Chapter 4. Science No 4 - Hypnosis Understanding the Basics About Hypnosis
A. Dissociation, trance, & its
historical use
The
History of Hypnosis for Programming Hypnotic cues
B. How to program with hypnosis
George
Estabrooks Royal
Institute of International Affairs Rhodes
Scholarship
C. How to boost creativity of victim with
hypnosis
The
Vital Role of Movies for Hypnotizing Small Children
Spinning Tops
The
Hypnotic Voice of the Programmer
D. Keeping the mind dissociative
E. Keeping the mind in a programming (Alpha) state
F. Hypnotic triggers & cues
Monarch
Mind Control Codes Contents (A-T)
G. Hypnosis in programs & other uses
Alice
In Wonderland Programming as it Pertains to an Alter Going Down in Trance for
Internal
Hypnotically Building in Structures
A. Dissociation, Trance, and History of Hypnosis for Programming
Dissociation is used as a defense to protect a person from overwhelming pain and trauma. It is a natural ability of the brain. Hypnosis or hypnotic trance is a form of dissociation. There are a number of types of dissociation: amnesia, somnambulistic states, localized paralyses, anesthesias, and hallucinations. Hypnosis can reproduce all of these dissociative states. The mind naturally hypnotizes itself under various conditions. Perhaps the reader has been driving along a familiar road and the next thing you knew you were arriving home, having driven in a trance. Now let’s suppose you are driving to a movie and you are discussing next week’s plans with your wife. The complex thinking required to drive just happens. You are awake talking to your wife, and yet on another level you were in trance driving the car. You as a subject were both in hypnotic trance (driving) and awake (talking about plans).
There are 5 levels to the subconscious that the mind will naturally dissociate to. The other deeper levels require help to access. People naturally can think on two levels. Because people’s minds function on multilevels and there is a continua on a spectrum that runs from conscious to unconscious, it is often difficult to pinpoint just exactly what state of mind the brain is in at a certain point, because there is no single answer. A light trance is where a person is daydreaming about his girlfriend. A moderate trance is where he imagines he is in bed. A deep trance is where he physically feels he is in bed with his girlfriend. Sleep is where one dreams of being in bed. Behavior modification is carried out in the light to deep trances. The deep trance is a very creative level.
Hypnosis appears to affect several areas of the brain--the brain stem is modified into the hypnotic state, and the midbrain centers are inhibited so that other areas--the motor, sensory and memory areas can be manipulated. Further not all hypnosis works the same way. Hypnosis can be used on the intellectual part of the mind, the social-spiritual part of the mind, and the primitive reproductive part of the mind.
The skilled hypnotist will decide which area he wants and how to work with that area. Both Christians and Illuminati members who are skilled in understanding demonology, believe that there is a demonic side to hypnosis also. It should come as no shock to people that in the World Book Encyclopedia hypnosis is listed under Magic as a related article, but not under Medicine. Some Christians class hypnosis as a form of divination and enchantment. It certainly can be a form of control. In occultist W.B. Crow’s book Witchcraft, Magic & Occultism, it lists hypnotism as an occult science. There is open debate whether hypnotism is simply part of the brain’s natural abilities or if supernatural elements are part of the process. There is no debate that historically, hypnosis for centuries has been the guarded secret of the occult world. During shock or stress, the body’s limbic-hypothalamic-pituitary-adrenal system, releases substances which encode all the internal and external pieces of information being sensed into a deep level of consciousness. These memories often become dissociated from normal states of consciousness. In other words, when the mind-body returns to this state (where it was in during shock/stress) the mind can reaccess those memories. However, until the mind returns to this shocked state, it doesn’t pick up the information it has embedded. The Monarch programmers are acutely aware of how the mind functions, and how information and memories can be trapped in the mind.
There are different neurophysiological states. Also there are said to be 12 levels to the subconscious mind. Then on top of this the mind has the ability to create amnesia barriers. Hypnosis is a valuable tool to move the mind to different neurophysiological states and to get the mind to different levels of the subconscious mind. Hypnosis can also play a role in working around amnesia, since both are types of dissociation.
Hyperventilation helps a person induct into a hypnotic trance. Torture, depersonalization, fear and acute anxiety stimulate the body to hyperventilate. So the fear, torture and depersonalization are aids for the hypnotist to help induct a person into a hypnotic trance.
Hypnotic cues can be given to cause the body to go into various dissociative states. This could be a post-hypnotic suggestion that causes hyperventilation and an accompanying trance state. Hypnotic cues that are tied to every day objects enhance the programming. Everything in life becomes a cue to reinforce the programming. That may seem on the surface to be an exaggeration, but it is only slightly enlarged from the truth. The programmers do in fact examine a person’s life, and then tailor their cues to what the person will be around.
For instance, the programmer may force the child to smoke and then tell it that every time they blow out smoke they will think about their master. The programmed alters don’t dare not to smoke on fear that they will be punished. The smoking in turn reinforces the power of the hypnotist/master. Much of the good that therapy can do is in effect to de-trance or dehypnotize clients. Most of the alters of a Monarch system go their entire lives in trance. Common objects in a person’s life that can be hypnotically given a programming meaning include music, tones, colors, the sight of a book or Bible, the pyramid on the back of a dollar bill, pictures of God, silk scarfs, jewelry, lights, sounds, TV programs, and countless other things. The limit to this is simply the programmer’s creativity.
The power of hypnosis is often underrated because the power of the mind is underrated. The mind can decide to control its breathing, heart beat, blood pressure and other things that were once thought to be involuntary.
The brain produces a substance which is a tiny peptide molecule called enkephalin which acts just like morphine and reduces pain. The brain can be hypnotically trained to release enkephalin so that the brain doesn’t perceive pain. A common hypnotic device for washing away pain is running water. The victim is hypnotically told to go to a waterfall and wash their pain away. (According to a programmer the average healing rate is 3 times quicker under hypnosis than without.)
The fantastic abilities of the mind to control what happens to it are very remarkable (such as its natural healing abilities), but most of this is being kept a National Secret so that it can be used against humanity to enslave us to demonic-empowered power hungry monsters, rather than to benefit humanity. Several people in intelligence agencies quietly bemoan the fact that secret research could be helping humanity instead of controlling it.
The human mind has been found to be like an immense symphony orchestra, each part doing what it does best under the guidance of a director part similar to the conductor of an orchestra. A non-multiple’s brain delegates responsibility to parts of his brain yet retains control over the process. His mind will shift from one ego state to another, & still retain its identity.
In contrast, the multiple’s brain also delegates responsibility and shifts from one ego state to another, BUT doesn’t retain a cohesive selfhood or self-identity. The mental mechanisms are similar, but the experience is vastly different. Rather than an orchestra playing together, the multiple’s brain is full of competing isolated parts (instruments so to speak) that are playing in isolation. Out of the chaos of all these independent amnesic parts, the programmer through hypnosis/& fear then becomes the conductor to help bring order out of chaos.
If the multiple is to regain a chance to orchestrate their own life again, they must re-establish communication between the different parts of what should have been their own orchestra, and get internal people to harmonize their music of life. Good programmers do not need to formally induct their victim into hypnosis. However, if they need to, the Monarch slaves are well conditioned to respond to numbers being counted and fingers being snapped. Hypnosis was a well developed art by the early 20th century. And testing and refining continued all along.
For instance, the.
The ability to distinguish between magic and hypnotism may not exist for the child in situations where they are witnesses to the power of hypnotism exercised by a programmer. This makes the adult programmer, who is a big person look all powerful. Another danger inherent in hypnosis are complications (side effects) that hit a percentage of those who are subjected to it.
Hilgard (1974) discovered 31% of the 120 university students participating in a study of hypnosis had complications that lasted from 5 min. to 3 hours after trance, which included headaches, dizziness, nausea and stiff necks. Fritz is aware of one woman who, after the one & only hypnotic session she was the subject of, developed the complication of having nightmares of snakes crawling all over her. (For further study the reader may want to read MacHovec, Frank. "Hypnosis Complications, Risk Factors, and Prevention" American Journal of Clinical Hypnosis. Vol. 31, No.1, July, ’88, p. 40+.)
Regular gentle electrical stimulation in many parts of the brain including the lower part of the reticular formation can change the state of consciousness from alert to sleepy. An electrical band attached to a box is sometimes placed on the victim to produce a hypnotic state. There are several ways to alter a person’s state of consciousness, but the most popular one by Monarch handlers is to use a combination of drugs and hypnosis. Drugs are used to facilitate hypnosis. Modern drugs do almost all the work for the hypnotist. They place the person in an altered state and make them willing to take any order. Often survivors remember orange or grape drinks, or something else which they were given, which were used to give the child drugs. One Monarch slave (Cathy O’Brien) wrote about having been given hypnotic drugs via a Grasshopper ice cream drink.
Occasionally, hypnosis must be carried out by the programmers on unwilling subjects. They have 3 major ways to get around this. They can induce hypnosis by disguising what the hypnotist is doing, they can wait until the person is asleep and talk to him while asleep, or they can administer drugs.
Also the Network has some high-tech equipment which stimulates the orgiastic state (sexual ecstasy) part of the brain. By moving the body into this state, the mind opens up all the unconscious states. Then sophisticated brain wave machines program thoughts into the person. A computer disk is put into the electric shock machine and it runs a program that sends electric jolts down six nodes. The brain’s reticular formation serves as the brain’s mechanism involved in regulating alertness and awareness. Various kinds of stimuli will enter the brain through its various methods of sensing and learning. With total sensory deprivation (done by placing the victim in a salt water tank with electrodes that shock the body until it stops all movement) the reticular formation will place the mind into a primitive state of consciousness where the programmers can place in post-hypnotic commands to do something on a certain date. The end time programming, that has Monarch slaves doing something at a specific date to create anarchy or to help the Anti-Christ come to power has been put in at this level.
As previously mentioned, this level achieved by total sensory deprivation of the Monarch slave is same primitive level as the brain’s commands to keep the heart beating. Depending on what type of signals are coming in to it from the various sensing agents of the brain, the reticular formation will then make a decision what state of consciousness to place the mind in. If the reticular formation does not send out "alert" signals, then the brain will get sleepy. Damage to the reticular formation can cause a coma. The two thalamus lie just above the brain stem. The right and left thalamus are the brain’s selective attention mechanism. That is to say, they decide what it is important for the brain to focus its attention on. The right thalamus is connected to attention to visual shapes and the left to our attention to things describable in words. Ten to fifteen repetitions at one second intervals are enough to cause the brain to lose interest in something. At this point the neuron’s in the reticular formation quit paying attention to whatever it is. For instance, your brain will listen to a clock tick for only 15 intervals before it quits listening to a clock in the room. But the brain’s alertness can be reactivated by a strong and sudden stimulus like a loud sound or a flash of light. This is why 3 gunshots or 3 flashes of light are used as standard access triggers for Monarch slaves. Three was also found to be the best number to get the job done.
The History of Hypnosis for Programming
A masonic magazine for higher masonic rites where sex magic is performed entitled Freemasonry Universal, Vol. 5, 1929, p. 58 states:
"Certain Forces are sent through the candidate’s
body during the ceremony, especially at the moment when he is created, received
and constituted an Entered Apprentice Freemason. Certain parts of the Lodge have
been heavily charged with magnetic force especially in order that the Candidate
may absorb as much as possible of this force. The first object of this curious
method of preparation is to expose to this influence those various parts of the
body which are especially used in the ceremony. In ancient
Long story short, the Masonic lodges have been using
hypnotism and electric shock in their initiation rituals for a long time. The
combination of fear and hypnotism combine to help seal the lips of an initiate
from telling what in some lodges are secrets of criminal activity.
The Brahmin caste in
B. How To Program With Hypnosis
George Estabrooks was the first major hypnotist to publicly recognize the potential for hypnosis. He contacted MI-6 and other military and intelligence groups in hopes he could interest them in the military-intelligence potentials of hypnosis. What was George Estabrook's connection to the Illuminati? George Estabrooks was a Rhodes Scholar, which is an entry-level group for the Illuminati.
