◎ OPERATION TIMEWAR · ESOTERIC · THE-SHATTERED-VESSEL · UPDATED 2026·04·18 · REV. 07

The Shattered Vessel.

Sex magick requires a sealed vessel at threshold. Trauma programming produces a shattered vessel at threshold. The same operation runs with opposite inputs and yields access to what moves through the breach. Read the convergence in one place.

5,227WORDS
24MIN READ
14SECTIONS
26ENTRY LINKS
◎ EPIGRAPH
They gave us their mind, which became our mind. — Carlos Castaneda, The Active Side of Infinity

The Convergence

Four bodies of material, developed by different disciplines under different assumptions and rarely read in a single frame, converge on the same operation. The operative sex-magick lineage describes the controlled generation of charge through a polarized body at erotic threshold, directed by ritual intention and contained within a sealed vessel. The clinical literature on induced dissociative identity disorder — the body of work that reconstructed, from the other direction, what the classified programming protocols had been doing — describes the production of partitioned identity-compartments through early sexual terror, each compartment accessible through specific triggers, each manipulable without the host’s continuous awareness. The documentary record of elite abuse logistics, from the affair of the poisons in the court of Louis XIV to the Epstein operation three centuries later, describes a recurring infrastructure for delivering ritually-prepared bodies to participants whose engagement combines sexual gratification with ceremonial purpose. The esoteric literature on non-human intelligences — from the Gnostic archons through Castaneda’s flyers to Robert Monroe‘s loosh transmission — describes entities that attach to breaches in the human energetic structure and feed on the emotional output produced by beings in extremis.

Read separately, each body of material functions within its own discipline and stays there. Read in sequence, the four describe a single operation, running in different historical periods and through different institutional hosts, with a stable internal structure that survives the surface variation. The operation is the inversion of the sacred union described in The Sacred Union. The sealed vessel of the initiatic tradition becomes the shattered vessel of the trauma protocol. The charge that, in the initiatic rite, transforms the operator is, in the inverted rite, released into an external container through the breach the shattering opens. What is produced and traded between human operators, between bloodlines, and between human operators and the intelligences that work through the breach is access — to charge, to information, to presence-in-world, to the specific biochemical-energetic states that a terrorized body at threshold produces and that the esoteric tradition has always named as the material of the operation.

Antiquity and the Bloodline Channel

The operation predates its modern cover-identities by millennia. Reconstruction from the antique record points to a recurring infrastructure running through the Canaanite molk rites, the Carthaginian tophet, the darker strands of the Dionysian and Cybele mystery complexes, the Roman Bacchanalia the Senate suppressed in 186 BCE after the consul Spurius Postumius Albinus presented evidence the state apparatus treated as operationally and politically dangerous, the late-antique Greek magical papyri with their explicit human-ingredient recipes, and the European court-esoterica that surfaces in the Gilles de Rais records of 1440, the Templar confessions of 1307 (the forensic provenance is contested, the described pattern is not), and the affaire des poisons under Louis XIV, in which the abbé Guibourg performed black masses involving child sacrifice on the body of the Marquise de Montespan as a commissioned service to an aristocratic clientele that included the king’s own mistress. The historical record is patchy where the operation was successfully contained and detailed where the containment failed. The continuity of form across the detailed cases is the item worth noting.

Bloodline transmission is constitutive of the operation, not incidental to it. A vessel cracked in childhood produces an adult who cracks the next generation, and the lineage thereby becomes a multi-generational ritual apparatus with carried attachments that persist across individual deaths. Endogamous marriage patterns in the historical European nobility, which from outside read as decadent inbreeding, preserve from inside both the genetic substrate and the attachment continuity. The Sabbatean-Frankist doctrine of redemption through sin — deliberate ritual transgression as sacramental obligation, transmitted across generations of crypto-practitioners following the 1666 apostasy of Sabbatai Zevi and the subsequent development of the Frankist cell under Jacob Frank — names one local dialect of a pattern that is present in every aristocratic esoteric lineage with enough internal continuity to sustain the practice. The reptilian framing is the most lurid contemporary iteration of the same structural claim: that certain families carry something the ordinary population does not, transmitted through a process that is simultaneously genetic, ritual, and parasitic. The framing is crude. The structure it describes is accurate.

