Fritz Springmeier & Cisco Wheeler Part 1 How the Control Comes about by Fritz Springmeier



Download 4.49 Mb.
View original pdf
Page112/380
Date07.11.2018
Size4.49 Mb.
1   ...   108   109   110   111   112   113   114   115   ...   380
RINGS, CREDIT CARDS, TOKENS etc.
A ring with a snake swallowing its tail called Ouraboros signifies rank in the Illuminati. Rings, credit cards, business cards, tokens and keys are all used as codes, triggers and signals. For instance, one slave had an old distinctive skeleton key. In another instance, a slave was given a token from a particular business as a BONA FIDE. In another instance, the
BONA FIDE was a programmer’s business card from his notional job. In another instance, a particular credit card would get the user into particular parts of the slave’s system.
Page 61 Zeta is the sixth letter, and it’s ancient meaning was a sacrifice.
(These codes are not known by the author.)
O. SAMPLE CODES FOR ALTERS.

As an example of the type of code names (called operational cryptonyms) used for an intelligence asset one intelligence asset had the following cryptonyms: AECHALK, ARINIKA,
CHICKADEE, HERO, IRONBARK, RUPEE, & YOGA.
Monarch ID. code reviewed:
These codes are purely a representative model-not any particular real system. The overall system code at times consists of [birthdate + programming site codes + birth order +number of generations family was in the Illuminati For our hypothetical system Mary we have the hypothetical overall system code of 6-13- 51- 14 - 02 - 12. In order to give the codes fora hypothetical alter system we will have to explain somethings as we go. The Programmers have for each slave both medical programming files, and a grey or black binder with the programmed access, trigger, codes & cues, structure. Atypical Illuminati system will be a cube (although spheres and pyramids are also used. The principle alters will be the "a" alters. Atypical section of alters will consist of ax grid of alters. These are alters who live in a world together and must function together. Ax section will have families of "a" through "in" alters. Thea" alters will be the primary alters that the Programmers will interact with. The
Programmer may call up an "a" alter and ask it to go get the "c"
alter in its family, rather than directly asking for it. This initial page of alter codes will be the primary or "a" alters. If we are dealing with ax x 13 cube of alters, then the initial page has 13 "a" alters of each section. Each of these alters will have an access code which will often include the following components AN ASSIGNED COLOR + AN ALPHANUMERIC CODE + A PERSONALIZED MAGICAL NAME.
This will equal 1/3 their access code. These code words must be repeated three times to pull the alter up. However, if an alter is trained well, and hears his master’s voice, an alphanumeric code can pull the alter up. For many of the alters, the reversal of their access code puts them back to sleep. This is an important point, because some alters would be dangerous to leave in control of the body. Thea" alters are regular alters. Many of them have been hypnotically age advanced to see themselves as teenagers or adults. Sometimes "band "c" alters are also aged.
The "d" through "in" alters are generally left as they were split and most of them are infantile, with little concept of how old they are. The little ones will be the ones who often remember the programming very well, and know things about the system.
The top alters will also sometimes receive personal names from their handler. This is in addition to all their codes. If the alter is responsive to its master, the personal name might pull the alter up too. Do all of the alters get charted There are several