For those who haven’t studied this, it would be appropriate to give a brief explanation of these things. The Illuminati in 1919 created the Royal Institute of International Affairs (RIIA). The Astor Illuminati family were major financial backers of the RIIA. Waldorf Astor was appointed to the RIIA. The American equivalent to the RIIA is the CFR. The RIIA and CFR set up Round Table Groups (based on the King Arthur myths) which were initially named by Cecil Rhodes "Association of Helpers".
High ranking Mason/Illuminatus Cecil Rhodes also created
the Rhodes Scholarship to bring select men from
several the English speaking world and Germany to learn how to bring in the One
World Government that the Illuminati has long had planned. The Cliveden Estate
of the Cliveden Astors (of the Illuminati) has played an important role in the
preparation of Rhodes Scholars. Bill Clinton and Fred Franz, the late president
of the Watchtower Society, are two examples of men selected for Rhodes
Scholarships. Bill Clinton went through the program. However, Franz decided not
to go to
The Watchtower Society leadership is a front for a part of
the Illuminati which practices Enochian Magic.
The power of Enochian magic is the Watchtowers. A powerful part of
Now back to Estabrooks, who was also himself part of the Illuminati. In his book Hypnotism, which came out in 1946, he wrote in his chapter "Hypnotism in Warfare" (again bear in mind that Estabrooks writes this in 1946 and has been advocating what he writes for perhaps the 15 previous years!) This chapter is not taken from a mystery novel. The facts and the ideas presented are, so to speak, too true to be good, but no psychologist of standing would deny the validity of the basic ideas involved. He might, of course, be somewhat startled at our proposed use of these basic ideas and techniques, for he has never given this matter much thought.... The use of hypnotism in warfare represents the cloak and dagger idea at its best--or worst. Even if we did know the answers to some of the weird proposals in this chapter, those answers could never be given for obvious reasons. The reader must use his imagination for specific outcomes in specific cases have not been made public--probably never will be made public. Any topflight physicist is familiar with the basic laws of atomic fission and he is quite free to discuss those laws. But he may or may not know what is happening on some government research project in this field. If he does know, he is not shouting it from the housetops, probably not even whispering it to his best friend. The same applies to hypnotism in the field of warfare. Our interest here lies in some of the more unfamiliar sides of hypnotism which may make it of use in warfare. Again, no psychologist would deny the existence of such phenomena.... The only possible way of determining whether or not a subject will commit a murder in hypnotism is literally to have him commit one.... But warfare...undoubtedly will, answer many of these questions. A nation fighting with its back to the wall is not worried over the niceties of ethics [like Nazi Germany]. If hypnotism can be used to advantage, we may rest assured that it will be so employed. Any "accidents" which may occur during the experiments will simply be charged to profit and loss, a very trifling portion of that enormous wastage in human life which is part and parcel of war....
One in every five adult humans can be thrown into the hypnotic trance--somnambulism--of which they will have no memory whatsoever when they awaken. From the military viewpoint there are a few facts which are of great interest. Can this prospective subject, --this ‘one-in-five" individual--be hypnotized against his will? Obviously, no prisoner of war will be co-operative if he knows that the hypnotist is looking for military information, nor will any ordinary citizen if he suspects that the operator will use him to blow up a munitions plant. The answer to this very vital question is "yes", though we prefer to say "without his consent" instead of "against his will." We do not need the subject’s consent when we wish to hypnotize him, for we use a ‘disguised" technique.
The standard way to produce hypnotism in the laboratory is with the so-called sleep technique. The operator "talks sleep" to the subject, who eventually relaxes and goes into a trance, talking in his sleep and answering questions.
Now suppose...we attach a blood pressure gauge to the subject’s right arm and the psychogalvanic reflex to the palm of his hand, just to make everything look shipshape. These devices are for measuring his ability to relax. We also point out that, of course, the very highest state of relaxation will be his ability actually to fall into a deep sleep while we are talking to him.
We also stress the great importance of the ability to relax in this modern world of rush and worry, promising to show him how to get results as one end of these experiments. All this is by way of buildup. Probably not one of our readers, if exposed to this procedure, would realize that this was preparation for hypnotism, but would co-operate willingly in this very interesting psychological experiment.
We then proceed to "talk sleep," much the same as in ordinary hypnosis, carefully avoiding any reference to a trance or making any tests with which the subject might be familiar, all the while checking on blood pressure and psychogalvanic reflex to keep up the front.
Finally we make the test of somnambulism, or deep hypnotism. We see if the subject will talk to us in his sleep without awakening. If this does not succeed, the subject wakes up completely, and in this case we simply repeat the experiment, hoping for better luck next time. But if we do succeed, if the individual belongs to the "one-in-five" club, the subject is just as truly hypnotized as by any other method, and from now on everything is plain sailing.
By use of the posthypnotic suggestion...we simply say, "Listen carefully. After you wake up I will tap three times on the table with my pencil. You will then have an irresistible impulse to go sound asleep." The next trance is just that easy to get, and the subject has no idea that it is the pencil which has sent him off."...
But we must go even further than this. Once a person has become accustomed to hypnotism, has been repeatedly hypnotized, it becomes very easy for any operator to throw him into the trance. Obviously this will not do if we are to use hypnotism in warfare. So we plug this gap again by suggestion in the somnambulistic state. We assure the subject that in the future no one will be able to hypnotize him except with the special consent of the operator. This takes care of things very nicely....We sit down with the subject...We are talking about the latest boxing match when the operator taps three times on the table with his pencil. Instantly--and we mean instantly--the subject’s eyes close and he’s sound "asleep." While in trance he sees a black dog come into the room, feels the dog, goes to the telephone and tells its owner to come get it. The dog is of course purely imaginary. We give him electric shock which would be torture to a normal person, but he does not even notice it. We straighten him out between two chairs and sit on his chest while he recites poetry. Then we wake him up.
He immediately starts talking about that boxing match! A visitor to the laboratory interrupts him. "What do you know of hypnotism?" The subject looks surprised, "Why, nothing." "When were you hypnotized last?" "I have never been hypnotized." "Do you realize that you were in a trance just ten minutes ago?" "Don’t be silly! No one has hypnotized me and no one ever can.’’ "Do you mind if I try?" "Not at all. If you want to waste your time it’s all right with me." So the visitor, a good hypnotist, tries, but at every test the subject simply opens his eyes with a bored grin. Finally he gives up the attempt and everyone is seated as before.
Then the original operator taps on the table with his pencil. Immediately the subject is in deep hypnotism. We now add another concept. We can coach the subject so that in the trance he will behave exactly as in the waking state. Under these circumstances we could defy anyone, even a skilled psychologist, to tell whether the subject was "asleep" or "awake." There are tests which will tell the story but in warfare we cannot run around sticking pins into everyone we meet just to see if he is normal. So rapid can this shift be from normal to trance state [the programming state], and so "normal" will the subject appear in trance, that the writer has used such a subject as a bridge partner. He plays one hand in trance and one hand "awake" with no one any the wiser. [This happens with Monarch slaves all the time. Few people ever catch on that alters are under trance.] Suppose we deliberately set up that condition of multiple personality to further the ends of military intelligence.
Let us start with a very simple illustration. For example,
we can hypnotize a man in an hotel in, say,
Did he notice anything of interest as he made his walk?
"Nothing! Oh, yes, there was a dog fight down at the corner." And he
described the battle in detail. We
now hypnotize him. He knows what we are seeking and at once proceeds to give us
numbers and states of strange cars, very pleased with the fact that he can
recall thirteen. He evidently enjoys the game immensely and is quite proud of
his memory. Then we awaken him and
see what he knows in the conscious state. "How many cars are there around
the building?" "I don’t know." "What are the numbers of
the out-of-state licenses around the building?" "Good heavens, I have
no idea. I think there is a
A friend tries his hand. "Now look here. You were hypnotized half an hour ago and you left this room under posthypnotic suggestion." The subject gets irritated. "Look here yourself. I’m getting tired of that silly joke. This is the third time today you’ve pulled it. All right. I was hypnotized and saw pink elephants all over the lobby. Have it your way." And the subject sits down to a magazine, obviously angry that this man cannot find something more amusing to say.
Often the hypnotic subject will react in this manner. Push him just a little too far and he becomes irritated, obviously a trick of the unconscious to end the argument and avoid any danger of being found out.... The reader’s very natural reaction is, "Why all this rigmarole?"... There are certain safeguards if we use hypnotism. First, there is no danger of the agent’s selling out. More important would be the conviction of innocence which the man himself had, and this is a great aid in many situations. He would never "act guilty" and if ever accused of seeking information would be quite honestly indignant. This conviction of innocence on the part of a criminal is perhaps his greatest safeguard under questioning by the authorities.
Finally, it would be impossible to "third degree" him and so pick up the links of a chain. This is very important, for the most hardened culprit is always liable to "talk" if the questioners are ruthless enough. The Super Spy in the instance we are about to outline, we may or may not be dealing with multiple personality....
The little experiment I have just cited could be successful with any good somnambulist and would require about ten hours preparation. The example I now cite would work only with a certain number of the very best somnambulists and instead of ten hours preparation, we had better allow ten months....
Perhaps we had better start by defending our position. Is it unethical? Perhaps, but science merely states the facts.... Now let us return to our presentation. We start with an excellent subject, and he must be just that, one of those rare individuals who accepts and who carries through every suggestion without hesitation. In addition, we need a man or a woman who is highly intelligent and physically tough. Then we start to develop a case of multiple personality through the use of hypnotism.
In his normal waking state, which we will call Personality A, or PA, this individual will become a rapid communist. He will join the party, follow the party line and make himself as objectionable as possible to the authorities. Note that he will be acting in good faith. He is a communist, or rather his PA is a communist and will behave as such. Then we develop Personality B (PB), the secondary personality, the unconscious personality, if you wish, although this is somewhat of a contradiction in terms. This personality is rabidly American and anti-communist. It has all the information possessed by PA, the normal personality, whereas PA does not have this advantage....
The proper training of a person for this role would be long and tedious, but once he was trained, you would have a super spy compared to which any creation in a mystery story is just plain weak. This is what the Illuminati have done. They create good Christian fronts, with Illuminati dark alters who can see what the Christians are doing.
My super spy plays his role as a communist in his waking state, aggressively, consistently, fearlessly. But his PB is a loyal American, and PB has all the memories of PA. As a loyal American, he will not hesitate to divulge those memories, and needless to say we will make sure he has the opportunity to do so when occasion demands.
Here is how this technique would work .... [skipping this story and several others, we come to:] We choose a good subject and then let him in on the plot. We disclose to him that he is an excellent hypnotic subject and we wish to use him for counterespionage. We suspect that in the near future someone is going to try hypnosis on him. He is to bluff, to co-operate to the very best of his ability, fake every test that is made and stay wide awake all the time. The test we fear most is that of an analgesia--insensitivity to pain. So we coach him carefully with posthypnotic suggestions to the effect that even when wide awake and bluffing he will be able to meet every test which may be made here, be it with ammonia under the nose, a needle, or worst of all, the use of electricity, which can be made extremely painful and is easy to use.
Under these circumstances it will be virtually impossible to tell whether this man is bluffing or really in trance. [The story continues that the master hypnotist thinks he has got a good subject and has hypnotized him deep. Then the subject tells him that he was only bluffing. The whole affair provides a nightmare for any counterintelligence group using hypnotism. They can be totally bluffed, unless they turn to high tech equipment to see what is really happening.]
Estabrooks also explains how a man can be hypnotized and
told he is only testing the preparedness of security. He is told he has a fake
bomb, but is really given a real bomb. The subject is sent to a location, and
blows up with the real bomb. The subject blows up with the bomb so the evidence
of the hypnotic lie is lost. Hypnosis changes the threshold of the how the
senses perceive. Sensitivity can be increased or decreased, hallucinations can
be perceived even though there is the absence of any appropriate stimuli, and
things that exist can go unperceived by the mind. For instance, alters who are
used for porn are hypnotized not to see the camera. Alters used for any type of
sexual service are hypnotized repeatedly to not see faces. The slave will
actually see blurs where people’s faces are.
