13 – UNIX and Linux powered – pillars as the core of a system that Hebrews could translate as 666 – the world wide web, the spiderweb.

The Hebrew equivalent of our “w” is the letter “vav” or “waw”. The numerical value of vav is 6. So the English “www” transliterated into Hebrew is “vav vav vav”, which numerically is 666.

In Hebrew, the language of the kabbalah, the world wide web is 666. And web associates to spider. And spider? Google? And the flies. Are we collectively the flies? Interesting.

Not an answer – but interesting. The connection between technology and black magic is neither to apparent nor do I have watertight proof. But it is intriguing and plausible.

And wasn’t spiderweb a symbolism used in CIA Illuminati mind programming?

Satan inside

With artificial intelligence we are summoning the demon. You know all those stories where there’s the guy with the pentagram and the holy water and he is like… yeah sure he can control the demon.. doesn’t work out.

Elon Musk, MIT 2014

In essence, CIA MK-Ultra aka Illuminati mind programming tech is satanic at its core. The nice ‘present’ one gets from it is helpers of satan trying to f*** around with ones mind.

Detail from Saint Michael and the Demon, a neogothical stained glass window from Saint-Martin de Florac Church

And as one quickly understands after little research the NWO is of Luciferian belief – and Lucifer is:

Name for the Devil, the more common meaning in English, “Lucifer” is the rendering of the Hebrew word הֵילֵל‎ (transliteration: hêylêl; pronunciation: hay-lale)[2] in Isaiah (Isaiah 14:12) given in the King James Version of the Bible. The translators of this version took the word from the Latin Vulgate, which translated הֵילֵל by the Latin word lucifer (uncapitalized), meaning “the morning star, the planet Venus”, or, as an adjective, “light-bringing”. As a name for the planet in its morning aspect, “Lucifer” (Light-Bringer) is a proper name and is capitalized in English. In Greco-Roman civilization, it was often personified and considered a god and in some versions considered a son of Aurora (the Dawn). A similar name used by the Roman poet Catullus for the planet in its evening aspect is “Noctifer” (Night-Bringer).

Lucifer, Wikipedia

The Night Bringer. Behind the NWO, in this construct of pyramids in pyramids is thought to be an entity called Illuminati. The most widespread execution group is thought to be with the high level (33rd secret degree and up) masonic entities.

 I’d assume there are less than 10 people on this entire earth who truly understand how this modern computer technology really works. As previously pointed out, all of it is based on occult knowledge, magic, witchcraft, divination, geomancy etc. When you tell people about this they’ll laugh in your face but Geordie Rose is telling you straight up in the face what it really is. Tells you straight up about summoning entities from another dimension and invading other dimension to pull in resources from another dimension into ours. 
There is a hidden OS in all newer Intel chips

The common factor of above are their heavy reliance on techniques like numbers, symbols, mental structures. All based on black magic principles.

Mind programming is occult technology. And information technology?

A temple. And an intel chip. Intel inside. The mayans, aztecs etc all worshipped the gods aka entities from another dimension. As you can hear Geordie Rose (Video below), the head of “D-Wave quantum computing” himself, they are coming back. Now they are called aliens but they are the same entities of old, just different names. In quantum computing they talk about “qubits”. Well where have we heard that before? In the Bible. Temples were built using precise measurements, so called cubits.

Is there a connection between technology and alchemy, between operating systems and mind programming, between computer chips and dark symbolism? Are the internet of things, robots and virtual reality opening a link to what the al-Qorʾān calls djinns? Does hardware have a soul?

Geordie Rose of Kindred AI presents Super-intelligent Aliens Are Coming to Earth

We’ll Be Lucky If They Enslave Us as Pets

Elon Musk on Superintelligent Robots


Print Friendly, PDF & Email

Not an anti-technology article

German Version / Deutsche Version

This will not be an anti technology article. Simply because I am not an anti technology person. But I do believe that inventions are per definition like babies, it depends on the nurturing of a newborn, on the emphasys, the surroundings, the way the society reacts to the new.

And I believe that technology has reached a point where it is not just changing appearances, having effect on the way we travel, produce, transport, build or any of those other practical implementations.

