Egyptian Floes during Armageddon Part III

Continued news from an observor of Armageddon

As previously mentioned in a prior post there was an asteroid or comet going by the name of Apophis, which is the Greek name for Apep, the Egyptian snake/dragon demon, In today’s news . There was mention of an asteroid ‘heading towards the earth” which bore the shape of a skull/ for “an eerie Haloween Flyby’.. Source UK. Mirror Oct. 31, 2015

New information – Egyptians

New information has been gathered about the perpetrators in this Millennial technological apocalypse waged by Quantum computer. Michael Aquino’s mother, Betty Ford, was High priestess of the satanic Temple of Set which turns out to have its origins in Egyptian mythology.  The Temple of Set High Priests have Egyptian names.They claim that the origin of their cult name is based on an entity they refer to as “Set’ However, Set is not evil in Egyptian religious myth, instead, Apep – a  snake/dragon – is and so is an entity named Seti. I believe this is the true  source behind this cult.

Interestingly, in recent news a meteor is threatening the planet and the name given to it is Apophis; Apophis is the Greek name for the Apep mentioned above.

This is important because of the role that Michael Aquino plays (claiming in some circles that he is the Antichrist) and *who* is really behind his satanic/Egyptian  organization   Seti’s family members names were Ramses,  I, II and III, Apepi, Hatsheput, Hathor, and the Ptolemeys I, II and III. These entities can be traced to King Herod of the time of Christ and who was behind the ordering of his crucification\

It is also curious that the name SETI stands for The Search for Extraterrestrial intelligence. There is a theory that the reason for the success of the opposition came from another world and that they had access to’alien’ technology

In the 18th dynasty Egypt a spiritual war took place. The  principle of Good at that time was named the Amun and Amen Ra. The principle of evil was the Aten or Apep\

A little known theory is that Amen Ra was a matriarch of a vast spiritual belief system that was so kind and loving it would reduce the normal human to tears/ Some believe that Pharoah Tutankhamun [Tut] was actually a female and was the individual named above/ some spellings of hir name are Tutankhamen/ When the word Amen is used to close a prayer that are referring to Amen Ra\

The competing group and enemy at that time, whose front name was the Aten, were reportedly Voodoo practitioners from the neighboring African states whose roots some believe go clear back to the dinosaur days/

On close examination it appears that the Aten has rewritten history and tried to replace the Amun and Amen Ra as both ‘God’ and figurehead throughout the country of Egypt and in popular literature , including replacing the female face on the Sphinx with his own.

The news recently reports that DNA research also includes reserecting ‘mummies’ from Egypt/

working draft preview for the public

 

Introduction 

We are in a Simulated Augmented Reality  We are no longer located in the space  time  we once were but it appears that the planet has been teleported by Quantum Computer Technology by an alien race  Details are available in a future document There is a Pseudo light source which passes for the Sun and the Moon but it is not our Sun or Moon We are not located in the same space and time that we were in 2008 Instead it appears that we are in an artificial greenhouse with in an astral  field Various alien groups are playing Gods in this program and want the power of life and death over their victims  The perpetrators  are brutal  animals with various degrees of intelligence and some speak English  Their  physical forms vary based for several reasons

There are Black Magic practitioners who create forms to frighten others but there are also aliens who appear to be in their original form These vary but to date this writer has witnessed abusers in the form of insects, bees, flys, spiders,    and even ancient dangerous reptiles like peradactyls and others    [This is important because the basic element to these alien weaponry is in the form of a claw] Some aliens have been identified as Orions – the females refer to themselves as the Hive who are female insects in the form of bees  Interestingly many of these forms themselves can be taken apart by the procedure described below

Some of these alien aberrations might have been created from a military Darpa program gone awry named  Mems [Hybrid Insect Micro Elecro Mechanical System]  outside of their knowledge Other forms might be the results of a DNA research study bringing back prehistoric life  The prevailing agenda appears to be  Antichrist which is simulating an Armageddon technologically The book of Revelations prophesizes locusts  [Mems program] in the book of revelations prophesizes locusts that men would want to die but could not [Mind Uploading]  that there was an angel and a name apollya  that there were half men and animal [hybrid]

