Fritz Springmeier & Cisco Wheeler Part 1 How the Control Comes about by Fritz Springmeier


HYPNOTIC CODES, CUES AND TRIGGERS



Download 4.49 Mb.
View original pdf
Page110/380
Date07.11.2018
Size4.49 Mb.
1   ...   106   107   108   109   110   111   112   113   ...   380
HYPNOTIC CODES, CUES AND TRIGGERS
This chapter will provide some more of the hypnotic codes,
cues, triggers or whatever one wants to call these words, noises,
and sensory inputs that manipulate these poor victims turned into Monarch robots. The reader is encouraged to refer to Vol. 2
for the principle list of codes. Other chapters will explain about the structures these codes go to, and also the spiritual dimensions of these codes and structures. Another way to see things is to recognize that the programmers have created "power words" to which they have attached memory and programming. If a de-programmer observes closely the word usage of the victim, you will begin to spot power words of the abuser, for instance, "follow the yellow brick road".
Unfortunately, people who are not initiated into the arcane world of handshakes,
Page 52 grips, codes, signals and cues allow the appearance of these

things to be interpreted from their own frame of reference.
Usually, because these events are not perceived as being significant, outsiders forget them immediately and therefore remain oblivious to some of the most overt clues. Once the reader is aware of the types of programming themes used the
Wizard of Oz, Alice In Wonderland, and Star Wars and Star
Trek, etc, he will begin to realize our entire American culture has been transformed into one big mind-control programming center during the second half of the twentieth century!
Unfortunately for the victim, apparently harmless little things,
for instance, the arrival of flowers to their hospital bedside, a dead bird on their doorstep, or the words "NEW
BEGINNINGS" and "NEW LIFE" may signify programming commands. One Illuminati slave in this area has started a large church called NEW BEGINNINGS. The name was not by accident. A cipher is when symbols are used to represent letters. One can use letter frequencies to break ciphers. There are charts for letter frequencies for the chief languages.
Likewise, there are frequencies to codewords. The Illuminati’s intelligence agencies have programmed thousands upon thousands of slaves. There are only so many code words to pick from and some of these code words are favorites. In the previous book many of their favorite code words were listed,
but words starting with As, B’s, Ts, Us, Vs, ‘W’s, X’s, and
Y’s, were not given and will be now. (A plus sign indicates other words are attached to the root word) From the co-author
Fritz Springmeier’s experience, the following is a continuation of favorite code words that have been used to program slaves with:
AARON, ABBY, ABIGAIL, ABLE, ABNER, ABRAHAM,
ACACIA. ACE, ADAM, ADELPHI, AGATE, AIR +ALABASTER, ALADIN, ALBERT, ALFA or ALPHA.
ALICE, ALLEY CAT, ALLIGATOR, AMOS, AMY, ANGEL,
ANNA, ANTHONY, APACHE, APOLLO, APOSTLE,
APPLE +, ARCHER, ARGUS, ARK, ARROW, ASK +ASTER, ATHANTIS, ATLAS, AUDREY, AURORA.
AUTUMN +, AZTEC, B +, BABE, BABY, BACK ROOM,
BACK BONE, BAD, BAKER, BALD, BAMBI, BANANA,
BANJO, BANKNOTE, BARBARA. BARK, BARON,
BEACH +, BEAST, BECKY, BEEHIVE, BEETHOVEN,
BELSHAZZER, BERMUDA, BERTHA, BETA, BETSY,
BETTY, BEULAH, BEWITCH, BICYCLE, BIG BROTHER,
BINGO, BIRD DOG, BIRTHDAY, BLACK, BLACK +,
BLACK
SHEEP, BLACK WIDOW, BLANCA, BLONDIE,
BLOODHOUND, BLOODY +, BLUE +, BOA. BOB CAT,
BOMBAY, BONANZA. BOODLE, BORAX, BOXCAR,

