Monarch Mind Control Programming

Crowley’s List of Correspondences are perhaps the best one will find printed in the occult world. They show the correspondences that occultists make between things. For instance, if we want to know what corresponds to the Hebrew letter Dalath. The letter means door. Door corresponds to the letter 14, the Cabalistic Tree of Life pathway between the two top circles on each side of “the crown”, sky blue on the Queen scale of color, Aphrodite, Venus and Freya, and the gems Emerald and Turquoise, and the perfume sandlewood. All these things correspond within Cabalistic magic.

For someone trying to understand why a particular color, and name is given to a deep darkside alter, Crowley’s book is helpful in some Monarch systems. The Mother-of-Darkness alters (and Supreme Master alters in males) of the Illuminati must do pathworking rituals when they hold the body and participate in Illuminati activities. These Mother-of-Darkness alters are placed internally in the Cabalistic Tree of Life. Crowley’s book provides the mystic number that goes to each part (plane, or circle) of the Tree of Life and its Snake positional number. The mystic number of the Sephiroth that corresponds to the number to each of the 22 paths that must be worked is also given. The occult concept is that to achieve divinity one must go on the Tree of Life from being Malkuth to become Kether.

Although it is not the intent to propagate occult doctrine, for those who want to know how Illuminati Monarch slaves get to where they are as adults, and what the codes are in their System, then we need to cover briefly the Kabbalistic Tree of Life. (More will be written about this in chapter 10 on spiritual control.)

Let the reader picture 3 circles in a line. These three circles sit at the top of the Cabalistic Tree of Life. They are the top 3 circles of ten circles which all have names within an Illuminati Monarch slave. The center circle is “the crown” and holds the honored alter who actually is the Bride of the AntiChrist. The AntiChrist is also known as Black Saturn, and other names. Satan himself is known within a Monarch system often by the name Bilair, Bilar, or Bilid which are his cabalistic names. The honored alter who is married to him sits on a pedestal revolving with 2 other alters.

In the occult world, goddesses are triune: maiden, mother and crone. The one to the left of center is Midnight (the Mother figure), and the other is Morning Star (the maiden). Morning Star (Stella Matutina) may be a very young alter, rather than a teenager. On top of the Cabalistic Tree of Life will sit a pyramid. Each of the ten circles (rooms for the alters who live in them) of the Tree of Life is created with a different Illuminati ceremony.

Before a Mother-of-Darkness Monarch slave is 16, they will have gone through all the ceremonies involved in the creation of the alters which correspond to the 10 rooms of the Tree of Life. At age 16, the system’s demons will then guide the system on a personalized pathway and a baby (the firstborn) will be sacrificed by the System. The blood of this first born is spiritually placed in a box under the Tree of Life. This is in accord with the Lilith story. The spirit Lilith (sometimes with an alter Lilith) will work with the spirits of Zerodieth and Lucifer.

There are several trees which can be placed within a Monarch slave, including the ash, the oak, the ygdrassil, the willow, and the Tree of Evil, which is an evil counterpart to the Tree of Life. These will be dealt with under the chapter on structures. This chapter will provide the hypnotic codes, cues, triggers or whatever one wants to call these words, noises, and sensory inputs that manipulate these poor victims turned into Monarch robots. Other chapters will explain about the structures these codes go to, and also the spiritual dimensions of these codes and structures.

Another way to see things is to recognize that the programmers have created “power words” to which they have attached memory and programming. If a de-programmer observes closely the word usage of the victim, you will begin to spot power words of the abuser, for instance, “white rabbit”.