They sometimes torture their victims who might even experience a death process and then they will try to ‘fix’ them or not after which the target is at their whim again until rescued They also use this program for mind control purposes

 

 

 

 

These aliens are  victimizing the public and others via Virtual Reality data gloves and nanotechnology This nanotechnology expands and there are dangerous programs  in our environment including our food and water supply The aliens commonly  place victim targets in video games both private and public on television stations and then hit them repeatedly in the face or head,  hurt their faces with razor blades, blow them up and then laugh like they are school children This can be corroborated by visiting my local library in San Carlos in the children’s video room where violent games are played

To date the alien demons appear to be operating from a location which has a metaview similar to good maps on the internet  I am located in San Diego, have traveled 200 North and East  The program is there as well 

 After identifying a target they capture them in a central location and divide their minds via a mind uploading procedure  Their ‘body code’ is obtained usually through  sex via a lure this writer has named Jezebel

The aliens have a protocol for making weapons and torturing people via their data glove and the powers that they serve The following are the components they use and information gained to date The implements used consist of the following A data Glove keyboard and Computer, a device used to capture torture or mind control states  if the perpetrator wants the victim to act in behavior they either cause or wait for the victim to make a behavior once or twice they put the victims behavior in the quantum field in the faucet device and under the keyboard  the alien will then push a button and the victim will find themselves engaged in behavior even against their will

1 The Field – The field consists of objects and devices in an astral field which responds to imagination and visualization. The aliens are abusers who take their victims apart so one will see body parts built into objects objects in this field is built upon the abuse of others The field has taken the appearance of a web because there are spiders within it and other insects inhabiting it  

The texture of the field is whatever the party wishes it to be This can be by the usage of the mind which skilled meditators can access or by adding a physical element such as water or material The aliens are unprepared for natural substances to be in this field  The following objects are found within this field which this writer has learned to dismantle a Shoulder joints arms and hands They are  narrow strips of fabric aliens use to travel on and hoist objects b tripod is build into this form which expands and contracts There is a small hand to the right middle of this object when released closes the triangular shape and makes a square ?  Aliens sometimes travel on a wheel on a track or they put this track into people d There are cylindrical objects with coil, Hypodermic needles e Circular objects with arms and hands hanging from them f bouncing  Helmets    Containers  razor blades                                          

The entire community has been divided with razor blades in either claw form or in the form of a sickle This is important because movement is constricted if these razor blades are not removed  just move them to the side with ones hand

A There is a 2 inch form which has been folded and has ridges on it with hypodermic needles attached Victims might be found within the folds of this form  A strategy needs to be developed about how to rid the field of these needles 

B There are cylindrical devices with metal mesh in them  the aliens will sometimes drop the metal in this object which  causes energy forms to fall Look for these objects  to dismantle

C There are concentric rings which the aliens use to ricochet themselves off of and move throughout the community  These circles can be found in the sky and underground

D On street corners and throughout the roadway one will find arms along with an elbow joint There are also concentric forms which have 4 arms and hands hanging from them This form is the base of most of the forms built here including nanotechnology The release for this form is on either side of each hand between thumb and forefinger On release the hands will withdraw leaving only the ring The ring and a release on the side  

E There are metal springs underneath objects which causes the field to move and objects to bounce  Make the metal disappear the field will also move because someone commonly inserts their foot into the center of a space and moves it

Each of these forms have specific shapes The perpetrators can be found in book and, clothing. But they require that the shape of the clothing or material objects conform to their premade shape

Components  The data glove,  keyboard, and Computer-

Data Glove – The design of the Data Glove is an alien design  which is literally a claw/hand shape with razor blades in the knuckles which are placed   longitundinaly  When facing the glove there is a small glove or hand found from left to right inside the main Data glove Inside the glove to the right is a field  or a simulated reality which the aliens can place people inside of after capture The data glove itself has several safety releases which dismantles the glove and moves the alien out  The release for the can be found in the space between the thumb and forefinger of the large glove and the small hand  inside

