Monarch Mind Control Programming

Our hypothetical Mary will also have hundreds of other codes for all kinds of miscellaneous things such as the following random codes: “RUBY RED LIPS” “TO HAVE POWER” AND “TO BE THE POWER”, which are also found in the Tall Book of Make Believe in the Shut Eye Town. Dominoes help with the code:

“2-4-6-8 WHO DO YOU APPRECIATE?”. More examples are, “I LOVE DADDY.” “JACK BE NIMBLE JACK BE QUICK 13-1 12-2…” “PUMPKIN

HEAD–an access code. To go away- “Ta RA RA BOOM-DE-AYE”,”CRYING OVER YOU (3X)”, “SILKEN GIRDLE”– a golden caterpillar plays a bittersweet tune. A gold pocket watch with Roman numerals is associated with the words “Eagle on it.”

When Mary gets scared and begins to get into revolving switching, sometimes spinning can be slow down by saying, “10–YOU ARE SLOWING DOWN 9–YOU ARE SLOWING DOWN 8–YOU ARE GETTING SLOWER AND SLOWER…” A system’s coding is a reflection of their programmer. If the programmer is a pilot which many of them are, then they may have pilot lingo in their codes, such as the system may be turned by pitch & degrees. If the programmer is a sailor the system

may have nautical codes, such as “RED RETURN RUNNING” , ”SAFE HARBOR” (for ”Home”), and DOWN RIVER (away from “Papa”).

Q. Catholic Programming (by Jesuits etc.)

KEYS TO THE KINGDOM = world domination by mind control.


This is explained to the victim that the sea shells and the plants have the ability to hear, and that a sensitive occultist (programmer) can psychically pick up what the plants and sea shells hear.

“MAINTAIN IT” –is a command to maintain the Vow of Silence

“MAINTAIN IT & LISTEN.”– a command to keep silent and listen to a command. “ENTER INTER INNER DIMENSION TWO” – this is a standard Jesuit infinity program (2 is a sacred voodoo no.)

Mensa Programming (by MENSA)

“17 211346” is an Illuminati code meaning a Mensa layer Sample Mensa codes:

“727 + E=MC SQUARED + 3.141 5962 + PI”


The MENSA codes are sequences of 6 numbers.


Miscellaneous Common Signals

  • Finger to forehead–
  • One ring finger bent at 90 degree –access wave Rotated pencil–with certain words–rotates the system
  • Finger swung the counterclockwise way closes portals.202
  • Right Fist to forehead–OBEY
  • Fist with right hand cupping left hand, the left is like the letter c, and the thumb is outward and the fist inside, the left hand then moves 3 times over the knuckle–access signal
  • Left hand of slave laid on top of handler’s hand-sign of submission
  • Hands behind back of head–I’m master
  • Right Hand with thumb & index finger making an L shape on chin/check
  • Hands on inside of thighs by handler–come to me Kitten and service me.
  • Hands locked folded interwoven backward–you can’t break “the circle”
  • Handshake with index and middle finger held straight out–“You are one of us.”
  • Grip called the lion’s paw–access greeting opening and closing the hands or large circles with index finger opens portals. Palms rubbed together counterclockwise
  • Kiss on center of head–kiss of submission of slave to handler
  • Palm of hand touched–sexual access point for some models
  • Sign of Satan– Hail Satan! used for Monarch & Illuminati Mind-controlled slaves as an induction. The alter who is holding the body goes into trance, & a deeper one replaces it.
  • Thumb twiddle–rotating the thumbs around with the two hands clasp–S&M
  • Touch of center of forehead–access point
  • Vulcan Peace Sign–llluminati/occult greeting Wave with Finger and thumb together-other digits extended
  • Winks at the system were used to convey meaning.

Life “Over The Rainbow”- After indexing & rereading this book, the co-authors realized that we had not explained “over the rainbow.” Some alters live “over the rainbow” and some do not. Both types will use the term “over the rainbow”, but with different meanings attached. For those who live “over the rainbow”, they serve their masters in such a deep hypnotic trance that they perceive reality like it’s a dream. When their memories surface they are so unlike normal memories that a system in therapy may not know what to do with them. They have been described as similar to the pictures in the old T.V.s when the vertical hold would go out of control.

