HYPNOTIC CODES, CUES AND TRIGGERS This chapter will provide some more of the hypnotic codes, cues, triggers or whatever one wants to call these words, noises, and sensory inputs that manipulate these poor victims turned into Monarch robots. The reader is encouraged to refer to Vol. 2 for the principle list of codes. Other chapters will explain about the structures these codes go to, and also the spiritual dimensions of these codes and structures. Another way to see things is to recognize that the programmers have created "power words" to which they have attached memory and programming. If a de-programmer observes closely the word usage of the victim, you will begin to spot power words of the abuser, for instance, "follow the yellow brick road". Unfortunately, people who are not initiated into the arcane world of handshakes, Page 52 grips, codes, signals and cues allow the appearance of these
things to be interpreted from their own frame of reference. Usually, because these events are not perceived as being significant, outsiders forget them immediately and therefore remain oblivious to some of the most overt clues. Once the reader is aware of the types of programming themes used the Wizard of Oz, Alice In Wonderland, and Star Wars and Star Trek, etc, he will begin to realize our entire American culture has been transformed into one big mind-control programming center during the second half of the twentieth century! Unfortunately for the victim, apparently harmless little things, for instance, the arrival of flowers to their hospital bedside, a dead bird on their doorstep, or the words "NEW BEGINNINGS" and "NEW LIFE" may signify programming commands. One Illuminati slave in this area has started a large church called NEW BEGINNINGS. The name was not by accident. A cipher is when symbols are used to represent letters. One can use letter frequencies to break ciphers. There are charts for letter frequencies for the chief languages. Likewise, there are frequencies to codewords. The Illuminati’s intelligence agencies have programmed thousands upon thousands of slaves. There are only so many code words to pick from and some of these code words are favorites. In the previous book many of their favorite code words were listed, but words starting with As, B’s, Ts, Us, Vs, ‘W’s, X’s, and Y’s, were not given and will be now. (A plus sign indicates other words are attached to the root word) From the co-author Fritz Springmeier’s experience, the following is a continuation of favorite code words that have been used to program slaves with: AARON, ABBY, ABIGAIL, ABLE, ABNER, ABRAHAM, ACACIA. ACE, ADAM, ADELPHI, AGATE, AIR +ALABASTER, ALADIN, ALBERT, ALFA or ALPHA. ALICE, ALLEY CAT, ALLIGATOR, AMOS, AMY, ANGEL, ANNA, ANTHONY, APACHE, APOLLO, APOSTLE, APPLE +, ARCHER, ARGUS, ARK, ARROW, ASK +ASTER, ATHANTIS, ATLAS, AUDREY, AURORA. AUTUMN +, AZTEC, B +, BABE, BABY, BACK ROOM, BACK BONE, BAD, BAKER, BALD, BAMBI, BANANA, BANJO, BANKNOTE, BARBARA. BARK, BARON, BEACH +, BEAST, BECKY, BEEHIVE, BEETHOVEN, BELSHAZZER, BERMUDA, BERTHA, BETA, BETSY, BETTY, BEULAH, BEWITCH, BICYCLE, BIG BROTHER, BINGO, BIRD DOG, BIRTHDAY, BLACK, BLACK +, BLACK SHEEP, BLACK WIDOW, BLANCA, BLONDIE, BLOODHOUND, BLOODY +, BLUE +, BOA. BOB CAT, BOMBAY, BONANZA. BOODLE, BORAX, BOXCAR,
BRASS +, BRIDGET, BROOMSTICK, BUCCANEER, BUICK, BULL, BULLDOG, BULLFROG, BUMBLEBEE, BUNNY, BUTTERCUP, BUZZARD, BYRON, T-BIRD, TADPOLE, TALISMAN, TAN, TANGO, TANYA, TARA, TARZAN, TEACUP, TEARDROP, TEEPEE, TERRIER, TERRY, TESTAMENT, THOR, THREE SISTERS, THUNDER, THUNDERBOLT, THUNDERCLAP, THUNDERFLASH, THUNDERSTORM, TIAMET, TIGER, TILLIE, TITAN, TOMCAT, TONI or TONY, TOPAZE, TOPSOIL, TORNADO, TOTENKOPF, TRINITY, TURTLE, UGLY, ULYSSES, UMBRELLA, UNCLE +, UNDERDOG, UNICORN, UNIFORM, URSULA, VAGABOND, VAMPIRE, VANCOUVER, VARSITY, VELVET, VENUS, VERONICA, VICKY, VICTOR, VIKING, VIOLA, VIOLET, VIPER, VIRGINIA VOODOO, VULCAN, VULTURE, WAGON WHEEL, WALDORF, WALLFLOWER, WANDA. WARRIOR, WASP, WATCHDOG, WEASEL, WHISKEY, WHITE +, WIDOW, WILD CAT, WILLOW, WINNIE, WINTER +, WIZARD, WOLF, WOLF +, WYOMING, X-FORCE, X-RAY, XYZ, YANKEE, YANKEE DOODLE, YELLOW, YOGI, & YO YO. Page 53 The intelligence organizations prefer to code a single project with a single word, and an ongoing operation with two words. A nickname of something will consist of two words. The reader needs to bear several things in mind. First, the programmers generally have intelligent, well sounding codes, that do form patterns. For instance, a woman’s name from the Bible will be used as a code, with subparts or subcodes having other