Monarch Mind Control Programming Done By SECRET SOCIETY CRIMINALS Who Are ALL Satanists Terrorizing & Torturing Their Slaves

Comment: The Satanists get away with these crimes b/c our Politicians have sold us all out for the Satanists’ Dollars-big BAGS of money. Also, the Satanists will Drug and set up any politician who doesn’t want to go along with their EVIL PLANS. These Satanists completely control our ‘CHESTER THE MOLESTOR” Presidents.

Alters and Triggers | MONARCH PROGRAMMING

Date: 12th Jun 2020Author: Go ask Alice3 Comments

Trigger warning: The material in this article could be very triggering for survivors of ritual abuse or mind control as it contains graphic descriptions of programming; it is best to check with your therapist before reading material such as this. 

Alters and Triggers | MONARCH PROGRAMMING

Dear God
Please free the monarchs
Save the children living under slavery and those born living under evil…
Please deliver everyone from evil


There are many traumas, which can be carried out, which leave no physical scars, but do leave the child with the deepest emotional and spiritual scars. This is often necessary when programming young children who the outside world will see soon after their programming session. Holding one’s arms out is a simple torture. Tickling and sensory deprivation are two tortures that leave no marks. Burial caskets, some outside and some at inside locations are often used on slaves. That is why many slaves fear being buried alive. The Programmers place all types of creepy insects in the caskets when they bury the person alive.

Another type of sensory deprivation is done by placing the victim in salt water (for buoyancy and weightlessness). Then the victim is fitted with sensitive sensors that shock the person if the victim moves. The shock puts the person back into unconsciousness. The brain is trained to stop all external body movement from the conscious mind. This type of sensory deprivation is used to place in the posthypnotic commands to do something at some future date far into the future.

The program is placed into the mind at the same primal level that the mind uses to tell the heart to beat. One of the “appropriate” tortures is to place a bar between a little girl’s legs, which spreads the girl’s loins for rape. Then the bent spread legs are flapped, while the victim is specifically told she is a “Monarch butterfly”. Many victims have created butterflies in their minds while being raped. The programmers may tell some of their victims that out of caterpillar-worms come beautiful butterflies. While raping the child, the Programmers will describe their sperm fluid as “honey comb”, and will cry out “hallelujah” when they come. It doesn’t take long for the child to realize it has no ability to resist what is being done to it. The will of the child victim is destroyed, and in its place remains a pliable slave.

If the slave doesn’t learn correctly they receive more pain. A fish hook in the vagina is a popular one. Older males have their genitals hurt during additional or reprogramming sessions. They may have to eat the skin taken from their genitals.

Alters and Triggers | MONARCH PROGRAMMING

The mind of the victim is not only divided from itself, but the very process of torture, makes the victim distrustful of humans in general. On top of this distrust, the programmers will layer in programming to isolate the person from healthy relationships, which in turn increases the victim’s feeling of helplessness. They are divided from their own parts (their own self) and the world in general. For instance, the water, cave and sand tortures make the survivor fearful of oceans. The victim may be traumatized by being lowered on ropes or a cage on ropes into the water from a cliff, or may end up being buried alive in sand and watching the tide come in, or simply being totally buried alive in sand and abandoned.

For a while, the Illuminati was big on water torture because they had built into their systems a weakness that water would destroy the clone armies that protected programming, and they needed their slave systems to be fearful of water. Slaves are frequently lowered into black holes, or pits containing the most scariest things possible. This is a frequent trauma, because the victim when left in a dark hole for hours or days without any contact with the world or water & food will develop deep emotional scars & dissociation rather than tale-telling signs of physical abuse. This torture is used essentially on all Monarch slaves.

Some of the traumas are done for specific medical reasons. For instance, the person is starved by only allowing for instance 300 calories per day for say a small woman of 125 lbs. Sugar & proteins are severely limited, so that the brain is starved into submission. Water deprivation, which is taught to parents who raise Monarch slaves, is used from time to time on slaves to raise the brain’s temperature, which happens when the brain swells from lack of water. When the brain gets woozy & overheated it hallucinates and has a hard time remembering events.

If water deprivation is combined with electroshock it makes it harder yet for the victim to remember anything. Heavy exercise along with long periods of little sleep (2-3 hours/day) causes an overproduction of endorphins in the brain and victims begin to robotically respond to commands. This

Alters and Triggers | MONARCH PROGRAMMING

was done to co-author Fritz under the pretense of military “training”. The other author, Cisco, experienced it as part of her mind-control. The brain under such stress may flip its functions from right to left & vice-versa. Hypnosis is easier when a brain is tired.

Most victims remember being suspended upside down. Mengele honed this to a fine art with concentration camp victims, while records were made of how fast blood drained from a child or adult’s stomach when they were dunked upside down into a tank of ice-cold water. The coldwater tests supplied the data on temperature levels as consciousness faded. This information then was used later on in America to help the survival rate of children given the same trauma. Simply hanging a person upside down for one or two hours will begin to play tricks on the mind.

The mind will begin to dissociate, and will begin to reverse the primordial brain functions such as pain is pleasure. The person’s mind rearranges. This is often done with Beta alters or Beta models to get them to think that the pain of sadistic rape is a pleasure. After this reversal in the mind that “PAIN IS LOVE”, the S&M kitten alters will beg their handler to slap them, tie them up, hurt them, etc. They will tease their handler, and tell him he is not a real man if he shows any mercy in how the pain is inflicted.

Fire/burning torture is used in the porcelain face programming. The charismatic branch of the satanic Network (such as the Assembly of God churches) uses porcelain face programming. This is done by using wax masks upon the victim, and giving them fire torture. The person actually thinks that their face has melted. At that point, the programmer pretends to be a god & a hero, and tells the person he will give them a new face, a porcelain mask. These new faces by the way, look like the ones sold in so many stores. The memories of abuse are then hypnotically hid behind the masks. To take off the masks is to abreact & burn again. If anyone touches the faces of alters with porcelain face programming, the alters will feel a burning sensation because their masks are not to be tampered with. This means that these alters have via torture & hypnosis lost their own faces! This is part of the dehumanization process which chapter 10 part C talks about

Alters and Triggers | MONARCH PROGRAMMING

As long as these alters stay in denial of what has happened to them, they do not have to face the burn torture memories. Some alters are tortured in a fashion that the eye area is traumatized and they squint the left eye. They look like Baron Guy de Rothschild of France’s left eye looks.
The ritual aspect of trauma needs to be covered. By traumatizing someone on a specific day–say, repeatedly traumatizing them on their birthday–is far more damaging than just simply traumatizing them. The reason is that every time that person’s birthdate recycles they are put back into their memories of abuse.

