HYPNOTIC CODES, CUES AND TRIGGERS This chapter will provide some more of the hypnotic codes, cues, triggers or whatever one wants to call these words, noises, and sensory inputs that manipulate these poor victims turned into Monarch robots. The reader is encouraged to refer to Vol. 2 for the principle list of codes. Other chapters will explain about the structures these codes go to, and also the spiritual dimensions of these codes and structures. Another way to see things is to recognize that the programmers have created "power words" to which they have attached memory and programming. If a de-programmer observes closely the word usage of the victim, you will begin to spot power words of the abuser, for instance, "follow the yellow brick road". Unfortunately, people who are not initiated into the arcane world of handshakes, grips, codes, signals and cues allow the appearance of these things to be interpreted from their own frame of reference. Usually, because these events are not perceived as being significant, outsiders forget them immediately and therefore remain oblivious to some of the most overt clues. Once the reader is aware of the types of programming themes used: the Wizard of Oz, Alice In Wonderland, and Star Wars and Star Trek, etc., he will begin to realize our entire American culture has been transformed into one big mind-control programming center during the second half of the twentieth century! Unfortunately for the victim, apparently harmless little things, for instance, the arrival of flowers to their hospital bedside, a dead bird on their doorstep, or the words "NEW BEGINNINGS" and "NEW LIFE" may signify programming commands. One Illuminati slave in this area has started a large church called NEW BEGINNINGS. The name was not by accident. A cipher is when symbols are used to represent letters. One can use letter frequencies to break ciphers. There are charts for letter frequencies for the chief languages. Likewise, there are frequencies to codewords. The Illuminati’s intelligence agencies have programmed thousands upon thousands of slaves. There are only so many code words to pick from and some of these code words are favorites. In the previous book many of their favorite code words were listed, but words starting with A’s, B’s, T’s, U’s, V’s, ‘W’s, X’s, and Y’s, were not given and will be now. (A plus sign indicates other words are attached to the root word.) From the co-author Fritz Springmeier’s experience, the following is a continuation of favorite code words that have been used to program slaves with: AARON, ABBY, ABIGAIL, ABLE, ABNER, ABRAHAM, ACACIA. ACE, ADAM, ADELPHI, AGATE, AIR +, ALABASTER, ALADIN, ALBERT, ALFA or ALPHA. ALICE, ALLEY CAT, ALLIGATOR, AMOS, AMY, ANGEL, ANNA, ANTHONY, APACHE, APOLLO, APOSTLE, APPLE +, ARCHER, ARGUS, ARK, ARROW, ASK +, ASTER, ATHANTIS, ATLAS, AUDREY, AURORA. AUTUMN +, AZTEC, B +, BABE, BABY, BACK ROOM, BACK BONE, BAD, BAKER, BALD, BAMBI, BANANA, BANJO, BANKNOTE, BARBARA. BARK, BARON, BEACH +, BEAST, BECKY, BEE HIVE, BEETHOVEN, BELSHAZZER, BERMUDA, BERTHA, BETA, BETSY, BETTY, BEULAH, BEWITCH, BICYCLE, BIG BROTHER, BINGO, BIRD DOG, BIRTHDAY, BLACK, BLACK +, BLACK SHEEP, BLACK WIDOW, BLANCA, BLONDIE, BLOODHOUND, BLOODY +, BLUE +, BOA. BOB CAT, BOMBAY, BONANZA. BOODLE, BORAX, BOXCAR, BRASS +, BRIDGET, BROOMSTICK, BUCCANEER, BUICK, BULL, BULLDOG, BULLFROG, BUMBLEBEE, BUNNY, BUTTERCUP, BUZZARD, BYRON, T-BIRD, TADPOLE, TALISMAN, TAN, TANGO, TANYA, TARA, TARZAN, TEACUP, TEARDROP, TEEPEE, TERRIER, TERRY, TESTAMENT, THOR, THREE SISTERS, THUNDER, THUNDERBOLT, THUNDERCLAP, THUNDERFLASH, THUNDERSTORM, TIAMET, TIGER, TILLIE, TITAN, TOM CAT, TONI or TONY, TOPAZE, TOPSOIL, TORNADO, TOTENKOPF, TRINITY, TURTLE, UGLY, ULYSSES, UMBRELLA, UNCLE +, UNDERDOG, UNICORN, UNIFORM, Page 61 of 296 Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler 3/1/2007 http://www.whale.to/b/sp/springmeier.html
URSULA, VAGABOND, VAMPIRE, VANCOUVER, VARSITY, VELVET, VENUS, VERONICA, VICKY, VICTOR, VIKING, VIOLA, VIOLET, VIPER, VIRGINIA VOODOO, VULCAN, VULTURE, WAGON WHEEL, WALDORF, WALLFLOWER, WANDA. WARRIOR, WASP, WATCHDOG, WEASEL, WHISKEY, WHITE +, WIDOW, WILD CAT, WILLOW, WINNIE, WINTER +, WIZARD, WOLF, WOLF +, WYOMING, X-FORCE, X-RAY, XYZ, YANKEE, YANKEE DOODLE, YELLOW, YOGI, & YO YO. The intelligence organizations prefer to code a single project with a single word, and an ongoing operation with two words. A nickname of something will consist of two words. The reader needs to bear several things in mind. First, the programmers generally have intelligent, well sounding codes, that do form patterns. For instance, a woman’s name from the Bible will be used as a code, with subparts or subcodes having other female names