female names from the Bible. Deeper Illuminati parts will have goddess & god names, and king & queen names for cult alters. These are the names the handler or cult uses--NOT their access codes. The codes for slaves follow patterns. There are standard and unique codes. During the s through the s there were only perhaps a dozen American master programmers travelling around. (After that the number of programmers appears to get quite large) The master programmers would lay in the foundational programs and codes. They developed the scripts. The codes and systems used from system to system do follow patterns. The child’s creativity & their purpose in life would contribute to the uniqueness of the programming. Each child visualizes differently and the programmer works with the child’s mind. The master Illuminati programmer would allow the handler--the "Daddy" figure in life to have the day-to-day ownership. The Daddy figure, often the actual pedophile father
of the child victim, would be allowed to put in his own codes in the sexual part of the system. Some Daddy figures used their own songs, their own poetry and their own interests in this area of the coding. In other words, most of the system’s codes will reflect the master programmer (such as Dr. Mengele), and the sexual part of the system will reflect the "Daddy" figure’s programming. The standard method for many of the memory and alter codes is to use a combination of the date of the child’s birth along with the date of the trauma for part of the code. A color will then be attached to this, to produce a color-alpha-numeric code combination. These are placed into the internal computers. The standard computer codes were given in Vol. 2. They can be used to temporarily stop programming to give a victim some respite and a chance to regroup. The programmers did not especially care if the front part of a system is discovered and although they hide the anarchy (coven level) witchcraft alters, they don’t hide them like they do the hierarchy alters. The coven alters have simplistic codes. The hierarchy alters which are placed in another area of the system and much deeper, receive a great deal of cabalistic codes and mathematical codes. You will not find the mathematical codes in the front part of a system. The internal programming alters have the power to change codes if they need to protect the programming. They will have to hypnotically work with alters when they trance out at night. In other words, most of their programming of front alters will be done when a system lies down for "sleep"--more accurately described as lies down "for trance" If the internal alters change many codes, in their efforts to protect the system, they will even make it difficult for the handler/programmer to get into the system. The science of Ciphers developed rotors that require lines to lineup. Some simple schemes using this principle appear in some Monarch systems. This is part of the science of structuring. Intelligence codes often come from the Bible or popular fiction books. The deeper codes are occult words, often in foreign languages such as Arabic, which is an important language in the upper occult world. Slaves will be given COVER NAMES for ops, and often males receive female names and vice versa. The patterns used in programming slaves will represent the worldview of the programmer. If the interests of the Page 54 programmer are known, that will be a major clue to the codes they like to install. For this reason, it would be worthwhile to review the access clearance codes that are used for external security of some agencies, because these same types of clearance codes maybe found in mind-controlled slaves. A
BIGOT list is a list of names of those who have clearance to a particular set of information. Within a slave there would be numerous BIGOT lists, because persons (personalities) are compartmentalized somewhat like the CIA and the Puzzle Palace (NSA). Agency Codes for clearances include BC, KL, MN, T, COSMIC, MAJIC (MJ), SI, SCI, and Staff D. (As this author has only examined these secret societies from the outside, some insiders may know of other clearances. In other words, it would be foolish to think that this clearance code list is comprehensive, but it has hit upon the major clearances) The exercise in judging whether a person can have access to compartmentalized information is called ADJUDICATION. A group of persons (agents) working under one handler is called a NET. The FBI which also uses mind-controlled slaves likes to call its groups NETS. FUNNY NAME is intelligence slang