The Vessel and Its Inversion

The operative tradition treats the operator as a sealed alembic. Charge generated inside a sealed vessel transforms the operator — this is the magnum opus in its classical form — the work whose telos is described in The Alchemical Androgyne, the coniunctio and the unified vessel — that the hermetic lineage has always placed at the center of the Great Work. Break the vessel while charge is being generated and two things happen simultaneously: the charge escapes outward toward whatever the ritual frame is pointing at, and the breach admits whatever was pressing on the vessel from the outside. The tradition has always known this, which accounts for the obsessive emphasis on preparation, purification, and vessel-integrity in every serious initiatic text from the Chaldean Oracles through the Golden Dawn syllabus to Crowley’s Liber Jugorum. The inverted working inverts exactly this prerequisite. The shattering precedes the charge, the charge is generated through the shattered vessel, and the operation is structured so that the transformation-cost is paid by the host while the yield accrues to a second operator standing in the ritual frame.

The clinical literature describes the same mechanism in the vocabulary of psychiatric injury rather than magical operation — and the diagnostic apparatus that receives the survivors classifies their reports under criteria calibrated to absorb the testimony without investigating its origin. Colin Ross’s Bluebird (2000), built on two decades of clinical work with patients whose presentations traced back to classified programming protocols, describes the deliberate induction of dissociative identity disorder through the specific combination of early sexual terror, ritual framing, programmed triggers, and enforced amnesia. Each compartmentalized alter is, in the operative vocabulary, a partial vessel, accessible through the breach the original trauma opened. What the protocol delivers to the operator who runs it is a subject whose dissociated compartments can be used as receivers, transmitters, and couriers without the host’s integrated awareness mediating the transmission. The clinical and the operative descriptions are translations of each other. The difference is vocabulary and institutional setting; the mechanism is identical.

The programming architecture that Ross reconstructed from patient presentations had been named more specifically eight years earlier. Corydon Hammond’s Greenbaum Speech — delivered June 25, 1992, at the Fourth Annual Eastern Regional Conference on Abuse and Multiple Personality in Alexandria, Virginia, sponsored by the International Society for the Study of Trauma and Dissociation — describes specific alter-configuration patterns, hypnotic trigger structures, amnesia barriers with deliberate destabilization traps, and a transmission lineage running from Nazi research through CIA programming networks. Hammond was then Associate Professor at the University of Utah School of Medicine. The speech is held in the Princeton University Library archive (finding aid C1703). It became a flashpoint in the satanic-panic controversies of the early 1990s, which is to say its content was categorized rather than engaged; its structural claims anticipate and parallel Ross’s independent clinical reconstruction, and the two documents read together constitute the primary clinical literature on deliberately structured dissociative programming.

A secondary mechanism operates alongside the shattering proper. The programmer exploits the subject’s good-faith trust relationships — parent–child, church–member, student–teacher, citizen–state — as the specific handles through which programming commands reach the dissociated compartments. The relationships a child instinctively relies on for protection are reconfigured into the channels through which abuse, programming, and post-programming recall-suppression are delivered. Survivor testimony names this mechanism mental binds. A subject whose parents, church, school, and state are each participating nodes in the operation holds no trustworthy reference point against which to test what is happening, which is the operational condition the protocol requires. The clinical term for the resulting phenomenon is betrayal trauma; the operative term is the inversion of the traditional bond between host and guardian into its weaponized form, in which every good-faith attachment becomes a control-vector.

