By Fritz Springmeier & Cisco Wheeler
http://educate-yourself.org/mc/illumformula4Bchap.shtml
H. HYPNOTIC INDUCTIONS
‘‘Kaleidoscope eyes’’ -- used in hypnotic induction
and spinning
“20, 19, 18, 17, 16, 15, 14, 13,...1”
For many slaves the sign of satan done with the fingers puts them into a
trance, and deeper alters come out.
“100, 91, 82, 73, 64, 55, 46, 37, 28, 19, 10, 1”
Touching the head in a particular fashion is done. ‘‘DEEPER
AND DEEPER AND DEEPER DEEPER AND DEEPER AND DEEPER, DOWN, DOWN, DOWN, INTO
THE DEEP, DARK VELVETY MIST, DEEPER AND DEEPER AND DEEPER.”
“YOU’RE BEAUTY WARMS MY EMBERS. SEE THEM GLOWING DEEP WITHIN
THE DARKNESS OF MY EYES... IGNITING INTO FLAME... BLACK FLAME.”
Seeing a Hand of Glory (severed left hand) will induct people
into Peter Pan programming. (Books describing the occult
use of the Hand of Glory in Ireland go back to 1830. It is an ancient practice.
Baring Gould’s book Curious Myths of the Middle Ages describes
the recipe for using the hand of glory as a gruesome lantern during the witchcraft
of the Middle Ages.)
“I AM THE SAND MAN, AND BLOW SAND IN YOUR EYES” said while simultaneously
moving the hand over the face to create the illusion of placing sand in the
eyes.
“3-2-1, 3-2-1, 2-1-1, 1-2, 1, You are now relaxed.”
Lights, in certain colors and sequences, have been used to trance alters
out, for instance a flashing red light may trance certain
alters out. Tunnels were used as a powerful hypnotic suggestion.
Bear in mind, that people induct when:
a. physically or mentally relaxed,
b. when their senses are overloaded or exposed to sense deprivation,
c. when their equilibrium is disturbed,
d. their motion is restricted or
e. their eyes are fixated on something.
I. JANUS-ALEX CALL BACKS (end-times)
Main link to a System’s programs to ALEX coded 44334223112. Scramble
code to ALEX is 34424313221. Individual code to ALEX = 55434232312. Link to
JANUS coded 3323432123. Report back- X441062F
Main JANUS tracking/reprogramming code-JAN US 9341 00569XXY99632 [x3]; its
back up code X44420-61F. (There is a Janis 2 computer at 666 Connecticut Ave.
Washington, D.C. Disinformation by the Network is that the PACER computer
equipment is called Janus/Janis).
Main AMBASSADOR code 67302986ZZ9861 (suicide/fire) sub codes- Fire 97643F4200L;
Cut 97642C42DIL L ; Suicide 9762354202L; towards violence 97613V4203L
Main EMPEROR - [dot, dot, dot] 79622109MM861 1
END-TIME ACTIVATION CODES
Most slaves have end-time programming. When a slave is called
in with end-time programming they have pages upon pages of coded messages.
A number of Monarch slaves have been de-programmed enough that they began
accessing and spewing out pages and pages of these activation codes. Part
of a sample of one of these is as follows:
“ISRAEL IS RISING
ACTIVATE 366 UNITED NATIONS
900 BLUE BIRD PILOTS RISE
NATIONS IN PLACE
RED CHINA CALL BACK
COUNT DOWN, ACTIVATE ALEX
3.7 LC
94
CIRCLE FARMS AROUND THE SQUARE
BRITISH SOLDIERS RISE
MOUNTAIN GOAT COME
EASTSIDE OF PEAK
39 ACTIVATE
52 ACTIVATE
42 ACTIVATE
RED CHINA RISE
1.7 ACTIVATE
THE HOUR COMES, A. C. SON
ACTIVATE AFRICA
ARISE IN NUMBERS OF 90...”
A team leader will have a down line of around 4 people--which are coded red
ray, yellow ray, green ray, blue ray. When the activation code hits a slave
team leader during the end times, they will in turn activate their people,
who in turn will have people who are team leaders and have a down line. At
least two false callback alarms will be sounded (tested) before the real one.
J. THETA (psychic warfare)
K. TINKERBELLE PROGRAMMING (never grow up/alien)
Capt’n or Cap’n (captain) represents the programmer in Peter
Pan programming. Tinkerbelle is a young alter created under Peter Pan programming.
‘TRANCE DIMENSIONAL TRAVEL RIGHT FROM YOUR OWN BACKYARD. THE DIMENSIONS
OF YOUR PYRAMID ARE TO BE 9 BYE 9 BYE 9 BYE.”
Alien programming by NWO (also involves Peter Pan programming)
“RIDE THE LIGHT” -Peter Pan programming meaning to go into hypnotic
induction attached to a light that is seen when given a high voltage shock.
This is given to make experiences seem like they occur in another dimension.
L. TWINNING (teams)
CROSS PROGRAMMING -- (for instance, a mother and a daughter team)
Two seals are placed on this cross programming, a “seal of cover”
and a “seal of rain”
Teams will be given code words for each alter who is part of a 2-System team.
