Beast Computer s

Shadow government

See : Google

[pdf] Defending Sacred Ground: The Andromedan Compendium Biological computers

[vid] Satans Illuminati Beast (Super) Computer Exposed!! 2014 Springmeier, Fritz

Imagine being a programmed multiple, and your handler doesn’t have to even be near you to relay complicated codes and instructions. He can use your implant. But again, how serious is electronic mind-control? Let me relate to you about a guided tour that a civilian friend of mine took through a NWO’s major beast computer center in Alaska back in the 1970’s. The engineer, who was in charge of building and getting the center operational, gave him a tour of the site’s capabilities.

At that point, the NWO had built a massive computer center in Alaska, one in So. Africa (believed to be located at the U.S. embassy in Johannesburg), and one in Pine Gap, Australia. These three sites were very specific, because they formed a triangle on the globe, and couldn’t be located anywhere else, due to the naturally occuring lines of force of the planet. These Beast Computer Centers consist of aisles and aisles of big state of the art computers. They each have several dozen people to run them. Even in the ’70’s, an operator could speak into the computer and it would answer. For instance, if you asked the computer about anyone on the planet, it could usually pull up all kinds of information about that person. If you asked the computer how could you get that person to kill someone? or how can I isolate this person? The computer would spill out a plan almost instantly, telling you all the people around that subject who could be manipulated and in what fashion those people need to be manipulated to cause the end result. This is the end result of years of "BLACK PSYCHIATRY--which means applying psychiatric techniques to manipulate people and nations. These computers electronically connect to some of those people who are electronically controlled, so that the controllers can actually control the world from a computer. These computers also store vast amounts of personal information about people’s thought processes and thinking. It is possible that electronic surveillance is being done to read the thoughts of people and that the computers are actually able to store this information in some usable fashion. Because this is so secret, they can’t give any hints of their vast ability to monitor thoughts, as well as organize and store those thoughts. This sounds like science fiction, but from people who invent & work at state of the art technology, this is actually said to be old technology. They are limited in how they use this technology because they want it to remain secret. 6: SCIENCE NO. 6-THE USE OF ELECTRONICS & ELECTRICITY

This author’s friend, who toured the Alaskan computer center, was shown how a war could be created between any two nations. The operator merely asked the computer what it knew about a certain country and then ask it how could a war be created with a neighboring country. This is the end result of countless studies such as the U.S. military reference book Basic Psychological Operations Study (BPS) which outlines country by country, specifying where each country is vulnerable for PSYOP operations (psychological warfare).

This kind of thing has a long history. For instance in W.W. II, the Office of War Information and the 0SS cooperated in psychological warfare projects. What this author’s friend saw was a network of Cray-type computers, perhaps similar to the EMASS system of Cray computers that E-Systems developed. Such a system can store 5 trillion pages of text and work with that data base with lightening speed.

The reason this author’s friend was allowed to see this technology, was that he happened to be at the right place at the right time, and the Engineer operator of the Beast Computer said that this system was obsolete. Which is true, today’s 9 Beast computers are much better at speech than the computers at these three control sites were in ’73. The Beast computers can (according to another eye witness who used it) hear human voices and determine what language is being spoken and then can listen and answer in that language. These computers link directly to thousands of mind-controlled slaves and can-- via various methods-- almost instantly control the behavior of numerous people. This, along with good old fashioned phone calls, allows the elite to manipulate events very fast. 6: SCIENCE NO. 6-THE USE OF ELECTRONICS & ELECTRICITY

Every person in the world has been assigned an 18 digit tracking number, which consists of 3 groups of 6 numbers. The first 3 numbers assigned in the BEAST computer to everyone are 666.

The next is one’s national code. The U.S. national code is 110. Then the next 3 numbers are your telephone area code, and then finally your 9 digit Social Security number.

The code then is 666 + Nation code + Tel. area code + social security no. = BEAST I.D. no. for an individual.

According to Dwight Kinman’s book The World’s Last Dictator, 2nd ed., (Woodburn, OR: Solid Rock Books, p. 256) VISA has already begun issuing VISA cards using the BEAST 18 digit number. When an American makes a bank transaction on an autoteller within a matter of seconds the BEAST has been informed of the activity. These computers use UNIX. The Illuminati Formula 11. Internal Controls

There are four types of brain waves: alpha, beta, delta, and theta. The four basic models of Monarch slaves have the same names as these four types of brain waves. High level Illuminati models may have programming that includes all of these types. According to one ex(?)-government source, the CIA has been labeling their harmonic-created total Mind-controlled slaves by the following: Bravo 2 series models are men programmed to run the Beast computers. Delta series are models for espionage and assassination. Juliet series are sexual mind controlled slaves. Kilo 5 series is military espionage. Michael 1 series slaves are CIA agents under total mind-control. Operation Greenstar was the Mind-control project to create UFO abductions scenarios. Much of the high level programming in the 1980s and 1990s is no longer done with human programmers, but is done via programmed machines using drugs, electricity and harmonics. The Illuminati Formula 6. The Use of Electricity & Electronics

There are nine secret BEAST computers of the New World Order, at the time this was written. "Big Bertha" is the nickname of the BEAST computer located at the secret military installation called Dreamland at the secret Groom Lake, NV test site facility. Papoose Lake is referred to as S-4. The other super-secret facilities in the area are named S-2, 8-6, and S-66. This area has become the Illuminati’s prime programming facility for turning out Monarch slaves, and the Monarch slaves which are turned out from this area have turned out to be the worst basket cases.

In other words the programming is very severe which is carried out in this area. This area has also been used for the space program, for the U-2 & SR-71, for the CIA’s A-12 spy plane, for the Stealth fighters (Lockheed F-1 17A Attack plane) and bombers, the Aurora, and for the U.S. government’s "Above Top Secret" flying saucers. The Big Bertha computer (named after the Illuminati Mother-of-Darkness Bertha Krupp) can be talked to in half a dozen languages and will answer a person back in the language they speak. The Illuminati Formula 11. Internal Controls

One of the BEAST computers occupies three floors of the headquarters of the European Economic Community building in Brussels, not far from the important Illuminati Mother-of-Darkness worldwide headquarters castle near the Fr.-Bel. border near Muno, Belgium. Another BEAST computer is in Luxembourg. In observing the operations of the Illuminati, it has been seen that telephone area codes are used as part of a mind-controlled slave’s code. We do not understand everything about their codes, but it does tie in with other things that are happening.