groups of alters which get charted separate from the rest or don’t get charted at all. Because of the competition and distrust between the different programmers, they often place in secret back doors into the person’s mind that only they know about.
Worlds of secret alters loyal and devoted to the programmer maybe built into the system and not appear on the regular charts. The core, and some of the primal splits from the core will not appear on the regular grids. They will be placed on a separate sheet, and their codes will be in some magical language. The Illuminati
Page 62 commonly employs 20 magical languages, and Hebrew, Latin and Greek are also often used for charting the core and its primal splits. Enochian is a good example of a magical language used by the Illuminati. Some alters will be created solely by the slave in order to cope with life. Hourglass alters have entire sentence access codes. Deaf & blind alters need their access code signed on their hands by moving their fingers up and down, etc. End time alters may have access codes that may entail reading an entire page. Reporting alters are often small children, that are hidden in each section, and may require slaps to the face or jabs with a needle to pull them up. Spinner kittens will be accessed via their mama cat, who acts like a
Madam in a "cat house. The codes for this was given in the
Beta section codes of Vol.2.
Telephone tones are frequently used to be able to key in (that is access or trigger) parts of the computer program matrix.
Dominoes also are used for the computer programming. The dominoes are put in so that the programmers can get a domino effect, if they want to set off a series of programs. Dominoes and flashing sequences of lights were used to train the child to automatically respond to a certain pattern of dots.
P. Catholic Programming (by Jesuits etc.)
KEYS TO THE KINGDOM = world domination by mind control
In the s, the Jesuit branch of the Illuminati placed tatoos onto their mind-controlled slaves. These tatoos consisted of the sacred heart with arose a dagger, & were generally placed upon the left hand. The Jesuits have discontinued the practice of tattooing their slaves. Now all types of people are using this sacred heart tatoo.
The Rite to Remain Silent is a programming trauma which is a satanic refersal of the Catholic Mass. The VOW OF SILENCE

is a keep quiet program activated by "THE WALLS HAVE
EARS & THE PLANTS HAVE EYES SO YOUR SILENCE
IS TANTAMOUNT TO SUCCESS" It is explained to the victim that the seashells the plants have the ability to hear,
and that a sensitive occultist (programmer) can psychically pickup what the plants and seashells hear. "MAINTAIN IT" -is a command to maintain the Vow of Silence. "MAINTAIN IT LISTEN- a command to keep silent & listen to a command.
"ENTER INTER INNER DIMENSION TWO" is a standard
Jesuit infinity program (2 is a sacred voodoo no) Pontifax is a demon or alter placed in Jesuit systems.
BABY BREATH, BLACK ROSE, and WHITE ROSE are codes/triggers that are all used in Jesuit mind control. The Baby
Breath and the black rose relate to programming having to do with death. The WHITE ROSE is a trigger to cue a person to release programming. The black rose is also used by the Mafia.
The black rose was also used by George Bush, drug kingpin for the Illumination his no. 1 helicopter for the upholstery pattern.
When the Catholic Priests do the handsignal genuflection across their chest, this has the second meaning which is a programming meaning of north, southeast and west.
Q. Mensa Programming (by MENSA)
The MENSA codes are sequences of numbers.
R. HAND SIGNALS
Masons and monastic orders who program are very keen on hand signals. Avery skilled handler can do morse code with winks and eye rolls.
Rotating the hands around each other and then gesturing with the hands toward the person with both hands means--"did you get the signal?"
Page 63 Sign of distress. Arms raised over the head with palms forward.
Then lowing the arms to a bent position with the hands at head level, and then lowing the hand to chin level, and then dropping them to the side.
Drawing the right hand across the throat with the thumb of the hand pointing to the throat. (used in connection with oaths,
such as fidelity to death.)


· Sign of faith. Hand on the heart Sign of plucking out the heart Sign of Reverence Sign of Satan made over solar plexus Sign of touching the crown of the head Sign of two hands pointing to the solar plexus Sign of Preservation. Consists of placing one handover the heart, and raising the other to form aright angle at the elbow,
with the hand pointing to heaven.
The movie "Dune" showed male & female Ilium, hierarchy hand greetings, as well as showing signet rings, which are indeed often worn on pinky fingers. (The movie also shows the
Karat goddess, how a man becomes a Grand Master by learning control of the demons, astral projection through the spheres which are conquered by the Grand Master, & control of the int.
weather, etc.)
S. SCRIPTURES USED IN PROGRAMMING (cont. from
Vol. 2. chap. 10)
· 1 KGS 7:21 -talks about 2 pillars on the outside of the
Temple. The pillars of Joachin and Boaz are important to
Freemasonry and are built in the slaves mind at an intermediate level. Joachin is a white pillar of light associated with fire. It is easy to see how this association could be built by certain traumas. Boaz is the shadowy pillar of darkness and is also associated with water. A
dark water torture would make this association. The two pillars represent the two sides of the
Illuminati’s "the Force. Between them is the door to the
Illuminati’s House of God 1 KGS description of Solomon’s Temple used to build the imagery and the lion guards to the internal Temple programmed into victims rd Psalm--used as a cue to signal a ritual time Song of Solomon--Used in the ritual of the Great Rite, a ritual pertaining to the Middle Earth, where the High Priest Priestess join in sexual union as the God & Goddess creating fertility for the land Ezekiel chap. 1 and chapter 12 are being used for endtime

