[back] The Illuminati Formula

Chapter 4. Science No 4 - Hypnosis Understanding the Basics About Hypnosis

A. Dissociation, trance, & its historical use
     The History of Hypnosis for Programming Hypnotic cues
B. How to program with hypnosis 
   George Estabrooks  Royal Institute of International Affairs  Rhodes Scholarship 
C. How to boost creativity of victim with hypnosis 
      The Vital Role of Movies for Hypnotizing Small Children  
      Spinning Tops
      The Hypnotic Voice of the Programmer
D. Keeping the mind dissociative 

E. Keeping the mind in a programming (Alpha) state  

F. Hypnotic triggers & cues

     Monarch Mind Control Codes Contents (A-T)
G. Hypnosis in programs & other uses
    Alice In Wonderland Programming as it Pertains to an Alter Going Down in Trance for Internal

Hypnotically Building in Structures 

 

A. Dissociation, Trance, and History of Hypnosis for Programming

Dissociation is used as a defense to protect a person from overwhelming pain and trauma. It is a natural ability of the brain. Hypnosis or hypnotic trance is a form of dissociation. There are a number of types of dissociation: amnesia, somnambulistic states, localized paralyses, anesthesias, and hallucinations. Hypnosis can reproduce all of these dissociative states. The mind naturally hypnotizes itself under various conditions.  Perhaps the reader has been driving along a familiar road and the next thing you knew you were arriving home, having driven in a trance. Now let’s suppose you are driving to a movie and you are discussing next week’s plans with your wife. The complex thinking required to drive just happens. You are awake talking to your wife, and yet on another level you were in trance driving the car. You as a subject were both in hypnotic trance (driving) and awake (talking about plans). 

There are 5 levels to the subconscious that the mind will naturally dissociate to. The other deeper levels require help to access. People naturally can think on two levels. Because people’s minds function on multilevels and there is a continua on a spectrum that runs from conscious to unconscious, it is often difficult to pinpoint just exactly what state of mind the brain is in at a certain point, because there is no single answer. A light trance is where a person is daydreaming about his girlfriend. A moderate trance is where he imagines he is in bed. A deep trance is where he physically feels he is in bed with his girlfriend. Sleep is where one dreams of being in bed. Behavior modification is carried out in the light to deep trances. The deep trance is a very creative level. 

Hypnosis appears to affect several areas of the brain--the brain stem is modified into the hypnotic state, and the midbrain centers are inhibited so that other areas--the motor, sensory and memory areas can be manipulated. Further not all hypnosis works the same way. Hypnosis can be used on the intellectual part of the mind, the social-spiritual part of the mind, and the primitive reproductive part of the mind.  

The skilled hypnotist will decide which area he wants and how to work with that area. Both Christians and Illuminati members who are skilled in understanding demonology, believe that there is a demonic side to hypnosis also. It should come as no shock to people that in the World Book Encyclopedia hypnosis is listed under Magic as a related article, but not under Medicine. Some Christians class hypnosis as a form of divination and enchantment. It certainly can be a form of control. In occultist W.B. Crow’s book Witchcraft, Magic & Occultism, it lists hypnotism as an occult science.  There is open debate whether hypnotism is simply part of the brain’s natural abilities or if supernatural elements are part of the process. There is no debate that historically, hypnosis for centuries has been the guarded secret of the occult world.  During shock or stress, the body’s limbic-hypothalamic-pituitary-adrenal system, releases substances which encode all the internal and external pieces of information being sensed into a deep level of consciousness. These memories often become dissociated from normal states of consciousness. In other words, when the mind-body returns to this state (where it was in during shock/stress) the mind can reaccess those memories. However, until the mind returns to this shocked state, it doesn’t pick up the information it has embedded.  The Monarch programmers are acutely aware of how the mind functions, and how information and memories can be trapped in the mind.

There are different neurophysiological states. Also there are said to be 12 levels to the subconscious mind. Then on top of this the mind has the ability to create amnesia barriers. Hypnosis is a valuable tool to move the mind to different neurophysiological states and to get the mind to different levels of the subconscious mind. Hypnosis can also play a role in working around amnesia, since both are types of dissociation.

Hyperventilation helps a person induct into a hypnotic trance. Torture, depersonalization, fear and acute anxiety stimulate the body to hyperventilate. So the fear, torture and depersonalization are aids for the hypnotist to help induct a person into a hypnotic trance.  

Hypnotic cues can be given to cause the body to go into various dissociative states. This could be a post-hypnotic suggestion that causes hyperventilation and an accompanying trance state. Hypnotic cues that are tied to every day objects enhance the programming. Everything in life becomes a cue to reinforce the programming. That may seem on the surface to be an exaggeration, but it is only slightly enlarged from the truth.  The programmers do in fact examine a person’s life, and then tailor their cues to what the person will be around. 

For instance, the programmer may force the child to smoke and then tell it that every time they blow out smoke they will think about their master. The programmed alters don’t dare not to smoke on fear that they will be punished. The smoking in turn reinforces the power of the hypnotist/master.  Much of the good that therapy can do is in effect to de-trance or dehypnotize clients. Most of the alters of a Monarch system go their entire lives in trance. Common objects in a person’s life that can be hypnotically given a programming meaning include music, tones, colors, the sight of a book or Bible, the pyramid on the back of a dollar bill, pictures of God, silk scarfs, jewelry, lights, sounds, TV programs, and countless other things. The limit to this is simply the programmer’s creativity.  

The power of hypnosis is often underrated because the power of the mind is underrated. The mind can decide to control its breathing, heart beat, blood pressure and other things that were once thought to be involuntary. 

The brain produces a substance which is a tiny peptide molecule called enkephalin which acts just like morphine and reduces pain. The brain can be hypnotically trained to release enkephalin so that the brain doesn’t perceive pain.  A common hypnotic device for washing away pain is running water. The victim is hypnotically told to go to a waterfall and wash their pain away. (According to a programmer the average healing rate is 3 times quicker under hypnosis than without.)  

The fantastic abilities of the mind to control what happens to it are very remarkable (such as its natural healing abilities), but most of this is being kept a National Secret so that it can be used against humanity to enslave us to demonic-empowered power hungry monsters, rather than to benefit humanity. Several people in intelligence agencies quietly bemoan the fact that secret research could be helping humanity instead of controlling it. 

The human mind has been found to be like an immense symphony orchestra, each part doing what it does best under the guidance of a director part similar to the conductor of an orchestra.  A non-multiple’s brain delegates responsibility to parts of his brain yet retains control over the process. His mind will shift from one ego state to another, & still retain its identity. 

In contrast, the multiple’s brain also delegates responsibility and shifts from one ego state to another, BUT doesn’t retain a cohesive selfhood or self-identity. The mental mechanisms are similar, but the experience is vastly different. Rather than an orchestra playing together, the multiple’s brain is full of competing isolated parts (instruments so to speak) that are playing in isolation.  Out of the chaos of all these independent amnesic parts, the programmer through hypnosis/& fear then becomes the conductor to help bring order out of chaos. 

If the multiple is to regain a chance to orchestrate their own life again, they must re-establish communication between the different parts of what should have been their own orchestra, and get internal people to harmonize their music of life. Good programmers do not need to formally induct their victim into hypnosis. However, if they need to, the Monarch slaves are well conditioned to respond to numbers being counted and fingers being snapped. Hypnosis was a well developed art by the early 20th century. And testing and refining continued all along. 

For instance, the. U.S. military was conducting extensive tests of subjects under hypnosis during W.W. II. In spite of all this, the CIA was still seeking better rapid induction techniques for their slaves during the 1950s. MK Ultra Subproject 128 dealt with rapid induction techniques, especially Subproject 128-1. Some of their drug testing was done at Lexington , KT Detention Hospital. 

The ability to distinguish between magic and hypnotism may not exist for the child in situations where they are witnesses to the power of hypnotism exercised by a programmer. This makes the adult programmer, who is a big person look all powerful.  Another danger inherent in hypnosis are complications (side effects) that hit a percentage of those who are subjected to it. 

Hilgard (1974) discovered 31% of the 120 university students participating in a study of hypnosis had complications that lasted from 5 min. to 3 hours after trance, which included headaches, dizziness, nausea and stiff necks. Fritz is aware of one woman who, after the one & only hypnotic session she was the subject of, developed the complication of having nightmares of snakes crawling all over her. (For further study the reader may want to read MacHovec, Frank. "Hypnosis Complications, Risk Factors, and Prevention" American Journal of Clinical Hypnosis. Vol. 31, No.1, July, ’88, p. 40+.) 

Regular gentle electrical stimulation in many parts of the brain including the lower part of the reticular formation can change the state of consciousness from alert to sleepy. An electrical band attached to a box is sometimes placed on the victim to produce a hypnotic state.  There are several ways to alter a person’s state of consciousness, but the most popular one by Monarch handlers is to use a combination of drugs and hypnosis. Drugs are used to facilitate hypnosis. Modern drugs do almost all the work for the hypnotist. They place the person in an altered state and make them willing to take any order. Often survivors remember orange or grape drinks, or something else which they were given, which were used to give the child drugs. One Monarch slave (Cathy O’Brien) wrote about having been given hypnotic drugs via a Grasshopper ice cream drink.  

Occasionally, hypnosis must be carried out by the programmers on unwilling subjects. They have 3 major ways to get around this. They can induce hypnosis by disguising what the hypnotist is doing, they can wait until the person is asleep and talk to him while asleep, or they can administer drugs. 

Also the Network has some high-tech equipment which stimulates the orgiastic state (sexual ecstasy) part of the brain. By moving the body into this state, the mind opens up all the unconscious states. Then sophisticated brain wave machines program thoughts into the person. A computer disk is put into the electric shock machine and it runs a program that sends electric jolts down six nodes. The brain’s reticular formation serves as the brain’s mechanism involved in regulating alertness and awareness.  Various kinds of stimuli will enter the brain through its various methods of sensing and learning. With total sensory deprivation (done by placing the victim in a salt water tank with electrodes that shock the body until it stops all movement) the reticular formation will place the mind into a primitive state of consciousness where the programmers can place in post-hypnotic commands to do something on a certain date. The end time programming, that has Monarch slaves doing something at a specific date to create anarchy or to help the Anti-Christ come to power has been put in at this level.  

As previously mentioned, this level achieved by total sensory deprivation of the Monarch slave is same primitive level as the brain’s commands to keep the heart beating. Depending on what type of signals are coming in to it from the various sensing agents of the brain, the reticular formation will then make a decision what state of consciousness to place the mind in. If the reticular formation does not send out "alert" signals, then the brain will get sleepy. Damage to the reticular formation can cause a coma. The two thalamus lie just above the brain stem. The right and left thalamus are the brain’s selective attention mechanism. That is to say, they decide what it is important for the brain to focus its attention on. The right thalamus is connected to attention to visual shapes and the left to our attention to things describable in words. Ten to fifteen repetitions at one second intervals are enough to cause the brain to lose interest in something. At this point the neuron’s in the reticular formation quit paying attention to whatever it is. For instance, your brain will listen to a clock tick for only 15 intervals before it quits listening to a clock in the room. But the brain’s alertness can be reactivated by a strong and sudden stimulus like a loud sound or a flash of light. This is why 3 gunshots or 3 flashes of light are used as standard access triggers for Monarch slaves. Three was also found to be the best number to get the job done.

The History of Hypnosis for Programming

A masonic magazine for higher masonic rites where sex magic is performed entitled Freemasonry Universal, Vol. 5, 1929, p. 58 states: 

"Certain Forces are sent through the candidate’s body during the ceremony, especially at the moment when he is created, received and constituted an Entered Apprentice Freemason. Certain parts of the Lodge have been heavily charged with magnetic force especially in order that the Candidate may absorb as much as possible of this force. The first object of this curious method of preparation is to expose to this influence those various parts of the body which are especially used in the ceremony. In ancient Egypt , there was another reason for these preparations, for a weak current of physical electricity was sent through the candidate by means of a rod or sword with which he was touched at certain points. It is partly on this account that at this first initiation the candidate is deprived of all metals since they may very easily interfere with the flow of currents."  

Long story short, the Masonic lodges have been using hypnotism and electric shock in their initiation rituals for a long time. The combination of fear and hypnotism combine to help seal the lips of an initiate from telling what in some lodges are secrets of criminal activity.  The Brahmin caste in India practice yoga, and other meditations where they regularly go into altered states of consciousness. Centuries ago, the Brahmin fakirs learned about drugs, tortures, and magical methodologies to produce hallucinations and altered states of consciousness. The worship of Bacchus in the west and Shiva in the east were similar, as were the bloodthirsty rites of Kali and Moloch. Occultists in India have also gone to cemeteries for centuries, like the Illuminati to draw spiritual power from graves.  When eastern and western occultists linked up they realized they had a great deal in common. The ancient Egyptian writings many centuries B.C. talk about the third eye and temple trances. Hypnosis appears to have been practiced in these ancient temples. All over the world, altered states of consciousness have been used. The feared Scandinavian warriors called Beserkers were in a mildly-programmed altered state of consciousness which made them fearless.

B. How To Program With Hypnosis

George Estabrooks was the first major hypnotist to publicly recognize the potential for hypnosis. He contacted MI-6 and other military and intelligence groups in hopes he could interest them in the military-intelligence potentials of hypnosis. What was George Estabrook's connection to the Illuminati? George Estabrooks was a Rhodes Scholar, which is an entry-level group for the Illuminati.  

For those who haven’t studied this, it would be appropriate to give a brief explanation of these things. The Illuminati in 1919 created the Royal Institute of International Affairs (RIIA). The Astor Illuminati family were major financial backers of the RIIA. Waldorf Astor was appointed to the RIIA. The American equivalent to the RIIA is the CFR. The RIIA and CFR set up Round Table Groups (based on the King Arthur myths) which were initially named by Cecil Rhodes "Association of Helpers". 

High ranking Mason/Illuminatus Cecil Rhodes also created the Rhodes Scholarship to bring select men from several the English speaking world and Germany to learn how to bring in the One World Government that the Illuminati has long had planned. The Cliveden Estate of the Cliveden Astors (of the Illuminati) has played an important role in the preparation of Rhodes Scholars. Bill Clinton and Fred Franz, the late president of the Watchtower Society, are two examples of men selected for Rhodes Scholarships. Bill Clinton went through the program. However, Franz decided not to go to London in order to help lead C.T. Russell’s cult as "oracle" after WT Pres. C.T. Russell was ritually killed on Halloween, 1916 and his remains buried under a pyramid. He later served as President himself from 1977-1994. 

The Watchtower Society leadership is a front for a part of the Illuminati which practices Enochian Magic.  The power of Enochian magic is the Watchtowers. A powerful part of Bethel headquarter workers are Multiple Personalities, and have cult alters who speak in Enochian. Some multiples work in the art department and have been secretly placing hidden occult symbology into Watchtower & Awake! magazines.  

Now back to Estabrooks, who was also himself part of the Illuminati. In his book Hypnotism, which came out in 1946, he wrote in his chapter "Hypnotism in Warfare" (again bear in mind that Estabrooks writes this in 1946 and has been advocating what he writes for perhaps the 15 previous years!) This chapter is not taken from a mystery novel.  The facts and the ideas presented are, so to speak, too true to be good, but no psychologist of standing would deny the validity of the basic ideas involved. He might, of course, be somewhat startled at our proposed use of these basic ideas and techniques, for he has never given this matter much thought.... The use of hypnotism in warfare represents the cloak and dagger idea at its best--or worst. Even if we did know the answers to some of the weird proposals in this chapter, those answers could never be given for obvious reasons. The reader must use his imagination for specific outcomes in specific cases have not been made public--probably never will be made public.  Any topflight physicist is familiar with the basic laws of atomic fission and he is quite free to discuss those laws. But he may or may not know what is happening on some government research project in this field. If he does know, he is not shouting it from the housetops, probably not even whispering it to his best friend. The same applies to hypnotism in the field of warfare. Our interest here lies in some of the more unfamiliar sides of hypnotism which may make it of use in warfare. Again, no psychologist would deny the existence of such phenomena.... The only possible way of determining whether or not a subject will commit a murder in hypnotism is literally to have him commit one.... But warfare...undoubtedly will, answer many of these questions. A nation fighting with its back to the wall is not worried over the niceties of ethics [like Nazi Germany]. If hypnotism can be used to advantage, we may rest assured that it will be so employed. Any "accidents" which may occur during the experiments will simply be charged to profit and loss, a very trifling portion of that enormous wastage in human life which is part and parcel of war.... 

One in every five adult humans can be thrown into the hypnotic trance--somnambulism--of which they will have no memory whatsoever when they awaken.  From the military viewpoint there are a few facts which are of great interest. Can this prospective subject, --this ‘one-in-five" individual--be hypnotized against his will? Obviously, no prisoner of war will be co-operative if he knows that the hypnotist is looking for military information, nor will any ordinary citizen if he suspects that the operator will use him to blow up a munitions plant. The answer to this very vital question is "yes", though we prefer to say "without his consent" instead of "against his will." We do not need the subject’s consent when we wish to hypnotize him, for we use a ‘disguised" technique.  

The standard way to produce hypnotism in the laboratory is with the so-called sleep technique. The operator "talks sleep" to the subject, who eventually relaxes and goes into a trance, talking in his sleep and answering questions. 

Now suppose...we attach a blood pressure gauge to the subject’s right arm and the psychogalvanic reflex to the palm of his hand, just to make everything look shipshape. These devices are for measuring his ability to relax. We also point out that, of course, the very highest state of relaxation will be his ability actually to fall into a deep sleep while we are talking to him.  

We also stress the great importance of the ability to relax in this modern world of rush and worry, promising to show him how to get results as one end of these experiments. All this is by way of buildup.  Probably not one of our readers, if exposed to this procedure, would realize that this was preparation for hypnotism, but would co-operate willingly in this very interesting psychological experiment.  

We then proceed to "talk sleep," much the same as in ordinary hypnosis, carefully avoiding any reference to a trance or making any tests with which the subject might be familiar, all the while checking on blood pressure and psychogalvanic reflex to keep up the front.  

Finally we make the test of somnambulism, or deep hypnotism. We see if the subject will talk to us in his sleep without awakening. If this does not succeed, the subject wakes up completely, and in this case we simply repeat the experiment, hoping for better luck next time. But if we do succeed, if the individual belongs to the "one-in-five" club, the subject is just as truly hypnotized as by any other method, and from now on everything is plain sailing.  

By use of the posthypnotic suggestion...we simply say, "Listen carefully. After you wake up I will tap three times on the table with my pencil. You will then have an irresistible impulse to go sound asleep." The next trance is just that easy to get, and the subject has no idea that it is the pencil which has sent him off."...  

But we must go even further than this. Once a person has become accustomed to hypnotism, has been repeatedly hypnotized, it becomes very easy for any operator to throw him into the trance. Obviously this will not do if we are to use hypnotism in warfare. So we plug this gap again by suggestion in the somnambulistic state. We assure the subject that in the future no one will be able to hypnotize him except with the special consent of the operator. This takes care of things very nicely....We sit down with the subject...We are talking about the latest boxing match when the operator taps three times on the table with his pencil. Instantly--and we mean instantly--the subject’s eyes close and he’s sound "asleep."  While in trance he sees a black dog come into the room, feels the dog, goes to the telephone and tells its owner to come get it. The dog is of course purely imaginary. We give him electric shock which would be torture to a normal person, but he does not even notice it. We straighten him out between two chairs and sit on his chest while he recites poetry. Then we wake him up. 

He immediately starts talking about that boxing match! A visitor to the laboratory interrupts him. "What do you know of hypnotism?" The subject looks surprised, "Why, nothing." "When were you hypnotized last?"  "I have never been hypnotized." "Do you realize that you were in a trance just ten minutes ago?" "Don’t be silly! No one has hypnotized me and no one ever can.’’ "Do you mind if I try?" "Not at all. If you want to waste your time it’s all right with me." So the visitor, a good hypnotist, tries, but at every test the subject simply opens his eyes with a bored grin. Finally he gives up the attempt and everyone is seated as before.

Then the original operator taps on the table with his pencil. Immediately the subject is in deep hypnotism.  We now add another concept. We can coach the subject so that in the trance he will behave exactly as in the waking state. Under these circumstances we could defy anyone, even a skilled psychologist, to tell whether the subject was "asleep" or "awake." There are tests which will tell the story but in warfare we cannot run around sticking pins into everyone we meet just to see if he is normal. So rapid can this shift be from normal to trance state [the programming state], and so "normal" will the subject appear in trance, that the writer has used such a subject as a bridge partner. He plays one hand in trance and one hand "awake" with no one any the wiser. [This happens with Monarch slaves all the time. Few people ever catch on that alters are under trance.] Suppose we deliberately set up that condition of multiple personality to further the ends of military intelligence.

Let us start with a very simple illustration. For example, we can hypnotize a man in an hotel in, say, Rochester . We then explain to him in hypnotism that we wish the numbers and state names of all out-of-state cars parked in the block surrounding the hotel. He is to note these very carefully in his unconscious mind but will have no conscious memory of having done so. Then we awaken him and ask him, in the waking state to go out and get us a tube of toothpaste. He leaves the hotel and wanders around the block in search of that tube. Finally, he returns, apologizing for his delay, saying that it was necessary for him to go entirely around the block before he noticed a drugstore in the very building itself. This, he says, was very stupid of him but apparently men are made that way. 

Did he notice anything of interest as he made his walk? "Nothing! Oh, yes, there was a dog fight down at the corner." And he described the battle in detail.  We now hypnotize him. He knows what we are seeking and at once proceeds to give us numbers and states of strange cars, very pleased with the fact that he can recall thirteen. He evidently enjoys the game immensely and is quite proud of his memory.  Then we awaken him and see what he knows in the conscious state. "How many cars are there around the building?" "I don’t know." "What are the numbers of the out-of-state licenses around the building?" "Good heavens, I have no idea. I think there is a California car near the front entrance, but I have no idea as to its number." 

A friend tries his hand. "Now look here. You were hypnotized half an hour ago and you left this room under posthypnotic suggestion." The subject gets irritated. "Look here yourself. I’m getting tired of that silly joke. This is the third time today you’ve pulled it. All right. I was hypnotized and saw pink elephants all over the lobby. Have it your way." And the subject sits down to a magazine, obviously angry that this man cannot find something more amusing to say.  

Often the hypnotic subject will react in this manner. Push him just a little too far and he becomes irritated, obviously a trick of the unconscious to end the argument and avoid any danger of being found out....  The reader’s very natural reaction is, "Why all this rigmarole?"... There are certain safeguards if we use hypnotism. First, there is no danger of the agent’s selling out. More important would be the conviction of innocence which the man himself had, and this is a great aid in many situations. He would never "act guilty" and if ever accused of seeking information would be quite honestly indignant. This conviction of innocence on the part of a criminal is perhaps his greatest safeguard under questioning by the authorities. 

Finally, it would be impossible to "third degree" him and so pick up the links of a chain. This is very important, for the most hardened culprit is always liable to "talk" if the questioners are ruthless enough.  The Super Spy in the instance we are about to outline, we may or may not be dealing with multiple personality.... 

The little experiment I have just cited could be successful with any good somnambulist and would require about ten hours preparation. The example I now cite would work only with a certain number of the very best somnambulists and instead of ten hours preparation, we had better allow ten months.... 

Perhaps we had better start by defending our position. Is it unethical? Perhaps, but science merely states the facts.... Now let us return to our presentation.  We start with an excellent subject, and he must be just that, one of those rare individuals who accepts and who carries through every suggestion without hesitation. In addition, we need a man or a woman who is highly intelligent and physically tough. Then we start to develop a case of multiple personality through the use of hypnotism.  

In his normal waking state, which we will call Personality A, or PA, this individual will become a rapid communist. He will join the party, follow the party line and make himself as objectionable as possible to the authorities. Note that he will be acting in good faith. He is a communist, or rather his PA is a communist and will behave as such.  Then we develop Personality B (PB), the secondary personality, the unconscious personality, if you wish, although this is somewhat of a contradiction in terms. This personality is rabidly American and anti-communist. It has all the information possessed by PA, the normal personality, whereas PA does not have this advantage....  

The proper training of a person for this role would be long and tedious, but once he was trained, you would have a super spy compared to which any creation in a mystery story is just plain weak. This is what the Illuminati have done. They create good Christian fronts, with Illuminati dark alters who can see what the Christians are doing.

My super spy plays his role as a communist in his waking state, aggressively, consistently, fearlessly. But his PB is a loyal American, and PB has all the memories of PA. As a loyal American, he will not hesitate to divulge those memories, and needless to say we will make sure he has the opportunity to do so when occasion demands.  

Here is how this technique would work .... [skipping this story and several others, we come to:] We choose a good subject and then let him in on the plot. We disclose to him that he is an excellent hypnotic subject and we wish to use him for counterespionage. We suspect that in the near future someone is going to try hypnosis on him. He is to bluff, to co-operate to the very best of his ability, fake every test that is made and stay wide awake all the time. The test we fear most is that of an analgesia--insensitivity to pain. So we coach him carefully with posthypnotic suggestions to the effect that even when wide awake and bluffing he will be able to meet every test which may be made here, be it with ammonia under the nose, a needle, or worst of all, the use of electricity, which can be made extremely painful and is easy to use. 

Under these circumstances it will be virtually impossible to tell whether this man is bluffing or really in trance. [The story continues that the master hypnotist thinks he has got a good subject and has hypnotized him deep. Then the subject tells him that he was only bluffing. The whole affair provides a nightmare for any counterintelligence group using hypnotism. They can be totally bluffed, unless they turn to high tech equipment to see what is really happening.] 

Estabrooks also explains how a man can be hypnotized and told he is only testing the preparedness of security. He is told he has a fake bomb, but is really given a real bomb. The subject is sent to a location, and blows up with the real bomb. The subject blows up with the bomb so the evidence of the hypnotic lie is lost. Hypnosis changes the threshold of the how the senses perceive. Sensitivity can be increased or decreased, hallucinations can be perceived even though there is the absence of any appropriate stimuli, and things that exist can go unperceived by the mind. For instance, alters who are used for porn are hypnotized not to see the camera. Alters used for any type of sexual service are hypnotized repeatedly to not see faces. The slave will actually see blurs where people’s faces are.  The Programmers like to manipulate. Children are set in front of circus mirrors that make them taller or smaller for programming. They are set in front of mirrors which duplicate their image. Here in Oregon , there is a site with a magnetic anomaly which bends light. It is called the Oregon Vortex. The Programmers take small children there for programming. Anything that creates an illusion, seems to be noticed by the Programmers and is put to use somehow. 

The CIA has employed magicians like John Mulholland to help them create illusions. Magician John Mulholland wrote a manual for the CIA on how to deceive unwitting subjects. Under drugs and hypnosis, when a small child is set in front of a mirror that elongates its body and or then shortens, the reality of the programming script seems real. The programmer can hypnotically call upon the child’s mind to totally hallucinate seeing something, or he can support the illusion by handing the child a doll and telling it that it is a child, or handing the child a pencil and telling the child it is a flower. A great deal of acting and props are used during the programming.  What child can tell fool’s gold from real gold? The bottom line is that generally, no matter which way the Programmers do it, whether by an illusion or an outright hypnotic-suggested hallucination, the event for the child is real. The majority of traumas are real events, but the scripts that are given are after the trauma are fictional.

C. Hypnosis Can Boost The Creativity of the Victim to Adopt Scripts 

Creativity is a function of attentiveness, playfulness, anxiety, limitations, relaxation, the trance state, responsiveness and absorption. A good programmer can assist or boost the creativity of the child. The programmer can tell stories and programming scripts in a vivid way, so that the sensory pictures are bold and strong. The child can taste and feel and touch in their minds the script being given them. Besides the language of the programmer other aids such as fear and drugs can enhance a victim’s attentiveness.

Playfulness comes naturally to children. They naturally pretend and use fantasy in their play. Because children are innately creative they are far easier to program.  Researchers have also discovered that creativity needs an element of anxiety and chaos in the person’s life. If everything is orderly and in perfect harmony, the creative juices will not flow. The conscious mind and the subconscious mind need to grapple. For creativity to be productive it must occur within limits. For instance, the concerto is created within the limits of a piano keyboard.  

The programmer, and the Grande Dame and the Grande Mother of the Illuminati victim carefully guide the child’s creativity and set limits. The spark of creativity occurs when there is an alternation of intense concentration and relaxation. The programmers must work back and forth between torture and kindness.  A light trance will allow the mind to surface creative ideas. That is why writers and composers get ideas when they are in a light trance driving, in a light sleep, or shaving or some other place where a light trance occurs. Receptivity is the willingness to accept a creative idea when it comes. 

The final part of creativity is one’s absorption into the process of creativity. The artist may get so immersed into the portrait that he is painting that the portrait seems alive and real--the actual person. This immersion, where things imagined become real, is important to keep the creative juices flowing.  The hypnotist/programmer can enhance the creative process by giving the child positive encouragement to reduce their fears and inhibitions to creativity. The programmer could say to the older child (a younger child might be told something else), "You take all of your fear of not being creative and put them into a sack. The sack now becomes a bundle of energy. Now imagine you are opening the sack and out of the sack comes a rainbow of energy. It is powerful, it is positive. You are now full of new ideas. You can feel this power surge through your body. Your mind is now clear and focused, focused, you feel confident, sure of your talent and eager to set your new ideas into motion, and you control the energy in your life, you are very successful in controlling the energy in your life...you take a few breaths and relax. You notice the neighborhood around you, there is a beautiful park, you begin to notice how beautiful the day is, and you begin to feel a fresh new energy flowing through your body...the more calm you become the more enthusiastic and creative you become...you will feel free to create, to enjoy your creative talent, to invent, to shape, and form new and wonderful ideas."  

This is not to say that the Illuminati programmer or Mother of Darkness assistant will use this type of hypnotic suggestions, but sometimes it does become necessary to teach some children how to dissociate, and how to become creative. If they do not develop these abilities, they may lose their life to the torture.

The Vital Role of Movies for Hypnotizing Small Children

As mentioned before, the hypnotist will find children easier to hypnotize if they know how to do it with small children. One method that is effective is to say to the small children, "Imagine you are watching a favorite television show." This is why the Disney movies and the other shows are so important to the programmers. They are the perfect hypnotic tool to get the child’s mind to dissociate in the right direction. The programmers have been using movies since almost day one to help children learn the hypnotic scripts.  For children they need to be part of the hypnotic process. If the hypnotist allows the child to make up his own imagery, the hypnotic suggestions will be stronger. Rather than telling the child the color of a dog, the programmer can ask the child. 

This is where the books and films shown the child assist in steering its mind in the right direction. If the hypnotist talks to a child, he must take extra precaution not to change the tone of his voice and to have smooth transitions. Most of the Disney films are used for programming purposes. Some of them are specifically designed for mind-control. 

Spinning Tops 

One method for inducting children into a dissociative state is to have them look at a large spinning top, as the colors whirl around. Carousel rides have also been popular to induce trances.  A good sampling of optical illusions can be found in Katherine Joyce’s book Astounding Optical Illusions. NY: Sterling Pub. Co. , 1994. The illusion The Temple makes one feel they are in a passageway leading to a small door. The Escalator makes one feel they are going up and down, and could be used for building in an internal elevator.   We know that optical illusions have been used, but we are not saying that these particular ones have been. For a programmer to use an optical illusion, he would first submerge the victim into a drugged state with the appropriate mind altering music and sounds and then flash the illusion onto the wall that the victim was facing. With virtual reality the child can really be immersed into a weird head trip.

The Hypnotic Voice of the Programmer

Programmers will adopt either an authoritarian voice, which is commanding and direct or a permissive soft tone. Bear in mind the slave who has the authoritarian voice used on it, sees the programmer as God with the authority of life or death over its (his or her) body and soul. The heightened expectation from the commanding tone, will increase the suggestions chance for success. However a softer tone, will relax the victim, and the hypnotist and the programming victim become partners in the hypnotic process. The advantage of the softer tone, is that the creativity of the victim is enhanced and participates more in the process. 

The hypnotic induction becomes more real when the victim participates more in the process.  The Monarch programmer will either use a monotone voice or a rhythmic voice. Remember, the professor who could lull his students to sleep. He had a hypnotic voice, without knowing it. A singsong or rhythmic voice is comforting. It can also be used by the Programmer. One continuous thread of words strung together are used to close out distractions.  After a suggestion or command is given, a pause is made by the programmer in talking so that the suggestion is taken into the mind. Otherwise anxiety is experienced by the victim’s mind, and the suggestion will not be accepted as well. 

Cisco, the co-author provides an example of how a hypnotic script can go with music,  "Close your eyes for your eyes will only tell the truth. And the truth isn’t what you want to see. In the dark it is easy to pretend that the truth is what it ought to be. "Softly, deftly, music shall caress you. Hear it, feel it secretly possess you. Open up your mind, let your fantasies unwind in this darkness which you know you cannot fight. The darkness of the music of the night. "Close your eyes, start a journey through a strange new world. Leave all thoughts of the world you knew before. Close your eyes and let music set you free. Only then can you belong to me. "Floating, falling, sweet intoxication. Touch me, trust me, savor each sensation. Let the dream begin, let your darker side give in to the power of the music I write. You alone can make my song take flight. Help me make the music of the night. "Helpless to resist the notes I write, For I compose the music of the night. Hearing is believing, music is deceiving. Hot as lightening, soft as candle light. Dare you trust the music of the night?" 

When the authors have bumped into men who are programmers and handlers for the CIA, they have noticed that many of these men have warm personalities and have a certain trained hypnotic voice which they use even when not programming. During rituals, the various magical languages used in witchcraft employ repetition, alliteration, nonsense syllables, newly coined words, and ancient words that are chanted or sung in a limited-range that makes the sounds become hypnotic. Sounds like the mantra "a-u-u-in-in" are chanted.  Gestures during rituals are also made which intensify the effects. Rituals can not be classified as having nothing to do with programming. There is such a great attempt to secularize and make clinical what the victim experiences, and the idea that witchcraft is part of the programming is an unpopular notion with some. Combining witchcraft with hypnotic language can be powerful with group dynamics. Repetitive sounds, such as a drum beating influences the locus coeruleus part of the brain. Drums can help induce trance.

D. Keeping the Mind Dissaciative

Illuminati parents (as well as other adults who care for a Monarch child) are given special instructions on how to raise the child to be dissociative. The parents are admonished that their child will have a successful future and so will they if they follow the instructions.  If they don’t follow the instructions, they are minded their child’s life could be forfeited.  

Here are some of the types of instructions that are given: Spend 15 minutes/day teaching the child to write backwards to develop the brain in a particular fashion.  Giving daily doses of prolonged isolation, such as dark closets, dark cellars, the corners of dark rooms. During the prolonged isolation, the child cannot turn on the lights, go to the bathroom, make a noise or anything else. The child will learn to dissociate. The child is also trauma bonded to the abuser because each time the child is let out, it is grateful to the abuser. The child can be drowned in a pool and then resuscitated--and the exact amount of time to keep the child under will be given. The child can be placed in a freezer, and again the exact amount of time can be given to the parent. 

The child is not to roam about the house freely. The adults’ area is off-limits. The child must move with permission.  Systematic punishment without provocation with the message--keep secrets. Hear no evil, see no evil, do no evil. This needs to be done several times a week to reinforce the codes of silence and the programming for silence.  A needle which is gripped halfway up is stuck into the child a quarter inch deep on the child’s muscles, buttocks or thigh to help continue dissociative behavior. On special occasions (birthdays, holidays) the hands and feet which are most sensitive to pain are stuck. When the feet or hands are stuck, they will often stick the needles under the nails. The ears are also on occasion stuck with needles. It also conditions the child to obey the commands of her handlers, who will use needles to access the minds various personalities. Various spots on the body when stuck with needles along with certain codes become access points for certain alters.  Anytime a child argues, has a temper tantrum, or gets angry the child is to be slapped in the face. This is a quick trauma. It is to be followed with a lighted cigarette applied to the child to burn the skin the second the child gets submissive from the slap. If a cigarette can’t be found, a stove top or some other hot item is to be found. At four years of age, the child begins programming to burn itself. If there are any bruises showing, the child can be kept home for a day or two.  Anytime the child becomes willful it is to have its mouth washed out with soap. The child should be made to chew off a piece and swallow the foam.  The child should be raped daily and then tortured. This helps with the sexual programming later, and begins a reversal in the mind that pain is love, and pain is pleasure. 

Some of the first memories that female Monarchs recover are their memories of their fathers raping them. This is because the programmers allow these memories to be less dissociated than the later ones where the slave may be sexually servicing an important Monarch slave handler like the Rev. Billy Graham. (Graham is covered in full in chapter 5.) 

In later situations like that, the kitten alters which do the sexual servicing will be electro-shocked to block their memory as well as given hypnotic cues. The fathers or step-fathers are often not the person who will be their master when they grow up. The abuse of this person will serve as a cover for the programming. If the person’s front alters discover they are MPD, they will initially blame their multiplicity on the first abuser they remember, which then serves as a cover.

E. Keeping the Mind in Alpha State

The entire alter system of a Monarch slave has their sleep patterns controlled. Many alters are programmed not to sleep. They stay awake 24 hours a day internally. Someone has to take the body and sleep--but whichever alters are set up to do it, they are hypnotically commanded to only sleep three hours, to insure that the mind stays in an alpha state easy to program. Because alters which do not hold the body "rest" mentally in a sense--when they take the body they are fresh.  In this way, a multiple can function without as much sleep as a normal person, but the price they pay is that their mind stays in an easy-to-program easy-to-hypnotize state. REM sleep allows the person to harmonize the mind’s inner world with its outer environment. The periods of REM sleep lengthen as the hours of sleep progress. By preventing long periods of sleep, long periods of REM sleep are prevented from occurring, and the victim remains in a more controllable state of mind.

F. Hypnotic Codes, Cutes and Triggers

When a Programmer creates something, it will be a reflection of himself to some degree. Just like handwriting and art are a reflection of the person who makes them. Understanding the connections between a Programmer and his creation could take a book in itself. The following is extracted from the history of an ancient occult sect, still functioning today. It is the type of thing, that the programmers feed their minds on, which in turn provides them the patterns which show up in programming. 

Here it is:  In the ancient occult world, at the gates of palaces the doorkeeper had to be shown "the seals"--the secret names of God or pictures with magical power, and the words "R Akiva". When the person passed this entrance, he comes to the palace of pure marble stones, do not say, "water, water." Then the person will enter into the world or the celestial Garden of Eden or the Realm of the Heavenly Palaces. The Story of Sinbad, the golden lamp and genie would be another example of an occult story that could be used. Within the Illuminati, Gematria (which is the cabalistic teachings about numbers) is very important for knowing the codes of the deep darker alters. There are several reasons for why Monarch slaves have lots of codes and structures which come from witchcraft, 

a. their programmers are witches and witchcraft is the world view on the mind of the programmer

b. the slaves are reminded of their entrapment to Satan and their cult whenever they hear their codes

c. the alters internally will work magic, even while they don’t hold the body, and placing magical structures inside facilitates this internal magic

d. using magical words makes the programming look like magick

e. the internal alters are being inculcated into occult underworld life and doctrine

A rather remarkable book is Aleister Crowley’s book 777 and Other Qabalistic Writings of Aleister Crowley. It is remarkable for the deprogrammer to understand many of the programming code links that the programmers may have used. In 777’s forward,. Aleister Crowley wrote "777 is a qabalistic dictionary of ceremonial magic, oriental mysticism, comparative religion and symbology. It is also a handbook for ceremonial invocation and for checking the validity of dreams and visions. It is indispensable to those who wish to correlate these apparently diverse studies." ( Crowley , 777, p. vii) 

Later he writes, "The book 777 has for its primary object the construction of a magical alphabet." (p. xvii) For instance, Crowley gives the Officers in the Masonic Lodges and the Hebrew passwords of their grades. In another example of the book, Crowley gives a list of the Hindu chakra points (which is well known), with the Buddhist names, and their ancient Egyptian names. This is the type of occult knowledge that is hard to come by. 

Crowley ’s List of Correspondences are perhaps the best one will find printed in the occult world. They show the correspondences that occultists make between things. For instance, if we want to know what corresponds to the Hebrew letter Dalath. The letter means door. Door corresponds to the letter 14, the Cabalistic Tree of Life pathway between the two top circles on each side of "the crown", sky blue on the Queen scale of color, Aphrodite, Venus and Freya, and the gems Emerald and Turquoise, and the perfume sandalwood. All these things correspond within Cabalistic magic.  

For someone trying to understand why a particular color, and name is given to a deep darkside alter, Crowley ’s book is helpful in some Monarch systems. The Mother-of-Darkness alters (and Supreme Master alters in males) of the Illuminati must do path working rituals when they hold the body and participate in Illuminati activities. These Mother-of-Darkness alters are placed internally in the Cabalistic Tree of Life. Crowley ’s book provides the mystic number that goes to each part (plane, or circle) of the Tree of Life and its Snake positional number. The mystic number of the Sephiroth that corresponds to the number to each of the 22 paths that must be worked is also given. The occult concept is that to achieve divinity one must go on the Tree of Life from being Malkuth to become Kether.  Although it is not the intent to propagate occult doctrine, for those who want to know how Illuminati Monarch slaves get to where they are as adults, and what the codes are in their System, then we need to cover briefly the Kabalistic Tree of Life. (More will be written about this in chapter 10 on spiritual control.)  

Let the reader picture 3 circles in a line. These three circles sit at the top of the Cabalistic Tree of Life. They are the top 3 circles of ten circles which all have names within an Illuminati Monarch slave. The center circle is "the crown" and holds the honored alter who actually is the Bride of the AntiChrist. The AntiChrist is also known as Black Saturn, and other names. Satan himself is known within a Monarch system often by the name Bilair, Bilar, or Bilid which are his cabalistic names. 

The honored alter who is married to him sits on a pedestal revolving with 2 other alters.  In the occult world, goddesses are triune: maiden, mother and crone. The one to the left of center is Midnight (the Mother figure), and the other is Morning Star (the maiden). Morning Star (Stella Matutina) may be a very young alter, rather than a teenager. On top of the Cabalistic Tree of Life will sit a pyramid. Each of the ten circles (rooms for the alters who live in them) of the Tree of Life is created with a different Illuminati ceremony.  

Before a Mother-of-Darkness Monarch slave is 16, they will have gone through all the ceremonies involved in the creation of the alters which correspond to the 10 rooms of the Tree of Life. At age 16, the system’s demons will then guide the system on a personalized pathway and a baby (the firstborn) will be sacrificed by the System. The blood of this first born is spiritually placed in a box under the Tree of Life. This is in accord with the Lilith story. The spirit Lilith (sometimes with an alter Lilith) will work with the spirits of Zerodieth and Lucifer.  There are several trees which can be placed within a Monarch slave, including the ash, the oak, the ygdrassil, the willow, and the Tree of Evil, which is an evil counterpart to the Tree of Life. These will be dealt with under the chapter on structures. This chapter will provide the hypnotic codes, cues, triggers or whatever one wants to call these words, noises, and sensory inputs that manipulate these poor victims turned into Monarch robots. Other chapters will explain about the structures these codes go to, and also the spiritual dimensions of these codes and structures.  

Another way to see things is to recognize that the programmers have created "power words" to which they have attached memory and programming. If a de-programmer observes closely the word usage of the victim, you will begin to spot power words of the abuser, for instance, "white rabbit".  A cipher is when symbols are used to represent letters. One can used letter frequencies to break ciphers. Likewise, there are frequencies to code words. The Illuminati’s intelligence agencies have programmed thousands upon thousands of slaves.

There are only so many code words to pick from and some of these code words are favorites. From the co-author Fritz Springmeier’s experience, the following are favorite code words that have been used to program slaves with: CHARLOTTE, CHECKMATE, CHRISTMAS, CLARA, CLOVERLEAF, COURIER, CRAYON, CRYSTAL DAISY, DAVY, DELLA, DELTA, DEMON, DIANA, DINAH, DIRTY, DIME, DOT, DOVE, DRAGON, DUCK, DUMBO EAGLE, EASY, ECHO, ELAINE, ELEPHANT, ELLEN, EMERALD, EMPIRE, ESTER, EUREKA, EVERGREEN FAITH, FALCON, FARMER, FELIX, FIREFLY, FIVE BROTHERS, FIVE SISTERS, FLASHLIGHT, FLOSSY, FLYING + [other word], FOX, FREEZE, FRIENDSHIP, FULL HOUSE GALAHAD, GAMMA, GARGOYLE, GEMINI, GEORGE, GIPSY, GOLEM, GOLDEN + [other word], GOOSE, GRACE, GRANNY, GREEN DIAMOND, GULL, GWEN HADES, HALF-MOON, HAMMER, HARRIET, HAWK, HAZEL, HELENE, HELIOS, HEN, HERMES, HIGH BALL, HIGH CARD, HOLE-IN-THE-WALL, HOPE, HOPI, HOUNDDOG, HOURGLASS, HUSThER, HYDRA ICEBERG, IDA, IMP, INCUBUS, INSECT, IRIS, IROQUOIS, ITEM JACKASS, JAGUAR, JANET, JANICE, JASON, JASPER, JAVELIN, JENNY, JEZEBEL, JIG, JULIET, JOAN, JOSHUA, JUDY, JUPITER KANGAROOKANSAS, KATY, KING, KILO, KITTY, KOMET LACE, LADY + [other word], LAMP, LAURA, LEAP FROG, LEOPARD, LIGHTNING, LILY, LION, LITTLE + [other word], LOVE, LUCKY + [other word] MAE WEST, MAGIC, MAJESTIC, MAMIE, MANDREL, MARIE, MARK, MARTHA, MAX, MEADOWS, MERCURY, MIGHTY MOUSE, MILLION DOLLAR, MINNIE MOUSE, MONA LISA, MONTE CARLO, MOTHER, MUMMY NANCY, NAOMI, NAVAJO, NIMROD, NOAH, NORA, NUTCRACKER OBOE, OCTOPUS, OLD FAITHFUL, OLIVE, OPAL, OPHELIA, ORION, OSCAR, OWL, OZMA PACKAGE, PAMELA, PANDORA, PANTHER, PAPERCLIP, PAPA, PAT, PATSY, PEGASUS, PENTHOUSE, PHANTOM, PHOENIX, PINECONE, PISTOL PETE, PLATO, PLUTO, POLLY, PYTHON QUAIL, QUEBEC, QUEEN, QUEEN BEE, QUEENIE, QUEST, QUICK SILVER RACHEL, RAINBOW, RAM, RANGER, RASCAL, RAT, RAVEN, REBECCA, RED DIAMOND, RED HILL, RENO, REX, RHUBARB, RITA, ROBOT, ROMEO, ROOSTER, ROSIE, ROVER, RUBY, RUTH SABRE, SAINT, SAINT + [another word], SALLY, SAN ANTONIO, SAPPHIRE, SARAH, SATURN, SCAMPER, SCOUT, SEA GULL, SEAL, SERGEANT, SERGEANT-DELTA, SHADOW, SHARK, SHENANDOAH, SHO, SICKLE, SIGMA, SILVER, SNOW + (other word) ZEBRA, ZENITH, ZERO, ZYPPER, ZOMBIE, ZULU, ZUNI."

The word FOX is an example of a significant occult code word. F-o-x consists of the 6th, 15th (1+5), & the 24th (2+ 4) letters of the alphabet, which yield 666.

The reader needs to bear several things in mind. First, the programmers generally have intelligent, well sounding codes, that do form patterns. For instance, a woman’s name from the Bible will be used as a code, with subparts or sub codes having other female names from the Bible. Deeper Illuminati parts will have goddess and god names, and king and queen names for cult alters.

These are the names the handler or cult uses--NOT their access codes. 

The codes for slaves follow patterns. There are standard and unique codes. The internal programming alters have the power to change codes if they need to protect the programming. They will have to hypnotically work with alters when they trance out at night. In other words, most of their programming of front alters will be done when a System lies down for "sleep"--more accurately described as "for trance." If the internal alters change many codes, in their efforts to protect the system, they will even make it difficult for the handler/programmer to get into the system.  Ciphers developed rotors that require lines to line up. Some simple schemes using this principle appear in some Monarch systems. This is part of the science of structuring. Intelligence codes often come from the Bible or popular fiction books. The deeper codes are occult words, often in foreign languages such as Arabic, which is an important language in the upper occult world. Slaves will be given COVER NAMES for ops, and often males receive female names and vice versa.  Very shortly, we will provide the Monarch hypnotic cues (codes) for the multitude of functions that a Monarch’s mind must carry out. The type of programming which is placed in a slave varies.

For intelligence operations the slave will have to have BONA FIDES, which are codes to allow two people to meet.

All slaves are given CONTROL SIGNS which allow them to indicate via a code that they are in trouble.

A RECOGNITION signal allows two people to make contact.

For instance, the handler might fly his distinctive sounding plane over a slave’s house in a pre-arranged signal. It might also be a particular colored scarf, and a particular set of phrases.

A GO-AWAY code is a prearranged signal that means it is unwise to make contact. The go-away signal may be simply placing one’s hands in one’s pocket or turning the porch lights off.

A "GO TO GROUND" signal means to go into hiding.

A MAYDAY BOOK exists for Illuminati and Intelligence slaves which allows them to call if they are about to be arrested. A telephone number is left open for just this purpose.  Also common universal Illuminati codes can be used by the slave to get set free from police and judges. Within the Jehovah’s Witnesses, especially their headquarters, the Illuminati uses Enochian language to program with. With Druidic branches Druidic symbols are used. With the Jewish groups, Hebrew is used. Other languages are also used. An Illuminati System can easily have 6 different languages used as programming codes. The foreign language codes will be for small parts of the System only. Special artificial languages are also employed, as well as sign language.

Monarch Mind Control Codes Contents:

A. Alpha (Basic)
    Codes to all the various basic systems:
    Alice In Wonderland:
    Cinderella Program:
    The Melting Pot Program:
    Wizard of Oz:
    Tin Man Programming:
    Body Programs Control program
B Beta (Sexual)

C. Chi (Return to Cult)

D. Delta (Assassination)

E. Epsilon (Animal Alters)

F. Omega (Internal Computers)

G. Gamma (Demonology)
  Ceremonies

H. Hypnotic Inductions

I. Janus-Alex Call Backs (End-times)

J. Theta (Psychic Warfare)

K. Tinkerbelle (Never grow up/Alien)

L. Twinning (Teams)

M. Solemetric Military

N. Songs (Reminders)

O. Zeta (Snuff Films)

P. Sample alter system codes

Q. Catholic Programming

R. Mensa Programming
S. Hand Signals 
T. Programming Site Codes (Used for Slave Model Codes, etc.) 

A. Alpha (Basic) Basic Commands (these basic commands are also found used in many slaves, although there will be exceptions to everything.)

"GET ON YOUR TOES. STAY ON YOUR TOES." means "attention slave" get ready for a command. "ON YOUR TOES--is a preparatory command that will be used throughout an entire system. "IF YOU PLEASE SIR." -From Wizard of Oz, slave says this like "yes, sir." 3-tap code for access. "FOLLOW THE SNAPS", "LISTEN AND OBEY OUR COMMANDS", "THIS IS FOR YOUR OWN GOOD" "FIDDLER" = code to take one to Never Never Land

"PUPPET MASTER" -name of master for Marionette or Puppet program

"DADDY" -master "DADDY’S FRIEND"--a user of slave approved by master "PAPA" -master, "WHITE RABBIT--master "YOU’LL SPEAK MY WORDS WHEN I PULL YOUR STRINGS." Puppet programming control of what slave will say.

"SPILL IT" --trigger command ordering slave to speak

"SILENCE" --order means keep quiet Mr. Rogers Neighborhood’s " Land of Make Believe " was used for the programming code script: "I AM MR. ROGERS AND I HAVE PUPPETS, TOO I PULL ALL THE STRINGS AND I PULL STRINGS ON YOU." Twinkling of the nose --Bewitched programming to cast spell or order on slave. "(name of alter), YOU WILL COME FORTH AND OBEY." or "...OBEY AND COME FORTH."

Another basic way of getting an alter would be simply to spin the person and call out the alter’s name, or to snap the fingers and call out the name of a front alter.

Access is accomplished for a number of Illuminati slaves by a message via phone or letter, then a looking glass person takes the system to a location outside of the house, maybe simply to the sidewalk, there the person is picked up. The left hand is then grasp on the soft part of the hand between the thumb and forefinger by two fingers very tightly. This pulls up and alter with an egg in its lap. The egg is then opened via a code and the imps inside the egg to communicate to the ribbons and the computer. Access phone calls to slaves may have high-speed codes transmitted that trigger the slave subliminally without their conscious awareness.

Access to some people is done with computer like jargon "ON LINE" "ACCESS, (then identification), (then color code), (then name)" ", "ENTER", "RUN". Some Systems have their triggers all in computer lingo such as COMMAND MODE--ALL DISK DRIVES AND HARD DRIVES... ERASE.. .FORMAT DRIVE...COPY....UNDELETE PURGED MEMORY DRIVE ..." 

Where some of the newer slave programmers are also computer programmers they enjoy transferring their computer lingo to use in controlling their programmed slaves. They may even throw in some FAX lingo such as "DIAL ALL REMOTES. . . INITIALIZATION - ATSO -OHOaM (HANDSHAKE BETWEEN ALL REMOTES), HANDSHAKE COMPLETED."

The color of the car to pick up a System may relate to the color coding of the alters to be picked up, such as white exterior, blue interior for a white alter-then blue alter access sequence.

Basic Internal Emergency Color Codes for a System, there are several different "CODE RED’s, etc. not just one in a slave, what follows is not the complete information about the Codes, although it is possible some slaves have a simplified version like this:

"CODE GREEN" --Dr. Green’s suicide programming, tied to "no-talk" programming.

"CODE BLUE" --Victim’s body freezes in motion and can’t move until another code is given.

"CODE RED" --Victim gets angry and violent

"CODE RED" -Another Code Red has the standard Monarch meaning, "serious self-destruct" program

"CODE YELLOW" --Victim gets jealous, angry and wants to violently get even "CODE BLACK" --Used to get victim’s to get on their ritual clothes.

"CODE WHITE" --Code to protect the cult members from arrest. When police see the Code White they treat the people as untouchable. There are code words for Illuminati members to tell police and judges that will automatically get them set free.

Masonic handshakes and codes also work well with judges, police & govt. workers.

"CODE 911" --To activate the slave for an emergency calling for superhuman strength. Certain alters will have extra strength.

"CODE 911 "--Also used with standard Monarch meaning of "Call your programmer/handler".

"DISARM" (3x)-to get rid of a dangerous alter two snaps + "SHUTDOWN"--to shutdown an alter.

"LET THE KINGS BE KINGS" "LET THE BANKERS BE BANKERS" "LET THE PRIESTS BE PRIESTS"--saying to justify their Master-slave relationship to the masses of humanity. The Sun setting the following day was used as a trigger for slave to forget events.

For the cat alters a certain word is given to trigger them to go "over the rainbow" after an event in order for them to forget it.

"FROM THE RISING OF THE SUN TIL THE GOING DOWN OF THE SAME" --programmed in by using the scripture.

"GO INTO THE SEA OF FORGETFULNESS" --a hypnotic structure in the mind to forget.

Waterfalls are also used as a hypnotic image to forget pain and memory. "RETYPE A LETTER" -reprogram,

"JEWELS" = programs.

"THE CATS & THE FIDDLE NEED TUNED UP--Slave to handler, I need reprogrammed. There are three words to trigger a suicide program - 

1. Bait, 

2. [intentionally left out], 

3. hook 

Another suicide program trigger is when the dominoes fall.

"GO OVER THE BLUFF" (3X)- causes suicide in some alters SACRED HEART = Catholic/Jesuit suicide program Some suicide programs are set off with a long tone over the phone along with a code no.

"KERMIT THE FROG" --a type of access code.

"KERMIT" may be a code relating to computers, because Kermit is the universal language for connecting computers together. It is a single standard to exchange files between any two systems.

All memories, traumas, and tortures are coded.

Body programs are coded. One set of body programs uses Hebrew, Greek, and Druidic letters.

A clone program creates clones of an alter (also called lollipop or lobster program) imagery is that sesame seeds fall off of a hamburger bun and becomes another hamburger.

Codes to all the various basic systems:

Carousel 532342223
Castle System 221435321
Communication 311146623 
Double Helix 432443321 
Level 211343231 
Mensa System 323542321 
Pentagram 421136113 
Pool of Death 231134421 
Puppet 341124321 
Sole metric 665421134 
Spider Web 321654321 
Stairwell 432111132 
Quabala 423454334 
Tornado 332146444 
Umbrella System 314321014

Alice In Wonderland:

The White Rabbit is a programming figure for Alice In Wonderland Programming who will allow you to go to otherwise inaccessible places for adventure. He represents the master. The White Rabbit is an important figure to the slave. White rabbit gives a wafer (coke-sugar-cocaine) to Alice and says "EAT ME" or "EAT IT AND I’LL TAKE YOU THROUGH THE DOOR" ---takes master into closed part of System, or perhaps over the rainbow.

The Queen of Hearts is also an important figure for commands in the Looking Glass World which the slave enters upon command. When a deep slave alter is needed to perform they are sent into the looking glass world where a looking glass person carries out the command--but in a way that reality is thought to be a dream. In other words, this is a preparatory command to get the slave ready for abuse. "USE THE KEY. PUT IT IN THE LOCK. TURN. OPEN THE DOOR...AND STEP THROUGH A WINDOW [or MIRROR] INTO NEVER NEVER LAND." "SOMETHING IN LIGHTENING TO TRANSPORT YOU FASTER THAN THE OL’ RUBY SLIPPERS. CLICK YOUR HEELS TOGETHER AND BE THERE IN A SNAP. (SLAVE CLICKS HEELS) ELECTRIFYING .... WITH THE RUMBLE OF THUNDER. BOLTING THROUGH TIME ... SO YOU WON’T BE LATE ... FOR A VERY IMPORTANT DATE." ( Alice in Wonderland Programming) (This is the wording to use deep alters.)

Cinderella Program:

The code word involves something said about the stroke of midnight .

