DailyDDoSe

PROCEED WITH CAUTION...

Pages

  • Home
  • Let it be known...
  • A Primer in Health Law and Policy by Elyssa Durant, Ed.M. © 2012
  • Ain't too proud to beg...

Monday, February 14, 2011

Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler

DEEPER INSIGHTS INTO THE ILLUMINATI FORMULA

a book by Fritz Springmeier & Cisco Wheeler


Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler

 (source) http://www.heart7.net/mc.html   pdf

In chapters:
INTRODUCTION
1: SCIENCE NO. 1 - SELECTION & PREPARATION OF THE VICTIM

2: SCIENCE NO. 2--THE TRAUMATIZATION & TORTURE OF THE VICTIM 
3.  SCIENCE NO. 3 The USE OF DRUGS 
 
4.  SCIENCE NO. 4 - HYPNOSIS

5:  SCIENCE NO. 5 - THE SKILL OF LYING, THE ART OF DECEIT

6: SCIENCE NO. 6-THE USE OF ELECTRONICS & ELECTRICITY

7:  THE SCIENCE OF STRUCTURING

8:  THE SCIENCE OF BODY MANIPULATION & PROGRAMMING
9:  THE SCIENCE OF MIND MANIPULATION BY PSYCHOLOGICAL PROGRAMMING METHODS: BEHAVIOR  MODIFICATION, PSYCHOLOGICAL MOTIVATION & NLP
10: THE 10th SCIENCE USING SPIRITUAL THINGS TO CONTROL A PERSON

11:  SCIENCE No. 11- INTERNAL CONTROLS

12: SCIENCE No. 12-EXTERNAL CONTROLS
APPENDIX 1 - PROGRAMMERS/RESEARCHERS
APPENDIX 2. THE PROGRAMMING SITES
APPENDIX 3. CLONES, SYNTHETICS, ORGANIC ROBOTOIDS AND DOUBLES

PART 2. HOW HELP COMES ABOUT FOR MINDCONTROL VICTIMS

via whale.to

http://www.whale.to/b/springmeier_deeper.html#

Posted via email from Whistleblower

Posted by Elyssa D'Educrat at Monday, February 14, 2011

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

PROTECTED UNDER THE USPTO AND DMCA

DMCA.com DMCA.com

Pageviews

The Powers That Beat

The Powers That Beat
ELyssa Durant © 2015 || DailyDDoSe™ @ELyssaD™

Just me, ElyssaD™ aka Chillieh 🐧

Just me, ElyssaD™ aka Chillieh 🐧
Jaded traded, shaded by the home. We live, we learn, go stealth and evade IT. ELyssa Durant © 2020

Popular Posts

  • "I got you shitfucks by the balls" || UPDATED POST
  • Why Isn't Cybercrime Worse? | threatpost
  • Hack login passwords and usernames with Bugmenot | Cyber Warzone
  • Google Search - Wikipedia, the free encyclopedia
  • Whistleblower: iTune URLs and 380,000 other pages poisoned || #33137
  • Psyche's Links: 15000++ Links to Esoteric Subjects on the Web: General Reference and Learning: Computers, Software, Social Networks
  • Anonymous, Lulz, and the Politics of Hacktivism