Sexual abuse of a child is more powerful when it is put into the context of demonic magic. The abuser’s semen is magic and seals the programming. The ritual aspect of it, and the repetitive nature of the abuse creates several dynamics that accompany the abuse that wouldn’t occur in nonritual abuse. The lie that accompanies such abuse is that this institutionalized abuse is an obligation for both the abuser and the victim. For instance, the mind-control of the Beast Barracks experience at West Point, USMA is an institutionalized abuse that allows the abuser to side step responsibility for sadistic behavior, and sets the stage for the abuse to be continued under the disguise of tradition. – Fritz Springmeier

Alters and Triggers | MONARCH PROGRAMMING

Not surprisingly, this programming begins in early childhood:

“All of this said, what is brain wave programming? Simply put, brain wave programming involves having a young child go into a deep trance state, where they then learn to dissociate into a certain brain wave pattern. This is a complex skill, and not all children can achieve this. The goal is for the child to reach, for example, a consistent delta state, where delta brain waves show up on the EEG, which is attached to the child’s head by electrodes in the scalp. Usually, two or even three trainers will work on one child during the initial stages. One will “prep” the child, using a hypnotic drug to induce a trance state. They will have also placed the electrodes on the head, using an abbreviated version of the method used in traditional hospital setting. If delta state is being induced, only the electrodes needed to pick up delta waves will be placed, for example. This is to save time.”

Why would a family subject its own children to this type of abuse? I believe it has more to do with the profit motive (contract mercenaries are very profitable) and achieving higher recognition within the Cult.

“The prepped child will be on a “trainer’s table”, and will be quite relaxed. The average child is about eight years old when this is begun, since the cerebral cortex and neurological development are not advanced enough at earlier ages (It has been tried at earlier ages, quite unsuccessfully, in the past; this practice was dropped because of the neurological damage and “failure to take rate” that trainers were seeing). The non prepping trainer will then let the child know exactly what he/she expects: that they will achieve a special state, called “delta state”. The trainer tells the child, while they are in trance state, that they will know when they reach it, by the readings from the electrodes.”…

When the prepping or technical trainer sees delta waveforms, he or she will signal the verbal trainer with a hand motion. The verbal, or teaching trainer will immediately reward the child, saying, “good, you are in delta now.” The trainer will caress the child, tell it what a good job it is doing. If the child bounces out of delta state, the verbal trainer will immediately become harsh, and will shock the child

Alters and Triggers | MONARCH PROGRAMMING

as punishment. The child is told that it left delta (which is “good”) and needs to go back in.”….

The trainers will now have a template that stays always in delta state, that they can begin splitting and using as the basis of forming a new system inside. They will do this using the tools of drugs, hypnosis and trauma. The new system created will record delta waves on an EEG if done correctly.

The new system will be taught what delta means. The trainers will often flash a cue, or delta (triangle) symbol on a projector overhead, and “grind in” the delta imprinting. They will wear robes with delta signs on them, and cloth the subject in clothing or robes imprinted with the delta sign. They will teach the alters under hypnosis what deltas do, how they act.

They will reward them when they comply, and shock or otherwise traumatize them if they do not act like “deltas”. They will be given delta jobs. They will watch high frequency films, that show delta functions. They may build in a computer like structure to hold the system, showing pictures of its organization while the subject is under deep trance, after creating a clean slate through trauma.

This early programming is in harmony with the Illuminati adherence to the principals espoused in Plato’s Republic, where the “Philosopher Kings” decide a child’s vocation at birth or shortly thereafter, based on lineage, physical attributes and mental complexity.

“Plato’s Republic” is ruled by the Philosopher Kings; the Military Ruling Class and the Merchant Class, and this is the Illuminati hierarchy as well. So, Delta programming is the primary programming for the Military Ruling Class.

” Often, delta state may be configured inside as a computer, and the delta alters will have emotionless, flat alters with photographic memories. They may hold most of the cognitive memories for the other systems, especially if extensive amnesia programming has been done. Delta state may have up to three levels of training: delta 1, delta 2, and delta 3 which will also correlate to security access allowed within the cult; i.e. access to highly confidential information. Behavioral sciences programming may be

Alters and Triggers | MONARCH PROGRAMMING

held by this system. Internal programmers, self destruct, psychotic, and shatter programming as well as other punishment programming sequences to prevent outside access or internal access to the systems may be held within delta systems. It may be color coded both orange/blue/purple, and will also often be the entry way to higher systems such as jewels or internal councils, inside.”

Alter personalities are created for specific tasks within the Illuminati system. Photographic memories are created through “trauma and disassociation”.

These “Alters” are then programmed as intelligence assets (spies); assassins; military strategists; combat soldiers; martial arts experts; weapons experts etc. For example:

“One man who is being looked up to by many American Patriots and Christian Patriots as the leader to help them oppose the New World Order is Bo Gritz. He was a recent presidential candidate. Bo Gritz was a Green Beret and a Delta Force commander. Bo Gritz is very proud of the fact that he wrote the manual for the Delta Forces. He also worked for the CIA. Bo Gritz is one of the military’s best programmed multiples, and perhaps one of the most dangerous. Insiders have told me he IS the most dangerous. Numerous insiders both for and against Bo, have talked about Bo Gritz, and that he is a programmed multiple.”

Through Bo Gritz, the Illuminati have redefined, discredited and subverted the Patriot movement in the United States:

“According to Bo Gritz’s campaign literature for President he was a commander in Delta Forces. Reproduced on a previous page is Bo’s own presidential campaign literature where he states that he is ‘Intelligence Officer & Reconnaissance Chief, Delta Force.’ He is also ‘Chief, Special Activities, U.S. Army General Staff, the Pentagon’ and ‘Principle Agent, National Security Council, Intelligence Support Activity’. Under qualifications Bo states that he is a ‘Security & Counter-terrorist Specialist.’ Within the government, they are already referring to Christians who are against the NWO as terrorists.

Alters and Triggers | MONARCH PROGRAMMING

Bo is their greatest counter-intelligence counter-terrorist they have. He came in like a storm and took control of the Patriot movement, and it has been like pulling teeth to warn patriots about who he is.” (source)…

Bo Gritz himself was a Green Beret, and was used to assassinate 300 people. His blood lust caused him at one point during the Vietnam War to shoot 30 prisoners in cold blood. (ibid)

In my next article I will focus on the Illuminati’s orchestrated destruction of the Patriot movement in the United States through their appointed leader, Bo Gritz.

Alters and Triggers | MONARCH PROGRAMMING

Amidst the subtle cerebral circumvention of the gullible populace, through a multitude of manipulated mediums, lies one of the most diabolical atrocities perpetrated upon a segment of the human race; a form of systematic mind control which has permeated every aspect of society for almost fifty years.

To objectively ascertain the following, one may need to re-examine preconceived ideologies relating to the dualistic nature of mankind.

Resolving the philosophical question of whether we are inherently good or inherently evil is tantamount in shaping our perception of reality; specifically, the spiritual variable within the equation of life.

This exposition is substantiated by declassified U.S. government documents, individuals formerly connected to the U.S. intelligence communities, historical writings, researchers knowledgeable in mind control, publications from mental health practitioners, and interviews taken from survivors unwittingly subjected to a highly complex form of trauma-based mind control known as MONARCH programming.

A word of caution for survivors of intensively systematic mind control and/or some form of ritualized abuse: There are numerous “triggers” in this article.

It is therefore recommended not to read it unless appropriate support systems are in place or if you have a thoroughly reintegrated personality.

A Brief History of Control

The Mystery Religions of ancient Egypt, Greece, India and Babylon helped lay the foundation for occultism, meaning “hidden knowledge.”

One of the earliest writings giving reference to occultism is the Egyptian Book of the Dead, a compilation of rituals explicitly describing methods of torture and intimidation (to create trauma), the

Alters and Triggers | MONARCH PROGRAMMING

use of potions (drugs) and the casting of spells (hypnotism), ultimately resulting in the total enslavement of the initiate.[1]

These have been the main ingredients for a part of occultism known as Satanism, throughout the ages.

