H.
HYPNOTIC INDUCTIONS
‘‘Kaleidoscope eyes’’ -- used in hypnotic induction and spinning
“20,
19, 18, 17, 16, 15, 14, 13,...1”
For
many slaves the sign of Satan done with the fingers puts them into a
trance, and deeper alters come out.
“100,
91, 82, 73, 64, 55, 46, 37, 28, 19, 10, 1”
Touching the head in a particular fashion is done. ‘‘DEEPER AND DEEPER
AND DEEPER DEEPER AND DEEPER AND DEEPER, DOWN, DOWN, DOWN, INTO THE
DEEP, DARK VELVETY MIST, DEEPER AND DEEPER AND DEEPER.”
“DEEP,
DEEP, DEEP, SLEEP, SLEEP, SHEEP, SHEEP, SHEEP” SLEEP,
“YOU’RE
BEAUTY WARMS MY EMBERS. SEE THEM GLOWING DEEP WITHIN THE DARKNESS OF
MY EYES... IGNITING INTO FLAME... BLACK FLAME.”
Seeing
a Hand of Glory (severed left hand) will induct people into Peter Pan
programming. (Books describing the occult use of the Hand of Glory in
Ireland go back to 1830. It is an ancient practice. Baring Gould’s book
Curious Myths of the Middle Ages describes the recipe for using
the hand of glory as a gruesome lantern during the witchcraft of the
Middle Ages.)
“I AM
THE SAND MAN, AND BLOWSAND IN YOUR EYES” said while simultaneously
moving the hand over the face to create the illusion of placing sand in
the eyes.
“3-2-1,
3-2-1, 2-1-1, 1-2, 1, You are now relaxed.”
Lights,
in certain colors and sequences, have been used to trance alters out,
for instance a flashing red light may trance certain alters out. Tunnels
were used as a powerful hypnotic suggestion. Bear in mind, that people
induct a. when phys. or mentally relaxed, b. when their senses are
overloaded or sens. deprivation, c. when their equilibrium is disturbed,
d. their motion is restricted or e. their eyes are fixated on something.
I.
JANUS-ALEX CALL BACKS (end-times)
Main
link to a System’s programs to ALEX coded 44334223112. Scramble code to
ALEX is 34424313221. Individual code to ALEX = 55434232312. Link to
JANUS coded 3323432123. Report back- X441062F
Main
JANUS tracking/reprogramming code-JAN US 9341 00569XXY99632 [x3]; its
back up code X44420-61F. (There is a Janis 2 computer at 666 Connecticut
Ave. Washington, D.C. Disinformation by the Network is that the PACER
computer equipment is called Janus/Janis). Main AMBASSADOR code
67302986ZZ9861 (suicide/fire) sub codes- Fire 97643F4200L; Cut
97642C42DIL L ; Suicide 9762354202L; towards violence 97613V4203L
Main
EMPEROR - [dot, dot, dot] 79622109MM861 1
END-TIME ACTIVATION CODES
Most
slaves have end-time programming. When a slave is called in with
end-time programming they have pages upon pages of coded messages. A
number of Monarch slaves have been de-programmed enough that they began
accessing and spewing out pages and pages of these activation codes.
Part of a sample of one of these is as follows:
-
ISRAEL IS RISING
-
ACTIVATE 366 UNITED NATIONS
-
900 BLUE BIRD PILOTS RISE
-
NATIONS IN PLACE
-
RED CHINA CALL BACK
-
COUNT DOWN, ACTIVATE ALEX
-
3.7 LC
-
94
-
CIRCLE FARMS AROUND THE SQUARE
-
BRITISH SOLDIERS RISE
-
MOUNTAIN GOAT COME
-
EASTSIDE OF PEAK
-
39 ACTIVATE
-
52 ACTIVATE
-
42 ACTIVATE
-
RED CHINA RISE
-
1.7 ACTIVATE
-
THE HOUR COMES, A. C. SON
-
ACTIVATE AFRICA
-
ARISE IN NUMBERS OF 90...
A team
leader will have a down line of around 4 people--which are coded red
ray, yellow ray, green ray, blue ray. When the activation code hits a
slave team leader during the end times, they will in turn activate their
people, who in turn will have people who are team leaders and have a
down line. At least two false callback alarms will be sounded (tested)
before the real one.
J.
THETA (psychic warfare)
K. TINKERBELLE PROGRAMMING (never grow up/alien)
Capt’n
or Cap’n (captain) represents the programmer in Peter Pan programming.
Tinkerbelle is a young alter created under Peter Pan programming.
‘TRANCE
DIMENSIONAL TRAVEL RIGHT FROM YOUR OWN BACKYARD. THE DIMENSIONS OF YOUR
PYRAMID ARE TO BE 9 BYE 9 BYE 9 BYE.”
Alien programming by NWO (also involves Peter Pan programming)
“RIDE THE LIGHT” -Peter Pan programming meaning to go into hypnotic
induction attached to a light that is seen when given a high voltage
shock. This is given to make experiences seem like in another dimension.
L
TWINNING (teams)
CROSS PROGRAMMING -- (With for instance a mother and a daughter
team)
Two
seals are placed on this cross programming, a “seal of cover” and a
“seal of rain”
Code:
mother - [minus] mother = 3/4 -- daughter holds 1/4
daughter - [minus] mother 1/4 -- daughter holds 3/4
Teams
will be given code words for each alter who is part of a 2-System team.
