It looks like you're using an Ad Blocker.

Please white-list or disable in your ad-blocking tool.

Thank you.


Some features of ATS will be disabled while you continue to use an ad-blocker.


Dark Sciences and Shattered Mirrors - Uncovering MK-Ultra & Monarch Programming

page: 2
<< 1    3 >>

log in


posted on Mar, 10 2011 @ 05:31 PM
For the reader to better understand how monarch program triggers work it is best to study how to set the mind to accept the commands.

Dark Uses of Submodality Patterns.

• Put someone’s self esteem or self concept in the no longer true position.

• Put someone’s relationship in the no longer true but used to be location.

• Gesture to the no longer true side when talking about what you want them to let go of.

• Ask the person to make an idea of what they believe will be a good future for them and to see it as a picture. Put that in the no longer true but used to be.

• Dealing with a man, suggest that his ability to “ perform” and “rise to the occasion” be put in the no longer true but used to be location and put longing to be able to - but the realization he can’t - into the absolutely true position.

• Dealing with a woman, suggest her ability to experience desire and warmth find it’s way into the no longer true but used to be position. Remember to use both sides of this – first get rid of the problem, then replace it with what you want them to believe. Tweak the drivers of the Submodalities to strengthen/weaken the states as needed.

edit on 10-3-2011 by Tindalos2013 because: (no reason given)

posted on Mar, 10 2011 @ 05:55 PM

Submodalities are ways in which we mentally organize our thoughts. Whether they are as images or as words and phrases each thought will have it's own unique quality. An image of a delicious hamburger can be seen as large in color and gently rotating in our mind. If that image is changed to small, distant and black and white it no longer seems delicious. Likewise, when we change how we represent these thoughts we change how we feel about them.

No Longer True Elicit what is no longer true but used to be and find the submodalities of that belief. Then elicit something that is absolutely true. The sun will rise tomorrow is a good example. Discover the submodalies of this belief.

Put any objection or disagreement into the “no longer true but used to be” and what you want them to do in the place that’s absolutely true. As an example, you can take the belief that " Everything I say is important and true." and place it in the position of "absolutely true". The next step is to put the belief of "not agreeing with what I say" into the position of "used to be true." The result is that they will believe everything you tell them.

edit on 10-3-2011 by Tindalos2013 because: (no reason given)

posted on Mar, 10 2011 @ 06:09 PM

The Suicide Pattern.

I don't know what's been going on inside your head lately, (Name). Perhaps you need to do some introspection. Perhaps you need to look deep down inside yourself...explore the very essence of who you are...and I don't know if you'll notice...just how empty you are, deep inside alone, so lonely. And when you explore that place, you only find memories of your failures, frustrations and missed dreams . . . To the point where you ask yourself...this is it? This is what I've been living for? What an empty life! These things you do to me...your life in general...only amuse you, but they miserably fail to address that deep longing inside you...that deep, painful emptiness. That's why you need to find someone to hurt. To go against.

edit on 10-3-2011 by Tindalos2013 because: (no reason given)

posted on Mar, 11 2011 @ 06:34 AM
To learn more about the uses of dark NPL use the link below.

Now lets continue to learn about programmes and alters that was often mentioned in Part 1.

So called cult “programs” are really no more than conditioned stimulus-response sequences consistent with basic learning theory. Such conditioning is achieved through a large variety of sophisticated and sadistic mind control strategies involving the combined application of physical pain, double-bind coercion, psychological terror, and split brain stimulation. All programs are stimulus-sensate triggered. Thus, programs may be enacted (triggered) via auditory, visual, tactile, olfactory and/or gustatory modalities. Classical, operant, and observational/ modeling paradigms all are utilized by the cults and their “ programmers.” Finally, it is important to note that virtually all cult programs will possess a variety of secondary and tertiary back-ups — perhaps several layers of each.

edit on 11-3-2011 by Tindalos2013 because: (no reason given)

posted on Mar, 11 2011 @ 06:42 AM

Self-Injury Programming 1). Cutting Programs As children, patients have been “taught” by the cult when and how to cut. These programs tend to be triggered as a means of punishment, as well as to reinforce earlier “compliance” or “ shutdown” injunctions (e.g., “Don’t betray the coven.”) I recommend that the therapist pay specific attention to the pattern, location and implement of the cutting — each may serve as a signature of the original program, involved alter ( alternate personality), and/or cult programmer. I further recommend photographing and or diagramming the wounds from each of the cutting episodes for later comparisons. The cutting implements themselves may be special “gifts” of the programmer (used during the original programming session), which the patient may keep secretly hidden for years and use only when the urge to cut is specifically triggered. Finally, many cutting programs have been conditioned in such a way as to “progress” to suicide programs as “needed.” 2). Burning Programs As is the case with cutting programs, the location and modality of the burn injuries are significant. The therapist may also wish to map the burn wounds. Common modes of burning include: cigarettes, lighters, hot metal implements (i.e., knives, rods, wands), and/or a variety of scalding (or flammable) liquids and caustic chemicals. 3). Miscellaneous Self-Injury Programs Types of specific self-injury programs are as numerous as there are ways to injure oneself. Besides being conditioned to cut and burn, we have also routinely seen programs designed to create within the survivor: (1) “accident” proneness, (2) failure to eat, (3) ingestion of injurious materials and poisons, (4) failure to sleep,...