The Melting Pot Program:

A very powerful program is activated by melting the slave into his master. The slave will do anything for the master with this program. The melting is the ecstasy that is occasionally experienced when lovers having sex seem to melt into each other. This feeling of ecstasy-melting is programmed to release when the master says these words, "MELT INTO YOUR MELTED MIRROR FOR AN ELECTRIFYING RIDE LOOK DEEP INTO THE BLACK OF MY MELTING MIRROR EYES. SEE YOU REFLECTING ME, REFLECTING YOU, REFLECTING ME, REFLECTING YOU, REFLECTING ME, REFLECTING YOU, REFLECTING ME, REFLECTING YOU...(cont. this several times) UNTIL WE MELT TOGETHER AND SINK DEEP... [words omitted] INTO THE OTHER SIDE." "MELT INTO MY MIRROR YOU LOOSE YOURSELF INTO THE POOL OF LIQUID MIRROR STEP INTO THE LOOKING GLASS, SINK DEEP WITHIN ITS POOL, AND STRADDLE THE DIMENSIONS IN TIME. I’LL SEE YOU THERE...ALONG WITH MY FRIENDS" "SEE IT THROUGH THE LOOKING GLASS"-- infinity mirror programming involving mirror image people (alters) "LOSE YOURSELF IN THE INFINITY MIRRORS."

Wizard of Oz:

The Yellow Brick Road is the script or programmed set of instructions one must follow. It also serves as a runway for alters to take off from their internal world and take the body. "FOLLOW THE YELLOW BRICK ROAD" There is a code to get through the poppy field (trance state). Some alters to get through the poppy field need to put on a new dress and a new image. The poppy field may be called "the field of forget-me-not". In this way it is linked to the daisies of Dr. Green. To get into the poppy field is easy, it is "SLEEP, SLEEP, SLEEP", see other induction methods on another page. "THERE’S A PAIR OF MAGIC SHOES TO WEAR WITH YOUR DRESS.. .SOMETHING IN LIGHTNING...TO TRANSPORT YOU FASTER THAN THE OL’ FURRY SLIPPERS." When the slave is finished being used they return from Never Never Land to Kansas . To do this they are told: "CLICK YOUR HEELS.. .THERE’S NO PLACE LIKE HOME." They might be reminded "YOU’RE NOW GOING OVER THE RAINBOW TO THE OTHER WORLD."

Tin Man Programming:

The Tin Man programming is all purpose versatile program for what ever the master needs done, it means that the slave is a well oiled machine. Sometimes the slave is reluctant to do a job but he is being told that he is a well oiled machine. The exact words may vary with the mission, but the following are exact words,

"LEAVE YOUR SHELL. ACTIVATE: MACHINE. COUNT DOWN ONE TO TIN...." "SOON WE’LL HAVE YOU PURRING LIKE A WELL OILED MACHINE. ALL OF YOUR MOVING PARTS ARE PIVOTAL AND GLIDING WITH EASE. MELT INTO MY HANDS. TAKE MY COMMANDS. I’LL HOLD YOUR JAW TO KEEP IT FROM SLIPPING WHILE YOU SLIP THROUGH A WINDOW IN TIME."

Program code for slave to shatter their memory of an event (used with electroshock): "MIRROR MIRROR ALL AROUND ON THE CEILING ON THE GROUND SPINNING FASTER ROUND AND ROUND ARE YOU UP OR ARE YOU DOWN? ARE YOU DOWN OR ARE YOU UP? IT REALLY DOESN’T MATTER. BECAUSE WHEN THIS MIRROR BUBBLE BURSTS, EVERYTHING WILL SHATTER." "GO KEY WEST IS KEY--several slaves have this code, related to Sen. Byrd & Oz prgmg.

GALAXY programming (for the end times) is also connected to the Oz programming. In upper level Illuminati slaves Dorothy in the Oz story will represent the Mother of Darkness alters, Ozma will represent the Ruler of the Castle, and Glinda will have the Great Book of Records. The ring of Glinda (from Glinda of Oz, p. 16) gives protection.

Body Programs Control program:

See Omega Programming- Universal Function Codes for internal system codes for body programs. Sometimes these body programs are filed with a combination of hebrew and zodiac signs. Greek letters are also file no.s of at times of body programs.

Rivers of blood -circulation control program. This program totally controls the circulatory system. The victim may think they are losing lots of blood & go into heart failure.

Octopus- strangulation suicide program The internal defenses consists in part of body programs that are triggered if the Mind-controlled slave steps out of line.

Here is a good list of some of these body programs each of which has its own codes: Auditory problems, Blood flow/circulation, Burning as if on fire, Digestive failure, Headaches-split brain, Heart failure, Histamine production, Optic problems, Respiratory failure, Sleep deprivation, Sleeping program, and Temperature change. The suicide programs that can go off include Armageddon, Clowns cutting, Cutter program "Pain is Love", Disembowelment, Drug overdose, Gethsemane, "Hypnosleep", Injection of bleach (poison), Octopus, Red Sea, Shooting Programs (shotgun, russian roulette, shooting family, etc.), War in the Heavens & Wrecking the car.

Along with the suicide programs that can be triggered are programs that jerk the victim’s mind every which way, which include:

Bee Stinging Program (put in by placing the drugged victim being near large swarms of bees humming & then letting a bee(s) sting the victim), Busy Cleaning Program, Crazy program, Flooding (from Atlantis), Isolate & Hibernate Program, Memory Erasure Program, Pain Programming, Paper Doll Program, Protection by trance, Revolving switching, Scrambling Program, and re-Structuring Programming, Tumbleweed program, Waterjar Shaking program (Ahab stomping the grapes Bible-based program making mush out of the brain.) Cutting programs are often hidden behind the Bee Swarming program. 

Alpha and Omega is a strong program. Sometimes saying "ALPHA & OMEGA" helps alleviate headaches.

DNA (This uses a lot of number codes.) This is a double-helix which is used as an elevator shaft running down through a system. Numbers are used and the names of cities to go down the elevator shafts. This programming is said to be done in hospitals.

Card Codes--(See diagram) Regular playing cards have developed from the occult Tarot cards. The four suits correspond to magick, the spades mean the power from the spear of destruction, the diamond means is a double pyramid or demonic power of wealth, and the club is a clover meaning fortune and fate, and the heart means devotion and loyalty. The four suits work well in programming because anything that is broken down in 4’s or a multiple of 4 can be coded with cards. Anything that can be broken down into 12’s or 13’s can be given cards too. Since clocks work off of 12’s, card codes work well with clocks. The suits can denote seasons. With Jokers one gets 13 cards per suit with four suits gives 365 unique symbols to denote the days of the year. Dominos can also be used on a base 13 code system. The blank will equal 13.

Carousel System: There is a back side to enter the Carousel. Carrier Pigeon (slaves who send coded or uncoded messages) and their contact codes. Birds used for contacts. That is birds in cages are often used as a sign of a meeting place. The contact would say "What did the bird say?" or "A little bird told me...,Then the courier pigeon delivers her message. ‘‘I’ve come a long long way to see you, words to say by System to John or to person to be met. There is an endless variety of contact phrases to indicate that the right person has met the right person.

Sample Code for passing drugs-"RHINESTONE COWBOY" to which the response from the slave would be "I’M NOT A COWBOY, I’M A COWGIRL." Emerald ear rings have been the visual signal to customs agents to allow a person carrying drugs through customs. (SEE D. DELTA for deeper Carrier Pigeon codes.)

Castle System: May need a special ring worn by and turned by the handler.

Flower’s Program: CSP94OYP587 --code to designate a flower tieing 3 generations.

UMBRELLA PROGRAM CODE-- "R x 4 x 5Y58876"

Sample correspondences of Gem codes:

1 - Aries - diamond
2 - Gemini - topaz
3 - Cancer - cat’s eye
4 - Leo - ruby
5 - Virgo - emerald
6 - Libra - opal
7 - Scorpio - amethyst
8 - Sagittarius - turquoise
9 - Capricorn - black onyx
10 -Aquarius - crystal
11 -Pisces - sapphire ·

Potter’s Wheel "STAND IN ORDER ACCORDING TO RANK AND SERIAL NO."- part of a stacking command to get alters in sequence together to work on them. Dominoes and cards are used as part of the stacking cues. Dr. Star’s Programming which places Pentagrams into people uses Sigils as codes--the occult symbols for the various demons, along with a color, a gate, and a number form a complete code.

For example, 1st Gate is the god Nanna, #30, color-SILVER, LADDER OF LIGHTS, GOD OF THE MOON. (see Illustration) To access a System the abusers often have an object as part of the pickup code, such as a set of car keys, a special coin token, a business card, jewelry, or certain clothes or packages. A Popper liquor drink is knocked 3 times on the table when it is served. (Who would be the wiser that three knocks is an access code?)

Word Matrices : A word-matrix code is where the victim is given two lists of words and then each word on the left list is paired with a word on the right list to form a code. Randy Noblitt, a therapist, gave an example of a basic pattern for a Word-Matrix. And this is simply quoted from his example to give the reader an idea. started xenophobe between thoughts endless beginning throughout forever get out trepidation over beneath fun execute  win lose first then form benign beginning end tonight last morning thorough the end

B. BETA (Sexual) SEXUAL ALTERS---most of the following codes are for deep sexual alters. In Illuminati Systems these are called Beta alters, in CIA systems they create Beta models whose primary function is to provide sex, usually perverted sex and S&M for the perverts who run our secret government and visible government. BETA models are those who are primary job is sexual, such as service as a Presidential Model (sex slave for a President). These System models are numbered

BETA 1, BETA 2...BETA 601, etc

Domino codes for spinners can be 6-3, 6-4, 8-4, 8-5, 10-5, 10-6, 12-7, 12-8. The 13th kitten then would be left blank. Spinner dominos have spinner kittens off of them, when a spinner domino code is used. In this case 6-2 could take you to the Beta level. "10 LITTLE INDIANS, 9 LITTLE INDIANS...", "1 LITTLE, 2 LITTLE.. ."--assoc. w/ morse code-call back telephone no.s. "3 LITTLE KITTENS HAVE LOST THEIR MITTENS..." -The Kitten alters have stepped outside of their programming and need fixed by the Master. "Hotel California" means a place to have sexual gratification. Stroking under chin along with "HAVE A BALL TONIGHT" (Cinderella programming) Stroking under the chin along with "PURR FOR ME KITTEN." Magic shoes or red slippers are used to switch to get specific sexual alters. The slippers are clicked 3x to get deeper sexual alters. "COME HERE MY KITTEN, AND LET ME PET YOU. PURR FOR ME NOW. ..THAT’S A FLUFFY KITTEN. PURR DEEP." "COME HERE LITTLE ONE."--call for young sexual alter "PASSION" used 3x with other words as a sexual trigger, such as "SHOW ME YOUR PASSION." Passion is a strong program word for sex. "RED DOT, SPIN SPIN SPIN, BECOME ANOTHER PERSON." this is said to a mother kitten before she is told which spin kitten to get from her litter. It is a preparatory command meaning "call your spinner".

Spin Kittens "WE GOTTA GET DRESSED.. .IN 5 MINUTES" along with being spun produces specific sexual kitten. 

9 lives of kittens --means 9 sexual alters taken in sequence. When spun in a counterclockwise fashion, the sexual menu is from 1 to 9. With 3 & 5 being oral sex. "Heat of hell" are used as trigger words in this programming. The 10th revolution is to beg to be whipped.

"TURN AROUND 10" "SPIN FOR ME." The heat of hell ignites after the 6th spin.

"RIDE PONIES"--means to do sex for both eng. & ger. slaves;

"PLAY HORSEY--sexual games;

"MOUNTING A HORSE"--[obvious]

"CAT NAP" --sex; "

CAT NIP--cocaine Tweedle Dee and Tweedle Dum --S&M programs involving mirror image alters. Not to be confused with Humpty Dumpty self-destruct program.

"SIX IS SEX. SEVEN IS HEAVEN. EIGHT IS GREAT. NINE YOUR MINE."--This means to fall under the master submission, has sexual overtones.

"ITSY BITSY BOOB" --access code pertaining to Betty Boob programming (which is a certain type of female behavior). For Beta alters the codes may be:

 "BETA ONE MARY A=1, B=2, C=3, D=4"

 "BETA TWO MARY A=4, B=3, C=2, D=1"

 "BETA THREE MARY A=3, B=4, C=1, D=2"

Then these might be said in combination "3412 4321 1234" (x3) An amer. sys. used w/ Latin Amer. may have a Beta alter activated by the movement of 2 small Mexican flags & a code word in spanish "USTA CA-NATA" (cream).

C. CHI (return to cult) Chi programming uses a lot of idiosyncratic phrases, and little ditties. Some of the nursery rhymes listed in the song section will be Chi programming. Some of the Chi programming has been listed in the Alpha programming section.

D. Delta (assassination). Delta alters --are activated to kill by the following three things: seeing specific clothing, items held in a persons hand, and particular words. Since these items would specific for a particular murder there is no particular specifics that can be given. Courier Pigeon Alters (In Illuminati systems--these are Delta-Beta alters).

"FLOCK" --word meaning the stable of carrier pigeons of DIA To turn a Genie free, pop a cork: "TURN YOUR GENIE FREE...POP A CORK." An internal controller must activate the umbrella or genie bottle pop the cork program to release a delta or delta-beta alter. "YOUR WISH IS MY COMMAND"

I Dream of Jeannie Programming "YOU-ARE-WHAT-YOU-READ" passbook program. Programming to remember bank numbers and other specific numbers. "I SENT A MESSAGE IN A BOTTLE." Distinctive jewelry & clothes. Emerald ear rings used as a signal to others that a message was being carried.

Emeralds mean drugs, rubies mean prostitution, diamonds (rhinestones) presidential model work. Red, White & Blue worn sometimes by presidential models. High level reporting alters forget their messages with "REFILE # #, (name of alter)." Some Systems have one name w/ several different numbers attached to indicate alters within one area and purpose. Sergeant 1, up to Sergeant 60. Or say "Access 1143 Marcy" & then other Marcys are numbered with other numbers. Spaceships & flags are assoc. w/ Sargeant alters. Delta Black Widow alters have a web, fangs, poison, eggs, and silk strand connectors. Viper is the demon associated with Black Widows, and they are programmed to re-connect their strands if all of the connectors are not taken out. Index finger pointed at head means russian roulette.

E. EPSILON (Animal Alters) These codes aren’t known. One method that may be used, for instance, is for the Raven alters who are to tear the body’s flesh, the story of Noah’s ark where he sent the Raven out will be paired with the word TWIG, and a code formed from TWIG. There are some alters which are to actually act like animals, and their codes somehow tie in with what they are.

F. OMEGA (Internal Computers) The Omega programming works along with an Executive Control Board (or Grand Druid Council) and Internal programmers. The Executive Control Board is associated with both numbers of the clock, and precious gems and metals such as " 9 O’CLOCK GOLD". The Beast computer can be accessed with Scripture triggers associated with the Vision of Daniel of the Beast, and its ten toes. The Ten Toes are important part of the code in some models.

