Part 1 How the Control Comes about


HYPNOTIC CODES, CUES AND TRIGGERS



Download 4.52 Mb.
View original pdf
Page52/316
Date07.11.2018
Size4.52 Mb.
1   ...   48   49   50   51   52   53   54   55   ...   316
HYPNOTIC CODES, CUES AND TRIGGERS
This chapter will provide some more of the hypnotic codes, cues, triggers or whatever one wants to call these words, noises, and sensory inputs that manipulate these poor victims turned into Monarch robots. The reader is encouraged to refer to Vol. 2 for the principle list of codes. Other chapters will explain about the structures these codes go to, and also the spiritual dimensions of these codes and structures. Another way to see things is to recognize that the programmers have created "power words" to which they have attached memory and programming. If a de-programmer observes closely the word usage of the victim, you will begin to spot power words of the abuser, for instance, "follow the yellow brick road. Unfortunately, people who are not initiated into the arcane world of handshakes, Page 52 ... grips, codes, signals and cues allow the appearance of these things to be interpreted from their own frame of reference. Usually, because these events are not perceived as being significant, outsiders forget them immediately and therefore remain oblivious to some of the most overt clues. Once the reader is aware of the types of programming themes used the Wizard of Oz, Alice In Wonderland, and Star Wars and Star Trek, etc, he will begin

to realize our entire American culture has been transformed into one big mind-control programming center during the second half of the twentieth century Unfortunately for the victim, apparently harmless little things, for instance, the arrival of flowers to their hospital bedside, a dead bird on their doorstep, or the words "NEW BEGINNINGS" and "NEW LIFE" may signify programming commands. One Illuminati slave in this area has started a large church called NEW BEGINNINGS. The name was not by accident. A cipher is when symbols are used to represent letters. One can use letter frequencies to break ciphers. There are charts for letter frequencies for the chief languages. Likewise, there are frequencies to codewords. The Illuminati’s intelligence agencies have programmed thousands upon thousands of slaves. There are only so many code words to pick from and some of these code words are favorites. In the previous book many of their favorite code words were listed, but words starting with As, B’s, Ts, Us, Vs, ‘W’s,
X’s, and Y’s, were not given and will be now. (A plus sign indicates other words are attached to the root word) From the coauthor Fritz Springmeier’s experience, the following is a continuation of favorite code words that have been used to program slaves with AARON, ABBY, ABIGAIL, ABLE, ABNER, ABRAHAM, ACACIA. ACE, ADAM,
ADELPHI, AGATE, AIR +, ALABASTER, ALADIN, ALBERT, ALFA or ALPHA. ALICE, ALLEY CAT, ALLIGATOR, AMOS, AMY, ANGEL, ANNA, ANTHONY, APACHE, APOLLO, APOSTLE, APPLE +, ARCHER, ARGUS, ARK, ARROW, ASK
+, ASTER, ATHANTIS, ATLAS, AUDREY, AURORA. AUTUMN +, AZTEC, B +, BABE, BABY, BACKROOM, BACKBONE, BAD, BAKER, BALD, BAMBI, BANANA, BANJO, BANKNOTE, BARBARA. BARK, BARON, BEACH +, BEAST, BECKY, BEEHIVE, BEETHOVEN, BELSHAZZER, BERMUDA, BERTHA, BETA, BETSY, BETTY, BEULAH, BEWITCH, BICYCLE, BIG BROTHER, BINGO, BIRD DOG, BIRTHDAY, BLACK, BLACK +, BLACK SHEEP, BLACK WIDOW, BLANCA, BLONDIE, BLOODHOUND, BLOODY +, BLUE +, BOA. BOBCAT, BOMBAY, BONANZA. BOODLE, BORAX, BOXCAR, BRASS +, BRIDGET, BROOMSTICK, BUCCANEER, BUICK, BULL, BULLDOG, BULLFROG, BUMBLEBEE, BUNNY, BUTTERCUP, BUZZARD, BYRON, T-BIRD, TADPOLE, TALISMAN, TAN, TANGO, TANYA, TARA, TARZAN, TEACUP, TEARDROP, TEEPEE, TERRIER, TERRY, TESTAMENT, THOR, THREE SISTERS, THUNDER, THUNDERBOLT, THUNDERCLAP, THUNDERFLASH, THUNDERSTORM, TIAMET, TIGER, TILLIE, TITAN, TOMCAT, TONI or TONY,
TOPAZE, TOPSOIL, TORNADO, TOTENKOPF, TRINITY, TURTLE, UGLY, ULYSSES, UMBRELLA, UNCLE +, UNDERDOG, UNICORN, UNIFORM, URSULA, VAGABOND, VAMPIRE, VANCOUVER, VARSITY, VELVET, VENUS, VERONICA, VICKY, VICTOR, VIKING, VIOLA, VIOLET, VIPER, VIRGINIA VOODOO, VULCAN, VULTURE, WAGON WHEEL, WALDORF, WALLFLOWER, WANDA. WARRIOR, WASP, WATCHDOG, WEASEL, WHISKEY, WHITE +, WIDOW, WILDCAT, WILLOW, WINNIE, WINTER +, WIZARD, WOLF,