Deeper alters, who live “over the rainbow” experience memories/life in the following fashion: faces & porn cameras are airbrushed out of their memory, distinctive marks in the perpetrators such as scars & wrinkles are airbrushed out, colors & lights are very bright due to the total dilation of the pupils while in deep trance, and there is no sense of time for these alters. These alters are trained to “TRANCE SEND FORWARD THROUGH TIME”. By understanding the programming, the codes, & triggers, those alters who lived “over the rainbow” can recover from the mind the full memory, without the distortions created by dissociation.

Partially Correct Programming Site Codes

The following site codes are not totally accurate. Also, the Intelligence groups use that what are called Cryptonyms, which are two-letter digraphs such as the “MK” of MK-ULTRA. The digraph can indicate a type of operation or even a location. An operation may have CODES.

The following site codes are not totally accurate. Also, the Intelligence groups use what are called Cryptonyms, which are two-letter digraphs such as the “MK” of MK-ULTRA. The digraph can indicate a type of operation or even a location. An operation may have its cryptonym changed in the middle of its operation.

  • Programme Programming Zone Area/Code Armstrong 63 94XCCD
  • Astor 36 Florida 59XCBB
  • Bournell-Hightower 19
  • Brown 30 59XBMN
  • Burcham 329 Texas 92XBMM Gaston 61 Colorado 1XCDF Haggin 743 Kentucky 47XB0 Harrick 263 Colorado Springs
  • Johnson 95 Mannass
  • Mentor 21 Colorado 61XBXX Nathan 56 New Mexico Owens 963 106XBJK
  • Pantu 71 Kansas OliXOEG Patterson 117 Kansas
  • Savior 49
  • Major Strange 14 1Z440x72080020366 Strong 52 81XCBC
  • Suttenfuss 103
  • Colonel Taylor 16 Kentucky Weir 561 Texas 33XBCB

Hypnosis in Programs, and Other Uses

The programmers will begin their programming by extreme torture. After a certain amount of torture the victim is willing to say or believe anything to stop the torture. At this point a thought will be planted into the victim’s mind. This thought will be linked to a false memory put in via hypnosis or movies, or other method, and it will be linked to a command put in by hypnosis etc. and the original thought, the command, the false memory will be linked by a single emotion which will link them all together.

The result will be something like this: it is two weeks before Halloween (thought), I must get ready for Halloween rituals (command) because I have always had a habit of going to Halloween rituals (false memory). If I don’t I will have a heart attack and die (memory of torture linked to thoughts). Programming is layered in. Layer after layer of programming is put in. Each alter (personality) of the victim is used as if it is a component of a large system. The result is that no alter (personality) is the whole, but only a cog in a great machine. Can a single cog rebel against the whole machine? It is very difficult for a single component of thousands of components to rebel against the abusers.

Alice In Wonderland Programming as it Pertains to an Alter Going Down in Trance for Internal Programming

Alice In Wonderland Programming: going down the tree, going through the mirror, going underneath something or growing tall.

The internal programmers (and some other alters) have the ability to send other alters into deep trances. One of the programs for doing this is based on the Alice In Wonderland Theme and it was experienced like this for a level 2 alter who managed to stay in communication with her deprogrammer:

When the alter went down in her mind she went down on the inside of the trunk of a tree (like Alice In Wonderland). At the bottom she saw a keyhole, a table, and on the table was love potion #9. She automatically drank the love potion which shrinks her to a dot and then she goes through the keyhole. So normally this process means she goes through the keyhole. She managed to stay in contact with her deprogrammer during this deep trance. After the key hole she saw thousands of looking glass mirrors. Everything got smaller as she went down the tree. She became a dot. She drinks love potion no. 9 and comes back with it. A tree comes and wraps itself around her and loves her. As she ascends (comes up in trance) she stretches up and enlarges. In coming up out of trance she gets stuck at level 8 due to some interference from deeper alters. She, in accord with her programming, senses her Master’s love. (Normally she would have simply tranced out, and another alter would have taken her place and she would have no recollection of the entire process.

The alter has been programmed to have backup amnesia. Backup amnesia means that one doesn’t remember that one lost time, one doesn’t remember that one forgot, etc. In short it means you don’t remember that you don’t remember.) This is an example of hypnosis used internally by the programming and the Programming alters to control other alters. The deepening of the trance was given the imagery of Alice falling down the tree. In the various stories used in programming, there is some part of the story that can be used as the story line for trance induction, these include:

  1. Wizard of Oz–going into the poppies
  2. Star Wars–time warp, riding the light
  3. Star Trek–being beamed, replicators etc.

