Glossary of Terms

Amethyst

Part of jewel programming, its goal meant to create an alter that reinforces silence programming by keeping secrets or destroying evidence. See also chi or silence programming.

Alter

Alter is shorthand for alternate personality. A dissociated part of the mind which has a separate identity and is given cue codes by Programmers to trigger that dissociated part of the mind to come to the front of the mind. The part’s identity may be a gem, rock, a tape recorder, a poodle, a white… read more »

Alpha

Alpha is base-level programming reinforced by scripts. All survivors recieve alpha programming so that other kinds can be installed later. This generally can also relate to memory and mind enhancements through hypnotic or programming means.

Agent Provocateurs

Individuals who join groups with the purpose of leading the group to do things that will cause it harm.

Agent of Influence

These agents can be unwitting, under mind-control, or ideologically motivated to use their positions of influence to sway the minds of others

Age Regression

The act of bringing back past memories in a subject though the use of hypnosis. The memories can be very vivid and real in the mind of the subject Age regression can also be used to undo deprogramming work or restore programming. Also if the front alter makes any progress outside of their programming, a… read more »

Adjudication

The exercise in judging whether a person can have access to compartmentalized information.

Ad Hoc Groups

Adults, who may or may not have had abusive childhoods, come together and form a new group with its own ideology and rituals.

Accessed

Accessed or being accessed is when the survivor is generally abused by the cult. For example, if the survivor was accessed last night – they’d have no memory of the abuse until generally the next morning after, if not then it may take years to properly recover the memories and work out what is happening…. read more »

Access Codes

Specialized codes, often coded into short messages, or numerical codes, that allows access into the subject’s system. These codes may also depend and be set up on sight recognition and voice recognition of the Programmer giving the codes. The system will respond to the codes only if an individual who appears to be an authorized… read more »

Sidebar