Part 1 How the Control Comes about


RINGS, CREDIT CARDS, TOKENS etc



Download 4.52 Mb.
View original pdf
Page56/316
Date07.11.2018
Size4.52 Mb.
1   ...   52   53   54   55   56   57   58   59   ...   316
RINGS, CREDIT CARDS, TOKENS etc.
A ring with a snake swallowing its tail called Ouraboros signifies rank in the Illuminati. Rings, credit cards, business cards, tokens and keys are all used as codes, triggers and signals. For instance, one slave had an old distinctive skeleton key. In another instance, a slave was given a token from a particular business as a BONA FIDE. In another instance, the BONA FIDE was a programmer’s business card from his notional job. In another instance, a particular credit card would get the user into particular parts of the slave’s system. Page 61 ... Zeta is the sixth letter, and it’s ancient meaning was a sacrifice. (These codes are not known by the author) O. SAMPLE CODES FOR ALTERS. As an example of the type of code names (called operational cryptonyms) used for an intelligence asset one intelligence asset had the following cryptonyms: AECHALK,
ARINIKA, CHICKADEE, HERO, IRONBARK, RUPEE, & YOGA. Monarch ID. code reviewed These codes are purely a representative model-not any particular real system. The overall system code at times consists of [birthdate + programming site codes + birth order + number of generations family was in the Illuminati For our hypothetical system Mary we have the hypothetical overall system code of 6-13- 51- 14 - 02 - 12. In order to give the codes fora hypothetical alter system we will have to explain somethings as we go. The Programmers have for each slave both medical programming files, and a grey or black binder with the programmed access, trigger, codes & cues, & structure. Atypical Illuminati system will be a cube (although spheres and pyramids are also used. The principle alters will be the "a" alters. Atypical section of alters will consist of ax

grid of alters. These are alters who live in a world together and must function together. Ax section will have 13 families of "a" through "in" alters. Thea" alters will be the primary alters that the Programmers will interact with. The Programmer may call up an "a" alter and ask it to go get the "c" alter in its family, rather than directly asking for it. This initial page of alter codes will be the primary or "a" alters. If we are dealing with ax x 13 cube of alters, then the initial page has 13 "a" alters of each section. Each of these alters will have an access code which will often include the following components AN ASSIGNED COLOR + AN ALPHANUMERIC CODE + A PERSONALIZED MAGICAL NAME. This will equal 1/3 their access code. These code words must be repeated three times to pull the alter up. However, if an alter is trained well, and hears his master’s voice, an alphanumeric code can pull the alter up. For many of the alters, the reversal of their access code puts them back to sleep. This is an important point, because some alters would be dangerous to leave in control of the body. Thea" alters are regular alters. Many of them have been hypnotically age advanced to see themselves as teenagers or adults. Sometimes "band "c" alters are also aged. The "d" through "in" alters are generally left as they were split and most of them are infantile, with little concept of how old they are. The little ones will be the ones who often remember the programming very well, and know things about the system. The top alters will also sometimes receive personal names from their handler. This is in addition to all their codes. If the alter is responsive to its master, the personal name might pull the alter up too. Do all of the alters get charted There are several groups of alters which get charted separate from the rest or don’t get charted at all. Because of the competition and distrust between the different programmers, they often place in secret back doors into the person’s mind that only they know about. Worlds of secret alters loyal and devoted to the programmer maybe built into the system and not appear on the regular charts. The core, and some of the primal splits from the core will not appear on the regular grids. They will be placed on a separate sheet, and their codes will be in some magical language. The Illuminati Page 62 ... commonly employs 20 magical languages, and Hebrew, Latin and Greek are also often used for charting the core and its primal splits. Enochian is a good example of a magical language used by the Illuminati. Some alters will be created solely by the slave in order to cope with life. Hourglass alters have entire sentence access codes. Deaf & blind alters need their access code signed on their hands by moving their fingers up and down, etc. End time alters may have access codes that may entail reading an entire page. Reporting alters are often small children, that are hidden in each section, and may require slaps to the face or jabs with a needle to pull them up. Spinner kittens will be accessed via their mama cat, who acts like a Madam in a "cat house. The codes for this was given in the Beta section codes of Vol.2. Telephone tones are frequently used to be able to key in (that is access or trigger) parts of the computer program matrix. Dominoes also are used for the computer programming. The dominoes are put in so that the programmers can get a domino effect, if they want to set off a series of programs. Dominoes and flashing sequences of lights were used to train the child to automatically respond to a certain pattern of dots.