One System may serve as a father figure to the other System. Teams will
be trauma and sexually bonded, as well as having mirror images with each
others names. A leader will have an upline and a downline for the
colored rays. A leader will call the different colored rays, to activate
their programming.
An
Illuminati team ritual to create oneness & open their team boxes up to
work together (Illuminati twinning ritual): the team kneels face to
face, draws a magical circle on the ground, joins Delta team hands
forming a clasp ring. (Blue is associated with this.) then they all say,
“Star within a star, Circle within a circle, Mind within a mind, body
within a body, Soul within a soul.” Then the team places Palm, their
hands Palm to Palm, and then speaks 4 times, “Bone to Bone, flesh to
flesh, Spirit to Spirit, Forever together - never apart.”
Then a
5 pointed star is traced in the air. To close the Delta team twinning
box, the reverse is done. Then other things are to be said in the
joining and opening ritual. A double deck of cards is used to program an
Illuminati team of “twins”. One type of Criss-cross programming involves
1. a flower, 2. the stem, & 3 the root. The root involves blood
sacrifices. This programming ties two generations together such as
mother -[minus] daughter.
M.
SOLEMETRIC MILITARY
N. SONGS & NURSERY RHYMES
Songs & Nursery Rhymes Used As Triggers (note all of these songs
have been used on other slaves too.) Songs with Monarch programming
meaning & access parts soliciting behavior or thinking include:
NURSERY RHYMES
-
Brahm’s Lullaby
-
Hickory, Dickory Dock (flips the system)
-
“Hickory, Dickory Dock, The Mouse Ran up the Clock [computer], the clock
struck one [time for system rotation], The Mouse ran down, Hickory
Dickory Dock.” “INTO THE MOUTH [vortex] RUNS THE MOUSE, AND FLIPS THE
HOUSE [turns the system over).
-
Froggy Went a Courtin’ He did Ride
-
Hickory, Dickory Dock
-
I had a little pony
-
I’m in Love With a Big Blue Frog
-
Jack and Jill
-
Mary Had a Little Lamb (call to ritual connotation)
-
Tones of “Mary had a little Iamb” or other telephone created tones, such
as high pitched noises to call people to meetings.
-
Mary Mary Quite Contrary (reminds the slave that abusers are all-seeing)
-
Old King Cole (Old King Cole was a merry old soul, ... he’d call for his
masters 3 [the 3 programmers])
-
Peter, Peter Pumpkin Eater
-
Puss in Boots (this story is porn programming)
-
Ring Around the Rosy
-
Ten Little Monkeys Jumping on the Bed
-
Three Blind Mice (omega programming connotation with hour glass)
-
Twinkle, Twinkle Little Star (Sometimes associated with “I’m dead.”)
SONGS (Most of the Beatles’ songs were used for programming. Charles
Manson was programmed with Beatles’ music. The programmers know ahead of
time what are going to be the next hits, and they regularly call in
slaves and hypnotically make the lyrics to be cues for the slaves before
the music comes out. For instance, the lyrics of “Ain’t that a Shame”
will make certain alters angry. For another slave the lyrics “Everything
is relative, in its own way” reminds the person of the cult family &
obedience.) --
-
Angie (popular song for programming)
-
A Mighty Fortress is Our God
-
Back in Black Blue Velvet
-
Butterfly
-
The Candyman Can (Candyman represents drug use for Monarchs, plus other
things.)
-
CHRISTMAS CAROLS (Christmas carols were used a lot on Monarchs.)
-
Country Roads song with the programmed meaning take me [the slave]
“home” to a meeting site.
-
Crazy (to reaffirm loyalty to the master)
-
Deja Vu
-
Die Walkure
-
Fire and Rain
-
Frere Jacques (Catholic “Father John”, sexual abuse connotation)
-
Get Me A Ticket on a Fast Train (substitute “master” for “baby” in song)
-
Grandma’s Feather Bed
-
Ghost Riders
-
Green Green Grass of Home (go home program, slave is not happy 'til they
go home to green fields
-
Greensleves
-
Hallelujah chorus (many Christian songs like this one are played while
the victim is tortured.)
-
Handel’s Messiah
-
Have Thine Own Way Lord (“thou art the potter, I am the clay, mold me &
make me...” III. Charismatic slave programming.)
-
Heartache Tonight (song used to announce a ritual over the radio)
-
Hotel California (sexual/ritual connotation, the song says, “go to the
chamber of the Master’s Feast, We are programmed to receive.” This song
also tells the story of how LaVey started the Church of Satan in 1966.)
-
I Surrender All
-
Imagine (John Lennon presents the New Age script for people to be
“nowhere people.”)
-
John Brown’s Body
-
Lucy In the Sky with Diamonds
-
Little Red Riding Hood (song played with hunts of slaves)
-
Mary was an only child (from Art Garfunkel’s Angel Claire album)
-
Moon River
-
Over the Rainbow (obvious Wizard of Oz programming)
-
“Playing with the Queen of Hearts, knowing that it really smarts, the
Joker is the only fool who’ll do anything with you” (reinforces the
warning not to play (tamper) with the programming. The Queen of Hearts
is the emergency Mayday signal to a handler. To play with this will
really smart-hurt.
-
National Anthem
-
No More Mr. Nice Guy
-
Revolution 9
-
Rivers of Dreams (by Billy Joel. words are about “walking in the dark,
going through a river.. .turn on the light on your internal world.”
