Month: February 2022

Witchcraft & Sorcery disguised as science (psychology) and Technology

Coercive Mind Control Tactics (Witchcraft)

Put on the whole armour of God, that ye may be able to stand against the wiles of the devil. —Ephesians 6:11
Be sober, be vigilant; because your adversary the devil, as a roaring lion, walketh about, seeking whom he may devour: —1 Peter 5:8
The thief cometh not, but for to steal, and to kill, and to destroy: —John 10:10

(These Coercive mind control witchcraft techniques was transmitted to humans by ancient fallen angel and demons Also note, no satanic operation is complete without the participation of physical hybrid humans)

Terminology note:

Today Mind control or brainwashing aka (Witchcraft) in academia is commonly referred to as coercive persuasion, coercive psychological systems or coercive influence. The short description below comes from Dr. Margaret Singer professor emeritus at the University of California at Berkeley the acknowledged leading authority in the world on mind control and cults.

a short overview

Coercion is defined by the American Heritage Dictionary as:

1. To force to act or think in a certain manner
2. To dominate, restrain, or control by force
3. To bring about by force.

Coercive psychological systems are behavioral change programs which use psychological force (Witchcraft and Sorcery) in a coercive way to cause the learning and adoption of an ideology or designated set of beliefs, ideas, attitudes, or behaviors. The essential strategy used by the operators (Witches) of these programs is to systematically select, sequence and coordinate many different types of coercive influence, anxiety and stress-producing tactics over continuous periods of time. In such a program the subject is forced to adapt in a series of tiny “invisible” steps. Each tiny step is designed to be sufficiently small so the subjects will not notice the changes in themselves or identify the coercive nature of the processes being used. The subjects of these tactics do not become aware of the hidden organizational purpose of the coercive psychological program until much later, if ever.

These tactics are usually applied in a group setting by well-intentioned but deceived (Bewitched) “friends and allies” of the victim. This keeps the victim from putting up the ego defenses we normally maintain in known adversarial situations. The coercive psychological influence of these programs (Witchcraft attack) aims to overcome the individual’s critical thinking abilities and free will – apart from any appeal to informed judgment. Victims gradually lose their ability to make independent decisions and exercise informed consent. Their critical thinking, defenses, cognitive processes, values, ideas, attitudes, conduct and ability to reason are undermined by a (Witchcraft) technological process rather than by meaningful free choice, rationality, or the inherent merit or value of the ideas or propositions being presented.

How Do They Work?

The (Witchcraft) tactics used to create undue psychological and social influence, often by means involving anxiety and stress, fall into seven main categories.


Increase suggestibility and “soften up” the individual through specific hypnotic or other suggestibility-increasing techniques such as: Extended audio, visual, verbal, or tactile fixation drills, Excessive exact repetition of routine activities, Sleep restriction and/or Nutritional restriction.


Establish control over the person’s social environment, time and sources of social support by a system of often-excessive rewards and punishments. Social isolation is promoted. Contact with family and friends is abridged, as is contact with persons who do not share group-approved attitudes. Economic and other dependence on the group is fostered.


Prohibit disconfirming information and non-supporting opinions in group communication. Rules exist about permissible topics to discuss with outsiders. Communication is highly controlled. An “in-group” language is usually constructed.


Make the person re-evaluate the most central aspects of his or her experience of self and prior conduct in negative ways. Efforts are designed to destabilize and undermine the subject’s basic consciousness, reality awareness, world view, emotional control and defense mechanisms. The subject is guided to reinterpret his or her life’s history and adopt a new version of causality.


Create a sense of powerlessness by subjecting the person to intense and frequent actions and situations which undermine the person’s confidence in himself and his judgment.


Create strong aversive emotional arousals in the subject by use of nonphysical punishments such as intense humiliation, loss of privilege, social isolation, social status changes, intense guilt, anxiety, manipulation and other techniques.


Intimidate the person with the force of group-sanctioned secular psychological threats. For example, it may be suggested or implied that failure to adopt the approved attitude, belief or consequent behavior will lead to severe punishment or dire consequences such as physical or mental illness, the reappearance of a prior physical illness, drug dependence, economic collapse, social failure, divorce, disintegration, failure to find a mate, etc.

These tactics of psychological force are applied to such a severe degree that the individual’s capacity to make informed or free choices becomes inhibited. The victims become unable to make the normal, wise or balanced decisions which they most likely or normally would have made, had they not been unknowingly manipulated by these coordinated technical processes. (Witchcraft attack) The cumulative effect of these processes can be an even more effective form of undue influence than pain, torture, drugs or the use of physical force and physical and legal threats.

How does Coercive Psychological Persuasion Differ from Other Kinds of Influence?

Coercive psychological systems are distinguished from benign social learning or peaceful persuasion by the specific conditions under which they are conducted. These conditions include the type and number of coercive psychological tactics used, the severity of environmental and interpersonal manipulation, and the amount of psychological force employed to suppress particular unwanted behaviors and to train desired behaviors.

Coercive force is traditionally visualized in physical terms. In this form it is easily definable, clear-cut and unambiguous. Coercive psychological force unfortunately has not been so easy to see and define. (Because its Witchcraft) The law has been ahead of the physical sciences in that it has allowed that coercion need not involve physical force. It has recognized that an individual can be threatened and coerced psychologically by what he or she perceives to be dangerous, not necessarily by that which is dangerous.

Law has recognized that even the threatened action need not be physical. Threats of economic loss, social ostracism and ridicule, among other things, are all recognized by law, in varying contexts, as coercive psychological forces.

Why are Coercive Psychological Systems Harmful?