BRASS +, BRIDGET, BROOMSTICK, BUCCANEER,
BUICK, BULL, BULLDOG, BULLFROG, BUMBLEBEE,
BUNNY, BUTTERCUP, BUZZARD, BYRON, T-BIRD,
TADPOLE, TALISMAN, TAN, TANGO, TANYA, TARA,
TARZAN, TEACUP, TEARDROP, TEEPEE, TERRIER,
TERRY, TESTAMENT, THOR, THREE SISTERS,
THUNDER, THUNDERBOLT, THUNDERCLAP,
THUNDERFLASH, THUNDERSTORM, TIAMET, TIGER,
TILLIE, TITAN, TOMCAT, TONI or TONY, TOPAZE,
TOPSOIL, TORNADO, TOTENKOPF, TRINITY, TURTLE,
UGLY, ULYSSES, UMBRELLA, UNCLE +, UNDERDOG,
UNICORN, UNIFORM, URSULA, VAGABOND, VAMPIRE,
VANCOUVER, VARSITY, VELVET, VENUS, VERONICA,
VICKY, VICTOR, VIKING, VIOLA, VIOLET, VIPER,
VIRGINIA VOODOO, VULCAN, VULTURE, WAGON
WHEEL, WALDORF,
WALLFLOWER, WANDA. WARRIOR, WASP,
WATCHDOG, WEASEL, WHISKEY, WHITE +, WIDOW,
WILD CAT, WILLOW, WINNIE, WINTER +, WIZARD,
WOLF,
WOLF +, WYOMING, X-FORCE, X-RAY, XYZ, YANKEE,
YANKEE DOODLE, YELLOW, YOGI, & YO YO.
Page 53 The intelligence organizations prefer to code a single project with a single word, and an ongoing operation with two words.
A nickname of something will consist of two words. The reader needs to bear several things in mind. First, the programmers generally have intelligent, well sounding codes, that do form patterns. For instance, a woman’s name from the Bible will be used as a code, with subparts or subcodes having other female names from the Bible. Deeper Illuminati parts will have goddess & god names, and king & queen names for cult alters.
These are the names the handler or cult uses--NOT their access codes. The codes for slaves follow patterns. There are standard and unique codes. During the s through the s there were only perhaps a dozen American master programmers travelling around. (After that the number of programmers appears to get quite large) The master programmers would lay in the foundational programs and codes. They developed the scripts. The codes and systems used from system to system do follow patterns. The child’s creativity & their purpose in life would contribute to the uniqueness of the programming. Each child visualizes differently and the programmer works with the child’s mind. The master Illuminati programmer would allow the handler--the "Daddy" figure in life to have the day-to-day ownership. The Daddy figure, often the actual pedophile father

of the child victim, would be allowed to put in his own codes in the sexual part of the system. Some Daddy figures used their own songs, their own poetry and their own interests in this area of the coding. In other words, most of the system’s codes will reflect the master programmer (such as Dr. Mengele), and the sexual part of the system will reflect the "Daddy" figure’s programming. The standard method for many of the memory and alter codes is to use a combination of the date of the child’s birth along with the date of the trauma for part of the code. A
color will then be attached to this, to produce a color-alpha-numeric code combination. These are placed into the internal computers. The standard computer codes were given in Vol. 2. They can be used to temporarily stop programming to give a victim some respite and a chance to regroup. The programmers did not especially care if the front part of a system is discovered and although they hide the anarchy (coven level) witchcraft alters, they don’t hide them like they do the hierarchy alters. The coven alters have simplistic codes. The hierarchy alters which are placed in another area of the system and much deeper, receive a great deal of cabalistic codes and mathematical codes. You will not find the mathematical codes in the front part of a system. The internal programming alters have the power to change codes if they need to protect the programming. They will have to hypnotically work with alters when they trance out at night. In other words, most of their programming of front alters will be done when a system lies down for "sleep"--more accurately described as lies down "for trance" If the internal alters change many codes, in their efforts to protect the system, they will even make it difficult for the handler/programmer to get into the system. The science of Ciphers developed rotors that require lines to lineup. Some simple schemes using this principle appear in some Monarch systems. This is part of the science of structuring. Intelligence codes often come from the
Bible or popular fiction books. The deeper codes are occult words, often in foreign languages such as Arabic, which is an important language in the upper occult world. Slaves will be given COVER NAMES for ops, and often males receive female names and vice versa. The patterns used in programming slaves will represent the worldview of the programmer. If the interests of the
Page 54 programmer are known, that will be a major clue to the codes they like to install. For this reason, it would be worthwhile to review the access clearance codes that are used for external security of some agencies, because these same types of clearance codes maybe found in mind-controlled slaves. A