fora pseudonym. GRANNY is a CIA asset used in the US which is not under their direct funding. The American military-intelligence groups publish a periodical called JANAP 299 which lists the cover names (code names) for many of the ongoing projects, groups, or installations. There are other code books too. C can stand for Controller or Control, which means the persons) handling a mind-controlled slave. A person, who is neither a controller, nor a slave, nor asset, but who consciously advances the desires of the controller is called a TRUSTED CONTACT. Sexual slaves would not be expected to respond to such a term, but a middle level slave/agent of an intelligence agency might be familiar with this type of intelligence jargon. The BIRD was a name for Fort Holabird, MD where intelligence operatives were trained as well as subjected to mind-control. DIA used the code name EMERALD for drug-trafficking. Boy, does this code word have a double meaning. Since the DIA, which is playing both sides, also is involved with drug smuggling & using Monarch slaves heavily coded with EMERALD type coding. Very shortly, we will provide more of the Monarch hypnotic cues (codes) for the multitude of functions that a Monarch’s mind must carryout. These cues are reinforced as a conditioned response by the programmer. In other words the response becomes so well trained that it becomes automatic. The type of programming which is placed in a slave varies. Remember, for intelligence operations the slave will have to have BONA FIDES, which are codes to allow two people to meet. All slaves are given CONTROL SIGNS which allow them to indicate via a code that they are in trouble. A RECOGNITION signal allows two people to make contact. For instance, the handler might fly his distinctive sounding plane over a slave’s house in a prearranged signal. It might also be a particular colored scarf, and a particular set of phrases. A GO-AWAY code is a prearranged signal that means it is unwise to make contact. The
go-away signal maybe simply placing one’s hands in one’s pocket or turning the porch lights off. AGO TO GROUND" signal means to go into hiding. A BLACK ENVELOPE, which is in actuality a black-colored envelope, has been used by intelligence to hold the real name of an agent being used. In the case of multiples, a chief of a station might have a BLACK ENVELOPE with the actual name of a mind-controlled agent being used in his field of operations. A MAYDAY BOOK exists for Illuminati and Intelligence slaves which allows them to call if they are about to be arrested. A telephone number is left open for just this Page 55 purpose. Also common universal Illuminati codes can be used by the slave to get set free from police and judges. BACKSTOPPING is an intelligence term for setting up proof to support the cover stories the intelligence agencies give their agents and assets. Some of the programmed multiples they use, need BACKSTOPPING. Within the Jehovah’s Witnesses, especially their headquarters, the Illuminati uses Enochian language to program with. With Druidic branches Druidic symbols are used. With the Jewish groups, Hebrew is used. Other languages are also used. An Illuminati System can easily have 6 different languages used as programming codes. The foreign language codes will be for small parts of a system only. Special artificial languages are also employed, as well assign language. The Illuminati employs signs which they teach some of their slaves with pickup sticks. This system of secret symbols is a series of crosses and horizontal & vertical marks. These marks can be drawn on anything, and consist of up to lines. They are believed to be used in regards to ritual dates/ceremonies. These secret signs resemble similar secret symbols used by the Romany tribe of Gypsies. The masters of mind-controlled slaves also use a technique where one signal or code will carry several messages simultaneously. This is called MULTIPLEXING. We are all aware of the phenomena of how the brain can selectively hear. The brain can select certain sounds to pay attention to, such as when a person is in a noisy room listening to someone, or a football player is trying to hear the quarterback’s calls, likewise certain alters hear certain codes/cues/triggers while others don’t. The internal programmers and reporting alters may internally hypnotically make telephone noises that are fake, so that host alters loose the ability to discern what is real and not real, so that they don’t pay close attention to access calls. This ability of the brain is manipulated in MULTIPLEXING.