The Programmers like to manipulate. Children are set in front of circus
mirrors that make them taller or smaller for programming. They are set in front
of mirrors which duplicate their image. Here in
The CIA has employed magicians like John Mulholland to help them create illusions. Magician John Mulholland wrote a manual for the CIA on how to deceive unwitting subjects. Under drugs and hypnosis, when a small child is set in front of a mirror that elongates its body and or then shortens, the reality of the programming script seems real. The programmer can hypnotically call upon the child’s mind to totally hallucinate seeing something, or he can support the illusion by handing the child a doll and telling it that it is a child, or handing the child a pencil and telling the child it is a flower. A great deal of acting and props are used during the programming. What child can tell fool’s gold from real gold? The bottom line is that generally, no matter which way the Programmers do it, whether by an illusion or an outright hypnotic-suggested hallucination, the event for the child is real. The majority of traumas are real events, but the scripts that are given are after the trauma are fictional.
C. Hypnosis Can Boost The Creativity of the Victim to Adopt Scripts
Creativity is a function of attentiveness, playfulness, anxiety, limitations, relaxation, the trance state, responsiveness and absorption. A good programmer can assist or boost the creativity of the child. The programmer can tell stories and programming scripts in a vivid way, so that the sensory pictures are bold and strong. The child can taste and feel and touch in their minds the script being given them. Besides the language of the programmer other aids such as fear and drugs can enhance a victim’s attentiveness.
Playfulness comes naturally to children. They naturally pretend and use fantasy in their play. Because children are innately creative they are far easier to program. Researchers have also discovered that creativity needs an element of anxiety and chaos in the person’s life. If everything is orderly and in perfect harmony, the creative juices will not flow. The conscious mind and the subconscious mind need to grapple. For creativity to be productive it must occur within limits. For instance, the concerto is created within the limits of a piano keyboard.
The programmer, and the Grande Dame and the Grande Mother of the Illuminati victim carefully guide the child’s creativity and set limits. The spark of creativity occurs when there is an alternation of intense concentration and relaxation. The programmers must work back and forth between torture and kindness. A light trance will allow the mind to surface creative ideas. That is why writers and composers get ideas when they are in a light trance driving, in a light sleep, or shaving or some other place where a light trance occurs. Receptivity is the willingness to accept a creative idea when it comes.
The final part of creativity is one’s absorption into the process of creativity. The artist may get so immersed into the portrait that he is painting that the portrait seems alive and real--the actual person. This immersion, where things imagined become real, is important to keep the creative juices flowing. The hypnotist/programmer can enhance the creative process by giving the child positive encouragement to reduce their fears and inhibitions to creativity. The programmer could say to the older child (a younger child might be told something else), "You take all of your fear of not being creative and put them into a sack. The sack now becomes a bundle of energy. Now imagine you are opening the sack and out of the sack comes a rainbow of energy. It is powerful, it is positive. You are now full of new ideas. You can feel this power surge through your body. Your mind is now clear and focused, focused, you feel confident, sure of your talent and eager to set your new ideas into motion, and you control the energy in your life, you are very successful in controlling the energy in your life...you take a few breaths and relax. You notice the neighborhood around you, there is a beautiful park, you begin to notice how beautiful the day is, and you begin to feel a fresh new energy flowing through your body...the more calm you become the more enthusiastic and creative you become...you will feel free to create, to enjoy your creative talent, to invent, to shape, and form new and wonderful ideas."
This is not to say that the Illuminati programmer or Mother of Darkness assistant will use this type of hypnotic suggestions, but sometimes it does become necessary to teach some children how to dissociate, and how to become creative. If they do not develop these abilities, they may lose their life to the torture.
The Vital Role of Movies for Hypnotizing Small Children
As mentioned before, the hypnotist will find children easier to hypnotize if they know how to do it with small children. One method that is effective is to say to the small children, "Imagine you are watching a favorite television show." This is why the Disney movies and the other shows are so important to the programmers. They are the perfect hypnotic tool to get the child’s mind to dissociate in the right direction. The programmers have been using movies since almost day one to help children learn the hypnotic scripts. For children they need to be part of the hypnotic process. If the hypnotist allows the child to make up his own imagery, the hypnotic suggestions will be stronger. Rather than telling the child the color of a dog, the programmer can ask the child.
This is where the books and films shown the child assist in steering its mind in the right direction. If the hypnotist talks to a child, he must take extra precaution not to change the tone of his voice and to have smooth transitions. Most of the Disney films are used for programming purposes. Some of them are specifically designed for mind-control.
One method for inducting children into a dissociative state
is to have them look at a large spinning top, as the colors whirl around.
Carousel rides have also been popular to induce trances.
A good sampling of optical illusions can be found in Katherine Joyce’s
book Astounding Optical Illusions. NY:
The Hypnotic Voice of the Programmer
Programmers will adopt either an authoritarian voice, which is commanding and direct or a permissive soft tone. Bear in mind the slave who has the authoritarian voice used on it, sees the programmer as God with the authority of life or death over its (his or her) body and soul. The heightened expectation from the commanding tone, will increase the suggestions chance for success. However a softer tone, will relax the victim, and the hypnotist and the programming victim become partners in the hypnotic process. The advantage of the softer tone, is that the creativity of the victim is enhanced and participates more in the process.
The hypnotic induction becomes more real when the victim participates more in the process. The Monarch programmer will either use a monotone voice or a rhythmic voice. Remember, the professor who could lull his students to sleep. He had a hypnotic voice, without knowing it. A singsong or rhythmic voice is comforting. It can also be used by the Programmer. One continuous thread of words strung together are used to close out distractions. After a suggestion or command is given, a pause is made by the programmer in talking so that the suggestion is taken into the mind. Otherwise anxiety is experienced by the victim’s mind, and the suggestion will not be accepted as well.
Cisco, the co-author provides an example of how a hypnotic script can go with music, "Close your eyes for your eyes will only tell the truth. And the truth isn’t what you want to see. In the dark it is easy to pretend that the truth is what it ought to be. "Softly, deftly, music shall caress you. Hear it, feel it secretly possess you. Open up your mind, let your fantasies unwind in this darkness which you know you cannot fight. The darkness of the music of the night. "Close your eyes, start a journey through a strange new world. Leave all thoughts of the world you knew before. Close your eyes and let music set you free. Only then can you belong to me. "Floating, falling, sweet intoxication. Touch me, trust me, savor each sensation. Let the dream begin, let your darker side give in to the power of the music I write. You alone can make my song take flight. Help me make the music of the night. "Helpless to resist the notes I write, For I compose the music of the night. Hearing is believing, music is deceiving. Hot as lightening, soft as candle light. Dare you trust the music of the night?"
When the authors have bumped into men who are programmers and handlers for the CIA, they have noticed that many of these men have warm personalities and have a certain trained hypnotic voice which they use even when not programming. During rituals, the various magical languages used in witchcraft employ repetition, alliteration, nonsense syllables, newly coined words, and ancient words that are chanted or sung in a limited-range that makes the sounds become hypnotic. Sounds like the mantra "a-u-u-in-in" are chanted. Gestures during rituals are also made which intensify the effects. Rituals can not be classified as having nothing to do with programming. There is such a great attempt to secularize and make clinical what the victim experiences, and the idea that witchcraft is part of the programming is an unpopular notion with some. Combining witchcraft with hypnotic language can be powerful with group dynamics. Repetitive sounds, such as a drum beating influences the locus coeruleus part of the brain. Drums can help induce trance.
D. Keeping the Mind Dissaciative
Illuminati parents (as well as other adults who care for a Monarch child) are given special instructions on how to raise the child to be dissociative. The parents are admonished that their child will have a successful future and so will they if they follow the instructions. If they don’t follow the instructions, they are minded their child’s life could be forfeited.
Here are some of the types of instructions that are given: Spend 15 minutes/day teaching the child to write backwards to develop the brain in a particular fashion. Giving daily doses of prolonged isolation, such as dark closets, dark cellars, the corners of dark rooms. During the prolonged isolation, the child cannot turn on the lights, go to the bathroom, make a noise or anything else. The child will learn to dissociate. The child is also trauma bonded to the abuser because each time the child is let out, it is grateful to the abuser. The child can be drowned in a pool and then resuscitated--and the exact amount of time to keep the child under will be given. The child can be placed in a freezer, and again the exact amount of time can be given to the parent.
The child is not to roam about the house freely. The adults’ area is off-limits. The child must move with permission. Systematic punishment without provocation with the message--keep secrets. Hear no evil, see no evil, do no evil. This needs to be done several times a week to reinforce the codes of silence and the programming for silence. A needle which is gripped halfway up is stuck into the child a quarter inch deep on the child’s muscles, buttocks or thigh to help continue dissociative behavior. On special occasions (birthdays, holidays) the hands and feet which are most sensitive to pain are stuck. When the feet or hands are stuck, they will often stick the needles under the nails. The ears are also on occasion stuck with needles. It also conditions the child to obey the commands of her handlers, who will use needles to access the minds various personalities. Various spots on the body when stuck with needles along with certain codes become access points for certain alters. Anytime a child argues, has a temper tantrum, or gets angry the child is to be slapped in the face. This is a quick trauma. It is to be followed with a lighted cigarette applied to the child to burn the skin the second the child gets submissive from the slap. If a cigarette can’t be found, a stove top or some other hot item is to be found. At four years of age, the child begins programming to burn itself. If there are any bruises showing, the child can be kept home for a day or two. Anytime the child becomes willful it is to have its mouth washed out with soap. The child should be made to chew off a piece and swallow the foam. The child should be raped daily and then tortured. This helps with the sexual programming later, and begins a reversal in the mind that pain is love, and pain is pleasure.
Some of the first memories that female Monarchs recover are their memories of their fathers raping them. This is because the programmers allow these memories to be less dissociated than the later ones where the slave may be sexually servicing an important Monarch slave handler like the Rev. Billy Graham. (Graham is covered in full in chapter 5.)
In later situations like that, the kitten alters which do the sexual servicing will be electro-shocked to block their memory as well as given hypnotic cues. The fathers or step-fathers are often not the person who will be their master when they grow up. The abuse of this person will serve as a cover for the programming. If the person’s front alters discover they are MPD, they will initially blame their multiplicity on the first abuser they remember, which then serves as a cover.
E. Keeping the Mind in Alpha State
The entire alter system of a Monarch slave has their sleep patterns controlled. Many alters are programmed not to sleep. They stay awake 24 hours a day internally. Someone has to take the body and sleep--but whichever alters are set up to do it, they are hypnotically commanded to only sleep three hours, to insure that the mind stays in an alpha state easy to program. Because alters which do not hold the body "rest" mentally in a sense--when they take the body they are fresh. In this way, a multiple can function without as much sleep as a normal person, but the price they pay is that their mind stays in an easy-to-program easy-to-hypnotize state. REM sleep allows the person to harmonize the mind’s inner world with its outer environment. The periods of REM sleep lengthen as the hours of sleep progress. By preventing long periods of sleep, long periods of REM sleep are prevented from occurring, and the victim remains in a more controllable state of mind.
F. Hypnotic Codes, Cutes and Triggers
When a Programmer creates something, it will be a reflection of himself to some degree. Just like handwriting and art are a reflection of the person who makes them. Understanding the connections between a Programmer and his creation could take a book in itself. The following is extracted from the history of an ancient occult sect, still functioning today. It is the type of thing, that the programmers feed their minds on, which in turn provides them the patterns which show up in programming.