BIGOT list is a list of names of those who have clearance to a particular set of information. Within a slave there would be numerous BIGOT lists, because persons (personalities) are compartmentalized somewhat like the CIA and the Puzzle
Palace (NSA). Agency Codes for clearances include BC, KL, MN, T, COSMIC, MAJIC (MJ), SI, SCI, and Staff D.
(As this author has only examined these secret societies from the outside, some insiders may know of other clearances. In other words, it would be foolish to think that this clearance code list is comprehensive, but it has hit upon the major clearances) The exercise in judging whether a person can have access to compartmentalized information is called
ADJUDICATION. A group of persons (agents) working under one handler is called a NET. The FBI which also uses mind-controlled slaves likes to call its groups NETS. FUNNY
NAME is intelligence slang fora pseudonym. GRANNY is a
CIA asset used in the US which is not under their direct funding. The American military-intelligence groups publish a periodical called JANAP 299 which lists the cover names (code names) for many of the ongoing projects, groups, or installations. There are other code books too. C can stand for
Controller or Control, which means the persons) handling a mind-controlled slave. A person, who is neither a controller,
nor a slave, nor asset, but who consciously advances the desires of the controller is called a TRUSTED CONTACT. Sexual slaves would not be expected to respond to such a term, but a middle level slave/agent of an intelligence agency might be familiar with this type of intelligence jargon. The BIRD was a name for Fort Holabird, MD where intelligence operatives were trained as well as subjected to mind-control. DIA used the code name EMERALD for drug-trafficking. Boy, does this code word have a double meaning. Since the DIA, which is playing both sides, also is involved with drug smuggling & using
Monarch slaves heavily coded with EMERALD type coding.
Very shortly, we will provide more of the Monarch hypnotic cues (codes) for the multitude of functions that a Monarch’s mind must carryout. These cues are reinforced as a conditioned response by the programmer. In other words the response becomes so well trained that it becomes automatic. The type of programming which is placed in a slave varies. Remember, for intelligence operations the slave will have to have BONA
FIDES, which are codes to allow two people to meet. All slaves are given CONTROL SIGNS which allow them to indicate via a code that they are in trouble. A RECOGNITION signal allows two people to make contact. For instance, the handler might fly his distinctive sounding plane over a slave’s house in a prearranged signal. It might also be a particular colored scarf, and a particular set of phrases. A GO-AWAY code is a prearranged signal that means it is unwise to make contact. The

go-away signal maybe simply placing one’s hands in one’s pocket or turning the porch lights off. AGO TO GROUND"
signal means to go into hiding. A BLACK ENVELOPE, which is in actuality a black-colored envelope, has been used by intelligence to hold the real name of an agent being used. In the case of multiples, a chief of a station might have a BLACK
ENVELOPE with the actual name of a mind-controlled agent being used in his field of operations. A MAYDAY BOOK
exists for Illuminati and Intelligence slaves which allows them to call if they are about to be arrested. A telephone number is left open for just this
Page 55 purpose. Also common universal Illuminati codes can be used by the slave to get set free from police and judges.
BACKSTOPPING is an intelligence term for setting up proof to support the cover stories the intelligence agencies give their agents and assets. Some of the programmed multiples they use,
need BACKSTOPPING. Within the Jehovah’s Witnesses,
especially their headquarters, the Illuminati uses Enochian language to program with. With Druidic branches Druidic symbols are used. With the Jewish groups, Hebrew is used.
Other languages are also used. An Illuminati System can easily have 6 different languages used as programming codes. The foreign language codes will be for small parts of a system only.
Special artificial languages are also employed, as well assign language. The Illuminati employs signs which they teach some of their slaves with pickup sticks. This system of secret symbols is a series of crosses and horizontal & vertical marks.
These marks can be drawn on anything, and consist of up to lines. They are believed to be used in regards to ritual dates/ceremonies. These secret signs resemble similar secret symbols used by the Romany tribe of Gypsies. The masters of mind-controlled slaves also use a technique where one signal or code will carry several messages simultaneously. This is called
MULTIPLEXING. We are all aware of the phenomena of how the brain can selectively hear. The brain can select certain sounds to pay attention to, such as when a person is in a noisy room listening to someone, or a football player is trying to hear the quarterback’s calls, likewise certain alters hear certain codes/cues/triggers while others don’t. The internal programmers and reporting alters may internally hypnotically make telephone noises that are fake, so that host alters loose the ability to discern what is real and not real, so that they don’t pay close attention to access calls. This ability of the brain is manipulated in MULTIPLEXING.

