H. HYPNOTIC INDUCTIONS

 

‘‘Kaleidoscope eyes’’ -- used in hypnotic induction and spinning

“20, 19, 18, 17, 16, 15, 14, 13,...1”

For many slaves the sign of satan done with the fingers puts them into a trance, and deeper alters come out.

“100, 91, 82, 73, 64, 55, 46, 37, 28, 19, 10, 1”

 Touching the head in a particular fashion is done. ‘‘DEEPER AND DEEPER AND DEEPER DEEPER AND DEEPER AND DEEPER, DOWN, DOWN, DOWN, INTO THE DEEP, DARK VELVETY MIST, DEEPER AND DEEPER AND DEEPER.”

“DEEP, DEEP, DEEP, SLEEP, SLEEP, SHEEP, SHEEP, SHEEP” SLEEP,

“YOU’RE BEAUTY WARMS MY EMBERS. SEE THEM GLOWING DEEP WITHIN THE DARKNESS OF MY  EYES... IGNITING INTO FLAME... BLACK FLAME.”

 

Seeing a Hand of Glory (severed left hand) will induct people into Peter Pan programming. (Books describing the occult use of the Hand of Glory in Ireland go back to 1830. It is an ancient practice. Baring Gould’s book Curious Myths of the Middle Ages describes the recipe for using the hand of glory as a gruesome lantern during the witchcraft of the Middle Ages.)

“I AM THE SAND MAN, AND BLOWSAND IN YOUR EYES” said while simultaneously moving the hand over the face to create the illusion of placing sand in the eyes.

“3-2-1, 3-2-1, 2-1-1, 1-2, 1, You are now relaxed.”

Lights, in certain colors and sequences, have been used to trance alters out, for instance a flashing red light may trance certain alters out. Tunnels were used as a powerful hypnotic suggestion. Bear in mind, that people induct a. when phys. or mentally relaxed, b. when their senses are overloaded or sens. deprivation, c. when their equilibrium is disturbed, d. their motion is restricted or e. their eyes are fixated on something.

 

 

I. JANUS-ALEX CALL BACKS (end-times)

 

Main link to a System’s programs to ALEX coded 44334223112. Scramble code to ALEX is 34424313221. Individual code to ALEX = 55434232312. Link to JANUS coded 3323432123. Report back- X441062F

Main JANUS tracking/reprogramming code-JAN US 9341 00569XXY99632 [x3]; its back up code X44420-61F. (There is a Janis 2 computer at 666 Connecticut Ave. Washington, D.C. Disinformation by the Network is that the PACER computer equipment is called Janus/Janis). Main AMBASSADOR code 67302986ZZ9861 (suicide/fire) sub codes- Fire 97643F4200L; Cut 97642C42DIL L ; Suicide 9762354202L; towards violence 97613V4203L

Main EMPEROR - [dot, dot, dot] 79622109MM861 1

 

END-TIME ACTIVATION CODES

Most slaves have end-time programming. When a slave is called in with end-time programming they have pages upon pages of coded messages. A number of Monarch slaves have been de-programmed enough that they began accessing and spewing out pages and pages of these activation codes. Part of a sample of one of these is as follows:

  “ISRAEL IS RISING

  ACTIVATE 366 UNITED NATIONS

  900 BLUE BIRD PILOTS RISE

  NATIONS IN PLACE

  RED CHINA CALL BACK

  COUNT DOWN, ACTIVATE ALEX

  3.7 LC

  94

  CIRCLE FARMS AROUND THE SQUARE

  BRITISH SOLDIERS RISE

  MOUNTAIN GOAT COME

  EASTSIDE OF PEAK

  39 ACTIVATE

  52 ACTIVATE

  42 ACTIVATE

  RED CHINA RISE

  1.7 ACTIVATE

  THE HOUR COMES, A. C. SON

  ACTIVATE AFRICA

  ARISE IN NUMBERS OF 90...”

 

A team leader will have a down line of around 4 people--which are coded red ray, yellow ray, green ray, blue ray. When the activation code hits a slave team leader during the end times, they will in turn activate their people, who in turn will have people who are team leaders and have a down line. At least two false callback alarms will be sounded (tested) before the real one.

 

 

J. THETA (psychic warfare)

 

K. TINKERBELLE PROGRAMMING (never grow up/alien)

Capt’n or Cap’n (captain) represents the programmer in Peter Pan programming. Tinkerbelle is a young alter created under Peter Pan programming.

‘TRANCE DIMENSIONAL TRAVEL RIGHT FROM YOUR OWN BACKYARD. THE DIMENSIONS OF YOUR PYRAMID ARE TO BE 9 BYE 9 BYE 9 BYE.”

Alien programming by NWO (also involves Peter Pan programming)

“RIDE THE LIGHT” -Peter Pan programming meaning to go into hypnotic induction attached to a light that is seen when given a high voltage shock. This is given to make experiences seem like in another dimension.

 

 

L TWINNING (teams)

 

CROSS PROGRAMMING -- (With for instance a mother and a daughter team)

Two seals are placed on this cross programming, a “seal of cover” and a “seal of rain”  

Code:  mother - [minus] mother = 3/4 -- daughter holds 1/4

daughter - [minus] mother 1/4 -- daughter holds 3/4

 

Teams will be given code words for each alter who is part of a 2-System team. One System may serve as a father figure to the other System. Teams will be trauma and sexually bonded, as well as having mirror images with each others names. A leader will have an upline and a downline for the colored rays. A leader will call the different colored rays, to activate their programming.