But that technology has reached a point where, essentially through the way she influences or – sadly – one can say increasingly defines communication, has a profound effect on human evolution (whatever that signifies).

One symbol of this is the device we commonly call mobile phone. Or, surprisingly, smartphone. While maybe the item itself could, at least theoretically, be defined as smart, possibly based on specs and operating system complexity – is our application of this specific technology smart too?

A phone on the wall. No comfort, no chair - and no way of taking it with me. Not smart. Or, actually, smarter than what we use today?
A phone on the wall. No comfort, no chair – and no way of taking it with me. Not smart. Or, actually, smarter than what we use today?

Phone on the wall

Until I stopped being a teenager, a black phone with a dial, that, as I remember took some muscle power and patience to use, hanging on a wall in the hallway, that rang maybe once a week, a persistent bell that nearly woke up the dead, was my only technology based communication medium.

And its main purpose was having one minute conversations that went like “Hello”,”How are you”,”Lets meet”,”Good bye”. Which ended uncomfortable standing and consistently initiated a full blown meeting in reality.

While, what is reality? Facebook, Whatsapp and other so called social platforms – and exactly how social they are is open to discussion – have become possibly more ‘real’ nowadays than meetings in person once where. This kind of old fashioned person to person communication where one can see, touch, smell, observe, in summary, fully interact with another person is not the common option anymore.

Looking into a screen, while sitting, walking, standing, while travelling, eating, waiting, while doing the most improbable things imaginable has become the ‘norm’.

I keep trying

I got a mobile phone. I admit. When I recently arrived in Switzerland – probably only to depart soon again – I got myself I cheap non-smart tiny thing for nearly nothing that could only do calls and SMS. What a revelation. Finally nobody sent me notifications, links (often for nothing and really to explain nothing at all). But then, alas, my bank told me that in order to use their services I needed to adapt (how often do we actually have to adapt to technology and how rare it is that technology adapts to us?) to their authorisation rule and have to devices, and two apps.

I tried to resist but then, in London trying to reactivate my UK phone, I was told that I needed 3G and that my tiny superthing was unable to adapt (even technology experiences obviliation). So off I went, sad and enslaved, to a new smartphone. Only now, there is no Whatsapp installed, no email retrieval activated. I keep the phone in a wanted ‘prehistorical’ state of on demand limitation.

And I thought about the fact that people are on their oh so smart-phones everywhere. So my one just stays in the pocket, or off if I am not wanted, which I prefer. I am with all my 5 senses in reality. If I can’t change the world, I can at least show with my own little self that I prefer this reality to that… wait…

What is reality?

The reality behind a screen is also a chosen reality. As is the reality in those apparently very addictive games that has even got some humans dead by simply forgetting to eat and drink, or by heart infarct.

We call the reality behind a screen virtual reality. As easy and convenient this sounds in a strict – possibly somewhat philosophical sense, any reality is as virtual or real as we experience it. In Shamanic Lucid Dreaming dreams are seen as more real than what we call reality. Experienced with all 5 senses.

And the reality behind the screen can – and indeed became – for some humans possibly also ‘more’ real than the ‘real’ reality. Virtual reality, taken to the extreme, can become not only a replacement of the reality we are used to call real, but actually a more realistic representation of ‘real’, or maybe better a more important one.

Thus, in essence, it is not about the objective reality value of a specific reality one is living but about the subjective importance of that reality the invidium perceives. Thus, suddenly, human beings who physically die because of playing a game and also a teenagers who kill their parents because they take their smartphone away are horrible and alarming, but on a psychological level make sad – very sad – sense.

“a 16-year-old killed his father for taking away his mobile phone while he was playing an online multiplayer shooter game. In another incident, in Bengaluru last August, a 15-year-old girl murdered her father with the help of a male friend after he attempted to curtail the amount of time she spent online”
Source: Deccan Herald

Those people completely immersed in their smartphone world, in the reality behind screens, which are not just some, but – at least in my subjective experience- daily more and possibly soon the majority, in buses, trains, shops, on the street, or even in Saunas, have effectively, I suppose, at least in some cases, defined the reality behind their screens more essential than the reality around them.