Universal Code for Access to Internal Computers:

key manual 33123113211

program computer 22133113332

function computer 11123132221

ren computer 13321321332-55434232312 L\S 55434232312 reenlist

reprogram no.s -2231231; 4432312; 33231223

An input code is 666fff666fff666 the reverse of this code is F6F6F6F6F6F6F6F6F6F6F6.

One victim’s computer ran on code "WAR GAME". Some Beast computers have 666 666 666 as an access code and 999 999 999 as a beast back out and close out code. There are various computers--one on each level. These have some standard codes and some individual codes.

UNIVERSAL FUNCTION CODES COMPUTER CODE--5543423231 2 which hold the following codes:

abduction 4511321
anger 4213261
assignment coordinator 1613212
assassination 5332135
bank of lies 3124532
blindness 2566553
brain disorder 6325512
body gesture 1332221
body functions 4311322
call back ritual 6664113
child control 3214441
circle in fields 3332241
confusion 6643252
control 4321341
deaf 3324553
death 1451621
denial 2311444
despair 3223412
distortion 6233322
disorder of bones 4561321
disorder of breathing 5532111
disorder of eating 3342136
division 3211652
false memories 3314532
fear 2665132
fleeing 5613354
game playing 1561321
guilt 4321231
hatefulness 5331241
hopelessness 1112364
illness 1566432
infiltration 2231335
insanity 2144312
inside reporters 1133265
loyalty to group 3364112
mute 2213541
murder 3221456
nonsense 2665443
outside reporters 1132256
reprogram others 4555643
reprogram self 1133432
respond to triggers 4441221
retardation s- 1314555 m- 1314556
sabotage 1135461
seduction 2134121
self body harm 3321343
sex 2116652
shame 3122115
suicide 3113246
trigger 1324652
trigger others 4442211
zombie 3321556

Under each of these codes, other codes may be attached. For instance, under Body Gestures, the following functions are coded and a sample coding scheme would look like this:

talk verbally 3456343 touch chest 2322132 touch hair 3323221 touch mouth 5434232 touch nose 5443232

Rainbow an alter which speaks only in rhymes. Ribbons are in a box with Rainbow. A ribbon might be accessed by several slaps on the face and "Rubicon 2,4,6,8..." (3x) Hickory Dickory Dock rhyme is associated with the vortex which is tied to turning the system and also to some death alters.

Dominoes set off flooding programs to overload the person. Program numbers on some slaves are put in by touching the third eye with the index finger and speaking the number.

G. GAMMA (Demonology) In Satan’s realm, demons are fathered or split off in families like alters are. There will be a Moloch number 101, and a Moloch 10,321. The victim has alters which are numbered such as Sally 1 and Sally 10. For a better understanding of this area of programming see Chapter 10 section I. Gamma Programming includes all the demonic activity. In this section one can add the Kabballa’s Tree of Life which has alphabet codes, back up programs to regenerate, associated with Greenbaum or Greentree. In the Illuminati slaves, the deeper parts of their system are ritual and the demonology pertains to the various rituals that are done.  The following is a sampling of Illuminati rituals. The blood rituals are used to attach demons to possess alters in a particular way. These rituals can’t be separated from the programming. They are part of the programming.

Ceremonies: Assembling of the Quarter Regents Beltaine with hunts of slaves, fire festivals, and blood rituals. Bride of Satan Ceremony (Mar. 24). Demon revels. Drawing down the moon, Druid Feast Day on Jan. 1, Duels to the death like gladiators where the heart is cut out and eaten. Grail Mass the Grand Climax human sacrifice & sex rituals. Invocation of Hecate as Crone Lammas sabbat where a female is sacrificed. Pathworking (done before 16 with Cabalistic Tree of Life pathways.) Rite of Deification. Rod of Light ceremony (consists of text from Cabala, black candles, ram’s horn blown, and victim’s mother’s name sounded). Sealing ceremony at 19 yrs. for Mothers of Darkness level Secret ceremony where people paint their faces half black and half white. Sister of Light rebirthing water ceremony (victim is bound and then pulled from water and wrapped up in linen, and a green branch is place on the chest). St. Agnes Eve St. Bartholomew’s Day. St. Walpurgis Summer Soltstice Orgy. For those who are not familiar with occult terms the following are ritual items: Paten (the holy dish), Athame or Glaive (the knife used to sacrifice with), the wand or sceptre (an ornamental staff which represents authority & usually has an electric shock), and the censer (to distribute burning fragrance).

H. HYPNOTIC INDUCTIONS ‘‘Kaleidoscope eyes’’ used in hypnotic induction and spinning  "20, 19, 18, 17, 16, 15, 14, 13,...1" For many slaves the sign of satan done with the fingers puts them into a trance, and deeper alters come out. "100, 91, 82, 73, 64, 55, 46, 37, 28, 19, 10, 1 Touching the head in a particular fashion is done. ‘‘DEEPER AND DEEPER AND DEEPER DEEPER AND DEEPER AND DEEPER, DOWN, DOWN, DOWN, INTO THE DEEP, DARK VELVETY MIST, DEEPER AND DEEPER AND  DEEPER."  "DEEP, DEEP, DEEP, SLEEP, SLEEP, SHEEP, SHEEP, SHEEP" SLEEP, "YOU’RE BEAUTY WARMS MY EMBERS. SEE THEM GLOWING DEEP WITHIN THE DARKNESS OF MY EYES... IGNITING INTO FLAME... BLACK FLAME."

Seeing a Hand of Glory (severed left hand) will induct people into Peter Pan programming. (Books describing the occult use of the Hand of Glory in Ireland go back to 1830. It is an ancient practice. Baring Gould’s book Curious Myths of the Middle Ages describes the recipe for using the hand of glory as a gruesome lantern during the witchcraft of the Middle Ages.) "I AM THE SAND MAN, AND BLOWSAND IN YOUR EYES" said while simultaneously moving the hand over the face to create the illusion of placing sand in the eyes. " 3-2-1 , 3-2-1 , 2-1-1 , 1-2, 1, You are now relaxed."

Lights, in certain colors and sequences, have been used to trance alters out, for instance a flashing red light may trance certain alters out. Tunnels were used as a powerful hypnotic suggestion. Bear in mind, that people induct

a. when phys. or mentally relaxed,

b. when their senses are overloaded or sens. deprivation,

c. when their equilibrium is disturbed,

d. their motion is restricted or

e. their eyes are fixated on something.

I. JANUS-ALEX CALL BACKS (End-times) Main link to a System’s programs to ALEX coded 44334223112. Scramble code to ALEX is 34424313221. Individual code to ALEX = 55434232312. Link to JANUS coded 3323432123. Report back- X441062F  Main JANUS tracking/reprogramming code-JAN US 9341 00569XXY99632 [x3]; its back up code X44420-61F. (There is a Janis 2 computer at 666 Connecticut Ave. Washington , D.C. Disinformation by the Network is that the PACER computer equipment is called Janus/Janis).

Main AMBASSADOR code 67302986ZZ9861  (Suicide/Fire) sub codes:

Fire 97643F4200L; 

Cut 97642C42DIL L ; 

Suicide 9762354202L; 

Towards violence 97613V4203L 

Main EMPEROR - [dot, dot, dot] 79622109MM861 1 Page 83 .... End-time Activation Codes Most slaves have end-time programming. When a slave is called in with end-time programming they have pages upon pages of coded messages. A number of Monarch slaves have been de-programmed enough that they began accessing and spewing out pages and pages of these activation codes. Part of a sample of one of these is as follows: "ISRAEL IS RISING ACTIVATE 366 UNITED NATIONS  900 BLUE BIRD PILOTS RISE NATIONS IN PLACE RED CHINA CALL BACK COUNT DOWN, ACTIVATE ALEX  3.7 LC 94 CIRCLE FARMS AROUND THE SQUARE  BRITISH SOLDIERS RISE MOUNTAIN GOAT COME  EASTSIDE OF PEAK 39 ACTIVATE 52 ACTIVATE 42 ACTIVATE RED CHINA RISE 1.7 ACTIVATE THE HOUR COMES, A. C. SON  ACTIVATE AFRICA ARISE IN NUMBERS OF 90..." A team leader will have a down line of around 4 people--which are coded red ray, yellow ray, green ray, blue ray. When the activation code hits a slave team leader during the end times, they will in turn activate their people, who in turn will have people who are team leaders and have a down line. At least two false callback alarms will be sounded (tested) before the real one.

J. THETA (Psychic Warfare)

K. TINKERBELLE PROGRAMMING (never grow up/alien) Capt’n or Cap’n (captain) represents the programmer in Peter Pan programming. Tinkerbelle is a young alter created under Peter Pan programming. ‘TRANCE DIMENSIONAL TRAVEL RIGHT FROM YOUR OWN BACKYARD. THE DIMENSIONS OF YOUR PYRAMID ARE TO BE 9 BYE 9 BYE 9 BYE." Alien programming by NWO (also involves Peter Pan programming): "RIDE THE LIGHT" -Peter Pan programming meaning to go into hypnotic induction attached to a light that is seen when given a high voltage shock. This is given to make experiences seem like in another dimension.

L. Twinning (Teams) CROSS PROGRAMMING-- (With for instance a mother and a daughter team) Two seals are placed on this cross programming, a "seal of cover" and a "seal of rain" Code: mother - [minus] mother = 3/4 -  daughter holds 1/4 daughter - mother 1/4 - daughter holds 3/4 Teams will be given code words for each alter who is part of a 2-System team. One System may serve as a father figure to the other System. Teams will be trauma and sexually bonded, as well as having mirror images with each others names. A leader will have an upline and a downline for the colored rays. A leader will call the different colored rays, to activate their programming. An Illuminati team ritual to create oneness & open their team boxes up to work together (Illuminati twinning ritual): the team kneels face to face, draws a magical circle on the ground, joins Delta team hands forming a clasp ring. (Blue is associated with this.)  Then they all say,  "Star within a star Circle within a circle  Mind within a mind  body within a body  Soul within a soul"  Then the team places Palm, their hands Palm to Palm, and then speak 4 times, "Bone to Bone flesh to flesh Spirit to Spirit Forever together- never apart." Then a 5 pointed star is traced in the air. To close the Delta team twinning box, the reverse is done. Then other things are to be said in the joining and opening ritual. A double deck of cards is used to program an Illuminati team of "twins". One type of Criss-cross programming involves 1. a flower, 2. the stem, & 3 the root. The root involves blood sacrifices. This programming ties two generations together such as mother-daughter.

M. Solemetric Military

N. Songs & Nursery Rhymes Songs & Nursery Rhymes Used As Triggers (note all of these songs have been used on other slaves too.) Songs with Monarch programming meaning & access parts soliciting behavior or thinking include:

Nursery Rhymes  Brahm’s Lullaby  Hickory, Dickory Dock (flips the system)  " Hickory , Dickory Dock, The Mouse Ran up the Clock [computer], the clock struck one [time for system rotation], The Mouse ran down, Hickory Dickory Dock." "INTO THE MOUTH [vortex] RUNS THE MOUSE, AND FLIPS THE HOUSE [turns the system over). Froggy Went a Courtin’ He did Ride  Hickory, Dickory Dock  I had a little pony  I’m in Love With a Big Blue Frog  Jack and Jill  Mary Had a Little Lamb (call to ritual connotation)  Tones of "Mary had a little Iamb" or other telephone created tones, such as high pitched noises to call people to meetings.  Mary Mary Quite Contrary (reminds the slave that abusers are all-seeing)  Old King Cole (Old King Cole was a merry old soul, . . . he’d call for his masters 3 [the 3 programmers])  Peter, Peter Pumpkin Eater  Puss in Boots (this story is porn programming)  Ring Around the Rosy  Ten Little Monkeys Jumping on the Bed  Three Blind Mice (omega programming connotation with hour glass)  Twinkle, Twinkle Little Star (Sometimes associated with "I’m dead.") 

Songs (Most of the Beatles’ songs were used for programming. Charles Manson was programmed with Beatles’ music. The programmers know ahead of time what are going to be the next hits, and they regularly call in slaves and hypnotically make the lyrics to be cues for the slaves before the music comes out. For instance, the lyrics of "Ain’t that a Shame" will make certain alters angry. For another slave the lyrics "Everything is relative, in its own way" reminds the person of the cult family & obedience.) Angie (popular song for programming)  A Mighty Fortress is Our God  Back in Black Blue Velvet  Butterfly  The Candyman Can (Candyman represents drug use for Monarchs, plus other things.)  Christmas Carols (Christmas carols were used a lot on Monarchs.) 

Country Roads (song with the programmed meaning take me [the slave] "home" to a meeting site.)  Crazy (to reaffirm loyalty to the master)  Deja Vu  Die Walkure  Fire and Rain  Frere Jacques (Catholic "Father John", sexual abuse connotation)  Get Me A Ticket on a Fast Train (substitute "master" for "baby" in song)  Grandma’s Feather Bed  Ghost Riders  Green Green Grass of Home (go home program, slave is not happy ‘til they go home to green fields  Greensleeves  Hallelujah chorus (many Christian songs like this one are played while the victim is tortured.)  Handel’s Messiah  Have Thine Own Way Lord ("thou art the potter, I am the clay, mold me & make me..." III. Charismatic slave programming.)  Heartache Tonight (song used to announce a ritual over the radio) 

Hotel California (sexual/ritual connotation, the song says, "go to the chamber of the Master’s Feast, We are programmed to receive." This song also tells the story of how LaVey started the Church of Satan in 1966.)  I

Surrender All  Imagine (John Lennon presents the New Age script for people to be "nowhere people.")  John Brown’s Body  Lucy In the Sky with Diamonds  Little Red Riding Hood (song played with hunts of slaves)  Mary was an only child (from Art Garfunkel’s Angel Claire album)  Moon River  Over the Rainbow (obvious Wizard of Oz programming)  Playing with the Queen of Hearts, knowing that it really smarts, the Joker is the only fool who’ll do anything with you" (reinforces the warning not to play (tamper) with the programming. The Queen of Hearts is the emergency Mayday signal to a handler. To play with this will really smart-hurt.  National Anthem  No More Mr. Nice Guy  Revolution 9  Rivers of Dreams (by Billy Joel. words are about "walking in the dark, going through a river.. .turn on the light on your internal world."  Satin Sheets  She’s Leaving Home  Sins of the Fathers  Southern Nights (loyalty to the programs--the leaves and trees)  Stairway to Heaven  Teddy Bear (Programmer, helpless teddy bear slave connotation)  Tennessee Waltz (handler is "forced" to prostitute slave)  The Blood Will Never Lose Its Power  Tom Dooley (suicide, "hang down your head Tom Dooley, hang down your and...)  Victim of Love  When you wish upon a Star  White Rabbit (Alice In Wonderland Theme--made into a triggering Karaoke CD.)  Wooden Heart  Yellow Submarine (drug connotation) 

O. ZETA (Snuff Films) Zeta is the sixth letter, and it’s ancient meaning was a sacrifice.

P. Sample Codes for Alters of a Hypothetical System Named Mary  These codes are purely a representative model-not any particular real system. The overall system code at times consists of [birthdate + programming site codes + birth order + number of generations family was in the Illuminati.]  For our hypothetical system Mary we have the hypothetical system code of: 6-13-51- 14 -02- 12. In order to give the codes for a hypothetical alter system we will have to explain some things as we go.  The Programmers have for each slave both medical programming files, and a grey or black binder with the programmed access, trigger, codes & cues, & structure. A typical Illuminati system will be a cube (although spheres and pyramids are also used). 