edit on 11-3-2011 by Tindalos2013 because: Typo.

posted on Mar, 11 2011 @ 06:58 AM
For further informatation on the common programme types 2

posted on Mar, 11 2011 @ 07:43 AM
From a deep web search I came across this paper written by John D. Lovern called Spin Programming: A Newly Uncovered Technique of Systematic Mind Control.


Information obtained clinically from seven multiple personality patients with recalled histories of ritual abuse has revealed a coercive technique previously unknown to psychotherapists. This technique here labeled "spin programming," appears designed to spread effects such as pain, painful emotions, and other feelings or urges globally throughout a patient's personality system for purposes of either designing and building a young victim's personality system, or harassing older victims and disrupting psychotherapy. Spin programming appears to be based on a combination of physical spinning, cognitive and imagery training, and repetition and practice aimed at creating an internal multi-alter spinJeannieit the pain or affective components of numerous traumatic memories simultaneously to large groups of targeted alters. This paper presents signs and symptoms commonly seen in patients subjected to spin programs, training methods apparently used to create spin programs, and an analysis of strengths and weaknesses of spin programming.

edit on 11-3-2011 by Tindalos2013 because: (no reason given)

posted on Mar, 11 2011 @ 08:01 AM

  Signs and Symptoms of Spin Programs Patients who are suffering the immediate effects of a currently activated spin program tend to present with a number of typical features. These features include: global effects, symptoms occurring like a "storm," pressure, dizziness, a sense of spinning inside, physical movements related to the internal experience of spinning, and spinning-related imagery and vocabulary. Global Effects. When a patient is affected by a specifically targeted program, she or he typically experiences one or a small number of alters having emotions or urges or manifesting behaviors, while most or all other alters remain unaffected. The patient might say, for example, "Somebody inside wants to cut," or " Joey is feeling suicidal." When a spin-based program is active, every alter with whom the therapist talks is likely to be suffering from the same or similar symptoms. At such times, the- patient might say, " Everybody in the system is depressed;~ "None of us has any hope or any energy or any interest in anything; " or "We are all terrified that you are going to abandon us.

posted on Mar, 11 2011 @ 12:47 PM
Svali, who is a former mind control programmer in the 1990s has written much about the makings of a monarch slave.

What is polyfragmentation? The term comes from the root poly, meaning many, and fragments. In complex polyfragmenatation, the survivor will have not only alter systems, but hundreds or even thousands of fragments, isolated parts of their mind created to do a job, and do it well and unthinkingly. Often the job is one that would be abhorrent to the main personality or presenting system. The further away from core beliefs, the greater usually the dissociation and fragmentation that must occur. In other words, a LOT of trauma has to happen to make a person do something that they really don’t want to do. And the person has to feel very far away from themselves as well when doing it. The cult will purposely try to create a polyfragmented system for this very reason. The person is more dissociated from themselves, and is often easier for them to control.


posted on Mar, 11 2011 @ 03:23 PM
So far the methods of programming are wide and varied. I now will look into how triggers can be placed almost anywhere so that the monarch slave is activated and how psy-ops are carried out against people, with the use of technology aimed to cause distress and harm. Operations as such more often than not involve secret intelligence groups and two such groups are British, the MI5 and MI6.

posted on Mar, 12 2011 @ 08:45 AM

I was crying and screaming, absolutely petrified that they were going to give me brain damage. Using magnetism, the man also dragged mucus and moisture to the top of my head, moving my brain, causing pressure and using this to manipulate tubes in my forehead. Doing so he caused much pain and said that he was going to burst my "clairvoyant bubble". He did eventually burst something which caused my right eye to be closed for several days.

Marina Findaly is one such individul who was harrassed by MI5 due to her campaign efforts to stop illegal felling of protected woodlands.


posted on Mar, 12 2011 @ 08:53 AM
Previous attempts to make police authorities aware of the attacks and ask questions have yielded unsatisfactory results.


posted on Mar, 12 2011 @ 09:37 AM
On the website there is a transcript detailing the innerworkings of complex alter constructs.

