CIA MK Ultra Mind Control. The tricks of the trade.

ImageImageImageImage

Another way to see things is to recognize that the programmers have created “power words” to which they have attached memory and programming. If a de-programmer observes closely the word usage of the victim, you will begin to spot power words of the abuser, for instance, “white rabbit”. A cipher is when symbols are used to represent letters. One can used letter frequencies to break ciphers. Likewise, there are frequencies to codewords. The Illuminati’s intelligence agencies have programmed thousands upon thousands of slaves. There are only so many code words to pick from and some of these code words are favorites. From the co-author Fritz Springmeier’s experience, the following are favorite code words that have been used to program slaves with:

CHARLOTTE, CHECKMATE, CHRISTMAS, CLARA, CLOVERLEAF, COURIER, CRAYON, CRYSTAL, DAISY, DAVY, DELLA, DELTA, DEMON, DIANA, DINAH, DIRTY, DIME, DOT, DOVE, DRAGON, DUCK, DUMBO, EAGLE, EASY, ECHO, ELAINE, ELEPHANT, ELLEN, EMERALD, EMPIRE, ESTER, EUREKA, EVERGREEN, FAITH, FALCON, FARMER, FELIX, FIREFLY, FIVE BROTHERS, FIVE SISTERS, FLASHLIGHT, FLOSSY, FLYING + [other word], FOX, FREEZE, FRIENDSHIP, FULL HOUSE, GALAHAD, GAMMA, GARGOYLE, GEMINI, GEORGE, GIPSY, GOLEM, GOLDEN + [other word], GOOSE, GRACE, GRANNY, GREEN DIAMOND, GULL, GWEN, HADES, HALF-MOON, HAMMER, HARRIET, HAWK, HAZEL, HELENE, HELIOS, HEN, HERMES, HIGH BALL, HIGH CARD, HOLE-IN-THE-WALL, HOPE, HOPI, HOUNDDOG, HOURGLASS, HUSThER, HYDRA, ICEBERG, IDA, IMP, INCUBUS, INSECT, IRIS, IROQUOIS, ITEM, JACKASS, JAGUAR, JANET, JANICE, JASON, JASPER, JAVELIN, JENNY, JEZEBEL, JIG, JULIET, JOAN, JOSHUA, JUDY, JUPITER, KANGAROO, KANSAS, KATY, KING, KILO, KITTY, KOMET, LACE, LADY + [other word], LAMP, LAURA, LEAP FROG, LEOPARD, LIGHTNING, LILY, LION, LITTLE + [other word], LOVE, LUCKY + [other word], MAE WEST, MAGIC, MAJESTIC, MAMIE, MANDREL, MARIE, MARK, MARTHA, MAX, MEADOWS, MERCURY, MIGHTY MOUSE, MILLION DOLLAR, MINNIE MOUSE, MONA LISA, MONTE CARLO, MOTHER, MUMMY, NANCY, NAOMI, NAVAJO, NIMROD, NOAH, NORA, NUTCRACKER, OBOE, OCTOPUS, OLD FAITHFUL, OLIVE, OPAL, OPHELIA, ORION, OSCAR, OWL, OZMA, PACKAGE, PAMELA, PANDORA, PANTHER, PAPERCLIP, PAPA, PAT, PATSY, PEGASUS, PENTHOUSE, PHANTOM, PHOENIX, PINECONE, PISTOL PETE, PLATO, PLUTO, POLLY, PYTHON, QUAIL, QUEBEC, QUEEN, QUEEN BEE, QUEENIE, QUEST, QUICK SILVER, RACHEL, RAINBOW, RAM, RANGER, RASCAL, RAT, RAVEN, REBECCA, RED DIAMOND, RED HILL, RENO, REX, RHUBARB, RITA, ROBOT, ROMEO, ROOSTER, ROSIE, ROVER, RUBY, RUTH, SABRE, SAINT, SAINT + [another word], SALLY, SAN ANTONIO, SAPPHIRE, SARAH, SATURN, SCAMPER, SCOUT, SEA GULL, SEAL, SERGEANT, SERGEANT-DELTA, SHADOW, SHARK, SHENANDOAH, SHO, SICKLE, SIGMA, SILVER, SNOW + (other word), ZEBRA, ZENITH, ZERO, ZYPPER, ZOMBIE, ZULU, ZUNI.”