callback codes.
T. ALIEN PROGRAMMING Blue beams of light are used as a hypnotic induction for slaves who are given the cover story of being abducted by aliens The All-Seeing Eye is used to represent the planet Sirius.
Sirius is important to the Hermetic magicians, and some of the programmers are deeply into hermetic magic. Satan is said to come from Draco or Sirius, esp. the dog star Canis major.
Masonic programming may well have the "blazing star"
portrayed in the programming as a pentagram, with the name
Sirius. Sirius may represent the Master, the creator of the system in some systems where the programmer is steeped in
Masonic philosophy. A sickle maybe involved with the Garden of Eden story for some victims of this type of programming,
because supposedly the Golden Age ended with a sickle splitting heaven from earth. The ability of the handlers signals to the slave in so many mediums makes it difficult to communication and accessing, to send different prevent communication and accessing.
Page 64


C. training the unborn child
B. administering drugs for programming
B. the power of hypnosis ........................................
Vi. deeper insights on the use of electricity &
F. placing thoughts directing into the human mind
F. using mirrors & spinning
Part 2. how help comes about for
Denial, how to deal with therapist's
Hope............................................................................ 345
Self-inflicted harm, how to handle
Triggers, how to defuse
Abusers, confrontations or not
Dream work, understanding
Implants, dealing with
Rationales, understanding cult r
Surveillance, dealing with
Dedicationthis book is dedicated to the two million americans and
Did (also known as mpd), it is recommended that you consult
Mengele’s concentration camp research is still classified. much
Syndrome campaign, or as those of us who know the facts like
Cia and office of naval intelligence and mi, they can be given
Un-american activities "since man began, he has tried to
Programming is a foundation rock of the new world order that
Cia director admiral stansfield turner disclosed that the cia
Isaiah the great prophet said, "the lord god hath given me
Thessalonians (1 thes 5:14) says that in effect that different
Christ." eph. 4:13 if the body of christ is to attain fullness, we
Alter-our usage is trying to follow the programmers usage of
Mengele-created grid would be a grid of x principal
Grand druid council, the committee of 300, and the committee
Monarch programming--this was a specific project carried out
Switching--this is when one part (fragment) of the mind takes
Next page 1 ...introduction
Breeding good subjects for hypnosis
Training the unborn child
Common illuminati work with twins
Selection of adult candidates for
U.s. govt. mind-control level 1.
U.s. govt. mind-control level 2.
U.s. govt. mind-control level 3.
U.s. govt. mind-control level 5
Testing young children to plan the
Daily abuse works best for programming
A trauma to develop animal alters
The use of drugs
Classifying mind-drugs
Administration of drugs for programming
More programming drugs
Stabilizing the programming
Extensive research done to influence human
One type of experience of victim hypnotic drug
What the mind-control programmers use to
Hiding the codes
Programming with lsd
Chemically triggering natural instinctual
Sexual stimulation-programming
Adrenalchrome (adrenal chromaffin)
Hypnosis & the occult
Understanding the basics about hypnosis
The power of hypnosis
Understanding the deeper mechanics of
Programming aids
Using holograms as an access aid
Preparing the brain
Early training for slaves
Magical training on the starlight level
The monarch programming script for over
Induction training script
Bringing the slave out of trance
Deep trance programming
Color programming
The association of colorful sights,
Light & color
Special colors
Healing by correct vibrations & rays
Using hypnosis to heal the slave after
And the beat goes on...
Hypnotic codes, cues and triggers
Tones & cords
Program codes during 1972-1976
Page 37 ...chapter 4.
In the s, marquis de puysegur was putting people into deep hypnotic trances
Spiegel and leonard, 1986). the mind simply diverts the pain into a "mental floppy
This author (fritz) has reported that programmed multiples are able to increase the
K-lines without the normal unconscious conservative restraints. under behavior
