Friday, March 28, 2014

Your Guide to Monarch Mind Control - Chapter Four

The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave
By Fritz Springmeier and Cisco Wheeler

Introduction
Chapter One
Chapter Two

CHAPTER 4. HYPNOSIS

As we get farther into the book, it's remarkable to think that this is used as a reference by conspiracy theorists. The tangents are very close to the ramblings of a schizophrenic, diving deep into excessive detail and referencing assumed "facts" that are suspect.

For example, the first fifteen pages of this chapter is a block-text proof that hypnosis exists and how it works. I'm willing to stipulate that hypnosis exists just for the sake of moving on. For summary, let's just acknowledge that hypnosis unlocks and augments the victim's talents. Because of this, the programmers can use each victim for several unrelated conspiratorial uses.

Before we move forward, let's recap. This book describes the complete process of programming an Illuminati slave, so it begins before birth. The victim is taught to dissociate through an elaborate and bizarre gauntlet of tortures. When the victim dissociates, an alter personality is formed. That personality is programmed with cues to call it forth, tasks and skills and a position within an interior mental hierarchy called a "system." Should the Illuminati require that the slave perform sexual services, commit murders or deliver mail, there is a personality that is called to control the victim's body and fulfill the required role. When the "front" personality, the victim's day-to-day personality, re-assumes the body, she does not remember the acts she has done for the programmers.

S&W tell us that the parents of children who are being programmed are given homework like locking the victims in the dark for several hours, sticking them with needles and raping them once a day. This keeps the victims dissociative.

At last we begin to learn about the programming that is referenced so often in the conspiracy theories, like "Wizard of Oz" programming and "Beta" programming. However, the weaknesses of the authors still apply--what we need to know about these programs have to be figured out from context clues.
MONARCH MIND-CONTROL CODES
A. ALPHA (basic)
B. BETA (sexual)
C. CHI (return to cult)
D. DELTA (assassination)
E. EPSILON (animal alters)
F. OMEGA (internal computers)
G. GAMMA (demonology)
H. HYPNOTIC INDUCTIONS
I. JANUS-ALEX CALL BACKS (end-times)
J. THETA (psychic warfare)
K. TINKERBELLE (never grow up/alien)
L. TWINNING (teams)
M. SOLEMETRIC MILITARY
N. SONGS (reminders)
0. ZETA (snuff films)
P. Sample alter system codes
Q. Catholic programming
R. MENSA programming
S. HAND SIGNALS
T. Programming site codes (used for slave model codes, etc.)
"Alpha" programming is basic mind control, made up of commands like calls to attention or demands to speak. These are used to access the internal system of alters. They are comprehensive programs to which most of the alters respond.

Access to the system can be achieved by verbal commands like "On your toes," through color coding in a controlled environment, subliminally with "high speed codes" over the phone--any sort of cue that's been anchored through hypnosis. Emergency programs are also created, like "Code 911," which may be used to command a slave to contact his programmer, or "Code White," which allow slaves to access code words and information that will allow them to escape arrest.

Aficionados of the theories may be disappointed to learn that the pop culture references that are bread-and-butter to the theorists--things like the "Wizard of Oz" or "Alice in Wonderland" programs--are simply metaphors used to cause the victim to go into a dissociative state. The mental space of "over the rainbow" or "through the looking glass" is simply the internal place where the system of personalities reside.

The references to Emerald City or the Mad Hatter's tea party are used to organize the internal system. There are other ways of organizing the system, as well, often in combinations. In addition to the colors mentioned above, programmers may use zodiac signs, gemstones or other sets. To call for a diamond, for example, may call for a set of personalities created from the same trauma, or have the same tasks, or call for a set of programs with a common theme.

To clarify:  Think of the programs and alters as individual notes in a system like Evernote or as blog posts with a tagging system. There's no limit to the number of tags that may be applied to an alter and the alter may be called forth by any single one of those tags. To call forth tag "A" brings forth every alter tagged that way. Calling for tags "A" and "G" brings forth only those alters that belong to groups A and G. The use of gemstones or tarot cards are simply tags for the personalities and programs, sorting them into categories.

With that in mind, we can run through many of the above list quickly. Beta programming is a set of sexual behaviors and attitudes. These can be used for the pleasure of the Illuminati or those they wish to bribe or blackmail. 

S&W give an example of how a Beta program may be called up:  “BETA TWO MARY A=4, B=3, C=2, D=1” "Beta" is the type of programming, "Two Mary" may be the personality called forth, and the rest refers to specific acts, behaviors and attitudes the programmer wishes the slave to exhibit. Less clinical cues are used as well, like “COME HERE MY KITTEN, AND LET ME PET YOU. PURR FOR ME NOW...THAT’S A FLUFFY KITTEN. PURR DEEP.” Again, this phrase is attached to a very specific command.

Chi programming compels the slave to return to his programmer or another cult authority. Delta programming is used for assassinations. We're told that not every slave is capable of murder and the only way to find out if he is capable is to let him kill someone while under hypnosis.

Epsilon programming is used for creating and using personalities that believe they are animals. Omega programs are sort of "machine code" for personality systems. Gamma programming is induced with occult rituals and tied to demonology. 

Hypnotic inductions are the stereotypical hypnosis techniques seen in the media, like "You're going deeper, deeper, deeper into sleep." 

Slaves are programmed to perform certain acts when Armageddon comes. These are called Janus-Alex Call Backs.

(Please note that S&W don't always tell us what, exactly, the slaves are expected to do. They are content to give us a broad idea.)

We were told in Chapter Three that certain drugs give slaves telepathic powers. Once developed, these powers can be accessed through Theta programming.

Alters who have been programmed to remain children or think of themselves as aliens are given Tinkerbell programming. Paired teams of slaves are given Twinning programming.

Solemetric military programming, we are told later in the book, results in less personality fragmentation. This is needed for slaves who have complex responsibilities, such as those in the armed forces. I suspect that Springmeier believes that he has been subjected to this. We're told that this programming, because it creates more independent slaves, requires demonic assistance to maintain control over the victim.

 We're told that programmers are fond of using songs and nursery rhymes, sometimes as codes to access personalities and sometimes just as ways of reinforcing the programming. Nearly all of The Beatles' songs are used, as is AC/DC's "Back in Black" and James Taylor's "Fire and Rain."

Zeta programming is used when a slave is going to be sacrificed and/or used in a snuff film.

After running down the list of generally-known programming categories, S&W then give us an example of how this might be enacted within a slave called Mary. For edification, a section more or less at random:
A mirror image of each of these alters exists too. The mirror images can be pulled up via a three step process.The birth memory in our example will be coded as A5 10 79. The spider torture memories that are attached to these alters is A5 10 79. The reader will notice the following on the hypothetical chart on the previous page for the first Section (which is numbered 6 to be deceptive): This section is front alters. Basic code pattern = color + Genesis + no. [1 thru 13] + letter [a thru m]. Individual codes 1st section general-”N.I.F.6”, 1st section mother Eve “EV.E5 10 51 ACE” (Eve is the balancing point & the ace code is high or low). The alter Explorer is “EI.G7”, Mammy “MI.H8”, Angel “Red, AI.19 Jack Genesis 4” (or it could be done “red, AI.J10 Genesis 4”), George “Silver, GI.K11 ”, Zsa Zsa “gold, ZI.L.12”, and Shadow “Clear SI.M13”. You won’t find on the main chart codes such as: Eve’s memory “EI.D5.2.1952 ACE” or the Infant alters -- “1-000 10-49 REJECTS 3-9” The master may say for example: “Green GENESIS 1-A” (3 times) to get this alter which is the balancing point. Fragments/dead alters were dumped into areas named concentration camps and given the names of the famous german concentration camps. The camps were placed under the Mt. of Olives. Fire or Bomb children are found throughout the system and are triggered to come up by programming.
 What S&W are trying to communicate is that there may be hundreds of alters and hundreds of programs within the victim. These are managed through attaching them to various codes which are recorded. The codes may be systematized but the programs cannot because they work via human psychology, needing metaphors and imaginary constructs. S&W are also mentally disturbed--but they are right when they say, "the honest truth is that trauma-based mind-control is messy."

Finally, we're told that Jesuits and the high-IQ association MENSA have their own programming code words. Oh, and sometimes hand signals are used to induce trances and allow access to the interior system.

In order to bring the various information we have gleaned into focus, let's attempt a hypothetical. An individual has been trained as a slave since birth. He has been traumatized repeatedly in order to induce dissociation. The dissociation has been used to create alter personalities. These personalities have been programmed to act in specific ways.

This individual appears to have a normal life known as "John." He may have a job and a family. The personality "John" has no memory or understanding of his programming, instead believing false memories of a past that never happened.

One day, his phone rings and he answers. The voice on the other end says something in code--maybe a set of numbers or a phrase about a gemstone or a quote from Alice in Wonderland--and hangs up. John's programming is triggered and, in a trance, he goes someplace he has never been before. A car--chosen for its particular colors--pulls in front of him. The driver says another code to him and John gets in.

John is taken to a location that triggers further programming, through music or color or patterns--anything that might be significant to one's mind. Another personality emerges and a programmer enters the room. The programmer recites a number of codes that allow further programming. He activates an internal program then closes the system. The victim is returned to his previous location and the personality "John" is reactivated.

John has no memory of anything that has happened. Three days later, he murders his boss and disappears from his previous life.

We can easily understand the concept of brainwashed "sleeper" agent, a la The Manchurian Candidate. S&W are trying to tell us how the system of brainwashing works.

In Chapter Five, we examine the specifics of "Wizard of Oz" and "Alice in Wonderland" programming as well as the larger use of deception.

1 comment:

  1. Hey.

    Thank you for your work.

    I would be very thankful/ if you put:mention on your website book The.Luciferian.Doctrine.
    /
    http://foreverthemostimportant.com/
    http://www.disclose.tv/action/viewdocument/198312/The_Luciferian_Doctrine/
    https://pl.scribd.com/doc/257008059/The-Luciferian-Doctrine-v1-01b

    /x: I can offer you a link-back @ xernt dot com: website.

    Thanks
    #1
    775

    ReplyDelete