Partially Correct Programming Site Codes

The following site codes are not totally accurate. Also, the Intelligence groups use that what are called Cryptonyms, which are two-letter digraphs such as the “MK” of MK-ULTRA. The digraph can indicate a type of operation or even a location. An operation may have CODES.

The following site codes are not totally accurate. Also, the Intelligence groups use what are called Cryptonyms, which are two-letter digraphs such as the “MK” of MK-ULTRA. The digraph can indicate a type of operation or even a location. An operation may have its cryptonym changed in the middle of its operation.

  • Programme Programming Zone Area/Code Armstrong 63 94XCCD
  • Astor 36 Florida 59XCBB
  • Bournell-Hightower 19
  • Brown 30 59XBMN
  • Burcham 329 Texas 92XBMM Gaston 61 Colorado 1XCDF Haggin 743 Kentucky 47XB0 Harrick 263 Colorado Springs
  • Johnson 95 Mannass
  • Mentor 21 Colorado 61XBXX Nathan 56 New Mexico Owens 963 106XBJK
  • Pantu 71 Kansas OliXOEG Patterson 117 Kansas
  • Savior 49
  • Major Strange 14 1Z440x72080020366 Strong 52 81XCBC
  • Suttenfuss 103
  • Colonel Taylor 16 Kentucky Weir 561 Texas 33XBCB

Hypnosis in Programs, and Other Uses

The programmers will begin their programming by extreme torture. After a certain amount of torture the victim is willing to say or believe anything to stop the torture. At this point a thought will be planted into the victim’s mind. This thought will be linked to a false memory put in via hypnosis or movies, or other method, and it will be linked to a command put in by hypnosis etc. and the original thought, the command, the false memory will be linked by a single emotion which will link them all together.

The result will be something like this: it is two weeks before Halloween (thought), I must get ready for Halloween rituals (command) because I have always had a habit of going to Halloween rituals (false memory). If I don’t I will have a heart attack and die (memory of torture linked to thoughts). Programming is layered in. Layer after layer of programming is put in. Each alter (personality) of the victim is used as if it is a component of a large system. The result is that no alter (personality) is the whole, but only a cog in a great machine. Can a single cog rebel against the whole machine? It is very difficult for a single component of thousands of components to rebel against the abusers.

Alice In Wonderland Programming as it Pertains to an Alter Going Down in Trance for Internal Programming

Alice In Wonderland Programming: going down the tree, going through the mirror, going underneath something or growing tall.

The internal programmers (and some other alters) have the ability to send other alters into deep trances. One of the programs for doing this is based on the Alice In Wonderland Theme and it was experienced like this for a level 2 alter who managed to stay in communication with her deprogrammer:

When the alter went down in her mind she went down on the inside of the trunk of a tree (like Alice In Wonderland). At the bottom she saw a keyhole, a table, and on the table was love potion #9. She automatically drank the love potion which shrinks her to a dot and then she goes through the keyhole. So normally this process means she goes through the keyhole. She managed to stay in contact with her deprogrammer during this deep trance. After the key hole she saw thousands of looking glass mirrors. Everything got smaller as she went down the tree. She became a dot. She drinks love potion no. 9 and comes back with it. A tree comes and wraps itself around her and loves her. As she ascends (comes up in trance) she stretches up and enlarges. In coming up out of trance she gets stuck at level 8 due to some interference from deeper alters. She, in accord with her programming, senses her Master’s love. (Normally she would have simply tranced out, and another alter would have taken her place and she would have no recollection of the entire process.

The alter has been programmed to have backup amnesia. Backup amnesia means that one doesn’t remember that one lost time, one doesn’t remember that one forgot, etc. In short it means you don’t remember that you don’t remember.) This is an example of hypnosis used internally by the programming and the Programming alters to control other alters. The deepening of the trance was given the imagery of Alice falling down the tree. In the various stories used in programming, there is some part of the story that can be used as the story line for trance induction, these include:

  1. Wizard of Oz–going into the poppies
  2. Star Wars–time warp, riding the light
  3. Star Trek–being beamed, replicators etc.

Hypnosis is used to anchor suggestions about sleep patterns, panic programs, phobias, health healing programs and health problems programs, pain control and pain programs, motivation programs, a suicide program called “hypnosleep”, an insanity program, and countless other uses.

Hypnosis is used to steer a person’s mind in the direction that they have been labeled. For instance, if they have been selected to become a doctor, they will be programmed for success as a doctor. New patterns of thought, feeling and behavior are inserted to build confidence in the goals of the Illuminati.

Positive experiences are used to help boost the person’s feelings, and then the new messages are anchored “imagine these messages taking root. Your new messages are growing stronger and stronger.” The Alice In Wonderland programming theme is used in air-water programs and mirror programs which the Illuminati, the CIA, NASA, the Jesuits and others like so well.