An Illuminati team ritual to create oneness & open their team boxes up to work together (Illuminati twinning ritual): the team kneels face to face, draws a magical circle on the ground, joins Delta team hands forming a clasp ring. (Blue is associated with this.) then they all say, “Star within a star, Circle within a circle, Mind within a mind, body within a body, Soul within a soul.” Then the team places Palm, their hands Palm to Palm, and then speaks 4 times,  “Bone to Bone, flesh to flesh, Spirit to Spirit, Forever together - never apart.”

Then a 5 pointed star is traced in the air. To close the Delta team twinning box, the reverse is done. Then other things are to be said in the joining and opening ritual. A double deck of cards is used to program an Illuminati team of “twins”. One type of Criss-cross programming involves 1. a flower, 2. the stem, & 3 the root. The root involves blood sacrifices. This programming ties two generations together such as mother -[minus] daughter.

 

 

M. SOLEMETRIC MILITARY

 

N.   SONGS & NURSERY RHYMES

Songs & Nursery Rhymes Used As Triggers (note all of these songs have been used on other slaves too.) Songs with Monarch programming meaning & access parts soliciting behavior or thinking include:

 

NURSERY RHYMES

  Brahm’s Lullaby

  Hickory, Dickory Dock (flips the system)

  “Hickory, Dickory Dock, The Mouse Ran up the Clock [computer], the clock struck one [time for system rotation], The Mouse ran down, Hickory Dickory Dock.” “INTO THE MOUTH [vortex] RUNS THE MOUSE, AND FLIPS THE HOUSE [turns the system over).

  Froggy Went a Courtin’ He did Ride

  Hickory, Dickory Dock

  I had a little pony

  I’m in Love With a Big Blue Frog

  Jack and Jill

  Mary Had a Little Lamb (call to ritual connotation)

  Tones of “Mary had a little Iamb” or other telephone created tones, such as high pitched noises to call people to meetings.

  Mary Mary Quite Contrary (reminds the slave that abusers are all-seeing)

  Old King Cole (Old King Cole was a merry old soul, ... he’d call for his masters 3 [the 3 programmers])

  Peter, Peter Pumpkin Eater

  Puss in Boots (this story is porn programming)

  Ring Around the Rosy

  Ten Little Monkeys Jumping on the Bed

  Three Blind Mice (omega programming connotation with hour glass)

  Twinkle, Twinkle Little Star (Sometimes associated with “I’m dead.”)

 

SONGS (Most of the Beatles’ songs were used for programming. Charles Manson was programmed with Beatles’ music. The programmers know ahead of time what are going to be the next hits, and they regularly call in slaves and hypnotically make the lyrics to be cues for the slaves before the music comes out. For instance, the lyrics of “Ain’t that a Shame” will make certain alters angry. For another slave the lyrics “Everything is relative, in its own way” reminds the person of the cult family & obedience.) --

  Angie (popular song for programming)

  A Mighty Fortress is Our God

  Back in Black Blue Velvet

  Butterfly

  The Candyman Can (Candyman represents drug use for Monarchs, plus other things.)

  CHRISTMAS CAROLS (Christmas carols were used a lot on Monarchs.)

  Country Roads song with the programmed meaning take me [the slave] “home” to a meeting site.

  Crazy (to reaffirm loyalty to the master)

  Deja Vu

  Die Walkure

  Fire and Rain

  Frere Jacques (Catholic “Father John”, sexual abuse connotation)

  Get Me A Ticket on a Fast Train (substitute “master” for “baby” in song)

  Grandma’s Feather Bed

  Ghost Riders

  Green Green Grass of Home (go home program, slave is not happy 'til they go home to green fields

  Greensleves

  Hallelujah chorus (many Christian songs like this one are played while the victim is tortured.)

  Handel’s Messiah

  Have Thine Own Way Lord (“thou art the potter, I am the clay, mold me & make me...” III. Charismatic slave programming.)

  Heartache Tonight (song used to announce a ritual over the radio)

  Hotel California (sexual/ritual connotation, the song says, “go to the chamber of the Master’s Feast, We are programmed to receive.” This song also tells the story of how LaVey started the Church of Satan in 1966.)

  I Surrender All

  Imagine (John Lennon presents the New Age script for people to be “nowhere people.”)

  John Brown’s Body

  Lucy In the Sky with Diamonds

  Little Red Riding Hood (song played with hunts of slaves)

  Mary was an only child (from Art Garfunkel’s Angel Claire album)

  Moon River

  Over the Rainbow (obvious Wizard of Oz programming)

  “Playing with the Queen of Hearts, knowing that it really smarts, the Joker is the only fool who’ll do anything with you” (reinforces the warning not to play (tamper) with the programming. The Queen of Hearts is the emergency Mayday signal to a handler. To play with this will really smart-hurt.

  National Anthem

  No More Mr. Nice Guy

  Revolution 9

  Rivers of Dreams (by Billy Joel. words are about “walking in the dark, going through a river.. .turn on the light on your internal world.”