from the Bible. Deeper Illuminati parts will have goddess & god names, and king & queen names for cult alters. These are the names the handler or cult uses--NOT their access codes. The codes for slaves follow patterns. There are standard and unique codes. During the 1940’s through the 1960’s there were only perhaps a dozen American master programmers travelling around. (After that the number of programmers appears to get quite large.) The master programmers would lay in the foundational programs and codes. They developed the scripts. The codes and systems used from system to system do follow patterns. The child’s creativity & their purpose in life would contribute to the uniqueness of the programming. Each child visualizes differently and the programmer works with the child’s mind. The master Illuminati programmer would allow the handler--the "Daddy" figure in life to have the day-to-day ownership. The Daddy figure, often the actual pedophile father of the child victim, would be allowed to put in his own codes in the sexual part of the system. Some Daddy figures used their own songs, their own poetry and their own interests in this area of the coding. In other words, most of the system’s codes will reflect the master programmer (such as Dr. Mengele), and the sexual part of the system will reflect the "Daddy" figure’s programming. The standard method for many of the memory and alter codes is to use a combination of the date of the child’s birth along with the date of the trauma for part of the code. A color will then be attached to this, to produce a color-alpha-numeric code combination. These are placed into the internal computers. The standard computer codes were given in Vol. 2. They can be used to temporarily stop programming to give a victim some respite and a chance to regroup. The programmers did not especially care if the front part of a system is discovered and although they hide the anarchy (coven level) witchcraft alters, they don’t hide them like they do the hierarchy alters. The coven alters have simplistic codes. The hierarchy alters which are placed in another area of the system and much deeper, receive a great deal of cabalistic codes and mathematical codes. You will not find the mathematical codes in the front part of a system. The internal programming alters have the power to change codes if they need to protect the programming. They will have to hypnotically work with alters when they trance out at night. In other words, most of their programming of front alters will be done when a system lies down for "sleep"-- more accurately described as lies down "for trance." If the internal alters change many codes, in their efforts to protect the system, they will even make it difficult for the handler/programmer to get into the system. The science of Ciphers developed rotors that require lines to line up. Some simple schemes using this principle appear in some Monarch systems. This is part of the science of structuring. Intelligence codes often come from the Bible or popular fiction books. The deeper codes are occult words, often in foreign languages such as Arabic, which is an important language in the upper occult world. Slaves will be given COVER NAMES for ops, and often males receive female names and vice versa. The patterns used in programming slaves will represent the world view of the programmer. If the interests of the programmer are known, that will be a major clue to the codes they like to install. For this reason, it would be Page 62 of 296 Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler 3/1/2007 http://www.whale.to/b/sp/springmeier.html
worthwhile to review the access clearance codes that are used for external security of some agencies, because these same types of clearance codes may be found in mind-controlled slaves. A BIGOT list is a list of names of those who have clearance to a particular set of information. Within a slave there would be numerous BIGOT lists, because persons (personalities) are compartmentalized somewhat like the CIA and the Puzzle Palace (NSA). Agency Codes for clearances include B, C3, K, L, M, N, 0, T, COSMIC, MAJIC (MJ), SI, SCI, and Staff D. (As this author has only examined these secret societies from the outside, some insiders may know of other clearances. In other words, it would be foolish to think that this clearance code list is comprehensive, but it has hit upon the major clearances.) The exercise in judging whether a person can have access to compartmentalized information is called ADJUDICATION. A group of persons (agents) working under one handler is called a NET. The FBI which also uses mind-controlled slaves likes to call its groups NETS. FUNNY NAME is intelligence slang