This is the information super highway that Clinton happily proclaimed, the secret service unfiltered space of virtual reality. The world behind those screens is made possible by the internet, the WWW, a network with roots in the Military. Made possibly since the initial comparative free times for the exact reason that it now reflects. Total control. But those thoughts are another story altogether. Another one I would like to talk about soon.

“Think of it, instant access to information will increase productivity, will help to educate our children. It will provide better medical care. It will create jobs. And I call on the Congress to pass legislation to establish that information super highway this year.”
Source: Bill Clinton

Filtering it out

This ‘superior’ virtual world of digital exchange has its limitations, in my humble eyes. But for the many immersed in that reality, the advantages seem to outweigh them. Virtual friends top physical ones. Virtual encounters don’t intimidate, virtual friends don’t smell, don’t have viruses (at least not body based ones), virtual friends don’t object (or they get blocked without remorse). Virtual friends don’t force you to go out, walk, take time. Virtual friends are easily exchanged, virtual friends can be communicated with in extreme parallel, virtual friends don’t need food, don’t have to be asked if they would like a coffee, virtual friends don’t break the omnipotent barrier of the magic smart(-phone) screen.

Fortnite. I frankly even had difficulty writing it. I have no clue about it. I tried playing SIMS (10 mins and bored), tried Second Life (same effect). Not for me – for you?

But not only the endless bliss of the internet is part of this world. Communication itself, even by voice, seems to have changed fundamentally. While I, old school, keep private conversation private, more and more are telling me, not asking but decidedly looking the other way and proudly assuming, that their most intimate life has and needs to be shared publicly with me. Family arguments, hour long video calls with their mother, of course over the loudspeaker and with me playing bokeh background, the most extreme arguments and deeply sad tearful end-of-life discussions – all right here in the open public. Is this smart? I can’t judge for others, but I do observe. And me, I find it too sad to shed tears – indeed.

Melancholically I dream of those ‘good old times’ when this black dial phone on the wall was my only technology based medium of communication. Where people would meet, not chat, play in the woods, not in massive multiplayer. Have a coffee, not place likes and dislikes strategically in a new, shining, amazing, glittering, infinite, speed of light, ever changing, ultra immersive, omnipotent virtual world behind screens that even happen to kill or get one killed.

But then, if the virtual identity is all that remains of importance, then dying in the real world might not matter anymore?

Shift in reality

Whatever ones personal inclination, that for an increasing number of us the perception of reality shifts into the virtual seem to be a fact.

Not that I haven’t experienced exceptions to the rule. I met people, yes, also young people, who have taken a conscious decision to limit their online reality. Have switched from virtual reality back to physical one. Have met others who still don’t – and never plan to – own a smartphone. And others still, that through suffering and with psychological help, have been able to find a way back into this reality from a situation of massive addiction to the world behind the screen.

So the future is not set. It is actually never set. But what matters, what seem to me to be of extreme importance, is that we collectively stop to see technology as a benevolent miracle. Technology is, has and will influence our reality to a yet unknown extent in the future.

Technology is not just to be consumed without critical thinking, one needs to be awake to make technology something that helps humanity evolve and not make it into something that enslaves the human being.

Since the beginning of the coronavirus crisis, it has been documented exactly where which infected person was when. Officials are questioning patients, what routes they took and who they contacted. They’re checking surveillance cameras and matching credit card and cell phone records. The routes are then published to prevent further infection.
The German Spiegel, about South-Korea and the Corona virus

This whole story reminds me of the Goethe’s ‘The sorcerer’s apprentice’. A poem that symbolises in a smart way what happens if one plays – out of commodity – with forces one cannot control.

I don’t really know if this is funny – but as I don’t smartphone in public I have time to observe. These are some of the strange impressions I got. Types of smartphone lovers.