  Satin Sheets

  She’s Leaving Home

  Sins of the Fathers

  Southern Nights (loyalty to the programs -- the leaves and trees)

  Stairway to Heaven

  Teddy  Bear (Programmer, helpless teddy bear slave connotation)

  Tennessee Waltz (handler is “forced” to prostitute slave)

  The Blood Will Never Lose Its Power

  Tom Dooley (suicide, “hang down your head Tom Dooley, hang down your and...)

  Victim of Love

  “When you wish upon a star” song used for programming.

  White Rabbit (Alice In Wonderland Theme -- made into a triggering Karaoke CD.)

  Wooden Heart

  Yellow Submarine (drug connotation)

 

 

O. ZETA (snuff films)

 

Zeta is the sixth letter, and it’s ancient meaning was a sacrifice.

 

P. SAMPLE CODES FOR ALTERS OF A HYPOTHETICAL SYSTEM NAMED MARY

These codes are purely a representative model-not any particular real system. The overall system code at times consists of [birthdate + programming site codes + birth order + number of generations family was in the Illuminati.] For our hypothetical system Mary we have the hypothetical system code of: 6-13-51- 14 -02- 12. In order to give the codes for a hypothetical alter system we will have to explain some things as we go. The Programmers have for each slave both medical programming files, and a grey or black binder with the programmed access, trigger, codes & cues, & structure. A typical Illuminati system will be a cube (although spheres and pyramids are also used). The principle alters will be the “a” alters. A typical section of alters will consist of a 13 x 13 grid of alters. These are alters who live in a world together and must function together. A 13 x 13 section will have 13 families of “a” through “in” alters. The “a” alters will be the primary alters that the Programmers will interact with. The Programmer may call up an “a” alter and ask it to go get the “c” alter in its family, rather than directly asking for it. This initial page of alter codes will be the primary or “a” alters. If we are dealing with a 13 x 13 x 13 cube of alters, then the initial page has 13 “a” alters of each section. Each of these alters will have an access code which will often include the following components: AN ASSIGNED COLOR + AN ALPHA NUMERIC CODE + A PERSONALIZED MAGICAL NAME. This will equal 1/3 their access code. These code words must be repeated three times to pull the alter up. However, if an alter is trained well, and hears his master’s voice, an alpha-numeric code can pull the alter up. For many of the alters, the reversal of their access code puts them back to sleep. This is an important point, because some alters would be dangerous to leave in control of the body. The “a” alters are regular alters. Many of them have been hypnotically age advanced to see themselves as teenagers or adults. Sometimes “b” and “c” alters are also aged. The “d” through “in” alters are generally left as they were split and most of them are infantile, with little concept of how old they are. The little ones will be the ones who often remember the programming very well, and know things about the system. The top alters will also sometimes receive personal names from their handler. This is in addition to all their codes. If the alter is responsive to its master, the personal name might pull the alter up too. Do all of the alters get charted? There are several groups of alters which get charted separate from the rest or don’t get charted at all. Because of the competition and distrust between the different programmers, they often place in secret back doors into the person’s mind that only they know about. Worlds of secret alters loyal and devoted to the programmer may be built into the system and not appear on the regular charts. The core, and some of the primal splits from the core will not appear on the regular grids. They will be placed on a separate sheet, and their codes will be in some magical language. The Illuminati commonly employs 20 magical languages, and Hebrew, Latin and Greek are also often used for charting the core and its primal splits. Enochian is a good example of a magical language used by the Illuminati. Some alters will be created solely by the slave in order to cope with life. For instance, say the slave is travelling with someone who is not a handler, but who is a dangerous person. This dangerous person murders several people and forces the slave to help. The slave is likely going to have front alters out, and they are simply going to have to create new alters to meet the demands of the situation. These alters made to deal with one-time emergency will just slip into cracks in the system. Lots of odds and ends alters end up in the nooks and crannies within a system just detached and floating. The programmers and the victim work hard at structuring and cleaning up things--but the honest truth is that trauma-based mind-control is messy. Any time you shatter someone’s mind into thousands of pieces with horrendous torture, you have a shattered mess, in spite of the good fronts that the programmers are able to construct. Some of the more elaborate access methods are for alters that are not on the “a” chart. Hour glass alters have entire sentence access codes. Deaf & blind alters need their access code signed on their hands by moving their fingers up and down, etc. End time alters may have access codes that may entail reading an entire page. Reporting alters are often small children, that are hidden in each section, and may require slaps to the face or jabs with a needle to pull them up. Spinner kittens will be accessed via their mama cat, who acts like a Madam in a “cat house”. The codes for this was given in the Beta section codes. The reader will be given the hypothetical codes (which resemble closely the actual codes of an actual scenario) for our hypothetical Mary. A Sample Chart of the “A” alters--these are the primary alters-- has been prepared in the same fashion as it would appear in the handler’s 3-ring binder.