TWEET THIS

Tweet

Followers

WATCHING THE WATCHERS

Archives

  • ►  2023 (1)
    • ►  March (1)
  • ►  2022 (12)
    • ►  August (1)
    • ►  July (1)
    • ►  April (2)
    • ►  February (4)
    • ►  January (4)
  • ►  2021 (21)
    • ►  December (1)
    • ►  October (3)
    • ►  September (2)
    • ►  August (3)
    • ►  July (1)
    • ►  May (2)
    • ►  April (1)
    • ►  February (2)
    • ►  January (6)
  • ►  2020 (34)
    • ►  December (4)
    • ►  November (9)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (3)
    • ►  May (10)
    • ►  April (1)
    • ►  March (2)
  • ►  2019 (37)
    • ►  December (1)
    • ►  November (3)
    • ►  September (2)
    • ►  August (9)
    • ►  July (1)
    • ►  June (4)
    • ►  May (2)
    • ►  March (2)
    • ►  February (3)
    • ►  January (10)
  • ►  2018 (234)
    • ►  December (13)
    • ►  November (23)
    • ►  October (13)
    • ►  September (31)
    • ►  August (22)
    • ►  July (44)
    • ►  June (17)
    • ►  May (16)
    • ►  April (14)
    • ►  March (17)
    • ►  February (13)
    • ►  January (11)
  • ►  2017 (227)
    • ►  December (39)
    • ►  November (16)
    • ►  October (35)
    • ►  September (25)
    • ►  August (13)
    • ►  June (3)
    • ►  May (20)
    • ►  April (16)
    • ►  March (17)
    • ►  February (40)
    • ►  January (3)
  • ►  2016 (11)
    • ►  December (1)
    • ►  October (3)
    • ►  June (2)
    • ►  May (1)
    • ►  March (2)
    • ►  January (2)
  • ►  2015 (19)
    • ►  December (1)
    • ►  November (8)
    • ►  October (1)
    • ►  September (3)
    • ►  August (1)
    • ►  June (2)
    • ►  May (3)
  • ►  2014 (7)
    • ►  November (3)
    • ►  October (1)
    • ►  July (1)
    • ►  April (1)
    • ►  January (1)
  • ►  2013 (749)
    • ►  December (43)
    • ►  November (13)
    • ►  October (10)
    • ►  September (9)
    • ►  August (22)
    • ►  July (33)
    • ►  June (26)
    • ►  May (5)
    • ►  April (108)
    • ►  March (110)
    • ►  February (108)
    • ►  January (262)
  • ►  2012 (3423)
    • ►  December (137)
    • ►  November (86)
    • ►  October (169)
    • ►  September (380)
    • ►  August (415)
    • ►  July (397)
    • ►  June (460)
    • ►  May (271)
    • ►  April (350)
    • ►  March (219)
    • ►  February (352)
    • ►  January (187)
  • ▼  2011 (4195)
    • ►  December (327)
    • ►  November (212)
    • ►  October (60)
    • ►  September (268)
    • ►  August (628)
    • ►  July (421)
    • ►  June (613)
    • ►  May (366)
    • ►  April (336)
    • ►  March (259)
    • ▼  February (401)
      • Conversation
      • Spot on @badjerry L88K "worms"
      • Conversocial & the Benefits of Social Media Manage...
      • 22 Social Media Management Tools – A Wiki In Devel...
      • The Importance of Engaging Your Twitter Followers ...
      • Social Media: Signs of Addiction | B2C Marketing I...
      • 60 Signs You’re Addicted to Social Media & Twitter...
      • The Post With All Of 2011′s Tablet and iPad Market...
      • Klout Doesn’t Measure What Really Matters | B2C Ma...
      • Social Scoring and the Business Case for Blocking ...
      • Feds seek new ways to bypass encryption | Privacy ...
      • Configuring email notifications to be friendly but...
      • Mobile device security challenges | #Israeli Softw...
      • Elyssa Durant's photos - @firetown beam me up @Spo...
      • Q&A - Asperger's syndrome - ABC News (Australian B...
      • Conversation aka TROLL TRAIN
      • No mention @leahita @CelticFire69 and @elyssad
      • @badjerry L88K-- GRANT FOR HACKTIVISTS $11,000 - ...
      • Iranian cyber army strikes again hitting Voice of ...
      • HACKED UNITED STATES IP: What it something I said?...
      • Security - Whitepapers - ZDNet Asia
      • Next iPhone to enable remote computing?
      • Apple overhauling iPhone notification system?
      • The unvarnished truth about unsecured Wi-Fi - Secu...
      • Mobile broadband is killing free Wi-Fi - Communica...
      • Legitimate Web links haven for cybercrime - Securi...
      • App-Rising: Who Will Fix America's Broken Broadban...
      • App-Rising: Why Broadband Utilization Matters More...
      • App-Rising: Maslow's Hierarchy of Broadband Needs