A cipher is when symbols are used to represent letters. One can used letter frequencies to break ciphers. Likewise, there are frequencies to codewords. The Illuminati’s intelligence agencies have programmed thousands upon thousands of slaves. There are only so many code words to pick from and some of these code words are favorites. From the co-author Fritz Springmeier’s experience, the following are favorite code words that have been used to program slaves with:

CHARLOTTE, CHECKMATE, CHRISTMAS, CLARA, CLOVERLEAF, COURIER, CRAYON, CRYSTAL

DAISY, DAVY, DELLA, DELTA, DEMON, DIANA, DINAH, DIRTY, DIME, DOT, DOVE, DRAGON, DUCK, DUMBO

EAGLE, EASY, ECHO, ELAINE, ELEPHANT, ELLEN, EMERALD, EMPIRE, ESTER, EUREKA, EVERGREEN

FAITH, FALCON, FARMER, FELIX, FIREFLY, FIVE BROTHERS, FIVE SISTERS, FLASHLIGHT, FLOSSY, FLYING + [other word], FOX, FREEZE, FRIENDSHIP, FULL HOUSE

GALAHAD, GAMMA, GARGOYLE, GEMINI, GEORGE, GIPSY, GOLEM, GOLDEN + [other word], GOOSE, GRACE, GRANNY, GREEN DIAMOND,

GULL, GWEN

HADES, HALF-MOON, HAMMER, HARRIET, HAWK, HAZEL, HELENE, HELIOS, HEN, HERMES, HIGH BALL, HIGH CARD, HOLE-IN-THE-WALL, HOPE, HOPI, HOUNDDOG, HOURGLASS, HUSThER, HYDRA

ICEBERG, IDA, IMP, INCUBUS, INSECT, IRIS, IROQUOIS, ITEM

JACKASS, JAGUAR, JANET, JANICE, JASON, JASPER, JAVELIN, JENNY, JEZEBEL, JIG, JULIET, JOAN, JOSHUA, JUDY, JUPITER

KANGAROOKANSAS, KATY, KING, KILO, KITTY, KOMET

LACE, LADY + [other word], LAMP, LAURA, LEAP FROG, LEOPARD, LIGHTNING, LILY, LION,

LITTLE + [other word], LOVE, LUCKY + [other word]

MAE WEST, MAGIC, MAJESTIC, MAMIE, MANDREL, MARIE, MARK, MARTHA, MAX, MEADOWS, MERCURY, MIGHTY MOUSE, MILLION DOLLAR, MINNIE MOUSE, MONA LISA, MONTE CARLO, MOTHER, MUMMY

NANCY, NAOMI, NAVAJO, NIMROD, NOAH, NORA, NUTCRACKER

OBOE, OCTOPUS, OLD FAITHFUL, OLIVE, OPAL, OPHELIA, ORION, OSCAR, OWL, OZMA

PACKAGE, PAMELA, PANDORA, PANTHER, PAPERCLIP, PAPA, PAT, PATSY, PEGASUS, PENTHOUSE, PHANTOM, PHOENIX, PINECONE, PISTOL PETE, PLATO, PLUTO, POLLY, PYTHON

QUAIL, QUEBEC, QUEEN, QUEEN BEE, QUEENIE, QUEST, QUICK SILVER

RACHEL, RAINBOW, RAM, RANGER, RASCAL, RAT, RAVEN, REBECCA, RED DIAMOND, RED HILL, RENO, REX, RHUBARB, RITA, ROBOT, ROMEO, ROOSTER, ROSIE, ROVER, RUBY, RUTH

SABRE, SAINT, SAINT + [another word], SALLY, SAN ANTONIO, SAPPHIRE, SARAH, SATURN, SCAMPER, SCOUT, SEA GULL, SEAL, SERGEANT, SERGEANT-DELTA, SHADOW, SHARK, SHENANDOAH, SHO, SICKLE, SIGMA, SILVER,

SNOW + (other word)

ZEBRA, ZENITH, ZERO, ZYPPER, ZOMBIE, ZULU, ZUNI.”

The word FOX is an example of a significant occult code word. F-o-x consists of the 6th, 15th (1+5), & the 24th (2+ 4) letters of the alphabet, which yield 666. The reader needs to bear several things in mind. First, the programmers generally have intelligent, well sounding codes, that do form patterns. For instance, a woman’s name from the Bible will be used as a code, with subparts or subcodes having other female names from the Bible. Deeper Illuminati parts will have goddess and god names, and king and queen names for cult alters. These are the names the handler or cult uses–NOT their access codes.

The codes for slaves follow patterns. There are standard and unique codes. The internal programming alters have the power to change codes if they need to protect the programming. They will have to hypnotically work with alters when they trance out at night. In other words, most of their programming of front alters will be done when a System lies down for “sleep”–more accurately described as “for trance.” If the internal alters change many codes, in their efforts to protect the system, they will even make it difficult for the handler/programmer to get into the system.

