36,922
edits
No edit summary |
|||
Line 53: | Line 53: | ||
The truth is difficult, but it is what sets us free, along with nurturing our direct relationship with the power of God’s eternal loving spirit. All forms of denying the existence of the spiritual dimensions, ultimately generates deceptive harm in our life. We cannot reject the very nature of what and who we are as spiritual beings, and must recognize that we are sharing this earth with many other kinds of spiritual forces. We have a physical body and mind, but they are interconnected and intricately enmeshed with our [[Soul]] and Spirit, thus, we need to integrate all of our bodies to help bring them back into balance, to be able to heal the true heart of humanity.<ref>[http://www.energeticsynthesis.com/index.php/resource-tools/news-shift-timelines/2776-soul-psychology Soul Psychology]</ref> | The truth is difficult, but it is what sets us free, along with nurturing our direct relationship with the power of God’s eternal loving spirit. All forms of denying the existence of the spiritual dimensions, ultimately generates deceptive harm in our life. We cannot reject the very nature of what and who we are as spiritual beings, and must recognize that we are sharing this earth with many other kinds of spiritual forces. We have a physical body and mind, but they are interconnected and intricately enmeshed with our [[Soul]] and Spirit, thus, we need to integrate all of our bodies to help bring them back into balance, to be able to heal the true heart of humanity.<ref>[http://www.energeticsynthesis.com/index.php/resource-tools/news-shift-timelines/2776-soul-psychology Soul Psychology]</ref> | ||
==Dissociation Mind Programming== | |||
The brain is like a computer that can be programmed and installed with software. To program trauma based dissociation into subjects is to create multiple files that act as programs or identities in that person. [[SRA]] is administered through performing rituals connecting links with demonic entities at the creation of each file or program that is designed for some function or purpose. Then there is a password or trigger word attached to each program file in order to access that identity function, usually by a handler that is abusing and traumatizing their subject. | |||
==References== | ==References== |