To view this Sample Chart  

Mary’s Core Protector 1 will have a shutdown code of “REVERSAL 1 BEGINNING” and the second Core Protector will have the shutdown code of “REVERSAL 2 CREATION”. Of course, these codes are said 3 times. The first three alters on the far left section at the top of the chart are Silences who can be woken up by singing. Also at least one of these, will wake up by a kiss from the prince (programmer) to the third eye area. The first alter can be shut down by “COSMOS 15 31 06 2BAB PINK”. One of the groups of alters attached to one of these early alters is “MA.C3.10-53 Rejects (7) 10-53”. To shut this alter(s) down just say the reverse of the access code. A mirror image of each of these alters exists too. The mirror images can be pulled up via a three step process. The birth memory in our example will be coded as A5 10 79. The spider torture memories that are attached to these alters is A5 10 79. The reader will notice the following on the hypothetical chart on the previous page for the first Section (which is numbered 6 to be deceptive): This section is front alters. Basic code pattern = color + Genesis + no. [1 thru 13] + letter [a thru m]. Individual codes 1st section general-”N.I.F.6”, 1st section mother Eve “EV.E5 10 51 ACE” (Eve is the balancing point & the ace code is high or low). The alter Explorer is “EI.G7”, Mammy “MI.H8”, Angel “Red, AI.19 Jack Genesis 4” (or it could be done “red, AI.J10 Genesis 4”), George “Silver, GI.K11 ”, Zsa Zsa “gold, ZI.L.12”, and Shadow “Clear SI.M13”. You won’t find on the main chart codes such as: Eve’s memory “EI.D5.2.1952 ACE” or the Infant alters -- “1-000 10-49 REJECTS 3-9” The master may say for example: “Green GENESIS 1-A” (3 times) to get this alter which is the balancing point. Fragments/dead alters were dumped into areas named concentration camps and given the names of the famous german concentration camps. The camps were placed under the Mt. of Olives. Fire or Bomb children are found throughout the system and are triggered to come up by programming. They come up behind other alters and make them burn. Some of this level can be woken up by saying, “It’s time to wake up in the morning” (7 times), which is in contrast with most codes which are said 3x. Another way to look at it, is that the alters are on 4 dimensional structure and they require a 4-dimensional access code. Height, depth, width, and color are the four dimensions. This breaks down for this 1st section as: COLOR (4th dimension) + Genesis (Section code) +1 (level) + “a” (depth). The following message will be used on the phone for this System’s recording machine, this example has been used nationally. “IF YOU WOULD LIKE TO MAKE A CALL PLEASE HANG UP AND TRY YOUR CALL AGAIN. IF YOU NEED ASSISTANCE, PLEASE DIAL YOUR OPERATOR. CODE 911.” This will cause section 1 or section 2, etc. to call their master. Also, standard Illuminati Hand signals work with Mary. “ALONE AND CRYING (3X)”- is a code for a few special parts not on the first grid.

Section 2 gatekeeper alters. Basic code pattern color + Revelation + no.[1 thru 13] + letter [a thru m] In our hypothetical example: “ORANGE REVELATION 4-A” (3X) However a shortcut is “REVELATION 4” and the primary Revelation 4 alter will come up. “ORANGE REVELATION 4 B” would get a small child on the pedestal with Revelation 4a. At times the handler will say “THE DECK IS DOUBLE-DECKED” in order to activate the clone doubles of all alters in a particular area--such as the front area of the system. The clones are tied to the Pink Room of the dollhouse-looking computer. Since alters are also coded to cards, a FLUSH will pull up an entire section. Special alters who skinned men alive are kept in black holes in Section 2. They are special trauma alters created solely by the victim as a safety measure. Section 2 computer (like all levels) is empowered by an emerald blue light. This power source was deactivated by unscrewing the light to the left (which took it physically out so to speak) and then saying “PEACE BE STILL” (3X). If “PEACE BE STILL” is not said three times then the War in the heavens program kicks in. Also “DAD WEEPS OVER HIS CITY” must be said when deactivating the computer otherwise the “children” (alters) become sick and everything kicks back in--which it does eventually anyway if the deeper computers are not deactivated or taken out. Section 3 has programmer alters & fragment armies, not to be confused with the clones which hide everywhere. The clones, by the way, can be identified with serial no.s at base of head gear such as 151.00 [system birth date]. This sections has 3 faceless Programmers called the 3 adepts of Atlantis. Each of them has a different color of hair. They may also be the commanders of armies--the commanders of the Egyptian armies have names Ra, Horus, and Set. Section 4 alters are Entertainment alters. Basic code pattern = Color + double number + a name of a one of the 13 tribes of Israel + the number of the alter again (3x)

Example: BLUE 2001-13A REUBEN 1 (3X) However, the color doesn’t always need to be said it is a sufficient shortcut to call the alphanumeric code three times. Second example 2002-12A SIMEON 1 (3X). The numbers of the 2000 code go up while the corresponding number 13 to 1 go down. In other words it is a double code. The Tribal names are arranged according to their Biblical birth order.