Here it is: In the ancient occult world, at the gates of palaces the doorkeeper had to be shown "the seals"--the secret names of God or pictures with magical power, and the words "R Akiva". When the person passed this entrance, he comes to the palace of pure marble stones, do not say, "water, water." Then the person will enter into the world or the celestial Garden of Eden or the Realm of the Heavenly Palaces. The Story of Sinbad, the golden lamp and genie would be another example of an occult story that could be used. Within the Illuminati, Gematria (which is the cabalistic teachings about numbers) is very important for knowing the codes of the deep darker alters. There are several reasons for why Monarch slaves have lots of codes and structures which come from witchcraft,
a. their programmers are witches and witchcraft is the world view on the mind of the programmer
b. the slaves are reminded of their entrapment to Satan and their cult whenever they hear their codes
c. the alters internally will work magic, even while they don’t hold the body, and placing magical structures inside facilitates this internal magic
d. using magical words makes the programming look like magick
e. the internal alters are being inculcated into occult underworld life and doctrine
A rather remarkable book is Aleister Crowley’s book 777
and Other Qabalistic Writings of Aleister Crowley. It is remarkable for the
deprogrammer to understand many of the programming code links that the
programmers may have used. In 777’s forward,. Aleister Crowley wrote "777
is a qabalistic dictionary of ceremonial magic, oriental mysticism, comparative
religion and symbology. It is also a handbook for ceremonial invocation and for
checking the validity of dreams and visions. It is indispensable to those who
wish to correlate these apparently diverse studies." (
Later he writes, "The book 777 has for its primary
object the construction of a magical alphabet." (p. xvii) For instance,
For someone trying to understand why a particular color,
and name is given to a deep darkside alter,
Let the reader picture 3 circles in a line. These three circles sit at the top of the Cabalistic Tree of Life. They are the top 3 circles of ten circles which all have names within an Illuminati Monarch slave. The center circle is "the crown" and holds the honored alter who actually is the Bride of the AntiChrist. The AntiChrist is also known as Black Saturn, and other names. Satan himself is known within a Monarch system often by the name Bilair, Bilar, or Bilid which are his cabalistic names.
The honored alter who is married to him sits on a pedestal
revolving with 2 other alters. In
the occult world, goddesses are triune: maiden, mother and crone. The one to the
left of center is
Before a Mother-of-Darkness Monarch slave is 16, they will have gone through all the ceremonies involved in the creation of the alters which correspond to the 10 rooms of the Tree of Life. At age 16, the system’s demons will then guide the system on a personalized pathway and a baby (the firstborn) will be sacrificed by the System. The blood of this first born is spiritually placed in a box under the Tree of Life. This is in accord with the Lilith story. The spirit Lilith (sometimes with an alter Lilith) will work with the spirits of Zerodieth and Lucifer. There are several trees which can be placed within a Monarch slave, including the ash, the oak, the ygdrassil, the willow, and the Tree of Evil, which is an evil counterpart to the Tree of Life. These will be dealt with under the chapter on structures. This chapter will provide the hypnotic codes, cues, triggers or whatever one wants to call these words, noises, and sensory inputs that manipulate these poor victims turned into Monarch robots. Other chapters will explain about the structures these codes go to, and also the spiritual dimensions of these codes and structures.
Another way to see things is to recognize that the programmers have created "power words" to which they have attached memory and programming. If a de-programmer observes closely the word usage of the victim, you will begin to spot power words of the abuser, for instance, "white rabbit". A cipher is when symbols are used to represent letters. One can used letter frequencies to break ciphers. Likewise, there are frequencies to code words. The Illuminati’s intelligence agencies have programmed thousands upon thousands of slaves.
There are only so many code words to pick from and some of these code words are favorites. From the co-author Fritz Springmeier’s experience, the following are favorite code words that have been used to program slaves with: CHARLOTTE, CHECKMATE, CHRISTMAS, CLARA, CLOVERLEAF, COURIER, CRAYON, CRYSTAL DAISY, DAVY, DELLA, DELTA, DEMON, DIANA, DINAH, DIRTY, DIME, DOT, DOVE, DRAGON, DUCK, DUMBO EAGLE, EASY, ECHO, ELAINE, ELEPHANT, ELLEN, EMERALD, EMPIRE, ESTER, EUREKA, EVERGREEN FAITH, FALCON, FARMER, FELIX, FIREFLY, FIVE BROTHERS, FIVE SISTERS, FLASHLIGHT, FLOSSY, FLYING + [other word], FOX, FREEZE, FRIENDSHIP, FULL HOUSE GALAHAD, GAMMA, GARGOYLE, GEMINI, GEORGE, GIPSY, GOLEM, GOLDEN + [other word], GOOSE, GRACE, GRANNY, GREEN DIAMOND, GULL, GWEN HADES, HALF-MOON, HAMMER, HARRIET, HAWK, HAZEL, HELENE, HELIOS, HEN, HERMES, HIGH BALL, HIGH CARD, HOLE-IN-THE-WALL, HOPE, HOPI, HOUNDDOG, HOURGLASS, HUSThER, HYDRA ICEBERG, IDA, IMP, INCUBUS, INSECT, IRIS, IROQUOIS, ITEM JACKASS, JAGUAR, JANET, JANICE, JASON, JASPER, JAVELIN, JENNY, JEZEBEL, JIG, JULIET, JOAN, JOSHUA, JUDY, JUPITER KANGAROOKANSAS, KATY, KING, KILO, KITTY, KOMET LACE, LADY + [other word], LAMP, LAURA, LEAP FROG, LEOPARD, LIGHTNING, LILY, LION, LITTLE + [other word], LOVE, LUCKY + [other word] MAE WEST, MAGIC, MAJESTIC, MAMIE, MANDREL, MARIE, MARK, MARTHA, MAX, MEADOWS, MERCURY, MIGHTY MOUSE, MILLION DOLLAR, MINNIE MOUSE, MONA LISA, MONTE CARLO, MOTHER, MUMMY NANCY, NAOMI, NAVAJO, NIMROD, NOAH, NORA, NUTCRACKER OBOE, OCTOPUS, OLD FAITHFUL, OLIVE, OPAL, OPHELIA, ORION, OSCAR, OWL, OZMA PACKAGE, PAMELA, PANDORA, PANTHER, PAPERCLIP, PAPA, PAT, PATSY, PEGASUS, PENTHOUSE, PHANTOM, PHOENIX, PINECONE, PISTOL PETE, PLATO, PLUTO, POLLY, PYTHON QUAIL, QUEBEC, QUEEN, QUEEN BEE, QUEENIE, QUEST, QUICK SILVER RACHEL, RAINBOW, RAM, RANGER, RASCAL, RAT, RAVEN, REBECCA, RED DIAMOND, RED HILL, RENO, REX, RHUBARB, RITA, ROBOT, ROMEO, ROOSTER, ROSIE, ROVER, RUBY, RUTH SABRE, SAINT, SAINT + [another word], SALLY, SAN ANTONIO, SAPPHIRE, SARAH, SATURN, SCAMPER, SCOUT, SEA GULL, SEAL, SERGEANT, SERGEANT-DELTA, SHADOW, SHARK, SHENANDOAH, SHO, SICKLE, SIGMA, SILVER, SNOW + (other word) ZEBRA, ZENITH, ZERO, ZYPPER, ZOMBIE, ZULU, ZUNI."
The word FOX is an example of a significant occult code word. F-o-x consists of the 6th, 15th (1+5), & the 24th (2+ 4) letters of the alphabet, which yield 666.
The reader needs to bear several things in mind. First, the programmers generally have intelligent, well sounding codes, that do form patterns. For instance, a woman’s name from the Bible will be used as a code, with subparts or sub codes having other female names from the Bible. Deeper Illuminati parts will have goddess and god names, and king and queen names for cult alters.
These are the names the handler or cult uses--NOT their access codes.
The codes for slaves follow patterns. There are standard and unique codes. The internal programming alters have the power to change codes if they need to protect the programming. They will have to hypnotically work with alters when they trance out at night. In other words, most of their programming of front alters will be done when a System lies down for "sleep"--more accurately described as "for trance." If the internal alters change many codes, in their efforts to protect the system, they will even make it difficult for the handler/programmer to get into the system. Ciphers developed rotors that require lines to line up. Some simple schemes using this principle appear in some Monarch systems. This is part of the science of structuring. Intelligence codes often come from the Bible or popular fiction books. The deeper codes are occult words, often in foreign languages such as Arabic, which is an important language in the upper occult world. Slaves will be given COVER NAMES for ops, and often males receive female names and vice versa. Very shortly, we will provide the Monarch hypnotic cues (codes) for the multitude of functions that a Monarch’s mind must carry out. The type of programming which is placed in a slave varies.
For intelligence operations the slave will have to have BONA FIDES, which are codes to allow two people to meet.
All slaves are given CONTROL SIGNS which allow them to indicate via a code that they are in trouble.
A RECOGNITION signal allows two people to make contact.
For instance, the handler might fly his distinctive sounding plane over a slave’s house in a pre-arranged signal. It might also be a particular colored scarf, and a particular set of phrases.
A GO-AWAY code is a prearranged signal that means it is unwise to make contact. The go-away signal may be simply placing one’s hands in one’s pocket or turning the porch lights off.
A "GO TO GROUND" signal means to go into hiding.
A MAYDAY BOOK exists for Illuminati and Intelligence slaves which allows them to call if they are about to be arrested. A telephone number is left open for just this purpose. Also common universal Illuminati codes can be used by the slave to get set free from police and judges. Within the Jehovah’s Witnesses, especially their headquarters, the Illuminati uses Enochian language to program with. With Druidic branches Druidic symbols are used. With the Jewish groups, Hebrew is used. Other languages are also used. An Illuminati System can easily have 6 different languages used as programming codes. The foreign language codes will be for small parts of the System only. Special artificial languages are also employed, as well as sign language.
Monarch Mind Control Codes Contents:
A. Alpha (Basic)
Codes to
all the various basic systems:
Alice In
Wonderland:
Cinderella Program:
The Melting Pot
Program:
Wizard of Oz:
Tin Man Programming:
Body Programs
Control program
B Beta (Sexual)
C. Chi (Return to Cult)
D. Delta (Assassination)
E. Epsilon (Animal Alters)
F. Omega (Internal Computers)
G. Gamma (Demonology) Ceremonies
H. Hypnotic Inductions
I. Janus-Alex Call Backs (End-times)
J. Theta (Psychic Warfare)
K. Tinkerbelle (Never grow up/Alien)
L. Twinning (Teams)
M. Solemetric Military
N. Songs (Reminders)
O. Zeta (Snuff Films)
P. Sample alter system codes
Q. Catholic Programming
R. Mensa Programming
S. Hand Signals
T.
Programming Site Codes (Used for Slave Model Codes, etc.)
A. Alpha (Basic) Basic Commands (these basic commands are also found used in many slaves, although there will be exceptions to everything.)
"GET ON YOUR TOES. STAY ON YOUR TOES." means "attention slave" get ready for a command. "ON YOUR TOES--is a preparatory command that will be used throughout an entire system. "IF YOU PLEASE SIR." -From Wizard of Oz, slave says this like "yes, sir." 3-tap code for access. "FOLLOW THE SNAPS", "LISTEN AND OBEY OUR COMMANDS", "THIS IS FOR YOUR OWN GOOD" "FIDDLER" = code to take one to Never Never Land
"PUPPET MASTER" -name of master for Marionette or Puppet program
"DADDY" -master "DADDY’S FRIEND"--a user of slave approved by master "PAPA" -master, "WHITE RABBIT--master "YOU’LL SPEAK MY WORDS WHEN I PULL YOUR STRINGS." Puppet programming control of what slave will say.
"SPILL IT" --trigger command ordering slave to speak
"SILENCE" --order means keep quiet Mr. Rogers
Neighborhood’s "
Another basic way of getting an alter would be simply to spin the person and call out the alter’s name, or to snap the fingers and call out the name of a front alter.
Access is accomplished for a number of Illuminati slaves by a message via phone or letter, then a looking glass person takes the system to a location outside of the house, maybe simply to the sidewalk, there the person is picked up. The left hand is then grasp on the soft part of the hand between the thumb and forefinger by two fingers very tightly. This pulls up and alter with an egg in its lap. The egg is then opened via a code and the imps inside the egg to communicate to the ribbons and the computer. Access phone calls to slaves may have high-speed codes transmitted that trigger the slave subliminally without their conscious awareness.