The word FOX is an example of a significant occult code word. F-o-x consists of the 6th, 15th (1+5), & the 24th (2+ 4) letters of the alphabet, which yield 666. The reader needs to bear several things in mind. First, the programmers generally have intelligent, well sounding codes, that do form patterns. For instance, a woman’s name from the Bible will be used as a code, with subparts or subcodes having other female names from the Bible. Deeper Illuminati parts will have goddess and god names, and king and queen names for cult alters. These are the names the handler or cult uses–NOT their access codes. The codes for slaves follow patterns. There are standard and unique codes. The internal programming alters have the power to change codes if they need to protect the programming.

They will have to hypnotically work with alters when they trance out at night. In other words, most of their programming of front alters will be done when a System lies down for “sleep”–more accurately described as “for trance.” If the internal alters change many codes, in their efforts to protect the system, they will even make it difficult for the handler/programmer to get into the system. Ciphers developed rotors that require lines to line up. Some simple schemes using this principle appear in some Monarch systems. This is part of the science of structuring. Intelligence codes often come from the Bible or popular fiction books. The deeper codes are occult words, often in foreign languages such as Arabic, which is an important language in the upper occult world. Slaves will be given COVER NAMES for ops, and often males receive female names and vice versa. Very shortly, we will provide the Monarch hypnotic cues (codes) for the multitude of functions that a Monarch’s mind must carry out. The type of programming which is placed in a slave varies. For intelligence operations the slave will have to have BONA FIDES, which are codes to allow two people to meet. All slaves are given CONTROL SIGNS which allow them to indicate via a code that they are in trouble.

A RECOGNITION signal allows two people to make contact. For instance, the handler might fly his distinctive sounding plane over a slave’s house in a pre-arranged signal. It might also be a particular colored scarf, and a particular set of phrases. A GO-AWAY code is a prearranged signal that means it is unwise to make contact. The go-away signal may be simply placing one’s hands in one’s pocket or turning the porch lights off. A “GO TO GROUND” signal means to go into hiding. A MAYDAY BOOK exists for Illuminati and Intelligence slaves which allows them to call if they are about to be arrested. A telephone number is left open for just this purpose. Also common universal Illuminati codes can be used by the slave to get set free from police and judges. Within the Jehovah’s Witnesses, especially their headquarters, the Illuminati uses Enochian language to program with. With Druidic branches Druidic symbols are used. With the Jewish groups, Hebrew is used. Other languages are also used. An Illuminati System can easily have 6 different languages used as programming codes. The foreign language codes will be for small parts of the System only. Special artificial languages are also employed, as well as sign language.

MONARCH MIND-CONTROL CODES

contents:

A. ALPHA (basic)B. BETA (sexual)C. CHI (return to cult)D. DELTA (assassination)E. EPSILON (animal alters)F. OMEGA (internal computers)G. GAMMA (demonology)H. HYPNOTIC INDUCTIONSI. JANUS-ALEX CALL BACKS (end-times)J. THETA (psychic warfare)K. TINKERBELLE (never grow up/alien)L. TWINNING (teams)M. SOLEMETRIC MILITARYN. SONGS (reminders)0. ZETA (snuff films)P. Sample alter system codesQ. Catholic programmingR. MENSA programmingS. HAND SIGNALST. Programming site codes (used for slave model codes, etc.)

A. ALPHA (basic)

Basic Commands (these basic commands are also found used in many slaves, although there will be exceptions to everything.)

 

“GET ON YOUR TOES. STAY ON YOUR TOES.” means “attention slave” get ready for a command.“ON YOUR TOES” — is a preparatory command that will be used throughout an entire system.“IF YOU PLEASE SIR” — From Wizard of Oz, slave says this like “yes, sir.”