One System may serve as a father figure to the other System. Teams will be
trauma and sexually bonded, as well as having mirror images with each others
names. A leader will have an upline and a downline for the colored rays. A
leader will call the different colored rays, to activate their programming.
An Illuminati team ritual to create oneness & open their team boxes up
to work together (Illuminati twinning ritual): the team kneels face to face,
draws a magical circle on the ground, joins Delta team hands forming a clasp
ring. (Blue is associated with this.) then they all say, “Star within
a star, Circle within a circle, Mind within a mind, body within a body, Soul
within a soul.” Then the team places Palm, their hands Palm to Palm,
and then speaks 4 times, “Bone to Bone, flesh to flesh, Spirit to Spirit,
Forever together - never apart.”
Then a 5 pointed star is traced in the air. To close the Delta team twinning
box, the reverse is done. Then other things are to be said in the joining
and opening ritual. A double deck of cards is used to program an Illuminati
team of “twins”. One type of Criss-cross programming involves
1. a flower, 2. the stem, & 3 the root. The root involves blood sacrifices.
This programming ties two generations together such as mother -[minus] daughter.
M. SOLEMETRIC MILITARY
N. SONGS & NURSERY RHYMES
Songs & Nursery Rhymes Used As Triggers (note all of these songs have
been used on other slaves too.) Songs with Monarch programming meaning &
access parts soliciting behavior or thinking include:
NURSERY RHYMES
Brahm’s Lullaby
Hickory, Dickory Dock (flips the system)
“Hickory, Dickory Dock, The Mouse Ran up the Clock [computer], the
clock struck one [time for system rotation], The Mouse ran down, Hickory Dickory
Dock.” “INTO THE MOUTH [vortex] RUNS THE MOUSE, AND FLIPS THE
HOUSE [turns the system over).
Froggy Went a Courtin’ He did Ride
Hickory, Dickory Dock
I had a little pony
I’m in Love With a Big Blue Frog
Jack and Jill
Mary Had a Little Lamb (call to ritual connotation)
Tones of “Mary had a little Iamb” or other telephone created
tones, such as high pitched noises to call people to meetings.
Mary Mary Quite Contrary (reminds the slave that abusers are all-seeing)
Old King Cole (Old King Cole was a merry old soul, ... he’d call for
his masters 3 [the 3 programmers])
Peter, Peter Pumpkin Eater
Puss in Boots (this story is porn programming)
Ring Around the Rosy
Ten Little Monkeys Jumping on the Bed
Three Blind Mice (omega programming connotation with hour glass)
Twinkle, Twinkle Little Star (Sometimes associated with “I’m
dead.”)
SONGS (Most of the Beatles’ songs were used for programming.
Charles Manson was programmed with Beatles’ music. The programmers know
ahead of time what are going to be the next hits, and they regularly call
in slaves and hypnotically make the lyrics to be cues for the slaves before
the music comes out. For instance, the lyrics of “Ain’t that a
Shame” will make certain alters angry. For another slave the lyrics
“Everything is relative, in its own way” reminds the person of
the cult family & obedience.) --
Angie (popular song for programming)
A Mighty Fortress is Our God
Back in Black Blue Velvet
Butterfly
The Candyman Can (Candyman represents drug use for Monarchs, plus other things.)
CHRISTMAS CAROLS (Christmas carols were used a lot on Monarchs.)
Country Roads song with the programmed meaning take me [the slave] “home”
to a meeting site.
Crazy (to reaffirm loyalty to the master)
Deja Vu
Die Walkure
Fire and Rain
Frere Jacques (Catholic “Father John”, sexual abuse connotation)
Get Me A Ticket on a Fast Train (substitute “master” for “baby”
in song)
Grandma’s Feather Bed
Ghost Riders
Green Green Grass of Home (go home program, slave is not happy 'til they go
home to green fields
Greensleves
Hallelujah chorus (many Christian songs like this one are played while the
victim is tortured.)
Handel’s Messiah
Have Thine Own Way Lord (“thou art the potter, I am the clay, mold me
& make me...” III. Charismatic slave programming.)
Heartache Tonight (song used to announce a ritual over the radio)
Hotel California (sexual/ritual connotation, the song says, “go to the
chamber of the Master’s Feast, We are programmed to receive.”
This song also tells the story of how LaVey started the Church of Satan in
1966.)
I Surrender All
Imagine (John Lennon presents the New Age script for people to be “nowhere
people.”)
John Brown’s Body
Lucy In the Sky with Diamonds
Little Red Riding Hood (song played with hunts of slaves)
Mary was an only child (from Art Garfunkel’s Angel Claire album)
Moon River
Over the Rainbow (obvious Wizard of Oz programming)
“Playing with the Queen of Hearts, knowing that it really smarts, the
Joker is the only fool who’ll do anything with you” (reinforces
the warning not to play (tamper) with the programming. The Queen of Hearts
is the emergency Mayday signal to a handler. To play with this will really
smart-hurt.
National Anthem
No More Mr. Nice Guy
Revolution 9
Rivers of Dreams (by Billy Joel. words are about “walking in the dark,
going through a river.. .turn on the light on your internal world.”