MONARCH MIND-CONTROL CODES contents: A. ALPHA (basic) ... p. B. BETA (sexual) ... C. CHI (return to cult) ... D. DELTA (assassination) ... E. EPSILON (animal alters) ... F. OMEGA (internal computers) ... G. GAMMA (demonology) ... H. HYPNOTIC INDUCTIONS ... I. JANUS-ALEX CALLBACKS (end-times) ... J. OMICRON ... K. TWINNING (teams) ... L. THETA (psychic warfare) ... M. RHYMES, SONGS, TONES, etc ... N. ZETA (snuff films) ... 60 0. Sample codes ... P. Catholic programming ... Q. MENSA programming ... R. HAND SIGNALS ... S. Scriptures in programming ... U. Alien Programming ... A. ALPHA (basic Basic Commands. (These basic commands are also found used in many slaves, although there will be exceptions to everything) Many of the basic structures/codes will be put in using a sensory deprivation tank and LSD. For the most foundational levels of a system, the programmers may use the Hebrew letters associated with the attributes of God and the angel names. This can also be worked into English, as there is a cabalistic equivalent in the letters B through K for the Hebrew letters associated with God’s names used in magic to conjure angels. In the basic Alpha structuring, Illuminati slaves will
have stars as power sources, and the ditty Twinkle, Twinkle Little Star will pertain to this programming. The Hansel & Gretal story is used for obedience programming. Page 56 Another story line that is used in programming is the Cassandra and Apollo myth. Common access triggers are "HELLO PRINCESS’, 3 knocks, flashes of light, tones, and sequences of blank phone calls. If the slave leaves their answering machine on, a recording maybe left "IF YOU WOULD LIKE TO MAKE A PHONE CALL PLEASE HANGUP TRY YOUR 911" accompanied by a beep-beep-beep. This activates a program within the slave to calla prearranged phone number for further instructions. B. BETA (sexual SEXUAL ALTERS---most of the following codes are for deep sexual alters. In Illuminati Systems these are called Beta alters, in CIA systems they create Beta models whose primary function is to provide sex, usually perverted sex and SM for the perverts who run our secret government and visible government. BETA models are those who are primary job is sexual, such as service as a Presidential Model (sex slave fora President. These System models maybe numbered BETA BETA BETA 601, etc. Sexual programming for espionage and seduction, such as is done at Disneyland, may well involve the use of hundreds of dolls, such as Wonderwoman, Genie, Barbie type dolls. The names/codes would tie in with these dolls. TIME CLOCK programming is placed into cover the time that the sexual alters were on a mission, so that they can switchback to the - front and nothing be remembered. Colors attached to sequences of numbers have been used for some of the Beta programming. For other sexual operatives, the intelligence agencies trigger them via specific sequences of chess moves. Betty Boop programming is used sexually. Betty Boop was as cartoon character who was an attractive "vivacious vamp. She was described in one cartoon as the "kitty from Kansas City" She had cartoons about Gigolos, Bimbos, Little Red Riding Hood, Mother Goose rhymes which were used as programming themes. Plays on words such as "CHESS-NUT" were used in the cartoons.
C. CHI (return to cult) Chi programming uses a lot of idiosyncratic phrases, and little ditties. Some of the nursery rhymes listed in the song section will be Chi programming. Some of the Chi programming has been listed in the Alpha programming section of Vol. 2. The number of hangup calls may serve as a code, incl. when the hangup calls happen. D. DELTA (assassination) · Delta alters --are activated to kill by the following three things: seeing specific clothing, items held in a persons hand, and particular words. Since these items would specific fora particular murder there is no particular specifics that can be given.