Understanding the deeper mechanics of hypnosis
Intention system sends out cognitive search demons, they do not have to involve
Black forest, germany
China lake naval research base (inyokern), ca--
Colorado springs, co
Ft. campbell, kt
Goddard space flight center-
Mcclellan afb, ca
Patrick afb,--portland
Scotty’s castle, death valley, ca
Tinker, afb, ok
Utah state prison
Wright-patterson afb
Appendix 3. clones,
Some of the films that show existing
Oregon’s underground secret cloning
Further investigations at dulce’s
Summary of the four methods.
Back to contents
To contentsnext
The harvest of weeping
Boundaries & roles
Communications issues
Denial, how to deal with the therapists or ministers
Depression (initial client complaint)
Eating disorders
When mind-control victims with eating
Evaluation forms
Sample questions in areas of inquiry
Fear, what f. issues do victims have
Initial questionaire
If some of these are yes
Panic attacks, suggestions
Understanding programming
Protection, spiritual
The unique power of the truth, "ye shall
Other items of protection
Special situations where spiritual
Where will the enemy counterattack
Safety issues, of slave
The safety of child victims
Safety issues, of support team
The good news
Spiritual issues
Structuring, how it is done, its consequences and its
Suicidal thoughts (early client complaint)
Long term work
Support team, organizing one
Traumas, foundational traumas, how to
Every time the victim of mind-control accidently triggers a
Truth, discernment of
The correct goal & some basic techniques.
Abreactions, understanding
Visible clues in victim:
Visible clues in the victim:
Visible clues:
Alters, how to work with deep illuminati alters (issues for therapists)
How to work with deeper illuminati parts
Treat with respect
Denial, identifying and dealing with defense mechanisms
Part a. the meaning of dreams
Part b. dream telepathy & mpd
Part ca listing of research into mpd (did) & dreams
Part d. important findings of mpd (did) dream research
Part e. our suggestions concerning mpd dream work
Part f. standard illuminati programming concerning
Family, rebuilding a shattered family
Flooding, how to deal with
Benefiting from grief by fritz
Guilt, dealing with (also see art. on "self-forgiveness)
Identity, discovering it
Integration, understanding
Assisting the victim to see.
Difficulties, preexisting & created.
Where to search for information.
Jobs, new ones for alters
Justice system, dealing with the broken j.s.
How to deal with mazes
How to deal with mirrors
Programming, foundations, destruction of
Crocell--this demon makes the noise like rushing water that alters talk about hearing in their internal worlds.
Haborym--this is a demon of fire who is placed in control of the fire around the internal hell pit.
Malphas--a builder of high towers. he may also get involved with the hypnosis.
Raum-- he destroys internal parts or internal cities.
Succubus--a female demon who preys on men sexually. this demon will be active during rituals.
Alter: you can’t love what isn’t.
Alter: god can’t love us.
Rationales, of the abusers
Reality vs perception
Salvation, obtaining it, issues for multiples
Satanic cults, understanding the practice of
Demonology, and its relation to mind-control and the
Self-forgiveness, to achieve
Split-brain programming
Exercises to rewire the brain’s
Surveillance, dealing with surveillance
Tips for therapists
Transference, issues of
Will be varied.
Can happen naturally.
Can be worked with during therapy.
Transference issues call for teams.
Selection & preparation.
Body manipulation
External controls
Advantages gained from working with
Deeper cult parts
A final trick
World, external, how to underatnd the external world
Worlds, the destruction of
Understanding the st human brain,
Manipulation of the reptilian brain
How the worlds are built & the computers
How the demons protect the system, & how
What people in the past have done, and why
How the grand druid council is linked to
Getting meaningful assistance from a
Summary & final comments
Typically, a sister of light would be blindfolded and taken down many flights of
Back back



Share with your friends:
1   ...   108   109   110   111   112   113   114   115   ...   380


The database is protected by copyright ©userg.info 2017
send message

    Main page

bosch
camera
chevrolet
epson
fiat
Honda
iphone
mitsubishi
nissan
Panasonic
Sony
volvo
yamaha