Satin Sheets
She’s Leaving Home
Sins of the Fathers
Southern Nights (loyalty to the programs -- the leaves and trees)
Stairway to Heaven
Teddy Bear (Programmer, helpless teddy bear slave connotation)
Tennessee Waltz (handler is “forced” to prostitute slave)
The Blood Will Never Lose Its Power
Tom Dooley (suicide, “hang down your head Tom Dooley, hang down your
and...)
Victim of Love
“When you wish upon a star” song used for programming.
White Rabbit (Alice In Wonderland Theme -- made into a triggering Karaoke
CD.)
Wooden Heart
Yellow Submarine (drug connotation)
O. ZETA (snuff films)
Zeta is the sixth letter, and it’s ancient meaning was a sacrifice.
P. SAMPLE CODES FOR ALTERS OF A HYPOTHETICAL SYSTEM NAMED
MARY
These codes are purely a representative model-not any particular real system.
The overall system code at times consists of [birthdate + programming site
codes + birth order + number of generations family was in the Illuminati.]
For our hypothetical system Mary we have the hypothetical system code of:
6-13-51- 14 -02- 12. In order to give the codes for a hypothetical alter system
we will have to explain some things as we go. The Programmers have for each
slave both medical programming files, and a grey or black binder with the
programmed access, trigger, codes & cues, & structure.
A typical Illuminati system will be a cube (although spheres and pyramids
are also used). The principle alters will be the “a” alters. A
typical section of alters will consist of a 13 x 13 grid of alters. These
are alters who live in a world together and must function together. A 13 x
13 section will have 13 families of “a” through “in”
alters. The “a” alters will be the primary alters that the Programmers
will interact with. The Programmer may call up an “a” alter and
ask it to go get the “c” alter in its family, rather than directly
asking for it. This initial page of alter codes will be the primary or “a”
alters. If we are dealing with a 13 x 13 x 13 cube of alters, then the initial
page has 13 “a” alters of each section. Each of these alters will
have an access code which will often include the following components: AN
ASSIGNED COLOR + AN ALPHA NUMERIC CODE + A PERSONALIZED MAGICAL NAME. This
will equal 1/3 their access code.
These code words must be repeated three times to pull the alter up. However,
if an alter is trained well, and hears his master’s voice, an alpha-numeric
code can pull the alter up. For many of the alters, the reversal of
their access code puts them back to sleep. This is an important point,
because some alters would be dangerous to leave in control of the body. The
“a” alters are regular alters. Many of them have been hypnotically
age advanced to see themselves as teenagers or adults. Sometimes “b”
and “c” alters are also aged. The “d” through “in”
alters are generally left as they were split and most of them are infantile,
with little concept of how old they are. The little ones will be the ones
who often remember the programming very well, and know things about the system.
The top alters will also sometimes receive personal names from their handler.
This is in addition to all their codes. If the alter is responsive to its
master, the personal name might pull the alter up too.
Do all of the alters get charted? There are several groups of alters which
get charted separate from the rest or don’t get charted at all. Because
of the competition and distrust between the different programmers, they often
place in secret back doors into the person’s mind that only they know
about. Worlds of secret alters loyal and devoted to the programmer may be
built into the system and not appear on the regular charts. The core, and
some of the primal splits from the core will not appear on the regular grids.
They will be placed on a separate sheet, and their codes will be in some magical
language. The Illuminati commonly employs 20 magical languages, and Hebrew,
Latin and Greek are also often used for charting the core and its primal splits.
Enochian is a good example of a magical language used by the Illuminati.
Some alters will be created solely by the slave in order to cope with life.
For instance, say the slave is travelling with someone who is not a handler,
but who is a dangerous person. This dangerous person murders several people
and forces the slave to help. The slave is likely going to have front alters
out, and they are simply going to have to create new alters to meet the demands
of the situation.
These alters made to deal with one-time emergency will just slip into cracks
in the system. Lots of odds and ends alters end up in the nooks and crannies
within a system just detached and floating. The programmers and the victim
work hard at structuring and cleaning up things--but the honest truth is that
trauma-based mind-control is messy. Any time you shatter someone’s mind
into thousands of pieces with horrendous torture, you have a shattered mess,
in spite of the good fronts that the programmers are able to construct. Some
of the more elaborate access methods are for alters that are not on the “a”
chart. Hour glass alters have entire sentence access codes.
Deaf & blind alters need their access code signed on their hands by moving
their fingers up and down, etc.
End time alters may have access codes that may entail reading
an entire page. Reporting alters are often small children, that are hidden
in each section, and may require slaps to the face or jabs with a needle to
pull them up. Spinner kittens will be accessed via their mama cat, who acts
like a Madam in a “cat house”. The codes for this was given in
the Beta section codes. The reader will be given the hypothetical codes (which
resemble closely the actual codes of an actual scenario) for our hypothetical
Mary. A Sample Chart of the “A” alters--these are the primary
alters-- has been prepared in the same fashion as it would appear in the handler’s
3-ring binder.