During the 13th Century, the Roman Catholic church increased and solidified its dominion throughout Europe with the infamous Inquisition. Satanism survived this period of persecution, deeply entrenching itself under the veil of various esoteric groups.

In 1776, a Bavarian Jesuit by the name of Adam Weishaupt was commissioned by the House of Rothschild to centralize the power base of the Mystery Religions into what is commonly known as the Illuminati, meaning “Enlightened Ones.” This was an amalgamation of powerful occultic bloodlines, elite secret societies and influential Masonic fraternities, with the desire to construct the framework for a “New World Order.”

The outward goal of this Utopia was to bring forth universal happiness to the human race. However, their underlying intention was to gradually increase control over the masses, thus becoming masters of the planet.

The Anglo Alliance

By the 19th century, Great Britain and Germany were recognized as the primary geographic areas of Illuminati control.

Alters and Triggers | MONARCH PROGRAMMING

It then should be of little surprise to know the first work in Behavioral Science research was established in England in 1882, while much of the early medical and psychiatric techniques involved in mind control were pioneered at the Kaiser Wilhelm Institute in Germany.

The Tavistock Institute of Human Relations was set up in London in 1921 to study the “breaking point” of humans. Kurt Lewin, a German psychologist, became the director of the Tavistock Institute in 1932, about the same time Nazi Germany was increasing its research into neuropsychology, parapsychology and multi-generational occultism.

Interestingly, a progressive exchange of scientific ideas was taking place between England and Germany, most notably in the field of eugenics: the movement devoted to “improving” the human species through the control of hereditary factors in mating. The nefariously enigmatic union between the two countries was bonded, partly through the Order of the Golden Dawn, a secret society which consisted of many high ranking officials in the Nazi party and British aristocracy.

Top SS Nazi officer Heinrich Himmler, was in charge of a scientific project called Lebersborn, which included selective breeding and adoption of children, a peculiarly large number of twins among them.[2]

The purpose of the program was to create a super-race (Aryans) who would have total allegiance to the cause of the Third Reich (New World Order).

Much of the preliminary experimentation concerning genetic engineering and behavior modification was conducted by Dr. Josef Mengele at Auschwitz, where he coldly analyzed the effects of trauma-bonding, eye-coloring and “twinning” upon his victims. Besides the insidious surgical experimentation performed at the concentration camp, some of the children were subjected to massive amounts of electroshock.

Sadly, many of them did not survive the brutality. Concurrently, “brain-washing” was carried out on

Alters and Triggers | MONARCH PROGRAMMING

inmates at Dachau, who were placed under hypnosis and given the hallucinogenic drug mescaline. During the war, parallel behavioral research was led by Dr. George Estabrooks of Colgate University. His involvement with the Army, CID, FBI and other agencies remains shrouded in secrecy. However, Estabrooks would occasionally “slip” and discuss his work involving the creation of hypno-programmed couriers and hypnotically-induced split personalities.[3]

After WWII, the U.S. Department of Defense secretly imported many of the top German Nazi and Italian Fascist scientists and spies into the United States via South America and the Vatican. The code name for this operation was Project PAPERCLIP.[4]

One of the more prominent finds for the U.S. was German General Reinhard Gehlen.

Hitler’s Chief of Intelligence against Russia. Upon arriving in Washington D.C. in 1945, Gehlen met extensively with President Truman, General William “Wild Bill” Donovan, Director of the Office of Strategic Services (OSS) and Allen Dulles, who would later become the stalwart head of the CIA. The objective of their brain-storming sessions was to reorganize the nominal American intelligence operation, transforming it into a highly-efficient covert organization. The culmination of their efforts produced the Central Intelligence Group in 1946, renamed the Central Intelligence Agency (CIA) in 1947.

Reinhard Gehlen also had profound influence in helping to create the National Security Council, from which the National Security Act of 1947 was derived.

This particular piece of legislation was implemented to protect an unconscionable number of illegal government activities, including clandestine mind control programs.

The Evolution of Project MKULTRA

With the CIA and National Security Council firmly established, the first in a series of covert brain-

Alters and Triggers | MONARCH PROGRAMMING

With the CIA and National Security Council firmly established, the first in a series of covert brain-washing programs was initiated by the Navy in the fall of 1947.

Project CHATTER was developed in response to the Soviet’s “successes” through the use of “truth drugs.” This rationale, however was simply a cover story if the program were to be exposed. The research focused on the identification and testing of such drugs for use in interrogations and the recruitment of agents.[5]

The project was officially terminated in 1953.

The CIA decided to expand their efforts in the area of behavior modification, with the advent of Project BLUEBIRD, approved by director Allen Dulles in 1950.

Its objectives were to:

(1) discover a means of conditioning personnel to prevent unauthorized extraction of information from them by known means
(2) investigate the possibility of control of an individual by application of special interrogation techniques
(3) investigate memory enhancement
(4) establish defensive means for preventing hostile control of agency personnel

In August 1951, Project BLUE BIRD was renamed Project ARTICHOKE, which evaluated offensive uses of interrogation techniques, including hypnosis and drugs.

The program ceased in 1956. Three years prior to the halt of Project ARTICHOKE, Project MK-ULTRA came into existence on April 13, 1953 along the lines proposed by Richard Helms, Deputy Director of Central Intelligence (DDCI) with the rationale of establishing a “special funding mechanism of extreme sensitivity.”

Alters and Triggers | MONARCH PROGRAMMING

The hypothetical etymology of “MK” may possibly stand for “Mind Kontrolle.” The obvious translation of the German word “Kontrolle” into English is “control.”[7]

A host of German doctors, procured from the post war Nazi talent pool, were an invaluable asset toward the development of MKULTRA. The correlation between the concentration camp experiments and the numerous sub-projects of MKULTRA are clearly evident.

The various avenues used to control human behavior under MKULTRA included:

radiation
electroshock
psychology
psychiatry
sociology
anthropology
graphology
harassment substances
paramilitary devices
materials “LSD” being the most widely dispensed “material”

A special procedure, designated MKDELTA, was established to govern the use of MKULTRA abroad. MKULTRA/DELTA materials were used for harassment, discrediting or disabling purposes.[8]

There were 149 subprojects listed under the umbrella of MKULTRA. Project MONARCH has not been officially identified by any government documentation as one of the corresponding subprojects, but is used rather, as a descriptive “catch phrase” by survivors, therapists, and possible “insiders”.

MONARCH may in fact, have culminated from MKSEARCH subprojects such as operation

Alters and Triggers | MONARCH PROGRAMMING

SPELLBINDER, which was set up to create “sleeper” assassins (ie. “Manchurian candidates”) who could be activated upon receiving a key word or phrase while in a post-hypnotic trance.

Operation OFTEN, a study which attempted to harness the power of occultic forces was possibly one of several cover programs to hide the insidious reality of Project MONARCH.

Definition and Description

The name MONARCH is not necessarily defined within the context of royal nobility, but rather refers to the monarch butterfly.