Inside the glove to the left is a copy of the person they are targeting to the right is their physical code Some of these forms have interlocking claws facing each other in both directions north and south

This claw with a razor blade can be found in most designs of forms and programs  In the food supply and water this is dangerous

Keyboard   The alien keyboard appears tnormal at first sight  The aliens attach the victims by their heads underneath the button of the keyboard in some state of torment after the alien has entered a code 

 

 

When deciding what abuse scenario they wish to repeat the aliens make three devices so that they can create a data glove entry, assign that abusive repetitive scenario to an alien and implement mind control  There is a large box which looks like it has speakers  To the bottom right there is a faucet looking knob  which houses the victim in a torture position with the quantum state it occurred in along with surrounding objects To release the victim take him or her physically out of the object  and release them from the claw usually attached to the top of their head  A vertical release switch is found behind the victim  press it inward for a minute or so The box itself has a release switch to the top right press it down  Its important to release the victim before dismantling  the box

 The data glove which houses the alien who projects the torture scenario is found to the right of the box or hiding in a field going the opposite direction  Presently they have wires at the top of their head along with two hands  The wires are for communication Disable the wire by cutting it in half

Important disable the entities with wire at the top by separating their hands and arms

8 Protocol for entering virtual reality ‘data’ (behavior abuse or mind control) into the environment

A claw or hand with or without a razor blade along the top

A series of three forms that allow a data hand and torture to be implemented

One of the forms to the left of the torture is a faucet type knob which holds the quantum field and event ithat the alien wants to use There is one safety release on this form which allows the energy field and form to revert back to previous state On the side of any device seen there Is another release valve pull both of these forward until feeling the energy release

Victims can be found inside glove to the left ??

Ways they capture victim/targets

Someone is a wire head and hands outstretched puts on a glove  with goop gel in it she then grabs the victim and captures in that substance and has a ready made device that holds their feet down and imprisoned  There is a claw at the end of this device  release the claw and the legs free?  Extricating from the substance is to be worked on

They have hypodermic needles  everywhere serves dual purposes  they inject their victims with agents drugs and the needles can imipr

 

To date perps have rules to follow they have 3 seconds to make the above three items or their times out  If the programs floats or an object does not land they are also timed out   if a vacuum is caused by water or air they also time out  whether that is due to their accessing computers illegally and the above causes an oversight agent to see or their computer is on automatic or they follow rules of some game is unclear

Wire at top two hands uncross them

 

The Victims

 They usually keep their victims in a headlock configuration trapped by a razor blade

 

 

 

 

 

 

Technological possession

They can access human bodies from their program sight unseen  I’ve seen snakes insects and other animals enter people on all levels One group of animals were staged under toilet facilities to enter peoples rectums

 

Asault by animals via this program

Battery pack femalesmcommunicaton wire foundhidding in forms


Disable wire which is for communication signal and access signal and uncross hands disable hands by pressing between thum and forefinger their ‘battery pack’ goes

Cameras – They often operate by using television and other cameras even within homes to overlay abuse scenarios onto one level after which they will withdraw

Air or Water to damage quantum deviceor data glovestops them for a day so repairs can be done

l

A program to the left called the Apep program which consists of nanotechnology In this program lies raor blades that are used to cordon off rooms One room is for torture  Another room is for sex to take placeOther rooms consist at the whim of the perpetrator  a Victim is usually found within these rooms no matter how many times that program is made Every time a new automatic torture or mind control is to occur one will find these three forms at the left of the behavior

