Glossary of how basic terms are used in this book introduction

Program Codes During 1972-1976 for Dr. Green

Download 4.84 Kb.
View original pdf
Size4.84 Kb.
1   ...   74   75   76   77   78   79   80   81   ...   276
Program Codes During 1972-1976 for Dr. Green
One mind-controlled slave, using her photographic memory, managed to sneak into the programming files of her programmer, who went by the code name Dr. Green. Her information was included in the book U.S.
Government Mind Control Experiments On Children which was compiled by
Jon Rappoport and presented before a congressional committee & put on public record. The co-authors recognize some of the programs.
In the late 60’s and early 70’s, all the programming was revamped. The best programs were identified and then used. The continual revamping, editing and modernizing of programs has continued to strengthen the mind-
Page 72 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler

control. The recovering victim’s name is Chris De Nicola, b. 7/62. She worked full-time at Disneyland for 7 years (from ’83-’90). Her father Donald Richard Ebner worked with her major programmer who was Dr. Green.
She received standard Illuminati trauma-based mind-control.
In 1970, she received Radiation Experiments on her neck, throat, & chest. In 1972, the experiments concentrated on her chest, and in 1975 the radiation tests concentrated on her uterus. She was programmed in
Kansas City Univ., Tucson, AZ, & in the desert in AZ. During her programming, the assistants were careless and she was able to sneak into the Programmer’s office and look at the files with her photographic memory. She was caught twice in the files, and tortured, but simply used her ability to nest memories to their disadvantage.
Chris was such a poor programming subject, so much so that finally the programmer tried to trigger her suicide programs to activate, but they failed and she managed to survive. Suicide alters repeatedly tried to kill her body, and they came very close to killing her. On 3 occasions she had to have her stomach pumped, and one occasion when the paramedics found her she’d stopped breathing. She has survived her suicide programming countless times, praise the Lord, and provided what she saw with her photographic memory. The following codes were remembered by Chris without the aid of hypnosis. Cisco and this author recognize some of these programs.
What Chris saw were the files. Each program (script) is given a name and then its file has a standard access code assigned to it. Chris saw the standard access codes.
The standard method for coding a program is to use the DAY OF BIRTH CODE, THEN THE DAY OF THE
TRAUMA that puts in the program into the slave’s mind, and then the STANDARD ACCESS CODE.
Evidently, Chris got into the file with level D programs, which means she was looking at programs 4 levels deep. Comments about the programs are this author’s and reflect his understanding, and may be subject to correction. [Spellings are exactly as program names were spelled.]
Program Name Standard Code
Relevance D-1000
Kick-It-Back D-1010
Cross Fire D-1011
Sophis. Electromagnetic Fields D-1012
(D-1012 makes the slave think they have an electrical field on them. In order to cover their electrical field tests, that they actually do place on slaves, they have the ability to confuse the slave, and prevent detection by activating a programmed abreaction that makes the field seem real, when it doesn’t exist. This prevents detection.)
Gorilla Warfare D-1013
Retreat D-1 014
Nautical Science D-1015
River Runs Deep D-1016 (D-1016 is a powerful program which tells the slave that there is no escape, because the programming runs deep through every fiber of the person.)
Educated Mentality D-1017 (D-1017 is a program to allow the slave to look intelligent when needed.)
Glass House D-1018
Corporate Extrapulation D-1019
Page 73 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler

Closing In D-1 020
Frog Man D-2000
Catastrophic Indifferences D-2020
Quality Control D-2030
Protocol Virus D-2040
Operation 2000 D-2050 (This relates to Project 2000, which is end time programming.)
Pro-Life-Go D-2060
Conspiracy Action D-2070
Verified Suggestion D-2080
Finish Line Protocol D-2080
Fraternity Leads D-2090
Rotten Egg D-3000
Kaiser Confrontation D-3010
Co-Op Protocol D-4701
Forensic Criterion D-4702
Mediator Response D-4703
Mentor Divisible D-4704
Biopsy Synchroization D-4705 [This is a very harsh program.]
D.O.A. D-6000
Laser Documentation D-7000
Freak Out [just what it sounds like] D-7010
-[From here on I will select specific programs, and will not review the entire list of programs that she saw the files for.]
Foolish Games D-7060
Periodic Mind Lapse [a forget code] D-7080
Creepy Crawlers D-8040
Page 74 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler

Shock Permanence [to shock oneself] D-9000
One-For-All D-95452
[punish all for 1 alter’s misbehavior]
Counter-Transference DIA-5001
Border-Line-Schizophrenic DIA-5009
[If the slave misbehaves, they can be triggered to act schizophrenic & get themselves incarcerated into a mental hospital for prgrmmg.]
Lens-Reverse-Angle DIA-5011
Canary-Sings DIA-5015
[reporting alters tattle-tale or an alter sings a script.]
Suicidal Mission [just as it sounds] DIA-5017
Mission Completed [go to "sleep" prgm] DIA-5018
Train-Wreck-Perception DIA-5021
Starvation Tactics [starvation prgm] DIA-5022
Bare-Metric Pressure Process DIA-5023
Fundamental Theology [rel. cover prgm] DIA-5025
Project 2000 412-2000
[This is end-time programming. The word project followed by a number usually refers to the date the project must be completed. Standard methodology for coding then would be that on 4/12/2000 this end-time programming must be completed.] -codes not remembered for these programs which she saw in files-
Candy [candyland programming]
False Memory Syndrome [even in c. 1973 they were setting up the False Memory Syndrome campaign to take down their opposition.]
Forced Brain Wave Activity
Frenzied State [just as it sounds]
Call-Of-Wild [survival techniques]
Hocus Pocus [magic programming]
Mass [cath. mass programming]
Phoe-net-ical Difficulties [obvious]
Page 75 of 296
Deeper Insights into the Illuminati Formula by Fritz Springmeier & Cisco Wheeler

Self Mutilation [obvious]
Van-der-built [related to Vanderbilts III. family]
Warped-Speed-9 [Star Trek programming]
-(Her med. file no.s of radiation lab experiments are given chptr. 8)- p_levels.jpg
A programmed multiple can work at several different levels of participation.