When a person is undergoing trauma induced by electroshock, a feeling of light-headedness is evidenced; as if one is floating or fluttering like a butterfly. There is also a symbolic representation pertaining to the transformation or metamorphosis of this beautiful insect: from a caterpillar to a cocoon (dormancy, inactivity), to a butterfly (new creation) which will return to its point of origin. Such is the migratory pattern that makes this species unique.

Occultic symbolism may give additional insight into the true meaning Psyche is the word for both “soul” and “butterfly” coming from the belief that human souls become butterflies while searching for a new reincarnation. [9]

Some ancient mystical groups, such as the Gnostics, saw the butterfly as a symbol of corrupt flesh. The “Angel of Death” (remember Mengele?) in Gnostic art was portrayed crushing the butterfly.[10]

A marionette is a puppet that is attached to strings and is controlled by the puppet master, hence MONARCH programming is also referred to as the “Marionette Syndrome.” “Imperial Conditioning” is another term used, while some mental health therapists know it as “Conditioned Stimulus Response Sequences.”

Alters and Triggers | MONARCH PROGRAMMING

Project MONARCH could be best described as a form of structured dissociation and occultic integration, in order to compartmentalize the mind into multiple personalities within a systematic framework. During this process, a Satanic ritual, usually including Cabalistic mysticism, is performed with the purpose of attaching a particular demon or group of demons to the corresponding alter(s).

Of course, most skeptics would view this as simply a means to enhance trauma within the victim negating any irrational belief that demonic possession actually occurs.

Alters and Triggers

Another way of examining this convoluted victimization of body and soul is by looking at it as a complex computer program: A file (alter) is created through trauma, repetition and reinforcement. In order to activate (trigger) the file, a specific access code or password (cue or command) is required.

The victim/survivor is called a “slave” by the programmer/handler, who in turn is perceived as “master” or “god.” About 75% are female, since they possess a higher tolerance for pain and tend to dissociate easier than males. Subjects are used mainly for cover operations, prostitution and pornography; involvement in the entertainment industry is notable.

A former military officer connected to the DIA, told this writer, “In the ’big picture’ these people [MONARCH victims] are in all walks of life, from the bum on the street to the white-collar guy”. In corroboration, a retired CIA agent vaguely discussed the use of such personnel to be used as “plants” or “chameleons” for the purpose of infiltrating a designated group, gathering information and/or injecting an ulterior agenda.

There are an inordinate amount of alters in the victim/survivor with numerous back-up programs, mirrors and shadows. A division of light-side (good) and dark-side (bad) alters are interwoven in the mind and rotate on an axis. One of the main internal structures, (of which their are many) within the

Alters and Triggers | MONARCH PROGRAMMING

system is shaped like a double-helix, consisting of seven levels. Each system has an internal programmer which oversees the “gatekeeper” (demons?) who grant or deny entry into the different rooms.

A few of the internal images predominately seen by victims/survivors are:

trees
the Cabalistic “Tree of Life,” with adjoining root systems
infinity loops
ancient symbols and letters
spider webs
mirrors or glass shattering
masks
castles
mazes
demons/monsters/aliens
sea shells
butterflies
snakes
ribbons
bows
flowers
hour glasses
clocks
robots
chain-of-command diagrams
schematics of computer circuitry boards

Alters and Triggers | MONARCH PROGRAMMING

Bloodlines and Twinning

A majority of the victims/survivors come from multi-generational Satanic families (bloodlines) and are ostensibly programmed “to fill their destiny as the chosen ones or chosen generations” (a term coined by Mengele at Auschwitz).

Some are adopted out to families of similar origin. Others used in this neurological nightmare are deemed as he “expendable ones” (non-bloodliners), usually coming from orphanages, foster care homes, or incestuous families with a long history of pedophilia.

There also appears to be a pattern of family members affiliated with government or military intelligence agencies.

Many of the abused come from families who use Catholicism, Mormonism, or charismatic Christianity as a “front” for their abominable activities (though members of other religious groups are also involved.) Victims/survivors generally respond more readily to a rigid religious (dogmatic, legalistic) hierarchical structure because it parallels their base programming. Authority usually goes unchallenged, as their will has been usurped through subjective and command-oriented conditioning.

Physical identification characteristics on victims/survivors often include multiple electrical prod scars and/or resultant moles on their skin. A few may have had various parts of their bodies mutilated by knives, branding irons, or needles, Butterfly or occult tattoos are also common. Generally, bloodliners are less likely to have the subsequent markings, as their skin is to “remain pure and unblemished.”

The ultimate purpose of the sophisticated manipulation of these individuals may sound unrealistic, depending upon our interpretive understanding of the physical and spiritual realms. The deepest and darkest alters within bloodliners are purported to be dormant until the “Anti-Christ” is revealed.

These “New World Order” alters supposedly contain call-back orders and instructions to train and/or initiate a large influx of people (possibly clones or “soulless ones”), thereby stimulating social control

Alters and Triggers | MONARCH PROGRAMMING

These “New World Order” alters supposedly contain call-back orders and instructions to train and/or initiate a large influx of people (possibly clones or “soulless ones”), thereby stimulating social control programs into the new millennium.

Non-biological “twinning” is yet another bizarre feature observed within MONARCH programming.

For instance, two young non related children would be ceremoniously initiated in a magical “soul-bonding” ritual so they might be “inseparably paired for eternity” (possibly another Mengele connection?). They essentially share two halves of the programmed information, making them interdependent upon one another.

Paranormal phenomenon such as astral projection, telepathy, ESP, etc. appear to be more pronounced between those who have undergone this process.

Levels of MONARCH Programming [11]

ALPHA. Regarded as “general” or regular programming within the base control personality; characterized by extremely pronounced memory retention, along with substantially increased physical strength and visual acuity. Alpha programming is accomplished through deliberately subdividing the victims personality which, in essence, causes a left brain-right brain division, allowing for a programmed union of L and R through neuron pathway stimulation.

BETA. Referred to as “sexual” programming. This programming eliminates all learned moral convictions and stimulates the primitive sexual instinct, devoid of inhibitions. “Cat” alters may come out at this level.

DELTA. This is known as “killer” programming, originally developed for training special agents or elite soldiers (i.e. Delta Force, First Earth Battalion, Mossad, etc.) in covert operations. Optimal adrenal output and controlled aggression is evident. Subjects are devoid of fear; very systematic in carrying out their assignment. Self-destruct or suicide instructions are layered in at this level.

Alters and Triggers | MONARCH PROGRAMMING

THETA considered to the “psychic” programming. Bloodliners (those coming from multi-generational Satanic families) were determined to exhibit a greater propensity for having telepathic abilities than did non-bloodliners. Due to its evident limitations, however, various forms of electronic mind control systems were developed and introduced, namely, bio-medical human telemetry devices (brain implants), directed-energy lasers using microwaves and/or electromagnetics. It is reported these are used in conjunction with highly-advanced computers and sophisticated satellite tracking systems.

OMEGA. A “self-destruct” form of programming, also known as “Code Green.” The corresponding behaviors include suicidal tendencies and/or self-mutilation. This program is generally activated when the victim/survivor begins therapy or interrogation and too much memory is being recovered.

GAMMA. Another form of system protection is through “deception” programming, which elicits misinformation and misdirection. This level is intertwined with demonology and tends to regenerate itself at a later time if inappropriately deactivated.

Method and Components

The initial process begins with creating dissociation within the subject, usually occurring from the time of birth to about six years.