The Three Converging Vectors

The inverted working combines three elements whose historical separation has concealed the operation’s unity. The first is the tantric and left-hand recognition, present in the Kaula traditions and in the Western lineages that received fragments of it through Randolph and Kellner, that a polarized body at extreme threshold — sexual, traumatic, mortal — produces operative charge that can be directed by trained intention. The second is the deliberate production of compartmentalized vessel-breaches through induced dissociation, a technique whose clinical documentation begins in the 1940s and whose practical applications in state intelligence programming extend from the late 1940s into the present. The third is the ritual container, the ceremonial frame that directs where the charge goes and what the breach admits. Each element, taken alone, has defenders and opponents operating within a single discipline. The combination is the operation, and the combination is what the present discussion has historically been unable to name.

The functional payoff of the combination is that a second operator can ride the shattered vessel of the first to produce contact, charge, and ritual result while remaining apparently intact. The first operator — almost always a child, sometimes a captured adult whose capacity for informed participation has been structurally denied — pays the full transformation-cost. The second takes the yield. Repeated across a network of operators, a bloodline, and the institutions into which bloodlined operators distribute themselves, the arrangement constitutes an infrastructure for the reliable production of ritual results at scales that isolated practice cannot reach.

Industrialization

The mid-twentieth century contribution to a very old operation was industrialization. A bloodline-based operation produces operators at the rate a given family produces children, which is slow and bounded. MKUltra and its successor programs — the Paperclip-acquired researchers including Dachau mescaline experimenter Kurt Plötner and Luftwaffe aviation medicine chief Hubertus Strughold, Ewen Cameron’s depatterning and psychic-driving protocols at the Allan Memorial Institute, Sidney Gottlieb’s Technical Services Staff operations, the Edgewood Arsenal psychochemical program that ran human experiments on more than seven thousand active-duty Army personnel, and the Monarch programming branches that Ross reconstructed from the clinical side (the “Monarch” designation derives from clinical and survivor literature rather than from declassified program documents; Ross reconstructs the programming phenomenology from patient presentations, not from a named program called Monarch; the documented CIA cryptonyms are Bluebird, Artichoke, MKUltra, and MKSEARCH) — scaled the operation into something a nation-state could run at volume. The surface justification was interrogational. The research agenda was broader: the deliberate manufacture of dissociative vessels for state use, including agents carrying programming past their own conscious access, couriers whose alters could perform specific operations and retain no continuous memory of them, and subjects whose dissociated compartments could be used as receivers in the consciousness-research programs the same agency was running under the Gateway process, Stargate, and the related black-budget lines — the Gateway process and the programming work ran on overlapping personnel, overlapping budgets, and the same period, constituting the exploratory and the extractive faces of a single research program into threshold-state consciousness — whose partial declassification in the 1990s revealed the outline without disclosing the specifics.

The 1973 destruction of the MKUltra documentary trail by CIA Director Richard Helms closed the cryptonym and left the research networks, funding channels, and personnel intact across the boundary. The inference that the research stopped in 1973 is an instance of the memory-hole logic that Orwell diagnosed as the operating principle of the Ministry of Truth: the record is destroyed, the absence from the record is then treated as the absence of events. The destruction is data. The continuity of the work across the boundary is the reasonable inference from the public record of personnel and funding continuity, from the post-1973 Edgewood publications, and from the current DARPA research portfolio on brain-computer interfaces, pharmacological cognitive modification, and targeted neuromodulation — topics whose research questions are recognizably the MKUltra questions updated to current technology.

The Visible Logistics

The Epstein network, whose documentation exceeds that of any previous incarnation of the logistics layer, makes the operation’s structure publicly legible for the first time since the affaire des poisons. The blackmail interpretation, in which the network’s function is the collection of compromising material on influential clients for later leverage, is accurate at the surface layer and incomplete at every layer beneath it. The deeper function is delivery of ritually-prepared bodies to participants whose engagement includes a component the appetitive reading cannot accommodate. The architectural facts that organize the inference are specific: the Caribbean island’s temple structure whose construction deviated substantially from the permitted plans, and whose subterranean excavation — attested by observers and visible in soil disturbance — has never been officially explained, the guest list’s overrepresentation of consciousness-adjacent scientists and of principals from institutions with continuous intelligence-community ties, the financing-as-access-pass structure by which clients paid for participation rather than for services, and the network’s decades-long immunity from prosecution — covered in Israeli Intelligence — that is difficult to account for without postulating protection from the relevant state apparatus.