Page 57 It is thought by some people that the following TV ad may have been used to trigger Hinkley when it was time for Hinkley to attack President Ronald Reagan. One man who was programmed as an Delta-type assassin by the NSA in the NJ region, was programmed to be activated for assassination mission via the David Letterman program, Clinton’s speeches such as his speech touching on the baseball strike with "little kid" wording, and by several movie stars (Arnold Schwartzenegger, Slyvester Stallone, etc.). I Dream of Jeannie programming is used for assassination, as well as at the CIA’s Farm the song Old McDonald’s Farm is used with programming done to CIA assassins. Distinctive jewelry clothes. Emerald earrings used as a signal to others that a message was being carried. Emeralds mean drugs, rubies
mean prostitution, diamonds (rhinestones) presidential model work. Red, White Blue worn sometimes by presidential models. E. EPSILON (animal alters) F. OMEGA (internal computers) The Omega programming works along with an Executive Control Board (or Grand Druid Council) and Internal programmers. The Executive Control Board is associated with both numbers of the clock, and precious gems and metals such as "9 O’CLOCK GOLD". For G. Gamma programming see Cisco’s section on "Programming, Foundations’s H. HYPNOTIC INDUCTIONS NICRO NECTRUM NECTO--take one back to one’s "true time period. When the child victim is hypnotically inducted by counting numbers during programming by a Doctor and a Mother-of-Darkness, these two will reassuring they child that things are OK. and sweet talking to the child as it is inducted. Page 58 I. JANUS-ALEX CALLBACKS (end-times) END-TIME ACTIVATION CODES Most slaves have end-time programming. The programming to activate a slave’s end-time programming often runs pages upon pages of coded messages. A number of Monarch slaves have been deprogrammed enough that they began accessing and spewing out pages and pages of these activation codes. In the end times, there appears to be a great deal of color coding for operations. Many of the people who are taking part in the end times events are not American. For instance, the different lists of people to roundup are categorized by color. The Red list in America are anti-NWO opposition leaders to be executed
approx. 2 weeks before martial law. The blue list are anti-NWO order people who will be programmed or killed in the process. The yellow list is people to be rounded up for reeducation camps after martial law. Other countries apparently have different color codes. The red & blue lists have been distributed, & are periodically updated. The blue routes have already been marked by blue patches of color to guide those transporting prisoners when martial law is declared in the U.S. Within Monarch slaves, some of them apparently have an internal crystal/and or rocks that are programmed to explode at a certain point in time--thus releasing the victim’s end time programming. The internal crystal (mental image) contains at least the four basic colors, red, green, blue, purple. One sample of part of end time programming was given in the previous Vol. 2 book. Still another example is as follows: BB 243-ABCD-XXZ² (blue ray) CC-458 ABCD-42T (red ray) CD-379 ABCD-H1² (yellow ray) CE-211 -ABCD-JKL (green ray) CF-531-ABCD-ZZU (purple ray) TMFT.47 ZONES 7-12 17876747270 OCEANSIDE PORT 18,22,34,41 CONTACT YELLOW RAY SHOVE 79230 A 2 TO RIGHT SIDE DAGGER HANGS LOW ON PART SIDE FISH SCHOOL CLOSED ROOM RAILS EXIT END COL. BLACK PATCH TO MALL 76747270 THIEF AZT FMT BZT CET 11,4,6,9,32,101, YELLOW FLAGS AT HALF MAST YELLOW DOG ON RUN BLUE FISH AT HOME
This program is related to a slave contacting other slaves in some end time operation.] A team leader will have a down line of around 4 people--which are coded red ray, yellow ray, green ray, blue ray. When the activation code hits a slave team leader during the end times, they will in turn activate their people, who in turn will have people who are team leaders and have a down line. At least two false callback alarms will be sounded (tested) before the real one. J.>> Omicron programming—relates to programming of slaves for the Combination (between Intelligence- the Mafia and Government.) K. TWINNING (teams) L. THETA (Psychic warfare) The following is only speculatory, but worth taking note of. This author believes that some of the Theta models got chess programming. Within the system of Enochian magic is the magical system of Enochian Chess. The Golden Dawn has been identified as one of the groups carrying out mind- Page 59 control. Some Golden Dawn leaders have recently putout a reference book Enochian Chess of the Golden Dawn by Chris Zalewski (St. Paul Llewellyn Pub, 1994). Enochian chess is played with four players, on a chessboard that is divided up into four squares, one for each of the magical watchtowers of air, water, earth, and fire. It has only been since 1992 that researchers within the Golden Dawn (specifically the New Zealand branch which is called the Emerald of the Sea) reinvented a set of rules to play enochian chess. The moves for Enochian chess may have been used in recent years as a programming script. Since only a few people have mastered the game, and since the game is more than a game, it is magic, it would stand to reason that the temptation would be thereto use it as a programming script if the programmer knew the game. M. SONGS & NURSERY RHYMES What follow is a list of Nursery Rhymes Used As Triggers, Songs which have Monarch programming meanings &, such as access parts, or soliciting a behavior or thinking.