This is primarily achieved through the use of electroshock (ECT) and is at times performed even when the child is in the mother’s womb.

Due to the severe trauma induced through ECT, sexual abuse and other methods, the mind splits off into alternate personalities from the core. Formerly referred to as Multiple Personality Disorder, it is presently recognized as Dissociative Identity Disorder and is the basis for MONARCH programming.

Further conditioning of the victim’s mind is enhanced through hypnotism, double-bind coercion, pleasure-pain reversals, food, water, sleep and sensory deprivation, along with various drugs which

Alters and Triggers | MONARCH PROGRAMMING

alter certain cerebral functions.

The next stage is to embed and compress detailed commands or messages within the specified alter.

This is achieved through the use of hi-tech headsets, in conjunction with computer-driven generators which emit inaudible sound waves or harmonics that affect the RNA covering of neuron pathways to the subconscious and unconscious mind.

“Virtual Reality” optical devices are sometimes used simultaneously with the harmonic generators projecting pulsating colored lights, subliminals and split-screen visuals. High voltage electroshock is then used for memory dissolution.

Programming is updated periodically and reinforced through visual, auditory and written mediums. Some of the first programming themes included the Wizard of Oz and Alice and Wonderland, both heavily saturated with occultic symbolism.

Many of the recent Disney movies and cartoons are used in a two-fold manner:

desensitizing the majority of the population, using subliminals and neuro-linguistic programming
deliberately constructing specific triggers and keys for base programming of highly-impressionable MONARCH children.

A prime example of how subliminal programming works is by looking at the recent Disney cinematic sensation Pochahontas, curiously billed as their “33rd” (highest degree in Scottish Rite Freemasonry) animated movie.

In the movie, Grandmother Willow is a mystical 400 year old tree who counsels the motherless Pochahontas to listen to her heart and help her realize all the answers lie within. Grandmother Willow is constantly talking in “double-speak” and using “reversals” (i.e. “Sometimes the right path is not the

Alters and Triggers | MONARCH PROGRAMMING

easiest one”; the esoteric derivative being: the left path [the path that leads to destruction] is the easiest one.

In Illuminati Structured MPD Systems, the willow tree represents the occultic powers of Druidism.

The intrinsic imagery of the tree’s branches, leaves and root systems are very significant, as some of the dark spiritual proper ties associated with the Willow Tree Programming are:

(1) The branches are used to whip victims in rituals for “cleansing” purposes
(2) A willow tree can endure severe weather disturbances (i.e. storms) and is known for it’s pliability or flexibility. Victims/Survivors of the programming describe the willow’s branches wrapping around them, with no hope of escape
(3) The deep root system of the willow tree makes the victim/survivor feel as if they are falling deeper and deeper into an abyss while in a hypnotic trance. [12]
Music plays an instrumental role in programming, through combinations of variable tones, rhythms and words.

Frightmeister Stephen King’s numerous novels and subsequent movies, are purported by credible sources to be used for such villainous purposes. One of his latest books, Insomnia, features a picture of King with the trigger phrase “WE NEVER SLEEP,” (indicative of someone with MPD/ DID) below an all-seeing eye.

A partial list of other mediums used to reinforce base programming are:

Pinnochio
Sleeping Beauty
Snow White
Beauty and the Beast
Aladdin
The Little Mermaid
The Lion King
E. T.
Star Wars
Ghost Busters
Trancers II
Batman
Bewitched
Fantasy Island
Reboot
Tiny Toons
Duck Tails
The Dead Sea Scrolls
The Tall Book of Make Believe

A few movies which depict or portray some aspect of MONARCH programming are Hell raiser 3, Raising Cain, Labyrinth, Telefon, Johnny Mneumonic, Point of No Return, The Lawnmower Man and Closet Land.

Programmers and Places

It’s difficult to figure out who the original programmer of this satanic project was, due to the substantial amount of disinformation and cross-contamination propagated by the “powers that be.”

The two that went by the color-coded name of Dr. Green are a Jewish doctor named Dr. Gruenbaum, who supposedly collaborated with the Nazis during WWII, and Dr. Josef Mengele, whose trademark of cold blooded and calculating brutality has not only scarred the souls of survivors from Auschwitz, but also a countless number of victims throughout the world.

Mengele’s direct involvement at the infamous Auschwitz concentration camp was suspiciously downplayed during the Nuremberg Trials, and consequently no intensified effort by the U.S. and it’s allies was directed toward his capture.[13]

As a means to confuse serious investigators as to his whereabouts, U.S. officials would report Mengele being a non-threatening recluse in Paraguay or Brazil, or that he was simply dead (the “Angel of Death” miraculously must have come back to life at least five different times).

His unprecedented research, at the expense of thousands of lives, undoubtedly was a significant bonus to U.S. interests. Besides using the pseudonym of Dr. Green, survivors knew him as Vaterchen (daddy), Schoner Josef (beautiful Joseph), David and Fairchild. A gracefully handsome man of slight stature, Mengele would disarm people with his gentle demeanor, while at other times, he would explode into violent rages.[14]

Other characteristics remembered by survivors were the cadence of his shiny black boots as he paced back and forth and his “I-love-you/l-love-you-not” daisy game.

When he pulled off the last daisy petal, he would maliciously torture and kill a small child in front of the other child he was programming. Distraught survivors also recalled being thrown naked into cages with monkeys, who were trained to viciously abuse them. Evidently, Mengele enjoyed reducing people to the level of animals. He also would purposely restrain his victims from crying, screaming, or showing any excessive emotion.

Dr. D. Ewen Cameron, also known as Dr. White, was the former head of the Canadian, American and World Psychiatric Associations. Because of Cameron’s extensive experience and credentials, the ClA’s Allen Dulles funneled millions of dollars throughout organizations like the society for the Investigation of Human Ecology, which Cameron ruthlessly presided over.

Experimentations were conducted at several locations in Montreal, mostly at McGill University, St Mary’s Hospital and Allan Memorial Institute.

Besides the conventional methods of psychiatric tyranny, such as electroshock drug injections and lobotomies, Cameron conceived the technique of “psychic driving,” wherein unsuspecting patients were kept in a drug induced coma for several weeks and administered a regimen of electroshocks, while electronic helmets were strapped to their heads and repetitive auditory messages were transmitted at variable speeds.[15]

Many of those exploited were abused children which had been run through the Roman Catholic orphanage system.

Not surprisingly, Dr Cameron has been conveniently left out of most psychiatric journals. This may have been, in fact, largely due to Project MKULTRA being publicly exposed in 1970, through lawsuits filed by Canadian survivors and their families. The CIA and Canadian government settled out of court so as not to be required to officially admit to any wrongdoing.

A former U.S. Army Lt. Col. in the DIA’s psychological Warfare Division, Michael Aquino, is the latest in a line of alleged government-sponsored sadists. Aquino, an eccentric genius obsessed with Nazi pagan rituals, founded the Temple of Set, an offshoot of Anton LaVey’s Church of Satan. Aquino was connected with the Presidio Army Base day care scandal, in which he was accused child molestation.