MONARCH MIND-CONTROL CODES
contents:
A. ALPHA (basic) ... p. B. BETA (sexual) ... C. CHI (return to cult) ... D. DELTA (assassination) ... E. EPSILON (animal alters) ... F. OMEGA (internal computers) ... G. GAMMA (demonology) ... H. HYPNOTIC INDUCTIONS ... I. JANUS-ALEX CALLBACKS (end-times) ... J. OMICRON ... K. TWINNING (teams) ... L. THETA (psychic warfare) ... M. RHYMES, SONGS, TONES, etc ... N. ZETA (snuff films) ... 60 0. Sample codes ... P. Catholic programming ... Q. MENSA programming ... R. HAND SIGNALS ... S. Scriptures in programming ... U. Alien Programming ... A. ALPHA (basic Basic Commands. (These basic commands are also found used in many slaves, although there will be exceptions to everything) Many of the basic structures/codes will be put in using a sensory deprivation tank and LSD. For the most foundational levels of a system, the programmers may use the
Hebrew letters associated with the attributes of God and the angel names. This can also be worked into English, as there is a cabalistic equivalent in the letters B through K for the Hebrew letters associated with God’s names used in magic to conjure angels. In the basic Alpha structuring, Illuminati slaves will

have stars as power sources, and the ditty Twinkle, Twinkle
Little Star will pertain to this programming. The Hansel &
Gretal story is used for obedience programming.
Page 56 Another story line that is used in programming is the Cassandra and Apollo myth. Common access triggers are "HELLO
PRINCESS’, 3 knocks, flashes of light, tones, and sequences of blank phone calls.
If the slave leaves their answering machine on, a recording maybe left "IF YOU WOULD LIKE TO MAKE A PHONE CALL
PLEASE HANGUP TRY YOUR 911" accompanied by a beep-beep-beep. This activates a program within the slave to calla prearranged phone number for further instructions.
B. BETA (sexual SEXUAL ALTERS---most of the following codes are for deep sexual alters. In Illuminati Systems these are called Beta alters, in CIA systems they create Beta models whose primary function is to provide sex, usually perverted sex and SM for the perverts who run our secret government and visible government. BETA models are those who are primary job is sexual, such as service as a Presidential Model (sex slave fora President. These System models maybe numbered BETA BETA BETA 601, etc. Sexual programming for espionage and seduction, such as is done at Disneyland, may well involve the use of hundreds of dolls, such as Wonderwoman, Genie,
Barbie type dolls. The names/codes would tie in with these dolls.
TIME CLOCK programming is placed into cover the time that the sexual alters were on a mission, so that they can switchback to the - front and nothing be remembered.
Colors attached to sequences of numbers have been used for some of the Beta programming. For other sexual operatives, the intelligence agencies trigger them via specific sequences of chess moves.
Betty Boop programming is used sexually. Betty Boop was as cartoon character who was an attractive "vivacious vamp. She was described in one cartoon as the "kitty from
Kansas City" She had cartoons about Gigolos, Bimbos, Little
Red Riding Hood, Mother Goose rhymes which were used as programming themes. Plays on words such as "CHESS-NUT"
were used in the cartoons.

