CHAPTER 4.
SCIENCE NO.4 -
HYPNOSIS
UNDERSTANDING THE BASICS ABOUT HYPNOSIS
A.
DISSOCIATION, TRANCE, AND HISTORY OF HYPNOSIS FOR PROGRAMMING
Dissociation is used as a defense to protect a person from overwhelming
pain and trauma. It is a natural ability of the brain. Hypnosis or
hypnotic trance is a form of dissociation. There are a number of types
of dissociation: amnesia, somnambulistic states, localized paralyses,
anaesthesias, and hallucinations. Hypnosis can reproduce all of these
dissociative states. The mind naturally hypnotizes itself under various
conditions. Perhaps the reader has been driving along a familiar road
and the next thing you knew you were arriving home, having driven in a
trance. Now let’s suppose you are driving to a movie and you are
discussing next week’s plans with your wife. The complex thinking
required to drive just happens. You are awake talking to your wife, and
yet on another level you were in trance driving the car. You as a
subject were both in hypnotic trance (driving) and awake (talking about
plans). There are 5 levels to the subconscious that the mind will
naturally dissociate to. The other deeper levels require help to access.
People naturally can think on two levels.
Because people’s minds
function on multilevels and there is a continua on a spectrum that runs
from conscious to unconscious, it is often difficult to pinpoint just
exactly what state of mind the brain is in at a certain point, because
there is no single answer. A light trance is where a person is
daydreaming about his girlfriend. A moderate trance is where he imagines
he is in bed. A deep trance is where he physically feels he is in bed
with his girlfriend. Sleep is where one dreams of being in bed. Behavior
modification is carried out in the light to deep trances. The deep
trance is a very creative level. Hypnosis appears to affect several
areas of the brain--the brain stem is modified into the hypnotic state,
and the midbrain centers are inhibited so that other areas--the motor,
sensory and memory areas can be manipulated. Further not all hypnosis
works the same way.
Hypnosis can be used on the intellectual part of the
mind, the social-spiritual part of the mind, and the primitive
reproductive part of the mind. The skilled hypnotist will decide which
area he wants and how to work with that area. Both Christians and
Illuminati members who are skilled in understanding demonology, believe
that there is a demonic side to hypnosis also. It should come as no
shock to people that in the World Book Encyclopedia hypnosis is
listed under Magic as a related article, but not under Medicine. Some
Christians class hypnosis as a form of divination and enchantment. It
certainly can be a form of control. In occultist William Bernard Crow’s book
Witchcraft, Magic & Occultism, it lists hypnotism as an occult
science. There is open debate whether hypnotism is simply part of the
brain’s natural abilities or if supernatural elements are part of the
process. There is no debate that historically, hypnosis for centuries
has been the guarded secret of the occult world.
During shock or stress,
the body’s limbic-hypothalamic-pituitary-adrenal system, releases
substances which encode all the internal and external pieces of
information being sensed into a deep level of consciousness. These
memories often become dissociated from normal states of consciousness.
In other words, when the mind-body returns to this state (where it was
in during shock/stress) the mind can reaccess those memories. However,
until the mind returns to this shocked state, it doesn’t pick up the
information it has embedded. The Monarch programmers are acutely aware
of how the mind functions, and how information and memories can be
trapped in the mind. There are different neurophysiological states. Also
there are said to be 12 levels to the subconscious mind. Then on top of
this the mind has the ability to create amnesia barriers.
Hypnosis is a
valuable tool to move the mind to different neurophysiological states
and to get the mind to different levels of the subconscious mind.
Hypnosis can also play a role in working around amnesia, since both are
types of dissociation. Hyperventilation helps a person induct into a
hypnotic trance. Torture, depersonalization, fear and acute anxiety
stimulate the body to hyperventilate. So the fear, torture and
depersonalization are aids for the hypnotist to help induct a person
into a hypnotic trance. Hypnotic cues can be given to cause the body to
go into various dissociative states. This could be a post-hypnotic
suggestion that causes hyperventilation and an accompanying trance
state. Hypnotic cues that are tied to every day objects enhance the
programming. Everything in life becomes a cue to reinforce the
programming. That may seem on the surface to be an exaggeration, but it
is only slightly enlarged from the truth.
The programmers do in fact
examine a person’s life, and then tailor their cues to what the person
will be around. For instance, the programmer may force the child to
smoke and then tell it that every time they blow out smoke they will
think about their master. The programmed alters don’t dare not to smoke
on fear that they will be punished. The smoking in turn reinforces the
power of the hypnotist/master. Much of the good that therapy can do is
in effect to de-trance or dehypnotize clients. Most of the alters of a
Monarch system go their entire lives in trance. Common objects in a
person’s life that can be hypnotically given a programming meaning
include music, tones, colors, the sight of a book or Bible, the pyramid
on the back of a dollar bill, pictures of God, silk scarfs, jewelry,
lights, sounds, TV programs, and countless other things. The limit to
this is simply the programmer’s creativity. The power of hypnosis is
often underrated because the power of the mind is underrated.
The mind
can decide to control its breathing, heart beat, blood pressure and
other things that were once thought to be involuntary. The brain
produces a substance which is a tiny peptide molecule called enkephalin
which acts just like morphine and reduces pain. The brain can be
hypnotically trained to release enkephalin so that the brain doesn’t
perceive pain. A common hypnotic device for washing away pain is running
water. The victim is hypnotically told to go to a waterfall and wash
their pain away. (According to a programmer the average healing rate is
3 times quicker under hypnosis than without.) The fantastic abilities of
the mind to control what happens to it are very remarkable (such as its
natural healing abilities), but most of this is being kept a National
Secret so that it can be used against humanity to enslave us to
demonic-empowered power hungry monsters, rather than to benefit
humanity. Several people in intelligence agencies quietly bemoan the
fact that secret research could be helping humanity instead of
controlling it.
The human mind has been found to be like an immense
symphony orchestra, each part doing what it does best under the guidance
of a director part similar to the conductor of an orchestra. A
non-multiple’s brain delegates responsibility to parts of his brain yet
retains control over the process. His mind will shift from one ego state
to another, & still retain its identity. In contrast, the multiple’s
brain also delegates responsibility and shifts from one ego state to
another, BUT doesn’t retain a “cohesive selfhood or self-identity. The
mental mechanisms are similar, but the experience is vastly different.
Rather than an orchestra playing together, the multiple’s brain is full
of competing isolated parts (instruments so to speak) that are playing
in isolation. Out of the chaos of all these independent amnesic parts,
the programmer through hypnosis/& fear then becomes the conductor to
help bring order out of chaos. If the multiple is to regain a chance to
orchestrate their own life again, they must re-establish communication
between the different parts of what should have been their own
orchestra, and get internal people to harmonize their music of life.
Good
programmers do not need to formally induct their victim into hypnosis.
However, if they need to, the Monarch slaves are well conditioned to
respond to numbers being counted and fingers being snapped. Hypnosis was
a well developed art by the early 20th century. And testing and refining
continued all along. For instance, the. U.S. military was conducting
extensive tests of subjects under hypnosis during W.W. II. In spite of
all this, the CIA was still seeking better rapid induction techniques
for their slaves during the 1950s. MK Ultra Subproject 128 dealt with
rapid induction techniques, especially Subproject 128-1.
Some of their
drug testing was done at Lexington, KT Detention Hospital. The ability
to distinguish between magic and hypnotism may not exist for the child
in situations where they are witnesses to the power of hypnotism
exercised by a programmer. This makes the adult programmer, who is a big
person look all powerful. Another danger inherent in hypnosis are
complications (side effects) that hit a percentage of those who are
subjected to it. Hilgard (1974) discovered 31% of the 120 university
students participating in a study of hypnosis had complications that
lasted from 5 mm. to 3 hours after trance, which included
headaches, dizziness, nausea and stiff necks.
Fritz is aware of one
woman who, after the one & only hypnotic session she was the subject of,
developed the complication of having nightmares of snakes crawling all
over her. (For further study the reader may want to read MacHovec,
Frank. “Hypnosis Complications, Risk Factors, and Prevention”
American Journal of Clinical Hypnosis. Vol. 31, No.1, July, ’88, p.
40). Regular gentle electrical stimulation in many parts of the brain
including the lower part of the reticular formation can change the state
of consciousness from alert to sleepy. An electrical band attached to a
box is sometimes placed on the victim to produce a hypnotic state. There
are several ways to alter a person’s state of consciousness, but the
most popular one by Monarch handlers is to use a combination of drugs
and hypnosis. Drugs are used to facilitate hypnosis. Modern drugs do
almost all the work for the hypnotist. They place the person in an
altered state and make them willing to take any order. Often survivors
remember orange or grape drinks, or something else which they were
given, which were used to give the child drugs.
One Monarch slave (Cathy
O’Brien) wrote about having been given hypnotic drugs via a Grasshopper
ice cream drink. Occasionally, hypnosis must be carried out by the
programmers on unwilling subjects. They have 3 major ways to get around
this. They can induce hypnosis by disguising what the hypnotist is
doing, they can wait until the person is asleep and talk to him while
asleep, or they can administer drugs. Also the Network has some
high-tech equipment which stimulates the orgiastic state (sexual
ecstasy) part of the brain. By moving the body into this state, the mind
opens up all the unconscious states. Then sophisticated brain wave
machines program thoughts into the person. A computer disk is put into
the electric shock machine and it runs a program that sends electric
jolts down six nodes. The brain’s reticular formation serves as the
brain’s mechanism involved in regulating alertness and awareness.
Various kinds of stimuli will enter the brain through its various
methods of sensing and learning. With total sensory deprivation (done by
placing the victim in a salt water tank with electrodes that shock the
body until it stops all movement) the reticular formation will place the
mind into a primitive state of consciousness where the programmers can
place in post-hypnotic commands to do something on a certain date. The
end time programming, that has Monarch slaves doing something at a
specific date to create anarchy or to help the Anti-Christ come to power
has been put in at this level. As previously mentioned, this level
achieved by total sensory deprivation of the Monarch slave is same
primitive level as the brain’s commands to keep the heart beating.
Depending on what type of signals are coming in to it from the various
sensing agents of the brain, the reticular formation will then make a
decision what state of consciousness to place the mind in. If the
reticular formation does not send out “alert” signals, then the brain
will get sleepy. Damage to the reticular formation can cause a coma. The
two thalamus lie just above the brain stem.