WOLF +, WYOMING, X-FORCE, X-RAY, XYZ, YANKEE, YANKEE DOODLE, YELLOW, YOGI, & YO YO. Page 53 ... The intelligence organizations prefer to code a single project with a single word, and an ongoing operation with two words. A nickname of something will consist of two words. The reader needs to bear several things in mind. First, the programmers generally have intelligent, well sounding codes, that do form patterns. For instance, a woman’s name from the Bible will be used as a code, with subparts or subcodes having other female names from the Bible. Deeper Illuminati parts will have goddess & god names, and king
& queen names for cult alters. These are the names the handler or cult uses--NOT their access codes. The codes for slaves follow patterns. There are standard and unique codes. During the s through the s there were only perhaps a dozen American master programmers travelling around. (After that the number of programmers appears to get quite large) The master programmers would lay in the foundational programs and codes. They developed the scripts. The codes and systems used from system to system do follow patterns. The child’s creativity & their purpose in life would contribute to the uniqueness of the programming. Each child visualizes differently and the programmer works with the child’s mind. The master Illuminati programmer would allow the handler--the "Daddy" figure in life to have the day-to-day ownership. The Daddy figure, often the actual pedophile father of the child victim, would be allowed to put in his own codes in the sexual part of the system. Some Daddy figures used their own songs, their own poetry and their own interests in this area of the coding. In other words, most of the system’s codes will reflect the master programmer (such as Dr. Mengele), and the sexual part of the system will reflect the "Daddy" figure’s programming. The standard method for many of the memory and alter codes is to use a combination of the date of the child’s birth along with the date of the trauma for part of the code. A color will then be attached to this, to produce a color-alpha-numeric code combination. These are placed into the internal computers. The standard computer codes were given in Vol. 2. They can be used to temporarily stop programming to give a victim some respite and a chance to regroup. The programmers did not especially care if the front part of a system is discovered and although they hide the anarchy (coven level) witchcraft alters, they don’t hide them like they do the hierarchy alters. The coven alters have simplistic codes. The hierarchy alters which are placed in another area of the system and much deeper, receive a great deal of cabalistic codes and mathematical codes. You will not find the mathematical codes in the front part of a system. The internal programming alters have the power to change codes if they need to protect the programming. They will have to hypnotically work with alters when they trance out at night. In other words, most of their programming of front alters will be done when a system lies down for "sleep"--more accurately described as lies down "for trance" If the internal alters change many codes, in their efforts to protect the system, they will even make it difficult for the handler/programmer to get into the system. The science of Ciphers developed rotors that require lines to lineup. Some simple schemes using this principle appear in some Monarch systems. This is part of the science of structuring. Intelligence codes often come from the Bible or popular fiction books. The deeper codes are occult words, often in foreign languages such as Arabic,

which is an important language in the upper occult world. Slaves will be given COVER NAMES for ops, and often males receive female names and vice versa. The patterns used in programming slaves will represent the worldview of the programmer. If the interests of the Page 54 ... programmer are known, that will be a major clue to the codes they like to install. For this reason, it would be worthwhile to review the access clearance codes that are used for external security of some agencies, because these same types of clearance codes maybe found in mind-controlled slaves. A BIGOT list is a list of names of those who have clearance to a particular set of information. Within a slave there would be numerous BIGOT lists, because persons (personalities) are compartmentalized somewhat like the CIA and the Puzzle Palace (NSA). Agency Codes for clearances include BC, KL, MN, T, COSMIC, MAJIC (MJ), SI, SCI, and Staff D. (As this author has only examined these secret societies from the outside, some insiders may know of other clearances. In other words, it would be foolish to think that this clearance code list is comprehensive, but it has hit upon the major clearances) The exercise in judging whether a person can have access to compartmentalized information is called ADJUDICATION. A group of persons (agents) working under one handler is called a NET. The FBI which also uses mind-controlled slaves likes to call its groups NETS. FUNNY NAME is intelligence slang fora pseudonym. GRANNY is a CIA asset used in the US which is not under their direct funding. The American military-intelligence groups publish a periodical called