The principle alters will be the "a" alters.

A typical section of alters will consist of a 13 x 13 grid of alters. These are alters who live in a world together and must function together. A 13 x 13 section will have 13 families of "a" through "in" alters. The "a" alters will be the primary alters that the Programmers will interact with.  The Programmer may call up an "a" alter and ask it to go get the "c" alter in its family, rather than directly asking for it. This initial page of alter codes will be the primary or "a" alters.

If we are dealing with a 13 x 13 x 13 cube of alters, then the initial page has 13 "a" alters of each section. Each of these alters will have an access code which will often include the following components: An Assigned Color + An Alpha Numeric Code + A Personalized Magical Name. This will equal 1/3 their access code.  These code words must be repeated three times to pull the alter up. However, if an alter is trained well, and hears his master’s voice, an alpha-numeric code can pull the alter up.  For many of the alters, the reversal of their access code puts them back to sleep. This is an important point, because some alters would be dangerous to leave in control of the body.

The "a" alters are regular alters. Many of them have been hypnotically age advanced to see themselves as teenagers or adults. Sometimes "b" and "c" alters are also aged. The "d" through "n" alters are generally left as they were split and most of them are infantile, with little concept of how old they are.  The little ones will be the ones who often remember the programming very well, and know things about the system. The top alters will also sometimes receive personal names from their handler. This is in addition to all their codes. If the alter is responsive to its master, the personal name might pull the alter up too. Do all of the alters get charted?  There are several groups of alters which get charted separate from the rest or don’t get charted at all.

Because of the competition and distrust between the different programmers, they often place in secret back doors into the person’s mind that only they know about. Worlds of secret alters loyal and devoted to the programmer may be built into the system and not appear on the regular charts. The core, and some of the primal splits from the core will not appear on the regular grids. They will be placed on a separate sheet, and their codes will be in some magical language.  The Illuminati commonly employs 20 magical languages, and Hebrew, Latin and Greek are also often used for charting the core and its primal splits. Enochian is a good example of a magical language used by the Illuminati.  Some alters will be created solely by the slave in order to cope with life. For instance, say the slave is travelling with someone who is not a handler, but who is a dangerous person. This dangerous person murders several people and forces the slave to help. The slave is likely going to have front alters out, and they are simply going to have to create new alters to meet the demands of the situation. These alters made to deal with one-time emergency will just slip into cracks in the system.  Lots of odds and ends alters end up in the nooks and crannies within a system just detached and floating. The programmers and the victim work hard at structuring and cleaning up things--but the honest truth is that trauma-based mind-control is messy. Any time you shatter someone’s mind into thousands of pieces with horrendous torture, you have a shattered mess, in spite of the good fronts that the programmers are able to construct.  Some of the more elaborate access methods are for alters that are not on the "a" chart. Hour glass alters have entire sentence access codes. Deaf & blind alters need their access code signed on their hands by moving their fingers up and down, etc. End time alters may have access codes that may entail reading an entire page. Reporting alters are often small children, that are hidden in each section, and may require slaps to the face or jabs with a needle to pull them up. Spinner kittens will be accessed via their mama cat, who acts like a Madam in a "cat house". The codes for this was given in the Beta section codes.  The reader will be given the hypothetical codes (which resemble closely the actual codes of an actual scenario) for our hypothetical Mary.  A Sample Chart of the "A" alters--these are the primary alters-- has been prepared 4-4.gif in the same fashion as it would appear in the handler’s 3-ring binder.  Mary’s Core Protector 1 will have a shutdown code of "REVERSAL 1 BEGINNING" and the second Core Protector will have the shutdown code of "REVERSAL 2 CREATION". Of course, these codes are said 3 times.  The first three alters on the far left section at the top of the chart are Silences who can be woken up by singing. Also at least one of these, will wake up by a kiss from the prince (programmer) to the third eye area. The first alter can be shut down by "COSMOS 15 31 06 2BAB PINK". One of the groups of alters attached to one of these early alters is "MA.C3.10-53 Rejects (7) 10-53". To shut this alter(s) down just say the reverse of the access code. A mirror image of each of these alters exists too. The mirror images can be pulled up via a three step process.  The birth memory in our example will be coded as A5 10 79. The spider torture memories that are attached to these alters is A5 10 79. The reader will notice the following on the hypothetical chart on the previous page for the first Section (which is numbered 6 to be deceptive): This section is front alters.  Basic code pattern = color + Genesis + no. [1 thru 13] + letter [a thru m]. Individual codes 1st section general-"N.I.F.6", 1st section mother Eve "EV.E5 10 51 ACE" (Eve is the balancing point & the ace code is high or low). The alter Explorer is "EI.G7", Mammy "MI.H8", Angel "Red, AI.19 Jack Genesis 4" (or it could be done "red, AI.J10 Genesis 4"), George "Silver, GI.K11 ", Zsa Zsa "gold, ZI.L.12", and Shadow "Clear SI.M13".  You won’t find on the main chart codes such as: Eve’s memory "EI.D5.2.1952 ACE" or the Infant alters-- "1-000 10-49 REJECTS 3-9" The master may say for example: "Green GENESIS 1-A" (3 times) to get this alter which is the balancing point.  Fragments/dead alters were dumped into areas named concentration camps and given the names of the famous german concentration camps. The camps were placed under the Mt. of Olives . Fire or Bomb children are found throughout the system and are triggered to come up by programming. They come up behind other alters and make them burn. Some of this level can be woken up by saying, "It’s time to wake up in the morning" (7 times), which is in contrast with most codes which are said 3x.  Another way to look at it, is that the alters are on 4 dimensional structure and they require a 4-dimensional access code. Height, depth, width, and color are the four dimensions. This breaks down for this 1st section as: COLOR (4th dimension) + Genesis (Section code) +1 (level) + "a" (depth).  The following message will be used on the phone for this System’s recording machine, this example has been used nationally. "IF YOU WOULD LIKE TO MAKE A CALL PLEASE HANG UP AND TRY YOUR CALL AGAIN. IF YOU NEED ASSISTANCE, PLEASE DIAL YOUR OPERATOR. CODE 911." This will cause section 1 or section 2, etc. to call their master. Also, standard Illuminati Hand signals work with Mary. "ALONE AND CRYING (3X)"- is a code for a few special parts not on the first grid. Section 2 gatekeeper alters. Basic code pattern color + Revelation + no.[1 thru 13] + letter [a thru m] In our hypothetical example: "ORANGE REVELATION 4-A" (3X) However a shortcut is "REVELATION 4" and the primary Revelation 4 alter will come up. "ORANGE REVELATION 4 B" would get a small child on the pedestal with Revelation 4a.  At times the handler will say "THE DECK IS DOUBLE-DECKED" in order to activate the clone doubles of all alters in a particular area--such as the front area of the system. The clones are tied to the Pink Room of the dollhouse-looking computer. Since alters are also coded to cards, a FLUSH will pull up an entire section. Special alters who skinned men alive are kept in black holes in Section 2. They are special trauma alters created solely by the victim as a safety measure.  Section 2 computer (like all levels) is empowered by an emerald blue light. This power source was deactivated by unscrewing the light to the left (which took it physically out so to speak) and then saying "PEACE BE STILL" (3X). If "PEACE BE STILL" is not said three times then the War in the heavens program kicks in. Also "DAD WEEPS OVER HIS CITY" must be said when deactivating the computer otherwise the "children" (alters) become sick and everything kicks back in--which it does eventually anyway if the deeper computers are not deactivated or taken out. Section 3 has programmer alters & fragment armies, not to be confused with the clones which hide everywhere. The clones, by the way, can be identified with serial no.s at base of head gear such as 151.00 [system birth date]. This sections has 3 faceless Programmers called the 3 adepts of Atlantis. Each of them has a different color of hair. They may also be the commanders of armies--the commanders of the Egyptian armies have names Ra, Horus, and Set. Section 4 alters are Entertainment alters. Basic code pattern = Color + double number + a name of a one of the 13 tribes of Israel + the number of the alter again (3x) Example: BLUE 2001-13A REUBEN 1 (3X) However, the color doesn’t always need to be said it is a sufficient shortcut to call the alphanumeric code three times. Second example 2002-12A SIMEON 1 (3X). The numbers of the 2000 code go up while the corresponding number 13 to 1 go down. In other words it is a double code. The Tribal names are arranged according to their Biblical birth order. Mother Kitten 8,10 and 12 have ten spinner kittens underneath each of them. To get a spinner kitten, one gets the mother kitten and then has her in the proper position which is the over-the-rainbow mode. The choice of what spin kitten to get is "WE GOTTA GET DRESSED ... IN 3 MINUTES." 3 minutes means spinner no. 3. Specific instructions such as "PURR FOR ME KITTEN" gives the abuser fellatio. Tweedle Dee & Tweedle Dum is a S&M program. "5 FIDDLE" and "FOLLOW THE YELLOW BRICK ROAD" are important for the slave to follow instructions. The alters will be sent to never-never land where what they do is unreal.  Some kitten alters are keyed to pop out if certain areas of the body are touched, such as the space beside the big toe, or the thighs. A handler will also have standard hand signals for things, such as putting his hands on his thighs to mean "Come here and take care of me, Kitten." "COME KITTEN, TO PAPA COME" "BLUE TOPAZ" serves as 4 keys. Pisces is associated with Blue Topaz. There are also 4 keys which are: silver shoes, sun bright, birds singing, and yellow road.  Section 2 & 1. Reprogramming sections. At this point, the computer codes given previously apply, SEE OMEGA CODES on previous pages. The first major computer services the top 6 sections and has a red room, a closet, a pink room, as well as other rooms. Actually the computer should be set in at Section 0, which would break up the grid evenly, but since our Mary is hypothetical we put the front main computer at section 1. A system like this will have 13 computers/1 per section and 5 computers which set between pairs of sections, which join a pair of sections together, and then 2 main computers. This means a System like Mary’s will have 20 internal computers.  With all the codes and a fair understanding of the alters in a section, it is a good day’s work to shut down a computer. Before one could possibly get all the section computers shut off, they would reprogram (reboot) themselves back up. Computer erasure codes include: "FULL HOUSE ACES HIGH. ALL TRUMP. FULL HOUSE ACES LOW." The drawers in the dollhouse can be pulled out with "ROYAL FLUSH"(3X). Another code is "PINK SECTION 5. FULL HOUSE. ACES HIGH. 2 DEEP." A partial code to a computer is ".... . .8-9 RED."  Our hypothetical Mary might be accessed by a woman who taps on the shoulder and says, " PHOENIX 360 [tel. area code], OUT OF ORDER". The library alter has an important access ring. A "Button Bright" alter type works with the librarian. The dwarfs are accessed by "ISOLATION + no."  Judges which sit on the council give warnings to alters "CAT EYE AT THE DOOR." This reflects the programmers’ control. The judges have the "Keys to the Kingdom." "MR POSTMAN WAIT AND SEE" indicates a message from the master.  Ribbon alters have the names of archangels. Silver cords are attached to the ribbons.  Section 0. Mothers of Darkness alters. basic code pattern = SILVER + LEHTEB [which is bethel or house of God spelled backwards] + [who knows what else] + a blue topaz ring being turned on the master’s finger a certain way. Green is a sensitive color for this System. Some alters may be accessed from certain areas in the System via 4 tones, and others by pin pricks at certain locations in the body, along with their verbal code. The Reporting alter can be accessed by repeated slaps across the face.  There is Ultra Green Section tied to the Cabala (Green tree). The Library in the big castle, which is guarded by lions and other big cats, has a passage way in it to a second world. Codes with the Cabalistic Tree of Life involve Cabalistic magic and its symbols. This section is guarded by a hostile entity. Certain rings, topaz, quartz, diamond, ruby, black onyx etc. are used for triggers. Certain rings are needed to get into certain parts of a System, such as the castle. To access the Mothers, the Black Onyx ring must be rotated. The programming of a ring may go something like this, "This ring fills Daddy’s house with stars.. .Catch a falling star, put it in your pocket." Section 9. Delta-Beta alters. Kept in a genie bottle. Obviously something is rubbed to get them out. "BUTTON BUTTON, WHO’S GOT THE BUTTON, BUT ITS THE KISS OF DEATH" This code is involved with the "good witch" who kisses upon the forehead. Buttons are on the boxes of Programmer Green and are constructed onto the boxes so they can be used to open the boxes up. Section 7. This hypothetical system also has a series of codes based on gems--ruby, diamond, etc. which have numbers attached to the codes. An Hour glass w/ 12 disciples like grains of sand tied to Jolly Green Giant programming which have sentence access codes. Each sentence is a phrase of satanic philosophy. The bottom level is called the Hell Pit and contains the City of Petra . The City of Petra has an erasure code. "YELLOW - CUTTER ROOM 7 SECTION 7---ROYAL FLUSH--LA CUTTER EGGS"  Invisible field section 7. Room 7 --cards has eggs with demons. Lacutters are like imps and are invisible. They are assigned to guard various things in the system including the cutting programs. "Dad" "Catch a falling star". Main computer protected by deaf and dumb alter using a sign language equation as its access code and the reversal of its access code is its shut down code. The Brack Master is a Master Programmer. Each of the 13 sections of 169 alters (a section is a 13 x 13 grid of alters) will then have a computer assigned to it. The computer is made up of dissociated parts of the mind--which are like alters, but have not been given histories or names. Each section has a computer which makes 13 section computers. Section 1 and section 7 (see the grid chart) are main computers. The first is the main computer for the top half, and the second is the main computer for the bottom half of the System.  The second main computer is in the hell pit, and has been put in at the lowest level of the mind. Section 6&5 computers are connected by a connecting computer, as well as 4&3, 2&1, 0&12, 10&9. This makes 5 connecting computers. In total then we have 13 section computers, 2 main computers, and 5 connecting computers, for a subtotal of 20 computers.  Since things are being built on the basis of the magical number 13, six more computers are installed which are decoy or false computers for therapists to work on. This makes a total of 26 computers (or 2x13). Since there are 26 letters of the alphabet, this lends itself well, and each computer is assigned a letter of the alphabet. Since the computers are put into the slave when it is a young child, the child has just learned how to count and say the alphabet. The Illuminati has been using a large dollhouse with 26 rooms using 13 colors of paint, giving two rooms per color. Each room is a computer.  In accord with the practice of double coding, each letter of the alphabet is given its sequence number, so the names for the computers are Al, B2, C3, D4, E5, F6, G7, H8, 19, J10, K11, L12, M13--the thirteenth is assigned the 1st main computer. N1, O2, P3, Q4, R5, S6, T7, U8, V9, W10, X11, Y12, Z13. Rather, than use the number 13, the number 0 will be assigned, thus changing things to M0, and Z0. This is simple enough for a child’s learning mind, but difficult enough that it serves as a viable code.  As codes are assigned, the bottom of the alphabet is assigned the top (front side) of the system. The middle point MO, is the normal access point for all the computers for the handler. The code for this is associated with the name of an airplane hanger, so that the concept of taking off into the sky (trancing can be associated with it.)  Each computer needs an access code to go along with its alpha-numeric name. A deck of cards lends itself well to a code of 13. Bear in mind each computer has a color assigned to it. Colored scarfs and dollhouse rooms were used with electroshock to teach the child his color coding. When the programming is going on trance depths and runways(mental image for flying off into a trance) and the structure of the System will all be tied together in one neat package.  Everything is built on its own x-y axis. Each 13x13 grid has the middle rows both vertically and horizontally set up as runways. The x-y axis also makes up the hourglass lines or the butterfly wings. Both images are used with slaves. Because thing are set up in thirteens in Mary’s system, and things are double coded, thirteen becomes 13-1 and one is 1- 13. This allows us also to link 13-1 and 1-13, so that everything becomes a circle. The circle within a circle, box within a box concept, triangle within a triangle situations makes the slave feel he is trapped in an infinity loop of programming that has no end and no beginning. 13 and 1 make 14.  An entire deck of cards can be used in a double code that also adds to 14, such as the 8 of spades and the 6 of diamonds, or the Ace of spades and the King of Diamonds.  Here then is the codes for Mary’s computers. Two cards from opposite suits that add to 14. Since a deck of regular playing cards came originally from Tarot cards, the playing card used as a code also carry some occult significance to the codes. It is also training the child who is programmed this way to be interested in cards. And everytime the child plays cards they will reinforce at an unconscious level their computer coding. The computers will then have programs set in on 13 x 13 quadrants. Quadrant 6.6 will have a program such hopelessness. Other quadrants may hold aloneness, recycling, cold, heat, burning, cutting oneself, pulsating loud heart beat, and hundreds of other programs. These programs have the type of codes assigned them that are given in the Universal Function Codes. Many of the functions can receive a standard code, but other items require individual codes.  Telephone tones are frequently used to be able to key in (that is access or trigger) parts of the computer program matrix. Dominoes also are used for the computer programming. The dominoes are put in so that the programmers can get a dominoe effect, if they want to set off a series of programs. Dominoes and flashing sequences of lights were used to train the child to automatically respond to a certain pattern of dots.  Our hypothetical Mary will also have hundreds of other codes for all kinds of miscellaneous things such as the following random codes: "RUBY RED LIPS" "TO HAVE POWER" AND "TO BE THE POWER", which are also found in the Tall Book of Make Believe in the Shut Eye Town . Dominoes help with the code: "2-4-6-8 WHO DO YOU APPRECIATE?". More examples are, "I LOVE DADDY." "JACK BE NIMBLE JACK BE QUICK 13-1 12-2..." "PUMPKIN HEAD--an access code. To go away- "Ta RA RA BOOM-DE-AYE","CRYING OVER YOU (3X)", "SILKEN GIRDLE"-- a golden caterpillar plays a bittersweet tune. A gold pocket watch with Roman numerals is associated with the words "Eagle on it."  When Mary gets scared and begins to get into revolving switching, sometimes spinning can be slow down by saying, "10--YOU ARE SLOWING DOWN 9--YOU ARE SLOWING DOWN 8--YOU ARE GETTING SLOWER AND SLOWER..." A system’s coding is a reflection of their programmer. If the programmer is a pilot which many of them are, then they may have pilot lingo in their codes, such as the system may be turned by pitch & degrees. If the programmer is a sailor the system may have nautical codes, such as "RED RETURN RUNNING’’ , ‘‘ SAFE HARBOR ’’ (for ‘‘Home’’), and DOWN RIVER (away from "Papa").

