13.10.2012 Views

Monarch-mind-control

Monarch-mind-control

Monarch-mind-control

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

chapter_1<br />

child to highlight the reality of the trauma. The natural reaction of the<br />

child being created is to hate the programmer.<br />

Naturally, the <strong>Monarch</strong> programming had to overcome that natural<br />

tendency, which it does very successfully. The UNIX system uses an<br />

internal clock within its computer system. The UNIX clock is called<br />

CRON. CRON checks files to see if the programmer has put in any<br />

files to run. The UNIX system uses data bus lines, which are like the<br />

<strong>Monarch</strong> programming ribbons, which go through the system. These<br />

ribbons or data bus lines take information and commands from the<br />

computers to other computers.<br />

Within the UNIX system, insiders have revealed that the Daemon<br />

(Demon) processes of all the UNIX systems have a security flaw. That<br />

flaw is that the Postmaster Daemon has access to them in spite of who<br />

the god is of that particular UNIX computer system. So while owners,<br />

who purchase UNIX systems think that they have exclusive <strong>control</strong><br />

over their system, an external Postmaster Daemon coming from the<br />

Beast could use its permission levels to over ride the power of the<br />

local owner of the system.<br />

The <strong>Monarch</strong> system has a similar feature, the Illuminati programmers<br />

know how to access the base or primal anchors to the programming<br />

and yank out any programming they want. All the slaves of these<br />

lesser groups such as the CIA, Church of Satan, Mafia, etc. can all be<br />

reprogrammed rather quickly to serve the Illuminati, if they are not<br />

already due to the Illuminati programmers extra knowledge on how to<br />

get into the base programming. In these many ways, the UNIX system<br />

serves both real computers and also for the internal computers of some<br />

slaves’ <strong>mind</strong>.<br />

The slave’s system becomes a computer system. It functions as a<br />

series of computers that are connected to the master computer which is<br />

sunk into the <strong>mind</strong> at the lowest hypnotic level, which is a level often<br />

placed even below an internal "hell pit". To access the different<br />

computers, combinations of cards were used for the codes (numbers<br />

are also used. See Chapter 4.). Various parts of a <strong>Monarch</strong> system<br />

correspond to what any computer would have. A microprocessor<br />

http://mercury.spaceports.com/~persewen/fritz/fritz-ch11-1.html (21 of 32) [7/15/2000 8:09:34 PM]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!