C. CHI (return to cult)
Chi programming uses a lot of idiosyncratic phrases, and little ditties. Some of the nursery rhymes listed in the song section will be Chi programming. Some of the Chi programming has been listed in the Alpha programming section of Vol. 2.
The number of hangup calls may serve as a code, incl.
when the hangup calls happen.
D. DELTA
(assassination)
· Delta alters
--are activated to kill by the following three things:
seeing specific clothing,
items held in a persons hand,
and particular words. Since these items would specific fora particular murder there is no particular specifics that can be given.

Page 57 It is thought by some people that the following TV ad may have been used to trigger Hinkley when it was time for
Hinkley to attack
President Ronald
Reagan.
One man who was programmed as an
Delta-type assassin by the NSA in the NJ
region, was programmed to be activated for assassination mission via the David
Letterman program,
Clinton’s speeches such as his speech touching on the baseball strike with "little kid" wording,
and by several movie stars (Arnold
Schwartzenegger,
Slyvester Stallone,
etc.). I Dream of
Jeannie programming is used for assassination, as well as at the CIA’s
Farm the song Old
McDonald’s Farm is used with programming done to CIA assassins.
Distinctive jewelry clothes. Emerald earrings used as a signal to others that a message was being carried. Emeralds mean drugs, rubies

mean prostitution,
diamonds
(rhinestones)
presidential model work. Red, White Blue worn sometimes by presidential models.
E. EPSILON (animal alters)
F. OMEGA (internal computers)
The Omega programming works along with an Executive
Control Board (or Grand Druid Council) and Internal programmers. The Executive Control Board is associated with both numbers of the clock, and precious gems and metals such as "9 O’CLOCK GOLD".
For G. Gamma programming see Cisco’s section on "Programming, Foundations’s
H. HYPNOTIC INDUCTIONS
NICRO NECTRUM NECTO--take one back to one’s "true time period. When the child victim is hypnotically inducted by counting numbers during programming by a Doctor and a
Mother-of-Darkness, these two will reassuring they child that things are OK. and sweet talking to the child as it is inducted.
Page 58 I. JANUS-ALEX CALLBACKS (end-times)
END-TIME ACTIVATION CODES
Most slaves have end-time programming. The programming to activate a slave’s end-time programming often runs pages upon pages of coded messages. A number of Monarch slaves have been deprogrammed enough that they began accessing and spewing out pages and pages of these activation codes. In the end times, there appears to be a great deal of color coding for operations. Many of the people who are taking part in the end times events are not American. For instance, the different lists of people to roundup are categorized by color. The Red list in
America are anti-NWO opposition leaders to be executed

approx. 2 weeks before martial law. The blue list are anti-NWO
order people who will be programmed or killed in the process.
The yellow list is people to be rounded up for reeducation camps after martial law. Other countries apparently have different color codes. The red & blue lists have been distributed, & are periodically updated. The blue routes have already been marked by blue patches of color to guide those transporting prisoners when martial law is declared in the U.S.
Within Monarch slaves, some of them apparently have an internal crystal/and or rocks that are programmed to explode at a certain point in time--thus releasing the victim’s end time programming. The internal crystal (mental image) contains at least the four basic colors, red, green, blue, purple. One sample of part of end time programming was given in the previous Vol.
2 book. Still another example is as follows:
BB 243-ABCD-XXZ² (blue ray)
CC-458 ABCD-42T (red ray)
CD-379 ABCD-H1² (yellow ray)
CE-211 -ABCD-JKL (green ray)
CF-531-ABCD-ZZU (purple ray)
TMFT.47 ZONES 7-12 17876747270 OCEANSIDE PORT 18,22,34,41 CONTACT
YELLOW RAY SHOVE 79230 A
2
TO RIGHT SIDE DAGGER HANGS
LOW ON PART SIDE FISH
SCHOOL CLOSED ROOM RAILS EXIT END COL. BLACK PATCH
TO MALL 76747270 THIEF
AZT FMT BZT CET
11,4,6,9,32,101, YELLOW FLAGS AT HALF MAST
YELLOW DOG ON RUN
BLUE FISH AT HOME