A keyboard under which lie victims and at which the alien types in a command

{IF the alien wants others to have sex in certain positions he will make the position happen or watch while it naturally happens and then take the participants and place them in the faucet looking object if the alien wants sex in that position to occur anywhere he will simply push the button of the original setting and that form will commence that activity and to his or her surprise be in that position without the ability to stop it    If the alien wants another behavior to occur or wants torture to occur when others ar engaged in behavior which has been entered in the data field torture will commence]     

A

Aa  Data Hand   After the series of events has unfolded in which the alien decides what quantum event he wants to enter into the data base  a data glove is formed  with that event inside it as well  the perpetrator then can create torture scenes as many times as he wants with that data glove   The Victim is inside that glove  His or her mind and physical energy field has usually at that time been captured by the alien

 

Mind Uploading and Physical Energy After a victim or co offenders  mind is located and entered into the data base the physical energy will be as well  Recently there was a Sex project in which the aliens duplicated an orgasm and then regardless of if the victim had  sex life or not his or her sexual energy would be found by the usage of a lure who they wanted to have sex with usually after mind control  The lure is a simulated being who was created based on the looks of a famous female movie figure  This personality was given the victims esoteric body which was isolated coded and copied her physical energy and pieces of the victims genital anatomy After the male sexual response was identified that respose would be placed into a data base  Anytime the alien male or female wanted to have sex the victims ‘penis’  ould be inflated At Times the male victims are hobbled and are not given movement of their legs but are shuttled from place to place on their penis

The Female Genital Canal   While witnessing the sexual response by a victim who was capable of avaginal orgasm viaaa “G” sthe perpetrator would put 0probes into her vaginal canal to copy the energy or code the energy so that anyone with that probe would fill the same response  The vaginal tract in this program which was created by a Black entity who knows folks magic consists of the victims hairbrush hair energy copy of the victim in the hairbrush  several energy probes a spider a spider web like interior  at times masked by a thick substance which enhanced the experience

The spiders are in some cases manufactured in others cases they are real They appear to be tarantulas  They have been staging themselves at grocery stores and then consuming their prey afterwards leaving whats left over and putting that into our food supply

The spider forms have been hidden after their rampage 16 months ago in the community They are now present and hide their  legs with electric cords arms legs and elsewhere  they do not like water  they are making a circle shape and then their legs are to the left of the circle  ??  head to the top  they are catching victims in eyes to date but check for legs thorax and elsewhere if possible

That victims mind can be duplicated from the original main entry or mind uploading   That means that the perpetrator can section of the mind or project their mind and body into duplicate copies and create torture settings in numerous locales with the victim suffering known or unbeknown by the original core self  The individual may experience themselves dying and then reawakening or not somewhere else if they retain consciousness

Settings found to date include dimensions in

Mirrors, Cars, lights, bowls, reflections, clothing, books, magazines, videos, underground, mountains, tv monitors in restaurant  grocery stores, all stores Tableware from Kitchen  glass plastic silver Money  often place hot substance in middle which might be hot with needles, bags from grocery stores, cups, razor bladed with programs, bar codes in grocery stores, products, entrances in mats in grocery stores tracks people

 Another finding  what catches people on the ground sticky substance  discovered release on left bottom and right to earth 

 

 The tracking device can be slowed by extending the form as it is doubled usually with a victim inside extend and it stops

,Plastic Bags They take bar codes from anywhere and place a hot substance under it and Place Victims near it

 

Razor blades in field everywhere   around every item in grocery stores including grains or contents of packages programs in food and water dangerous animals in nanotechnology which expand when the perp wants that may mean in the mouth or the stomach  even in water supply  they have a gel like substance in their programs that is in the water  this substance after hardening can cause choking

 

Map of the Community   the perpetrators operate either via a Master computer such as Google or Blue Brain that allows an overview of the community or the perpetrator might have jurisdiction over a locale  or in my case the program is inserted in my inner eyelid

 

 

Allow for some alien reaction  or changing design of form

 

  Three forms are to the left of the quantum field

How the black  compact device is made

A claw sideways over the top a show put in from left to right

Sinkholes can be turned sideways top of form are two claws perhaps symbolizing mr and mrs alien bad guys