Much to the dismay of the young victims’ parents, all charges were dismissed. Code-named “Malcolm”, Aquino was reported to have developed training tapes on how to create a MONARCH slave and worked as a liaison between Government/Military Intelligence and various criminal organizations and occult groups in the distribution of MONARCH slaves.[16]

Heinrich Mueller was another important programmer who went under the code names “Dr. Blue” or “Gog.” He apparently has two sons who have carried on the trade. The original “Dr. Black” was apparently Leo Wheeler, the nephew of deceased General Earle G. Wheeler, who was the commander of the Joint Chiefs of Staffs during the Vietnam War.

Wheeler’s protégé, E. Hummel is active in the Northwest, along with W. Bowers (from the Rothschild bloodline).

Other alleged master mind manipulators, past and present, are:

Dr. Sydney Gottleib
Lt. Col John Alexander
Richard Dabney Anderson (USN)
Dr. James Monroe
Dr. John Lilly
Lt. Comdr. Thomas Narut
Dr William Jennings Bryan
Dr. Bernard L. Diamond
Dr. Martin T. Orne
Dr. Louis J. West
Dr Robert J. Lifton
Dr. Harris Isbel
Col. Wilson Green

In order to keep MKULTRA from being easily detected, the CIA segmented its subprojects into specialized fields of research and development at universities, prisons, private laboratories and hospitals. Of course, they were rewarded generously with government grants and miscellaneous funding.

The names and locations of some of the major institutions involved in MONARCH programming experimentation were/are:

Cornell
Duke
Princeton
UCLA
University of Rochester
MIT
Georgetown University Hospital
Maimonides Medical Center
St. Elizabeth’s Hospital (Washington D.C.)
Bell Laboratories
Stanford Research Institute
Westinghouse Friendship Laboratories
General Electric
ARCO
Mankind Research Unlimited

The “final product” was/is usually created on military installations and bases, where maximum security is required. Referred to as (re) programming centers or near-death trauma centers, the most heavily identified are:

China Lake Naval Weapons Center
The Presidio
Ft. Dietrick
Ft. Campbell
Ft. Lewis
Ft. Hood
Redstone Arsenal
Offutt AFB
Patrick AFB
McClellan AFB
MacGill AFB
Kirkland AFB
Nellis AFB
Homestead AFB
Grissom AFB
Maxwell AFB
Tinker AFB

Other places recognized as major programming sites are:

Langley Research Center
Los Alamos National Laboratories
Tavistock Institute
areas in or by Mt. Shasta, CA, Lampe, MO and Las Vegas, NV.

Notable Names

One of the first documented cases of a MONARCH secret agent was that of the voluptuous 1940’s model, Candy Jones. The book, The Control of Candy Jones, (Playboy Press) portrays her 12 years of intrigue and suspense as a spy for the CIA.

Jones, whose birth name is Jessica Wilcox, apparently fit the physiological profile as to be one of the initial experiments or human guinea pigs under the government’s “scientific” project, MKULTRA.

The most publicized case of MONARCH monomania has surfaced through the book TRANCE Formation of America: The True Life Story of a ClA Slave by Cathy O’Brien. On the back cover it emphatically states, “Cathy O’Brien is the only vocal and recovered survivor of the Central Intelligence Agency’s MKULTRA Project Monarch mind control operation” This documented autobiography contains compelling accounts of O’Brien’s years of unrelenting incest and eventual introduction into Project MONARCH by her perverted father.

Along with co-author Mark PhiIlips, her rescuer and deprogrammer, Cathy covers an almost unbelievable array of conspiratorial crime: forced prostitution (white slavery) with those in the upper echelons of world politics, covert assignments as a “drug mule” and courier, and the country-western music industry’s relationship with illegal CIA activities.

Paul Bonacci a courageous survivor who endured almost two decades of degradation under Project MONARCH, has disclosed strong corroborating evidence of widescale crimes and corruption from the municipal/state level all the way up to the White House.[17]

He has testified about sexually-abused males selected from Boy’s Town in Nebraska and taken to nearby Offut AFB, where he says they were subjected to intense MONARCH programming, directed mainly by Commander Bill Plemmons and former Lt. Col. Michael Aquino.[18]

After thoroughly tormenting the young boys into mindless oblivion, they were used (along with girls) for pornography and prostitution with several of the nation’s political and economic power brokers. Bonacci recalled being transported from the Air Force base via cargo planes to McClelland AFB in California. Along with other unfortunate adolescents and teenagers, he was driven to the elite retreat, Bohemian Grove.

The perpetrators took full advantage of these innocent victims, committing unthinkable perversions in order to satisfy their deviant lusts. Some victims were apparently murdered, further traumatizing already terrified and broken children.

An insatiable actress of marginal talent (now deceased), a morally-corrupt T.V. evangelist, a heralded former Green Beret officer and a popular country-western singer are a few others likely having succumbed to MONARCH madness.

Lee Harvey Oswald, Sirhan-Sirhan, Charlie Manson, John Hinckley Jr., Mark Chapman, David Koresh, Tim McVeigh and John Salvi are some notable names of infamy, strongly suspected of being pawns who were spawned by MKULTRA.

Deprogrammers and Exposers

Dr. Corydon Hammond, a Psychologist from the University of Utah, delivered a stunning lecture entitled “Hypnosis in MPD: Ritual Abuse” at the Fourth Annual Eastern Regional Conference on Abuse and Multiple Personality, June 25, 1992 in Alexandria, Virginia.

He essentially confirmed the suspicions of the attentive crowd of mental health professionals, wherein a certain percentage of their clients had undergone mind control programming in an intensively systematic manner.

Hammond alluded to the Nazi connection, military and CIA mind control research, Greek letter and color programming and specifically mentioned the Monarch Project in relation to a form of operative conditioning. Shortly after his ground breaking speech, he received death threats. Not wanting to jeopardize the safety of his family, Dr. Hammond stopped disseminating any follow-up information.

Mark Phillips, a former electronics subcontractor for the Department of Defense, was privy to some of the top secret mind control activities perpetrated by the U.S. government.

His inquisitive demeanor, strong conscience and heart-felt concern for Cathy O’Brien, a “Presidential Model’ under Project MONARCH, prompted him to reveal the inner-workings of this grand deception beginning about 1991. As the story goes, he helped Ms. O’Brien escape from her captors and was able to deprogram her in about a years time in Alaska.

The controversial Phillips has his share of critics who are skeptical of the veracity of his claims.

New Orleans therapist Valerie Wolf introduced two of her patients before the President’s Committee on Human Radiation Experiments on March 15, 1995 in Washington D.C. The astonishing testimony made by these two brave women included accounts of German doctors, torture, drugs, electroshock, hypnosis and rape, besides being exposed to an undetermined amount of radiation. Both Wolf and her patients stated they recovered the memories of this CIA program without regression or hypnosis techniques.[19]

Wolf presently devotes much of her time to counseling such survivors.

A former labor attorney for Atlantic Richfield Co., David E. Rosenbaum, conducted a nine. year investigation (1983-1992) concerning allegations of physical torture and coercive conditioning of numerous employees at an ARCO plant in Monaca, PA.[20]

His clients, Jerry L. Dotey and Ann White, were victims of apparent radiation exposure; but as Mr. Rosenbaum probed deeper in the subsequent interview sessions, a “Pandora’s Box” was unveiled.

His most astonishing conclusion was that Jerry Dotey and Ann White were likely the off-spring of Adolf Hitler, based in part on the uncanny resemblance from photos (facial features; bone structure and size were taken into consideration).