3-tap code for access

“FOLLOW THE SNAPS”, “LISTEN AND OBEY OUR COMMANDS”, “THIS IS FOR YOUR OWN GOOD”“FIDDLER” = code to take one to Never Never Land“PUPPET MASTER” -name of master for Marionette or Puppet program “DADDY” -master “DADDY’S FRIEND” — a user of slave approved by master “PAPA” – master, “WHITE RABBIT — master“YOU’LL SPEAK MY WORDS WHEN I PULL YOUR STRINGS.” Puppet programming control of what slave will say.“SPILL IT” — trigger command ordering slave to speak“SILENCE” — order means keep quiet

Mr. Rogers Neighborhood’s “Land of Make Believe” was used for the programming code script:

“I AM MR. ROGERSAND I HAVE PUPPETS, TOOI PULL ALL THE STRINGSAND I PULL STRINGS ON YOU.”

Twinkling (twitching) of the nose — Bewitched programming to cast spell or order on slave.

“(name of alter), YOU WILL COME FORTH AND OBEY.” or “…OBEY AND COME FORTH.” Another basic way of getting an alter would be simply to spin the person and call out the alter’s name, or to snap the fingers and call out the name of a front alter.

Access is accomplished for a number of Illuminati slaves by a message via phone or letter, then a looking glass person takes the system to a location outside of the house, maybe simply to the sidewalk, there the person is picked up. The left hand is then grasp on the soft part of the hand between the thumb and forefinger by two fingers very tightly. This pulls up and alter with an egg in its lap. The egg is then opened via a code and the imps inside the egg to communicate to the ribbons and the computer.

Access phone calls to slaves may have high-speed codes transmitted that trigger the slave subliminally without their conscious awareness.

Access to some people is done with computer like jargon “ON LINE” “ACCESS, (then identification), (then color code), (then name)” “, “ENTER”, “RUN”. Some Systems have their triggers all in computer lingo such as COMMAND MODE–ALL DISK DRIVES AND HARD DRIVES… ERASE.. .FORMAT DRIVE…COPY….UNDELETE PURGED MEMORY DRIVE…” Where some of the newer slave programmers are also computer programmers they enjoy transferring their computer lingo to use in controlling their programmed slaves. They may even throw in some FAX lingo such as “DIAL ALL REMOTES. . . INITIALIZATION – ATSO -OHOaM (HANDSHAKE BETWEEN ALL REMOTES), HANDSHAKE COMPLETED.”

The color of the car to pick up a System may relate to the color coding of the alters to be picked up, such as white exterior, blue interior for a white alter-then blue alter access sequence.

Basic Internal Emergency Color Codes for a SystemT here are several different “CODE RED’s, etc. not just one in a slave, what follows is not the complete information about the Codes, although it is possible some slaves have a simplified version like this:

“CODE GREEN” — Dr. Green’s suicide programming, tied to “no-talk” programming.“CODE BLUE” –Victim’s body freezes in motion and can’t move until another code is given.“CODE RED” — Victim gets angry and violent “CODE RED” -Another Code Red has the standard Monarch meaning, “serious self-destruct” program“CODE YELLOW” — Victim gets jealous, angry and wants to violently get even“CODE BLACK” — Used to get victim’s to get on their ritual clothes.“CODE WHITE” — Code to protect the cult members from arrest. When police see the Code White they treat the people as untouchable.

“CODE 911” — To activate the slave for an emergency calling for superhuman strength. Certain alters will have extra strength.“CODE 911” — Also used with standard Monarch meaning of “Call your programmer/handler”.“DISARM” (3x) — to get rid of a dangerous alter two snaps + “SHUTDOWN” — to shutdown an alter.“LET THE KINGS BE KINGS, LET THE BANKERS BE BANKERS, LET THE PRIESTS BE PRIESTS — saying to justify their Master-slave relationship to the masses of humanity.

There are code words for Illuminati members to tell police and judges that will automatically get them set free. Masonic handshakes and codes also work well with judges, police & govt. workers.