The right and left thalamus
are the brain’s selective attention mechanism. That is to say, they
decide what it is important for the brain to focus its attention on. The
right thalamus is connected to attention to visual shapes and the left
to our attention to things describable in words. Ten to fifteen
repetitions at one second intervals are enough to cause the brain to
lose interest in something. At this point the neuron’s in the reticular
formation quit paying attention to whatever it is. For instance, your
brain will listen to a clock tick for only 15 intervals before it quits
listening to a clock in the room. But the brain’s alertness can be
reactivated by a strong and sudden stimulus like a loud sound or a flash
of light. This is why 3 gunshots or 3 flashes of light are used as
standard access triggers for Monarch slaves. Three was also found to be
the best number to get the job done.
THE
HISTORY OF HYPNOSIS FOR PROGRAMMING
A
masonic magazine for higher masonic rites where sex magic is performed
entitled Freemasonry Universal, Vol. 5, 1929, p. 58
states,
“Certain Forces are sent through the candidate’s body during the
ceremony, especially at the moment when he is created, received and
constituted an Entered Apprentice Freemason. Certain parts of the Lodge
have been heavily charged with magnetic force especially in order that
the Candidate may absorb as much as possible of this force. The first
object of this curious method of preparation is to expose to this
influence those various parts of the body which are especially used in
the ceremony. In ancient Egypt, there was another reason for these
preparations, for a weak current of physical electricity was sent
through the candidate by means of a rod or sword with which he was
touched at certain points. It is partly on this account that at this
first initiation the candidate is deprived of all metals since they may
very easily interfere with the flow of currents.”
Long story short, the
Masonic lodges have been using hypnotism and electric shock in their
initiation rituals for a long time. The combination of fear and
hypnotism combine to help seal the lips of an initiate from telling what
in some lodges are secrets of criminal activity. The Brahmin caste in
India practice yoga, and other meditations where they regularly go into
altered states of consciousness. Centuries ago, the Brahmin fakirs
learned about drugs, tortures, and magical methodologies to produce
hallucinations and altered states of consciousness. The worship of
Bacchus in the west and Shiva in the east were similar, as were the
bloodthirsty rites of Kali and Moloch. Occultists in India have also
gone to cemeteries for centuries, like the Illuminati to draw spiritual
power from graves. When eastern and western occultists linked up they
realized they had a great deal in common.
The ancient Egyptian writings
many centuries B.C. talk about the third eye and temple trances.
Hypnosis appears to have been practiced in these ancient temples. All
over the world, altered states of consciousness have been used. The
feared Scandinavian warriors called Beserkers were in a
mildly-programmed altered state of consciousness which made them
fearless.
B.
HOW TO PROGRAM WITH HYPNOSIS
George
Estabrooks was the first major hypnotist to publicly recognize the
potential for hypnosis. He contacted MI-6 and other military and
intelligence groups in hopes he could interest them in the
military-intelligence potentials of hypnosis. What was George Estabrooks
connection to the Illuminati? George Estabrooks was a Rhodes Scholar,
which is an entry-level group for the Illuminati. For those who haven’t
studied this, it would be appropriate to give a brief explanation of
these things.
The Illuminati in 1919 created the Royal Institute of
International Affairs (RIIA). The
Astor Illuminati family were major
financial backers of the RIIA.
Waldorf Astor was appointed to the RIIA.
The American equivalent to the RIIA is the
CFR. The RIIA and CFR set up
Round Table Groups (based on the King Arthur myths) which were initially
named by Cecil Rhodes “Association of Helpers”. High ranking
Mason/Illuminatus Cecil Rhodes also created the Rhodes Scholarship to
bring select men from several the English speaking world and Germany to
learn how to bring in the One World Government that the Illuminati has
long had planned. The Cliveden Estate of the Cliveden Astors (of the
Illuminati) has played an important role in the preparation of Rhodes
Scholars. Bill Clinton and Fred Franz, the late president of the
Watchtower Society, are two examples of men selected for Rhodes
Scholarships. Bill Clinton went through the program.
However, Franz
decided not to go to London in order to help lead C.T. Russell’s cult as
“oracle” after WT Pres. C.T. Russell was ritually killed on Halloween,
1916 and his remains buried under a pyramid. He later served as
President himself from 1977-1994. The
Watchtower Society leadership is a
front for a part of the Illuminati which practices Enochian Magic. The
power of Enochian magic is the Watchtowers. A powerful part of Bethel
headquarter workers are Multiple Personalities, and have cult alters who
speak in Enochian. Some multiples work in the art department and have
been secretly placing hidden occult symbology into Watchtower &
Awake! magazines. Now back to Estabrooks, who was also himself part
of the Illuminati. In his book Hypnotism, which came out in 1946,
he wrote in his chapter Hypnotism in Warfare (again bear in mind that
Estabrooks writes this in 1946 and has been advocating what he writes
for perhaps the 15 previous years!)
This chapter is not taken from a
mystery novel. The facts and the ideas presented are, so to speak, too
true to be good, but no psychologist of standing would deny the validity
of the basic ideas involved. He might, of course, be somewhat startled
at our proposed use of these basic ideas and techniques, for he has
never given this matter much thought.... The use of hypnotism in warfare
represents the cloak and dagger idea at its best--or worst. Even if we
did know the answers to some of the weird proposals in this chapter,
those answers could never be given for obvious reasons. The reader must
use his imagination for specific outcomes in specific cases have not
been made public--probably never will be made public. Any topflight
physicist is familiar with the basic laws of atomic fission and he is
quite free to discuss those laws. But he may or may not know what is
happening on some government research project in this field. If he does
know, he is not shouting it from the housetops, probably not even
whispering it to his best friend. The same applies to hypnotism in the
field of warfare. Our interest here lies in some of the more unfamiliar
sides of hypnotism which may make it of use in warfare. Again, no
psychologist would deny the existence of such phenomena....
The
only possible way of determining whether or not a subject will commit a
murder in hypnotism is literally to have him commit one.... But
warfare...undoubtedly will, answer many of these questions. A nation
fighting with its back to the wall is not worried over the niceties of
ethics [like Nazi Germany]. If hypnotism can be used to advantage, we
may rest assured that it will be so employed. Any “accidents” which may
occur during the experiments will simply be charged to profit and loss,
a very trifling portion of that enormous wastage in human life which is
part and parcel of war.... One in every five adult humans can be thrown
into the hypnotic trance--somnambulism--of which they will have no
memory whatsoever when they awaken.
From the military viewpoint there
are a few facts which are of great interest. Can this prospective
subject, -- this ‘one-in-five” individual -- be hypnotized against his
will? Obviously, no prisoner of war will be co-operative if he knows
that the hypnotist is looking for military information, nor will any
ordinary citizen if he suspects that the operator will use him to blow
up a munitions plant. The answer to this very vital question is “yes”,
though we prefer to say “without his consent” instead of “against his
will.” We do not need the subject’s consent when we wish to hypnotize
him, for we use a ‘disguised” technique. The standard way to produce
hypnotism in the laboratory is with the so-called sleep technique. The
operator “talks sleep” to the subject, who eventually relaxes and goes
into a trance, talking in his sleep and answering questions.
Now
suppose... we attach a blood pressure gauge to the subject’s right arm
and the psychogalvanic reflex to the palm of his hand, just to make
everything look shipshape. These devices are for measuring his ability
to relax. We also point out that, of course, the very highest state of
relaxation will be his ability actually to fall into a deep sleep while
we are talking to him. We also stress the great importance of the
ability to relax in this modern world of rush and worry, promising to
show him how to get results as one end of these experiments. All this is
by way of buildup. Probably not one of our readers, if exposed to this
procedure, would realize that this was preparation for hypnotism, but
would co-operate willingly in this very interesting psychological
experiment.
We then proceed to “talk sleep,” much the same as in
ordinary hypnosis, carefully avoiding any reference to a trance or
making any tests with which the subject might be familiar, all the while
checking on blood pressure and psychogalvanic reflex to keep up the
front. Finally we make the test of somnambulism, or deep hypnotism. We
see if the subject will talk to us in his sleep without awakening. If
this does not succeed, the subject wakes up completely, and in this case
we simply repeat the experiment, hoping for better luck next time. But
if we do succeed, if the individual belongs to the “one-in-five” club,
the subject is just as truly hypnotized as by any other method, and from
now on everything is plain sailing. By use of the posthypnotic
suggestion...we simply say, “Listen carefully. After you wake up I will
tap three times on the table with my pencil. You will then have an
irresistible impulse to go sound asleep.”
The next trance is just that
easy to get, and the subject has no idea that it is the pencil which has
sent him off. ... But we must go even further than this. Once a person
has become accustomed to hypnotism, has been repeatedly hypnotized, it
becomes very easy for any operator to throw him into the trance.
Obviously this will not do if we are to use hypnotism in warfare. So we
plug this gap again by suggestion in the somnambulistic state. We assure
the subject that in the future no one will be able to hypnotize him
except with the special consent of the operator. This takes care of
things very nicely....We sit down with the subject...We are talking
about the latest boxing match when the operator taps three times on the
table with his pencil. Instantly--and we mean instantly--the subject’s
eyes close and he’s sound “asleep.”
While in trance he sees a black dog
come into the room, feels the dog, goes to the telephone and tells its
owner to come get it. The dog is of course purely imaginary. We give him
electric shock which would be torture to a normal person, but he does
not even notice it. We straighten him out between two chairs and sit on
his chest while he recites poetry. Then we wake him up. He immediately
starts talking about that boxing match! A visitor to the laboratory
interrupts him.
“What
do you know of hypnotism?”
The
subject looks surprised, “Why, nothing.”
“When
were you hypnotized last?”
“I have
never been hypnotized.”
“Do you
realize that you were in a trance just ten minutes ago?”
“Don’t
be silly! No one has hypnotized me and no one ever can.’’
“Do you
mind if I try?”
“Not at
all. If you want to waste your time it’s all right with me.”
