O. SAMPLE CODES FOR ALTERS. As an example of the type of code names (called operational cryptonyms) used for an intelligence asset one intelligence asset had the following cryptonyms: AECHALK, ARINIKA, CHICKADEE, HERO, IRONBARK, Page 69 of 296 Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler 3/1/2007 http://www.whale.to/b/sp/springmeier.html
RUPEE, & YOGA. Monarch I.D. code reviewed : These codes are purely a representative model-not any particular real system. The overall system code at times consists of [birthdate + programming site codes + birth order + number of generations family was in the Illuminati.] For our hypothetical system Mary we have the hypothetical overall system code of: 6-13- 51- 14 - 02 - 12. In order to give the codes for a hypothetical alter system we will have to explain some things as we go. The Programmers have for each slave both medical programming files, and a grey or black binder with the programmed access, trigger, codes & cues, & structure. A typical Illuminati system will be a cube (although spheres and pyramids are also used). The principle alters will be the "a" alters. A typical section of alters will consist of a 13 x 13 grid of alters. These are alters who live in a world together and must function together. A 13 x 13 section will have 13 families of "a" through "in" alters. The "a" alters will be the primary alters that the Programmers will interact with. The Programmer may call up an "a" alter and ask it to go get the "c" alter in its family, rather than directly asking for it. This initial page of alter codes will be the primary or "a" alters. If we are dealing with a 13 x 13 x 13 cube of alters, then the initial page has 13 "a" alters of each section. Each of these alters will have an access code which will often include the following components: AN ASSIGNED COLOR + AN ALPHA NUMERIC CODE + A PERSONALIZED MAGICAL NAME. This will equal 1/3 their access code. These code words must be repeated three times to pull the alter up. However, if an alter is trained well, and hears his master’s voice, an alpha-numeric code can pull the alter up. For many of the alters, the reversal of their access code puts them back to sleep. This is an important point, because some alters would be dangerous to leave in control of the body. The "a" alters are regular alters. Many of them have been hypnotically age advanced to see themselves as teenagers or adults. Sometimes "b" and "c" alters are also aged. The "d" through "in" alters are generally left as they were split and most of them are infantile, with little concept of how old they are. The little ones will be the ones who often remember the programming very well, and know things about the system. The top alters will also sometimes receive personal names from their handler. This is in addition to all their codes. If the alter is responsive to its master, the personal name might pull the alter up too. Do all of the alters get charted? There are several groups of alters which get charted separate from the rest or don’t get charted at all. Because of the competition and distrust between the different programmers, they often place in secret back doors into the person’s mind that only they know about. Worlds of secret alters loyal and devoted to the programmer may be built into the system and not appear on the regular charts. The core, and some of the primal splits from the core will not appear on the regular grids. They will be placed on a separate sheet, and their codes will be in some magical language. The Illuminati commonly employs 20 magical languages, and Hebrew, Latin and Greek are also often used for charting the core and its primal splits. Enochian is a good example of a magical language used by the Illuminati. Some alters will be created solely by the slave in order to cope with life. Hour glass alters have entire sentence access codes. Deaf & blind alters need their access code signed on their hands by moving their fingers up and down, etc. End time alters may have access codes that may entail reading an entire page. Reporting alters are often small children, that are hidden in each section, and may require slaps to the face or jabs with a needle to pull them up. Spinner kittens will be accessed via their mama cat, who acts like a Madam in a "cat house". The codes for this was given in the Beta section codes of Vol.2. Telephone tones are frequently used to be able to key in (that is access or trigger) parts of the computer program matrix. Dominoes also are used for the computer programming. The dominoes are put in so that the programmers can get a domino effect, if they want to set off a series of programs. Dominoes and flashing Page 70 of 296 Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler 3/1/2007 http://www.whale.to/b/sp/springmeier.html
sequences of lights were used to train the child to automatically respond to a certain pattern of dots.