Smartphone lovers

The Smiler
He/she is always laughing, usually on video calls. 
Bus, tram, train, hotel lobby – everywhere where he/she gets public recognition
Communication level:
20% communication / 80% be somebody special, make sure the whole world knows

The Drama-Queen
Or King…
Discussing very private stuff in public. Preferably for hours. Including shouting, crying, tears. Total drama.
Street and public transport. If he/she enters a bus or train, she will not even stop with those highly emotional discussions when exiting the transport. Non-stop. Second hand embarrassment par excellence.
Communication level:
50% / 50%? I really don’t know. Neither I understand why the whole world has all this extremely private matter.

The Loudspeaker
Preferably on video-call with full level loudspeaker. Often talking to his mother for 3 hours. Loves video calls. Does not know that loudspeakers can be turned off. And definitely does not care. 
Street, hotel lobby, restaurant, any public transport, hospital waiting room – anywhere.
Communication level:
40% / 60%. Needs everybody to know that he is loud, that whoever he talks to is sacred (his mother, whoever), gets angry if anybody interrupts. The world is mine.

The Chatter
Frantically typing in hyper speed on the soft-keyboard. Often with 10 people at the same time. And sometimes with the sound on: “Bling”. Message. Typing. “Bling”. Message. Typing. Endless chat going to nowhere.
Communication level:
30% / 70% ? As in multitasking: Extreme. As in quality: I don’t know. It just makes me sad. 

The Gamer
Female more prevalent. But males too. Immersed. 
Anywhere. Public transport preferred. While walking no problem.
Communication level:
Maybe through avatars? 10% / 90% would be a good assumption. 90% a virtual personality.

The Addict
He/she never is without phone. Always behind the screen. While walking, in the supermarket, on the street, under the bus. In the Sauna, while eating – when making love? The addict is 100% and 24 hours with his smartphone. His/her only friend?
Absolutely everywhere and in any situation.
Communication level:
As this type has no other communication with the world outside than through the screen, I assume t is communication. But in reality it is just a drug, like Cocaine or Heroin.

This reality behind the screen will keep evolving. ‘If one does not go back to the game, the character dies. That is why gamers need to go back’, I overheard in the bus yesterday. Understandable. And the same thing might happen to those whose identity and value depends on the amount of likes on some social network. And whose reality is defined by how fast they react to chat requests.

Thus we are looking as a society at a massive shift of realities. From my time of childhood with the uncomfortable black phone seldomly ringing from the wall – to a real virtual reality of endless connectedness – and often endless physical disconnectedness, from virtual worlds of PacMan to virtual worlds that may soon become even much more immersing than they are now.

Only that, unlike the sorcerer’s apprentice, there is no old man coming home to reestablish order, to speak some wise words, to get us free. We humans are alone. Alone on this Earth. Alone – often – in a world behind the screen. And alone with the indeed real danger of becoming lost slaves of technology.


There is no conclusion. This is probably one of the most inconclusive articles I’ve written. There are no wise words to counterbalance this sexyness of technology that makes it so profoundly potent and dangerous. And there is no ‘no technology’ option here. Technology is trains, technology is a washing machine and technology was my black brick of a a phone on the wall.

The only difference between the known technology of the past and the technology of the future is its potence. All kinds of technology have changed and will keep changing – in positive and negative ways – our reality.

And even if we would reach the conclusion that in essence technology did and does more bad than good, there is no way to turn back time. Virtual reality, artificial intelligence, big data, the internet of things, the information superhighway both as a global communication network and a playfield for the world’s control crazy governments is here to stay.

“Both are running, both are plodding
And with still increased persistence
Hall and work-shop they are flooding.
Master, come to my assistance! –
Wrong I was in calling
Spirits, I avow,
For I find them galling,
Cannot rule them now.”
The Sorcerers Apprentice, Goethe

We are collectively playing sorcerer’s apprentice with no old wise man coming home. But do we really want to exchange the world of true friendship, of face to face communication, of awake conscious experiences in the real world around us against a synthetic, germfree and sadly also quite commitment free world behind a screen? And do we really want to throw the last remaining bit of privacy carelessly away in exchange for some blunt commodity in the form of ‘smart’ technology?
At the end, technology may get smarter and smarter, but we?

© by 2020. All rights reserved.