So the
visitor, a good hypnotist, tries, but at every test the subject simply
opens his eyes with a bored grin. Finally he gives up the attempt and
everyone is seated as before. Then the original operator taps on the
table with his pencil. Immediately the subject is in deep hypnotism. We
now add another concept. We can coach the subject so that in the trance
he will behave exactly as in the waking state. Under these circumstances
we could defy anyone, even a skilled psychologist, to tell whether the
subject was “asleep” or “awake.”
There are tests which will tell the
story but in warfare we cannot run around sticking pins into everyone we
meet just to see if he is normal. So rapid can this shift be from normal
to trance state [the programming state], and so “normal” will the
subject appear in trance, that the writer has used such a subject as a
bridge partner. He plays one hand in trance and one hand “awake” with no
one any the wiser. [This happens with Monarch slaves all the time. Few
people ever catch on that alters are under trance.]
Suppose
we deliberately set up that condition of multiple personality to further
the ends of military intelligence. Let us start with a very simple
illustration. For example, we can hypnotize a man in an hotel in, say,
Rochester. We then explain to him in hypnotism that we wish the numbers
and state names of all out-of-state cars parked in the block surrounding
the hotel. He is to note these very carefully in his unconscious mind
but will have no conscious memory of having done so. Then we awaken him
and ask him, in the waking state to go out and get us a tube of
toothpaste. He leaves the hotel and wanders around the block in search
of that tube.
Finally, he returns, apologizing for his delay, saying
that it was necessary for him to go entirely around the block before he
noticed a drugstore in the very building itself. This, he says, was very
stupid of him but apparently men are made that way. Did he notice
anything of interest as he made his walk? “Nothing! Oh, yes, there was a
dog fight down at the corner.” And he described the battle in detail. We
now hypnotize him. He knows what we are seeking and at once proceeds to
give us numbers and states of strange cars, very pleased with the fact
that he can recall thirteen. He evidently enjoys the game immensely and
is quite proud of his memory. Then we awaken him and see what he knows
in the conscious state.
“How many cars are there around the building?”
“I
don’t know.”
“What are the numbers of the out-of-state licenses around
the building?”
“Good heavens, I have no idea. I think there is a
California car near the front entrance, but I have no idea as to its
number.”
A friend tries his hand. “Now look here. You were hypnotized
half an hour ago and you left this room under posthypnotic suggestion.”
The subject gets irritated. “Look here yourself. I’m getting tired of
that silly joke. This is the third time today you’ve pulled it. All
right. I was hypnotized and saw pink elephants all over the lobby. Have
it your way.” And the subject sits down to a magazine, obviously angry
that this man cannot find something more amusing to say. Often the
hypnotic subject will react in this manner. Push him just a little too
far and he becomes irritated, obviously a trick of the unconscious to
end the argument and avoid any danger of being found out.... The
reader’s very natural reaction is, “Why all this rigmarole?”... There
are certain safeguards if we use hypnotism.
First, there is no danger of
the agent’s selling out. More important would be the conviction of
innocence which the man himself had, and this is a great aid in many
situations. He would never “act guilty” and if ever accused of seeking
information would be quite honestly indignant. This conviction of
innocence on the part of a criminal is perhaps his greatest safeguard
under questioning by the authorities. Finally, it would be impossible to
“third degree” him and so pick up the links of a chain. This is very
important, for the most hardened culprit is always liable to “talk” if
the questioners are ruthless enough.
The
Super Spy
In the
instance we are about to outline, we may or may not be dealing with
multiple personality.... The little experiment I have just cited could
be successful with any good somnambulist and would require about ten
hours preparation. The example I now cite would work only with a certain
number of the very best somnambulists and instead of ten hours
preparation, we had better allow ten months....
Perhaps
we had better start by defending our position. Is it unethical? Perhaps,
but science merely states the facts.... Now let us return to our
presentation. We start with an excellent subject, and he must be just
that, one of those rare individuals who accepts and who carries through
every suggestion without hesitation. In addition, we need a man or a
woman who is highly intelligent and physically tough.
Then we start to
develop a case of multiple personality through the use of hypnotism. In
his normal waking state, which we will call Personality A, or PA, this
individual will become a rapid communist. He will join the party, follow
the party line and make himself as objectionable as possible to the
authorities. Note that he will be acting in good faith. He is a
communist, or rather his PA is a communist and will behave as such. Then
we develop Personality B (PB), the secondary personality, the
unconscious personality, if you wish, although this is somewhat of a
contradiction in terms.
This personality is rabidly American and
anti-communist. It has all the information possessed by PA, the normal
personality, whereas PA does not have this advantage.... The proper
training of a person for this role would be long and tedious, but once
he was trained, you would have a super spy compared to which any
creation in a mystery story is just plain weak. This is what the
Illuminati have done. They create good Christian fronts, with Illuminati
dark alters who can see what the Christians are doing.] My super spy
plays his role as a communist in his waking state, aggressively,
consistently, fearlessly. But his PB is a loyal American, and PB has all
the memories of PA.
As a loyal American, he will not hesitate to divulge
those memories, and needless to say we will make sure he has the
opportunity to do so when occasion demands. Here is how this technique
would work .... [skipping this story and several others, we come to:] We
choose a good subject and then let him in on the plot. We disclose to
him that he is an excellent hypnotic subject and we wish to use him for
counterespionage. We suspect that in the near future someone is going to
try hypnosis on him. He is to bluff, to co-operate to the very best of
his ability, fake every test that is made and stay wide awake all the
time. The test we fear most is that of an analgesia--insensitivity to
pain.
So we coach him carefully with posthypnotic suggestions to the
effect that even when wide awake and bluffing he will be able to meet
every test which may be made here, be it with ammonia under the nose, a
needle, or worst of all, the use of electricity, which can be made
extremely painful and is easy to use. Under these circumstances it will
be virtually impossible to tell whether this man is bluffing or really
in trance. [The story continues that the master hypnotist thinks he has
got a good subject and has hypnotized him deep. Then the subject tells
him that he was only bluffing. The whole affair provides a nightmare for
any counterintelligence group using hypnotism. They can be totally
bluffed, unless they turn to high tech equipment to see what is really
happening.]
Estabrooks also explains how a man can be hypnotized and told he is only
testing the preparedness of security. He is told he has a fake bomb, but
is really given a real bomb. The subject is sent to a location, and
blows up with the real bomb. The subject blows up with the bomb so the
evidence of the hypnotic lie is lost.
Hypnosis changes the threshold of the how the senses perceive.
Sensitivity can be increased or decreased, hallucinations can be
perceived even though there is the absence of any appropriate stimuli,
and things that exist can go unperceived by the mind. For instance,
alters who are used for porn are hypnotized not to see the camera.
Alters used for any type of sexual service are hypnotized repeatedly to
not see faces. The slave will actually see blurs where people’s faces
are.
The Programmers like to manipulate. Children are set in front of
circus mirrors that make them taller or smaller for programming. They
are set in front of mirrors which duplicate their image. Here in Oregon,
there is a site with a magnetic anomaly which bends light. It is called
the Oregon Vortex. The Programmers take small children there for
programming. Anything that creates an illusion, seems to be noticed by
the Programmers and is put to use somehow. The CIA has employed
magicians like John Mulholland to help them create illusions. Magician
John Mulholland wrote a manual for the CIA on how to deceive unwitting
subjects.
Under drugs and hypnosis, when a small child is set in front
of a mirror that elongates its body and or then shortens, the reality of
the programming script seems real. The programmer can hypnotically call
upon the child’s mind to totally hallucinate seeing something, or he can
support the illusion by handing the child a doll and telling it that it
is a child, or handing the child a pencil and telling the child it is a
flower. A great deal of acting and props are used during the
programming. What child can tell fool’s gold from real gold? The bottom
line is that generally, no matter which way the Programmers do it,
whether by an illusion or an outright hypnotic-suggested hallucination,
the event for the child is real. The majority of traumas are real
events, but the scripts that are given are after the trauma are
fictional.
C.
HYPNOSIS CAN BOOST THE CREATIVITY OF THE VICTIM TO ADOPT SCRIPTS
Creativity is a function of attentiveness, playfulness, anxiety,
limitations, relaxation, the trance state, responsiveness and
absorption. A good programmer can assist or boost the creativity of the
child. The programmer can tell stories and programming scripts in a
vivid way, so that the sensory pictures are bold and strong. The child
can taste and feel and touch in their minds the script being given them.
Besides the language of the programmer other aids such as fear and drugs
can enhance a victim’s attentiveness. Playfulness comes naturally to
children.
They naturally pretend and use fantasy in their play. Because
children are innately creative they are far easier to program.
Researchers have also discovered that creativity needs an element of
anxiety and chaos in the person’s life. If everything is orderly and in
perfect harmony, the creative juices will not flow. The conscious mind
and the subconscious mind need to grapple. For creativity to be
productive it must occur within limits. For instance, the concerto is
created within the limits of a piano keyboard. The programmer, and the
Grande Dame and the Grande Mother of the Illuminati victim carefully
guide the child’s creativity and set limits. The spark of creativity
occurs when there is an alternation of intense concentration and
relaxation.
The programmers must work back and forth between torture and
kindness. A light trance will allow the mind to surface -creative ideas.
That is why writers and composers get ideas when they are in a light
trance driving, in a light sleep, or shaving or some other place where a
light trance occurs. Receptivity is the willingness to accept a creative
idea when it comes. The final part of creativity is one’s absorption
into the process of creativity. The artist may get so immersed into the
portrait that he is painting that the portrait seems alive and real--the
actual person. This immersion, where things imagined become real, is
important to keep the creative juices flowing.
The hypnotist/programmer
can enhance the creative process by giving the child positive
encouragement to reduce their fears and inhibitions to creativity. The
programmer could say to the older child (a younger child might be told
something else),
“You take all of your fear of not being creative and
put them into a sack. The sack now becomes a bundle of energy. Now
imagine you are opening the sack and out of the sack comes a rainbow of
energy. It is powerful, it is positive. You are now full of new ideas.
You can feel this power surge through your body. Your mind is now clear
and focused, focused, you feel confident, sure of your talent and eager
to set your new ideas into motion, and you control the energy in your
life, you are very successful in controlling the energy in your
life...you take a few breaths and relax.