Ready made gloves inside be cautious about what might be inside space between thumb and finger  now Ifind a victiminside a sack of some kind

Skulls appear to be two claws and an arm with prong at top to trap victim

Claws over sky mountains are made out of them so far all components of shapes are combination of claw shape razor blade under razor blade at knuckles is a victims face perhaps a tentacle shape

Main release switch on side of form demanifests the entire form I believe not sure

Has to be taken down in the right order to be cautious about victim safety

Hereabouts of targets

Books in libraries

Television programs

Radio programs

The environment

In insects

In monitoring screens in Grocery stores and sport bars

In food , drink,

In the roadway, under the roadway

In dimensions in tinted glass in cars sometime dragged or transported there via a room or a roaday and then through a wall  I’m seeing this routinely  The victims are thrown into passing cars along with a program

In TV satellite dishes  Was told that aliens need a radio signal and have taken up the signals on normal

Radio which is why they started their antenna program perhaps

 

DEmanifest Communication 

 

 Pain management

Perps causes Sucking action causes pain in the head neutralize by moving the perp or even causing a suction motion to remove perpetrator

Exorcism

Tongue  take their tongues  I have found both victims and upon removal the perp has said their evil was in their tongue and thanked me

Remove blackness from them lift it up or lighten it with the mind the perps have said they feel less evil

 

Remember specifc mental state –work with another to manage pain try to remember what that felt like when pain arises try to bring about that pain free state as best as possible

Latest manifestation snakes

Take apart forms

Remove memory of the form from the field requires making a clear emptying of that space

Avoid lines but make curves  They have said that their computer tracks angles and lines if I move or turn during an event they can’t capture it in the quantum field

Backtracking as in traveling in a line and then traveling back on tht same line confuses them

Minaturizing forms

Placing people on magnetic strips of black groc

Take apart appendages hanging from circular object (they are arms and a hand) but making  two holes on either side of te h

Remove  form from prescribed boundaries they need their blueprint to manitfest

 Make square opening in forms with water or air that causes a vacuum in their program they need a day to recooperate that particular form

Toxic light in pseudosun and elsewhere  take apart form and remove substance within

 

Wherabouts of perpetrators

Who are they

Public in San Diego aware or not aware

Discovered under keyboard when breaking it in two sideways were teeth of some kind connected to an arm? They said that meant afater the aliens got done torturing dinocroc was going to consume them

Each alien group who is in the lead abusing takes over the pseudosun   today I found the mean orion andsanother male alien with King David    who is a God   the pseudosun was shut with claws and when I began hitting them they shut themselves inside and began sending out rings of vibrations

It needs t be disabled that’s a priority just take the claws from the outside using above methods

Or cut them out g ently there may be lieflifeforms in there besides David

 

 

Baskets   

How to combat the alien demons and drive them from our Community so that we can live

 

Introduction 

We are in a Simulated Augmented Reality  We are no longer located in space where we once were but it appears that the planet has been teleported by Quantum Computer Technology by an alien race  There is a Pseudo light source which passes for the Sun and the Moon There are several alien groups who have used this situation to play games with Virtual Reality data gloves  They place victim targets in video games both private and public on television stations in books  Some call this Master of the Universe They are mentally unstable although some groups are a mixed breed with some human and above in them so there is hope 

To date the alien demons appear to operating from a location with has a metaview similar to Google maps on the internet

behave demonstrated that they are controlling our community  via data glove and keyboard  appear to be both operating from a source that has access to maps and the environment such as Google ( I was told aliens took over google which houses NASA ames years ago) I believe they also stole technology from other aliens such as portable computers that they can operate form any location and from any state

They understand our community is in a simulated reality and the bizarre animals have taken advantage of technology to abuse and torture us

 

and the formula for repetive states of torture behaviors and mind control   They stole technology from another alien group that were able to have portable computers in quantum states The alien reticulian Orion and Octopi have also abused Mind Uploading  After identifying a target they capture them in a central location and then divide their minds  They then sometimes torture their victims who might even experience a death process and then they will try to ‘fix’ them or not after which the target is at their whim again until rescued