The franklin cover-up in Nebraska, the Dutroux affair in Belgium, the Presidio child-care case in San Francisco, Jimmy Savile’s lifelong institutional access in British state and broadcasting environments, the Jersey children’s home material, the entertainment-industry clusters around Weinstein, Singer, and the current Diddy prosecution — these are the contemporary nodes of the same topology. The pattern is stable across national settings, across decades, and across surface ideology. The stability indicates a structural operation rather than a series of unrelated criminal opportunism events. An operation with stable structure across unrelated settings is an operation with a specific requirement set, and the requirement set points back to the ritual-logistics reading that the mainstream treatment declines to consider.

The Catholic Church constitutes the most extensively documented institutional node in Western legal history. National investigations have produced a record that no other institution matches in evidentiary density: the 2018 Pennsylvania Grand Jury Report documented more than three hundred priest-perpetrators and over a thousand identifiable victims across six dioceses across seven decades; the Irish Murphy Commission Report (2009) documented systematic suppression of abuse reports by the Dublin Archdiocese across the same period; the Australian Royal Commission into Institutional Responses to Child Sexual Abuse (2017) found that approximately 7 percent of Catholic priests in Australia between 1950 and 2010 had been accused of child sexual abuse. The cover-up architecture — perpetrators transferred between parishes rather than reported, victim families pressured under confidentiality agreements, diocesan and Vatican financial apparatus deployed to purchase silence, internal communications demonstrating knowledge at the highest institutional levels — follows the same logic as every other node in the topology: a cover function the public accepts at face value, an interior function that inverts it, and a victim population whose reports are absorbed into clinical or anti-clerical categories that insulate the institutional pattern from scrutiny.

Beyond the cases that have reached prosecution or public scandal, the operation’s institutional substrate extends into the ordinary infrastructure of civil society. Survivor testimony — clinically consistent with Ross’s independent reconstructions from the other direction — identifies K-12 public school facilities as programming sites, with dedicated rooms operated by federal personnel rather than teaching staff, and deployments attested across multiple U.S. states. The same testimony pool repeatedly names the Church of Jesus Christ of Latter-day Saints as a participating institution whose temple ritual architecture (blood oaths, new names, covenant triggers, coded gestures), endogamous multi-generational marriage patterns producing dynastic continuity, and insular institutional culture with minimal external audit together function as near-ideal cover and scaffolding for programming operations. The Disney corporation appears in the same testimony pool as a programming-themed environment whose children’s-entertainment function coexists with the induction pipeline the broader entertainment industry runs. Each of these nodes operates by a single logic — a cover-function the general public accepts at face value, an interior function that inverts the cover, and a witness population whose reports are pre-assigned to a clinical or political category that absorbs them without reference to the institutional pattern they describe. The testimony pool has the provenance problems attendant to all single-witness survivor material, and the specific named-figure claims inside it are testimonial rather than documentable; the repeated structural findings across independent testimonies that did not reach each other are the item worth taking seriously.

What Is Actually Taken

The adrenochrome discourse is organized as a binary: either a literal harvested blood-compound circulated as commodity among elite consumers, or a complete fabrication whose propagation indicates the cognitive damage of its propagators. The binary forecloses the traditional answer, which is that the material of the operation is the biochemical-energetic state of a human body pushed to the threshold of terror, sexual extremity, or death, and that the question of whether any literal substance is physically extracted is a detail downstream of the primary event. The chemistry of the threshold state is empirically real: endogenous DMT release under acute fear, pineal recruitment, oxidized catecholamines, corticosteroid saturation, and the range of compounds the central nervous system produces at the edge of conscious existence. The late-antique magical papyri name the operation’s yield pneuma basilikon, the royal breath, the refined essence of a terminal sacrifice. The Gurdjieffian tradition names it food for the moon. Monroe’s Far Journeys transmission names it loosh. The Castanedan flyers take it as what the Toltec tradition calls awareness, which in their accounting is the resource the non-human intelligences farm Earth for. Different vocabularies, the same extraction.