Hypnosis is used to anchor suggestions about sleep patterns, panic programs, phobias, health healing programs and health problems programs, pain control and pain programs, motivation programs, a suicide program called “hypnosleep”, an insanity program, and countless other uses.

Hypnosis is used to steer a person’s mind in the direction that they have been labeled. For instance, if they have been selected to become a doctor, they will be programmed for success as a doctor. New patterns of thought, feeling and behavior are inserted to build confidence in the goals of the Illuminati.

Positive experiences are used to help boost the person’s feelings, and then the new messages are anchored “imagine these messages taking root. Your new messages are growing stronger and stronger.” The Alice In Wonderland programming theme is used in air-water programs and mirror programs which the Illuminati, the CIA, NASA, the Jesuits and others like so well.

The idea is that there exists a mirror world which is a reversal. Along with it is attached the idea that the slave can enter into a timeless dimension of time, or as some refer to it “interdimensional time travel.”

Later, the victim will be further brought under the spell of this mirror programming by going to locations around the nation, like the Magic Time Machine restaurants in San Antonio and Dallas, TX where mirrors are placed on doors, ceilings, walls, and restrooms of the establishment and programming themes are part of the everything at these restaurants. The handler may tell the slave, “LOSE YOURSELF IN THE INFINITY MIRRORS.”

When hypnotically programming in programs, the Programmers place in many types of images and programs. Some examples would be having the concept of obedience equal the fountain of youth. The fountain of youth flows in the victim’s mind unless they step out side of their orders. This can be linked to the Shangri-la story, where a woman ages as soon as she leaves her place in Shangri-la.

Another example, is the hypnotic imagery involving the formation of an island from a volcano. The story is turned into a programming script to allow the System to be radically restructured. This Volcano programming is a System’s turning program. A volcano erupts from deep down, and lava pours into the sea. Mountains are pushing up from deep in the mind. To survive people must cross from the old to the new island on a bridge that naturally forms. Fire births the new territory and destroys the old. The new mountains develop trees which become safe places for the alters to roost upon.

Hypnotically Building in Structures

Later in the book, the art of building structures internally in the mind of the victim will be covered. However, since the process involves hypnotism it would be appropriate to discuss briefly how hypnosis can begin to work a tree structure into the mind of the child.

First, the programmer hypnotically suggests that his penis is a growing tree. Later, the programmer might begin,

“You know those big trees in the park that look so big and straight and stretch way up toward the sky? Stand up and be one of those trees. Stand up really straight and tall as tall as you can be, and stretch your arms out toward the sky like branches on that big oak tree. Now those big trees have long, deep roots that keep them from falling over. Feel your feet go down down through the floor, just like roots on the big strong oak tree.”

Final note: there is no way that this book could give every last song or story that has been used for programming, nor was it the intention to do so. We have wanted to point out the popular story lines used, although we have missed some such as the Chronicles of Narnia and Little Red Riding Hood (which is used in several ways along the lines of you think you’re going to Papa’s, or Grandma’s house & you end up with a wolf). Our list left out many programming songs–all the Rolling Stone’s songs, Alabama’s Old Flame, etc.



An Ongoing 9/11 Deception and Behaviorial Modification PSYOPS is a Fact, Not Speculation

Snowden NSA Files“The Art of Deception” training, tools of the trade for the NSA and British intel for attacking whistle-blowers, political opposition, hacktivists and  9/11 “Truthers.”  This protocol pertains to the “Five Eyes” better known as US, Canada, Great Britain, Australia, and New Zealand. Note Slide 8’s inclusion of Western media. (JTRIG is Joint Threat Research Intelligence Group, GCHQ is Government Communications Headquarters)

Chapter 5


Science No. 5


The Skill of Lying, The Art of Deceit

The rule of thumb that the programmers/handlers go by is that they will say anything to get the job done. A CIA handler will tell his agent in the field whatever will work to get the field agent’s cooperation on a mission. There is no height nor breadth nor length to these people’s deception. They have successfully kept some deceptions active for decades, if not for centuries.

The Use of Fiction

The history behind the Wizard of Oz programming is interesting. It suggests that the Wizard of Oz has had an important part in the occult world all along. One of the secrets of the Mystery Religions, especially the Egyptian Isis mystery religion was the ability to use drugs and torture to create multiple personalities. The word Oz is known to have been used by its author as an abbreviation for Osirus. Monarch victims have the “golden penis of Osirus” placed into them.

«- Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 | View All | Next -»

5 thoughts on “Monarch Mind Control Programming

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: