Dr. Star’s Programming which places Pentagrams into people uses Sigils as codes–the occult symbols for the various demons, along with a color, a gate, and a number form a complete code.

For example, 1st Gate is the god Nanna, #30, color-SILVER, LADDER OF LIGHTS, GOD OF THE MOON. (see Illustration)

To access a System the abusers often have an object as part of the pickup code, such as a set of car keys, a special coin token, a business card, jewelry, or certain clothes or packages.

A Popper liquor drink is knocked 3 times on the table when it is served. (Who would be the wiser that three knocks is an access code?)

Word Matrices : A word-matrix code is where the victim is given two lists of words and then each word on the left list is paired with a word on the right list to form a code.

Randy Noblitt, a therapist, gave an example of a basic pattern for a Word-Matrix. And this is simply quoted from his example to give the reader an idea.

started xenophobe between thoughts endless beginning throughout forever get out trepidation over beneath fun execute win lose first then form benign beginning end tonight last morning thorough the end

BETA (Sexual)

SEXUAL ALTERS—most of the following codes are for deep sexual alters. In Illuminati Systems these are called Beta alters, in CIA systems they create Beta models whose primary function is to provide sex, usually perverted sex and S&M for the perverts who run our secret government and visible government. BETA models are those who are primary job is sexual, such as service as a Presidential Model (sex slave for a President). These System models are numbered BETA 1, BETA 2…BETA 601, etc

Domino codes for spinners can be 6-3, 6-4, 8-4, 8-5, 10-5, 10-6, 12-7, 12-8. The 13th kitten then would be left blank. Spinner dominos have spinner kittens off of them, when a spinner domino code is used. In this case 6-2 could take you to the Beta level.

“10 LITTLE INDIANS, 9 LITTLE INDIANS…”, “1 LITTLE, 2 LITTLE.. .”–assoc. w/ morse code-call back telephone no.s.

“3 LITTLE KITTENS HAVE LOST THEIR MITTENS…” -The Kitten alters have stepped outside of their programming and need fixed by the Master.

“Hotel California” means a place to have sexual gratification.

Stroking under chin along with “HAVE A BALL TONIGHT” (Cinderella programming) Stroking under the chin along with “PURR FOR ME KITTEN.” Magic shoes or red slippers are used to switch to get specific sexual alters. The slippers are clicked 3x to get deeper sexual alters.


“COME HERE LITTLE ONE.”–call for young sexual alter

“PASSION” used 3x with other words as a sexual trigger, such as “SHOW ME YOUR PASSION.” Passion is a strong program word for sex.

“RED DOT, SPIN SPIN SPIN, BECOME ANOTHER PERSON.” this is said to a mother kitten before she is told which spin kitten to get from her litter. It is a preparatory command meaning “call your spinner”.

Spin Kittens “WE GOTTA GET DRESSED.. .IN 5 MINUTES” along with being spun produces specific sexual kitten.

9 lives of kittens –means 9 sexual alters taken in sequence. When spun in a counterclockwise fashion, the sexual menu is from 1 to 9. With 3 & 5 being oral sex. “Heat of hell” are used as trigger words in this programming. The 10th revolution is to beg to be whipped. “TURN AROUND 10” “SPIN FOR ME.” The heat of hell ignites after the 6th spin.

“RIDE PONIES”–means to do sex for both eng. & ger. slaves; “PLAY

HORSEY–sexual games; “MOUNTING A HORSE”–[obvious] “CAT NAP” –sex; “CAT NIP–cocaine

Tweedle Dee and Tweedle Dum –S&M programs involving mirror image alters. Not to be confused with Humpty Dumpty self-destruct program.


MINE.”–This means to fall under the master submission, has sexual overtones.

“ITSY BITSY BOOB” –access code pertaining to Betty Boob programming (which is a certain type of female behavior).

For Beta alters the codes may be:

“BETA ONE MARY A=1, B=2, C=3, D=4” “BETA TWO MARY A=4, B=3, C=2, D=1” “BETA THREE MARY A=3, B=4, C=1, D=2”

Then these might be said in combination “3412 4321 1234” (x3)

An amer. sys. used w/ Latin Amer. may have a Beta alter activated by the movement of 2 small Mexican flags & a code word in spanish “USTA CA-NATA” (cream)

CHI (return to cult)

Chi programming uses a lot of idiosyncratic phrases, and little ditties. Some of the nursery rhymes listed in the song section will be Chi programming. Some of the Chi programming has been listed in the Alpha programming section

Delta (assassination).