What the black-project consciousness research of the late twentieth century appears to have confirmed — the inference rests on personnel, funding, and topical continuity between the acknowledged programs and the classified successor work rather than on disclosed results — is that the traditional esoteric reading of the threshold state was substantially accurate, that the state is operative rather than phenomenological, and that the apparatus for its reliable production is deployable at scale. The finding has not been published and will not be. The apparatus has been integrated into the existing logistics layer.

Why the Operation Actually Runs

The question through which the operation’s existence is most readily dismissed is who would actually do this. The question assumes the rite is performed out of appetitive cruelty, which is the assumption at which the conventional frame stops tracking reality. The operators perform the rite because the rite works. It produces operative charge, contact with non-human intelligences, biochemical yield the operator absorbs, admission to the coordination layer of actual power, and participation in what the operator’s tradition treats as sacred communion with the real deities. The returns are real. They are the reason the operation has run for thousands of years across every civilization in which a bloodline capable of transmitting the rite has existed, and the reason it will continue running for as long as the apparatus of concealment holds.

Operative charge. The rite generates magical force on the same order as the sealed-vessel initiatic operation, with the inverted form directing the force outward at whatever target the ritual frame names rather than inward to transform the operator. The force shows up as market-timing sensitivity, strategic foresight that outruns the operator’s analytic capacity, synchronistic convenience along the operator’s path, the neutralization of obstacles that ordinary probability should have ended the operator’s trajectory on, and the charismatic pull that collects followers, capital, and institutional position at rates talent alone does not explain. The principal who closes deals no one else could close, escapes legal consequences no one else could escape, and arrives at every inflection point slightly ahead of the public record is, more often than the surface biography acknowledges, a participant in the rite.

Contact. The breach in the victim’s vessel is simultaneously a breach through which non-human intelligences operate, and the operator standing in the ritual frame is the party on whose side of the breach the contact is maintained. The operator communicates with entities — information, guidance, negotiation, communion — whose communications produce verifiable operational results. The entities are gods. The public religions are shadows of the real structure. The rite is the sacrament through which genuine deity is reached, and abstention from the rite is refusal of communion with the ground of being.

Biochemistry. The threshold-state biochemistry of the terrorized body produces compounds whose transfer to the operator remains empirically underspecified in open literature and whose elite-circulation under the adrenochrome label is a garbled approximation of the actual pharmacology. The compounds deliver felt vitality, cognitive acuity, and slowed aging. Controlled measurement is a question the operators have no incentive to resolve and the apparatus no incentive to permit, because the yield is observable to the operator in his own body and repeated participation confirms it.

In-group admission. Participation is the rite by which a candidate is admitted to the coordination layer of power where actual decisions are made. The public surface of wealth and influence holds many individuals who have never performed the rite; the rooms where civilizational direction is coordinated hold substantially fewer, and the principals in those rooms have come through some version of the rite’s antechamber. Ordinary success unaccompanied by the rite tops out at a specific ceiling that operators who have performed the rite routinely exceed. The compromise the performance produces functions as the credential by which the operator’s loyalty to the network becomes legible to its other members — a principal the network can destroy at will is a principal whose behavior the network can predict, and predictability is the currency of trust inside the operation.

Worship. The last and most load-bearing item. The operators are practicing sacred communion with real deities. The rite is a religious act. The operation has persisted across millennia at a scale and with an internal coherence that only functioning religions sustain, and the operators are the clergy of a religion whose adherents have never stopped transmitting the rite, whose deities are more real and more operationally present to the adherents than the deities of the public religions they nominally observe, and whose doctrines are the interpretive frame through which they understand their own lives. The operation’s persistence is the persistence of a functioning religion whose cathedrals are the lodges, the islands, and the studio systems, whose liturgy is the rite, and whose sacraments are the shattered vessels the faith requires. The rationalist frame cannot see this and the materialist frame cannot see this, which is one of the reasons the operation has been able to run as long as it has under surfaces the rationalist and materialist frames are content to take at face value.