Deeper insights into
Breeding good subjects for hypnosis
Training the unborn child
Common illuminati work with twins
Selection of adult candidates for mind-control
U.s. govt. mind-control level 1.
U.s. govt. mind-control level 2.
U.s. govt. mind-control level 3.
U.s. govt. mind-control level 5
Testing young children to plan the programming.
Daily abuse works best for programming
A trauma to develop animal alters
The use of drugs
Classifying mind-drugs
Administration of drugs for programming
More programming drugs
Stabilizing the programming
Extensive research done to influence human memory by
One type of experience of victim hypnotic drug a mind-
What the mind-control programmers use to manipulate memory.
Hiding the codes
Programming with lsd
Chemically triggering natural instinctual drives
Sexual stimulation-programming
Adrenalchrome (adrenal chromaffin)
Hypnosis & the occult
Understanding the basics about hypnosis
The power of hypnosis
Understanding the deeper mechanics of hypnosis
Programming aids
Using holograms as an access aid
Preparing the brain
Early training for slaves
Magical training on the starlight level
The monarch programming script for over the rainbow
Induction training script
Bringing the slave out of trance
Deep trance programming
Color programming
The association of colorful sights, sounds, rhythm & dance.
Light & color
Special colors
Healing by correct vibrations & rays
Using hypnosis to heal the slave after abuse.
And the beat goes on...
Tones & cords
Rings, credit cards, tokens etc.
Program codes during 1972-1976 for dr. green
Appendix b.
Dictionary of programming centers (cont. from vol. 2)
Deep underground military bases (dumb bases)
Selected top secret underground installations that
Appendix 3. clones,
Some of the films that show existing technology:
Oregon’s underground secret cloning facility
Further investigations at dulce’s underground cloning
Summary of the four methods.
Contents for part 2
Intake questionnaire
Self-inflicted harm, how to handle
Triggers, how to defuse
Abusers, confrontations or not
Deliverance, understanding
Hypnosis, self, ins & outs of
Mirrors, how to deal with
Self-forgiveness, to achieve
The harvest of weeping
An overview of what the support team faces
Boundaries & roles
Communications issues
Denial, how to deal with the therapists or ministers
Depression (initial client complaint)
Detection of mind-control
Eating disorders (as an initial problem, and as a deeper issue)
When mind-control victims with eating disorders first
Evaluation forms
Sample questions in areas of inquiry
Fear, how to handle
Fear, what f. issues do victims have (f. is an initial issue for victims)
Initial questionaire
If some of these are yes
Multiplicity, understanding
Panic attacks, suggestions
Understanding programming
Protection, spiritual
Elements of the world-system & its satanic inspired quest
The unique power of the truth, "ye shall know the truth
Other items of protection
Special situations where spiritual protection is needed
Where will the enemy counterattack after progress is
Safety issues, of slave
The safety of child victims
Safety issues, of support team
The good news
Spiritual issues
Structuring, how it is done, its consequences and its treatment
Suffering (client complaint)
Suicidal thoughts (early client complaint)
Immediate suicide threat
Support team, organizing one
Traumas, foundational traumas, how to master understanding what
Truth, discernment of
Abreactions, avoidence of
The correct goal & some basic techniques.
Abreactions, understanding
Child’s subconscious mind protects itself:
Visible clues in victim:
Visible clues in the victim:
Alters, how to work with deep illuminati alters (issues for therapists)
How to work with deeper illuminati parts
Treat with respect
Denial, identifying and dealing with defense mechanisms
Dreamwork, understanding
Part a. the meaning of dreams
Part b. dream telepathy & mpd
Part ca listing of research into mpd (did) & dreams
Part d. important findings of mpd (did) dream research
Part e. our suggestions concerning mpd dream work
Part f. standard illuminati programming concerning dreams & memories
Family, rebuilding a shattered family
Flooding, how to deal with
Benefiting from grief by fritz
Guilt, dealing with (also see art. on "self-forgiveness)
Identity, discovering it
Implants, dealing with
Integration, understanding
Internal information, how to get i.i.
Assisting the victim to see.
Difficulties, preexisting & created.
Where to search for information.
Jobs, new ones for alters
Justice system, dealing with the broken j.s.
How to deal with mazes
How to deal with mirrors
Programming, foundations, destruction of
Crocell--this demon makes the noise like rushing water that alters talk about hearing in their internal worlds.
Guardians--enforcer demons are put in place to protect the system.
Malphas--a builder of high towers. he may also get involved with the hypnosis.
Raum-- he destroys internal parts or internal cities.
Succubus--a female demon who preys on men sexually. this demon will be active during rituals.
Alter: you can’t love what isn’t.
Alter: god can’t love us.
Rationales, of the abusers
Reality vs perception
Responsibilities, tips to face new ones
Salvation, obtaining it, issues for multiples
Satanic cults, understanding the practice of
Demonology, and its relation to mind-control and the satanic cults.
Split-brain programming
Exercises to rewire the brain’s hemisphere’s together for
Surveillance, dealing with surveillance
Tips for therapists
Transference, issues of
Will be varied.
Can happen naturally.
Can be worked with during therapy.
Transference issues call for teams.
Selection & preparation.
Drugs a. placed in front of mirrors under drugs to take on (internalize) the identity of the other person.
Body manipulation
External controls
Advantages gained from working with twins together
Deeper cult parts
A final trick
World, external, how to underatnd the external world
Worlds, the destruction of
Understanding the st human brain,
Manipulation of the reptilian brain
How the worlds are built & the computers rebuild worlds
How the demons protect the system, & how they in turn are
What people in the past have done, and why they have not
Getting meaningful assistance from a system
Summary & final comments
Bibliography-sources
Illustrations & photographs


Share with your friends:
1   ...   48   49   50   51   52   53   54   55   ...   316


The database is protected by copyright ©userg.info 2017
send message

    Main page

bosch
camera
chevrolet
epson
fiat
Honda
iphone
mitsubishi
nissan
Panasonic
Sony
volvo
yamaha