-
Satin Sheets
-
She’s Leaving Home
-
Sins of the Fathers
-
Southern Nights (loyalty to the programs -- the leaves and trees)
-
Stairway to Heaven
-
Teddy Bear (Programmer, helpless teddy bear slave connotation)
-
Tennessee Waltz (handler is “forced” to prostitute slave)
-
The Blood Will Never Lose Its Power
-
Tom Dooley (suicide, “hang down your head Tom Dooley, hang down your
and...)
-
Victim of Love
-
“When you wish upon a star” song used for programming.
-
White Rabbit (Alice In Wonderland Theme -- made into a triggering
Karaoke CD.)
-
Wooden Heart
-
Yellow Submarine (drug connotation)
O. ZETA (snuff films)
Zeta is
the sixth letter, and it’s ancient meaning was a sacrifice.
P. SAMPLE CODES FOR ALTERS OF A HYPOTHETICAL SYSTEM NAMED MARY
These
codes are purely a representative model-not any particular real system.
The overall system code at times consists of [birthdate + programming
site codes + birth order + number of generations family was in the
Illuminati.] For our hypothetical system Mary we have the
hypothetical system code of: 6-13-51- 14 -02- 12. In order to
give the codes for a hypothetical alter system we will have to explain
some things as we go. The Programmers have for each slave both medical
programming files, and a grey or black binder with the programmed
access, trigger, codes & cues, & structure. A typical Illuminati system
will be a cube (although spheres and pyramids are also used). The
principle alters will be the “a” alters. A typical section of alters
will consist of a 13 x 13 grid of alters. These are alters who live in a
world together and must function together. A 13 x 13 section will have
13 families of “a” through “in” alters. The “a” alters will be the
primary alters that the Programmers will interact with.
The Programmer
may call up an “a” alter and ask it to go get the “c” alter in its
family, rather than directly asking for it. This initial page of alter
codes will be the primary or “a” alters. If we are dealing with a 13 x
13 x 13 cube of alters, then the initial page has 13 “a” alters of each
section. Each of these alters will have an access code which will often
include the following components: AN ASSIGNED COLOR + AN ALPHA
NUMERIC CODE + A PERSONALIZED MAGICAL NAME. This will equal 1/3
their access code. These code words must be repeated three times to pull
the alter up. However, if an alter is trained well, and hears his
master’s voice, an alpha-numeric code can pull the alter up. For many of
the alters, the reversal of their access code puts them back to sleep.
This is an important point, because some alters would be dangerous to
leave in control of the body. The “a” alters are regular alters. Many of
them have been hypnotically age advanced to see themselves as teenagers
or adults. Sometimes “b” and “c” alters are also aged. The “d” through
“in” alters are generally left as they were split and most of them are
infantile, with little concept of how old they are.
The little ones will
be the ones who often remember the programming very well, and know
things about the system. The top alters will also sometimes receive
personal names from their handler. This is in addition to all their
codes. If the alter is responsive to its master, the personal name might
pull the alter up too. Do all of the alters get charted? There are
several groups of alters which get charted separate from the rest or
don’t get charted at all. Because of the competition and distrust
between the different programmers, they often place in secret back doors
into the person’s mind that only they know about. Worlds of secret
alters loyal and devoted to the programmer may be built into the system
and not appear on the regular charts. The core, and some of the primal
splits from the core will not appear on the regular grids. They will be
placed on a separate sheet, and their codes will be in some magical
language. The Illuminati commonly employs 20 magical languages, and
Hebrew, Latin and Greek are also often used for charting the core and
its primal splits.
Enochian is a good example of a magical language used
by the Illuminati. Some alters will be created solely by the slave in
order to cope with life. For instance, say the slave is travelling with
someone who is not a handler, but who is a dangerous person. This
dangerous person murders several people and forces the slave to help.
The slave is likely going to have front alters out, and they are simply
going to have to create new alters to meet the demands of the situation.
These alters made to deal with one-time emergency will just slip into
cracks in the system. Lots of odds and ends alters end up in the nooks
and crannies within a system just detached and floating.
The programmers
and the victim work hard at structuring and cleaning up things--but the
honest truth is that trauma-based mind-control is messy. Any time you
shatter someone’s mind into thousands of pieces with horrendous torture,
you have a shattered mess, in spite of the good fronts that the
programmers are able to construct. Some of the more elaborate access
methods are for alters that are not on the “a” chart. Hour glass alters
have entire sentence access codes. Deaf & blind alters need their
access code signed on their hands by moving their fingers up and down,
etc. End time alters may have access codes that may entail reading an
entire page. Reporting alters are often small children, that are hidden
in each section, and may require slaps to the face or jabs with a needle
to pull them up. Spinner kittens will be accessed via their mama cat,
who acts like a Madam in a “cat house”. The codes for this was given in
the Beta section codes.
The reader will be given the hypothetical codes
(which resemble closely the actual codes of an actual scenario) for our
hypothetical Mary. A Sample Chart of the “A” alters--these are the
primary alters-- has been prepared in the same fashion as it would
appear in the handler’s 3-ring binder.
Mary’s
Core Protector 1 will have a shutdown code of “REVERSAL 1 BEGINNING” and
the second Core Protector will have the shutdown code of “REVERSAL 2
CREATION”. Of course, these codes are said 3 times. The first three
alters on the far left section at the top of the chart are Silences who
can be woken up by singing. Also at least one of these, will wake up by
a kiss from the prince (programmer) to the third eye area. The first
alter can be shut down by “COSMOS 15 31 06 2BAB PINK”. One of the groups
of alters attached to one of these early alters is “MA.C3.10-53 Rejects
(7) 10-53”. To shut this alter(s) down just say the reverse of the
access code.
