Recognizing and Classifying Programming
A discussion by Pamela J. Monday, Ph.D., LPC and
Denny Hilgers
(Note from the authors: The purpose of
this article is to assist interested parties in recognizing and
identifying the complex nature of mind control programming.
While therapeutic techniques are mentioned, it is assumed that
only experienced therapists under expert supervision will use
these techniques, and only in the context of ongoing
psychotherapy.)
Many Sadistic Ritual Abuse Survivors who have
been diagnosed as having Multiple Personality Disorder
(SRA/MPD), have been programmed in systematic, complex ways. By
programming, we mean that the human, in a dissociated or altered
mind state, has been systematically and deliberately taught
lessons, attitudes, beliefs, behaviors, and responses to
specific cues ("triggers") so as to respond on command
in ways that benefit the person/groups responsible for the
programming. There has been much controversy about whether the
human mind functions as a computer; many clinicians believe that
it is impossible to "program" the human brain.
However, we have learned from survivors, including those whose
job within a cult/organized group, was to "program"
others, that indeed, it is possible to instill very complex
information in the unconscious mind, and to use this information
to ensure control of the human by controlling the mind.
Survivors have told us that a group of
programmers may travel from location to location, teaching
members of various "cults" or other organized groups
how to program their victims so as to ensure optimal mind
control. By programming an SRA/MPD’s system, the programmer
can maintain constant contact with the survivor. This contact
permits knowledge of a victim’s location at any time and also
allows manipulation of the victim to perform acts he/she would
ordinarily be unwilling to do. Programmed mind control
reinforces the lesson survivors tell us that all cult victims
are taught, namely, that he/she cannot escape from the cult or
perpetrating group. The programming is done in very complex ways
so as to maximize the use of amnestic barriers between
personalities, thereby preventing any one personality from
having all of the information about how they are being
controlled. Knowledge is power; by compartmentalizing knowledge
throughout the system (i.e., the mind), the programmer or
programming group has power over the victim. Reducing amnestic
barriers between personalities so that they can cooperate and
share knowledge; finding the original memory of how the
personality was created and thus uncovering the programming
information (including how programming was done as well as
perpetrator identity and triggers); and using imagery, cognitive
restructuring, and other empowering therapeutic interventions to
help the patient get back control over their own mind are all
basic therapeutic goals. However, the sophisticated programming
that we are seeing in some survivors makes our task very
difficult.
Programming occurs after the creation of a new
personality via the usual techniques of trauma and torture.
While there is some evidence that with sophisticated computer
equipment that creates altered states of consciousness via audio
waves or manipulation of the visual field, a trauma base for
programming is no longer necessary, the vast majority of our
patients will have personalities created through torture.
Survivors report that one form of programming involves the use
of a physical image, for example, a picture or portion of a
video. In an hypnotic state, the personality readily accepts
this image as reality in his/her life. It is speculated that the
"internal landscapes" that patients see inside have
been created in part through the use of these visual images that
have been internalized as reality. This may explain why
survivors have similar "landmarks" within their
internal landscapes such as a castle, carousel, Kabul, umbrella,
puppet, cave, etc., that, when drawn and compared with the
drawings from other survivors, look very much alike in design
and detail.
Many survivors report that they have internal
computers that control information within their systems (this
has especially been reported from survivors who report
"military" mind control programming). The internalized
computer usually lies deeply hidden within the unconscious but
over time, its presence may be revealed to the victim. As
communication between personalities and between levels proceeds,
someone inside may know about the Internal Programmer, or
Information System Specialist, the Controller, or simply the one
who’s job it is to program the system. Within the internal
computer, grids and "clone" grids (or duplicators)
house the different programs. Visualize a piece of graph paper
(grids) with the space within each square having several
programs within it. "Clones" are back-ups, so that if
an entire grid, or even one program, is neutralized
(deprogrammed), a replacement is spontaneously generated. Thus,
it is vital that the duplicators be dealt with as programs are
erased or decoded.