This program is related to a slave contacting other slaves in some end time operation.]
A team leader will have a down line of around 4 people--which are coded red ray, yellow ray, green ray, blue ray. When the activation code hits a slave team leader during the end times,
they will in turn activate their people, who in turn will have people who are team leaders and have a down line. At least two false callback alarms will be sounded (tested) before the real one.
J.>> Omicron programming—relates to programming of slaves for the Combination (between Intelligence- the Mafia and
Government.)
K. TWINNING (teams)
L. THETA (Psychic warfare)
The following is only speculatory, but worth taking note of.
This author believes that some of the Theta models got chess programming. Within the system of Enochian magic is the magical system of Enochian Chess. The Golden Dawn has been identified as one of the groups carrying out mind-
Page 59 control. Some Golden Dawn leaders have recently putout a reference book Enochian Chess of the Golden Dawn by Chris
Zalewski (St. Paul Llewellyn Pub, 1994). Enochian chess is played with four players, on a chessboard that is divided up into four squares, one for each of the magical watchtowers of air, water, earth, and fire. It has only been since 1992 that researchers within the Golden Dawn (specifically the New
Zealand branch which is called the Emerald of the Sea)
reinvented a set of rules to play enochian chess. The moves for
Enochian chess may have been used in recent years as a programming script. Since only a few people have mastered the game, and since the game is more than a game, it is magic, it would stand to reason that the temptation would be thereto use it as a programming script if the programmer knew the game.
M. SONGS & NURSERY RHYMES What follow is a list of Nursery Rhymes Used As Triggers, Songs which have Monarch programming meanings &, such as access parts, or soliciting a behavior or thinking.

NURSERY RHYMES
The Illuminati create imaginary worlds for many of the deeper alters to live in. They keep these alters living in such unreality and nonsense that deeper alters have a difficult time separating their subjective programmed reality from the objective reality of the outside world, which doesn’t understand them. Nursery rhymes function well for programming in messages. Often these nursery rhymes are distorted slightly to serve their programming purpose. Some of the programming distortions and uses of these nursery rhymes are provided below. Major corporations and advertising groups working for the Network place nursery rhymes into their television ads. These nursery rhymes are constructed in the ad to activate on certain slaves which usually are sleepers. Some were given in Vol. 2, here are some additional nursery rhymes beyond those listed in Vol. A Tisket A Tasket
Baa, Baa, Black Sheep (used for money laundering scripts, and drug money, drug carrying scripts)
Bye, Baby Bunting (used with actual rituals where the slave child is placed within a skin, cocoon programming with a butterfly coming forth etc.)
Diddle, Diddle Dumpling
Ding, Dong Bell (Dr. Mengele liked to use this--message: don’t disturb the mouse that runs the internal system clock.)
Fa Fe Fi Fo Fum (Movement within the system’s beansprouts in the system, and also a death threat.)
Farmer in the Dell, The (Used by the CIA fora serious program)
Georgy Porgy
Gingerbread Man
Hey! Diddle Diddle (used for astral projection programming)
Hot-Cross Buns!
Humpty Dumpty (used for shattering the mind programming)
I’m a Gold Lock (used to instill cover programming to hide the truth)
I Love Little Pussy (kitten programming)
Jack, Be Nimble
Jack and Jill