Q. Catholic Programming (by Jesuits etc.)

KEYS TO THE KINGDOM = world domination by mind control. 

VOW OF SILENCE is a keep quiet program activated by "THE WALLS HAVE EARS & THE PLANTS HAVE EYES SO YOUR SILENCE IS TANTAMOUNT TO SUCCESS."  This is explained to the victim that the sea shells and the plants have the ability to hear, and that a sensitive occultist (programmer) can psychically pick up what the plants and sea shells hear.

"MAINTAIN IT" --is a command to maintain the Vow of Silence 

"MAINTAIN IT & LISTEN."-- a command to keep silent and listen to a command.

"ENTER INTER INNER DIMENSION TWO" - this is a standard Jesuit infinity program (2 is a sacred voodoo no.)

R. Mensa Programming (by MENSA) "17 211346" is an Illuminati code meaning a Mensa layer Sample Mensa codes: "727 + E=MC SQUARED + 3.141 5962 + PI" "A+B=C, B+C=A, C+A= B" "TIC TAC TOE + C CROSS, PI CROSS" The MENSA codes are sequences of 6 numbers.

S. HAND SIGNALS

Miscellaneous Common Signals

Finger to forehead-- 

One ring finger bent at 90° --access wave Rotated pencil--with certain words--rotates the system 

Finger swung the counterclockwise way closes portals. 

Right Fist to forehead--OBEY  

Fist with right hand cupping left hand, the left is like the letter c, and the thumb is outward and the fist inside, the left hand then moves 3 times over the knuckle--access signal 

Left hand of slave laid on top of handler’s hand-sign of submission 

Hands behind back of head--I’m master 

Right Hand with thumb & index finger making an L shape on chin/check  Hands on inside of thighs by handler--come to me Kitten and service me.  Hands locked folded interwoven backward--you can’t break "the circle"  Handshake with index and middle finger held straight out--"You are one of us." 

Grip called the lion’s paw--access greeting opening and closing the hands or large circles with index finger opens portals.

Palms rubbed together counterclockwise 

Kiss on center of head--kiss of submission of slave to handler 

Palm of hand touched--sexual access point for some models 

Sign of Satan-- Hail Satan! used for Monarch & Illuminati Mind-controlled slaves as an induction.

The alter who is holding the body goes into trance, & a deeper one replaces it. 

Thumb twiddle--rotating the thumbs around with the two hands clasp--S&M  Touch of center of forehead--access point 

Vulcan Peace Sign--llluminati/occult greeting Wave with Finger and thumb together-other digits extended 

Winks at the system were used to convey meaning.  Life "Over The Rainbow"- After indexing & rereading this book, the co-authors realized that we had not explained "over the rainbow." Some alters live "over the rainbow" and some do not. Both types will use the term "over the rainbow", but with different meanings attached. For those who live "over the rainbow", they serve their masters in such a deep hypnotic trance that they perceive reality like it’s a dream. When their memories surface they are so unlike normal memories that a system in therapy may not know what to do with them. They have been described as similar to the pictures in the old T.V.s when the vertical hold would go out of control. 

Deeper alters, who live "over the rainbow" experience memories/life in the following fashion: faces & porn cameras are airbrushed out of their memory, distinctive marks in the perpetrators such as scars & wrinkles are airbrushed out, colors & lights are very bright due to the total dilation of the pupils while in deep trance, and there is no sense of time for these alters. These alters are trained to "TRANCE SEND FORWARD THROUGH TIME". By understanding the programming, the codes, & triggers, those alters who lived "over the rainbow" can recover from the mind the full memory, without the distortions created by dissociation.

T. Partially Correct Programming Site Codes 

The following site codes are not totally accurate. Also, the Intelligence groups use that what are called Cryptonyms, which are two-letter digraphs such as the "MK" of MK-ULTRA. The digraph can indicate a type of operation or even a location. An operation may have CODES.  The following site codes are not totally accurate. Also, the Intelligence groups use what are called Cryptonyms, which are two-letter digraphs such as the "MK" of MK-ULTRA. The digraph can indicate a type of operation or even a location. An operation may have its cryptonym changed in the middle of its operation. Programme Programming Zone Area/Code

Armstrong 63 94XCCD 
Astor 36
Florida 59XCBB
Bournell-Hightower 19
Brown 30 59XBMN Burcham 329
Texas 92XBMM
Gaston 61
Colorado 1XCDF
Haggin 743
Kentucky 47XB0
Harrick 263
Colorado Springs Johnson 95
Mannass Mentor 21
Colorado 61XBXX
Nathan 56
New Mexico
Owens 963 106XBJK
Pantu 71
Kansas OliXOEG
Patterson 117
Kansas Savior 49
Major Strange 14 1Z440x72080020366
Strong 52 81XCBC
Suttenfuss 103
Colonel Taylor 16
Kentucky Weir 561
Texas 33XBCB

G. Hypnosis in Programs, and Other Uses

 The programmers will begin their programming by extreme torture. After a certain amount of torture the victim is willing to say or believe anything to stop the torture. At this point a thought will be planted into the victim’s mind. This thought will be linked to a false memory put in via hypnosis or movies, or other method, and it will be linked to a command put in by hypnosis etc. and the original thought, the command, the false memory will be linked by a single emotion which will link them all together.  The result will be something like this: it is two weeks before Halloween (thought), I must get ready for Halloween rituals (command) because I have always had a habit of going to Halloween rituals (false memory). If I don’t I will have a heart attack and die (memory of torture linked to thoughts). Programming is layered in. Layer after layer of programming is put in. Each alter (personality) of the victim is used as if it is a component of a large system. The result is that no alter (personality) is the whole, but only a cog in a great machine. Can a single cog rebel against the whole machine? It is very difficult for a single component of thousands of components to rebel against the abusers.

Alice In Wonderland Programming as it Pertains to an Alter Going Down in Trance for Internal Programming

Alice In Wonderland Programming: going down the tree, going through the mirror, going underneath something or growing tall. The internal programmers (and some other alters) have the ability to send other alters into deep trances. One of the programs for doing this is based on the Alice In Wonderland Theme and it was experienced like this for a level 2 alter who managed to stay in communication with her deprogrammer: When the alter went down in her mind she went down on the inside of the trunk of a tree (like Alice In Wonderland). At the bottom she saw a keyhole, a table, and on the table was love potion #9. She automatically drank the love potion which shrinks her to a dot and then she goes through the keyhole. So normally this process means she goes through the keyhole. She managed to stay in contact with her deprogrammer during this deep trance. After the key hole she saw thousands of looking glass mirrors. Everything got smaller as she went down the tree. She became a dot. She drinks love potion no. 9 and comes back with it. A tree comes and wraps itself around her and loves her. As she ascends (comes up in trance) she stretches up and enlarges. In coming up out of trance she gets stuck at level 8 due to some interference from deeper alters. She, in accord with her programming, senses her Master’s love. (Normally she would have simply tranced out, and another alter would have taken her place and she would have no recollection of the entire process.  The alter has been programmed to have backup amnesia. Backup amnesia means that one doesn’t remember that one lost time, one doesn’t remember that one forgot, etc. In short it means you don’t remember that you don’t remember.) This is an example of hypnosis used internally by the programming and the Programming alters to control other alters. The deepening of the trance was given the imagery of Alice falling down the tree. In the various stories used in programming, there is some part of the story that can be used as the story line for trance induction, these include:

Wizard of Oz--going into the poppies 

Star Wars--time warp, riding the light 

Star Trek--being beamed, replicators etc. 

Hypnosis is used to anchor suggestions about sleep patterns, panic programs, phobias, health healing programs and health problems programs, pain control and pain programs, motivation programs, a suicide program called "hypnosleep", an insanity program, and countless other uses. 

Hypnosis is used to steer a person’s mind in the direction that they have been labeled. For instance, if they have been selected to become a doctor, they will be programmed for success as a doctor. New patterns of thought, feeling and behavior are inserted to build confidence in the goals of the Illuminati.  Positive experiences are used to help boost the person’s feelings, and then the new messages are anchored "imagine these messages taking root. Your new messages are growing stronger and stronger." 

The Alice In Wonderland programming theme is used in air-water programs and mirror programs which the Illuminati, the CIA, NASA, the Jesuits and others like so well. The idea is that there exists a mirror world which is a reversal. Along with it is attached the idea that the slave can enter into a timeless dimension of time, or as some refer to it "interdimensional time travel."  

Later, the victim will be further brought under the spell of this mirror programming by going to locations around the nation, like the Magic Time Machine restaurants in San Antonio and Dallas , TX where mirrors are placed on doors, ceilings, walls, and restrooms of the establishment and programming themes are part of the everything at these restaurants. The handler may tell the slave, "LOSE YOURSELF IN THE INFINITY MIRRORS."  

When hypnotically programming in programs, the Programmers place in many types of images and programs. Some examples would be having the concept of obedience equal the fountain of youth. The fountain of youth flows in the victim’s mind unless they step out side of their orders. This can be linked to the Shangri-la story, where a woman ages as soon as she leaves her place in Shangri-la.  Another example, is the hypnotic imagery involving the formation of an island from a volcano. The story is turned into a programming script to allow the System to be radically restructured. This Volcano programming is a System’s turning program. A volcano erupts from deep down, and lava pours into the sea. Mountains are pushing up from deep in the mind. To survive people must cross from the old to the new island on a bridge that naturally forms. Fire births the new territory and destroys the old. The new mountains develop trees which become safe places for the alters to roost upon. 

Hypnotically Building in Structures 

Later in the book, the art of building structures internally in the mind of the victim will be covered. However, since the process involves hypnotism it would be appropriate to discuss briefly how hypnosis can begin to work a tree structure into the mind of the child.  

First, the programmer hypnotically suggests that his penis is a growing tree. Later, the programmer might begin,  "You know those big trees in the park that look so big and straight and stretch way up toward the sky? Stand up and be one of those trees. Stand up really straight and tall as tall as you can be, and stretch your arms out toward the sky like branches on that big oak tree. Now those big trees have long, deep roots that keep them from falling over. Feel your feet go down down through the floor, just like roots on the big strong oak tree." 

Final note: there is no way that this book could give every last song or story that has been used for programming, nor was it the intention to do so. We have wanted to point out the popular story lines used, although we have missed some such as the Chronicles of Narnia and Little Red Riding Hood (which is used in several ways along the lines of you think you’re going to Papa’s, or Grandma’s house & you end up with a wolf). Our list left out many programming songs--all the Rolling Stone’s songs,  Alabama ’s Old Flame, etc.

[back[Springmeier & Cisco Wheeler] [next ch: 5]