You notice the neighborhood
around you, there is a beautiful park, you begin to notice how beautiful
the day is, and you begin to feel a fresh new energy flowing through
your body... the more calm you become the more enthusiastic and creative
you become...you will feel free to create, to enjoy your creative
talent, to invent, to shape, and form new and wonderful ideas.”
This is
not to say that the Illuminati programmer or Mother of Darkness
assistant will use this type of hypnotic suggestions, but sometimes it
does become necessary to teach some children how to dissociate, and how
to become creative. If they do not develop these abilities, they may
lose their life to the torture.
THE
VITAL ROLE OF MOVIES FOR HYPNOTIZING SMALL CHILDREN
As
mentioned before, the hypnotist will find children easier to hypnotize
if they know how to do it with small children. One method that is
effective is to say to the small children, “Imagine you are watching a
favorite television show.” This is why the Disney movies and the other
shows are so important to the programmers. They are the perfect hypnotic
tool to get the child’s mind to dissociate in the right direction. The
programmers have been using movies since almost day one to help children
learn the hypnotic scripts.
For children they need to be part of the
hypnotic process. If the hypnotist allows the child to make up his own
imagery, the hypnotic suggestions will be stronger. Rather than telling
the child the color of a dog, the programmer can ask the child. This is
where the books and films shown the child assist in steering its mind in
the right direction. If the hypnotist talks to a child, he must take
extra precaution not to change the tone of his voice and to have smooth
transitions. Most of
the Disney films are used for programming purposes.
Some of them are specifically designed for mind-control.
SPINNING TOPS
One
method for inducting children into a dissociative state is to have them
look at a large spinning top, as the colors whirl around. Carousel rides
have also been popular to induce trances. A good sampling of optical
illusions can be found in Katherine Joyce’s book Astounding Optical
Illusions. NY: Sterling Pub. Co., 1994. The illusion The Temple
makes one feel they are in a passageway leading to a small door.
The
Escalator makes one feel they are going up and down, and could be used
for building in an internal elevator. We know that optical illusions
have been used, but we are not saying that these particular ones have
been. For a programmer to use an optical illusion, he would first
submerge the victim into a drugged state with the appropriate mind
altering music and sounds and then flash the illusion onto the wall that
the victim was facing. With virtual reality the child can really be
immersed into a weird head trip.
THE HYPNOTIC
VOICE OF THE PROGRAMMER
Programmers will adopt either an authoritarian voice, which is
commanding and direct or a permissive soft tone. Bear in mind the slave
who has the authoritarian voice used on it, sees the programmer as God
with the authority of life or death over its (his or her) body and soul.
The heightened expectation from the commanding tone, will increase the
suggestions chance for success. However a softer tone, will relax the
victim, and the hypnotist and the programming victim become partners in
the hypnotic process. The advantage of the softer tone, is that the
creativity of the victim is enhanced and participates more in the
process. The hypnotic induction become more real when the victim
participates more in the process.
The Monarch programmer will either use
a monotone voice or a rhythmic voice. Remember, the professor who could
lull his students to sleep. He had a hypnotic voice, without knowing it.
A singsong or rhythmic voice is comforting. It can also be used by the
Programmer. One continuous thread of words strung together are used to
close out distractions. After a suggestion or command is given, a pause
is made by the programmer in talking so that the suggestion is taken
into the mind. Otherwise anxiety is experienced by the victim’s mind,
and the suggestion will not be accepted as well. Cisco, the co-author
provides an example of how a hypnotic script can go with music,
“Close
your eyes for your eyes will only tell the truth. And the truth isn’t
what you want to see. In the dark it is easy to pretend that the truth
is what it ought to be. “Softly, deftly, music shall caress you. Hear
it, feel it secretly possess you. Open up your mind, let your fantasies
unwind in this darkness which you know you cannot fight. The darkness of
the music of the night. “Close your eyes, start a journey through a
strange new world. Leave all thoughts of the world you knew before.
Close your eyes and let music set you free. Only then can you belong to
me. “Floating, falling, sweet intoxication. Touch me, trust me, savor
each sensation. Let the dream begin, let your darker side give in to the
power of the music I write. You alone can make my song take flight. Help
me make the music of the night. “Helpless to resist the notes I write,
For I compose the music of the night. Hearing is believing, music is
deceiving. Hot as lightening, soft as candle light. Dare you trust the
music of the night?”
When
the authors have bumped into men who are programmers and handlers for
the CIA, they have noticed that many of these men have warm
personalities and have a certain trained hypnotic voice which they use
even when not programming. During rituals, the various magical languages
used in witchcraft employ repetition, alliteration, nonsense syllables,
newly coined words, and ancient words that are chanted or sung in a
limited-range that makes the sounds become hypnotic. Sounds like the
mantra “a-u-u-in-in” are chanted.
Gestures during rituals are also made
which intensify the effects. Rituals can not be classified as having
nothing to do with programming. There is such a great attempt to
secularize and make clinical what the victim experiences, and the idea
that witchcraft is part of the programming is an unpopular notion with
some. Combining witchcraft with hypnotic language can be powerful with
group dynamics. Repetitive sounds, such as a drum beating influences the
locus coeruleus part of the brain. Drums can help induce trance.
D.
KEEPING THE MIND DISSOCIATIVE
Illuminati parents (as well as other adults who care for a Monarch
child) are given special instructions on how to raise the child to be
dissociative. The parents are admonished that their child will have a
successful future and so will they if they follow the instructions. If
they don’t follow the instructions, they are minded their child’s life
could be forfeited. There are some of the types of instructions that are
given:
a. Spend
15 minutes/day teaching the child to write backwards to develop the
brain in a particular fashion.
b.
Giving daily doses of prolonged isolation, such as dark closets, dark
cellars, the corners of dark rooms. During the prolonged isolation, the
child cannot turn on the lights, go to the bathroom, make a noise or
anything else. The child will learn to dissociate. The child is also
trauma bonded to the abuser because each time the child is let out, it
is grateful to the abuser. The child can be drowned in a pool and then
resuscitated--and the exact amount of time to keep the child under will
be given. The child can be placed in a freezer, and again the exact
amount of time can be given to the parent. The child is not to roam
about the house freely. The adults’ area is off-limits. The child must
move with permission.
c.
Systematic punishment without provocation with the message--keep
secrets. Hear no evil, see no evil, do no evil. This needs to be done
several times a week to reinforce the codes of silence and the
programming for silence.
d. A
needle which is gripped halfway up is stuck into the child a quarter
inch deep on the child’s muscles, buttocks or thigh to help continue
dissociative behavior. On special occasions (birthdays, holidays) the
hands and feet which are most sensitive to pain are stuck. When the feet
or hands are stuck, they will often stick the needles under the nails.
The ears are also on occasion stuck with needles. It also conditions the
child to obey the commands of her handlers, who will use needles to
access the minds various personalities. Various spots on the body when
stuck with needles along with certain codes become access points for
certain alters.
e.
Anytime a child argues, has a temper tantrum, or gets angry the child is
to be slapped in the face. This is a quick trauma. It is to be followed
with a lighted cigarette applied to the child to burn the skin the
second the child gets submissive from the slap. If a cigarette can’t be
found, a stove top or some other hot item is to be found. At four years
of age, the child begins programming to burn itself. If there are any
bruises showing, the child can be kept home for a day or two.
f.
Anytime the child becomes willful it is to have its mouth washed out
with soap. The child should be made to chew off a piece and swallow the
foam.
g. The
child should be raped daily and then tortured. This helps with the
sexual programming later, and begins a reversal in the mind that pain is
love, and pain is pleasure.
Some of
the first memories that female Monarchs recover are their memories of
their fathers raping them. This is because the programmers allow these
memories to be less dissociated than the later ones where the slave may
be sexually servicing an important Monarch slave handler like the
Rev.
Billy Graham. (Graham is covered in full in chapter 5.) In later
situations like that, the kitten alters which do the sexual servicing
will be electro-shocked to block their memory as well as given hypnotic
cues. The fathers or step-fathers are often not the person who will be
their master when they grow up. The abuse of this person will serve as a
cover for the programming. If the person’s front alters discover they
are MPD, the will initially blame their multiplicity on the first abuser
they remember, which then serves as a cover.
E.
KEEPING THE MIND IN ALPHA STATE
The
entire alter system of a Monarch slave has their sleep patterns
controlled. Many alters are programmed not to sleep. They stay awake 24
hours a day internally. Someone has to take the body and sleep--but
whichever alters are set up to do it, they are hypnotically commanded to
only sleep three hours, to insure that the mind stays in an alpha state
easy to program. Because alters which do not hold the body “rest”
mentally in a sense--when they take the body they are fresh. In this
way, a multiple can function without as much sleep as a normal person,
but the price they pay is that their mind stays in an easy-to-program
easy-to-hypnotize state. REM sleep allows the person to harmonize the
mind’s inner world with its outer environment. The periods of REM sleep
lengthen as the hours of sleep progress. By preventing long periods of
sleep, long periods of REM sleep are prevented from occurring, and the
victim remains in a more controllable state of mind.
F.
HYPNOTIC CODES, CUES AND TRIGGERS
When a
Programmer creates something, it will be a reflection of himself to some
degree. Just like handwriting and art are a reflection of the person who
makes them. Understanding the connections between a Programmer and his
creation could take a book in itself. The following is extracted from
the history of an ancient occult sect, still functioning today. It is
the type of thing, that the programmers feed their minds on, which in
turn provides them the patterns which show up in programming. Here it
is: In the ancient occult world, at the gates of palaces the doorkeeper
had to be shown “the seals”--the secret names of God or pictures with
magical power, and the words “R Akiva”. When the person passed this
entrance, he comes to the palace of pure marble stones, do not say,
“water, water.” Then the person will enter into the world or the
celestial Garden of Eden or the Realm of the Heavenly Palaces.
The Story
of Sinbad, the golden lamp and genie would be another example of an
occult story that could be used.