The following information is true for those the alien demon wishes to control That might be coconspirators as well

 have proven that they have a formula for creating weapons and torture devices  The implements used consist of the following

A data glove

A claw or hand with or w ithout a razor blade along the top

A series of three forms that causes a data hand and torture to be implemented

One of the forms to the left of the torture is a faucet type knob which holds the quantum field and event ithat the alien wants to use There is one safety release on this form which allows the energy field and form to revert back to previous state On the side of any device seen there Is another release valve pull both of these forward until feeling the energy release

A program to the left called the Apep program which consists of nanotechnology In this program lies raor blades that are used to cordon off rooms One room is for torture  Another room is for sex to take placeOther rooms consist at the whim of the perpetrator  a Victim is usually found within these rooms no matter how many times that program is made Every time a new automatic torture or mind control is to occur one will find these three forms at the left of the behavior

A keyboard under which lie victims and at which the alien types in a command

{IF the alien wants others to have sex in certain positions he will make the position happen or watch while it naturally happens and then take the participants and place them in the faucet looking object if the alien wants sex in that position to occur anywhere he will simply push the button of the original setting and that form will commence that activity and to his or her surprise be in that position without the ability to stop it    If the alien wants another behavior to occur or wants torture to occur when others ar engaged in behavior which has been entered in the data field torture will commence]     

A Data Hand   After the series of events has unfolded in which the alien decides what quantum event he wants to enter into the data base  a data glove is formed  with that event inside it as well  the perpetrator then can create torture scenes as many times as he wants with that data glove   The Victim is inside that glove  His or her mind and physical energy field has usually at that time been captured by the alien

 

Mind Uploading and Physical Energy After a victim or co offenders  mind is located and entered into the data base the physical energy will be as well  Recently there was a Sex project in which the aliens duplicated an orgasm and then regardless of if the victim had  sex life or not his or her sexual energy would be found by the usage of a lure who they wanted to have sex with usually after mind control  The lure is a simulated being who was created based on the looks of a famous female movie figure  This personality was given the victims esoteric body which was isolated coded and copied her physical energy and pieces of the victims genital anatomy After the male sexual response was identified that respose would be placed into a data base  Anytime the alien male or female wanted to have sex the victims ‘penis’  ould be inflated At Times the male victims are hobbled and are not given movement of their legs but are shuttled from place to place on their penis

The Female Genital Canal   While witnessing the sexual response by a victim who was capable of avaginal orgasm viaaa “G” sthe perpetrator would put probes into her vaginal canal to copy the energy or code the energy so that anyone with that probe would fill the same response  The vaginal tract in this program which was created by a Black entity who knows folks magic consists of the victims hairbrush hair energy copy of the victim in the hairbrush  several energy probes a spider a spider web like interior  at times masked by a thick substance which enhanced the experience

 That victims mind can be duplicated from the original main entry or mind uploading   That means that the perpetrator can section of that mind into duplicate copies and create torture settings in numerous locales with the victim suffering known or unbeknown by the original core self  These settings found to date include

Tableware from Kitchen glass plastic silver

Money  often place hot substance in middle

Plastic Bags They take bar codes from anywhere and place a hot substance under it and Place Victims near it

Food they are placing a gel like substance in the water and fluid  its similar to the gel like substance they are using to capture peoples legs in  I drank flud yesterday and it hardened so that I had trouble breathing it hardened in my lungs

 

Map of the Community   the perpetrators operate either via a Master computer such as Google or Blue Brain that allows an overview of the community or the perpetrator might have jurisdiction over a locale  or in my case the program is inserted in my inner eyelid

 

 

Allow for some alien reaction  or changing design of form

 