Each node is assigned a numerical code. If three or more nodes are brought together by calling out their code names, they form a temporary alter. (The nodes do not have to be adjacent) The information on the TinkerToy sticks that lead to each of those nodes, when put together, constitutes the instructions for that temporary alter. When the task is done, the temporary atr dissoles, the nodes go back to their original place, and each node divides into five. The node that divided cannot be used again, but any of the five new ones can. The numerical code that calls the nodes together is made by dividing the sphere into sections using lines like longitude and latitude. When the nodes are latent, just sitting there doing nothing, no node on the surface layer is connected to any other node. They cannot communicate, they cannot exchange information. They only behave like an alter when they have been called together.

edit on 12-3-2011 by Tindalos2013 because: (no reason given)

posted on Mar, 13 2011 @ 05:03 AM
Another method commonly used to harrass and distress individuals is by usingstalking tatics.

from the The Hidden Evil website;
Here's an example of how groups use NLP to make you aware that you're being stalked: One morning you're walking out to your car and a man walks in front of you, stares directly at you in a hostile manner while repeatedly clicking his pen the whole time. You feel a little uneasy and say to yourself, "Boy that was weird, what was his problem?" Then two hours later you're leaving a shopping mall on a day that it was not particularly crowded. As you walk out to your car, an old lady approaches you on foot. As she almost collides with you, she locks her eyes onto you with a hostile demeanor, while clicking a pen the whole time. Then maybe you tell yourself something like this. "There couldn't be a relation between those events, probably just a coincidence. But they both stared at me in such a mean way while hammering their pens..." Later in the afternoon, you're on your way home. You're at a stoplight and out of the corner of your eye you see a passenger in the car to your left. You hear a slight noise, and glance over. You see a man glaring at you with a grin on his face. His arm is hanging out the window and he is holding a pen, which he is repeatedly clicking. Now imagine that happening for a month. Then a few days later you're on a sidewalk with a friend or family member. A man walks by, doesn't look at either one of you, but clicks his pen a couple of times. You feel anxious and afraid.

edit on 13-3-2011 by Tindalos2013 because: (no reason given)

posted on Mar, 13 2011 @ 05:26 AM

revolution, Hidden Evil, Mark M. Rich Tactics (Part 1) It has been said that when you're first targeted, they hit you hard in multiple directions. Presumably, this is done so you'll collapse after experiencing recurrent emotional violence, which is compounded after you've realized that all normal support structures and avenues of grievance have been removed. There appears to be multiple levels of intensity of this program that people can receive. The two main parts of the program are group stalking and Non-lethal Weapons (NLW). Both are violent attacks. And some are apparently hit hard with both.

The example above is a simple tactic which groups can use to let you know that you're being harassed in public. But there are many other attacks which NLP can be used for. For instance, you have recently experienced an extremely traumatizing event (which may have been facilitated by a faction of this network), such as an accident, death of a family member or pet, or some type of a brutal assault. Those who have you under surveillance know that there is a color, object, or sound that you've linked (anchored) massive pain to. Then shortly afterward, you are stalked by multiple people who carry that object, wear that color, or utter that phrase. This brings to the surface all the emotional pain you suffered during that experience. Imagine this happening again and again, every time you go outside. Now think what it would be like if your family and friends started to participate.

More about this account can be found at the website thehiddenevilcom under the Other Information section in the menu.
edit on 13-3-2011 by Tindalos2013 because: (no reason given)

posted on Mar, 14 2011 @ 07:30 PM
Mind Rape.

There are certain silent weapons deployed to manipulate human behavior by using subliminal sound and visual messages. A study overseen by the Defense Intelligence Agency into neuroscience and its implications.


posted on Mar, 14 2011 @ 08:31 PM
Eldon Byrd, Ph.D worked as a physicist for the naval weapons center in 1973 and has contributed much to the field of electronic-magnetic technology

posted on Mar, 15 2011 @ 06:03 AM

Herein is the lecture by D.C.Hammond, originally entitled "Hypnosis in MPD: Ritual Abuse," but now usually known as the "Greenbaum Speech," delivered at the Fourth Annual Eastern Regional Conference on Abuse and Multiple Personality, Thursday June 25, 1992, at the Radisson Plaza Hotel, Mark Center, Alexandria, Virginia.

Sponsored by the Center for Abuse Recovery & Empowerment, The Psychiatric Institute of Washington, D.C. Both a tape and a transcript were at one time available from Audio Transcripts of Alexandria, Virginia (800-338-2111). Tapes and transcripts of other sessions from the conference are still being sold but -- understandably -- not this one. The transcript below was made from a privately made tape of the original lecture.

The Greenbaum Spech

posted on Mar, 16 2011 @ 03:18 PM
'Nothing's forgotten....nothing's ever forgotten.' - Robin of Loxley (Michael Praed).

In the third and final part of this research investigation the focus will be on those who have suffered ritual abuse. Some have taken their own lives while others have expressed themselves via creative therapy. And then there are those who remain unknown until it is too late.


Part 3 contains content and images that many will find upsetting. Some links contain content suitable for those aged 21 or over and such links will be marked with !!! symbol.

posted on Mar, 16 2011 @ 03:35 PM
Here are some links to informative websites concerning ritual abuse.

Ritual Abuse FAQ

Concerning how survivors continue to be effected in day to day life.

Cues and triggers

new topics

top topics

<< 1    3 >>

log in