NURSERY RHYMES The Illuminati create imaginary worlds for many of the deeper alters to live in. They keep these alters living in such unreality and nonsense that deeper alters have a difficult time separating their subjective programmed reality from the objective reality of the outside world, which doesn’t understand them. Nursery rhymes function well for programming in messages. Often these nursery rhymes are distorted slightly to serve their programming purpose. Some of the programming distortions and uses of these nursery rhymes are provided below. Major corporations and advertising groups working for the Network place nursery rhymes into their television ads. These nursery rhymes are constructed in the ad to activate on certain slaves which usually are sleepers. Some were given in Vol. 2, here are some additional nursery rhymes beyond those listed in Vol. A Tisket A Tasket Baa, Baa, Black Sheep (used for money laundering scripts, and drug money, drug carrying scripts) Bye, Baby Bunting (used with actual rituals where the slave child is placed within a skin, cocoon programming with a butterfly coming forth etc.) Diddle, Diddle Dumpling Ding, Dong Bell (Dr. Mengele liked to use this--message: don’t disturb the mouse that runs the internal system clock.) Fa Fe Fi Fo Fum (Movement within the system’s beansprouts in the system, and also a death threat.) Farmer in the Dell, The (Used by the CIA fora serious program) Georgy Porgy Gingerbread Man Hey! Diddle Diddle (used for astral projection programming) Hot-Cross Buns! Humpty Dumpty (used for shattering the mind programming) I’m a Gold Lock (used to instill cover programming to hide the truth) I Love Little Pussy (kitten programming) Jack, Be Nimble Jack and Jill
Jack Sprat (possibly cannibalism programming) Little Beep (come home to Papa programming) London Bridge (This was used at the Presideo and other sites for learning the chants, and the spells. At the Presideo it was used with barber pole programming. They all fall into a stupor at the end.) North Wind, The Queen of Hearts, The (swearing an obedience oath programming) Rub-a-Dub-Dub (refers to the 3 internal programmers) Page 60 There was an Owl Three Blind Mice Three Little Kittens It should be pointed out that the mind-control programmers have long ago discovered the power of a rhyme in the mind. Rhymes have a hypnotic quality to them. An example of how rhyming was used by internal programming alters to reprogram an alter wanting free is given in Daniel M. Traver’s book (Phd dissertation) Dissociative Disorders and Mind Control. Wichita, KS Daniel Traver, 1996, p. What the hell man you can’t stand a winter worse yet you’ll cry and you’ll die as we place the mindset you won’t know what to do now you’ll hear every rhyme and you’re cravings will be as an addict in crime" This rhymed program would accomplish its goal of wearing down the alter and bringing that alter into line. SONGS Yankee Doodle (used for sexual obedience programming "mind the step" and the word "girls" was changed to "boys" to make "and with the boys be handy. "Yankee Doodle keep it up" was ref ramed to mean "slave yank yankee doodle (the penis) sexually up" MTV is blatantly using programming rock-and-roll songs. Aleister Crowley is featured in some of these. Maiden (a satanic rock and roll band) blatantly places the words "POWER SLAVE" on one of their CD covers along with snakes and an enlightening pyramid. Anton LaVey has had an MTV song video shown, where he sings in detail how he is going to make the listener into a sex-slave, etc. etc. Some of
this is blatantly mind-control in the open, it is so open it is dismissed by many of the public.