Within
the Illuminati, Gematria (which is the cabalistic teachings about
numbers) is very important for knowing the codes of the deep darker
alters. There are several reasons for why Monarch slaves have lots of
codes and structures which come from witchcraft,
a.
their programmers are witches and witchcraft is the world view on the
mind of the programmer
b. the
slaves are reminded of their entrapment to Satan and their cult whenever
they hear their codes
c. the
alters internally will work magic, even while they don’t hold the body,
and placing magical structures inside facilitates this internal magic
d.
using magical words makes the programming look like magick
e. the
internal alters are being inculcated into occult underworld life and
doctrine
A
rather remarkable book is
Aleister Crowley’s book 777 and Other
Qabalistic Writings of Aleister Crowley. It is remarkable for the
deprogrammer to understand many of the programming code links that the
programmers may have used. In 777’s forward,. Aleister Crowley wrote,
“777 is a cabalistic dictionary of ceremonial magic, oriental mysticism,
comparative religion and symbology. It is also a handbook for ceremonial
invocation and for checking the validity of dreams and visions. It is
indispensable to those who wish to correlate these apparently diverse
studies.”
(Crowley, 777, p. vii)
Later he writes, “The book 777 has for
its primary object the construction of a magical alphabet.” (p. xvii)
For instance, Crowley gives the Officers in the Masonic Lodges and the hebrew passwords of their grades. In another example of the book,
Crowley gives a list of the Hindu chakra points (which is well known),
with the Buddhist names, and their ancient Egyptian names. This is the
type of occult knowledge that is hard to come by. Crowley’s List of
Correspondences are perhaps the best one will find printed in the occult
world. They show the correspondences that occultists make between
things. For instance, if we want to know what corresponds to the Hebrew
letter Dalath.
The letter means door. Door corresponds to the letter 14,
the Cabalistic Tree of Life pathway between the two top circles on each
side of “the crown”, sky blue on the Queen scale of color, Aphrodite,
Venus and Freya, and the gems Emerald and Turquoise, and the perfume
sandlewood. All these things correspond within Cabalistic magic. For
someone trying to understand why a particular color, and name is given
to a deep darkside alter Crowley’s book is helpful in some Monarch
systems. The Mother-of-Darkness alters (and Supreme Master alters in
males) of the Illuminati must do pathworking rituals when they hold the
body and participate in Illuminati activities.
These Mother-of-Darkness
alters are placed internally in the Cabalistic Tree of Life. Crowley’s
book provides the mystic number that goes to each part (plane, or
circle) of the Tree of Life and its Snake positional number. The mystic
number of the Sephiroth that corresponds to the number to each of the 22
paths that must be worked is also given. The occult concept is that to
achieve divinity one must go on the Tree of Life from being Malkuth to
become Kether. Although it is not the intent to propagate occult
doctrine, for those who want to know how Illuminati Monarch slaves get
to where they are as adults, and what the codes are in their System,
then we need to cover briefly the Kabblalistic Tree of Life. (More will
be written about this in chapter 10 on spiritual control.) Let the
reader picture 3 circles in a line. These three circles sit at the top
of the Cabalistic Tree of Life. They are the top 3 circles of ten
circles which all have names within an Illuminati Monarch slave. The
center circle is “the crown” and holds the honored alter who actually is
the Bride of the AntiChrist.
The AntiChrist is also known as Black
Saturn, and other names. Satan himself is known within a Monarch system
often by the name Bilair, Bilar, or Bilid which are his cabalistic
names. The honored alter who is married to him sits on a pedestal
revolving with 2 other alters. In the occult world, goddesses are
triune: maiden, mother and crone. The one to the left of center is
Midnight (the Mother figure), and the other is Morning Star (the
maiden). Morning Star (Stella Matutina) may be a very young alter,
rather than a teenager. On top of the Cabalistic Tree of Life will sit a
pyramid. Each of the ten circles (rooms for the alters who live in them)
of the Tree of Life is created with a different Illuminati ceremony.
Before a Mother-of-Darkness Monarch slave is 16, they will have gone
through all the ceremonies involved in the creation of the alters which
correspond to the 10 rooms of the Tree of Life. At age 16, the system’s
demons will then guide the system on a personalized pathway and a baby
(the firstborn) will be sacrificed by the System.
The blood of this
first born is spiritually placed in a box under the Tree of Life. This
is in accord with the Lilith story. The spirit Lilith (sometimes with an
alter Lilith) will work with the spirits of Zerodieth and Lucifer. There
are several trees which can be placed within a Monarch slave, including
the ash, the oak, the ygdrassil, the willow, and the Tree of Evil, which
is an evil counterpart to the Tree of Life. These will be dealt with
under the chapter on structures. This chapter will provide the hypnotic
codes, cues, triggers or whatever one wants to call these words, noises,
and sensory inputs that manipulate these poor victims turned into
Monarch robots. Other chapters will explain about the structures these
codes go to, and also the spiritual dimensions of these codes and
structures.
Another way to see things is to recognize that the
programmers have created “power words” to which they have attached
memory and programming. If a de-programmer observes closely the word
usage of the victim, you will begin to spot power words of the abuser,
for instance, “white rabbit”. A cipher is when symbols are used to
represent letters. One can used letter frequencies to break ciphers.
Likewise, there are frequencies to codewords. The Illuminati’s
intelligence agencies have programmed thousands upon thousands of
slaves. There are only so many code words to pick from and some of these
code words are favorites. From the co-author Fritz Springmeier’s
experience, the following are favorite code words that have been used to
program slaves with:
CHARLOTTE, CHECKMATE, CHRISTMAS, CLARA, CLOVERLEAF, COURIER, CRAYON,
CRYSTAL, DAISY, DAVY, DELLA, DELTA, DEMON, DIANA, DINAH, DIRTY, DIME,
DOT, DOVE, DRAGON, DUCK, DUMBO, EAGLE, EASY, ECHO, ELAINE, ELEPHANT,
ELLEN, EMERALD, EMPIRE, ESTER, EUREKA, EVERGREEN, FAITH, FALCON, FARMER,
FELIX, FIREFLY, FIVE BROTHERS, FIVE SISTERS, FLASHLIGHT, FLOSSY, FLYING
+ [other word], FOX, FREEZE, FRIENDSHIP, FULL HOUSE, GALAHAD, GAMMA,
GARGOYLE, GEMINI, GEORGE, GIPSY, GOLEM, GOLDEN + [other word], GOOSE,
GRACE, GRANNY, GREEN DIAMOND, GULL, GWEN, HADES, HALF-MOON, HAMMER,
HARRIET, HAWK, HAZEL, HELENE, HELIOS, HEN, HERMES, HIGH BALL, HIGH CARD,
HOLE-IN-THE-WALL, HOPE, HOPI, HOUNDDOG, HOURGLASS, HUSTHER, HYDRA,
ICEBERG, IDA, IMP, INCUBUS, INSECT, IRIS, IROQUOIS, ITEM, JACKASS,
JAGUAR, JANET, JANICE, JASON, JASPER, JAVELIN, JENNY, JEZEBEL, JIG,
JULIET, JOAN, JOSHUA, JUDY, JUPITER, KANGAROO, KANSAS, KATY, KING, KILO,
KITTY, KOMET, LACE, LADY + [other word], LAMP, LAURA, LEAP FROG,
LEOPARD, LIGHTNING, LILY, LION, LITTLE + [other word], LOVE, LUCKY +
[other word], MAE WEST, MAGIC, MAJESTIC, MAMIE, MANDREL, MARIE, MARK,
MARTHA, MAX, MEADOWS, MERCURY, MIGHTY MOUSE, MILLION DOLLAR, MINNIE
MOUSE, MONA LISA, MONTE CARLO, MOTHER, MUMMY, NANCY, NAOMI, NAVAJO,
NIMROD, NOAH, NORA, NUTCRACKER, OBOE, OCTOPUS, OLD FAITHFUL, OLIVE,
OPAL, OPHELIA, ORION, OSCAR, OWL, OZMA, PACKAGE, PAMELA, PANDORA,
PANTHER, PAPERCLIP, PAPA, PAT, PATSY, PEGASUS, PENTHOUSE, PHANTOM,
PHOENIX, PINECONE, PISTOL PETE, PLATO, PLUTO, POLLY, PYTHON, QUAIL,
QUEBEC, QUEEN, QUEEN BEE, QUEENIE, QUEST, QUICK SILVER, RACHEL, RAINBOW,
RAM, RANGER, RASCAL, RAT, RAVEN, REBECCA, RED DIAMOND, RED HILL, RENO,
REX, RHUBARB, RITA, ROBOT, ROMEO, ROOSTER, ROSIE, ROVER, RUBY, RUTH,
SABRE, SAINT, SAINT + [another word], SALLY, SAN ANTONIO, SAPPHIRE,
SARAH, SATURN, SCAMPER, SCOUT, SEA GULL, SEAL, SERGEANT, SERGEANT-DELTA,
SHADOW, SHARK, SHENANDOAH, SHO, SICKLE, SIGMA, SILVER, SNOW + (other
word), ZEBRA, ZENITH, ZERO, ZYPPER, ZOMBIE, ZULU, ZUNI.”
The
word FOX is an example of a significant occult code word. F-o-x consists
of the 6th, 15th (1+5), & the 24th (2+ 4) letters of the
alphabet, which yield 666. The reader needs to bear several things in
mind. First, the programmers generally have intelligent, well sounding
codes, that do form patterns. For instance, a woman’s name from the
Bible will be used as a code, with subparts or subcodes having other
female names from the Bible. Deeper Illuminati parts will have goddess
and god names, and king and queen names for cult alters. These are the
names the handler or cult uses--NOT their access codes. The codes for
slaves follow patterns.
There are standard and unique codes. The
internal programming alters have the power to change codes if they need
to protect the programming. They will have to hypnotically work with
alters when they trance out at night. In other words, most of their
programming of front alters will be done when a System lies down for
“sleep”--more accurately described as “for trance.” If the internal
alters change many codes, in their efforts to protect the system, they
will even make it difficult for the handler/programmer to get into the
system. Ciphers developed rotors that require lines to line up. Some
simple schemes using this principle appear in some Monarch systems.
This
is part of the science of structuring. Intelligence codes often come
from the Bible or popular fiction books. The deeper codes are occult
words, often in foreign languages such as Arabic, which is an important
language in the upper occult world. Slaves will be given COVER NAMES for
ops, and often males receive female names and vice versa. Very shortly,
we will provide the Monarch hypnotic cues (codes) for the multitude of
functions that a Monarch’s mind must carry out. The type of programming
which is placed in a slave varies. For intelligence operations the slave
will have to have BONA FIDES, which are codes to allow two people to
meet. All slaves are given CONTROL SIGNS which allow them to indicate
via a code that they are in trouble.