 

where the ape resides, a

Fangs   not just fangs keeping environment closed or immovable but the claw is even around my computer screen and different programs I supposed its on m web page too look at letters the great god was tortured in letters from my computer  remember each claw has a keyboard to the right its nanotechnology  the enemy enteres data like location at least and creats data glove someone is in charge of that

 

 

Three forms are to the left of the quantum field

How to combat the alien demons and drive them from our Community so that we can live

Breathing on them with the actual breath makes them dissapearand un intending them t disappear be careful becaue more than you intended might dissaper

Introduction 

We are in a Simulated Augmented Reality  We are no longer located in space where we once were but it appears that the planet has been teleported by Quantum Computer Technology by an alien race  There is a Pseudo light source which passes for the Sun and the Moon There are several alien groups who have used this situation to play games with Virtual Reality data gloves  They place victim targets in video games both private and public on television stations in books  Some call this Master of the Universe They are mentally unstable although some groups are a mixed breed with some human and above in them so there is hope 

To date the alien demons appear to operating from a location with has a metaview similar to Google maps on the internet behave demonstrated that they are controlling our community  via data glove and keyboard  appear to be both operating from a source that has access to maps and the environment such as Google ( I was told aliens took over google which houses NASA ames years ago) I believe they also stole technology from other aliens such as portable computers that they can operate form any location and from any state

They understand our community is in a simulated reality and the bizarre animals have taken advantage of technology to abuse and torture us

 

and the formula for repetive states of torture behaviors and mind control   They stole technology from another alien group that were able to have portable computers in quantum states The alien reticulian Orion and Octopi have also abused Mind Uploading  After identifying a target they capture them in a central location and then divide their minds  They then sometimes torture their victims who might even experience a death process and then they will try to ‘fix’ them or not after which the target is at their whim again until rescued

The following information is true for those the alien demon wishes to control That might be coconspirators as well

 have proven that they have a formula for creating weapons and torture devices  The implements used consist of the following

A data glove

A claw or hand with or w ithout a razor blade along the top

A series of three forms that causes a data hand and torture to be implemented

One of the forms to the left of the torture is a faucet type knob which holds the quantum field and event ithat the alien wants to use There is one safety release on this form which allows the energy field and form to revert back to previous state On the side of any device seen there Is another release valve pull both of these forward until feeling the energy release

A program to the left called the Apep program which consists of nanotechnology In this program lies razor blades that are used to cordon off rooms One room is for torture  Another room is for sex to take placeOther rooms consist at the whim of the perpetrator  a Victim is usually found within these rooms no matter how many times that program is made Every time a new automatic torture or mind control is to occur one will find these three forms at the left of the behavior

A keyboard under which lie victims and at which the alien types in a command

{IF the alien wants others to have sex in certain positions he will make the position happen or watch while it naturally happens and then take the participants and place them in the faucet looking object if the alien wants sex in that position to occur anywhere he will simply push the button of the original setting and that form will commence that activity and to his or her surprise be in that position without the ability to stop it    If the alien wants another behavior to occur or wants torture to occur when others ar engaged in behavior which has been entered in the data field torture will commence]     

A Data Hand   After the series of events has unfolded in which the alien decides what quantum event he wants to enter into the data base  a data glove is formed  with that event inside it as well  the perpetrator then can create torture scenes as many times as he wants with that data glove   The Victim is inside that glove  His or her mind and physical energy field has usually at that time been captured by the alien

 

Mind Uploading and Physical Energy After a victim or co offenders  mind is located and entered into the data base the physical energy will be as well  Recently there was a Sex project in which the aliens duplicated an orgasm and then regardless of if the victim had  sex life or not his or her sexual energy would be found by the usage of a lure who they wanted to have sex with usually after mind control  The lure is a simulated being who was created based on the looks of a famous female movie figure  This personality was given the victims esoteric body which was isolated coded and copied her physical energy and pieces of the victims genital anatomy After the male sexual response was identified that response would be placed into a data base  Anytime the alien male or female wanted to have sex the victims ‘penis’ w ould be inflated At Times the male victims are hobbled and are not given movement of their legs but are shuttled from place to place on their penis Reportedly the code for the mind is on the left side of the insterior of the data glove the physical ode is on the right  It may be the entitiy themselves attached to the glove alone with a technica