Coercive psychological systems violate our most fundamental concepts of basic human rights. They violate rights of individuals that are guaranteed by the First Amendment to the United States Constitution and affirmed by many declarations of principle worldwide.

By confusing, intimidating and silencing their victims, those who profit from these systems of (Witchcraft) evade exposure and prosecution for actions recognized as harmful and which are illegal in most countries such as: fraud, false imprisonment, undue influence, involuntary servitude, intentional infliction of emotional distress, outrageous conduct and other tortuous acts. – Margaret Thaler Singer, Ph.D –

Margaret Thaler Singer, Ph.D. Biography


Prayer points:

Every witchcraft meeting convened by wicked witches and wizards for my sake, scatter by fire in the name of Jesus
Every satanic arrow of witchcraft fired into my life, burn to ashes in the name Jesus
Programme of witchcraft fashioned against my life, scatter by fire in the name of Jesus
Every animal energized by witchcraft powers sent to attack me, be strangled to death in the name of Jesus
I withdraw my name from witchcraft register.
I released my life from witchcraft cage in the name of Jesus
I refuse to follow any evil designs or programme for my life, in the name of Jesus Christ
I destroy every satanic devices used to monitor me in the name of Jesus


See No Evil

The Occult “Monkey Symbol of See, Hear, Say No Evil” Satanic Principle [Isaiah 5:20]

1. Hear no evil, see no evil, speak no evil. Regardless of what you know, don’t discuss it, especially if you are a public figure or lodge official. If it’s not reported, it didn’t happen, and you never have to deal with the issues.

2. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues, which can be used to show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the “How dare you!” gambit.

3. Create rumormongers. Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method works especially well with a silent press, because the only way the public can learn of the facts are through such “arguable rumors” you can associate the material with the Internet, use this fact to certify it a “wild rumor” which can have no basis in fact.

4. Use a straw man. Find or create a seeming element of your opponent’s argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.

5. Sidetrack opponents with name-calling and ridicule. This is also known as the primary attack the messenger ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as “kook”, “right-wing”, “liberal”, “left-wing”, “terrorist”, “conspiracy theorist”, “radical”, “militia member”, “bigot”, “racist”, “religious fanatic”, “crazy person”, “slanderer”, “sexual deviant”, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.

6. Hit and run. In any public forum, make a brief attack on your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in online and letters-to-the-editor environments, where a steady stream of new identities can be called upon without having to explain criticism reasoning – simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent’s viewpoint.

7. Question motives. Twist or amplify any fact which could be taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.

8. Invoke authority. Claim for yourself or associate yourself with authority, and present your argument with enough “jargon” and “minutiae” to illustrate you are “one who knows”, and simply say it isn’t so without discussing issues or demonstrating concretely why or citing sources.

9. Play dumb. No matter what evidence or logical argument is offered, avoid discussing issues with denial they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.

10. Associate opponent charges with old news. A derivative of the straw man, usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with. Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually then be associated with the original charge and dismissed as simply being a rehash without need to address current issues, so much the better where the opponent is or was involved with the original source.

11. Establish and rely upon fall-back positions. Using a minor matter or element of the facts, take the “high road” and “confess” with candor that some innocent mistake, in hindsight, was made, but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, “just isn’t so”. Others can reinforce this on your behalf, later. Done properly, this can garner sympathy and respect for “coming clean” and “owning up” to your mistakes without addressing more serious issues.

12. Enigmas have no solution. Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to lose interest more quickly without having to address the actual issues.

13. Alice in Wonderland logic. Avoid discussion of the issues by reasoning backward with an apparent deductive logic in a way that forbears any actual material fact.

14. Demand complete solutions. Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best for items qualifying for rule #10.

15. Fit the facts to alternate conclusions. This requires creative thinking, unless the crime was planned with contingency conclusions in place.

16. Vanishing evidence and witnesses. If it does not exist, it is not fact, and you won’t have to address the issue.

17. Change the subject. Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can “argue” with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.

18. Emotionalize, antagonize, and goad opponents. If you can’t do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how “sensitive they are to criticism”.

19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the “play dumb” rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon). In order to completely avoid discussing issues that may require you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.

20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for this purpose, and the facts cannot be easily separated from the fabrications.

21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body. Subvert the process to your benefit and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed and unavailable to subsequent investigators. Once a favorable verdict (usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim) is achieved, the matter can be considered officially closed.

22. Manufacture a new truth. Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.

23. Create bigger distractions. If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.

24. Silence critics. If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail, or destruction of their character by release of blackmail information, or merely by proper intimidation with blackmail or other threats.

25. Vanish. If you are a key holder of secrets or otherwise overly illuminated, and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.


[Woe unto them that call evil good, and good evil; that put darkness for light, and light for darkness; that put bitter for sweet, and sweet for bitter! —Isaiah 5:20
These six things doth the LORD hate: yea, seven are an abomination unto him: A proud look, a lying tongue, and hands that shed innocent blood, An heart that deviseth wicked imaginations, feet that be swift in running to mischief, A false witness that speaketh lies, and he that soweth discord among brethren. —Proverbs 6:16-19
But the Lord is faithful, who shall stablish you, and keep you from evil. —2 Thessalonians 3:3]

Luciferian soap opera aka “100% Safe and Effective”

TheCrowHouse Jan 06, 2022

Ye (seed of satan) are of your father the devil, and the lusts of your father ye will do. He was a murderer from the beginning, and abode not in the truth, because there is no truth in him. When he speaketh a lie, he speaketh of his own: for he is a liar, and the father of it. —John 8:44

The thief (satan and his hybrid offspring) cometh not, but for to steal, and to kill, and to destroy: —John 10:10