A mirror image of each of these alters exists too. The
mirror images can be pulled up via a three step process. The birth
memory in our example will be coded as A5 10 79. The spider torture
memories that are attached to these alters is A5 10 79. The reader will
notice the following on the hypothetical chart on the previous page for
the first Section (which is numbered 6 to be deceptive): This section is
front alters. Basic code pattern = color + Genesis + no.
[1 thru 13] + letter [a thru m]. Individual codes 1st section
general-”N.I.F.6”, 1st section mother Eve “EV.E5 10 51 ACE” (Eve is the
balancing point & the ace code is high or low). The alter Explorer is
“EI.G7”, Mammy “MI.H8”, Angel “Red, AI.19 Jack Genesis 4” (or it could
be done “red, AI.J10 Genesis 4”), George “Silver, GI.K11 ”, Zsa Zsa
“gold, ZI.L.12”, and Shadow “Clear SI.M13”.
You won’t find on the main
chart codes such as: Eve’s memory “EI.D5.2.1952 ACE” or the Infant
alters -- “1-000 10-49 REJECTS 3-9” The master may say for example:
“Green GENESIS 1-A” (3 times) to get this alter which is the balancing
point. Fragments/dead alters were dumped into areas named concentration
camps and given the names of the famous German concentration camps. The
camps were placed under the Mt. of Olives. Fire or Bomb children are
found throughout the system and are triggered to come up by programming.
They come up behind other alters and make them burn. Some of this level
can be woken up by saying, “It’s time to wake up in the morning” (7
times), which is in contrast with most codes which are said 3x.
Another
way to look at it, is that the alters are on 4 dimensional structure and
they require a 4-dimensional access code. Height, depth, width, and
color are the four dimensions. This breaks down for this 1st section as: COLOR (4th dimension)
+ Genesis (Section code) +1 (level) + “a” (depth). The
following message will be used on the phone for this System’s recording
machine, this example has been used nationally. “IF YOU WOULD LIKE TO
MAKE A CALL PLEASE HANG UP AND TRY YOUR CALL AGAIN. IF YOU NEED
ASSISTANCE, PLEASE DIAL YOUR OPERATOR. CODE 911.” This will cause
section 1 or section 2, etc. to call their master. Also, standard
Illuminati Hand signals work with Mary. “ALONE AND CRYING (3X)”- is a
code for a few special parts not on the first grid.
Section
2 gatekeeper alters. Basic code pattern color + Revelation +
no.[1 thru 13] + letter [a thru m] In our hypothetical
example: “ORANGE REVELATION 4-A” (3X) However a shortcut is “REVELATION
4” and the primary Revelation 4 alter will come up. “ORANGE REVELATION 4
B” would get a small child on the pedestal with Revelation 4a. At times
the handler will say “THE DECK IS DOUBLE-DECKED” in order to activate
the clone doubles of all alters in a particular area--such as the front
area of the system. The clones are tied to the Pink Room of the
dollhouse-looking computer. Since alters are also coded to cards, a
FLUSH will pull up an entire section. Special alters who skinned men
alive are kept in black holes in Section 2. They are special trauma
alters created solely by the victim as a safety measure.
Section 2
computer (like all levels) is empowered by an emerald blue light. This
power source was deactivated by unscrewing the light to the left (which
took it physically out so to speak) and then saying “PEACE BE STILL”
(3X). If “PEACE BE STILL” is not said three times then the War in the
heavens program kicks in. Also “DAD WEEPS OVER HIS CITY” must be said
when deactivating the computer otherwise the “children” (alters) become
sick and everything kicks back in--which it does eventually anyway if
the deeper computers are not deactivated or taken out. Section 3 has
programmer alters & fragment armies, not to be confused with the clones
which hide everywhere. The clones, by the way, can be identified with
serial no.s at base of head gear such as 151.00 [system birth date].
This sections has 3 faceless Programmers called the 3 adepts of
Atlantis. Each of them has a different color of hair. They may also be
the commanders of armies--the commanders of the Egyptian armies have
names Ra, Horus, and Set. Section 4 alters are Entertainment alters.
Basic code pattern = Color + double number + a name of a
one of the 13 tribes of Israel + the number of the alter again
(3x)
Example: BLUE 2001-13A REUBEN 1 (3X) However, the color doesn’t always
need to be said it is a sufficient shortcut to call the alphanumeric
code three times. Second example 2002-12A SIMEON 1 (3X). The numbers of
the 2000 code go up while the corresponding number 13 to 1 go down. In
other words it is a double code. The Tribal names are arranged according
to their Biblical birth order.
Mother
Kitten 8,10 and 12 have ten spinner kittens underneath each of them. To
get a spinner kitten, one gets the mother kitten and then has her in the
proper position which is the over-the-rainbow mode. The choice of what
spin kitten to get is “WE GOTTA GET DRESSED ... IN 3 MINUTES.” 3 minutes
means spinner no. 3. Specific instructions such as “PURR FOR ME KITTEN”
gives the abuser fellatio. Tweedle Dee & Tweedle Dum is a S&M program.