Access to some people is done with computer like jargon
"ON LINE" "ACCESS, (then identification), (then color code),
(then name)" ", "ENTER", "RUN". Some Systems have
their triggers all in computer lingo such as COMMAND MODE--ALL DISK DRIVES AND
HARD DRIVES... ERASE.. .FORMAT DRIVE...COPY....UNDELETE PURGED
Where some of the newer slave programmers are also computer programmers they enjoy transferring their computer lingo to use in controlling their programmed slaves. They may even throw in some FAX lingo such as "DIAL ALL REMOTES. . . INITIALIZATION - ATSO -OHOaM (HANDSHAKE BETWEEN ALL REMOTES), HANDSHAKE COMPLETED."
The color of the car to pick up a System may relate to the color coding of the alters to be picked up, such as white exterior, blue interior for a white alter-then blue alter access sequence.
Basic Internal Emergency Color Codes for a System, there are several different "CODE RED’s, etc. not just one in a slave, what follows is not the complete information about the Codes, although it is possible some slaves have a simplified version like this:
"CODE GREEN" --Dr. Green’s suicide programming, tied to "no-talk" programming.
"CODE BLUE" --Victim’s body freezes in motion and can’t move until another code is given.
"CODE RED" --Victim gets angry and violent
"CODE RED" -Another Code Red has the standard Monarch meaning, "serious self-destruct" program
"CODE YELLOW" --Victim gets jealous, angry and wants to violently get even "CODE BLACK" --Used to get victim’s to get on their ritual clothes.
"CODE WHITE" --Code to protect the cult members from arrest. When police see the Code White they treat the people as untouchable. There are code words for Illuminati members to tell police and judges that will automatically get them set free.
Masonic handshakes and codes also work well with judges, police & govt. workers.
"CODE 911" --To activate the slave for an emergency calling for superhuman strength. Certain alters will have extra strength.
"CODE 911 "--Also used with standard Monarch meaning of "Call your programmer/handler".
"DISARM" (3x)-to get rid of a dangerous alter two snaps + "SHUTDOWN"--to shutdown an alter.
"LET THE KINGS BE KINGS" "LET THE BANKERS BE BANKERS" "LET THE PRIESTS BE PRIESTS"--saying to justify their Master-slave relationship to the masses of humanity. The Sun setting the following day was used as a trigger for slave to forget events.
For the cat alters a certain word is given to trigger them to go "over the rainbow" after an event in order for them to forget it.
"FROM THE RISING OF THE SUN TIL THE GOING DOWN OF THE SAME" --programmed in by using the scripture.
"GO INTO THE SEA OF FORGETFULNESS" --a hypnotic structure in the mind to forget.
Waterfalls are also used as a hypnotic image to forget pain and memory. "RETYPE A LETTER" -reprogram,
"JEWELS" = programs.
"THE CATS & THE FIDDLE NEED TUNED UP--Slave to handler, I need reprogrammed. There are three words to trigger a suicide program -
1. Bait,
2. [intentionally left out],
3. hook
Another suicide program trigger is when the dominoes fall.
"GO OVER THE BLUFF" (3X)- causes suicide in some alters SACRED HEART = Catholic/Jesuit suicide program Some suicide programs are set off with a long tone over the phone along with a code no.
"KERMIT THE FROG" --a type of access code.
"KERMIT" may be a code relating to computers, because Kermit is the universal language for connecting computers together. It is a single standard to exchange files between any two systems.
All memories, traumas, and tortures are coded.
Body programs are coded. One set of body programs uses Hebrew, Greek, and Druidic letters.
A clone program creates clones of an alter (also called lollipop or lobster program) imagery is that sesame seeds fall off of a hamburger bun and becomes another hamburger.
Codes to all the various basic systems:
Carousel 532342223
Castle System 221435321
Communication 311146623
Double Helix 432443321
Level 211343231
Mensa System 323542321
Pentagram 421136113
Pool of Death 231134421
Puppet 341124321
Sole metric 665421134
Spider Web 321654321
Stairwell 432111132
Quabala 423454334
Tornado 332146444
Umbrella System 314321014
The White Rabbit is a programming figure for Alice In
Wonderland Programming who will allow you to go to otherwise inaccessible places
for adventure. He represents the master. The White Rabbit is an important figure
to the slave. White rabbit gives a wafer (coke-sugar-cocaine) to
The Queen of Hearts is also an important figure for
commands in the Looking Glass World which the slave enters upon command. When a
deep slave alter is needed to perform they are sent into the looking glass world
where a looking glass person carries out the command--but in a way that reality
is thought to be a dream. In other words, this is a preparatory command to get
the slave ready for abuse. "USE THE KEY. PUT IT IN THE LOCK. TURN. OPEN THE
DOOR...AND STEP THROUGH A WINDOW [or MIRROR] INTO NEVER NEVER LAND."
"SOMETHING IN LIGHTENING TO TRANSPORT YOU FASTER THAN THE OL’ RUBY
SLIPPERS. CLICK YOUR HEELS TOGETHER AND BE THERE IN A SNAP. (SLAVE CLICKS HEELS)
ELECTRIFYING .... WITH THE RUMBLE OF THUNDER. BOLTING THROUGH TIME ... SO YOU
WON’T BE LATE ... FOR A VERY IMPORTANT DATE." (
The code word involves something said about the stroke of
A very powerful program is activated by melting the slave into his master. The slave will do anything for the master with this program. The melting is the ecstasy that is occasionally experienced when lovers having sex seem to melt into each other. This feeling of ecstasy-melting is programmed to release when the master says these words, "MELT INTO YOUR MELTED MIRROR FOR AN ELECTRIFYING RIDE LOOK DEEP INTO THE BLACK OF MY MELTING MIRROR EYES. SEE YOU REFLECTING ME, REFLECTING YOU, REFLECTING ME, REFLECTING YOU, REFLECTING ME, REFLECTING YOU, REFLECTING ME, REFLECTING YOU...(cont. this several times) UNTIL WE MELT TOGETHER AND SINK DEEP... [words omitted] INTO THE OTHER SIDE." "MELT INTO MY MIRROR YOU LOOSE YOURSELF INTO THE POOL OF LIQUID MIRROR STEP INTO THE LOOKING GLASS, SINK DEEP WITHIN ITS POOL, AND STRADDLE THE DIMENSIONS IN TIME. I’LL SEE YOU THERE...ALONG WITH MY FRIENDS" "SEE IT THROUGH THE LOOKING GLASS"-- infinity mirror programming involving mirror image people (alters) "LOSE YOURSELF IN THE INFINITY MIRRORS."
The
The Tin Man programming is all purpose versatile program for what ever the master needs done, it means that the slave is a well oiled machine. Sometimes the slave is reluctant to do a job but he is being told that he is a well oiled machine. The exact words may vary with the mission, but the following are exact words,
"LEAVE YOUR SHELL. ACTIVATE: MACHINE. COUNT DOWN ONE TO TIN...." "SOON WE’LL HAVE YOU PURRING LIKE A WELL OILED MACHINE. ALL OF YOUR MOVING PARTS ARE PIVOTAL AND GLIDING WITH EASE. MELT INTO MY HANDS. TAKE MY COMMANDS. I’LL HOLD YOUR JAW TO KEEP IT FROM SLIPPING WHILE YOU SLIP THROUGH A WINDOW IN TIME."
Program code for slave to shatter their memory of an event (used with electroshock): "MIRROR MIRROR ALL AROUND ON THE CEILING ON THE GROUND SPINNING FASTER ROUND AND ROUND ARE YOU UP OR ARE YOU DOWN? ARE YOU DOWN OR ARE YOU UP? IT REALLY DOESN’T MATTER. BECAUSE WHEN THIS MIRROR BUBBLE BURSTS, EVERYTHING WILL SHATTER." "GO KEY WEST IS KEY--several slaves have this code, related to Sen. Byrd & Oz prgmg.
GALAXY programming (for the end times) is also connected to the Oz programming. In upper level Illuminati slaves Dorothy in the Oz story will represent the Mother of Darkness alters, Ozma will represent the Ruler of the Castle, and Glinda will have the Great Book of Records. The ring of Glinda (from Glinda of Oz, p. 16) gives protection.
Body Programs Control program:
See Omega Programming- Universal Function Codes for internal system codes for body programs. Sometimes these body programs are filed with a combination of hebrew and zodiac signs. Greek letters are also file no.s of at times of body programs.
Rivers of blood -circulation control program. This program totally controls the circulatory system. The victim may think they are losing lots of blood & go into heart failure.
Octopus- strangulation suicide program The internal defenses consists in part of body programs that are triggered if the Mind-controlled slave steps out of line.
Here is a good list of some of these body programs each of which has its own codes: Auditory problems, Blood flow/circulation, Burning as if on fire, Digestive failure, Headaches-split brain, Heart failure, Histamine production, Optic problems, Respiratory failure, Sleep deprivation, Sleeping program, and Temperature change. The suicide programs that can go off include Armageddon, Clowns cutting, Cutter program "Pain is Love", Disembowelment, Drug overdose, Gethsemane, "Hypnosleep", Injection of bleach (poison), Octopus, Red Sea, Shooting Programs (shotgun, russian roulette, shooting family, etc.), War in the Heavens & Wrecking the car.
Along with the suicide programs that can be triggered are programs that jerk the victim’s mind every which way, which include:
Bee Stinging Program (put in by placing the drugged victim being near large swarms of bees humming & then letting a bee(s) sting the victim), Busy Cleaning Program, Crazy program, Flooding (from Atlantis), Isolate & Hibernate Program, Memory Erasure Program, Pain Programming, Paper Doll Program, Protection by trance, Revolving switching, Scrambling Program, and re-Structuring Programming, Tumbleweed program, Waterjar Shaking program (Ahab stomping the grapes Bible-based program making mush out of the brain.) Cutting programs are often hidden behind the Bee Swarming program.
Alpha and Omega is a strong program. Sometimes saying "ALPHA & OMEGA" helps alleviate headaches.
DNA (This uses a lot of number codes.) This is a double-helix which is used as an elevator shaft running down through a system. Numbers are used and the names of cities to go down the elevator shafts. This programming is said to be done in hospitals.
Card Codes--(See diagram) Regular playing cards have developed from the occult Tarot cards. The four suits correspond to magick, the spades mean the power from the spear of destruction, the diamond means is a double pyramid or demonic power of wealth, and the club is a clover meaning fortune and fate, and the heart means devotion and loyalty. The four suits work well in programming because anything that is broken down in 4’s or a multiple of 4 can be coded with cards. Anything that can be broken down into 12’s or 13’s can be given cards too. Since clocks work off of 12’s, card codes work well with clocks. The suits can denote seasons. With Jokers one gets 13 cards per suit with four suits gives 365 unique symbols to denote the days of the year. Dominos can also be used on a base 13 code system. The blank will equal 13.
Carousel System: There is a back side to enter the Carousel. Carrier Pigeon (slaves who send coded or uncoded messages) and their contact codes. Birds used for contacts. That is birds in cages are often used as a sign of a meeting place. The contact would say "What did the bird say?" or "A little bird told me...,Then the courier pigeon delivers her message. ‘‘I’ve come a long long way to see you, words to say by System to John or to person to be met. There is an endless variety of contact phrases to indicate that the right person has met the right person.
Sample Code for passing drugs-"RHINESTONE COWBOY" to which the response from the slave would be "I’M NOT A COWBOY, I’M A COWGIRL." Emerald ear rings have been the visual signal to customs agents to allow a person carrying drugs through customs. (SEE D. DELTA for deeper Carrier Pigeon codes.)
Castle System: May need a special ring worn by and turned by the handler.
Flower’s Program: CSP94OYP587 --code to designate a flower tieing 3 generations.