Within a complete system, there are usually many
levels and combinations of programs. The victim most likely will
have no knowledge of their internal programmer because as
programming commences, erasure codes, block codes, stop codes,
and "brain switch" commands (having to do with
right/left hemisphere functioning) have been put in to prohibit
disclosure of deeply buried information about the internal
computer. On each level, there most likely will be a computer
and a back-up computer. As communication between personalities
and levels increases, it is possible to obtain the different
codes from controllers inside the system on each level so that
"deprogramming" using codes (such as number, alphabet
or rhyme codes) can occur. This can be very dangerous, however,
because there are booby traps and safeguards within the system
that are programmed in to prevent any outside source from
getting into the system.
It helps to think of the programming as a very
sophisticated Nintendo game, where there are many levels,
secrets, and hazards. It is vital to proceed with caution, and
with the full cooperation of the client, as only they can know
where the dangers lie. Understand that as you get close to
secret or hidden information that will help you move deeper into
the system, the danger of internal or external harm to the
client increases. Suicide programming will often be set off, and
should be expected.
Survivors report that programmers place
"Gatekeepers" and "Blockers" in the system
to protect hidden information, often by keeping you from
reaching the inside people who can help decode the system. These
must be found and removed in order to proceed with therapy. They
may be identified by direct questioning, or they may appear as
"guards" in the internal landscape, standing by a door
or wall, or literally in front of a gate or other physical
barrier. Some of these gatekeepers and blockers may be
personalities or they may be perceived as "spirits".
This is especially true with individuals who may have been
abused by groups purporting to worship Satan. (For a Biblical
understanding of the role of gatekeepers who block the
"doorway", See John 10). The use of imagery to bind or
enclose the gatekeepers is often useful.
If the gatekeepers see themselves as spirits,
they can be particularly difficult. They may present as
individuals who are just "passing through" the body,
and are not afraid of harm to the body because they will
just" go to the next body." Sometimes they present as
very aggressive; at times these aggressive ones may be
personalities who are projecting themselves as spirits because
of their deep guilt; identifying with the "evil"
spirit is a way of gaining mastery and control, and should be
dealt with in typical therapeutic fashion. If your therapy
includes knowledge of and use of spiritual information and
imagery, this would be a good place to use it.
Some of the booby traps you may run across
include personalities whose job it is to direct you off course
and provide false information. Others may ask you questions or
try to get you to ask them questions (making you think you’re
getting somewhere) only to find that what they are doing is
setting a suicide or self-mutilation program in motion. An
example is a client who, when she heard the phrase, "Why
did the chicken cross the street?" would self-destruct.
Another asked the therapist, "How old are you?"
(response) "When’s your birthday?", etc., and the
answers were triggers for the internal self-destruct program.
The personality asking the questions had no knowledge of why she
was asking them, only that she "had to".
Many MPD patients report having a
"stairwell system" internally. The stairwells are what
connect the different levels. Sometimes the internal people will
locate a stairwell that is sealed up, and a gatekeeper is there.
Deal with the gatekeeper, break the seal, and proceed down to
the next level.
As you proceed through the levels, you may find
that at the first couple of levels, you will get much flooding
and spinning. The programs you may be dealing with are the
"Tornado" or "Whirlwind" programs. The
tornadoes function to create confusion and disorganization and a
sense of being lost, being out of control. Tornadoes float
around the different systems. Visual imagery of walls around the
tornadoes to enclose them has often been useful. The
"whirlwind" spins inward, "sucking one in"
instead of outward; the result is to create a sensation of
shutting down, shutting up, and feeling as if the person is
going to die.
The various systems that have been reported and
worked by these authors include differing levels of complexity.
Systems include: Spider Web, Carousel, Pool of Death,
Communication, Kabbala, Puppet, Pentagram, Tornado, Castle,
Galaxy, Flower, Scrabble, and Umbrella systems. Associated with
"military" mind control programming are: Double Helix,
Solometric, Cave and Well, and the Mensa systems. Space
limitations prevent discussion of each of these systems, but
illustrations of the difficulties in working with some of these
systems follow.
