
“False Security is the sense that one thinks everything is fine, but it really isn’t, this is common manipulation to lead someone into believing that all is well before attacking or leading someone into destructive or negative situations, or there is imminent failure in the situation. False Security is a Victim-Victimizer software mind control archetype that is used to target spiritually developing people. This is one of the Controller Programs that is a sub program of the Victim-Victimizer software program and a collective miasm that has accumulated over many generations. Humanity is enduring a hidden multidimensional battle for disclosure which is gradually happening as the collective consciousness shifts into higher dimensional planes as the result of the Ascension cycle. This is occurring via the spreading of familiar narratives and the same propaganda tactics that are used for the purpose of psychological manipulation of the intended audience and the key players. Power and influence are forces gathered through which they become a Pied Piper, a person that is celebrated, worshipped or made into a hero. Maybe it is a pundit personality looking to gather a large online following through disseminating the cabal wars through the QAnon movement. The strategy of controlled opposition works best under circumstances in which the masses are gullible, credulous, lack Critical Thinking and are unable to connect the dots and see how the actions and inaction or manipulation of the information from the controlled entity is actually benefiting the controlling entity. Self-indulgence of the Negative Ego promotes, among other things, attitudes of fanaticism, False Security, presumption, and fun-seeking at a cost. Fanaticism is unbridled obsession, and though most do not recognize it as form of ego self-indulgence, it is a gratification of selfish desire through Service To Self.”
~Lisa Renee
~via New Age, Ascension and Disclosure Hijack
Image courtesy of this blog’s editor and does not reflect Lisa Renee’s views or the source article.
You must be logged in to post a comment.