P. Catholic Programming (by Jesuits etc) KEYS TO THE KINGDOM = world domination by mind control In the s, the Jesuit branch of the Illuminati placed tatoos onto their mind-controlled slaves. These tatoos consisted of the sacred heart with arose a dagger, & were generally placed upon the left hand. The Jesuits have discontinued the practice of tattooing their slaves. Now all types of people are using this sacred heart tatoo. The Rite to Remain Silent is a programming trauma which is a satanic refersal of the Catholic Mass. The VOW OF SILENCE is a keep quiet program activated by "THE WALLS HAVE EARS & THE PLANTS HAVE EYES SO YOUR SILENCE IS TANTAMOUNT TO SUCCESS" It is explained to the victim that the seashells the plants have the ability to hear, and that a sensitive occultist (programmer) can psychically pickup what the plants and seashells hear. "MAINTAIN IT" -is a command to maintain the Vow of Silence. "MAINTAIN IT & LISTEN- a command to keep silent & listen to a command. ENTER INTER INNER DIMENSION TWO" is a standard Jesuit infinity program (2 is a sacred voodoo no) Pontifax is a demon or alter placed in Jesuit systems. BABY BREATH, BLACK ROSE, and WHITE ROSE are codes/triggers that are all used in Jesuit mind control. The Baby Breath and the black rose relate to programming having to do with death. The WHITE ROSE is a trigger to cue a person to release programming. The black rose is also used by the Mafia. The black rose was also used by George Bush, drug kingpin for the Illumination his no. 1 helicopter for the upholstery pattern. When the Catholic Priests do the handsignal genuflection across their chest, this has the second meaning which is a programming meaning of north, southeast and west. Q. Mensa Programming (by MENSA) The MENSA codes are sequences of numbers. R. HAND SIGNALS Masons and monastic orders who program are very keen on hand signals. Avery skilled handler can do morse code with winks and eye rolls.

Rotating the hands around each other and then gesturing with the hands toward the person with both hands means--"did you get the signal" Page 63 ... Sign of distress. Arms raised over the head with palms forward. Then lowing the arms to a bent position with the hands at head level, and then lowing the hand to chin level, and then dropping them to the side. Drawing the right hand across the throat with the thumb of the hand pointing to the throat. (used in connection with oaths, such as fidelity to death)
· Sign of faith. Hand on the heart.
· Sign of plucking out the heart.
· Sign of Reverence.
· Sign of Satan made over solar plexus.
· Sign of touching the crown of the head.
· Sign of two hands pointing to the solar plexus.
· Sign of Preservation. Consists of placing one handover the heart, and raising the other to form aright angle at the elbow, with the hand pointing to heaven. The movie "Dune" showed male & female Ilium, hierarchy hand greetings, as well as showing signet rings, which are indeed often worn on pinky fingers. (The movie also shows the Karat goddess, how a man becomes a Grand Master by learning control of the demons, astral projection through the spheres which are conquered by the Grand Master,
& control of the int. weather, etc) S. SCRIPTURES USED IN PROGRAMMING (cont. from Vol. 2. chap. 10)
· 1 KGS 7:21 -talks about 2 pillars on the outside of the Temple. The pillars of Joachin and Boaz are important to Freemasonry and are built in the slaves mind at an intermediate level. Joachin is a white pillar of light associated with fire. It is easy to see how this association could be built by certain traumas. Boaz is the shadowy pillar of darkness and is also associated with water. A dark water torture would make

this association. The two pillars represent the two sides of the Illuminati’s "the Force. Between them is the door to the Illuminati’s House of God.
· 1 KGS description of Solomon’s Temple used to build the imagery and the lion guards to the internal Temple programmed into victims.
· rd Psalm--used as a cue to signal a ritual time.
· Song of Solomon--Used in the ritual of the Great Rite, a ritual pertaining to the Middle Earth, where the High Priest & Priestess join in sexual union as the God & Goddess creating fertility for the land.
· Ezekiel chap. 1 and chapter 12 are being used for endtime callback codes. T. ALIEN PROGRAMMING
· Blue beams of light are used as a hypnotic induction for slaves who are given the cover story of being abducted by aliens.
· The All-Seeing Eye is used to represent the planet Sirius. Sirius is important to the Hermetic magicians, and some of the programmers are deeply into hermetic magic. Satan is said to come from Draco or Sirius, esp. the dog star Canis major. Masonic programming may well have the "blazing star" portrayed in the programming as a pentagram, with the name Sirius. Sirius may represent the Master, the creator of the system in some systems where the programmer is steeped in Masonic philosophy. A sickle maybe involved with the Garden of Eden story for some victims of this type of programming, because supposedly the Golden Age ended with a sickle splitting heaven from earth. The ability of the handlers signals to the slave in so many mediums makes it difficult to communication and accessing, to send different prevent communication and accessing. Page 64