A RECOGNITION signal allows two
people to make contact. For instance, the handler might fly his
distinctive sounding plane over a slave’s house in a pre-arranged
signal. It might also be a particular colored scarf, and a particular
set of phrases. A GO-AWAY code is a prearranged signal that means it is
unwise to make contact. The go-away signal may be simply placing one’s
hands in one’s pocket or turning the porch lights off. A “GO TO GROUND”
signal means to go into hiding. A MAYDAY BOOK exists for Illuminati and
Intelligence slaves which allows them to call if they are about to be
arrested. A telephone number is left open for just this purpose. Also
common universal Illuminati codes can be used by the slave to get set
free from police and judges.
Within the Jehovah’s Witnesses, especially
their headquarters, the Illuminati uses Enochian language to program
with. With Druidic branches Druidic symbols are used. With the Jewish
groups, Hebrew is used. Other languages are also used. An Illuminati
System can easily have 6 different languages used as programming codes.
The foreign language codes will be for small parts of the System only.
Special artificial languages are also employed, as well as sign
language.
MONARCH MIND-CONTROL CODES
contents:
A.
ALPHA (basic)
B.
BETA (sexual)
C.
CHI (return to cult)
D.
DELTA (assassination)
E.
EPSILON (animal alters)
F.
OMEGA (internal computers)
G.
GAMMA (demonology)
H.
HYPNOTIC INDUCTIONS
I.
JANUS-ALEX CALL BACKS (end-times)
J.
THETA (psychic warfare)
K.
TINKERBELLE (never grow up/alien)
L.
TWINNING (teams)
M.
SOLEMETRIC MILITARY
N. SONGS (reminders)
0.
ZETA (snuff films)
P.
Sample alter system codes
Q.
Catholic programming
R.
MENSA programming
S.
HAND SIGNALS
T.
Programming site codes (used for slave model codes, etc.)
a.
ALPHA (basic)
-
Basic Commands (these basic commands are also
found used in many slaves, although there will be exceptions to everything.)
“ON
YOUR TOES” -- is a preparatory command that will be used throughout an
entire system.
“IF YOU
PLEASE SIR” -- From Wizard of Oz, slave says this like “yes, sir.”
3-tap
code for access
“FOLLOW
THE SNAPS”, “LISTEN AND OBEY OUR COMMANDS”, “THIS IS FOR YOUR OWN GOOD”
“FIDDLER” = code to take one to Never Never Land
“PUPPET
MASTER” -name of master for Marionette or Puppet program “DADDY” -master
“DADDY’S FRIEND” -- a user of slave approved by master “PAPA” - master,
“WHITE RABBIT -- master
“YOU’LL
SPEAK MY WORDS WHEN I PULL YOUR STRINGS.” Puppet programming control of
what slave will say.
“SPILL
IT” -- trigger command ordering slave to speak
“SILENCE” -- order means keep quiet
Mr.
Rogers Neighborhood’s “Land of
Make Believe” was used for the programming code script:
“I AM
MR. ROGERS
AND I
HAVE PUPPETS, TOO
I PULL
ALL THE STRINGS
AND I
PULL STRINGS ON YOU.”
Twinkling of the nose -- Bewitched programming to cast spell or order on
slave.
“(name
of alter), YOU WILL COME FORTH AND OBEY.” or “...OBEY AND COME FORTH.”
Another basic way of getting an alter would be simply to spin the person
and call out the alter’s name, or to snap the fingers and call out the
name of a front alter.
-
Access is accomplished for a number of Illuminati slaves by a message
via phone or letter, then a looking glass person takes the system to a
location outside of the house, maybe simply to the sidewalk, there the
person is picked up. The left hand is then grasp on the soft part of the
hand between the thumb and forefinger by two fingers very tightly. This
pulls up and alter with an egg in its lap. The egg is then opened via a
code and the imps inside the egg to communicate to the ribbons and the
computer.
-
Access phone calls to slaves may have high-speed codes transmitted that
trigger the slave subliminally without their conscious awareness.
-
Access to some people is done with computer like jargon “ON LINE”
“ACCESS, (then identification), (then color code), (then name)” “,
“ENTER”, “RUN”. Some Systems have their triggers all in computer lingo
such as COMMAND MODE--ALL DISK DRIVES AND HARD DRIVES... ERASE.. .FORMAT
DRIVE...COPY....UNDELETE PURGED MEMORY DRIVE...” Where some of the newer
slave programmers are also computer programmers they enjoy transferring
their computer lingo to use in controlling their programmed slaves. They
may even throw in some FAX lingo such as “DIAL ALL REMOTES. . .
INITIALIZATION - ATSO -OHOaM (HANDSHAKE BETWEEN ALL REMOTES), HANDSHAKE
COMPLETED.”
-
The color of the car to pick up a System may relate to the color coding
of the alters to be picked up, such as white exterior, blue interior for
a white alter-then blue alter access sequence.
Basic
Internal Emergency Color Codes for a System, there are several different
“CODE RED’s, etc. not just one in a slave, what follows is not the
complete information about the Codes, although it is possible some
slaves have a simplified version like this:
-
“CODE GREEN” -- Dr. Green’s suicide programming, tied to “no-talk”
programming.
-
“CODE BLUE” --Victim’s body freezes in motion and can’t
move until another code is given.
-
“CODE RED” -- Victim gets angry and violent “CODE RED” -Another Code
Red has the standard Monarch meaning, “serious self-destruct” program
-
“CODE YELLOW” -- Victim gets jealous, angry and wants to violently
get even
-
“CODE BLACK” -- Used to get victim’s to get on their ritual clothes.
-
“CODE WHITE” -- Code to protect the cult members from arrest. When
police see the Code White they treat the people as untouchable. There
are code words for Illuminati members to tell police and judges that
will automatically get them set free. Masonic handshakes and codes also
work well with judges, police & govt. workers.
-
“CODE 911” -- To activate the slave for an emergency calling for
superhuman strength. Certain alters will have extra strength.
-
“CODE 911” -- Also used with standard Monarch meaning of “Call your
programmer/handler”.
-
“DISARM” (3x) -- to get rid of a dangerous alter two snaps
+ “SHUTDOWN” -- to shutdown an alter.
-
“LET
THE KINGS BE KINGS, LET THE BANKERS BE BANKERS, LET THE PRIESTS BE
PRIESTS -- saying to justify their Master-slave relationship to the
masses of humanity.
-
The Sun
setting the following day was used as a trigger for slave to forget
events. For the cat alters a certain word is given to trigger them to go
“over the rainbow” after an event in order for them to forget it. “FROM
THE RISING OF THE SUN TILL THE GOING DOWN OF THE SAME” --programmed in by
using the scripture. “GO INTO THE SEA OF FORGETFULNESS” --a hypnotic
structure in the mind to forget. Waterfalls are also used as a hypnotic
image to forget pain and memory.
-
“RETYPE
A LETTER” -reprogram, “JEWELS” = programs. “THE CATS & THE FIDDLE NEED
TUNED UP--Slave to handler, I need reprogrammed.
-
There
are three words to trigger a suicide program - 1. Bait, 2.
[intentionally left out], 3. hook Another suicide program trigger is
when the dominoes fall. “GO OVER THE BLUFF” (3X)- causes suicide in some
alters SACRED HEART = Catholic/Jesuit suicide program Some suicide
programs are set off with a long tone over the phone along with a code
no.
-
“KERMIT
THE FROG” --a type of access code. “KERMIT” may be a code relating to
computers, because Kermit is the universal language for connecting
computers together. It is a single standard to exchange files between
any two systems.
All
memories, traumas, and tortures are coded. Body programs are coded. One
set of body programs uses Hebrew, Greek, and Druidic letters.
A clone
program creates clones of an alter (also called lollipop or lobster
program) imagery is that sesame seeds fall off of a hamburger bun and
becomes another hamburger.
Codes
to all the various basic systems
-
Alice In Wonderland
The
White Rabbit is a programming figure for Alice In Wonderland Programming
who will allow you to go to otherwise inaccessible places for adventure.
He represents the master. The White Rabbit is an important figure to the
slave.
White
rabbit gives a wafer (coke-sugar-cocaine) to Alice and says “EAT ME” or
“EAT IT AND I’LL TAKE YOU THROUGH THE DOOR” -- takes master into closed
part of System, or perhaps over the rainbow.
The
Queen of Hearts is also an important figure for commands in the Looking
Glass World which the slave enters upon command. When a deep slave alter
is needed to perform they are sent into the looking glass world where a
looking glass person carries out the command--but in a way that reality
is thought to be a dream. In other words, this is a preparatory command
to get the slave ready for abuse.
“USE
THE KEY. PUT IT IN THE LOCK. TURN. OPEN THE DOOR...AND STEP THROUGH A
WINDOW [or MIRROR] INTO NEVER NEVER LAND.”
“SOMETHING IN LIGHTENING TO TRANSPORT YOU FASTER THAN THE OL’ RUBY
SLIPPERS. CLICK YOUR HEELS TOGETHER AND BE THERE IN A SNAP. (SLAVE
CLICKS HEELS) ELECTRIFYING .... WITH THE RUMBLE OF THUNDER. BOLTING
THROUGH TIME ... SO YOU WON’T BE LATE ... FOR A VERY IMPORTANT DATE.”
(Alice in Wonderland Programming) (This is the wording to use deep
alters.)
-
Cinderella Program
The code word involves something said about
the stroke of midnight.
-
The Melting Pot Program
A very powerful program is activated by
melting the slave into his master. The slave will do anything for the
master with this program. The melting is the ecstasy that is
occasionally experienced when lovers having sex seem to melt into each
other. This feeling of ecstasy-melting is programmed to release when the
master says these words, “MELT INTO YOUR MELTED MIRROR FOR AN
ELECTRIFYING RIDE. LOOK DEEP INTO THE BLACK OF MY MELTING MIRROR EYES.
SEE YOU REFLECTING ME, REFLECTING YOU, REFLECTING ME, REFLECTING YOU,
REFLECTING ME, REFLECTING YOU, REFLECTING ME, REFLECTING YOU ... (cont.
this several times) UNTIL WE MELT TOGETHER AND SINK DEEP... [words
omitted] INTO THE OTHER SIDE.”