UMBRELLA PROGRAM CODE-- "R x 4 x 5Y58876"
Sample correspondences of Gem codes:
1 - Aries - diamond
2 - Gemini - topaz
3 - Cancer - cat’s eye
4 - Leo - ruby
5 - Virgo - emerald
6 - Libra - opal
7 - Scorpio - amethyst
8 - Sagittarius - turquoise
9 - Capricorn - black onyx
10 -Aquarius - crystal
11 -Pisces - sapphire ·
Potter’s Wheel "STAND IN ORDER ACCORDING TO RANK AND SERIAL NO."- part of a stacking command to get alters in sequence together to work on them. Dominoes and cards are used as part of the stacking cues. Dr. Star’s Programming which places Pentagrams into people uses Sigils as codes--the occult symbols for the various demons, along with a color, a gate, and a number form a complete code.
For example, 1st Gate is the god Nanna, #30, color-SILVER, LADDER OF LIGHTS, GOD OF THE MOON. (see Illustration) To access a System the abusers often have an object as part of the pickup code, such as a set of car keys, a special coin token, a business card, jewelry, or certain clothes or packages. A Popper liquor drink is knocked 3 times on the table when it is served. (Who would be the wiser that three knocks is an access code?)
Word Matrices : A word-matrix code is where the victim is given two lists of words and then each word on the left list is paired with a word on the right list to form a code. Randy Noblitt, a therapist, gave an example of a basic pattern for a Word-Matrix. And this is simply quoted from his example to give the reader an idea. started xenophobe between thoughts endless beginning throughout forever get out trepidation over beneath fun execute win lose first then form benign beginning end tonight last morning thorough the end
B. BETA (Sexual) SEXUAL ALTERS---most of the following codes are for deep sexual alters. In Illuminati Systems these are called Beta alters, in CIA systems they create Beta models whose primary function is to provide sex, usually perverted sex and S&M for the perverts who run our secret government and visible government. BETA models are those who are primary job is sexual, such as service as a Presidential Model (sex slave for a President). These System models are numbered
BETA 1, BETA 2...BETA 601, etc
Domino codes for spinners can be 6-3, 6-4, 8-4, 8-5, 10-5, 10-6, 12-7, 12-8. The 13th kitten then would be left blank. Spinner dominos have spinner kittens off of them, when a spinner domino code is used. In this case 6-2 could take you to the Beta level. "10 LITTLE INDIANS, 9 LITTLE INDIANS...", "1 LITTLE, 2 LITTLE.. ."--assoc. w/ morse code-call back telephone no.s. "3 LITTLE KITTENS HAVE LOST THEIR MITTENS..." -The Kitten alters have stepped outside of their programming and need fixed by the Master. "Hotel California" means a place to have sexual gratification. Stroking under chin along with "HAVE A BALL TONIGHT" (Cinderella programming) Stroking under the chin along with "PURR FOR ME KITTEN." Magic shoes or red slippers are used to switch to get specific sexual alters. The slippers are clicked 3x to get deeper sexual alters. "COME HERE MY KITTEN, AND LET ME PET YOU. PURR FOR ME NOW. ..THAT’S A FLUFFY KITTEN. PURR DEEP." "COME HERE LITTLE ONE."--call for young sexual alter "PASSION" used 3x with other words as a sexual trigger, such as "SHOW ME YOUR PASSION." Passion is a strong program word for sex. "RED DOT, SPIN SPIN SPIN, BECOME ANOTHER PERSON." this is said to a mother kitten before she is told which spin kitten to get from her litter. It is a preparatory command meaning "call your spinner".
Spin Kittens "WE GOTTA GET DRESSED.. .IN 5 MINUTES" along with being spun produces specific sexual kitten.
9 lives of kittens --means 9 sexual alters taken in sequence. When spun in a counterclockwise fashion, the sexual menu is from 1 to 9. With 3 & 5 being oral sex. "Heat of hell" are used as trigger words in this programming. The 10th revolution is to beg to be whipped.
"TURN AROUND 10" "SPIN FOR ME." The heat of hell ignites after the 6th spin.
"RIDE PONIES"--means to do sex for both eng. & ger. slaves;
"PLAY HORSEY--sexual games;
"MOUNTING A HORSE"--[obvious]
"CAT NAP" --sex; "
CAT NIP--cocaine Tweedle Dee and Tweedle Dum --S&M programs involving mirror image alters. Not to be confused with Humpty Dumpty self-destruct program.
"SIX IS SEX. SEVEN IS HEAVEN. EIGHT IS GREAT. NINE YOUR MINE."--This means to fall under the master submission, has sexual overtones.
"ITSY BITSY BOOB" --access code pertaining to Betty Boob programming (which is a certain type of female behavior). For Beta alters the codes may be:
"BETA ONE MARY A=1, B=2, C=3, D=4"
"BETA TWO MARY A=4, B=3, C=2, D=1"
"BETA THREE MARY A=3, B=4, C=1, D=2"
Then these might be said in combination "3412 4321 1234" (x3) An amer. sys. used w/ Latin Amer. may have a Beta alter activated by the movement of 2 small Mexican flags & a code word in spanish "USTA CA-NATA" (cream).
C. CHI (return to cult) Chi programming uses a lot of idiosyncratic phrases, and little ditties. Some of the nursery rhymes listed in the song section will be Chi programming. Some of the Chi programming has been listed in the Alpha programming section.
D. Delta (assassination). Delta alters --are activated to kill by the following three things: seeing specific clothing, items held in a persons hand, and particular words. Since these items would specific for a particular murder there is no particular specifics that can be given. Courier Pigeon Alters (In Illuminati systems--these are Delta-Beta alters).
"FLOCK" --word meaning the stable of carrier pigeons of DIA To turn a Genie free, pop a cork: "TURN YOUR GENIE FREE...POP A CORK." An internal controller must activate the umbrella or genie bottle pop the cork program to release a delta or delta-beta alter. "YOUR WISH IS MY COMMAND"
I Dream of Jeannie Programming "YOU-ARE-WHAT-YOU-READ" passbook program. Programming to remember bank numbers and other specific numbers. "I SENT A MESSAGE IN A BOTTLE." Distinctive jewelry & clothes. Emerald ear rings used as a signal to others that a message was being carried.
Emeralds mean drugs, rubies mean prostitution, diamonds (rhinestones) presidential model work. Red, White & Blue worn sometimes by presidential models. High level reporting alters forget their messages with "REFILE # #, (name of alter)." Some Systems have one name w/ several different numbers attached to indicate alters within one area and purpose. Sergeant 1, up to Sergeant 60. Or say "Access 1143 Marcy" & then other Marcys are numbered with other numbers. Spaceships & flags are assoc. w/ Sargeant alters. Delta Black Widow alters have a web, fangs, poison, eggs, and silk strand connectors. Viper is the demon associated with Black Widows, and they are programmed to re-connect their strands if all of the connectors are not taken out. Index finger pointed at head means russian roulette.
E. EPSILON (Animal Alters) These codes aren’t known. One method that may be used, for instance, is for the Raven alters who are to tear the body’s flesh, the story of Noah’s ark where he sent the Raven out will be paired with the word TWIG, and a code formed from TWIG. There are some alters which are to actually act like animals, and their codes somehow tie in with what they are.
F. OMEGA
(Internal Computers) The Omega programming works along with an Executive
Control Board (or Grand Druid Council) and Internal programmers. The Executive
Control Board is associated with both numbers of the clock, and precious gems
and metals such as "
Universal Code for Access to Internal Computers:
key manual 33123113211
program computer 22133113332
function computer 11123132221
ren computer 13321321332-55434232312 L\S 55434232312 reenlist
reprogram no.s -2231231; 4432312; 33231223
An input code is 666fff666fff666 the reverse of this code is F6F6F6F6F6F6F6F6F6F6F6.
One victim’s computer ran on code "WAR GAME". Some Beast computers have 666 666 666 as an access code and 999 999 999 as a beast back out and close out code. There are various computers--one on each level. These have some standard codes and some individual codes.
UNIVERSAL FUNCTION CODES COMPUTER CODE--5543423231 2 which hold the following codes:
abduction 4511321
anger 4213261
assignment coordinator 1613212
assassination 5332135
bank of lies 3124532
blindness 2566553
brain disorder 6325512
body gesture 1332221
body functions 4311322
call back ritual 6664113
child control 3214441
circle in fields 3332241
confusion 6643252
control 4321341
deaf 3324553
death 1451621
denial 2311444
despair 3223412
distortion 6233322
disorder of bones 4561321
disorder of breathing 5532111
disorder of eating 3342136
division 3211652
false memories 3314532
fear 2665132
fleeing 5613354
game playing 1561321
guilt 4321231
hatefulness 5331241
hopelessness 1112364
illness 1566432
infiltration 2231335
insanity 2144312
inside reporters 1133265
loyalty to group 3364112
mute 2213541
murder 3221456
nonsense 2665443
outside reporters 1132256
reprogram others 4555643
reprogram self 1133432
respond to triggers 4441221
retardation s- 1314555 m- 1314556
sabotage 1135461
seduction 2134121
self body harm 3321343
sex 2116652
shame 3122115
suicide 3113246
trigger 1324652
trigger others 4442211
zombie 3321556
Under each of these codes, other codes may be attached. For instance, under Body Gestures, the following functions are coded and a sample coding scheme would look like this:
talk verbally 3456343 touch chest 2322132 touch hair 3323221 touch mouth 5434232 touch nose 5443232
Rainbow an alter which speaks only in rhymes. Ribbons are in a box with Rainbow. A ribbon might be accessed by several slaps on the face and "Rubicon 2,4,6,8..." (3x) Hickory Dickory Dock rhyme is associated with the vortex which is tied to turning the system and also to some death alters.
Dominoes set off flooding programs to overload the person. Program numbers on some slaves are put in by touching the third eye with the index finger and speaking the number.
G. GAMMA (Demonology) In Satan’s realm, demons are fathered or split off in families like alters are. There will be a Moloch number 101, and a Moloch 10,321. The victim has alters which are numbered such as Sally 1 and Sally 10. For a better understanding of this area of programming see Chapter 10 section I. Gamma Programming includes all the demonic activity. In this section one can add the Kabballa’s Tree of Life which has alphabet codes, back up programs to regenerate, associated with Greenbaum or Greentree. In the Illuminati slaves, the deeper parts of their system are ritual and the demonology pertains to the various rituals that are done. The following is a sampling of Illuminati rituals. The blood rituals are used to attach demons to possess alters in a particular way. These rituals can’t be separated from the programming. They are part of the programming.
Ceremonies: Assembling of the Quarter Regents Beltaine with hunts of slaves, fire festivals, and blood rituals. Bride of Satan Ceremony (Mar. 24). Demon revels. Drawing down the moon, Druid Feast Day on Jan. 1, Duels to the death like gladiators where the heart is cut out and eaten. Grail Mass the Grand Climax human sacrifice & sex rituals. Invocation of Hecate as Crone Lammas sabbat where a female is sacrificed. Pathworking (done before 16 with Cabalistic Tree of Life pathways.) Rite of Deification. Rod of Light ceremony (consists of text from Cabala, black candles, ram’s horn blown, and victim’s mother’s name sounded). Sealing ceremony at 19 yrs. for Mothers of Darkness level Secret ceremony where people paint their faces half black and half white. Sister of Light rebirthing water ceremony (victim is bound and then pulled from water and wrapped up in linen, and a green branch is place on the chest). St. Agnes Eve St. Bartholomew’s Day. St. Walpurgis Summer Soltstice Orgy. For those who are not familiar with occult terms the following are ritual items: Paten (the holy dish), Athame or Glaive (the knife used to sacrifice with), the wand or sceptre (an ornamental staff which represents authority & usually has an electric shock), and the censer (to distribute burning fragrance).
H. HYPNOTIC INDUCTIONS ‘‘Kaleidoscope eyes’’ used in hypnotic induction and spinning "20, 19, 18, 17, 16, 15, 14, 13,...1" For many slaves the sign of satan done with the fingers puts them into a trance, and deeper alters come out. "100, 91, 82, 73, 64, 55, 46, 37, 28, 19, 10, 1 Touching the head in a particular fashion is done. ‘‘DEEPER AND DEEPER AND DEEPER DEEPER AND DEEPER AND DEEPER, DOWN, DOWN, DOWN, INTO THE DEEP, DARK VELVETY MIST, DEEPER AND DEEPER AND DEEPER." "DEEP, DEEP, DEEP, SLEEP, SLEEP, SHEEP, SHEEP, SHEEP" SLEEP, "YOU’RE BEAUTY WARMS MY EMBERS. SEE THEM GLOWING DEEP WITHIN THE DARKNESS OF MY EYES... IGNITING INTO FLAME... BLACK FLAME."