Jack Sprat (possibly cannibalism programming)
Little Beep (come home to Papa programming)
London Bridge (This was used at the Presideo and other sites for learning the chants, and the spells. At the Presideo it was used with barber pole programming. They all fall into a stupor at the end.)
North Wind, The
Queen of Hearts, The (swearing an obedience oath programming)
Rub-a-Dub-Dub (refers to the 3 internal programmers)
Page 60 There was an Owl
Three Blind Mice
Three Little Kittens
It should be pointed out that the mind-control programmers have long ago discovered the power of a rhyme in the mind.
Rhymes have a hypnotic quality to them. An example of how rhyming was used by internal programming alters to reprogram an alter wanting free is given in Daniel M. Traver’s book (Phd dissertation) Dissociative Disorders and Mind Control.
Wichita, KS Daniel Traver, 1996, p. What the hell man you can’t stand a winter worse yet you’ll cry and you’ll die as we place the mindset you won’t know what to do now you’ll hear every rhyme and you’re cravings will be as an addict in crime" This rhymed program would accomplish its goal of wearing down the alter and bringing that alter into line.
SONGS
Yankee Doodle (used for sexual obedience programming "mind the step" and the word "girls" was changed to "boys" to make "and with the boys be handy. "Yankee Doodle keep it up" was ref ramed to mean "slave yank yankee doodle (the penis)
sexually up" MTV is blatantly using programming rock-and-roll songs. Aleister Crowley is featured in some of these. Maiden (a satanic rock and roll band) blatantly places the words "POWER SLAVE" on one of their CD covers along with snakes and an enlightening pyramid. Anton LaVey has had an
MTV song video shown, where he sings in detail how he is going to make the listener into a sex-slave, etc. etc. Some of

this is blatantly mind-control in the open, it is so open it is dismissed by many of the public.