The yield list cashes out the thesis through which the operation’s existence is most readily dismissed. The answer to who would actually do this is: the people who have been doing it for thousands of years, who draw real spiritual, political, and biochemical returns from it, who treat the ordinary population’s inability to imagine the operation as the operation’s principal protection, and who are, in their own tradition’s reckoning, the priests of the world’s oldest continuously-practiced religion. Taking the operators’ own frame seriously is the precondition for assessing the operation accurately. Refusing to take it seriously, on the ground that the frame looks absurd to the outside observer, is the epistemic posture the operation specifically relies on.

The Group Vessel

An individual operator confronts a vessel-integrity problem at the level of the individual rite. The charge the operation generates transforms whoever stands in the ritual frame, and transformation has costs the ambitious operator prefers to distribute. The historical solution is the group vessel: the lodge, the bloodline council, the court cabal, the Bohemian Grove summer encampment, the Skull-and-Bones tomb, the continental aristocracy networks that the Enlightenment period consolidated, and the Sabbatean-Frankist back-channels whose influence downstream of their nominal 18th-century dissolution continues to surface in places the conventional historiography labels coincidence. These are ritual containers at the group level. Multiple participants sharing a single container distribute the transformation-cost while pooling the charge, and the pooled charge reaches scales — civilizational, political, cultural — that isolated practice cannot produce. Mass ritual describes the broadcast extension of the same mechanism to audiences that participate without knowing they are participating.

The mainstream reflex to treat “elites performing rituals” as self-evidently absurd is the operation’s most effective concealment. An apparatus whose primary threat model is ridicule does not require sophisticated counter-intelligence. The population whose recognition would end the operation has been trained, across generations of popular culture, to treat the recognition itself as the marker of cognitive failure.

The Broadcast Layer

The entertainment industry performs two simultaneous functions that the standard cultural criticism treats as unrelated. The first is the recruitment, grooming, and breaking pipeline that manufactures new operators and new vessels: child performers entering the industry, the induction of dissociation through the combination of early sexualization and the structural isolation of the working child from parental protection, and the continued “access” in adulthood for those whose compartmentalization held and the documented collapse for those whose did not. The second is the mass-ritual broadcast of content that runs the inverted-working pattern at audience scale — the specific visual and narrative grammar whose ubiquity across contemporary popular media is more naturally accounted for by deliberate transmission than by accidental convergence. The boundary between consuming the content and participating in the rite is porous by design. The Catholic notion of participatio in liturgy applies to inverted rites as fully as to uninverted ones, and the audience, having rehearsed the inverted liturgy in the receptive state that entertainment consumption produces, participates in ways the materialist frame cannot register.

The Double Harvest

The operation produces yield for multiple claimants whose interests align only across this specific structure. The direct human operators receive operative charge, contact with non-human intelligences, the longevity-adjacent biochemistry that circulates as rumor and whose empirical status the operators decline to clarify, and institutional position whose stability derives from the compromised-principal dynamic: a principal who can be destroyed by disclosure is a principal the institution can control, which is why the logistics network’s apparent carelessness about documentation is functionally a feature rather than a vulnerability. The parasitic ecology’s non-human intelligences receive loosh supply and, more importantly, sustained presence-in-world through attached hosts, which permits a degree of influence on civilizational trajectory that the unattached condition does not. The institutional apparatus receives a reliable inventory of compromised principals at every rung of power. The fourth claimant, the one the esoteric literature has always emphasized and the contemporary discussion consistently omits, is the operation itself: a self-perpetuating structure whose continued existence is a claimant on the yield independent of any participant’s intentions. The human operators serve it more than it serves any of them, which accounts for the characteristic trajectory by which operators who believed themselves instrumentalists in their youth find themselves, in late career, having been the instrument.