Seeing a Hand of Glory (severed left hand) will induct
people into Peter Pan programming. (Books describing the occult use of the Hand
of Glory in
Lights, in certain colors and sequences, have been used to trance alters out, for instance a flashing red light may trance certain alters out. Tunnels were used as a powerful hypnotic suggestion. Bear in mind, that people induct
a. when phys. or mentally relaxed,
b. when their senses are overloaded or sens. deprivation,
c. when their equilibrium is disturbed,
d. their motion is restricted or
e. their eyes are fixated on something.
I. JANUS-ALEX CALL BACKS
(End-times) Main link to a System’s programs to ALEX coded 44334223112.
Scramble code to ALEX is 34424313221. Individual code to ALEX = 55434232312.
Link to JANUS coded 3323432123. Report back- X441062F
Main JANUS tracking/reprogramming code-JAN US 9341 00569XXY99632 [x3];
its back up code X44420-61F. (There is a Janis 2 computer at
Main AMBASSADOR code 67302986ZZ9861 (Suicide/Fire) sub codes:
Fire 97643F4200L;
Cut 97642C42DIL L ;
Suicide 9762354202L;
Towards violence 97613V4203L
Main EMPEROR - [dot, dot, dot] 79622109MM861 1 Page 83 .... End-time Activation Codes Most slaves have end-time programming. When a slave is called in with end-time programming they have pages upon pages of coded messages. A number of Monarch slaves have been de-programmed enough that they began accessing and spewing out pages and pages of these activation codes. Part of a sample of one of these is as follows: "ISRAEL IS RISING ACTIVATE 366 UNITED NATIONS 900 BLUE BIRD PILOTS RISE NATIONS IN PLACE RED CHINA CALL BACK COUNT DOWN, ACTIVATE ALEX 3.7 LC 94 CIRCLE FARMS AROUND THE SQUARE BRITISH SOLDIERS RISE MOUNTAIN GOAT COME EASTSIDE OF PEAK 39 ACTIVATE 52 ACTIVATE 42 ACTIVATE RED CHINA RISE 1.7 ACTIVATE THE HOUR COMES, A. C. SON ACTIVATE AFRICA ARISE IN NUMBERS OF 90..." A team leader will have a down line of around 4 people--which are coded red ray, yellow ray, green ray, blue ray. When the activation code hits a slave team leader during the end times, they will in turn activate their people, who in turn will have people who are team leaders and have a down line. At least two false callback alarms will be sounded (tested) before the real one.
K. TINKERBELLE PROGRAMMING (never grow up/alien) Capt’n or Cap’n (captain) represents the programmer in Peter Pan programming. Tinkerbelle is a young alter created under Peter Pan programming. ‘TRANCE DIMENSIONAL TRAVEL RIGHT FROM YOUR OWN BACKYARD. THE DIMENSIONS OF YOUR PYRAMID ARE TO BE 9 BYE 9 BYE 9 BYE." Alien programming by NWO (also involves Peter Pan programming): "RIDE THE LIGHT" -Peter Pan programming meaning to go into hypnotic induction attached to a light that is seen when given a high voltage shock. This is given to make experiences seem like in another dimension.
L. Twinning (Teams) CROSS PROGRAMMING-- (With for instance a mother and a daughter team) Two seals are placed on this cross programming, a "seal of cover" and a "seal of rain" Code: mother - [minus] mother = 3/4 - daughter holds 1/4 daughter - mother 1/4 - daughter holds 3/4 Teams will be given code words for each alter who is part of a 2-System team. One System may serve as a father figure to the other System. Teams will be trauma and sexually bonded, as well as having mirror images with each others names. A leader will have an upline and a downline for the colored rays. A leader will call the different colored rays, to activate their programming. An Illuminati team ritual to create oneness & open their team boxes up to work together (Illuminati twinning ritual): the team kneels face to face, draws a magical circle on the ground, joins Delta team hands forming a clasp ring. (Blue is associated with this.) Then they all say, "Star within a star Circle within a circle Mind within a mind body within a body Soul within a soul" Then the team places Palm, their hands Palm to Palm, and then speak 4 times, "Bone to Bone flesh to flesh Spirit to Spirit Forever together- never apart." Then a 5 pointed star is traced in the air. To close the Delta team twinning box, the reverse is done. Then other things are to be said in the joining and opening ritual. A double deck of cards is used to program an Illuminati team of "twins". One type of Criss-cross programming involves 1. a flower, 2. the stem, & 3 the root. The root involves blood sacrifices. This programming ties two generations together such as mother-daughter.
N. Songs & Nursery Rhymes Songs & Nursery Rhymes Used As Triggers (note all of these songs have been used on other slaves too.) Songs with Monarch programming meaning & access parts soliciting behavior or thinking include:
Nursery Rhymes Brahm’s
Lullaby Hickory, Dickory Dock (flips
the system) "
Songs (Most of the Beatles’ songs were used for programming. Charles Manson was programmed with Beatles’ music. The programmers know ahead of time what are going to be the next hits, and they regularly call in slaves and hypnotically make the lyrics to be cues for the slaves before the music comes out. For instance, the lyrics of "Ain’t that a Shame" will make certain alters angry. For another slave the lyrics "Everything is relative, in its own way" reminds the person of the cult family & obedience.) Angie (popular song for programming) A Mighty Fortress is Our God Back in Black Blue Velvet Butterfly The Candyman Can (Candyman represents drug use for Monarchs, plus other things.) Christmas Carols (Christmas carols were used a lot on Monarchs.)
Country Roads (song with the programmed meaning take me [the slave] "home" to a meeting site.) Crazy (to reaffirm loyalty to the master) Deja Vu Die Walkure Fire and Rain Frere Jacques (Catholic "Father John", sexual abuse connotation) Get Me A Ticket on a Fast Train (substitute "master" for "baby" in song) Grandma’s Feather Bed Ghost Riders Green Green Grass of Home (go home program, slave is not happy ‘til they go home to green fields Greensleeves Hallelujah chorus (many Christian songs like this one are played while the victim is tortured.) Handel’s Messiah Have Thine Own Way Lord ("thou art the potter, I am the clay, mold me & make me..." III. Charismatic slave programming.) Heartache Tonight (song used to announce a ritual over the radio)
Hotel California (sexual/ritual connotation, the song says,
"go to the chamber of the Master’s Feast, We are programmed to
receive." This song also tells the story of how LaVey started the
Surrender All Imagine (John Lennon presents the New Age script for people to be "nowhere people.") John Brown’s Body Lucy In the Sky with Diamonds Little Red Riding Hood (song played with hunts of slaves) Mary was an only child (from Art Garfunkel’s Angel Claire album) Moon River Over the Rainbow (obvious Wizard of Oz programming) Playing with the Queen of Hearts, knowing that it really smarts, the Joker is the only fool who’ll do anything with you" (reinforces the warning not to play (tamper) with the programming. The Queen of Hearts is the emergency Mayday signal to a handler. To play with this will really smart-hurt. National Anthem No More Mr. Nice Guy Revolution 9 Rivers of Dreams (by Billy Joel. words are about "walking in the dark, going through a river.. .turn on the light on your internal world." Satin Sheets She’s Leaving Home Sins of the Fathers Southern Nights (loyalty to the programs--the leaves and trees) Stairway to Heaven Teddy Bear (Programmer, helpless teddy bear slave connotation) Tennessee Waltz (handler is "forced" to prostitute slave) The Blood Will Never Lose Its Power Tom Dooley (suicide, "hang down your head Tom Dooley, hang down your and...) Victim of Love When you wish upon a Star White Rabbit (Alice In Wonderland Theme--made into a triggering Karaoke CD.) Wooden Heart Yellow Submarine (drug connotation)
O. ZETA (Snuff Films) Zeta is the sixth letter, and it’s ancient meaning was a sacrifice.
P. Sample Codes for Alters of a Hypothetical System Named Mary These codes are purely a representative model-not any particular real system. The overall system code at times consists of [birthdate + programming site codes + birth order + number of generations family was in the Illuminati.] For our hypothetical system Mary we have the hypothetical system code of: 6-13-51- 14 -02- 12. In order to give the codes for a hypothetical alter system we will have to explain some things as we go. The Programmers have for each slave both medical programming files, and a grey or black binder with the programmed access, trigger, codes & cues, & structure. A typical Illuminati system will be a cube (although spheres and pyramids are also used).
The principle alters will be the "a" alters.
A typical section of alters will consist of a 13 x 13 grid of alters. These are alters who live in a world together and must function together. A 13 x 13 section will have 13 families of "a" through "in" alters. The "a" alters will be the primary alters that the Programmers will interact with. The Programmer may call up an "a" alter and ask it to go get the "c" alter in its family, rather than directly asking for it. This initial page of alter codes will be the primary or "a" alters.
If we are dealing with a 13 x 13 x 13 cube of alters, then the initial page has 13 "a" alters of each section. Each of these alters will have an access code which will often include the following components: An Assigned Color + An Alpha Numeric Code + A Personalized Magical Name. This will equal 1/3 their access code. These code words must be repeated three times to pull the alter up. However, if an alter is trained well, and hears his master’s voice, an alpha-numeric code can pull the alter up. For many of the alters, the reversal of their access code puts them back to sleep. This is an important point, because some alters would be dangerous to leave in control of the body.
The "a" alters are regular alters. Many of them have been hypnotically age advanced to see themselves as teenagers or adults. Sometimes "b" and "c" alters are also aged. The "d" through "n" alters are generally left as they were split and most of them are infantile, with little concept of how old they are. The little ones will be the ones who often remember the programming very well, and know things about the system. The top alters will also sometimes receive personal names from their handler. This is in addition to all their codes. If the alter is responsive to its master, the personal name might pull the alter up too. Do all of the alters get charted? There are several groups of alters which get charted separate from the rest or don’t get charted at all.
Because of the competition and distrust between the
different programmers, they often place in secret back doors into the person’s
mind that only they know about. Worlds of secret alters loyal and devoted to the
programmer may be built into the system and not appear on the regular charts.
The core, and some of the primal splits from the core will not appear on the
regular grids. They will be placed on a separate sheet, and their codes will be
in some magical language. The
Illuminati commonly employs 20 magical languages, and Hebrew, Latin and Greek
are also often used for charting the core and its primal splits. Enochian is a
good example of a magical language used by the Illuminati.
Some alters will be created solely by the slave in order to cope with
life. For instance, say the slave is travelling with someone who is not a
handler, but who is a dangerous person. This dangerous person murders several
people and forces the slave to help. The slave is likely going to have front
alters out, and they are simply going to have to create new alters to meet the
demands of the situation. These alters made to deal with one-time emergency will
just slip into cracks in the system. Lots
of odds and ends alters end up in the nooks and crannies within a system just
detached and floating. The programmers and the victim work hard at structuring
and cleaning up things--but the honest truth is that trauma-based mind-control
is messy. Any time you shatter someone’s mind into thousands of pieces with
horrendous torture, you have a shattered mess, in spite of the good fronts that
the programmers are able to construct. Some
of the more elaborate access methods are for alters that are not on the
"a" chart. Hour glass alters have entire sentence access codes. Deaf
& blind alters need their access code signed on their hands by moving their
fingers up and down, etc. End time alters may have access codes that may entail
reading an entire page. Reporting alters are often small children, that are
hidden in each section, and may require slaps to the face or jabs with a needle
to pull them up. Spinner kittens will be accessed via their mama cat, who acts
like a Madam in a "cat house". The codes for this was given in the
Beta section codes. The reader will
be given the hypothetical codes (which resemble closely the actual codes of an
actual scenario) for our hypothetical Mary.