Rosenbaum also states, “They both exhibit feelings and experiences that indicate they are twins.”
Dotey and White were allegedly subjected to torture of many kinds while under drug induced hypnosis, with each one undergoing at least three training techniques by plant physicians.

Each victim was trained to enter into a hypnotic state upon the occurrence of specific stimuli, usually involving a “cue” word or phrase and trained to “remember to forget” what transpired in the hypnotic state. They were repeatedly subjected to identical stimulus-response sequence, to produce nearly automatic reactions to the particular status.

MKULTRA veteran, Dr. Bernard Diamond, Dr. Martin Orne and Dr. Josef Mengele regularly visited the ARCO plant, according to Rosenbaum. The special conditioning of Dotey and White was intended for the artificial creation of dual German personalities. Rosenbaum, who is Jewish, has maintained a deep friendship with the two, despite the seemingly precarious circumstances.

Other renowned therapists involved in deprogramming are Cynthia Byrtus, Pamela Monday, Steve Ogilvie, Bennett Braun, Jerry Mungadze and Colin Ross. Some Christian counselors have been able to eliminate parts of the programming with limited success.

Journalists who have recently expounded on the subject matter in exemplary fashion are Walter Bowart, Operation Mind Control, Jon Rappoport, U.S. Government Mind-Control Experiments on Children and Alex Constantine, Psychic Dictatorship In The USA.

Conclusion

The most incriminating statement to date made by a government official as to the possible existence of Project MONARCH was extracted by Anton Chaitkin, a writer for the publication, The New Federalist.

When former CIA Director William Colby was asked directly, “What about monarch?” he replied angrily and ambiguously, “We stopped that between the late 1960’s and the early 1970’s.” Suffice to say that society, in its apparent state of cognitive dissonance, is generally in denial of the over whelming evidence of this multifarious conspiracy.

Numerous victims/ survivors of Project MONARCH are in desperate need of help. However, the great majority of people are too preoccupied with themselves to show any genuine compassion toward these severely wounded individuals. Apathy has taken over the minds of the masses, who choose to exist within the comforts of this world.

Reality has thus become obscured by relativism and selfishness.

Related Reports:

The Montauk Project and Camp Hero Today
Interview with Ex Illuminati Programmer

Endnotes

1. David L. Carrico, The Egyptian Masonic Satanic Connection, 1992
2. Walter H. Bowart, Operation Mind Control, Flatland Editions, 1994, p. 216
3. Martin Cannon, Mind Control and the American Government, Prevailing Winds Research, 1994, p. 19
4. Linda Hunt, Secret Agenda, St. Martin’s Press, 1991
5. Final Report of the Select Committee to Study Governmental Operations, U.S. Senate, April 1976, p. 337
6. Ibid, p. 390
7. John Marks, The Search For The Manchurian Candidate, Times Books, 1979, pp 60-61
8. Final Report of the Select Committee to Study Governmental Operations, U.S. Senate, April 1976, p. 391
9. Barbara G. Walker, The Woman’s Dictionary of Symbols and Sacred Objects, Harper Collins, 1988
10. Marshall Cavendish, Man, Myth and Magic, 1995
11. Dr. Corydon Hammond, The Greenbaum Speech, 1992; Mark Phillips and Cathy O’Brien, Project Monarch Programming Definitions, 1993
12. Fritz Springmeier, The Illuminati Formula Used To Create An Undetectable Total Mind Controlled Slave, 1996
13. Gerald L. Posner, Mengele: The Complete Story, McGraw-Hill, 1986
14. Lucette Matalon Lagnado, Dr. Josef Mengele and the Untold Story of the Twins of Auschwitz, Morrow, 1991
15. Gordon Thomas, Journey into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, Bantam Books, 1989
16. Cathy O’Brien and Mark Phillips, Trance Formation of America, 1995
17. John DeCamp, The Franklin Cover-Up, Child Abuse, Satanism and Murder in Nebraska, AWT Inc, 1992
18. Anton Chaitkin, “Franklin Witnesses Implicate FBI and U.S. Elites in Torture and Murder of Children”, The New Federalist, 1993
19. Jon Rappoport, “CIA Experiments with Mind Control on Children”, Perceptions Magazine, September/October 1995, p. 56
20. David E. Rosenbaum, Esq., First Draft Overview of Investigation of the Group, 1983-1993


The following are favorite code words that have been used to program slaves with:

CHARLOTTE, CHECKMATE, CHRISTMAS, CLARA, CLOVERLEAF, COURIER, CRAYON, CRYSTAL, DAISY, DAVY, DELLA, DELTA, DEMON, DIANA, DINAH, DIRTY, DIME, DOT, DOVE, DRAGON, DUCK, DUMBO, EAGLE, EASY, ECHO, ELAINE, ELEPHANT, ELLEN, EMERALD, EMPIRE, ESTER, EUREKA, EVERGREEN, FAITH, FALCON, FARMER, FELIX, FIREFLY, FIVE BROTHERS, FIVE SISTERS, FLASHLIGHT, FLOSSY, FLYING + [other word], FOX, FREEZE, FRIENDSHIP, FULL HOUSE, GALAHAD, GAMMA, GARGOYLE, GEMINI, GEORGE, GIPSY, GOLEM, GOLDEN + [other word], GOOSE, GRACE, GRANNY, GREEN DIAMOND, GULL, GWEN, HADES, HALF-MOON, HAMMER, HARRIET, HAWK, HAZEL, HELENE, HELIOS, HEN, HERMES, HIGH BALL, HIGH CARD, HOLE-IN-THE-WALL, HOPE, HOPI, HOUNDDOG, HOURGLASS, HUSThER, HYDRA, ICEBERG, IDA, IMP, INCUBUS, INSECT, IRIS, IROQUOIS, ITEM, JACKASS, JAGUAR, JANET, JANICE, JASON, JASPER, JAVELIN, JENNY, JEZEBEL, JIG, JULIET, JOAN, JOSHUA, JUDY, JUPITER, KANGAROO, KANSAS, KATY, KING, KILO, KITTY, KOMET, LACE, LADY + [other word], LAMP, LAURA, LEAP FROG, LEOPARD, LIGHTNING, LILY, LION, LITTLE + [other word], LOVE, LUCKY + [other word], MAE WEST, MAGIC, MAJESTIC, MAMIE, MANDREL, MARIE, MARK, MARTHA, MAX, MEADOWS, MERCURY, MIGHTY MOUSE, MILLION DOLLAR, MINNIE MOUSE, MONA LISA, MONTE CARLO, MOTHER, MUMMY, NANCY, NAOMI, NAVAJO, NIMROD, NOAH, NORA, NUTCRACKER, OBOE, OCTOPUS, OLD FAITHFUL, OLIVE, OPAL, OPHELIA, ORION, OSCAR, OWL, OZMA, PACKAGE, PAMELA, PANDORA, PANTHER, PAPERCLIP, PAPA, PAT, PATSY, PEGASUS, PENTHOUSE, PHANTOM, PHOENIX, PINECONE, PISTOL PETE, PLATO, PLUTO, POLLY, PYTHON, QUAIL, QUEBEC, QUEEN, QUEEN BEE, QUEENIE, QUEST, QUICK SILVER, RACHEL, RAINBOW, RAM, RANGER, RASCAL, RAT, RAVEN, REBECCA, RED DIAMOND, RED HILL, RENO, REX, RHUBARB, RITA, ROBOT, ROMEO, ROOSTER, ROSIE, ROVER, RUBY, RUTH, SABRE, SAINT, SAINT + [another word], SALLY, SAN ANTONIO, SAPPHIRE, SARAH, SATURN, SCAMPER, SCOUT, SEA GULL, SEAL, SERGEANT, SERGEANT-DELTA, SHADOW, SHARK, SHENANDOAH, SHO, SICKLE, SIGMA, SILVER, SNOW + (other word), ZEBRA, ZENITH, ZERO, ZYPPER, ZOMBIE, ZULU, ZUNI.”