To view this Sample Chart
Mary’s Core Protector 1 will have a shutdown code of “REVERSAL
1 BEGINNING” and the second Core Protector will have the shutdown code
of “REVERSAL 2 CREATION”. Of course, these codes are said
3 times. The first three alters on the far left section at the top
of the chart are Silences who can be woken up by singing. Also at least one
of these, will wake up by a kiss from the prince (programmer) to the third
eye area. The first alter can be shut down by “COSMOS 15 31 06 2BAB
PINK”. One of the groups of alters attached to one of these early alters
is “MA.C3.10-53 Rejects (7) 10-53”. To shut this alter(s) down
just say the reverse of the access code. A mirror image of each of these alters
exists too. The mirror images can be pulled up via a three step process. The
birth memory in our example will be coded as A5 10 79.
The spider torture memories that are attached to these alters is A5 10 79.
The reader will notice the following on the hypothetical chart on the previous
page for the first Section (which is numbered 6 to be deceptive): This section
is front alters. Basic code pattern = color + Genesis + no. [1 thru 13] +
letter [a thru m]. Individual codes 1st section general-”N.I.F.6”,
1st section mother Eve “EV.E5 10 51 ACE” (Eve is the balancing
point & the ace code is high or low). The alter Explorer is “EI.G7”,
Mammy “MI.H8”, Angel “Red, AI.19 Jack Genesis 4” (or
it could be done “red, AI.J10 Genesis 4”), George “Silver,
GI.K11 ”, Zsa Zsa “gold, ZI.L.12”, and Shadow “Clear
SI.M13”. You won’t find on the main chart codes such as: Eve’s
memory “EI.D5.2.1952 ACE” or the Infant alters -- “1-000
10-49 REJECTS 3-9” The master may say for example: “Green GENESIS
1-A” (3 times) to get this alter which is the balancing point.
Fragments/dead alters were dumped into areas named concentration camps and
given the names of the famous German concentration camps. The camps were placed
under the Mt. of Olives. Fire or Bomb children are found throughout the system
and are triggered to come up by programming. They come up behind other alters
and make them burn. Some of this level can be woken up by saying, “It’s
time to wake up in the morning” (7 times), which is in contrast with
most codes which are said 3x. Another way to look at it, is that the alters
are on 4 dimensional structure and they require a 4-dimensional access code.
Height, depth, width, and color are the four dimensions.
This breaks down for this 1st section as: COLOR (4th dimension) + Genesis
(Section code) +1 (level) + “a” (depth). The following message
will be used on the phone for this System’s recording machine, this
example has been used nationally. “IF YOU WOULD LIKE TO MAKE A CALL
PLEASE HANG UP AND TRY YOUR CALL AGAIN. IF YOU NEED ASSISTANCE, PLEASE DIAL
YOUR OPERATOR. CODE 911.” This will cause section 1 or section 2, etc.
to call their master. Also, standard Illuminati Hand signals work with Mary.
“ALONE AND CRYING (3X)”- is a code for a few special parts not
on the first grid.
Section 2 gatekeeper alters. Basic code pattern color + Revelation + no.[1
thru 13] + letter [a thru m] In our hypothetical example: “ORANGE REVELATION
4-A” (3X) However a shortcut is “REVELATION 4” and the primary
Revelation 4 alter will come up. “ORANGE REVELATION 4 B” would
get a small child on the pedestal with Revelation 4a. At times the handler
will say “THE DECK IS DOUBLE-DECKED” in order to activate the
clone doubles of all alters in a particular area--such as the front area of
the system. The clones are tied to the Pink Room of the dollhouse-looking
computer. Since alters are also coded to cards, a FLUSH will pull up an entire
section. Special alters who skinned men alive are kept in black holes in Section
2. They are special trauma alters created solely by the victim as a safety
measure.
Section 2 computer (like all levels) is empowered by an emerald blue light.
This power source was deactivated by unscrewing the light to the left (which
took it physically out so to speak) and then saying “PEACE BE STILL”
(3X). If “PEACE BE STILL” is not said three times then the War
in the heavens program kicks in. Also “DAD WEEPS OVER HIS CITY”
must be said when deactivating the computer otherwise the “children”
(alters) become sick and everything kicks back in--which it does eventually
anyway if the deeper computers are not deactivated or taken out. Section 3
has programmer alters & fragment armies, not to be confused with the clones
which hide everywhere. The clones, by the way, can be identified with serial
no.s at base of head gear such as 151.00 [system birth date]. This sections
has 3 faceless Programmers called the 3 adepts of Atlantis. Each of them has
a different color of hair. They may also be the commanders of armies--the
commanders of the Egyptian armies have names Ra, Horus, and Set. Section 4
alters are Entertainment alters. Basic code pattern = Color + double number
+ a name of a one of the 13 tribes of Israel + the number of the alter again
(3x)
Example: BLUE 2001-13A REUBEN 1 (3X) However, the color doesn’t always
need to be said it is a sufficient shortcut to call the alphanumeric code
three times. Second example 2002-12A SIMEON 1 (3X). The numbers of the 2000
code go up while the corresponding number 13 to 1 go down. In other words
it is a double code. The Tribal names are arranged according to their Biblical
birth order.
Mother Kitten 8,10 and 12 have ten spinner kittens underneath each of them.
To get a spinner kitten, one gets the mother kitten and then has her in the
proper position which is the over-the-rainbow mode. The choice of what spin
kitten to get is “WE GOTTA GET DRESSED ... IN 3 MINUTES.” 3 minutes
means spinner no. 3. Specific instructions such as “PURR FOR ME KITTEN”
gives the abuser fellatio. Tweedle Dee & Tweedle Dum is a S&M program.
