ebook img

Chainless Slaves Trauma Programming PDF

218 Pages·2014·1.011 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Chainless Slaves Trauma Programming

CLASSIFIED Chainless Slaves Trauma Programming U.W. Ozian 2014 Trauma programming manual. This manual is an overview on how to create a dissociated subject. The manual lists tactics to use in trauma based programming. 1 Trauma-based Programming 1 2 Selection of Subjects 3 3 Hypnosis for Programming 4 4 Neuro-linguistic programming (NLP) 8 5 Hypnotic Surgery 12 6 Hypnotic Implants 13 7 Brain Frequency List 14 8 Preparing the Mind 16 9 Behaviour without Awareness 17 10 Principles of Control 18 11 Non-Coercive Techniques 20 12 Coercive Techniques in Programming 32 13 Steps of Obedience 34 14 Levels of Programming 36 15 Tools and Aids for Programming 39 16 Deprivation of Sensory Stimuli 41 17 Inside Structuring 44 18 Universal System Parts 53 19 Goals of Programming 56 20 Subliminal Perception 59 21 Human Experimentation 60 22 Scripts 61 23 Programming Music 62 24 Double Bind 63 25 Pain 64 26 Malingering 65 27 Debility 66 28 The Programming Plan 67 29 The Opening 71 30 Beginning of Programming 73 31 Infant Programming 75 32 Raising a Child Subject 77 33 Detailed Programming 78 34 Stabilizing the Programming 79 35 Split Brain Work 80 36 Applications for Drugs used in Programming 81 Section II Applications 83 37 Brainwave Frequencies 84 38 Double Meaning Word List 97 39 Programming Codes 100 40 Tortures Used in Programming 108 41 Internal Structures and Symbols 113 42 Electric Shock Torture (ECT) 118 43 Internal Base Systems 120 44 Games 125 45 Trauma Bonding 128 46 Inside Parts 130 47 Internal Programs 141 Glossary 161 1 Trauma-based Programming Trauma-based Programming can be defined as systematic and calculated torture that blocks the subject’s capacity for conscious processing. Trauma Programming employs suggestion, hypnosis and/or classical and operant conditioning to implant thoughts, directives, and perceptions in the unconscious mind. The behaviours are implanted in trauma-induced dissociated identities (parts/alters) that force the subject to do, feel, think, or perceive things for the purposes of the programmer. The objective is for the subject to follow directives with no conscious awareness, including execution of acts in clear violation of the subject’s moral principles, spiritual convictions, and volition. The primary factor for the trauma-based programming is the ability to disassociate. Dissociation is used as a defence to protect a subject from overwhelming pain and trauma. It is a natural ability of the brain. Installation of Trauma programming relies on the subject’s capacity to dissociate, pain threshold, and imagination which permits the creation of new walled-off personalities to hold and hide programming. Genically predisposition dissociative children are prime candidates for programming. The subject’s ability to dissociate is a major requirement and it is readily found in subjects that come from families with multiple generations of abuse. Mental dissociation enables the handlers to create walled-off parts in the subject’s psyche, which can then be programmed and triggered. The subject cannot be traumatized indiscriminately or they will be killed. The master programmer has to know what they are doing. There will be doctors, heart monitoring equipment, and other medical tools used in programming. Programming foundation is completed in a clinically controlled environment to ensure entire control of the subject. The type of programming which is placed in a subject varies. The subject’s creativity and their purpose in life would contribute to the uniqueness of the programming. Each subject visualizes differently and the programmer works with the subject’s creativity. Some parts will be formed solely by the subject in order to cope with life. Each subject exists in their own circumstances; there are often common features in how they are controlled. The common features of control in subjects are: symbols, colours, and scripts. The foundation of trauma-based programming is fear. A deep spirit of fear cripples a subject spiritually and emotionally. Guilt and shame are two more foundations for programming. The guilt will bind the subject to the programmer, handler, and other individuals that have been selected. This will lead to a loyalty that will make the subject less willing to disclose activities, and past trauma. Programmers cause intense trauma to individuals through the use of electroshock, torture, abuse and mind games in order to force them to dissociate from reality. Programmed individuals are used for different purposes, the sex industry, military, occult practices, and cults to name a few. Organizations have programmed subjects that are expendable. These are individuals are used in smut films, one-time use saboteurs, breeders, soldiers, drug couriers, used in rituals, and for training and traumatizing other subjects. Subject’s who have been given a designated purpose in life will have their genealogies hidden. They will have programmed to have a cover life to insure they will not be detected. Some children live in foster homes, with adopted parents, or with caretakers and guardians. Because these children reside with non-related programmers, these categories of children are commandeered to become programmed subjects of the intelligence agencies. Children will not question the synthetic reality they are introduced to. Children are conditioned to believe what they see, feel, taste, hear, and touch. Using these five senses the programmers can control the child’s surroundings. The experiences introduced to the subject will lead to an altered reality that the programmers can build and manipulate to meet their desires. Traumatizing an individual on a specific day; their birthday, Christmas, Halloween, for example, is more damaging as the date won’t be forgotten and will occur once a year. Trauma programming on specific dates allows the programmer to inlay clocks for triggering desired actions. The fathers or step-fathers are not often the subject’s handler when they are growing up. The abuse by this subject will serve as a cover for programming. If the subject’s front alters discover they are D.i.D, they will initially blame their multiplicity on the first abuser they remember, which will be a family member. To make sure that the subject’s mind develops properly, the baby will be interacted with so that those areas of the brain which are important for development will develop to the maximum. Common everyday items that surround the subject will be given unique meanings. The songs the subject hears on the radio will have trigger words. The lyrics will be scripted so programmed meanings can be attached to certain words and lyrics. Something such as watching T.V., listening to the radio, or a sermon may have trigger phrases and programming cues in them. If possible the programming process begins in the womb. Maternal thoughts, feelings, actions, and