      • App-Rising: Google Goes To Bat For Fiber In A Big Way
      • API of the Week: Convert HTML to PDF with Joliprin...
      • Wi-Fi Alliance: What is an "Evil Twin?"
      • CyberSecurity Experts!
      • Firetown AND Rockingjude Hacked ?
      • Jewish iPHONE has VIRUS
      • #iDEFENSE #JIDF #Mossad
      • SOG, Mossad, NASA, Orc [Echelon]
      • Me thinks doth protest. Too much
      • #eDEFENSE from #iDEFENSE round 4
      • Conversation thread - #eDEFENSE
      • Suspect! #eDEFENSE very suspect
      • Well fuck a duck! @JIDF "DAVID" #Israel #Mossad
      • @firetown, 2011-02-18 05:49 #NWO
      • Suspect
      • Dated 1/29/2011 why is @kraobot still here ?
      • Wrong Vaxen #TennesseeWaltz
      • TakeOwnership SeImpersonate Privilege IP 127.0.0.1...
      • It's official. Twitter CyberWar 2010 part A
      • Decoder ring please?
      • Conversation hijacked
      • The Anti-Christ ?
      • 60 Signs You’re Addicted to Social Media & Twitter...
      • Twitter / Elyssa Durant: || eDEFENSE
      • Microsoft Bans Open-Source Apps from Marketplace
      • URL Shortener Hijacks Browsers for DDoS || ALERT
      • Hacker War Rages in Holy Land || iDEFENSE || Israe...
      • Israeli Hackers Vow to Defend
      • Hackers Ascend Upper 'Echelon'
      • Iran Blames CIA, Makes Arrests in Nuke Scientist S...
      • Mossad Hacked Syrian Official’s Computer Before Bo...
      • New Clues Point to Israel as Author of Blockbuster...
      • Blockbuster Worm Aimed for Infrastructure, But No ...
      • Did a U.S. Government Lab Help Israel Develop Stux...
      • Surveillance Footage and Code Clues Indicate Stuxn...
      • Cyberwar Issues Likely to Be Addressed Only After ...
      • Cyber Command: We Don’t Wanna Defend the Internet ...
      • Military’s Cyber Commander Swears: “No Role” in Ci...
      • Prospective U.S. Cyber Commander Talks Terms of Di...
      • It Begins: Military’s Cyberwar Command Is Fully Op...
      • U.S. Cyber Command: 404 Error, Mission Not (Yet) F...
      • Darpa Gets Big Bucks for ‘Cyber Tech’ (Whatever Th...
      • Latest Pentagon Brainstorm: Nuke-Powered War Bases...
      • The Art Of Retweeting | B2C Marketing Insider
      • Is It OK To Fake Your Tweets? | B2C Marketing Insider
      • @firetown as per your request, here is the proof r...
      • Today’s threat: computer network terrorism
      • The Armageddon of Cyber Security
      • What is Higher than the CIA?
      • ACLU Submits Testimony To House Hearing On Interne...
      • Internet ‘Kill Switch’ Legislation Back in Play | ...
      • ACLU Releases First Concrete Evidence of FBI Spyin...
      • Darpa’s New Plans: Crowdsource Intel, Edit DNA | D...
      • Darpa’s New Recruits: You, Your Grandpa and Your D...
      • Shadow Wars Get Big Bucks in Last-Minute Defense B...
      • Pentagon’s Clandestine Killers Get New Chief | Dan...
      • Government Uses Social Networking Sites for More t...
      • Did a Spy Flap Stop the Drones From Blasting Pakis...
      • Latest Pentagon Brainstorm: Nuke-Powered War Bases...
      • Go Inside the $56 Billion ‘Black’ Budget | Danger ...
      • Inside DCSNet - FBI's Nationwide Eavesdropping Net...
      • Inside DCSNet, the FBI's Nationwide Eavesdropping ...
      • FBI Pushes for Surveillance Backdoors in Web 2.0 T...
      • Senate Extends Patriot Act Spy Bill | Threat Level...
      • Feds Seize 18 More Domains in Piracy Crackdown | T...
      • Spy Games: Inside the Convoluted Plot to Bring Dow...
      • Psychotronic Weapons - Brain Manipulation From a D...
      • The State of Unclassified and Commercial Technolog...
      • Cyberwar Hype Intended to Destroy the Open Interne...
      • @RadioYerevan, 2011-02-18 06:51 kraobot
      • Mitigating Security Threats Through Forensic Psych...
    • ►  January (304)
  • ►  2010 (1263)
    • ►  December (173)
    • ►  November (426)
    • ►  October (70)
    • ►  September (134)
    • ►  August (155)
    • ►  July (68)
    • ►  June (104)
    • ►  May (78)
    • ►  April (1)
    • ►  March (54)
  • ►  2009 (5)
    • ►  November (1)
    • ►  September (4)

Search This Blog

Elyssa D. Durant © 2020 All Rights Reserved || DailyDDoSe™ @ELyssaD™. Powered by Blogger.