“5 FIDDLE” and “FOLLOW THE YELLOW BRICK ROAD” are important for the
slave to follow instructions. The alters will be sent to never-never
land where what they do is unreal. Some kitten alters are keyed to pop
out if certain areas of the body are touched, such as the space beside
the big toe, or the thighs. A handler will also have standard hand
signals for things, such as putting his hands on his thighs to mean
“Come here and take care of me, Kitten.” “COME KITTEN, TO PAPA COME”
“BLUE TOPAZ” serves as 4 keys. Pisces is associated with Blue Topaz.
There are also 4 keys which are: silver shoes, sun bright, birds
singing, and yellow road. Section 2 & 1. Reprogramming sections. At this
point, the computer codes given previously apply, SEE OMEGA CODES on
previous pages. The first major computer services the top 6 sections and
has a red room, a closet, a pink room, as well as other rooms. Actually
the computer should be set in at Section 0, which would break up the
grid evenly, but since our Mary is hypothetical we put the front main
computer at section 1. A system like this will have 13 computers/1 per
section and 5 computers which set between pairs of sections, which join
a pair of sections together, and then 2 main computers. This means a
System like Mary’s will have 20 internal computers. With all the codes
and a fair understanding of the alters in a section, it is a good day’s
work to shut down a computer. Before one could possibly get all the
section computers shut off, they would reprogram (reboot) themselves
back up.
Computer erasure codes include: “FULL HOUSE ACES HIGH. ALL
TRUMP. FULL HOUSE ACES LOW.” The drawers in the dollhouse can be pulled
out with “ROYAL FLUSH”(3X). Another code is “PINK SECTION 5. FULL HOUSE.
ACES HIGH. 2 DEEP.” A partial code to a computer is “ ...... 8-9 RED.”
Our hypothetical Mary might be accessed by a woman who taps on the
shoulder and says, “PHOENIX 360 [tel. area code], OUT OF ORDER”. The
library alter has an important access ring. A “Button Bright” alter type
works with the librarian. The dwarfs are accessed by “ISOLATION +
no.” Judges which sit on the council give warnings to alters “CAT EYE AT
THE DOOR.” This reflects the programmers’ control. The judges have the
“Keys to the Kingdom.” “MR POSTMAN WAIT AND SEE” indicates a message
from the master. Ribbon alters have the names of archangels. Silver
cords are attached to the ribbons.
Section 0. Mothers of Darkness
alters. basic code pattern = SILVER + LEHTEB [which is bethel or
house of God spelled backwards] + [who knows what else] +
a blue topaz ring being turned on the master’s finger a certain way.
Green is a sensitive color for this System. Some alters may be accessed
from certain areas in the System via 4 tones, and others by pin pricks
at certain locations in the body, along with their verbal code. The
Reporting alter can be accessed by repeated slaps across the face. There
is Ultra Green Section tied to the Cabala (Green tree). The Library in
the big castle, which is guarded by lions and other big cats, has a
passage way in it to a second world. Codes with the Cabalistic Tree of
Life involve Cabalistic magic and its symbols. This section is guarded
by a hostile entity. Certain rings, topaz, quartz, diamond, ruby, black
onyx etc. are used for triggers. Certain rings are needed to get into
certain parts of a System, such as the castle. To access the Mothers,
the Black Onyx ring must be rotated. The programming of a ring may go
something like this, “This ring fills Daddy’s house with stars.. .Catch
a falling star, put it in your pocket.”
Section
9. Delta-Beta alters. Kept in a genie bottle. Obviously something is
rubbed to get them out. “BUTTON BUTTON, WHO’S GOT THE BUTTON, BUT ITS
THE KISS OF DEATH” this code is involved with the “good witch” who
kisses upon the forehead. Buttons are on the boxes of Programmer Green
and are constructed onto the boxes so they can be used to open the boxes
up.
Section
7. This hypothetical system also has a series of codes based on
gems--ruby, diamond, etc. which have numbers attached to the codes. An
Hour glass w/ 12 disciples like grains of sand tied to Jolly Green Giant
programming which have sentence access codes. Each sentence is a phrase
of satanic philosophy. The bottom level is called the Hell Pit and
contains the City of Petra. The City of Petra has an erasure code.
“YELLOW - CUTTER ROOM 7 SECTION 7---ROYAL FLUSH--LA CUTTER EGGS”
Invisible field section 7. Room 7 --cards has eggs with demons.
Lacutters are like imps and are invisible. They are assigned to guard
various things in the system including the cutting programs. “Dad”
“Catch a falling star”.
Main
computer protected by deaf and dumb alter using a sign language equation
as its access code and the reversal of its access code is its shut down
code. The Brack Master is a Master Programmer.
Each of
the 13 sections of 169 alters (a section is a 13 x 13 grid of alters)
will then have a computer assigned to it. The computer is made up of
dissociated parts of the mind--which are like alters, but have not been
given histories or names. Each section has a computer which makes 13
section computers. Section 1 and section 7 (see the grid chart) are main computers.
The first is the main computer for the top half, and the second is the
main computer for the bottom half of the System. The second main
computer is in the hell pit, and has been put in at the lowest level of
the mind. Section 6&5 computers are connected by a connecting computer,
as well as 4&3, 2&1, 0&12, 10&9. This makes 5 connecting computers. In
total then we have 13 section computers, 2 main computers, and 5
connecting computers, for a subtotal of 20 computers. Since things are
being built on the basis of the magical number 13, six more computers
are installed which are decoy or false computers for therapists to work
on.
