This is one of the more distressing pages on my website. Information on this website and webpage should not be construed as a substitute for therapy. Even if a survivor is certain that she or he is no longer in abuser contact, this material may exacerbate trauma-based fear, and should only be read with proper support.
It is also important that this piece be read slowly, in small installments, taking time to cognitively and emotionally process the material, and to psychologically rest, even sleep, periodically. Finally, it is important to guard against quickly believing that all of the things discussed on this webpage apply to you.
This page represents my current opinions on mind-sets and measures that help survivors of ritual abuse and torture-based mind control to reduce and prevent re-contact with their abusers. Torture-based mind control is practiced by individuals and groups who seek to maximally control and exploit others, usually beginning in childhood.
Included are practitioners of abusive religious rituals e. My opinions are based on a synthesis of 17 years of experience in providing psychotherapy to victims and survivors of ritual abuse and mind control and extensive interviews of other survivors, including many survivor-therapists, and my ongoing communication with therapist and clergy colleagues working with survivors.
The two primary forms of re-contact with abusers include reporting back by phone or written correspondence, and physically returning to abusers to be abused again. Perpetrators of ritual abuse and mind control attempt to coerce their victims into submission and service to the abuser group for a lifetime. Some abuser groups rely primarily on threats to force their victims into compliance and to prevent their victims from escaping.
For some of these groups, these are empty threats. The groups may be limited to one or two extended families or a relatively small abuser network.
They make claims of having more power than they have, and may even claim responsibility for murders that they did not commit, much like political terrorists.
Some abuser groups have larger criminal networks and thus, more power to carry out their threats. But, they too reliably overstate their power to maximally terrorize their victims. This is not to dismiss the reality that these abusers commit murder, but it is to say that they lie and exaggerate their power. Clearly, people who systematically abuse others lie to further their own interests. Words are just one more tool of manipulation to control their victims. Everything they say should be questioned and examined for underlying motives and feasibility.
They also go to great lengths to try to make their victims believe that the victims are accomplices to the abuse, that they are as evil as their abusers themselves, and that they are unworthy and incapable of belonging anywhere but with the abusers. I thank Hans Ulrich Gresch, Ph. In many cases, even though the survivor is working hard to break free of her or his abusers, these programmed self-states continue to report to, and return to, the abusers, often out of the conscious awareness of the most-often conscious parts of the psyche.
Ongoing access allows the abusers to retaliate against their victims for attempting to break free and to escalate their abuse and programming in efforts to increase their control of their victims.
The purpose of this article is to help survivors, therapists, clergy, and other support people, to understand the tactics, briefly outlined above, used by ritually abusive and mind control abusers to attempt to trap their victims into life-long submission, and to use this knowledge to help survivors to overcome these abuser tactics of control, to break free of their abusers more easily and more quickly, and to prevent re-contact.
While child victims are still under the relatively complete control of the abusers, they are severely punished for any attempt to tell anyone of the abuse or to reach out for any kind of help. In many cases, abusers manipulate children into seeking help in order to immediately wield punishment with the goal of developing a deeply entrenched fear of telling.
The faux confidant immediately reports this disclosure to the abusers. The child is tortured in retaliation, and told that the abusers know, see, and hear everything the child does. In many cases, particular self-states are also trained with reward and punishment by torture to remember what the abusers wish them to remember and to forget what the abusers want them to forget, to prevent the victim recalling and disclosing the abuse. These two kinds of programming form the basis of much other programming.
This is designed to result in the development of dissociated self-states who perceive themselves as existing in the original sites of their torture within the internal landscape see note. Defiance of abuser dictates by these self-states, or wishes by any self-state to defy the abusers, is intended to cause these self-states to experience themselves as being tortured once again. Individuals with Dissociative Identity Disorder tend to have an imagistic internal landscape in which many of their dissociated identities reside.
In many cases, self-states are simply commanded to take on reporter and re-contact functions. For these parts, the only reality they know is the reality created by the abusers, by their violent, punitive training and by their lies. They have no sense of sovereignty over their own existence.
The abusers define their identity and value. They are much like soldiers committing horrendous acts in the line of duty.
But they have no other self, no home to come home to. They have an artificially-induced sense of belonging only to the abusers and complete isolation from the rest of the world. These self-states know full-well the dangerous consequences of non-compliance.
However the reporter and re-contact programming is accomplished, it can be considered the acid test for sophisticated programming. They often dismiss this as simply an odd event, the kind of odd events they have become accustomed to for a lifetime. The directive is usually to go to a designated place to make renewed contact with the abusers.
If the victim is geographically distant from the abusers or without transportation, he or she may be directed to report her or his location and may then be directed to walk to a specific location to wait to be picked up. In some cases, particular dissociated self-states have been programmed to respond to naturally-occurring stimuli by re-setting programming, such as directives to obey, or programs that may have been discovered and tampered with by the survivor, a therapist, or an other programmer.