for a pseudonym. GRANNY is a CIA asset used in the US which is not under their direct funding. The American military-intelligence groups publish a periodical called JANAP 299 which lists the cover names (code names) for many of the ongoing projects, groups, or installations. There are other code books too. C can stand for Controller or Control, which means the person(s) handling a mind-controlled slave. A person, who is neither a controller, nor a slave, nor asset, but who consciously advances the desires of the controller is called a TRUSTED CONTACT. Sexual slaves would not be expected to respond to such a term, but a middle level slave/agent of an intelligence agency might be familiar with this type of intelligence jargon. The BIRD was a name for Fort Holabird, MD where intelligence operatives were trained as well as subjected to mind-control. DIA used the code name EMERALD for drug-trafficking. Boy, does this code word have a double meaning. Since the DIA, which is playing both sides, also is involved with drug smuggling & using Monarch slaves heavily coded with EMERALD type coding. Very shortly, we will provide more of the Monarch hypnotic cues (codes) for the multitude of functions that a Monarch’s mind must carry out. These cues are reinforced as a conditioned response by the programmer. In other words the response becomes so well trained that it becomes automatic. The type of programming which is placed in a slave varies. Remember, for intelligence operations the slave will have to have BONA FIDES, which are codes to allow two people to meet. All slaves are given CONTROL SIGNS which allow them to indicate via a code that they are in trouble. A RECOGNITION signal allows two people to make contact. For instance, the handler might fly his distinctive sounding plane over a slave’s house in a pre-arranged signal. It might also be a particular colored scarf, and a particular set of phrases. A GO-AWAY code is a prearranged signal that means it is unwise to make contact. The go-away signal may be simply placing one’s hands in one’s pocket or turning the porch lights off. A "GO TO GROUND" signal means to go into hiding. A BLACK ENVELOPE, which is in actuality a black-colored envelope, has been used by intelligence to hold the real name of an agent being used. In the case of multiples, a chief of a station might have a BLACK ENVELOPE with the actual name of a mind-controlled agent being used in his field of operations. A MAYDAY BOOK exists for Illuminati and Intelligence slaves which allows them to call if they are about to be arrested. A telephone number is left open for just this purpose. Also common universal Illuminati codes can be used by the slave to get set free from police and judges. BACKSTOPPING is an intelligence term for setting up proof to support the cover stories the intelligence agencies give their agents and assets. Some of the programmed multiples they use, need BACKSTOPPING. Within the Jehovah’s Witnesses, especially their headquarters, the Illuminati uses Enochian language to program with. With Druidic branches Druidic symbols are used. With the Jewish groups, Hebrew is used. Other languages are also used. An Illuminati System can easily have 6 different languages used as programming codes. The foreign language codes will be for small parts of a system only. Special artificial languages are also employed, as well as sign language. The Illuminati employs signs which they teach some of their slaves with Page 63 of 296 Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler 3/1/2007 http://www.whale.to/b/sp/springmeier.html
pick-up sticks. This system of secret symbols is a series of crosses and horizontal & vertical marks. These marks can be drawn on anything, and consist of up to 7 lines. They are believed to be used in regards to ritual dates/ceremonies. These secret signs resemble similar secret symbols used by the Romany tribe of Gypsies. T he masters of mind-controlled slaves also use a technique where one signal or code will carry several messages simultaneously. This is called MULTIPLEXING. We are all aware of the phenomena of how the brain can selectively hear. The brain can select certain sounds to pay attention to, such as when a person is in a noisy room listening to someone, or a football player is trying to hear the quarterback’s calls, likewise certain alters hear certain codes/cues/triggers while others don’t. The internal programmers and reporting alters may internally hypnotically make telephone noises that are fake, so that host alters loose the ability to discern what is real and not real, so that they don’t pay close attention to access calls. This ability of the brain is manipulated in MULTIPLEXING.