Valid HTML 2.0!

Most pages on the World Wide Web are written in computer languages (such as HTML) that allow Web authors to structure text, add multimedia content, and specify what appearance, or style, the result should have.

As for every language, these have their own grammar, vocabulary and syntax, and every document written with these computer languages are supposed to follow these rules. The (X)HTML languages, for all versions up to XHTML 1.1, are using machine-readable grammars called DTDs, a mechanism inherited from SGML.

However, Just as texts in a natural language can include spelling or grammar errors, documents using Markup languages may (for various reasons) not be following these rules. The process of verifying whether a document actually follows the rules for the language(s) it uses is called validation, and the tool used for that is a validator. A document that passes this process with success is called valid.

< Previous | Contents | Next >


The Webmaster of Illuminati News Presents:

The Illuminati Formula Used to Create an Undetectable

Total Mind Controlled Slave

by Cisco Wheeler and Fritz Springmeier



The 12 Major Sciences of Monarch Mind Control

I. The Selection & Preparation of the Victim

A. Genetics & dissociative abilities

B. Availability

C. Physical & Mental requirements

D. List of organizations carrying out programming

E. 4 foundational steps for programming

F. Step 1. Spiritual requirements, Moon Child ceremonies, traumatization in vitro

G. Step 2. Trauma by premature birth

H. Step 3. Love bombing/love bonding

I. Step 4. Severing the "core" of the mind

J. Further considerations

II. The Traumatization & Torture of the Victim

A. A site for torture of children, NOTS China Lake

B. What trauma does, the creation of PTSD & DID (MPD)

C. How the torture is carried out, types of trauma

D. How MPD works

E. The Core (1 of 4) [7/15/2000 7:49:23 PM]


F. The Anchoring Experience

III. The Use of Drugs

A. A list of drugs used

B. A brief history of use

C. Applications for drugs to control a slave

IV. The Use of Hypnosis

A. Dissociation, trance, & its historical use

B. How to program with hypnosis

C. How to boost creativity of victim with hypnosis

D. Keeping the mind dissociative

E. Keeping the mind in a programming state

F. Hypnotic triggers & cues

G. Hypnosis in programs & other uses

V. The Skill of Lying, The Art of Deceit

A. Overview

B. The use of fiction

C. The use of lies externally, incl. covers and fronts

D. The use of internal deceptions, incl. the art of hiding things in a system

VI. The Use of Electricity & Electronics

A. For torture

B. For memory deletion

C. For implanting thoughts

D. Electronic communication & control

VII. Engineering & Structuring Of An MPD System

A. Structuring of MPD worlds

B. The creation of roles

C. Building in layered defenses

D. Building backup systems (2 of 4) [7/15/2000 7:49:23 PM]


VIII. Body Manipulation & Programming

A. Scarring the brain stem

B. Split brain work

C. Medical technologies

D. Histamines

E. The use of body programs

IX. Mind Manipulation by Psychological Programming Methods:

Behavior Modification, Psychological Motivation & NLP

A. Observing a satanic family conditioning their children

B. Behavior modification, obedience training

C. Isolation

D. Repetition

E. Psychological motivators, md. pride/needs/wants

F. Neuro-linguistic programming

G. The inversion of pain & pleasure

X. Spiritual Control Techniques, Possession, Trances, Etc.

A. Using spiritual principles against a person

B. How the Monarch program miniturizes what is done on a large scale

C. Dehumanization

D. Fear

E. The use of guilt, shame, ridicule & anger

F. Teaching that the master is God

G. Portals, Focal Points

H. Vows & oaths

I. The use of demon possession, layering in, etc.

J. The use of "angel" alters

K. The misuse of Scripture

L. Theta programming (3 of 4) [7/15/2000 7:49:23 PM]


XI. Internal Controls

A. Teaching occult philosophies & ideologies

B. Internal computers

C. Internal hierarchies

XII. External Controls

A. Monitoring (Asset control)

B. The art of blackmail

C. Bribes

D. The Control of the Milieu E. Bonding & twinning

F. Peer pressure

Appendix I: The Programmers Appendix II: The Programming Sites Bibliography

Search (4 of 4) [7/15/2000 7:49:23 PM]