Deeper insights into the illuminati formula by fritz
Chapter 4. science no. 4 - hypnosis
Chapter 5: science no. 5 - the skill of lying, the art of deceit
Chapter 6: science no. 6-the use of electronics & electricity
Chapter 11: science no. 11- internal controls
Appendix 1 - programmers/researchers
Section c. the four types of "clones" that are used by the illuminati,
Warning, read this first before reading the book.
Introduction by fritz
Glossary of how basic terms are used in this book
Chapter 1. science no. 1 - selection & preparation of the victim
Breeding good subjects for hypnosis-hypnosis as it relates to selection & preparation of the
Training the unborn child
Common illuminati work with twins
Selection of adult candidates for mind-control
U.s. govt. mind-control level 1.
U.s. govt. mind-control level 2.
U.s. govt. mind-control level 3.
U.s. govt. mind-control level 5
Testing young children to plan the programming.
Chapter no. 2--the traumatization & torture of the victim
Daily abuse works best for programming
Anger-management-programming traumas
Silence programming traumas to teach silence
Torture for no-write
A trauma to develop animal alters
Trauma to isolate the victim
Chapter 3. science no. 3 the use of drugs
Administration of drugs for programming
More programming drugs (these were not listed in the vol.2 formula book)
Stabilizing the programming
Extensive research done to influence human memory by drugs
The basic phases of memory
Hiding the codes
Programming with lsd-25 (lysergic acid diethylamide)
Chemically triggering natural instinctual drives
Sexual stimulation-programming
Understanding the basics about hypnosis
The power of hypnosis
Understanding the deeper mechanics of hypnosis
Programming aids
Using holograms as an access aid
Preparing the brain
Early training for slaves
Magical training on the starlight level
The monarch programming script for over the rainbow
Deep trance programming
Color programming
The association of colorful sights, sounds, rhythm & dance.
Light & color
Special colors
Healing by correct vibrations & rays
Using hypnosis to heal the slave after abuse.
Hypnotic codes, cues and triggers
Monarch mind-control codes
B. beta (sexual)
C. chi (return to cult)
E. epsilon (animal alters)
I. janus-alex call backs (end-times)
J.>> omicron programming
M. songs & nursery rhymes
O. sample codes for alters.
P. catholic programming (by jesuits etc.)
Q. mensa programming (by mensa)
S. scriptures used in programming (cont. from vol. 2. chap. 10)
T. alien programming
The illuminati.
The establishment, the system.
Deception diminishes power
Be wise as serpents
Disinformation to make their double-agents look good
Names of types of disinformation agents
Tricking suspects
The names of deception tricks
One of the greatest deceptions of all time: disney
Observations about how the illuminati like to hide behind perfect
Contents in the disney deception section of chapter 5.
B. an overview
C. who was walt disney?
Personal details
Occult porn king
As a witness before congress
A possible chronology of events surrounding walt disney's illegitimate birth
Walt disney’s character
D. who was roy o. disney?
E. who was roy b. disney?
The battle between the two disney factions
F. what do we know about the disney family in general?
G. a history of disney
Claude debussy
Some disney people of interest.
Warren beatty
Stephen bollenbach
The tommy dorsey band
Rich h. frank
The osmond brothers
Michael ovitz
Frank g. wells
Some of disney’s blatantly occult movies.
H. disney & its mob connections
Some mob history.
How the disney executives have figured out how to steal land all across the u.s.
Disney and the government
J. disney & mind control
Disney vacations for the elite
Disneyana for the programmed & obsessed.
Mind-control features in disney movies.
K. detailed script on how the disney film fantasia is used for programming
Types of sources
Section e. auxiliary uses of electronics & electromagnetic waves
Glossary of terms for understanding electronic mind control
B1. three typical implant victims
B2. documentation of implants.
B3. gwen towers
Section c. specific implants
Brief chronology of audio implants
Basics of how the implants can function
Uses of the implants
Part. b. secretly implanted audio implants.
Cochlear implants
C2. body manipulating implants
C3. visual/holographic implants
How they work
Typesfiber optics
Artificial lenses
Holographic or h-insert
C4. memex/brain link implants
Interface devices
Organic bioprocessors linked to viruses
C5. torture/nerve & muscle stimulation implants
C6. tracking & i.d. implants
Section d. direct monitoring & manipulation of the brain/mind
Tesla waves used to read minds & implant voices
D2. voices / or thoughts sent electronically directly into the mind
Summary of elf wave mind control capabilities
Section e. auxiliary uses of electronics & electromagnetic waves.
E2. polygraphs for monitoring programming and mission accomplishments
Liquid crystals
Bed coils standardized for mind-control potential
E4. virtual reality.
Chapter 7: the science of structuring
A. structuring of mpd worlds
Control alters called processors
The ferris-wheel subsystem
Data entry points
Testing alters to see if they can be used.
Assassination models (delta models).
Authority factors are maximized
Monkey alters.
Presidential models.
Prostitute models.
Reporting alters.
Repunzel alter.
Internal wall alters.
Structuring with the grand druid council.
Structuring the shadow alters
Structuring in the mirrors
Structuring the tapestry
Chapter 8: the science of body manipulation & programming
A. cranial manipulation
Cranial blood pressure has been kept a secret
Cerebral spinal fluid kept secret
The chinese secret occult society connection
The ancient egyptian connection
Another example
The japanese connection
The early european occult connection
Nineteenth century occult connection
The witchcraft connection
The modern american occult connection
Osteopathy and chiropractic
Bone & skull structure
Cerebrospinal fluid
Transcendental meditation (tm) & the hindu connection
The 3-in-one school connection.
B. genetic engineering
What we’ve covered
Chapter 9: the science of mind manipulation by psychological
Programming to hide revealing dreams
Programming language
Effects of programming
Perception clouds memory
Chapter 10: the 10th science — using spiritual things to control a
Part a. intro on the importance of spiritual programming tactics
Part b. the history of the programmed golem
Part c. the 3 foundations: loss of identity, fear, and demons
Understanding the relationship between fear & demons
Demon possession & spirit guards
The use of giving demonic assistance to entrap.
The use of occult focal points.
Does it glorify demons to cast them out?
Part d. a complete chronology of how the victim experiences the early spiritual
Part e. specific programming maneuvers. the manipulation of near-death-
Hiding the internal self-helper
Interject disks
White gold, other information
B. internal computers
Installation of the standard programming.
Front programs of front computer.
Programmer access to the computer areas.
C. internal hierarchies
The internal hierarchies form rationales
Chapter 12 science no. 12-external controls
Asset control
Building families and communities that have interwoven programming
Boarding schools & body programming.
When controls fail, the final solution.
Dirty psychiatrists involved with mind control
Dirty tavistock controllers
Remote viewing mind-research
List of programmers (continuation from the list given in vol. 2)
What to look for.
Michael aquino, a military/cult mind-control programmer
Personal history.
Understanding the church of set
Understanding some of aquino’s programming.
Sequelae of abuse
Appendix b. the programming sites
Appendix 3. clones, synthetics, organic robotoids and doubles
Summary of the four methods.
Section a. the "future shock" that this topic subjects the common person to.
Section b. instructions on how to clone a person.
A technique--instructions how to clone a human:
Section c. the four types of ‘clones’ that are used by the illuminati:
C3. organic robotoids.
How the memory of a person is transferred for the organic robotoids.
C4. doubles (look alikes).
Section d. secret cloning sites (see also appendix b, where d.u.m. bases are listed.)
Oregon’s underground secret cloning facility
Further investigations at dulce’s underground cloning facility

Share with your friends:
1   ...   74   75   76   77   78   79   80   81   ...   276

The database is protected by copyright © 2017
send message

    Main page