This makes a total of 26 computers (or 2x13). Since there are 26
letters of the alphabet, this lends itself well, and each computer is
assigned a letter of the alphabet. Since the computers are put into the
slave when it is a young child, the child has just learned how to count
and say the alphabet. The Illuminati has been using a large dollhouse
with 26 rooms using 13 colors of paint, giving two rooms per color. Each
room is a computer. In accord with the practice of double coding, each
letter of the alphabet is given its sequence number, so the names for
the computers are A1, B2, C3, D4, E5, F6, G7, H8, I9, J10, K11, L12,
M13--the thirteenth is assigned the 1st main computer. N1, O2, P3, Q4,
R5, S6, T7, U8, V9, W10, X11, Y12, Z13. Rather, than use the number 13,
the number 0 will be assigned, thus changing things to M0, and Z0.
This
is simple enough for a child’s learning mind, but difficult enough that
it serves as a viable code. As codes are assigned, the bottom of the
alphabet is assigned the top (front side) of the system. The middle
point MO, is the normal access point for all the computers for the
handler. The code for this is associated with the name of an airplane
hanger, so that the concept of taking off into the sky (trancing can be
associated with it.) Each computer needs an access code to go along with
its alpha-numeric name. A deck of cards lends itself well to a code of
13. Bear in mind each computer has a color assigned to it. Colored
scarfs and dollhouse rooms were used with electroshock to teach the
child his color coding.
When the programming is going on trance depths
and runways (mental image for flying off into a trance) and the structure
of the System will all be tied together in one neat package. Everything
is built on its own x-y axis. Each 13x13 grid has the middle rows both
vertically and horizontally set up as runways. The x-y axis also makes
up the hourglass lines or the butterfly wings. Both images are used with
slaves. Because thing are set up in thirteen's in Mary’s system, and
things are double coded, thirteen becomes 13-1 and one is 1-13. This
allows us also to link 13-1 and 1-13, so that everything becomes a
circle. The circle within a circle, box within a box concept, triangle
within a triangle situations makes the slave feel he is trapped in an
infinity loop of programming that has no end and no beginning. 13 and 1
make 14. An entire deck of cards can be used in a double code that also
adds to 14, such as the 8 of spades and the 6 of diamonds, or the Ace of
spades and the King of Diamonds. Here then is the codes for Mary’s
computers.
Two cards from opposite suits that add to 14. Since a deck of
regular playing cards came originally from Tarot cards, the playing card
used as a code also carry some occult significance to the codes. It is
also training the child who is programmed this way to be interested in
cards. And every time the child plays cards they will reinforce at an
unconscious level their computer coding. The computers will then have
programs set in on 13 x 13 quadrants. Quadrant 6.6 will have a program
such hopelessness. Other quadrants may hold aloneness, recycling, cold,
heat, burning, cutting oneself, pulsating loud heart beat, and hundreds
of other programs. These programs have the type of codes assigned them
that are given in the Universal Function Codes. Many of the functions
can receive a standard code, but other items require individual codes.
Telephone tones are frequently used to be able to key in (that is access
or trigger) parts of the computer program matrix. Dominoes also are used
for the computer programming. The dominoes are put in so that the
programmers can get a dominoe effect, if they want to set off a series
of programs.
Dominoes and flashing sequences of lights were used to
train the child to automatically respond to a certain pattern of dots.
Our hypothetical Mary will also have hundreds of other codes for all
kinds of miscellaneous things such as the following random codes: “RUBY
RED LIPS” “TO HAVE POWER” AND “TO BE THE POWER”, which are also found in
the Tall Book of Make Believe in the Shut Eye Town. Dominoes help
with the code: “2-4-6-8 WHO DO YOU APPRECIATE?”. More examples are, “I
LOVE DADDY.” “JACK BE NIMBLE JACK BE QUICK 13-1 12-2...” “PUMPKIN
HEAD--an access code. To go away- “Ta RA RA BOOM-DE-AYE”, ”CRYING OVER
YOU (3X)”, “SILKEN GIRDLE”-- a golden caterpillar plays a bittersweet
tune. A gold pocket watch with Roman numerals is associated with the
words “Eagle on it.” When Mary gets scared and begins to get into
revolving switching, sometimes spinning can be slow down by saying,
“10--YOU ARE SLOWING DOWN 9--YOU ARE SLOWING DOWN 8--YOU ARE GETTING
SLOWER AND SLOWER...”
A system’s coding is a reflection of their
programmer. If the programmer is a pilot which many of them are, then
they may have pilot lingo in their codes, such as the system may be
turned by pitch & degrees. If the programmer is a sailor the system may
have nautical codes, such as “RED RETURN RUNNING’’ , ‘‘SAFE
HARBOR’’ (for ‘‘Home’’), and DOWN RIVER (away from “Papa”).
Q. Catholic
Programming (by Jesuits etc.)
KEYS TO
THE KINGDOM = world domination by mind control. VOW OF SILENCE is a keep
quiet program activated by “THE WALLS HAVE EARS & THE PLANTS HAVE EYES
SO YOUR SILENCE IS TANTAMOUNT TO SUCCESS.” This is explained to the
victim that the sea shells and the plants have the ability to hear, and
that a sensitive occultist (programmer) can psychically pick up what the
plants and sea shells hear. “MAINTAIN IT” --is a command to maintain the
Vow of Silence “MAINTAIN IT & LISTEN.”-- a command to keep silent and
listen to a command.
“ENTER
INTER INNER DIMENSION TWO” - this is a standard Jesuit infinity program
(2 is a sacred voodoo no.)
R.