“5 FIDDLE” and “FOLLOW THE YELLOW BRICK ROAD” are
important for the slave to follow instructions. The alters will be sent to
never-never land where what they do is unreal. Some kitten alters are keyed
to pop out if certain areas of the body are touched, such as the space beside
the big toe, or the thighs. A handler will also have standard hand signals
for things, such as putting his hands on his thighs to mean “Come here
and take care of me, Kitten.” “COME KITTEN, TO PAPA COME”
“BLUE TOPAZ” serves as 4 keys. Pisces is associated with Blue
Topaz. There are also 4 keys which are: silver shoes, sun bright, birds singing,
and yellow road. Section 2 & 1.
Reprogramming sections. At this point, the computer codes given previously
apply, SEE OMEGA CODES on previous pages. The first major computer services
the top 6 sections and has a red room, a closet, a pink room, as well as other
rooms. Actually the computer should be set in at Section 0, which would break
up the grid evenly, but since our Mary is hypothetical we put the front main
computer at section 1. A system like this will have 13 computers/1 per section
and 5 computers which set between pairs of sections, which join a pair of
sections together, and then 2 main computers. This means a System like Mary’s
will have 20 internal computers. With all the codes and a fair understanding
of the alters in a section, it is a good day’s work to shut down a computer.
Before one could possibly get all the section computers shut off, they would
reprogram (reboot) themselves back up. Computer erasure codes include: “FULL
HOUSE ACES HIGH. ALL TRUMP. FULL HOUSE ACES LOW.”
The drawers in the dollhouse can be pulled out with “ROYAL FLUSH”(3X).
Another code is “PINK SECTION 5. FULL HOUSE. ACES HIGH. 2 DEEP.”
A partial code to a computer is “ ...... 8-9 RED.” Our hypothetical
Mary might be accessed by a woman who taps on the shoulder and says, “PHOENIX
360 [tel. area code], OUT OF ORDER”. The library alter has an important
access ring. A “Button Bright” alter type works with the librarian.
The dwarfs are accessed by “ISOLATION + no.” Judges which sit
on the council give warnings to alters “CAT EYE AT THE DOOR.”
This reflects the programmers’ control. The judges have the “Keys
to the Kingdom.” “MR POSTMAN WAIT AND SEE” indicates a message
from the master. Ribbon alters have the names of archangels. Silver cords
are attached to the ribbons.
Section 0. Mothers of Darkness alters. basic code pattern = SILVER + LEHTEB
[which is bethel or house of God spelled backwards] + [who knows what else]
+ a blue topaz ring being turned on the master’s finger a certain way.
Green is a sensitive color for this System. Some alters may be accessed from
certain areas in the System via 4 tones, and others by pin pricks at certain
locations in the body, along with their verbal code. The Reporting alter can
be accessed by repeated slaps across the face. There is Ultra Green Section
tied to the Cabala (Green tree). The Library in the big castle, which is guarded
by lions and other big cats, has a passage way in it to a second world. Codes
with the Cabalistic Tree of Life involve Cabalistic magic and its symbols.
This section is guarded by a hostile entity. Certain rings, topaz, quartz,
diamond, ruby, black onyx etc. are used for triggers. Certain rings are needed
to get into certain parts of a System, such as the castle. To access the Mothers,
the Black Onyx ring must be rotated. The programming of a ring may go something
like this, “This ring fills Daddy’s house with stars.. .Catch
a falling star, put it in your pocket.”
Section 9. Delta-Beta alters. Kept in a genie bottle. Obviously something
is rubbed to get them out. “BUTTON BUTTON, WHO’S GOT THE BUTTON,
BUT ITS THE KISS OF DEATH” this code is involved with the “good
witch” who kisses upon the forehead. Buttons are on the boxes of Programmer
Green and are constructed onto the boxes so they can be used to open the boxes
up.
Section 7. This hypothetical system also has a series of codes based on gems--ruby,
diamond, etc. which have numbers attached to the codes. An Hour glass w/ 12
disciples like grains of sand tied to Jolly Green Giant programming
which have sentence access codes. Each sentence is a phrase of satanic philosophy.
The bottom level is called the Hell Pit and contains the City of Petra. The
City of Petra has an erasure code. “YELLOW - CUTTER ROOM 7 SECTION 7---ROYAL
FLUSH--LA CUTTER EGGS” Invisible field section 7. Room 7 --cards has
eggs with demons. Lacutters are like imps and are invisible. They are assigned
to guard various things in the system including the cutting programs. “Dad”
“Catch a falling star”.
Main computer protected by deaf and dumb alter using a sign language equation
as its access code and the reversal of its access code is its shut down code.
The Brack Master is a Master Programmer.
Each of the 13 sections of 169 alters (a section is a 13 x 13 grid of alters)
will then have a computer assigned to it. The computer is made up of dissociated
parts of the mind--which are like alters, but have not been given histories
or names. Each section has a computer which makes 13 section computers. Section
1 and section 7 (See the Grid Chart) (see the grid chart) are main computers.