The Sun setting the following day was used as a trigger for slave to forget events. For the cat alters a certain word is given to trigger them to go “over the rainbow” after an event in order for them to forget it. “FROM THE RISING OF THE SUN TIL THE GOING DOWN OF THE SAME” –programmed in by using the scripture. “GO INTO THE SEA OF FORGETFULNESS” –a hypnotic structure in the mind to forget. Waterfalls are also used as a hypnotic image to forget pain and memory.

“RETYPE A LETTER” -reprogram, “JEWELS” = programs. “THE CATS & THE FIDDLE NEED TUNED UP–Slave to handler, I need to be reprogrammed.

There are three words to trigger a suicide program – 1. Bait, 2. [intentionally left out], 3. hook

Another suicide program trigger is when the dominoes fall. “GO OVER THE BLUFF” (3X)- causes suicide in some alters SACRED HEART = Catholic/Jesuit suicide program Some suicide programs are set off with a long tone over the phone along with a code number.

“KERMIT THE FROG” –a type of access code. “KERMIT” may be a code relating to computers, because Kermit is the universal language for connecting computers together. It is a single standard to exchange files between any two systems.

All memories, traumas, and tortures are coded. Body programs are coded. One set of body programs uses Hebrew, Greek, and Druidic letters.

clone program creates clones of an alter (also called lollipop or lobster program) imagery is that sesame seeds fall off of a hamburger bun and becomes another hamburger.

Codes to all the various basic systems

Carousel 532342223Castle System 221435321Communication 311146623Double Helix 432443321Level 211343231Mensa System 323542321Pentagram 421136113Pool of Death 231134421Puppet 341124321Sole metric 665421134Spider Web 321654321Stairwell 432111132Quabala 423454334Tornado 332146444Umbrella System 314321014

Alice In Wonderland Program

 

The White Rabbit is a programming figure for Alice In Wonderland Programming who will allow you to go to otherwise inaccessible places for adventure. He represents the master. The White Rabbit is an important figure to the slave.White rabbit gives a wafer (coke-sugar-cocaine) to Alice and says “EAT ME” or “EAT IT AND I’LL TAKE YOU THROUGH THE DOOR” — takes master into closed part of System, or perhaps over the rainbow.

The Queen of Hearts is also an important figure for commands in the Looking Glass World which the slave enters upon command. When a deep slave alter is needed to perform they are sent into the looking glass world where a looking glass person carries out the command–but in a way that reality is thought to be a dream. In other words, this is a preparatory command to get the slave ready for abuse.

“USE THE KEY. PUT IT IN THE LOCK. TURN. OPEN THE DOOR…AND STEP THROUGH A WINDOW [or MIRROR] INTO NEVER NEVER LAND.”

“SOMETHING IN LIGHTENING TO TRANSPORT YOU FASTER THAN THE OL’ RUBY SLIPPERS. CLICK YOUR HEELS TOGETHER AND BE THERE IN A SNAP. (SLAVE CLICKS HEELS) ELECTRIFYING …. WITH THE RUMBLE OF THUNDER. BOLTING THROUGH TIME … SO YOU WON’T BE LATE … FOR A VERY IMPORTANT DATE.” (Alice in Wonderland Programming) (This is the wording to use deep alters.)

Cinderella Program

 

The code word involves something said about the stroke of midnight.

The Melting Pot Program

 

A very powerful program is activated by melting the slave into his master. The slave will do anything for the master with this program. The melting is the ecstasy that is occasionally experienced when lovers having sex seem to melt into each other. This feeling of ecstasy-melting is programmed to release when the master says these words, “MELT INTO YOUR MELTED MIRROR FOR AN ELECTRIFYING RIDE. LOOK DEEP INTO THE BLACK OF MY MELTING MIRROR EYES. SEE YOU REFLECTING ME, REFLECTING YOU, REFLECTING ME, REFLECTING YOU, REFLECTING ME, REFLECTING YOU, REFLECTING ME, REFLECTING YOU … (cont. this several times) UNTIL WE MELT TOGETHER AND SINK DEEP… [words omitted] INTO THE OTHER SIDE.”