The Pentagram (or star) system is often
connected to the Tornado system. Rituals are tied to this
system. There are many cult-created alters within this system.
You may see personalities who are re-enacting rituals (such as
attempting to kill the host’s cat, etc.) Traumatic memories
reveal Satanic ritual abuse themes.
The Castle system involves internal imagery of a
castle containing a drawbridge, moat, turrets, gargoyles,
dungeon, secret passageways, torture chamber, and lots of rooms.
Child alters are often hidden in the dungeon. Lots of programs
can be contained within the castle, and many booby traps can be
present that must be overcome.
The Spider Web system is very complex.
Communication between personalities proceeds through the
strands. In order to break the negative communication, the
strands must be broken, but understand that the internal
self-helpers often also must communicate through the strands.
You will often find a black widow spider (symbolic of the
"black widows" used by Satanists to recruit new
members, especially in churches and in clubs where youth
congregates) with victims getting "stuck" in the web.
Viper is a spirit associated with this system (see Isaiah 59:5
for the Biblical basis of this system). Gatekeepers are present;
you may also find eggs, personalities names "Viper" or
"Devourer" or those who binge and purge. In order to
break this program, it is important to break the connectors (the
silk strands) that connect the webs and hold them in place;
remember to destroy the clone strands so new webs can’t be
spun. In this program, the clones immediately spin new webs that
are double connected and more difficult to remove. If the
"viper" is present, the tail and fangs can be removed
(they contain poison) and the poison in the eggs can be removed
(trapped personalities as well as "demons" are often
found in the eggs).
The Flower system involves criss-cross
programming, i.e., three or four people may have been programmed
together so that one person only has a piece of the programming.
In order to get to that piece, you must have access to the other
piece which resides in another person. Internally, the flower
system may show up as flowers with lots of colors, with the bud
representing one person, the stem and flower representing other
people. This system is often connected to other systems such as
Pi, Umbrella, Triangle and Star.
The Mensa system (reportedly involving military
and Illuminati programming) involves lots of numbers and
sequences along with bar codes and union force codes. Union
force would have to do with a set of numbers that would equal
another set to come up with yet another set: e.g., a+b=c, b+c=a,
c+b=a. A person could be programmed to respond to this very
complex code. These codes are extremely difficult to discover in
order to neutralize responses to the codes. The Mensa system
will often have the Double Helix system within it. This system
is connected with DNA; the patient has usually had lots of blood
transfusions. Programming reportedly has been done through
medical abuse by hospitals and doctors. Hospitalization is
generally required to work with this system, as it is so complex
and so may suicide programs are involved.
The Carousel is usually found in the center of
the Double Helix. Within the carousel there are mirrors and a
shadow system. There is a key in the center of the carousel. The
carousel spins and moves up and down repeatedly. The function of
this program is to add confusion and avoidance. The mirrors and
shadows are within the carousel which help prevent further
deprogramming. Often the use of special light to light up the
right path through the mirrors and shadows in order to reach the
key has been helpful. Spiritual Interventions can be helpful
here, as three "floating spirits" (False Prophet,
Hoofed One, and Dragon) are frequently found in this program.
The Scrabble system contains letters, numbers,
and mathematical exponents. This is a very detailed system, with
no room for error. A sequence of numbers or letters might set
off this programming. For example, if the therapist writes a
series of numbers such as "31133113",
"13113311", or "11331313", and the patient
responds to one or all of these series of numbers, you may have
the Scrabble system. There is a lot of torture and trauma
associated with this program because it is so sophisticated and
difficult to learn. As programming proceeds, any mistakes made
by the survivor will be severely punished.
If
you are going to work with ritual abuse survivors, you
must also get educated if you want to be effective. And
you must learn to be humble. Trauma survivors do not need
to be around ignorant, modern-day Pharisees. Survivors in
pain need people who will connect with them on an
emotional level, get right down in there where they are,
and listen. --Kathleen Sullivan |
|