Mensa Programming (by MENSA)
“17 21
13 46” is an Illuminati code meaning a MENSA layer
Sample Mensa codes:
“727
+ E=MC SQUARED + 3.141 5962 + PI”
“A+B=C,
B+C=A, C+A= B” “TIC TAC TOE + C CROSS, PI CROSS”
The
MENSA codes are sequences of 6 numbers.
S.
HAND SIGNALS
misc. common signals
-
Finger to forehead--
-
One ring finger bent at 90° -- access wave Rotated pencil--with certain
words--rotates the system
-
Finger swung the counterclockwise way closes portals.
-
Right Fist to forehead -- OBEY
-
Fist with right hand cupping left hand, the left is like the letter c,
and the thumb is outward and the fist inside, the left hand then moves 3
times over the knuckle -- access signal
-
Left hand of slave laid on top of handler’s hand - sign of submission
-
Hands behind back of head -- I’m master
-
Right Hand with thumb & index finger making an L shape on chin/check
-
Hands on inside of thighs by handler -- come to me Kitten and service
me.
-
Hands locked folded interwoven backward -- you can’t break “the circle”
-
Handshake with index and middle finger held straight out -- ”You are one
of us.”
-
Grip called the lion’s paw -- access greeting opening and closing the
hands or large circles with index finger opens portals. Palms rubbed
together counterclockwise
-
Kiss on center of head -- kiss of submission of slave to handler
-
Palm of hand touched -- sexual access point for some models
-
Sign of Satan -- Hail Satan! used for Monarch & Illuminati
Mind-controlled slaves as an induction. The alter who is holding the
body goes into trance, & a deeper one replaces it.
-
Thumb twiddle -- rotating the thumbs around with the two hands clasp --
S&M
-
Touch of center of forehead -- access point
-
Vulcan Peace Sign -- llluminati/occult greeting Wave with Finger and
thumb together - other digits extended
-
Winks at the system were used to convey meaning.
---
LIFE “OVER THE RAINBOW” ---
After indexing & rereading this book,
the co-authors realized that we had not explained “over the rainbow.”
Some alters live “over the rainbow” and some do not. Both types will use
the term “over the rainbow”, but with different meanings attached. For
those who live “over the rainbow”, they serve their masters in such a
deep hypnotic trance that they perceive reality like it’s a dream. When
their memories surface they are so unlike normal memories that a system
in therapy may not know what to do with them. They have been described
as similar to the pictures in the old T.V.s when the vertical hold would
go out of control. Deeper alters, who live “over the rainbow” experience
memories/life in the following fashion: faces & porn cameras are
airbrushed out of their memory, distinctive marks in the perpetrators
such as scars & wrinkles are airbrushed out, colors & lights are very
bright due to the total dilation of the pupils while in deep trance, and
there is no sense of time for these alters. These alters are trained to
“TRANCE SEND FORWARD THROUGH TIME”. By understanding the programming,
the codes, & triggers, those alters who lived “over the rainbow” can
recover from the mind the full memory, without the distortions created
by dissociation.
T.
PARTIALLY CORRECT PROGRAMMING SITE CODES
The
following site codes are not totally accurate. Also, the Intelligence
groups use that what are called Cryptonyms, which are two-letter
digraphs such as the "MK" of MK-ULTRA. The digraph can indicate a type
of operation or even a location. An operation may have CODES. The
following site codes are not totally accurate. Also, the Intelligence
groups use what are called Cryptonyms, which are two-letter digraphs
such as the “MK” of MK-ULTRA. The digraph can indicate a type of
operation or even a location. An operation may have its cryptonym
changed in the middle of its operation.
Programmer
|
Programming
Zone
|
Area/Code
|
Armstrong
|
63
|
94XCCD
|
Astor
|
36
|
Florida
59XCBB
|
Bournell-Hightower
|
19
|
|
Brown
|
30
|
59XBMN
|
Burcham
|
329
|
Texas
92XBMM
|
Gaston
|
61
|
Colorado 1XCDF
|
Haggin
|
743
|
Kentucky 47XB0
|
Harrick
|
263
|
Colorado Springs
|
Johnson
|
95
|
|
Manass
|
|
|
Mentor
|
21
|
Colorado 61XBXX
|
Nathan
|
56
|
New
Mexico
|
Owens
|
963
|
106XbJK
|
Pantu
|
71
|
Kansas
011XOEG
|
Patterson
|
117
|
Kansas
|
Savior
|
49
|
|
Major Strange
|
14
|
1Z440x72080020366
|
Strong
|
52
|
81XCBC
|
Suttenfuss
|
103
|
|
Colonel Taylor
|
16
|
Kentucky
|
Weir
|
561
|
Texas
33XBCB
|
G.
HYPNOSIS IN PROGRAMS, & OTHER USES
The
programmers will begin their programming by extreme torture. After a
certain amount of torture the victim is willing to say or believe
anything to stop the torture. At this point a thought will planted into
the victim’s mind. This thought will be linked to a false memory put in
via hypnosis or movies, or other method, and it will be linked to a
command put in by hypnosis etc. and the original thought, the command,
the false memory will be linked by a single emotion which will link them
all together. The result will something like this: it is two weeks
before Halloween (thought), I must get ready for Halloween rituals
(command) because I have always had a habit of going to Halloween
rituals (false memory). If I don’t I will have a heart attack and die
(memory of torture linked to thoughts). Programming is layered in. Layer
after layer of programming is put in. Each alter (personality) of the
victim is used as if it is a component of a large system. The result is
that no alter (personality) is the whole, but only a cog in a great
machine. Can a single cog rebel against the whole machine? It is very
difficult for a single component of thousands of components to rebel
against the abusers.