“MELT INTO MY MIRROR, YOU LOOSE YOURSELF INTO THE POOL OF LIQUID MIRROR, STEP INTO THE LOOKING GLASS, SINK DEEP WITHIN ITS POOL, AND STRADDLE THE DIMENSIONS IN TIME. I’LL SEE YOU THERE … ALONG WITH MY FRIENDS”

“SEE IT THROUGH THE LOOKING GLASS” — infinity mirror programming involving mirror image people (alters)

“LOSE YOURSELF IN THE INFINITY MIRRORS.”

Wizard of Oz Program

The Yellow Brick Road is the script or programmed set of instructions one must follow. It also serves as a runway for alters to take off from their internal world and take the body. “FOLLOW THE YELLOW BRICK ROAD”

There is a code to get through the poppy field (trance state). Some alters to get through the poppy field need to put on a new dress and a new image. The poppy field may be called “the field of forget-me-not”. In this way it is linked to the daisies of Dr. Green. To get into the poppy field is easy, it is “SLEEP, SLEEP, SLEEP”, see other induction methods on another page.

“THERE’S A PAIR OF MAGIC SHOES TO WEAR WITH YOUR DRESS.. .SOMETHING IN LIGHTNING…TO TRANSPORT YOU FASTER THAN THE OL’ FURRY SLIPPERS.”

When the slave is finished being used they return from Never Never Land to Kansas. To do this they are told: “CLICK YOUR HEELS … THERE’S NO PLACE LIKE HOME.” They might be reminded “YOU’RE NOW GOING OVER THE RAINBOW TO THE OTHER WORLD.”

Tin Man programming

 

The Tin Man programming is all purpose versatile program for what ever the master needs done, it means that the slave is a well oiled machine. Sometimes the slave is reluctant to do a job, but he is being told that he is a well oiled machine. The exact words may vary with the mission, but the following are exact words,

“LEAVE YOUR SHELL. ACTIVATE: MACHINE. COUNT DOWN ONE TO TIN….”“SOON WE’LL HAVE YOU PURRING LIKE A WELL OILED MACHINE. ALL OF YOUR MOVING PARTS ARE PIVOTAL AND GLIDING WITH EASE. MELT INTO MY HANDS. TAKE MY COMMANDS. I’LL HOLD YOUR JAW TO KEEP IT FROM SLIPPING WHILE YOU SLIP THROUGH A WINDOW IN TIME.”

Program code for slave to shatter their memory of an event (used with electroshock):

“MIRROR MIRROR ALL AROUND ON THE CEILING ON THE GROUND, SPINNING FASTER ROUND AND ROUND. ARE YOU UP OR ARE YOU DOWN? ARE YOU DOWN OR ARE YOU UP? IT REALLY DOESN’T MATTERBECAUSE WHEN THIS MIRROR BUBBLE BURSTS,EVERYTHING WILL SHATTER.”

“GO KEY WEST IS KEY” — several slaves have this code, related to Sen. Robert Byrd Oz progamming.

GALAXY programming (for the end times) is also connected to the Oz programming.

In upper level Illuminati slaves, Dorothy in the Oz story will represent the Mother of Darkness alters, Ozma will represent the Ruler of the Castle, and Glinda will have the Great Book of Records. The ring of Glinda (from Glinda of Oz, p. 16) gives protection.