Mother Kitten 8,10 and 12 have ten spinner kittens under neath each of them. To get a spinner kitten, one gets the mother kitten and then has her in the proper position which is the over-the-rainbow mode. The choice of what spin kitten to get is “WE GOTTA GET DRESSED ... IN 3 MINUTES.” 3 minutes means spinner no. 3. Specific instructions such as “PURR FOR ME KITTEN” gives the abuser fellatio. Tweedle Dee & Tweedle Dum is a S&M program. “5 FIDDLE” and “FOLLOW THE YELLOW BRICK ROAD” are important for the slave to follow instructions. The alters will be sent to never-never land where what they do is unreal. Some kitten alters are keyed to pop out if certain areas of the body are touched, such as the space beside the big toe, or the thighs. A handler will also have standard hand signals for things, such as putting his hands on his thighs to mean “Come here and take care of me, Kitten.” “COME KITTEN, TO PAPA COME” “BLUE TOPAZ” serves as 4 keys. Pisces is associated with Blue Topaz. There are also 4 keys which are: silver shoes, sun bright, birds singing, and yellow road. Section 2 & 1. Reprogramming sections. At this point, the computer codes given previously apply, SEE OMEGA CODES on previous pages. The first major computer services the top 6 sections and has a red room, a closet, a pink room, as well as other rooms. Actually the computer should be set in at Section 0, which would break up the grid evenly, but since our Mary is hypothetical we put the front main computer at section 1. A system like this will have 13 computers/1 per section and 5 computers which set between pairs of sections, which join a pair of sections together, and then 2 main computers. This means a System like Mary’s will have 20 internal computers. With all the codes and a fair understanding of the alters in a section, it is a good day’s work to shut down a computer. Before one could possibly get all the section computers shut off, they would reprogram (reboot) themselves back up. Computer erasure codes include: “FULL HOUSE ACES HIGH. ALL TRUMP. FULL HOUSE ACES LOW.” The drawers in the dollhouse can be pulled out with “ROYAL FLUSH”(3X). Another code is “PINK SECTION 5. FULL HOUSE. ACES HIGH. 2 DEEP.” A partial code to a computer is “ ...... 8-9 RED.” Our hypothetical Mary might be accessed by a woman who taps on the shoulder and says, “PHOENIX 360 [tel. area code], OUT OF ORDER”. The library alter has an important access ring. A “Button Bright” alter type works with the librarian. The dwarfs are accessed by “ISOLATION + no.” Judges which sit on the council give warnings to alters “CAT EYE AT THE DOOR.” This reflects the programmers’ control. The judges have the “Keys to the Kingdom.” “MR POSTMAN WAIT AND SEE” indicates a message from the master. Ribbon alters have the names of archangels. Silver cords are attached to the ribbons. Section 0. Mothers of Darkness alters. basic code pattern = SILVER + LEHTEB [which is bethel or house of God spelled backwards] + [who knows what else] + a blue topaz ring being turned on the master’s finger a certain way. Green is a sensitive color for this System. Some alters may be accessed from certain areas in the System via 4 tones, and others by pin pricks at certain locations in the body, along with their verbal code. The Reporting alter can be accessed by repeated slaps across the face. There is Ultra Green Section tied to the Cabala (Green tree). The Library in the big castle, which is guarded by lions and other big cats, has a passage way in it to a second world. Codes with the Cabalistic Tree of Life involve Cabalistic magic and its symbols. This section is guarded by a hostile entity. Certain rings, topaz, quartz, diamond, ruby, black onyx etc. are used for triggers. Certain rings are needed to get into certain parts of a System, such as the castle. To access the Mothers, the Black Onyx ring must be rotated. The programming of a ring may go something like this, “This ring fills Daddy’s house with stars.. .Catch a falling star, put it in your pocket.”

Section 9. Delta-Beta alters. Kept in a genie bottle. Obviously something is rubbed to get them out. “BUTTON BUTTON, WHO’S GOT THE BUTTON, BUT ITS THE KISS OF DEATH” this code is involved with the “good witch” who kisses upon the forehead. Buttons are on the boxes of Programmer Green and are constructed onto the boxes so they can be used to open the boxes up.

Section 7. This hypothetical system also has a series of codes based on gems--ruby, diamond, etc. which have numbers attached to the codes. An Hour glass w/ 12 disciples like grains of sand tied to Jolly Green Giant programming which have sentence access codes. Each sentence is a phrase of satanic philosophy. The bottom level is called the Hell Pit and contains the City of Petra. The City of Petra has an erasure code. “YELLOW - CUTTER ROOM 7 SECTION 7---ROYAL FLUSH--LA CUTTER EGGS” Invisible field section 7. Room 7 --cards has eggs with demons. Lacutters are like imps and are invisible. They are assigned to guard various things in the system including the cutting programs. “Dad” “Catch a falling star”.

Main computer protected by deaf and dumb alter using a sign language equation as its access code and the reversal of its access code is its shut down code. The Brack Master is a Master Programmer.

Each of the 13 sections of 169 alters (a section is a 13 x 13 grid of alters) will then have a computer assigned to it. The computer is made up of dissociated parts of the mind--which are like alters, but have not been given histories or names. Each section has a computer which makes 13 section computers. Section 1 and section 7 (See the Grid Chart) (see the grid chart) are main computers. The first is the main computer for the top half, and the second is the main computer for the bottom half of the System. The second main computer is in the hell pit, and has been put in at the lowest level of the mind. Section 6&5 computers are connected by a connecting computer, as well as 4&3, 2&1, 0&12, 10&9. This makes 5 connecting computers. In total then we have 13 section computers, 2 main computers, and 5 connecting computers, for a subtotal of 20 computers. Since things are being built on the basis of the magical number 13, six more computers are installed which are decoy or false computers for therapists to work on. This makes a total of 26 computers (or 2x13). Since there are 26 letters of the alphabet, this lends itself well, and each computer is assigned a letter of the alphabet. Since the computers are put into the slave when it is a young child, the child has just learned how to count and say the alphabet. The Illuminati has been using a large dollhouse with 26 rooms using 13 colors of paint, giving two rooms per color. Each room is a computer. In accord with the practice of double coding, each letter of the alphabet is given its sequence number, so the names for the computers are Al, B2, C3, D4, E5, F6, G7, H8, 19, J10, K11, L12, M13--the thirteenth is assigned the 1st main computer. N1, O2, P3, Q4, R5, S6, T7, U8, V9, W10, X11, Y12, Z13. Rather, than use the number 13, the number 0 will be assigned, thus changing things to M0, and Z0. This is simple enough for a child’s learning mind, but difficult enough that it serves as a viable code. As codes are assigned, the bottom of the alphabet is assigned the top (front side) of the system. The middle point MO, is the normal access point for all the computers for the handler. The code for this is associated with the name of an airplane hanger, so that the concept of taking off into the sky (trancing can be associated with it.) Each computer needs an access code to go along with its alpha-numeric name. A deck of cards lends itself well to a code of 13. Bear in mind each computer has a color assigned to it. Colored scarfs and dollhouse rooms were used with electroshock to teach the child his color coding. When the programming is going on trance depths and runways(mental image for flying off into a trance) and the structure of the System will all be tied together in one neat package. Everything is built on its own x-y axis. Each 13x13 grid has the middle rows both vertically and horizontally set up as runways. The x-y axis also makes up the hourglass lines or the butterfly wings. Both images are used with slaves. Because thing are set up in thirteens in Mary’s system, and things are double coded, thirteen becomes 13-1 and one is 1-13. This allows us also to link 13-1 and 1-13, so that everything becomes a circle. The circle within a circle, box within a box concept, triangle within a triangle situations makes the slave feel he is trapped in an infinity loop of programming that has no end and no beginning. 13 and 1 make 14. An entire deck of cards can be used in a double code that also adds to 14, such as the 8 of spades and the 6 of diamonds, or the Ace of spades and the King of Diamonds. Here then is the codes for Mary’s computers. Two cards from opposite suits that add to 14. Since a deck of regular playing cards came originally from Tarot cards, the playing card used as a code also carry some occult significance to the codes. It is also training the child who is programmed this way to be interested in cards. And everytime the child plays cards they will reinforce at an unconscious level their computer coding. The computers will then have programs set in on 13 x 13 quadrants. Quadrant 6.6 will have a program such hopelessness. Other quadrants may hold aloneness, recycling, cold, heat, burning, cutting oneself, pulsating loud heart beat, and hundreds of other programs. These programs have the type of codes assigned them that are given in the Universal Function Codes. Many of the functions can receive a standard code, but other items require individual codes. Telephone tones are frequently used to be able to key in (that is access or trigger) parts of the computer program matrix. Dominoes also are used for the computer programming. The dominoes are put in so that the programmers can get a dominoe effect, if they want to set off a series of programs. Dominoes and flashing sequences of lights were used to train the child to automatically respond to a certain pattern of dots. Our hypothetical Mary will also have hundreds of other codes for all kinds of miscellaneous things such as the following random codes: “RUBY RED LIPS” “TO HAVE POWER” AND “TO BE THE POWER”, which are also found in the Tall Book of Make Believe in the Shut Eye Town. Dominoes help with the code: “2-4-6-8 WHO DO YOU APPRECIATE?”. More examples are, “I LOVE DADDY.” “JACK BE NIMBLE JACK BE QUICK 13-1 12-2...” “PUMPKIN HEAD--an access code. To go away- “Ta RA RA BOOM-DE-AYE”,”CRYING OVER YOU (3X)”, “SILKEN GIRDLE”-- a golden caterpillar plays a bittersweet tune. A gold pocket watch with Roman numerals is associated with the words “Eagle on it.” When Mary gets scared and begins to get into revolving switching, sometimes spinning can be slow down by saying, “10--YOU ARE SLOWING DOWN 9--YOU ARE SLOWING DOWN 8--YOU ARE GETTING SLOWER AND SLOWER...” A system’s coding is a reflection of their programmer. If the programmer is a pilot which many of them are, then they may have pilot lingo in their codes, such as the system may be turned by pitch & degrees. If the programmer is a sailor the system may have nautical codes, such as “RED RETURN  RUNNING’’ , ‘‘SAFE HARBOR’’ (for ‘‘Home’’), and DOWN RIVER (away from “Papa”).

 

 

Q. Catholic Programming (by Jesuits etc.

 

KEYS TO THE KINGDOM = world domination by mind control. VOW OF SILENCE is a keep quiet program activated by “THE WALLS HAVE EARS & THE PLANTS HAVE EYES SO YOUR SILENCE IS TANTAMOUNT TO SUCCESS.” This is explained to the victim that the sea shells and the plants have the ability to hear, and that a sensitive occultist (programmer) can psychically pick up what the plants and sea shells hear. “MAINTAIN IT” --is a command to maintain the Vow of Silence “MAINTAIN IT & LISTEN.”-- a command to keep silent and listen to a command.