The idea is that there exists a mirror world which is a reversal. Along with it is attached the idea that the slave can enter into a timeless dimension of time, or as some refer to it “interdimensional time travel.”

Later, the victim will be further brought under the spell of this mirror programming by going to locations around the nation, like the Magic Time Machine restaurants in San Antonio and Dallas, TX where mirrors are placed on doors, ceilings, walls, and restrooms of the establishment and programming themes are part of the everything at these restaurants. The handler may tell the slave, “LOSE YOURSELF IN THE INFINITY MIRRORS.”

When hypnotically programming in programs, the Programmers place in many types of images and programs. Some examples would be having the concept of obedience equal the fountain of youth. The fountain of youth flows in the victim’s mind unless they step out side of their orders. This can be linked to the Shangri-la story, where a woman ages as soon as she leaves her place in Shangri-la.

Another example, is the hypnotic imagery involving the formation of an island from a volcano. The story is turned into a programming script to allow the System to be radically restructured. This Volcano programming is a System’s turning program. A volcano erupts from deep down, and lava pours into the sea. Mountains are pushing up from deep in the mind. To survive people must cross from the old to the new island on a bridge that naturally forms. Fire births the new territory and destroys the old. The new mountains develop trees which become safe places for the alters to roost upon.

Hypnotically Building in Structures

Later in the book, the art of building structures internally in the mind of the victim will be covered. However, since the process involves hypnotism it would be appropriate to discuss briefly how hypnosis can begin to work a tree structure into the mind of the child.

First, the programmer hypnotically suggests that his penis is a growing tree. Later, the programmer might begin,

“You know those big trees in the park that look so big and straight and stretch way up toward the sky? Stand up and be one of those trees. Stand up really straight and tall as tall as you can be, and stretch your arms out toward the sky like branches on that big oak tree. Now those big trees have long, deep roots that keep them from falling over. Feel your feet go down down through the floor, just like roots on the big strong oak tree.”

Final note: there is no way that this book could give every last song or story that has been used for programming, nor was it the intention to do so. We have wanted to point out the popular story lines used, although we have missed some such as the Chronicles of Narnia and Little Red Riding Hood (which is used in several ways along the lines of you think you’re going to Papa’s, or Grandma’s house & you end up with a wolf). Our list left out many programming songs–all the Rolling Stone’s songs, Alabama’s Old Flame, etc.

  • Discredit a Target Discredit a Target Whistleblowers, "Truthers," poltical oppistion, activists, etc.
  • Discredit a Company Discredit a Company Whistleblowers, "Truthers," poltical oppistion, activists, etc.
  • Effects: Definition Effects: Definition
  • Operational Playbook Includes False Flag Operational Playbook Includes False Flag Smoking Gun: False Flags part of 9/11 deception/manipulation PSYOPS
  • Gambits for Deception Gambits for Deception
  • 10 Principles for Influence 10 Principles for Influence
  • Magic Techniques and Experiment Magic Techniques and Experiment
  • Pushing the Boundaries Against Hactivism Pushing the Boundaries Against Hactivism Translation: War on Anonymous, unapproved online activism, etc.
  • Effects: 9/11 Silence and Suppression, Concealment of Overthrow Effects: 9/11 Silence and Suppression, Concealment of Overthrow Trauma-based behaviorial modification so you choose not to not see what you have just seen here...
  • Effects: JFK Silence and Suppression, Concealment of Overthrow Effects: JFK Silence and Suppression, Concealment of Overthrow

 

An Ongoing 9/11 Deception and Behaviorial Modification PSYOPS is a Fact, Not Speculation

Snowden NSA Files“The Art of Deception” training, tools of the trade for the NSA and British intel for attacking whistle-blowers, political opposition, hacktivists and  9/11 “Truthers.”  This protocol pertains to the “Five Eyes” better known as US, Canada, Great Britain, Australia, and New Zealand. Note Slide 8’s inclusion of Western media. (JTRIG is Joint Threat Research Intelligence Group, GCHQ is Government Communications Headquarters)

Chapter 5

 

Science No. 5

 

The Skill of Lying, The Art of Deceit

The rule of thumb that the programmers/handlers go by is that they will say anything to get the job done. A CIA handler will tell his agent in the field whatever will work to get the field agent’s cooperation on a mission. There is no height nor breadth nor length to these people’s deception. They have successfully kept some deceptions active for decades, if not for centuries.

The Use of Fiction

The history behind the Wizard of Oz programming is interesting. It suggests that the Wizard of Oz has had an important part in the occult world all along. One of the secrets of the Mystery Religions, especially the Egyptian Isis mystery religion was the ability to use drugs and torture to create multiple personalities. The word Oz is known to have been used by its author as an abbreviation for Osirus. Monarch victims have the “golden penis of Osirus” placed into them.