The first is the main computer for the top half, and the second is the main
computer for the bottom half of the System. The second main computer is in
the hell pit, and has been put in at the lowest level of the mind. Section
6&5 computers are connected by a connecting computer, as well as 4&3,
2&1, 0&12, 10&9. This makes 5 connecting computers. In total then
we have 13 section computers, 2 main computers, and 5 connecting computers,
for a subtotal of 20 computers. Since things are being built on the basis
of the magical number 13, six more computers are installed which are decoy
or false computers for therapists to work on. This makes a total of 26 computers
(or 2x13). Since there are 26 letters of the alphabet, this lends itself well,
and each computer is assigned a letter of the alphabet. Since the computers
are put into the slave when it is a young child, the child has just learned
how to count and say the alphabet.
The Illuminati has been using a large dollhouse with 26 rooms using 13 colors
of paint, giving two rooms per color. Each room is a computer. In accord with
the practice of double coding, each letter of the alphabet is given its sequence
number, so the names for the computers are Al, B2, C3, D4, E5, F6, G7, H8,
19, J10, K11, L12, M13--the thirteenth is assigned the 1st main computer.
N1, O2, P3, Q4, R5, S6, T7, U8, V9, W10, X11, Y12, Z13. Rather, than use the
number 13, the number 0 will be assigned, thus changing things to M0, and
Z0. This is simple enough for a child’s learning mind, but difficult
enough that it serves as a viable code. As codes are assigned, the bottom
of the alphabet is assigned the top (front side) of the system. The middle
point MO, is the normal access point for all the computers for the handler.
The code for this is associated with the name of an airplane hanger, so that
the concept of taking off into the sky (trancing can be associated with it.)
Each computer needs an access code to go along with its alpha-numeric name.
A deck of cards lends itself well to a code of 13. Bear in mind each computer
has a color assigned to it. Colored scarfs and dollhouse rooms were used with
electroshock to teach the child his color coding.
When the programming is going on trance depths and runways(mental image for
flying off into a trance) and the structure of the System will all be tied
together in one neat package. Everything is built on its own x-y axis. Each
13x13 grid has the middle rows both vertically and horizontally set up as
runways. The x-y axis also makes up the hourglass lines or the butterfly wings.
Both images are used with slaves. Because thing are set up in thirteens in
Mary’s system, and things are double coded, thirteen becomes 13-1 and
one is 1-13. This allows us also to link 13-1 and 1-13, so that everything
becomes a circle. The circle within a circle, box within a box concept, triangle
within a triangle situations makes the slave feel he is trapped in an infinity
loop of programming that has no end and no beginning. 13 and 1 make 14. An
entire deck of cards can be used in a double code that also adds to 14, such
as the 8 of spades and the 6 of diamonds, or the Ace of spades and the King
of Diamonds. Here then is the codes for Mary’s computers. Two cards
from opposite suits that add to 14. Since a deck of regular playing cards
came originally from Tarot cards, the playing card used as a code also carry
some occult significance to the codes.
It is also training the child who is programmed this way to be interested
in cards. And everytime the child plays cards they will reinforce at an unconscious
level their computer coding. The computers will then have programs set in
on 13 x 13 quadrants. Quadrant 6.6 will have a program such hopelessness.
Other quadrants may hold aloneness, recycling, cold, heat, burning, cutting
oneself, pulsating loud heart beat, and hundreds of other programs. These
programs have the type of codes assigned them that are given in the Universal
Function Codes. Many of the functions can receive a standard code, but other
items require individual codes. Telephone tones are frequently used to be
able to key in (that is access or trigger) parts of the computer program matrix.
Dominoes also are used for the computer programming.
The dominoes are put in so that the programmers can get a dominoe effect,
if they want to set off a series of programs. Dominoes and flashing sequences
of lights were used to train the child to automatically respond to a certain
pattern of dots. Our hypothetical Mary will also have hundreds of other codes
for all kinds of miscellaneous things such as the following random codes:
“RUBY RED LIPS” “TO HAVE POWER” AND “TO BE THE
POWER”, which are also found in the Tall Book of Make Believe in the
Shut Eye Town. Dominoes help with the code: “2-4-6-8 WHO DO YOU APPRECIATE?”.
More examples are, “I LOVE DADDY.” “JACK BE NIMBLE JACK
BE QUICK 13-1 12-2...” “PUMPKIN HEAD--an access code. To go away-
“Ta RA RA BOOM-DE-AYE”,”CRYING OVER YOU (3X)”, “SILKEN
GIRDLE”-- a golden caterpillar plays a bittersweet tune. A gold pocket
watch with Roman numerals is associated with the words “Eagle on it.”
When Mary gets scared and begins to get into revolving switching, sometimes
spinning can be slow down by saying, “10--YOU ARE SLOWING DOWN 9--YOU
ARE SLOWING DOWN 8--YOU ARE GETTING SLOWER AND SLOWER...” A system’s
coding is a reflection of their programmer. If the programmer is a pilot which
many of them are, then they may have pilot lingo in their codes, such as the
system may be turned by pitch & degrees. If the programmer is a sailor
the system may have nautical codes, such as “RED RETURN RUNNING’’
, ‘‘SAFE HARBOR’’ (for ‘‘Home’’),
and DOWN RIVER (away from “Papa”).
Q. Catholic Programming (by Jesuits etc.)
KEYS TO THE KINGDOM = world domination by mind control. VOW OF SILENCE is
a keep quiet program activated by “THE WALLS HAVE EARS & THE PLANTS
HAVE EYES SO YOUR SILENCE IS TANTAMOUNT TO SUCCESS.” This is explained
to the victim that the sea shells and the plants have the ability to hear,
and that a sensitive occultist (programmer) can psychically pick up what the
plants and sea shells hear. “MAINTAIN IT” --is a command to maintain
the Vow of Silence “MAINTAIN IT & LISTEN.”-- a command to
keep silent and listen to a command.
“ENTER INTER INNER DIMENSION TWO” - this is a standard Jesuit
infinity program (2 is a sacred voodoo no.)
R. Mensa Programming (by MENSA)
“17 21 13 46” is an Illuminati code meaning a MENSA layer
Sample Mensa codes:
“727 + E=MC SQUARED + 3.141 5962 + PI”
“A+B=C, B+C=A, C+A= B” “TIC TAC TOE + C CROSS, PI CROSS”
The MENSA codes are sequences of 6 numbers.
S. HAND SIGNALS misc. common signals
Finger to forehead--
One ring finger bent at 90° -- access wave Rotated pencil--with certain
words--rotates the system
Finger swung the counterclockwise way closes portals.
Right Fist to forehead -- OBEY
Fist with right hand cupping left hand, the left is like the letter c, and
the thumb is outward and the fist inside, the left hand then moves 3 times
over the knuckle -- access signal
Left hand of slave laid on top of handler’s hand - sign of submission
Hands behind back of head -- I’m master
Right Hand with thumb & index finger making an L shape on chin/check
Hands on inside of thighs by handler -- come to me Kitten and service me.
Hands locked folded interwoven backward -- you can’t break “the
circle”
Handshake with index and middle finger held straight out -- ”You are
one of us.”
Grip called the lion’s paw -- access greeting opening and closing
the hands or large circles with index finger opens portals. Palms rubbed together
counterclockwise
Kiss on center of head -- kiss of submission of slave to handler
Palm of hand touched -- sexual access point for some models
Sign of Satan -- Hail Satan! used for Monarch & Illuminati Mind-controlled
slaves as an induction. The alter who is holding the body goes into trance,
& a deeper one replaces it.
Thumb twiddle -- rotating the thumbs around with the two hands clasp --
S&M
Touch of center of forehead -- access point
Vulcan Peace Sign -- llluminati/occult greeting Wave with Finger and thumb
together - other digits extended
Winks at the system were used to convey meaning.
--- LIFE “OVER THE RAINBOW” ---
After indexing & rereading this book, the co-authors realized that we
had not explained “over the rainbow.” Some alters live “over
the rainbow” and some do not. Both types will use the term “over
the rainbow”, but with different meanings attached. For those who live
“over the rainbow”, they serve their masters in such a deep hypnotic
trance that they perceive reality like it’s a dream. When their memories
surface they are so unlike normal memories that a system in therapy may not
know what to do with them. They have been described as similar to the pictures
in the old T.V.s when the vertical hold would go out of control. Deeper alters,
who live “over the rainbow” experience memories/life in the following
fashion: faces & porn cameras are airbrushed out of their memory, distinctive
marks in the perpetrators such as scars & wrinkles are airbrushed out,
colors & lights are very bright due to the total dilation of the pupils
while in deep trance, and there is no sense of time for these alters. These
alters are trained to “TRANCE SEND FORWARD THROUGH TIME”. By understanding
the programming, the codes, & triggers, those alters who lived “over
the rainbow” can recover from the mind the full memory, without the
distortions created by dissociation.
T. PARTIALLY CORRECT PROGRAMMING SITE CODES
The following site codes are not totally accurate. Also, the Intelligence
groups use what are called Cryptonyms, which are two-letter
digraphs such as the "MK" of MK-ULTRA. The digraph can indicate
a type of operation or even a location. An operation may have CODES. An operation
may have its cryptonym changed in the middle of its operation.
The programmers will begin their programming by extreme torture. After a
certain amount of torture the victim is willing to say or believe anything
to stop the torture. At this point a thought will be planted into the victim’s
mind. This thought will be linked to a false memory put in via hypnosis or
movies, or other method, and it will be linked to a command put in by hypnosis
etc. and the original thought, the command, the false memory will be linked
by a single emotion which will link them all together. The result will be
something like this: it is two weeks before Halloween (thought), I must get
ready for Halloween rituals (command) because I have always had a habit of
going to Halloween rituals (false memory). If I don’t, I will have a
heart attack and die (memory of torture linked to thoughts). Programming is
layered in. Layer after layer of programming is put in. Each alter (personality)
of the victim is used as if it is a component of a large system. The result
is that no alter (personality) is the whole, but only a cog in a great machine.
Can a single cog rebel against the whole machine? It is very difficult for
a single component of thousands of components to rebel against the abusers.