Deeper insights into
Breeding good subjects for hypnosis
Training the unborn child
Common illuminati work with twins
Selection of adult candidates for mind-control
U.s. govt. mind-control level 1.
U.s. govt. mind-control level 2.
U.s. govt. mind-control level 3.
U.s. govt. mind-control level 5
Testing young children to plan the programming.
Daily abuse works best for programming
A trauma to develop animal alters
The use of drugs
Classifying mind-drugs
Administration of drugs for programming
More programming drugs
Stabilizing the programming
Extensive research done to influence human memory by
One type of experience of victim hypnotic drug a mind-
What the mind-control programmers use to manipulate memory.
Hiding the codes
Programming with lsd
Chemically triggering natural instinctual drives
Sexual stimulation-programming
Adrenalchrome (adrenal chromaffin)
Hypnosis & the occult
Understanding the basics about hypnosis
The power of hypnosis
Understanding the deeper mechanics of hypnosis
Programming aids
Using holograms as an access aid
Preparing the brain
Early training for slaves
Magical training on the starlight level
The monarch programming script for over the rainbow
Induction training script
Bringing the slave out of trance
Deep trance programming
Color programming
The association of colorful sights, sounds, rhythm & dance.
Light & color
Special colors
Healing by correct vibrations & rays
Using hypnosis to heal the slave after abuse.
And the beat goes on...
Hypnotic codes, cues and triggers
Tones & cords
Program codes during 1972-1976 for dr. green
Appendix b.
Dictionary of programming centers (cont. from vol. 2)
Deep underground military bases (dumb bases)
Selected top secret underground installations that
Appendix 3. clones,
Some of the films that show existing technology:
Oregon’s underground secret cloning facility
Further investigations at dulce’s underground cloning
Summary of the four methods.
Contents for part 2
Intake questionnaire
Self-inflicted harm, how to handle
Triggers, how to defuse
Abusers, confrontations or not
Deliverance, understanding
Hypnosis, self, ins & outs of
Mirrors, how to deal with
Self-forgiveness, to achieve
The harvest of weeping
An overview of what the support team faces
Boundaries & roles
Communications issues
Denial, how to deal with the therapists or ministers
Depression (initial client complaint)
Detection of mind-control
Eating disorders (as an initial problem, and as a deeper issue)
When mind-control victims with eating disorders first
Evaluation forms
Sample questions in areas of inquiry
Fear, how to handle
Fear, what f. issues do victims have (f. is an initial issue for victims)
Initial questionaire
If some of these are yes
Multiplicity, understanding
Panic attacks, suggestions
Understanding programming
Protection, spiritual
Elements of the world-system & its satanic inspired quest
The unique power of the truth, "ye shall know the truth
Other items of protection
Special situations where spiritual protection is needed
Where will the enemy counterattack after progress is
Safety issues, of slave
The safety of child victims
Safety issues, of support team
The good news
Spiritual issues
Structuring, how it is done, its consequences and its treatment
Suffering (client complaint)
Suicidal thoughts (early client complaint)
Immediate suicide threat
Support team, organizing one
Traumas, foundational traumas, how to master understanding what
Truth, discernment of
Abreactions, avoidence of
The correct goal & some basic techniques.
Abreactions, understanding
Child’s subconscious mind protects itself:
Visible clues in victim:
Visible clues in the victim:
Alters, how to work with deep illuminati alters (issues for therapists)
How to work with deeper illuminati parts
Treat with respect
Denial, identifying and dealing with defense mechanisms
Dreamwork, understanding
Part a. the meaning of dreams
Part b. dream telepathy & mpd
Part ca listing of research into mpd (did) & dreams
Part d. important findings of mpd (did) dream research
Part e. our suggestions concerning mpd dream work
Part f. standard illuminati programming concerning dreams & memories
Family, rebuilding a shattered family
Flooding, how to deal with
Benefiting from grief by fritz
Guilt, dealing with (also see art. on "self-forgiveness)
Identity, discovering it
Implants, dealing with
Integration, understanding
Internal information, how to get i.i.
Assisting the victim to see.
Difficulties, preexisting & created.
Where to search for information.
Jobs, new ones for alters
Justice system, dealing with the broken j.s.
How to deal with mazes
How to deal with mirrors
Programming, foundations, destruction of
Crocell--this demon makes the noise like rushing water that alters talk about hearing in their internal worlds.
Guardians--enforcer demons are put in place to protect the system.
Malphas--a builder of high towers. he may also get involved with the hypnosis.
Raum-- he destroys internal parts or internal cities.
Succubus--a female demon who preys on men sexually. this demon will be active during rituals.
Alter: you can’t love what isn’t.
Alter: god can’t love us.
Rationales, of the abusers
Reality vs perception
Responsibilities, tips to face new ones
Salvation, obtaining it, issues for multiples
Satanic cults, understanding the practice of
Demonology, and its relation to mind-control and the satanic cults.
Split-brain programming
Exercises to rewire the brain’s hemisphere’s together for
Surveillance, dealing with surveillance
Tips for therapists
Transference, issues of
Will be varied.
Can happen naturally.
Can be worked with during therapy.
Transference issues call for teams.
Selection & preparation.
Drugs a. placed in front of mirrors under drugs to take on (internalize) the identity of the other person.
Body manipulation
External controls
Advantages gained from working with twins together
Deeper cult parts
A final trick
World, external, how to underatnd the external world
Worlds, the destruction of
Understanding the st human brain,
Manipulation of the reptilian brain
How the worlds are built & the computers rebuild worlds
How the demons protect the system, & how they in turn are
What people in the past have done, and why they have not
Getting meaningful assistance from a system
Summary & final comments
Bibliography-sources
Illustrations & photographs


Share with your friends:
1   ...   52   53   54   55   56   57   58   59   ...   316


The database is protected by copyright ©userg.info 2017
send message

    Main page

bosch
camera
chevrolet
epson
fiat
Honda
iphone
mitsubishi
nissan
Panasonic
Sony
volvo
yamaha