Ciphers developed rotors that require lines to line up. Some simple schemes using this principle appear in some Monarch systems. This is part of the science of structuring. Intelligence codes often come from the Bible or popular fiction books. The deeper codes are occult words, often in foreign languages such as Arabic, which is an important language in the upper occult world. Slaves will be given COVER NAMES for ops, and often males receive female names and vice versa.

Very shortly, we will provide the Monarch hypnotic cues (codes) for the multitude of functions that a Monarch’s mind must carry out. The type of programming which is placed in a slave varies. For intelligence operations the slave will have to have BONA FIDES, which are codes to allow two people to meet. All slaves are given CONTROL SIGNS which allow them to indicate via a code that they are in trouble. A RECOGNITION signal allows two people to make contact. For instance, the handler might fly his distinctive sounding plane over a slave’s house in a pre-arranged signal. It might also be a particular colored scarf, and a particular set of phrases. A GO-AWAY code is a prearranged signal that means it is unwise to make contact. The go-away signal may be simply placing one’s hands in one’s pocket or turning the porch lights off. A “GO TO GROUND” signal means to go into hiding. A MAYDAY BOOK exists for Illuminati and Intelligence slaves which allows them to call if they are about to be arrested. A telephone number is left open for just this purpose.

Also common universal Illuminati codes can be used by the slave to get set free from police and judges. Within the Jehovah’s Witnesses, especially their headquarters, the Illuminati uses Enochian language to program with. With Druidic branches Druidic symbols are used. With the Jewish groups, Hebrew is used. Other languages are also used. An Illuminati System can easily have 6 different languages used as programming codes. The foreign language codes will be for small parts of the System only. Special artificial languages are also employed, as well as sign language.

Monarch Mind Control Codes

Contents:

Alpha (Basic)

Beta (Sexual)

Chi (Return to Cult)

Delta (Assassination)

Epsilon (Animal Alters)

Omega (Internal Computers)

Gamma (Demonology)

Hypnotic Inductions

Janus-Alex Call Backs (End-times)

Theta (Psychic Warfare)

Tinkerbelle (Never grow up/Alien)

Twinning (Teams)

Solemetric Military

Songs (Reminders)

Zeta (Snuff Films)

Sample alter system codes

Alpha (Basic)

Basic Commands (these basic commands are also found used in many slaves, although there will be exceptions to everything.)”GET ON YOUR TOES. STAY ON YOUR TOES.” means “attention slave” get ready for a command.”ON YOUR TOES–is a preparatory command that will be used throughout an entire system.”IF YOU PLEASE SIR.” -From Wizard of Oz, slave says this like “yes, sir.” 3-tap code for access.

“FOLLOW THE SNAPS”, “LISTEN AND OBEY OUR COMMANDS”, “THIS IS FOR YOUR OWN GOOD”

“FIDDLER” = code to take one to Never Never Land

“PUPPET MASTER” -name of master for Marionette or Puppet program “DADDY”

-master “DADDY’S FRIEND”–a user of slave approved by master “PAPA”

-master, “WHITE RABBIT–master

“YOU’LL SPEAK MY WORDS WHEN I PULL YOUR STRINGS.” Puppet programming control of what slave will say. “SPILL IT” –trigger command ordering slave to speak

“SILENCE” –order means keep quiet

Mr. Rogers Neighborhood’s “Land of Make Believe” was used for the programming code script:

“I AM MR. ROGERS AND I HAVE PUPPETS, TOO I PULL ALL THE STRINGS AND I PULL STRINGS ON YOU.”

Twinkling of the nose –Bewitched programming to cast spell or order on slave. “(name of alter), YOU WILL COME FORTH AND OBEY.” or “…OBEY AND

COME FORTH.” Another basic way of getting an alter would be simply to spin the person and call out the alter’s name, or to snap the fingers and call out the name of a front alter.

Access is accomplished for a number of Illuminati slaves by a message via phone or letter, then a looking glass person takes the system to a location outside of the house, maybe simply to the sidewalk, there the person is picked up. The left hand is then grasp on the soft part of the hand between the thumb and forefinger by two fingers very tightly. This pulls up and alter with an egg in its lap. The egg is then opened via a code and the imps inside the egg to communicate to the ribbons and the computer.

Access phone calls to slaves may have high-speed codes transmitted that trigger the slave subliminally without their conscious awareness.

Access to some people is done with computer like jargon “ON LINE” “ACCESS, (then identification), (then color code), (then name)” “, “ENTER”, “RUN”. Some Systems have their triggers all in computer lingo such as COMMAND

MODE–ALL DISK DRIVES AND HARD DRIVES… ERASE.. .FORMAT DRIVE…COPY….UNDELETE PURGED MEMORY DRIVE…”

Where some of the newer slave programmers are also computer programmers they enjoy transferring their computer lingo to use in controlling their programmed slaves. They may even throw in some FAX lingo such as “DIAL ALL REMOTES. .

. INITIALIZATION – ATSO -OHOaM (HANDSHAKE BETWEEN ALL REMOTES), HANDSHAKE COMPLETED.”

The color of the car to pick up a System may relate to the color coding of the alters to be picked up, such as white exterior, blue interior for a white alter-then blue alter access sequence.

Basic Internal Emergency Color Codes for a System, there are several different “CODE RED’s, etc. not just one in a slave, what follows is not the complete information about the Codes, although it is possible some slaves have a simplified version like this:

  • “CODE GREEN” –Dr. Green’s suicide programming, tied to “no-talk” programming. “CODE BLUE” –Victim’s body freezes in motion and can’t move until another code is given.
  • “CODE RED” –Victim gets angry and violent “CODE RED” -Another Code Red has the standard Monarch meaning, “serious self-destruct” program
  • “CODE YELLOW” –Victim gets jealous, angry and wants to violently get even “CODE BLACK” –Used to get victim’s to get on their ritual clothes.
  • “CODE WHITE” –Code to protect the cult members from arrest. When police see the Code White they treat the people as untouchable. There are code words for Illuminati members to tell police and judges that will automatically get them set free. Masonic handshakes and codes also work well with judges, police & govt. workers.
  • “CODE 911” –To activate the slave for an emergency calling for superhuman strength. Certain alters will have extra strength.
  • “CODE 911 “–Also used with standard Monarch meaning of “Call your programmer/handler”.
  • “DISARM” (3x)-to get rid of a dangerous alter two snaps + “SHUTDOWN”–to shutdown an alter.
  • “LET THE KINGS BE KINGS”
  • “LET THE BANKERS BE BANKERS”
  • “LET THE PRIESTS BE PRIESTS”–saying to justify their Master-slave relationship to the masses of humanity.

The Sun setting the following day was used as a trigger for slave to forget events. For the cat alters a certain word is given to trigger them to go “over the rainbow” after an event in order for them to forget it. “FROM THE RISING OF THE SUN TIL THE GOING DOWN OF THE SAME” –programmed in by using the scripture. “GO INTO THE SEA OF FORGETFULNESS” –a hypnotic structure in the mind to forget. Waterfalls are also used as a hypnotic image to forget pain and memory.

“RETYPE A LETTER” -reprogram, “JEWELS” = programs. “THE CATS & THE FIDDLE NEED TUNED UP–Slave to handler, I need reprogrammed.

There are three words to trigger a suicide program –

  1. Bait,
  2. [intentionally left out],
  3. hook

Another suicide program trigger is when the dominoes fall. “GO OVER THE BLUFF” (3X)- causes suicide in some alters SACRED HEART = Catholic/Jesuit suicide program

«- Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 | View All | Next -»

3 Comments

  1. I read this article and will willingly submit to monarch slave training. I live by myself. Haven’t talked to family in 3 years. I will drive to a facility tomorrow and willingly submit to be trained and sold at auction. I am 40 years old bit have been looking for slavery for years. Please help me..contact me at tarsnr@yahoo.com. I crave permanent no way out slavery

1 Trackback / Pingback

  1. Floyd Cannington

This site uses Akismet to reduce spam. Learn how your comment data is processed.