Alice
In Wonderland Programming--going down the tree, going through the
mirror, going underneath something or growing tall ALICE
IN WONDERLAND PROGRAMMING AS IT PERTAINS TO AN ALTER GOING DOWN IN
TRANCE FOR INTERNAL PROGRAMMING
The
internal programmers (and some other alters) have the ability to send
other alters into deep trances. One of the programs for doing this is
based on the Alice In Wonderland Theme and it was experienced like this
for a level 2 alter who managed to stay in communication with her
deprogrammer:
When
the alter went down in her mind she went down on the inside of the trunk
of a tree (like Alice In Wonderland). At the bottom she saw a
keyhole, a table, and on the table was love potion #9. She automatically
drank the love potion which shrinks her to a dot and then she goes
through the keyhole. So normally this process means she goes through the
keyhole. She managed to stay in contact with her deprogrammer during
this deep trance.
After the key hole she saw thousands of looking glass
mirrors. Everything got smaller as she went down the tree. She became a
dot. She drinks love potion no. 9 and comes back with it. A tree comes
and wraps itself around her and loves her. As she ascends (comes up in
trance) she stretches up and enlarges. In coming up out of trance she
gets stuck at level 8 due to some interference from deeper alters. She,
in accord with her programming, senses her Master’s love. (Normally she
would have simply tranced out, and another alter would have taken her
place and she would have no recollection of the entire process. The
alter has been programmed to have backup amnesia. Backup amnesia means
that one doesn’t remember that one lost time, one doesn’t remember that
one forgot, etc. In short it means you don’t remember that you don’t
remember.)
This is an example of hypnosis used internally by the
programming and the Programming alters to control other alters. The
deepening of the trance was given the imagery of Alice falling down the
tree. In the various stories used in programming, there is some part of
the story that can be used as the story line for trance induction,
these include:
-
Wizard of Oz -- going into the poppies,
-
Star Wars -- time warp, riding the light
-
Star Trek -- being beamed, replicators etc.
Hypnosis is used to anchor suggestions about sleep patterns, panic
programs, phobias, health healing programs and health problems programs,
pain control and pain programs, motivation programs, a suicide program
called “hypnosleep”, an insanity program, and countless other uses.
Hypnosis is used to steer a person’s mind in the direction that they
have been labeled. For instance, if they have been selected to become a
doctor, they will be programmed for success as a doctor. New patterns of
thought, feeling and behavior are inserted to build confidence in the
goals of the Illuminati. Positive experiences are used to help boost the
person’s feelings, and then the new messages are anchored “imagine these
messages taking root.
Your new messages are growing stronger and
stronger.” The Alice In Wonderland programming theme is used in
air-water programs and mirror programs which the Illuminati, the CIA,
NASA, the Jesuits and others like so well. The idea is that there exists
a mirror world which is a reversal. Along with it is attached the idea
that the slave can enter into a timeless dimension of time, or as some
refer to it “interdimensional time travel.” Later, the victim will be
further brought under the spell of this mirror programming by going to
locations around the nation, like the Magic Time Machine restaurants in
San Antonio and Dallas, TX where mirrors are placed on doors, ceilings,
walls, and restrooms of the establishment and programming themes are
part of the everything at these restaurants. The handler may tell the
slave, “LOSE YOURSELF IN THE INFINITY MIRRORS.” When hypnotically
programming in programs, the Programmers place in many types of images
and programs. Some examples would be having the concept of obedience
equal the fountain of youth.
The fountain of youth flows in the victim’s
mind unless they step out side of their orders. This can be linked to
the Shangri-la story, where a woman ages as soon as she leaves her place
in Shangri-la. Another example, is the hypnotic imagery involving the
formation of an island from a volcano. The story is turned into a
programming script to allow the System to be radically restructured.
This Volcano programming is a System’s turning program. A volcano erupts
from deep down, and lava pours into the sea. Mountains are pushing up
from deep in the mind. To survive people must cross from the old to the
new island on a bridge that naturally forms. Fire births the new
territory and destroys the old. The new mountains develop trees which
become safe places for the alters to roost upon.
HYPNOTICALLY BUILDING IN STRUCTURES
Later
in the book, the art of building structures internally in the mind of
the victim will be covered. However, since the process involves
hypnotism it would be appropriate to discuss briefly how hypnosis can
begin to work a tree structure into the mind of the child. First, the
programmer hypnotically suggests that his penis is a growing tree.
Later, the programmer might begin, “You know those big trees in the park
that look so big and straight and stretch way up toward the sky? Stand
up and be one of those trees. Stand up really straight and tall as tall
as you can be, and stretch your arms out toward the sky like branches on
that big oak tree.
Now those big trees have long, deep roots that keep
them from falling over. Feel your feet go down down through the floor,
just like roots on the big strong oak tree.”
Final
note: there is no way that this book could give every last song or story
that has been used for programming, nor was it the intention to do so.
We have wanted to point out the popular story lines used, although we
have missed some such as the Chronicles of Narnia and Little Red Riding
Hood (which is used in several ways along the lines of you think you’re
going to Papa’s, or Grandma’s house & you end up with a wolf).
Our list
left out many programming songs--all the Rolling Stone’s songs,
Alabama’s Old Flame, etc.
No comments:
Post a Comment