“ENTER INTER INNER DIMENSION TWO” - this is a standard Jesuit infinity program (2 is a sacred voodoo no.)

 

 

R. Mensa Programming (by MENSA)

 

“17 21 13 46” is an Illuminati code meaning a MENSA layer

Sample Mensa codes:

“727 + E=MC SQUARED + 3.141 5962 + PI”

“A+B=C, B+C=A, C+A= B” “TIC TAC TOE + C CROSS, PI CROSS”

The MENSA codes are sequences of 6 numbers.

 

 

S. HAND SIGNALS misc. common signals

 

  Finger to forehead--

  One ring finger bent at 90° -- access wave Rotated pencil--with certain words--rotates the system

  Finger swung the counterclockwise way closes portals.

  Right Fist to forehead -- OBEY

  Fist with right hand cupping left hand, the left is like the letter c, and the thumb is outward and the fist inside, the left hand then moves 3 times over the knuckle -- access signal

  Left hand of slave laid on top of handler’s hand - sign of submission

  Hands behind back of head -- I’m master

  Right Hand with thumb & index finger making an L shape on chin/check

  Hands on inside of thighs by handler -- come to me Kitten and service me.

  Hands locked folded interwoven backward -- you can’t break “the circle”

  Handshake with index and middle finger held straight out -- ”You are one of us.”

  Grip called the lion’s paw -- access greeting opening and closing the hands or large circles with index finger opens portals. Palms rubbed together counterclockwise

  Kiss on center of head -- kiss of submission of slave to handler

  Palm of hand touched -- sexual access point for some models

  Sign of Satan -- Hail Satan! used for Monarch & Illuminati Mind-controlled slaves as an induction. The alter who is holding the body goes into trance, & a deeper one replaces it.

  Thumb twiddle -- rotating the thumbs around with the two hands clasp -- S&M

  Touch of center of forehead -- access point

  Vulcan Peace Sign -- llluminati/occult greeting Wave with Finger and thumb together - other digits extended

  Winks at the system were used to convey meaning.

 

--- LIFE “OVER THE RAINBOw” --- After indexing & rereading this book, the co-authors realized that we had not explained “over the rainbow.” Some alters live “over the rainbow” and some do not. Both types will use the term “over the rainbow”, but with different meanings attached. For those who live “over the rainbow”, they serve their masters in such a deep hypnotic trance that they perceive reality like it’s a dream. When their memories surface they are so unlike normal memories that a system in therapy may not know what to do with them. They have been described as similar to the pictures in the old T.V.s when the vertical hold would go out of control. Deeper alters, who live “over the rainbow” experience memories/life in the following fashion: faces & porn cameras are airbrushed out of their memory, distinctive marks in the perpetrators such as scars & wrinkles are airbrushed out, colors & lights are very bright due to the total dilation of the pupils while in deep trance, and there is no sense of time for these alters. These alters are trained to “TRANCE SEND FORWARD THROUGH TIME”. By understanding the programming, the codes, & triggers, those alters who lived “over the rainbow” can recover from the mind the full memory, without the distortions created by dissociation.

 

 

T. PARTIALLY CORRECT PROGRAMMING SITE CODES

 

The following site codes are not totally accurate. Also, the Intelligence groups use that what are called Cryptonyms, which are two-letter digraphs such as  the "MK" of MK-ULTRA. The digraph can indicate a type of operation or even a location. An operation may have CODES. The following site codes are not totally accurate. Also, the Intelligence groups use what are called Cryptonyms, which are two-letter digraphs such as the “MK” of MK-ULTRA. The digraph can indicate a type of operation or even a location. An operation may have its cryptonym changed in the middle of its operation.

  

Programmer

Programming Zone

            Area/Code

Armstrong

63

            94XCCD

Astor

36

            Florida 59XCBB

Bournell-Hightower

19

 

Brown

30

            59XBMN

Burcham

329

            Texas 92XBMM

Gaston

61

            Colorado 1XCDF

Haggin

743

            Kentucky 47XB0

Harrick

263

            Colorado Springs

Johnson

95

 

Manass

 

 

Mentor

21

            Colorado 61XBXX

Nathan

56

             New Mexico

Owens

963

             106XbJK

Pantu

71

             Kansas 011XOEG

Patterson

117

             Kansas

Savior

49

 

Major Strange

14

             1Z440x72080020366

Strong

52

             81XCBC

Suttenfuss

103

 

Colonel Taylor

16

             Kentucky

Weir

561

             Texas 33XBCB

                                                                                                                                               

 

 

 
 

 

G. HYPNOSIS IN PROGRAMS, & OTHER USES

 

The programmers will begin their programming by extreme torture. After a certain amount of torture the victim is willing to say or believe anything to stop the torture. At this point a thought will planted into the victim’s mind. This thought will be linked to a false memory put in via hypnosis or movies, or other method, and it will be linked to a command put in by hypnosis etc. and the original thought, the command, the false memory will be linked by a single emotion which will link them all together. The result will something like this: it is two weeks before Halloween (thought), I must get ready for Halloween rituals (command) because I have always had a habit of going to Halloween rituals (false memory). If I don’t I will have a heart attack and die (memory of torture linked to thoughts). Programming is layered in. Layer after layer of programming is put in. Each alter (personality) of the victim is used as if it is a component of a large system. The result is that no alter (personality) is the whole, but only a cog in a great machine. Can a single cog rebel against the whole machine? It is very difficult for a single component of thousands of components to rebel against the abusers. 