“MELT
INTO MY MIRROR, YOU LOOSE YOURSELF INTO THE POOL OF LIQUID MIRROR, STEP
INTO THE LOOKING GLASS, SINK DEEP WITHIN ITS POOL, AND STRADDLE THE
DIMENSIONS IN TIME. I’LL SEE YOU THERE ... ALONG WITH MY FRIENDS”
“SEE IT
THROUGH THE LOOKING GLASS” -- infinity mirror programming involving
mirror image people (alters)
“LOSE
YOURSELF IN THE INFINITY MIRRORS.”
-
Wizard of Oz
The
Yellow Brick Road is the script or programmed set of instructions one
must follow. It also serves as a runway for alters to take off from
their internal world and take the body. “FOLLOW THE YELLOW BRICK ROAD”
There
is a code to get through the poppy field (trance state). Some alters to
get through the poppy field need to put on a new dress and a new image.
The poppy field may be called “the field of forget-me-not”. In this way
it is linked to the daisies of Dr. Green. To get into the poppy field is
easy, it is “SLEEP, SLEEP, SLEEP”, see other induction methods on
another page.
“THERE’S A PAIR OF MAGIC SHOES TO WEAR WITH YOUR DRESS.. .SOMETHING IN
LIGHTNING...TO TRANSPORT YOU FASTER THAN THE OL’ FURRY SLIPPERS.”
When
the slave is finished being used they return from Never Never Land to
Kansas. To do this they are told: “CLICK YOUR HEELS ... THERE’S NO PLACE
LIKE HOME.” They might be reminded “YOU’RE NOW GOING OVER THE RAINBOW TO
THE OTHER WORLD.”
-
Tin Man programming
The Tin Man programming is all purpose
versatile program for what ever the master needs done, it means that the
slave is a well oiled machine. Sometimes the slave is reluctant to do a
job but he is being told that he is a well oiled machine. The exact
words may vary with the mission, but the following are exact words,
“LEAVE YOUR SHELL. ACTIVATE: MACHINE. COUNT DOWN ONE TO TIN....” “SOON
WE’LL HAVE YOU PURRING LIKE A WELL OILED MACHINE. ALL OF YOUR MOVING
PARTS ARE PIVOTAL AND GLIDING WITH EASE. MELT INTO MY HANDS. TAKE MY
COMMANDS. I’LL HOLD YOUR JAW TO KEEP IT FROM SLIPPING WHILE YOU SLIP
THROUGH A WINDOW IN TIME.”
Program
code for slave to shatter their memory of an event (used with
electroshock): “MIRROR MIRROR ALL AROUND ON THE CEILING ON THE GROUND,
SPINNING FASTER ROUND AND ROUND. ARE YOU UP OR ARE YOU DOWN? ARE YOU
DOWN OR ARE YOU UP? IT REALLY DOESN’T MATTER. BECAUSE WHEN THIS MIRROR
BUBBLE BURSTS, EVERYTHING WILL SHATTER.”
“GO KEY
WEST IS KEY -- several slaves have this code, related to Sen. Byrd & Oz
prgmg. GALAXY programming (for the end times) is also connected to the
Oz programming.
In
upper level Illuminati slaves Dorothy in the Oz story will represent the
Mother of Darkness alters, Ozma will represent the Ruler of the Castle,
and Glinda will have the Great Book of Records. The ring of
Glinda (from Glinda of Oz, p. 16) gives protection.
Body Programs
-
· Control program
See Omega Programming- Universal Function Codes for
internal system codes for body programs. Sometimes these body programs
are filed with a combination of hebrew and zodiac signs. Greek letters
are also file no.s of at times of body programs.
Rivers of blood
-circulation control program. This program totally controls the
circulatory system. The victim may think they are losing lots of blood &
go into heart failure.
Octopus- strangulation suicide program The
internal defenses consists in part of body programs that are triggered
if the Mind-controlled slave steps out of line.
Here is a good list of
some of these body programs each of which has its own codes:
-
Auditory problems, Blood flow/circulation, Burning as if on fire,
Digestive failure, Headaches-split brain, Heart failure, Histamine
production, Optic problems, Respiratory failure, Sleep deprivation,
Sleeping program, and Temperature change. The suicide programs that can
go off include Armageddon, Clowns cutting, Cutter program “Pain is
Love”, Disembowelment, Drug overdose, Gethsemane, “Hypnosleep”,
-
Injection of bleach (poison), Octopus, Red Sea, Shooting Programs
(shotgun, russian roulette, shooting family, etc.), War in the Heavens &
Wrecking the car. Along with the suicide programs that can be triggered
are programs that jerk the victim’s mind every which way, which include:
Bee Stinging Program (put in by placing the drugged victim being near
large swarms of bees humming & then letting a bee(s) sting the victim),
Busy Cleaning Program, Crazy program, Flooding (from Atlantis), Isolate
& Hibernate Program, Memory Erasure Program, Pain Programming, Paper
Doll Program, Protection by trance, Revolving switching, Scrambling
Program, and re-Structuring Programming, Tumbleweed program, Waterjar
Shaking program (Ahab stomping the grapes Bible-based program making
mush out of the brain.)
-
Cutting
programs are often hidden behind the Bee Swarming program. Alpha and
Omega is a strong program. Sometimes saying “ALPHA & OMEGA” helps
alleviate headaches.
-
DNA (This uses a lot of number
codes.) This is a double-helix which is used as an elevator shaft
running down through a system. Numbers are used and the names of cities
to go down the elevator shafts. This programming is said to be done in
hospitals.
-
Card Codes -- Regular playing
cards have developed from the occult Tarot cards. The four suits
correspond to magick, the spades mean the power from the spear of
destruction, the diamond means is a double pyramid or demonic power of
wealth, and the club is a clover meaning fortune and fate, and the heart
means devotion and loyalty. The four suits work well in programming
because anything that is broken down in 4’s or a multiple of 4 can be
coded with cards. Anything that can be broken down into 12’s or 13’s can
be given cards too. Since clocks work off of 12’s, card codes work well
with clocks. The suits can denote seasons. With Jokers one gets 13 cards
per suit with four suits gives 365 unique symbols to denote the days of
the year. Dominos can also be used on a base 13 code system. The blank
will equal 13.
Carousel System. There is a
back side to enter the Carousel.
-
Carrier Pigeon (slave’s who send coded or uncoded messages) and
their contact codes
Birds
used for contacts. That is birds in cages are often used as a sign of a
meeting place. The contact would say “What did the bird say?” or “A
little bird told me ..., Then the courier pigeon delivers her message.
-
‘‘I’ve
come a long long way to see you. words to say by System to John or to
person to be met. There is an endless variety of contact phrases to
indicate that the right person has met the right person.
-
Sample
Code for passing drugs-“RHINESTONE COWBOY” to which the response from
the slave would be “I’M NOT A COWBOY, I’M A COWGIRL.”
Emerald
ear rings have been the visual signal to customs agents to allow a
person carrying drugs through customs. (SEE D. DELTA for deeper Carrier Pigeon
codes.)
-
Castle System.
May
need a special ring worn by and turned by the handler.
-
Flower’s Program.
CSP94OYP587 -- code to designate a flower
tying 3 generations.
UMBRELLA PROGRAM CODE -- “R x 4 x 5Y58876”
Sample correspondences of Gem codes:
1 -
Aries - diamond
2 -
Gemini - topaz
3 -
Cancer - cat’s eye
4 -
Leo - ruby
5 -
Virgo - emerald
6 -
Libra - opal
7 -
Scorpio - amethyst
8 -
Sagittarius - turquoise
9 -
Capricorn - black onyx
10 -
Aquarius - crystal
11 -
Pisces - sapphire
Potter’s Wheel
“STAND
IN ORDER ACCORDING TO RANK AND SERIAL NO.”- part of a stacking command
to get alters in sequence together to work on them. Dominoes and cards
are used as part of the stacking cues.
Dr.
Star’s Programming which places Pentegrams into people uses Sigils as
codes--the occult symbols for the various demons, along with a color, a
gate, and a number form a complete code.
For
example, 1st Gate is the god Nanna, #30, color-SILVER, LADDER OF LIGHTS,
GOD OF THE MOON. (see Illustration)
To
access a System the abusers often have an object as part of the pickup
code, such as a set of car keys, a special coin token, a business card,
jewelry, or certain clothes or packages. A Popper liquor drink is
knocked 3 times on the table when it is served. (Who would be the wiser
that three knocks is an access code?)
WORD MATRICES
A
word-matrix code is where the victim is given two lists of words and
then each word on the left list is paired with a word on the right list
to form a code.
Randy
Noblitt, a therapist, gave an example of a basic pattern for a
Word-Matrix. And this is simply quoted from his example to give the
reader an idea.
started xenophobe
between thoughts
endless beginning
throughout forever
get out trepidation
over beneath
fun execute
win lose
first then
form benign
beginning end
tonight last morning
thorough the end
B. BETA (sexual)
SEXUAL ALTERS -- most of the following codes are for deep sexual
alters. In Illuminati Systems these are called Beta alters, in CIA
systems they create Beta models whose primary function is to provide
sex, usually perverted sex and S&M for the perverts who run our
secret
government and visible government. BETA models are those who are primary
job is sexual, such as service as a Presidential Model (sex slave for a
President). These System models are numbered BETA 1, BETA 2...BETA 601,
etc
Domino
codes for spinners can be 6-3, 6-4, 8-4, 8-5, 10-5, 10-6, 12-7,
12-8. The 13th kitten then would be left blank. Spinner dominos have
spinner kittens off of them, when a spinner domino code is used. In this
case 6-2 could take you to the Beta level.
“10
LITTLE INDIANS, 9 LITTLE INDIANS...”, “1 LITTLE, 2 LITTLE.. .“--assoc.
w/ morse code-call back telephone no.s. “3 LITTLE KITTENS HAVE LOST
THEIR MITTENS...” -The Kitten alters have stepped outside of their
programming and need fixed by the Master.
“Hotel
California” means a place to have sexual gratification.