The Female Genital Canal   While witnessing the sexual response by a victim who was capable of avaginal orgasm viaaa “G” sthe perpetrator would put probes into her vaginal canal to copy the energy or code the energy so that anyone with that probe would fill the same response  The vaginal tract in this program which was created by a Black entity who knows folks magic consists of the victims hairbrush hair energy copy of the victim in the hairbrush  several energy probes a spider a spider web like interior  at times masked by a thick substance which enhanced the experience

 That victims mind can be duplicated from the original main entry or mind uploading   That means that the perpetrator can make copies of that mind and create torture settings in numerous locales with the victim suffering known or unbeknown by the original self  These settings found to date include

Tableware from Kitchen glass plastic silver

Money  often place hot substance in middle

Plastic Bags They take bar codes from anywhere and place a hot substance under it and Place Victims near it

Food they are placing a gel like substance in the water and fluid  its similar to the gel like substance they are using to capture peoples legs in  I drank flud yesterday and it hardened so that I had trouble breathing it hardened in my lungs

 

Map of the Community   the perpetrators operate either via a Master computer such as Google or Blue Brain that allows an overview of the community or the perpetrator might have jurisdiction over a locale  or in my case the program is inserted in my inner eyelid

 

 

Allow for some alien reaction  or changing design of form

 

 

where the ape resides, a

Fangs   not just fangs keeping environment closed or immovable but the claw is even around my computer screen and different programs I supposed its on m web page too look at letters the great god was tortured in letters from my computer  remember each claw has a keyboard to the right its nanotechnology  the enemy enteres data like location at least and creats data glove someone is in charge of that

 

 

Update

They have moved Amen Ra’s to various places. Apollo and I are staging quite a battle in order to defend Amen Ra but the enemy appears to be closing in. We need more diversion; find out who has Amen RA in their program; try to release him from the enemy; more light sources.

My head hurts. It’s filled with springs and wire.

“Clash of the Titans.” The Underworld Monsters Re-emerge. The Olympians Return

The religious history of this war has been traced backto these Gods and and a snake god named Typhon and his consort who has repeated his thousand year old evil agenda to destroy mankind and try to harm the against Ancient Benevolent Gods who stopped him a thousand years ago.

The Temple of Set mentions Typhon in their belief system. The TOS is one of the organizations that targeted me. The word typhontransposed is python. Typhon. He and two lethal females are  here and operating  out of one of these quantum computers and placing “astral” snakes in this program which are hurting others. We need people to run interference. If you see them placing substances over objects, please try to remove them. The newspaper reports that there is an epidemic of pythons in Florida and in Indiana. Interestingly, and associate of Michael Aquino’s by the name of Tannith Tyrr is a Herpetologist, last known to be working at a zoo in Florida, and she specializes in lethal snakes.

My medical condition is continuing to rapidly deteriorate by those operating quantum computers. Every bodily system has been attacked. I’m hoping to document this condition soon. If I can’t I’ll have an associate reporton this web page for me.

yMy entire body will soon be eheld together with a band aid.

Parasites

Been learning more about parasites. They are intellligent and some are telepathic. Reportedly they like water, large bodies of water, and toilet bowls. They have been accessing people via the toilets in their homes and restaurants. They take over the minds of their hosts and live in the intestines. They exist on an unseen level and can travel or hide in light. They say this quantum computer program of the last year made them known.

Try taking laxatives. Cut the field around the stomach area and head. Use a blow dryer and make cuts with your intent.

quantum teleportation

The’yre able to teleport I believe via quantum computer technology and some of them are
demonic who have powers. From wikipedia –

“quantum teleportation is a quantum protocol by which a qubit a (the basic unit of quantum information) can be transmitted exactly (in principle) from one location to another.