Ridicule as Concealment

The topic’s lurid vocabulary — adrenochrome harvesting, satanic ritual abuse, Monarch slaves, pizzagate, white rabbit programming — functions as its own defense. The material accumulates names calibrated to sound maximally deranged, and the derangement is structurally necessary. A civilization that cannot metabolize a fact distributes the fact across incompatible genre-domains — tabloid journalism, horror fiction, conspiracy forum, clinical pathology, fringe occultism, true-crime podcasting, academic religious studies — and then polices any attempt to reintegrate the domains as itself the signature of cognitive derangement. Each domain insists the others are the real threat and that it itself is merely entertainment, or clinical curiosity, or historical footnote. Reintegration is the move the operation cannot afford to permit, because the operation depends on the distribution for its continued invisibility. The posture appropriate to load-bearing topics of this kind — reading the facts in sequence rather than in isolation, treating classification and destruction as data rather than as absence of events, applying symmetric methodological standards to the official and fringe sides of each sub-question, and refusing the performative equipoise that rescues the official side through editorial kindness — is the posture that dissolves the concealment.

Vessel-Integrity as Counter-Operation

The standard playbook developed for adjacent topics applies: vessel-integrity, discernment, refusal of contact on terms set by the other, the protection practices that every serious esoteric tradition has maintained and that the tradition’s more recent treatments have systematized for contemporary conditions. Beyond the standard playbook, the highest-leverage practical countermeasure is the protection of children’s vessel-integrity before the vessel has sealed. The operation’s first requirement, visible in the century-long cultural push to normalize early sexualization, to dissolve the adult/child boundary, to route children through institutional environments with minimal parental oversight, and to embed the grooming vocabulary inside emancipatory rhetoric so that objection registers as reactionary, is the cracking of vessels before they seal in adolescence. Without the early crack the operation does not run at scale. Recognition of this requirement as the actual threat model, and refusal of every social-legitimation move that advances it regardless of the ideological valence under which the move arrives, is more consequential than any of the after-the-fact outrage cycles that the visible phase of the operation reliably produces. The operation accommodates outrage. The operation is unsettled by coherent children and by adults who remember what a sealed vessel is.

References

Castaneda, Carlos. The Active Side of Infinity. HarperCollins, 1998.

Evola, Julius. Eros and the Mysteries of Love: The Metaphysics of Sex. Inner Traditions, 1983.

Grant, Kenneth. Nightside of Eden. Muller, 1977.

Levenda, Peter. Sinister Forces: A Grimoire of American Political Witchcraft. Three volumes. Trine Day, 2005–2006.

Marks, John. The Search for the Manchurian Candidate: The CIA and Mind Control. Times Books, 1979.

Bryant, Nick. The Franklin Scandal: A Story of Powerbrokers, Child Abuse, and Betrayal. Trine Day, 2009.

DeCamp, John W. The Franklin Cover-Up: Child Abuse, Satanism, and Murder in Nebraska. AWT, 1992.

Monroe, Robert A. Far Journeys. Doubleday, 1985.

Ross, Colin A. Bluebird: Deliberate Creation of Multiple Personality by Psychiatrists. Manitou Communications, 2000.

Hammond, Corydon. “The Greenbaum Speech.” Fourth Annual Eastern Regional Conference on Abuse and Multiple Personality, Alexandria, Virginia, June 25, 1992. Princeton University Library Archive, finding aid C1703.

Scholem, Gershom. Sabbatai Sevi: The Mystical Messiah. Princeton University Press, 1973.

Sweet, J. R. What Is Mk-Ultra? Trauma Based Mind Control from the Survivor’s Perspective. Mormon Monarch, mormonmonarch.com.

Urban, Hugh B. Magia Sexualis: Sex, Magic, and Liberation in Modern Western Esotericism. University of California Press, 2006.

Urban, Hugh B. The Power of Tantra: Religion, Sexuality, and the Politics of South Asian Studies. I.B. Tauris, 2010.

What links here.

21 INBOUND REFERENCES