The Grimm brothers, who were cabalistic jews, gathered the folk occult stories together. Their stories are full of spells, trances, and drugs. Sleeping Beauty is put to sleep, and the trigger to wake her is a kiss on the lips. These are serious hints that the occult world didn’t stop programming people with dissociative states and triggers when the ancient Egyptian empires fell. Instead of using modern lingo such as “hypnotize”, they would say “cast a spell.” Later in Freemasonry, the Right Worshipful Master would “charge” (meaning hypnotize) an initiate.

The occultist Baum, a member of the Theosophical Society, was inspired by some spirit who gave him the “magic key” to write the Wizard of Oz book, which came out in 1900. The book’s story is full of satanic activity and satanic thinking. The story was chosen in the late 1940s to be the basis for the Illuminati/Intelligence community’s trauma-based total mind control programming.

As a way of enhancing the effect of the programming, Monarch slaves are conditioned to place trigger items into their lives. When the movie was made, Judy Garland, who had lived a life touched by the occult world’s abuse, was chosen to act as Dorothy. Judy’s later husband, Mickey De Vinko was a satanist and the chief assistant to Roy Radin, a rich satanist who worked with the Illuminati, and who controlled the “Process church” covens which had as members mass murderers Berkowitz and Monarch slave Charlie Manson. There are several members of the Carr family, who are also tied into both De Vinko and Radin’s Process Church and the Illuminati. With the numerous long term connections between the Wizard of Oz books, and movie to the highest levels of the occult world, it is not without reason that one can theorize that the original series of 14 Oz books had an ulterior motive behind them.

The 14 books of the Oz series are:

  1. The Wizard of Oz,
  2. The Land of Oz,
  3. Ozma of Oz,
  4. Dorothy and the Wizard in Oz,
  5. The Road to Oz,
  6. The Emerald City of Oz,
  7. The Patchwork Girl of Oz,
  8. Tik-tok of Oz,
  9. The Scarecrow of Oz,
  10. Rinkitink in Oz,
  11. The Lost Princess of Oz,
  12. The Tinman Woodsman of Oz,
  13. The Magic of Oz,
  14. Glinda of Oz.

These books are still being sold, and are being read to children who are being programmed with trauma-based total mind control. The 14 books came out in various editions. The originals came out in 1900 and shortly thereafter. In the 1930s, the 1940’s, and the 1950’s the words were retype set and given different pages. (When working with a survivor it might help to identify what decade the Page 100 …. edition the slave was programmed with, because the pictures and the page numbers varied from edition to edition.) Of course, having good pictures is an asset in programming, because the child will visualize off of the pictures when building its internal world.

In addition to this, large Wizard of Oz theme parks are being built by the Illuminati to provide places to carry out programming and to reinforce the programming which traps the minds of Monarch slaves. The best example of this, is the audacious MGM Grand complex in Las Vegas, although other theme parks around America also use a Wizard of Oz theme. If you have read Fritz Springmeier’s Be Wise As Serpents you will know how the Theosophical Society ties in with Freemasonry, Satanism, and Lucis Trust. Several famous members of the Theosophical Society include:

Adolf Hitler (a Satanist who practiced human sacrifice, & who had HPB’s book at his side.)

Mahatma Gandhi (a Hindu guru considered a god by some of his followers. Gandhi was successful with the British in part because of the Theosophical Society.)

H.P. Blavatsky (The founder of the Theosophical Society. She referred to herself as HPB. She was initiated by Illuminatus Mazzini into Carbonarism , a form of Freemasonry, illumined by the Great White Lodge in 1856, was part of the Hermetic Brotherhood of Luxor, and spent lots of time with the Eddy Illuminati family in Vermont, who were well known mediums. She also was a member of the occult fraternities the Order of the Druses, the Adoptive branch of the Ancient & Primitive Rite of Freemasonry, & the hermetic masonic rites of Memphis and Mizraim. She was trained to handle live snakes by Sheik Yusuf ben Makerzi, the chief of the Serpent Handlers, and she was hypnotized by occultist Victor Michal and to some degree from 1866 under his influence.)

Alice Bailey (head of Lucis Trust) Henry Steel Olcott (an important occultist) Elvis Presley (a Monarch slave) Manly P. Hall (an Illuminati Theta Programmer, and at least a Grand Master within the Illuminati who sat on the Grand Druid Council.)

Frank Baum The man who wrote the book The Wizard of Oz was a member of the Theosophical Society. L. Frank Baum lived in South Dakota and created The Wizard of Oz book as a theosophical fairy tale incorporating the “ancient wisdom” of the Mystery Religions. The books have so much material from inside the secret world of the Illuminati, that the few who understand the Illuminati wonder if Baum wasn’t an insider. The moral of the book is that we must rely upon ourselves, for we alone have the power to save ourselves. This was part of the original lie of Satan in the garden. Satan has simply dressed up the same original lie into different packaging and is distributing it worldwide as the most popular American fairy tale.

«- Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 | View All | Next -»

CC BY 4.0 This work is licensed under a Creative Commons Attribution 4.0 International License.