Stroking under chin along with “HAVE A BALL TONIGHT” (Cinderella
programming) Stroking under the chin along with “PURR FOR ME KITTEN.”
Magic shoes or red slippers are used to switch to get specific sexual
alters. The slippers are clicked 3x to get deeper sexual alters.
“COME
HERE MY KITTEN, AND LET ME PET YOU. PURR FOR ME NOW. ..THAT’S A FLUFFY
KITTEN. PURR DEEP.” “COME HERE LITTLE ONE.”--call for young sexual alter
“PASSION” used 3x with other words as a sexual trigger, such as “SHOW ME
YOUR PASSION.” Passion is a strong program word for sex.
“RED
DOT, SPIN SPIN SPIN, BECOME ANOTHER PERSON.” this is said to a mother
kitten before she is told which spin kitten to get from her litter. It
is a preparatory command meaning “call your spinner”.
Spin
Kittens “WE GOTTA GET DRESSED.. .IN 5 MINUTES” along with being spun
produces specific sexual kitten.
9 lives
of kittens -- means 9 sexual alters taken in sequence. When spun in a
counterclockwise fashion, the sexual menu is from 1 to 9. With 3 & 5
being oral sex. “Heat of hell” are used as trigger words in this
programming. The 10th revolution is to beg to be whipped. “TURN AROUND
10” “SPIN FOR ME.” The heat of hell ignites after the 6th spin.
“RIDE
PONIES”--means to do sex for both eng. & ger. slaves; “PLAY
HORSEY--sexual games; “MOUNTING A HORSE”--[obvious] “CAT NAP” -- sex;
“CAT NIP -- cocaine
Tweedle
Dee and Tweedle Dum --S&M programs involving mirror image alters. Not to
be confused with Humpty Dumpty self-destruct program.
“SIX IS
SEX. SEVEN IS HEAVEN. EIGHT IS GREAT. NINE YOUR MINE.”--This means to
fall under the master submission, has sexual overtones.
“ITSY
BITSY BOOB” -- access code pertaining to Betty Boob programming (which
is a certain type of female behavior).
For
Beta alters the codes may be:
“BETA
ONE MARY A=1, B=2, C=3, D=4”
“BETA
TWO MARY A=4, B=3, C=2, D=1”
“BETA
THREE MARY A=3, B=4, C=1, D=2”
Then
these might be said in combination “3412 4321 1234” (x3)
An
amer. sys. used w/ Latin Amer. may have a Beta alter activated by the
movement of 2 small Mexican flags & a code word in spanish “USTA
CA-NATA” (cream).
C.
CHI (return to cult)
Chi
programming uses a lot of idiosyncratic phrases, and little ditties.
Some of the nursery rhymes listed in the song section will be Chi
programming. Some of the Chi programming has been listed in the Alpha
programming section.
D.
Delta (assassination)
Delta alters --are activated to kill by the following three things:
seeing specific clothing, items held in a persons hand, and particular
words. Since these items would be specific for a particular murder there
is no particular specifics that can be given.
Courier Pigeon -- Alters (In Illuminati systems--these are
Delta-Beta alters). “FLOCK” --word meaning the stable of carrier pigeons
of DIA
To turn
a Genie free, pop a cork: “TURN YOUR GENIE FREE...POP A CORK.” An
internal controller must activate the umbrella or genie bottle pop the
cork program to release a delta or delta-beta alter.
“YOUR
WISH IS MY COMMAND” I Dream of Jeannie Programming
“YOU-ARE-WHAT-YOU-READ” passbook program. Programming to remember bank
numbers and other specific numbers.
“I SENT
A MESSAGE IN A BOTTLE.”
Distinctive jewelry & clothes. Emerald ear rings used as a signal to
others that a message was being carried. Emeralds mean drugs, rubies
mean prostitution, diamonds (rhinestones) presidential model work. Red,
White & Blue worn sometimes by presidential models. High level reporting
alters forget their messages with “REFILE # #, (name of alter).” Some
Systems have one name w/ several different numbers attached to indicate
alters within one area and purpose. Sergeant 1, up to Sergeant 60. Or
say “Access 1143 Marcy” & then other Marcy's are numbered with other
numbers. Spaceships & flags are assoc. w/ Sergeant alters.
Delta
Black Widow alters have a web, fangs, poison, eggs, and silk strand
connectors. Viper is the demon associated with Black Widows, and they
are programmed to re-connect their strands if all of the connectors are
not taken out.
Index
finger pointed at head means Russian roulette.
E.
EPSILON (animal alters)
These
codes aren’t known. One method that may be used, for instance, is for
the Raven alters who are to tear the body’s flesh, the story of Noah’s
ark where he sent the Raven out will be paired with the word TWIG, and a
code formed from TWIG. There are some alters which are to actually act
like animals, and their codes somehow tie in with what they are.
F.
OMEGA (internal computers)
The
Omega programming works along with an Executive Control Board (or
Grand
Druid Council) and Internal programmers. The Executive Control Board is
associated with both numbers of the clock, and precious gems and metals
such as “9 O’CLOCK GOLD”. The Beast computer can be accessed with
Scripture triggers associated with the Vision of Daniel of the Beast,
and its ten toes. The Ten Toes are important part of the code in some
models.
UNIVERSAL CODE FOR ACCESS TO INTERNAL COMPUTERS
Key
manual -- 33123113211
Program computer -- 22133113332 function computer 11123132221
Ren
computer -- 13321321332-55434232312 L\S 55434232312 reenlist
Reprogram no.s -- 2231231; 4432312; 33231223
An
input code is 666fff666fff666 the reverse of this code is
F6F6F6F6F6F6F6F6F6F6F6. One victim’s computer ran on code “WAR GAME”.
Some Beast computers have 666 666 666 as an access code and 999 999 999
as a beast back out and close out code. There are various computers--one
on each level. These have some standard codes and some individual codes.
UNIVERSAL FUNCTION CODES -- COMPUTER CODE -- 5543423231 2 which hold
the following codes:
-
abduction
4511321
-
anger
4213261
-
assignment coordinator 1613212
-
assassination
5332135
-
bank of lies
3124532
-
blindness
2566553
-
brain disorder
6325512
-
body gesture
1332221
-
body functions
4311322
-
call back ritual
6664113
-
child control
3214441
-
circle in fields
3332241
-
confusion
6643252
-
control
4321341
-
deaf 3324553
-
death
1451621
-
denial
2311444
-
despair
3223412
-
distortion
6233322
-
disorder of bones 4561321
-
disorder of breathing 5532111
-
disorder of eating 3342136
-
division
3211652
-
false memories 3314532
-
fear
2665132
-
fleeing
5613354
-
game playing 1561321
-
guilt
4321231
-
hatefulness
5331241
-
hopelessness 1112364
-
illness
1566432
-
infiltration
2231335
-
insanity
2144312
-
inside reporters 1133265
-
loyalty to group 3364112
-
mute
2213541
-
murder
3221456
-
nonsense 2665443
-
outside reporters 1132256
-
reprogram others 4555643
-
reprogram self 1133432
-
respond to triggers 4441221
-
retardation s- 1314555
-
m-
1314556
-
sabotage 1135461
-
seduction
2134121
-
self body harm 3321343
-
sex
2116652
-
shame
3122115
-
suicide
3113246
-
trigger
1324652
-
trigger others 4442211
-
zombie
3321556
Under
each of these codes, other codes may be attached. For instance, under
Body Gestures, the following functions are coded and a sample coding
scheme would look like this:
-
talk verbally 3456343
-
touch chest 2322132
-
touch hair 3323221
-
touch mouth 5434232
-
touch nose 5443232
Rainbow
an alter which speaks only in rhymes. Ribbons are in a box with Rainbow.
A ribbon might be accessed by several slaps on the face and “Rubicon
2,4,6,8...” (3x)
-
Hickory Dickory Dock rhyme is associated with the vortex which is tied
to turning the system and also to some death alters.
-
Dominoes set off flooding programs to overload the person.
-
Program numbers on some slaves are put in by touching the third eye with
the index finger and speaking the number.
G.
GAMMA (demonology)
In
Satan’s realm, demons are fathered or split off in families like alters
are. There will be a Moloch number 101, and a Moloch 10,321. The victim
has alters which are numbered such as Sally 1 and Sally 10. For a better
understanding of this area of programming see Chapter 10 section I.
Gamma Programming includes all the demonic activity. In this section one
can add the Kabballa’s Tree of Life which has alphabet codes, back up
programs to regenerate, associated with Greenbaum or Greentree. In the
Illuminati slaves, the deeper parts of their system are ritual and the
demonology pertains to the various rituals that are done. The following
is a sampling of Illuminati rituals. The blood rituals are used to
attach demons to possess alters in a particular way. These rituals can’t
be separated from the programming. They are part of the programming.
Ceremonies:
-
Assembling of the Quarter Regents
-
Beltaine -- with hunts of slaves,
fire festivals, and blood rituals
-
Bride of Satan Ceremony -- (Mar. 24)
-
Demon revels
-
Drawing down the moon
-
Druid Feast Day -- on Jan. 1
-
Duels to the death -- like gladiators
where the heart is cut out and eaten
-
The Grail Mass
-
Grand Climax -- human sacrifice & sex
rituals
-
Invocation of Hecate as Crone
-
Lammas sabbat -- where a female is
sacrificed
-
Pathworking -- (done before 16 with
Cabalistic Tree of Life pathways)
-
Rite of Deification
-
Rod of Light ceremony -- (consists of
text from Cabala, black candles, ram’s horn blown, and victim’s mother’s
name sounded)
-
Sealing ceremony -- at 19 yrs. for
Mothers of Darkness level
-
Secret ceremony -- where people paint
their faces half black and half white.
-
Sister of Light rebirthing water
ceremony -- (victim is bound and then pulled from water and wrapped up
in linen, and a green branch is place on the chest)
-
St. Agnes Eve
-
St. Bartholomew’s Day
-
St. Walpurgis
-
Summer Solstice Orgy
For
those who are not familiar with occult terms the following are ritual
items:
-
Paten (the holy dish)
-
Athame or Glaive (the knife used to
sacrifice with)
-
the wand or scepter (a ornamental staff which
represents authority & usually has an electric shock)
-
the censer
(to distribute burning fragrance)
No comments:
Post a Comment