A Sample Chart of the "A" alters--these are the primary
alters-- has been prepared 4-4.gif in the same fashion as it would appear in the
handler’s 3-ring binder. Mary’s
Core Protector 1 will have a shutdown code of "REVERSAL 1 BEGINNING"
and the second Core Protector will have the shutdown code of "REVERSAL 2
CREATION". Of course, these codes are said 3 times.
The first three alters on the far left section at the top of the chart
are Silences who can be woken up by singing. Also at least one of these, will
wake up by a kiss from the prince (programmer) to the third eye area. The first
alter can be shut down by "COSMOS 15 31 06 2BAB PINK". One of the
groups of alters attached to one of these early alters is "MA.C3.10-53
Rejects (7) 10-53". To shut this alter(s) down just say the reverse of the
access code. A mirror image of each of these alters exists too. The mirror
images can be pulled up via a three step process.
The birth memory in our example will be coded as A5 10 79. The spider
torture memories that are attached to these alters is A5 10 79. The reader will
notice the following on the hypothetical chart on the previous page for the
first Section (which is numbered 6 to be deceptive): This section is front
alters. Basic code pattern = color +
Genesis + no. [1 thru 13] + letter [a thru m]. Individual codes 1st section
general-"N.I.F.6", 1st section mother Eve "EV.E5 10 51 ACE"
(Eve is the balancing point & the ace code is high or low). The alter
Explorer is "EI.G7", Mammy "MI.H8", Angel "Red, AI.19
Jack Genesis 4" (or it could be done "red, AI.J10 Genesis 4"),
George "Silver, GI.K11 ", Zsa Zsa "gold, ZI.L.12", and
Shadow "Clear SI.M13". You
won’t find on the main chart codes such as: Eve’s memory "EI.D5.2.1952
ACE" or the Infant alters-- "1-000 10-49 REJECTS 3-9" The master
may say for example: "Green GENESIS 1-A" (3 times) to get this alter
which is the balancing point. Fragments/dead
alters were dumped into areas named concentration camps and given the names of
the famous german concentration camps. The camps were placed under the
Q. Catholic Programming (by Jesuits etc.)
KEYS TO THE KINGDOM = world domination by mind control.
VOW OF SILENCE is a keep quiet program activated by "THE WALLS HAVE EARS & THE PLANTS HAVE EYES SO YOUR SILENCE IS TANTAMOUNT TO SUCCESS." This is explained to the victim that the sea shells and the plants have the ability to hear, and that a sensitive occultist (programmer) can psychically pick up what the plants and sea shells hear.
"MAINTAIN IT" --is a command to maintain the Vow of Silence
"MAINTAIN IT & LISTEN."-- a command to keep silent and listen to a command.
"ENTER INTER INNER DIMENSION TWO" - this is a standard Jesuit infinity program (2 is a sacred voodoo no.)
R. Mensa Programming (by MENSA) "17 211346" is an Illuminati code meaning a Mensa layer Sample Mensa codes: "727 + E=MC SQUARED + 3.141 5962 + PI" "A+B=C, B+C=A, C+A= B" "TIC TAC TOE + C CROSS, PI CROSS" The MENSA codes are sequences of 6 numbers.
Miscellaneous Common Signals
Finger to forehead--
One ring finger bent at 90° --access wave Rotated pencil--with certain words--rotates the system
Finger swung the counterclockwise way closes portals.
Right Fist to forehead--OBEY
Fist with right hand cupping left hand, the left is like the letter c, and the thumb is outward and the fist inside, the left hand then moves 3 times over the knuckle--access signal
Left hand of slave laid on top of handler’s hand-sign of submission
Hands behind back of head--I’m master
Right Hand with thumb & index finger making an L shape on chin/check Hands on inside of thighs by handler--come to me Kitten and service me. Hands locked folded interwoven backward--you can’t break "the circle" Handshake with index and middle finger held straight out--"You are one of us."
Grip called the lion’s paw--access greeting opening and closing the hands or large circles with index finger opens portals.
Palms rubbed together counterclockwise
Kiss on center of head--kiss of submission of slave to handler
Palm of hand touched--sexual access point for some models
Sign of Satan-- Hail Satan! used for Monarch & Illuminati Mind-controlled slaves as an induction.
The alter who is holding the body goes into trance, & a deeper one replaces it.
Thumb twiddle--rotating the thumbs around with the two hands clasp--S&M Touch of center of forehead--access point
Vulcan Peace Sign--llluminati/occult greeting Wave with Finger and thumb together-other digits extended
Winks at the system were used to convey meaning. Life "Over The Rainbow"- After indexing & rereading this book, the co-authors realized that we had not explained "over the rainbow." Some alters live "over the rainbow" and some do not. Both types will use the term "over the rainbow", but with different meanings attached. For those who live "over the rainbow", they serve their masters in such a deep hypnotic trance that they perceive reality like it’s a dream. When their memories surface they are so unlike normal memories that a system in therapy may not know what to do with them. They have been described as similar to the pictures in the old T.V.s when the vertical hold would go out of control.
Deeper alters, who live "over the rainbow" experience memories/life in the following fashion: faces & porn cameras are airbrushed out of their memory, distinctive marks in the perpetrators such as scars & wrinkles are airbrushed out, colors & lights are very bright due to the total dilation of the pupils while in deep trance, and there is no sense of time for these alters. These alters are trained to "TRANCE SEND FORWARD THROUGH TIME". By understanding the programming, the codes, & triggers, those alters who lived "over the rainbow" can recover from the mind the full memory, without the distortions created by dissociation.
T. Partially Correct Programming Site Codes
The following site codes are not totally accurate. Also, the Intelligence groups use that what are called Cryptonyms, which are two-letter digraphs such as the "MK" of MK-ULTRA. The digraph can indicate a type of operation or even a location. An operation may have CODES. The following site codes are not totally accurate. Also, the Intelligence groups use what are called Cryptonyms, which are two-letter digraphs such as the "MK" of MK-ULTRA. The digraph can indicate a type of operation or even a location. An operation may have its cryptonym changed in the middle of its operation. Programme Programming Zone Area/Code
Armstrong 63 94XCCD
Astor 36
Florida 59XCBB
Bournell-Hightower 19
Brown 30 59XBMN Burcham 329
Texas 92XBMM
Gaston 61
Colorado 1XCDF
Haggin 743
Kentucky 47XB0
Harrick 263
Colorado Springs Johnson 95
Mannass Mentor 21
Colorado 61XBXX
Nathan 56
New Mexico
Owens 963 106XBJK
Pantu 71
Kansas OliXOEG
Patterson 117
Kansas Savior 49
Major Strange 14 1Z440x72080020366
Strong 52 81XCBC
Suttenfuss 103
Colonel Taylor 16
Kentucky Weir 561
Texas 33XBCB
G. Hypnosis in Programs, and Other Uses
The programmers will begin their programming by extreme torture. After a certain amount of torture the victim is willing to say or believe anything to stop the torture. At this point a thought will be planted into the victim’s mind. This thought will be linked to a false memory put in via hypnosis or movies, or other method, and it will be linked to a command put in by hypnosis etc. and the original thought, the command, the false memory will be linked by a single emotion which will link them all together. The result will be something like this: it is two weeks before Halloween (thought), I must get ready for Halloween rituals (command) because I have always had a habit of going to Halloween rituals (false memory). If I don’t I will have a heart attack and die (memory of torture linked to thoughts). Programming is layered in. Layer after layer of programming is put in. Each alter (personality) of the victim is used as if it is a component of a large system. The result is that no alter (personality) is the whole, but only a cog in a great machine. Can a single cog rebel against the whole machine? It is very difficult for a single component of thousands of components to rebel against the abusers.
Alice In Wonderland Programming: going down the tree, going
through the mirror, going underneath something or growing tall. The internal
programmers (and some other alters) have the ability to send other alters into
deep trances. One of the programs for doing this is based on the Alice In
Wonderland Theme and it was experienced like this for a level 2 alter who
managed to stay in communication with her deprogrammer: When the alter went down
in her mind she went down on the inside of the trunk of a tree (like Alice In
Wonderland). At the bottom she saw a keyhole, a table, and on the table was love
potion #9. She automatically drank the love potion which shrinks her to a dot
and then she goes through the keyhole. So normally this process means she goes
through the keyhole. She managed to stay in contact with her deprogrammer during
this deep trance. After the key hole she saw thousands of looking glass mirrors.
Everything got smaller as she went down the tree. She became a dot. She drinks
love potion no. 9 and comes back with it. A tree comes and wraps itself around
her and loves her. As she ascends (comes up in trance) she stretches up and
enlarges. In coming up out of trance she gets stuck at level 8 due to some
interference from deeper alters. She, in accord with her programming, senses her
Master’s love. (Normally she would have simply tranced out, and another alter
would have taken her place and she would have no recollection of the entire
process. The alter has been
programmed to have backup amnesia. Backup amnesia means that one doesn’t
remember that one lost time, one doesn’t remember that one forgot, etc. In
short it means you don’t remember that you don’t remember.) This is an
example of hypnosis used internally by the programming and the Programming
alters to control other alters. The deepening of the trance was given the
imagery of
Wizard of Oz--going into the poppies
Star Wars--time warp, riding the light
Star Trek--being beamed, replicators etc.
Hypnosis is used to anchor suggestions about sleep patterns, panic programs, phobias, health healing programs and health problems programs, pain control and pain programs, motivation programs, a suicide program called "hypnosleep", an insanity program, and countless other uses.
Hypnosis is used to steer a person’s mind in the direction that they have been labeled. For instance, if they have been selected to become a doctor, they will be programmed for success as a doctor. New patterns of thought, feeling and behavior are inserted to build confidence in the goals of the Illuminati. Positive experiences are used to help boost the person’s feelings, and then the new messages are anchored "imagine these messages taking root. Your new messages are growing stronger and stronger."
The Alice In Wonderland programming theme is used in air-water programs and mirror programs which the Illuminati, the CIA, NASA, the Jesuits and others like so well. The idea is that there exists a mirror world which is a reversal. Along with it is attached the idea that the slave can enter into a timeless dimension of time, or as some refer to it "interdimensional time travel."
Later, the victim will be further brought under the spell of this mirror
programming by going to locations around the nation, like the Magic Time Machine
restaurants in
When hypnotically programming in programs, the Programmers place in many types of images and programs. Some examples would be having the concept of obedience equal the fountain of youth. The fountain of youth flows in the victim’s mind unless they step out side of their orders. This can be linked to the Shangri-la story, where a woman ages as soon as she leaves her place in Shangri-la. Another example, is the hypnotic imagery involving the formation of an island from a volcano. The story is turned into a programming script to allow the System to be radically restructured. This Volcano programming is a System’s turning program. A volcano erupts from deep down, and lava pours into the sea. Mountains are pushing up from deep in the mind. To survive people must cross from the old to the new island on a bridge that naturally forms. Fire births the new territory and destroys the old. The new mountains develop trees which become safe places for the alters to roost upon.
Hypnotically Building in Structures
Later in the book, the art of building structures internally in the mind of the victim will be covered. However, since the process involves hypnotism it would be appropriate to discuss briefly how hypnosis can begin to work a tree structure into the mind of the child.
First, the programmer hypnotically suggests that his penis is a growing tree. Later, the programmer might begin, "You know those big trees in the park that look so big and straight and stretch way up toward the sky? Stand up and be one of those trees. Stand up really straight and tall as tall as you can be, and stretch your arms out toward the sky like branches on that big oak tree. Now those big trees have long, deep roots that keep them from falling over. Feel your feet go down down through the floor, just like roots on the big strong oak tree."
Final note: there is no way that this book could give every last song or story that has been used for programming, nor was it the intention to do so. We have wanted to point out the popular story lines used, although we have missed some such as the Chronicles of Narnia and Little Red Riding Hood (which is used in several ways along the lines of you think you’re going to Papa’s, or Grandma’s house & you end up with a wolf). Our list left out many programming songs--all the Rolling Stone’s songs, Alabama ’s Old Flame, etc.