Stimuli survivors have discovered to have been used as re-sets are the sight of a trademark of a common chain store or restaurant, or a self-state programmed to perceive that there is a button on the body that gets pressed each day while dressing. Until these kinds of programming are made conscious, or otherwise de-activated e. This programming is intended to function out of the conscious awareness of the daytime, most-often-conscious self-states. In this way, survivors may be in ongoing abuser contact and have no knowledge of this.
In all of these cases, these subjects have clearly demonstrated that they can pass from a fully awake state to a deep H [hypnotic] controlled state via the telephone, via some very subtle signal that cannot be detected by other persons in the room and without the other individual being able to note the change. It has been clearly shown that physically individuals can be induced into H [hypnosis] by telephone, by receiving written matter, or by the use of code, signals or word and that control of those hypnotized can be passed from one individual to another without great difficulty.
It has also been shown by experimentation with these girls [age 19 years] that they can act as unwilling couriers for information purposes and that they can be conditioned to a point where they can believe a change in identity on their part even on the polygraph.
In some cases, victims perceive that they are being abused more often than is actually the case. For example, some abusers program their victims to perceive that after each therapy session, they return to the abusers to report on the content of the session and to be punished for seeking help, for recalling the abuse, and for disclosing it.
In some cases, self-states who are obedient to, or identified with, their abusers internally punish other self-states for disobeying the abusers. The punished self-states generally perceive this internal punishment as actual external abuse. Theses self-states can then exercise their free will for the first time. They can make a conscious choice to override all of these set-ups, dictates, and triggering stimuli. When self-states that control switching align with the best interests of the victim rather than submit to the wishes of the abusers, much more safety can be achieved.
The process of discovering and internally rescuing programmed self-states is a step-by-step, often lengthy, process, often done in therapy or counseling with psychotherapists or clergy who understand mind control. Some survivors find that before all self-states can be discovered and re-located, they can develop means of increasing their mental focus to stay mentally present in a self-state that can exercise critical thinking, self-observation, free will, and can thereby: It is available on Amazon: I have never asked Karnac Books for remuneration for submitting my chapter to this book.
I am grateful to Karnac for taking on the subjects of ritual abuse and mind control when so many publishers will not commit to this subject. Threats of Greater Harm for breaking Free As discussed above, threats are a mainstay of ritually abusive and mind control abusers. Some threats are lies. Other threats carry genuine risk. Most are probably a combination of the two. Ritual and mind control abusers want their victims to believe that there is no way out, that it is impossible to escape, and that they will be punished or killed if they try to break free.
These are terrifying threats. However, many survivors decide that the alternative of submitting to their abusers is much worse. These abuser groups seek life-time control of their victims. Submission is not rewarded with freedom in a year or in a decade. To submit is to begin a life-sentence. The longer one submits, the longer one is abused. And worse for many victims than being abused themselves, submission usually means that the victim will be forced to abuse, harm, or kill others— children, adults, and animals, for the rest of her or his life.
Sophisticated abusers usually claim that they always know where their victims are. And they threaten to abduct them, that is, to take them by force, and punish them severely, if they do not willingly comply with abuser directives. These abusers generally trick their victims, and particular self-states, into believing that the abusers are always watching, listening, reading their minds, etc.
It is the preference of programmers not to abduct their victims because this demonstrates a weakness in their programming. The more effective their programming, the more they gain in status, ego, and money. In addition, abusers may be punished for losing control of victims.
Rather than resort to abduction, they prefer to keep trying to prove that their programming is working. Smith adopted a boy at 10 years of age and soon discovered that he had Multiple Personality Disorder the former term for Dissociative Identity Disorder and that he had been victimized by a ritually abusive cult. She details her struggle to raise this child, to keep him safe, and to find him proper psychotherapy.
This is the kind of behavior such abusers seek to produce and hope to rely upon. It satisfies their grandiosity. To programmers, the need for abduction signifies a failure. In cases of survivors who have broken a good deal of their programming, the risk of abduction is likely to be even more reduced. These survivors have good co-consciousness between previously dissociated self-states, and good intra-system cooperation between self-states in their desire to defy their abusers.
This largely disables their amnesia programing. This poses a risk to the programmers in that these survivors can recall everything about any contact with their abusers, including the sites of the abuse and the identities of the perpetrators. It is also often a waste of abuser resources to try to regain control of these survivors. This is when victims need to be the most cautious about their physical safety, to not be alone, to not go to isolated places, etc. Consider the Mafia and KKK.
Organized abusers commit murders for ritual sacrifice, to appease and win favor with their deities, to punish victims, to eliminate rivals and people who threaten to expose them, in snuff films made for profit, and out of rage or pure sadism.