fears all reach the subject in the womb and affect them. The unborn child hears and reacts differently to different music played. Comforting words and calming music will calm a fetus. According to research, the start of awareness is evidenced between the 28th and 32nd week. At that point, the brain’s neural circuits are just as advanced as newborns. From the 32nd week on the child shows that they carry out REM sleep. It had been noted from the sixth month of pregnancy onward; some of what the unborn subject learns will be remembered. Programmers will make a point of having the unborn subject hear the voices of individuals who will play a role in the programming. The subject may already know the hypnotic voice of one of their programmers at birth. In the eighth week of life, the early fetus traumas programmers carry out is to poke the fetus with a sharp object to make it dissociative in the womb. By the fourth month, the unborn subject is making facial expressions. The subject can be overwhelmed while in the womb with negative sounds, bad tastes caused by what the mother eats, and being touched in ways that they dislike. Programming drugs that cause specific responses in vitro can also be administered. With many programming fetuses, womb splits can begin. The foundation of fear can begin to be layered in while the subject is still unborn using the methods mentioned. A long-term unresolved stress on the mother will also stress the unborn subject. Short term stresses don’t seem to have the long term side effects that long term stress has. Short term stresses are soon forgotten by the subject. It has been noted, the love that the mother has for the unborn child is transmitted to the subject, and forms a protective barrier the subject can become resistant to traumas and stresses. When the mother is ambivalent or cool in their emotions, the babies have more physical and emotional problems. 2 Selection of Subjects Adult subjects are selected who have no close family or friends. Once they have been selected, they are put under Level One hypnosis. At this time a clear and definitive pattern of their usefulness is determined by psychiatrists and programmers. If the subject posses a relatively high IQ, they will be filed in a "call file.” The IQ scale used in assessing subjects is the Stanford Binet. The higher the IQ of a given subject, the further they can be programmed. If the IQ is high enough their abilities will be studied and the needs of the organization and determine how the subject can be further used. Once this determination is made, the subject will be brought to one of numerous facilities throughout the U.S. or abroad for further and final programming. Only psychiatrists trained in the method of sub mental behaviour programming, overwrites and overlays, will be able to find any clues leading to post Level 1 or 2 programming. A typical psychologist may discover that the subject has been hypnotized in the past, and may even discover the original personality. But they will not be able to discover the location in the brain or memory, where Levels 3, 4 and 5 programs are stored. Without an activation code an outside psychologist or psychiatrist will not uncover the programming unless by accident. A beginning point to control people is understanding human needs, and understanding the individual to be controlled. A Programmer learns everything they can about the subject they are to control. Programmed subjects who must function as intelligence officers, who recruit, are trained in the art of listening and conversation. In some instances of programming after a subject has completed a hostile act the subject is captured and not killed. Due to the type of programming used the subject will not divulge any information. Even if the subject is tortured, they will not be able to remember the actual killing, terrorist act, or the reason they did it. Once the subject is programmed, they will be recalled on a yearly basis and given hypnotic reinforcement of the original programming, or new programming will be inserted to modify the original programs. If no new programming is needed, the reinforcement programming can be done on a mass scale. 3 Hypnosis for Programming The subject's Posthypnotic Suggestibility Index is determined by a series of simple tests. Hypnoamnesia is applied to the subject. They are given a name of an object or individual the subject's speed is timed to determine how quickly they can recover from the posthypnotic suggestion "You will not be able to remember the name of "____" no matter how hard you try.” The power of hypnosis is often underrated as the power of the mind is underrated. The mind can decide to be in command of breathing, heartbeat, and blood pressure. Programmers are highly aware of how the mind functions, and how information and memories can be trapped in the mind. The mind naturally hypnotizes itself under diverse conditions. Hypnosis is used to steer a subject’s mind in the direction that has been dictated for them. New patterns of thought, feelings and behaviour are inserted to build confidence in the goals of the Programmers’. Hypnosis is used to anchor suggestions about sleep patterns, panic programs, phobias, health/ healing programs, health problems programs, pain control/pain programs, motivation programs, a suicide program called “hypno-sleep”, an insanity program, and countless other uses. Programmers do not need to formally induct their subject into hypnosis. A proper fear foundation will place the subject in a dissociative state that would make hypnosis simple. The mind links together a series of mental processes. These links are called K-lines. Much of what the mind does is activate various K-lines so the mind can focus its conscious thinking. Once a K-line works, the mind in order to prevent itself from making uncontrolled changes, gives priority to those K-lines. If the mind did not set up series of K_lines it would continuously have to relearn unimportant tasks that would make it impossible accomplish things in everyday life. Every skill would have to be constantly relearned. Emotions and needs trigger the mind to search out K_lines to accomplish a task quickly. During programming the untrained K_lines are brought up to the top of the conscious mind. The programmer now has access and control over many or all the cognitive processes, including many the subjects would not normally activate. Under hypnosis, the mind willingly allows the programmer to change K-lines without the normal unconscious conventional restraints. Using behaviour modification techniques, the programmer activates dormant K-lines ( K-lines that wouldn’t normally develop) and build them in the mind. During hypnosis, the mind has made the decision to accept control statements from the programmer. The mind has abdicated its position as the one in control of what is vital. There are several ways to modify a subject’s state of consciousness; the most useful one by

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.