C. training the unborn child
B. administering drugs for programming
B. the power of hypnosis ........................................
Vi. deeper insights on the use of electricity &
F. placing thoughts directing into the human mind
F. using mirrors & spinning
Part 2. how help comes about for
Denial, how to deal with therapist's
Hope............................................................................ 345
Self-inflicted harm, how to handle
Triggers, how to defuse
Abusers, confrontations or not
Dream work, understanding
Implants, dealing with
Rationales, understanding cult r
Surveillance, dealing with
Dedicationthis book is dedicated to the two million americans and
Did (also known as mpd), it is recommended that you consult
Mengele’s concentration camp research is still classified. much
Syndrome campaign, or as those of us who know the facts like
Cia and office of naval intelligence and mi, they can be given
Un-american activities "since man began, he has tried to
Programming is a foundation rock of the new world order that
Cia director admiral stansfield turner disclosed that the cia
Isaiah the great prophet said, "the lord god hath given me
Thessalonians (1 thes 5:14) says that in effect that different
Christ." eph. 4:13 if the body of christ is to attain fullness, we
Alter-our usage is trying to follow the programmers usage of
Mengele-created grid would be a grid of x principal
Grand druid council, the committee of 300, and the committee
Monarch programming--this was a specific project carried out
Switching--this is when one part (fragment) of the mind takes
Next page 1 ...introduction
Breeding good subjects for hypnosis
Training the unborn child
Common illuminati work with twins
Selection of adult candidates for
U.s. govt. mind-control level 1.
U.s. govt. mind-control level 2.
U.s. govt. mind-control level 3.
U.s. govt. mind-control level 5
Testing young children to plan the
Daily abuse works best for programming
A trauma to develop animal alters
The use of drugs
Classifying mind-drugs
Administration of drugs for programming
More programming drugs
Stabilizing the programming
Extensive research done to influence human
One type of experience of victim hypnotic drug
What the mind-control programmers use to
Hiding the codes
Programming with lsd
Chemically triggering natural instinctual
Sexual stimulation-programming
Adrenalchrome (adrenal chromaffin)
Hypnosis & the occult
Understanding the basics about hypnosis
The power of hypnosis
Understanding the deeper mechanics of
Programming aids
Using holograms as an access aid
Preparing the brain
Early training for slaves
Magical training on the starlight level
The monarch programming script for over
Induction training script
Bringing the slave out of trance
Deep trance programming
Color programming
The association of colorful sights,
Light & color
Special colors
Healing by correct vibrations & rays
Using hypnosis to heal the slave after
And the beat goes on...
Tones & cords
Rings, credit cards, tokens etc.
Program codes during 1972-1976
Page 37 ...chapter 4.
In the s, marquis de puysegur was putting people into deep hypnotic trances
Spiegel and leonard, 1986). the mind simply diverts the pain into a "mental floppy
This author (fritz) has reported that programmed multiples are able to increase the
K-lines without the normal unconscious conservative restraints. under behavior
Understanding the deeper mechanics of hypnosis
Intention system sends out cognitive search demons, they do not have to involve
Black forest, germany
China lake naval research base (inyokern), ca--
Colorado springs, co
Ft. campbell, kt
Goddard space flight center-
Mcclellan afb, ca
Patrick afb,--portland
Scotty’s castle, death valley, ca
Tinker, afb, ok
Utah state prison
Wright-patterson afb
Appendix 3. clones,
Some of the films that show existing
Oregon’s underground secret cloning
Further investigations at dulce’s
Summary of the four methods.
Back to contents
To contentsnext
The harvest of weeping
Boundaries & roles
Communications issues
Denial, how to deal with the therapists or ministers
Depression (initial client complaint)
Eating disorders
When mind-control victims with eating
Evaluation forms
Sample questions in areas of inquiry
Fear, what f. issues do victims have
Initial questionaire
If some of these are yes
Panic attacks, suggestions
Understanding programming
Protection, spiritual
The unique power of the truth, "ye shall
Other items of protection
Special situations where spiritual
Where will the enemy counterattack
Safety issues, of slave
The safety of child victims
Safety issues, of support team
The good news
Spiritual issues
Structuring, how it is done, its consequences and its
Suicidal thoughts (early client complaint)
Long term work
Support team, organizing one
Traumas, foundational traumas, how to
Every time the victim of mind-control accidently triggers a
Truth, discernment of
The correct goal & some basic techniques.
Abreactions, understanding
Visible clues in victim:
Visible clues in the victim:
Visible clues:
Alters, how to work with deep illuminati alters (issues for therapists)
How to work with deeper illuminati parts
Treat with respect
Denial, identifying and dealing with defense mechanisms
Part a. the meaning of dreams
Part b. dream telepathy & mpd
Part ca listing of research into mpd (did) & dreams
Part d. important findings of mpd (did) dream research
Part e. our suggestions concerning mpd dream work
Part f. standard illuminati programming concerning
Family, rebuilding a shattered family
Flooding, how to deal with
Benefiting from grief by fritz
Guilt, dealing with (also see art. on "self-forgiveness)
Identity, discovering it
Integration, understanding
Assisting the victim to see.
Difficulties, preexisting & created.
Where to search for information.
Jobs, new ones for alters
Justice system, dealing with the broken j.s.
How to deal with mazes
How to deal with mirrors
Programming, foundations, destruction of
Crocell--this demon makes the noise like rushing water that alters talk about hearing in their internal worlds.
Haborym--this is a demon of fire who is placed in control of the fire around the internal hell pit.
Malphas--a builder of high towers. he may also get involved with the hypnosis.
Raum-- he destroys internal parts or internal cities.
Succubus--a female demon who preys on men sexually. this demon will be active during rituals.
Alter: you can’t love what isn’t.
Alter: god can’t love us.
Rationales, of the abusers
Reality vs perception
Salvation, obtaining it, issues for multiples
Satanic cults, understanding the practice of
Demonology, and its relation to mind-control and the
Self-forgiveness, to achieve
Split-brain programming
Exercises to rewire the brain’s
Surveillance, dealing with surveillance
Tips for therapists
Transference, issues of
Will be varied.
Can happen naturally.
Can be worked with during therapy.
Transference issues call for teams.
Selection & preparation.
Body manipulation
External controls
Advantages gained from working with
Deeper cult parts
A final trick
World, external, how to underatnd the external world
Worlds, the destruction of
Understanding the st human brain,
Manipulation of the reptilian brain
How the worlds are built & the computers
How the demons protect the system, & how
What people in the past have done, and why
How the grand druid council is linked to
Getting meaningful assistance from a
Summary & final comments
Typically, a sister of light would be blindfolded and taken down many flights of
Back back



Share with your friends:
1   ...   106   107   108   109   110   111   112   113   ...   380


The database is protected by copyright ©userg.info 2017
send message

    Main page

bosch
camera
chevrolet
epson
fiat
Honda
iphone
mitsubishi
nissan
Panasonic
Sony
volvo
yamaha