Delta alters –are activated to kill by the following three things: seeing specific clothing, items held in a persons hand, and particular words. Since these items would specific for a particular murder there is no particular specifics that can be given.

Courier Pigeon Alters (In Illuminati systems–these are Delta-Beta alters). “FLOCK”

–word meaning the stable of carrier pigeons of DIA

The Evidence on Sirhan Sirhan as a Monarch Delta Assassin/Patsy


“My determination to eliminate Robert F. Kennedy is becoming more the more an unshakeable obsession… Robert F. Kennedy must be assassinated.”

Monarch Delta Assassins are twinned. Sirhan's accomplice was the infamous "Girl in the Polka Dot Dress."

Monarch Delta Assassins are twinned or come in teams of four. Sirhan’s accomplice was the infamous “Girl in the Polka Dot Dress.”


Was the Polka Dot Girl “Peggy Osterkamp”? “She practically stepped on me, and she said, “We’ve shot him. We’ve shot him.” Then I said, “Who did you shoot?” And she said, “We shot Senator Kennedy.” And I says, “Oh, sure.” She came running down the stairs, very fast, and then the boy in the gold sweater came running down after her, and I walked down the stairs.” L.A.P.D Interview of Sandy Serrano, 2:35 a.m., June 5, 1968, p. 27.


In one of Sirhan’s notebooks the name “Peggy Osterkamp” was written over and over. “I love you, Peggy,” in one place and in another, “Peggy Osterkamp Peggy Osterkamp Peggy Osterkamp Peggy Sirhan.”

When Dr. Marcus asked Sirhan who Peggy Osterkamp was, he said that she was just a girl he’d met a few times at the ranch where he’d worked as an exerciser of horses. Dr. Marcus asked Sirhan if he’d ever dated her, and Sirhan told Marcus the story he’d told the public defender about the night of the assassination.

Operation Mind Control, by Walter Bowart

rfk_csp1“Delta alters –are activated to kill by the following three things: seeing specific clothing, items held in a persons hand, and particular words. Since these items would specific for a particular murder there is no particular specifics that can be given.” In this case, as we can see from Sirhan Sirhan’s writings, the word and object was “port wine.” Sen. Robert Kennedy was shot in the kitchen area of the Ambassador Hotel,where port wine was stored.


diary excerpt

In 1968 almost no one knew of the Illuminati. Sirhan writes “Master approached, let us do it.” Above we see Sirhan mention the Illuminati three times; and also one “Master Kuthumi”, which may be the pseudonym used by his hypnoconditioner, or Master; believed to be the late Dr. William Joseph Bryan. Master Kithumi is a reference to an occult master who gave Madam Helena Blavatsky her Secret Doctrine, a theory of 7 root races, particularly the supremacy of the Aryan race, upon which Nazism was founded. And speaking of mind control, Sirhan Sirhan was actually put under hypnosis by the LAPD to determine his programmer, as it had been evident he had been programmed to kill through hypnosis.



Illuminati black magic indeed. Here’s Sirhan’s hypnotic induction countdown.

[ca_audio url_mp3=”http://impiousdigest.com/wp-content/uploads/Sirhan.mp3″ width=300 url_ogg=”” align=”none”]

sirhan-bryanThe Los Angeles Police Department attempts to find Sirhan’s programmer, who was actually sitting right there at the time: CIA hypno-conditioner Dr. William Bryan. However, if you pay attention, it is painfully clear the hypnotist is trying to implant memories, not retrieve them, by repeating “you’re killing Kennedy, huh? Reach for your gun, Sirhan! Reach for your gun! You’re killing Kennedy!”


  • "Can an individual of ****** descent be made to perform an act of attempted assassination involuntarily under the influence of ARTICHOKE?" "Can an individual of ****** descent be made to perform an act of attempted assassination involuntarily under the influence of ARTICHOKE?"
  • "Can an individual of ****** descent be made to perform an act of attempted assassination involuntarily under the influence of ARTICHOKE?" "Can an individual of ****** descent be made to perform an act of attempted assassination involuntarily under the influence of ARTICHOKE?"
  • The Shooter: Thane Eugene Caesar The Shooter: Thane Eugene Caesar
  • Sirhan and the occult Sirhan and the occult
  • Sirhan acknowledged he was a member of the Illuminati Sirhan acknowledged he was a member of the Illuminati
  • Powder burns from a point blank shot to Kennedy's skull Powder burns from a point blank shot to Kennedy's skull
  • Evidence of multiple guns Evidence of multiple guns
  • Fatal entry wound Fatal entry wound
  • Sirhan: "RFK must be assasinated..." Sirhan: "RFK must be assasinated..."
  • "Master approached let us do it..." "Master approached let us do it..."
  • The hypnoconditioner? The hypnoconditioner?
  • Derren Brown - The Experiments: The Assassin (Full) Derren Brown - The Experiments: The Assassin (Full)
  • Robert Kennedy Assassination Robert Kennedy Assassination
  • New Bobby Kennedy Assassination Recording13 Shots New Bobby Kennedy Assassination Recording13 Shots
  • Thane Eugene Caesar Thane Eugene Caesar


Project Artichoke and the Programmed Assassin

“1. The ARTICHOKE Team visited [redacted] during period 8 January to 15 January 1954. The purpose of the visit was to give an evaluation of a hypothetical problem, namely: Can an individual of ****** descent be made to perform an act of attempted assassination involuntarily under the influence of ARTICHOKE?


a. The essential elements of the problem are as follows:

(1) As a “trigger mechanism” for a bigger project, it was proposed that an individual of ****** descent approximately 35 years old, well educated, proficient in English and well established socially and politically in the ****** Government be induced under ARTICHOKE to perform an act, involuntarily, of attempted assassination against a prominent ****** politician or if necesssary, against an American official…

Source: Page from a CIA memorandum from 1954. Published in Phil Melanson’s The Robert F. Kennedy Assassination, (New York: Shapolsky Publishers, Inc, 1994). In the exhibits (page not numbered).

Lone nuts with remarkable access

Lone nuts with remarkable access then and now: Sarah Jane Moore, Squeaky Fromme, attempted to kill President Gerald Ford. Fromme was the product of a man convicted of programming assassins in the United States. You may have heard of him: Charles Manson, who programmed a Family to kill in the Tate and LaBianca murders in 1969, hoping to start a race war. James Earl Ray, Sirhan Sirhan, Arthur Bremer, John Hinkley. In lower inset is Oscar Ortega, a recent shooter who believes Obama is the Antichrist, a belief literally promulgated in the Christian Zionist right-wing media since day one. In handcuffs a White House intruder, Omar Gonzalez, who jumped over the fence with a knife and made it into the interior, the Green Room.


To turn a Genie free, pop a cork: “TURN YOUR GENIE FREE…POP A CORK.” An internal controller must activate the umbrella or genie bottle pop the cork program to release a delta or delta-beta alter.

“YOUR WISH IS MY COMMAND” I Dream of Jeannie Programming

“YOU-ARE-WHAT-YOU-READ” passbook program. Programming to remember bank numbers and other specific numbers.


Distinctive jewelry & clothes. Emerald ear rings used as a signal to others that a message was being carried. Emeralds mean drugs, rubies mean prostitution, diamonds (rhinestones) presidential model work. Red, White & Blue worn sometimes by presidential models.

High level reporting alters forget their messages with “REFILE # #, (name of alter).” Some Systems have one name w/ several different numbers attached to indicate alters within one area and purpose. Sergeant 1, up to Sergeant 60. Or say “Access 1143 Marcy” & then other Marcys are numbered with other numbers. Spaceships & flags are assoc. w/ Sargeant alters.

Delta Black Widow alters have a web, fangs, poison, eggs, and silk strand connectors. Viper is the demon associated with Black Widows, and they are programmed to re-connect their strands if all of the connectors are not taken out.

Index finger pointed at head means russian roulette

OMEGA (Internal Computers)

The Omega programming works along with an Executive Control Board (or Grand Druid Council) and Internal programmers. The Executive Control Board is associated with both numbers of the clock, and precious gems and metals such as “9 O’CLOCK GOLD”. The Beast computer can be accessed with Scripture triggers associated with the Vision of Daniel of the Beast, and its ten toes. The Ten Toes are important part of the code in some models.

Universal Code for Access to Internal Computers:

  • key manual 33123113211
  • program computer 22133113332 function computer 11123132221
  • ren computer 13321321332-55434232312 LS 55434232312 reenlist
  • reprogram no.s -2231231; 4432312; 33231223
  • An input code is 666fff666fff666 the reverse of this code is F6F6F6F6F6F6F6F6F6F6F6.

One victim’s computer ran on code “WAR GAME”. Some Beast computers have 666 666 666 as an access code and 999 999 999 as a beast back out and close out code. There are various computers–one on each level. These have some standard codes and some individual codes.

UNIVERSAL FUNCTION CODES COMPUTER CODE–5543423231 2 which hold the following codes:

  • abduction 4511321
  • anger 4213261
  • assignment coordinator 1613212
  • assassination 5332135 bank of lies 3124532 blindness 2566553
  • brain disorder 6325512
  • body gesture 1332221
  • body functions 4311322 call back ritual 6664113 child control 3214441 circle in fields 3332241 confusion 6643252
  • control 4321341
  • deaf 3324553
  • death 1451621
  • denial 2311444
  • despair 3223412
  • distortion 6233322 disorder of bones 4561321
  • disorder of breathing 5532111 disorder of eating 3342136 division 3211652
  • false memories 3314532
  • fear 2665132
  • fleeing 5613354
  • game playing 1561321
  • guilt 4321231
  • hatefulness 5331241
  • hopelessness 1112364
  • illness 1566432
  • infiltration 2231335
  • insanity 2144312
  • inside reporters 1133265
  • loyalty to group 3364112
  • mute 2213541
  • murder 3221456
  • nonsense 2665443
  • outside reporters 1132256
  • reprogram others 4555643
  • reprogram self 1133432
  • respond to triggers 4441221
  • retardation s- 1314555 m- 1314556
  • sabotage 1135461
  • seduction 2134121
  • self body harm 3321343
  • sex 2116652
  • shame 3122115
  • suicide 3113246
  • trigger 1324652
  • trigger others 4442211
  • zombie 3321556

Under each of these codes, other codes may be attached. For instance, under Body Gestures, the following functions are coded and a sample coding scheme would look like this:

  • talk verbally 3456343
  • touch chest 2322132
  • touch hair 3323221
  • touch mouth 5434232
  • touch nose 5443232

Rainbow an alter which speaks only in rhymes. Ribbons are in a box with Rainbow. A ribbon might be accessed by several slaps on the face and “Rubicon 2,4,6,8…” (3x)

Hickory Dickory Dock rhyme is associated with the vortex which is tied to turning the system and also to some death alters.

Dominoes set off flooding programs to overload the person.

Program numbers on some slaves are put in by touching the third eye with the index finger and speaking the number.

GAMMA (Demonology)

Most of the Beatles’ songs were used for programming. Charles Manson was programmed with Beatles’ music.

In Satan’s realm, demons are fathered or split off in families like alters are. There will be a Moloch number 101, and a Moloch 10,321. The victim has alters which are numbered such as Sally 1 and Sally 10. For a better understanding of this area of programming see Chapter 10 section I. Gamma Programming includes all the demonic activity. In this section one can add the Kabballa’s Tree of Life which has alphabet codes, back up programs to regenerate, associated with Greenbaum or Greentree. In the Illuminati slaves, the deeper parts of their system are ritual and the demonology pertains to the various rituals that are done.

The following is a sampling of Illuminati rituals. The blood rituals are used to attach demons to possess alters in a particular way. These rituals can’t be separated from the programming. They are part of the programming.



  • Assembling of the Quarter Regents
  • Beltaine with hunts of slaves, fire festivals, and blood rituals Bride of Satan Ceremony (Mar. 24)
  • Demon revels
  • Drawing down the moon Druid Feast Day on Jan. 1
  • Duels to the death like gladiators where the heart is cut out and eaten Grail Mass, the
  • Grand Climax human sacrifice & sex rituals Invocation of Hecate as Crone
  • Lammas sabbat where a female is sacrificedThe_Beatles_Sgt_Peppers_lonely_hearts_club_band_hi_resBeatles album cover with Illuminati Satanist Aleister Crowley (inset) 
  • Pathworking (done before 16 with Cabalistic Tree of Life pathways.) Rite of Deification
  • Rod of Light ceremony (consists of text from Cabala, black candles, ram’s horn blown, and victim’s mother’s name sounded)
  • Sealing ceremony at 19 yrs. for Mothers of Darkness level
  • Secret ceremony where people paint their faces half black and half white.
  • Sister of Light rebirthing water ceremony (victim is bound and then pulled from water and wrapped up in linen, and a green branch is place on the chest)
  • St. Agnes Eve
  • St. Bartholomew’s Day
  • St. Walpurgis
  • Summer Soltstice Orgy

For those who are not familiar with occult terms the following are ritual items: Paten (the holy dish), Athame or Glaive (the knife used to sacrifice with), the wand or sceptre (an ornamental staff which represents authority & usually has an electric shock), and the censer (to distribute burning fragrance).

«- Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 | View All | Next -»

CC BY 4.0 This work is licensed under a Creative Commons Attribution 4.0 International License.