Alice In Wonderland Programming--going down the tree, going through the mirror, going under neath something or growing tall

ALICE IN WONDERLAND PROGRAMMING AS IT PERTAINS TO AN ALTER GOING DOWN IN TRANCE FOR INTERNAL PROGRAMMING

The internal programmers (and some other alters) have the ability to send other alters into deep trances. One of the programs for doing this is based on the Alice In Wonderland Theme and it was experienced like this for a level 2 alter who managed to stay in communication with her deprogrammer:

When the alter went down in her mind she went down on the inside of the trunk of a tree (like Alice In Wonderland). At the bottom she saw a keyhole, a table, and on the table was love potion #9. She automatically drank the love potion which shrinks her to a dot and then she goes through the keyhole. So normally this process means she goes through the keyhole. She managed to stay in contact with her deprogrammer during this deep trance. After the key hole she saw thousands of looking glass mirrors. Everything got smaller as she went down the tree. She became a dot. She drinks love potion no. 9 and comes back with it. A tree comes and wraps itself around her and loves her. As she ascends (comes up in trance) she stretches up and enlarges. In coming up out of trance she gets stuck at level 8 due to some interference from deeper alters. She, in accord with her programming, senses her Master’s love. (Normally she would have simply tranced out, and another alter would have taken her place and she would have no recollection of the entire process. The alter has been programmed to have backup amnesia. Backup amnesia means that one doesn’t remember that one lost time, one doesn’t remember that one forgot, etc. In short it means you don’t remember that you don’t remember.) This is an example of hypnosis used internally by the programming and the Programming alters to control other alters. The deepening of the trance was given the imagery of Alice falling down the tree. In the various stories used in programming, there is some part of the story that can be used as the story line for trance induction, these include:

  Wizard of Oz -- going into the poppies,

  Star Wars -- time warp, riding the light

  Star Trek -- being beamed, replicators etc.

Hypnosis is used to anchor suggestions about sleep patterns, panic programs, phobias, health healing programs and health problems programs, pain control and pain programs, motivation programs, a suicide program called “hypnosleep”, an insanity program, and countless other uses. Hypnosis is used to steer a person’s mind in the direction that they have been labeled. For instance, if they have been selected to become a doctor, they will be programmed for success as a doctor. New patterns of thought, feeling and behavior are inserted to build confidence in the goals of the Illuminati. Positive experiences are used to help boost the person’s feelings, and then the new messages are anchored “imagine these messages taking root. Your new messages are growing stronger and stronger.” The Alice In Wonderland programming theme is used in air-water programs and mirror programs which the Illuminati, the CIA, NASA, the Jesuits and others like so well. The idea is that there exists a mirror world which is a reversal. Along with it is attached the idea that the slave can enter into a timeless dimension of time, or as some refer to it “interdimensional time travel.” Later, the victim will be further brought under the spell of this mirror programming by going to locations around the nation, like the Magic Time Machine restaurants in San Antonio and Dallas, TX where mirrors are placed on doors, ceilings, walls, and restrooms of the establishment and programming themes are part of the everything at these restaurants. The handler may tell the slave, “LOSE YOURSELF IN THE INFINITY MIRRORS.” When hypnotically programming in programs, the Programmers place in many types of images and programs. Some examples would be having the concept of obedience equal the fountain of youth. The fountain of youth flows in the victim’s mind unless they step out side of their orders. This can be linked to the Shangri-la story, where a woman ages as soon as she leaves her place in Shangri-la. Another example, is the hypnotic imagery involving the formation of an island from a volcano. The story is turned into a programming script to allow the System to be radically restructured. This Volcano programming is a System’s turning program. A volcano erupts from deep down, and lava pours into the sea. Mountains are pushing up from deep in the mind. To survive people must cross from the old to the new island on a bridge that naturally forms. Fire births the new territory and destroys the old. The new mountains develop trees which become safe places for the alters to roost upon.

 

HYPNOTICALLY BUILDING IN STRUCTURES

Later in the book, the art of building structures internally in the mind of the victim will be covered. However, since the process involves hypnotism it would be appropriate to discuss briefly how hypnosis can begin to work a tree structure into the mind of the child. First, the programmer hypnotically suggests that his penis is a growing tree. Later, the programmer might begin, “You know those big trees in the park that look so big and straight and stretch way up toward the sky? Stand up and be one of those trees. Stand up really straight and tall as tall as you can be, and stretch your arms out toward the sky like branches on that big oak tree. Now those big trees have long, deep roots that keep them from falling over. Feel your feet go down down through the floor, just like roots on the big strong oak tree.”

Final note: there is no way that this book could give every last song or story that has been used for programming, nor was it the intention to do so. We have wanted to point out the popular story lines used, although we have missed some such as the Chronicles of Narnia and Little Red Riding Hood (which is used in several ways along the lines of you think you’re going to Papa’s, or Grandma’s house & you end up with a wolf). Our list left out many programming songs--all the Rolling Stone’s songs, Alabama’s Old Flame, etc.