Body ProgramsControl program. See Omega Programming- Universal Function Codes for internal system codes for body programs. Sometimes these body programs are filed with a combination of hebrew and zodiac signs. Greek letters are also file no.s of at times of body programs. Rivers of blood -circulation control program. This program totally controls the circulatory system. The victim may think they are losing lots of blood & go into heart failure. Octopus- strangulation suicide program The internal defenses consists in part of body programs that are triggered if the Mind-controlled slave steps out of line. Here is a good list of some of these body programs each of which has its own codes:

Auditory problems, Blood flow/circulation, Burning as if on fire, Digestive failure, Headaches-split brain, Heart failure, Histamine production, Optic problems, Respiratory failure, Sleep deprivation, Sleeping program, and Temperature change. The suicide programs that can go off include Armageddon, Clowns cutting, Cutter program “Pain is Love”, Disembowelment, Drug overdose, Gethsemane, “Hypnosleep”,

Injection of bleach (poison), Octopus, Red Sea, Shooting Programs (shotgun, Russian roulette, shooting family, etc.), War in the Heavens & Wrecking the car. Along with the suicide programs that can be triggered are programs that jerk the victim’s mind every which way, which include: Bee Stinging Program (put in by placing the drugged victim being near large swarms of bees humming & then letting a bee(s) sting the victim), Busy Cleaning Program, Crazy program, Flooding (from Atlantis), Isolate & Hibernate Program, Memory Erasure Program, Pain Programming, Paper Doll Program, Protection by trance, Revolving switching, Scrambling Program, and re-Structuring Programming, Tumbleweed program, Waterjar Shaking program (Ahab stomping the grapes Bible-based program making mush out of the brain.)

Cutting programs are often hidden behind the Bee Swarming program. Alpha and Omega is a strong program. Sometimes saying “ALPHA & OMEGA” helps alleviate headaches.

DNA Program (This uses a lot of number codes.) This is a double-helix which is used as an elevator shaft running down through a system. Numbers are used and the names of cities to go down the elevator shafts. This programming is said to be done in hospitals.

Card CodesRegular playing cards have developed from the occult Tarot cards. The four suits correspond to magick, the spades mean the power from the spear of destruction, the diamond means is a double pyramid or demonic power of wealth, and the club is a clover meaning fortune and fate, and the heart means devotion and loyalty. The four suits work well in programming because anything that is broken down in 4’s or a multiple of 4 can be coded with cards. Anything that can be broken down into 12’s or 13’s can be given cards too. Since clocks work off of 12’s, card codes work well with clocks. The suits can denote seasons. With Jokers one gets 13 cards per suit with four suits gives 365 unique symbols to denote the days of the year. Dominos can also be used on a base 13 code system. The blank will equal 13.

Carousel SystemThere is a back side to enter the Carousel.

Carrier Pigeon (slave’s who send coded or uncoded messages) and their contact codes

Birds used for contacts. That is, birds in cages are often used as a sign of a meeting place. The contact would say “What did the bird say?” or “A little bird told me …,Then the courier pigeon delivers her message.

‘‘I’ve come a long long way to see you” -Words to say by System to John or to person to be met. There is an endless variety of contact phrases to indicate that the right person has met the right person.

Sample Code for passing drugs-“RHINESTONE COWBOY” to which the response from the slave would be “I’M NOT A COWBOY, I’M A COWGIRL.”

Emerald ear rings have been the visual signal to customs agents to allow a person carrying drugs through customs. (See D. DELTA for deeper Carrier Pigeon codes.)

Castle SystemMay need a special ring worn by and turned by the handler.

Flower’s Program

CSP94OYP587 — code to designate a flower tieing 3 generations.

UMBRELLA PROGRAM CODE — “R x 4 x 5Y58876”

Gem codes:

Sample correspondences of Gem codes:

1 – Aries – diamond2 – Gemini – topaz3 – Cancer – cat’s eye4 – Leo – ruby5 – Virgo – emerald6 – Libra – opal7 – Scorpio – amethyst8 – Sagittarius – turquoise9 – Capricorn – black onyx10 – Aquarius – crystal11 – Pisces – sapphire

 

SOURCE: http://educate-yourself.org/mc/illumformula4chap.shtml

Learning this system can save someone's life!!!!! Recognize the abuse and you can call it out to the surface.

Learning this system can save someone’s life!!!!! Recognize the abuse and you can call it out to the surface.
Advertisements

3 thoughts on “CIA MK Ultra Mind Control. The tricks of the trade.

  1. Pingback: Mind control programing | BELEŽNICA

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s