Alice In Wonderland Programming--going down the tree,
going through the mirror, going underneath something or growing tall
ALICE IN WONDERLAND PROGRAMMING AS IT PERTAINS TO AN ALTER GOING DOWN IN
TRANCE FOR INTERNAL PROGRAMMING
The internal programmers (and some other alters) have the ability to send
other alters into deep trances. One of the programs for doing this is based
on the Alice In Wonderland Theme and it was experienced like this for a level
2 alter who managed to stay in communication with her deprogrammer:
When the alter went down in her mind she went down on the inside of the trunk
of a tree (like Alice In Wonderland). At the bottom she saw a keyhole, a table,
and on the table was love potion #9. She automatically drank the love potion
which shrinks her to a dot and then she goes through the keyhole. So normally
this process means she goes through the keyhole. She managed to stay in contact
with her deprogrammer during this deep trance. After the key hole she saw
thousands of looking glass mirrors. Everything got smaller as she went down
the tree. She became a dot. She drinks love potion no. 9 and comes back with
it. A tree comes and wraps itself around her and loves her. As she ascends
(comes up in trance) she stretches up and enlarges. In coming up out of trance
she gets stuck at level 8 due to some interference from deeper alters. She,
in accord with her programming, senses her Master’s love. (Normally
she would have simply tranced out, and another alter would have taken her
place and she would have no recollection of the entire process. The alter
has been programmed to have backup amnesia. Backup amnesia
means that one doesn’t remember that one lost time, one doesn’t
remember that one forgot, etc. In short it means you don’t remember
that you don’t remember.) This is an example of hypnosis used internally
by the programming and the Programming alters to control other alters. The
deepening of the trance was given the imagery of Alice falling down the tree.
In the various stories used in programming, there is some part of the story
that can be used as the story line for trance induction, these include:
Wizard of Oz -- going into the poppies,
Star Wars -- time warp, riding the light
Star Trek -- being beamed, replicators etc.
Hypnosis is used to anchor suggestions about sleep patterns, panic programs,
phobias, health healing programs and health problems programs, pain control
and pain programs, motivation programs, a suicide program called “hypnosleep”,
an insanity program, and countless other uses. Hypnosis is used to steer a
person’s mind in the direction that they have been labeled. For instance,
if they have been selected to become a doctor, they will be programmed for
success as a doctor. New patterns of thought, feeling and behavior are inserted
to build confidence in the goals of the Illuminati. Positive experiences are
used to help boost the person’s feelings, and then the new messages
are anchored “imagine these messages taking root. Your new messages
are growing stronger and stronger.”
The Alice In Wonderland programming theme is used in air-water programs
and mirror programs which the Illuminati, the CIA, NASA,
the Jesuits and others like so well. The idea is that there exists a mirror
world which is a reversal. Along with it is attached the idea that the slave
can enter into a timeless dimension of time, or as some refer to it “interdimensional
time travel.” Later, the victim will be further brought under the spell
of this mirror programming by going to locations around the nation, like the
Magic Time Machine restaurants in San Antonio
and Dallas, TX where mirrors are placed on doors, ceilings,
walls, and restrooms of the establishment and programming themes are part
of the everything at these restaurants. The handler may tell the slave, “LOSE
YOURSELF IN THE INFINITY MIRRORS.” When hypnotically programming in
programs, the Programmers place in many types of images and programs. Some
examples would be having the concept of obedience equal the fountain of youth.
The fountain of youth flows in the victim’s mind unless they step out
side of their orders. This can be linked to the Shangri-la story, where a
woman ages as soon as she leaves her place in Shangri-la.
Another example, is the hypnotic imagery involving the formation of an island
from a volcano. The story is turned into a programming script to allow the
System to be radically restructured. This Volcano programming
is a System’s turning program. A volcano erupts from deep down, and
lava pours into the sea. Mountains are pushing up from deep in the mind. To
survive, people must cross from the old to the new island on a bridge that
naturally forms. Fire births the new territory and destroys the old. The new
mountains develop trees which become safe places for the alters to roost upon.
HYPNOTICALLY BUILDING IN STRUCTURES
Later in the book, the art of building structures internally in the mind
of the victim will be covered. However, since the process involves hypnotism,
it would be appropriate to discuss briefly how hypnosis can begin to work
a tree structure into the mind of the child. First, the programmer
hypnotically suggests that his penis is a growing tree. Later, the programmer
might begin, “You know those big trees in the park that look so big
and straight and stretch way up toward the sky? Stand up and be one of those
trees. Stand up really straight and tall as tall as you can be, and stretch
your arms out toward the sky like branches on that big oak tree. Now those
big trees have long, deep roots that keep them from falling over. Feel your
feet go down down through the floor, just like roots on the big strong oak
tree.”
Final note: there is no way that this book could give every last song or
story that has been used for programming, nor was it the intention to do so.
We have wanted to point out the popular story lines used, although we have
missed some such as the Chronicles of Narnia and Little
Red Riding Hood (which is used in several ways along the lines of
you think you’re going to Papa’s, or Grandma’s house &
you end up with a wolf). Our list left out many programming songs
which include --all the Rolling Stone’s songs, Alabama’s
Old Flame, etc.
All information posted on this web site is
the opinion of the author and is provided for educational purposes only.
It is not to be construed as medical advice. Only a licensed medical doctor
can legally offer medical advice in the United States. Consult the healer
of your choice for medical care and advice.