The word FOX is an example of a significant occult code word. F-o-x consists of the 6th, 15th (1+5), & the 24th (2+ 4) letters of the alphabet, which yield 666. The reader needs to bear several things in mind. First, the programmers generally have intelligent, well sounding codes, that do form patterns. For instance, a woman’s name from the Bible will be used as a code, with subparts or subcodes having other female names from the Bible. Deeper Illuminati parts will have goddess and god names, and king and queen names for cult alters. These are the names the handler or cult uses–NOT their access codes. The codes for slaves follow patterns. There are standard and unique codes. The internal programming alters have the power to change codes if they need to protect the programming.

They will have to hypnotically work with alters when they trance out at night. In other words, most of their programming of front alters will be done when a System lies down for “sleep”–more accurately described as “for trance.” If the internal alters change many codes, in their efforts to protect the system, they will even make it difficult for the handler/programmer to get into the system. Ciphers developed rotors that require lines to line up. Some simple schemes using this principle appear in some Monarch systems. This is part of the science of structuring. Intelligence codes often come from the Bible or popular fiction books. The deeper codes are occult words, often in foreign languages such as Arabic, which is an important language in the upper occult world. Slaves will be given COVER NAMES for ops, and often males receive female names and vice versa. Very shortly, we will provide the Monarch hypnotic cues (codes) for the multitude of functions that a Monarch’s mind must carry out. The type of programming which is placed in a slave varies. For intelligence operations the slave will have to have BONA FIDES, which are codes to allow two people to meet. All slaves are given CONTROL SIGNS which allow them to indicate via a code that they are in trouble.

A RECOGNITION signal allows two people to make contact. For instance, the handler might fly his distinctive sounding plane over a slave’s house in a pre-arranged signal. It might also be a particular colored scarf, and a particular set of phrases. A GO-AWAY code is a prearranged signal that means it is unwise to make contact. The go-away signal may be simply placing one’s hands in one’s pocket or turning the porch lights off. A “GO TO GROUND” signal means to go into hiding. A MAYDAY BOOK exists for Illuminati and Intelligence slaves which allows them to call if they are about to be arrested. A telephone number is left open for just this purpose. Also common universal Illuminati codes can be used by the slave to get set free from police and judges. Within the Jehovah’s Witnesses, especially their headquarters, the Illuminati uses Enochian language to program with. With Druidic branches Druidic symbols are used. With the Jewish groups, Hebrew is used. Other languages are also used. An Illuminati System can easily have 6 different languages used as programming codes. The foreign language codes will be for small parts of the System only. Special artificial languages are also employed, as well as sign language.

MONARCH MIND-CONTROL CODES

contents:

A. ALPHA (basic)B. BETA (sexual)C. CHI (return to cult)D. DELTA (assassination)E. EPSILON (animal alters)F. OMEGA (internal computers)G. GAMMA (demonology)H. HYPNOTIC INDUCTIONSI. JANUS-ALEX CALL BACKS (end-times)J. THETA (psychic warfare)K. TINKERBELLE (never grow up/alien)L. TWINNING (teams)M. SOLEMETRIC MILITARYN. SONGS (reminders)0. ZETA (snuff films)P. Sample alter system codesQ. Catholic programmingR. MENSA programmingS. HAND SIGNALST. Programming site codes (used for slave model codes, etc.)

A. ALPHA (basic)

Basic Commands (these basic commands are also found used in many slaves, although there will be exceptions to everything.)

“GET ON YOUR TOES. STAY ON YOUR TOES.” means “attention slave” get ready for a command.“ON YOUR TOES” — is a preparatory command that will be used throughout an entire system.“IF YOU PLEASE SIR” — From Wizard of Oz, slave says this like “yes, sir.”

3-tap code for access

“FOLLOW THE SNAPS”, “LISTEN AND OBEY OUR COMMANDS”, “THIS IS FOR YOUR OWN GOOD”“FIDDLER” = code to take one to Never Never Land“PUPPET MASTER” -name of master for Marionette or Puppet program “DADDY” -master “DADDY’S FRIEND” — a user of slave approved by master “PAPA” – master, “WHITE RABBIT — master“YOU’LL SPEAK MY WORDS WHEN I PULL YOUR STRINGS.” Puppet programming control of what slave will say.“SPILL IT” — trigger command ordering slave to speak“SILENCE” — order means keep quiet

Mr. Rogers Neighborhood’s “Land of Make Believe” was used for the programming code script:

“I AM MR. ROGERSAND I HAVE PUPPETS, TOOI PULL ALL THE STRINGSAND I PULL STRINGS ON YOU.”

Twinkling (twitching) of the nose — Bewitched programming to cast spell or order on slave.

“(name of alter), YOU WILL COME FORTH AND OBEY.” or “…OBEY AND COME FORTH.” Another basic way of getting an alter would be simply to spin the person and call out the alter’s name, or to snap the fingers and call out the name of a front alter.

Access is accomplished for a number of Illuminati slaves by a message via phone or letter, then a looking glass person takes the system to a location outside of the house, maybe simply to the sidewalk, there the person is picked up. The left hand is then grasp on the soft part of the hand between the thumb and forefinger by two fingers very tightly. This pulls up and alter with an egg in its lap. The egg is then opened via a code and the imps inside the egg to communicate to the ribbons and the computer.

Access phone calls to slaves may have high-speed codes transmitted that trigger the slave subliminally without their conscious awareness.

Access to some people is done with computer like jargon “ON LINE” “ACCESS, (then identification), (then color code), (then name)” “, “ENTER”, “RUN”. Some Systems have their triggers all in computer lingo such as COMMAND MODE–ALL DISK DRIVES AND HARD DRIVES… ERASE.. .FORMAT DRIVE…COPY….UNDELETE PURGED MEMORY DRIVE…” Where some of the newer slave programmers are also computer programmers they enjoy transferring their computer lingo to use in controlling their programmed slaves. They may even throw in some FAX lingo such as “DIAL ALL REMOTES. . . INITIALIZATION – ATSO -OHOaM (HANDSHAKE BETWEEN ALL REMOTES), HANDSHAKE COMPLETED.”

The color of the car to pick up a System may relate to the color coding of the alters to be picked up, such as white exterior, blue interior for a white alter-then blue alter access sequence.

Basic Internal Emergency Color Codes for a SystemT here are several different “CODE RED’s, etc. not just one in a slave, what follows is not the complete information about the Codes, although it is possible some slaves have a simplified version like this:

“CODE GREEN” — Dr. Green’s suicide programming, tied to “no-talk” programming.“CODE BLUE” –Victim’s body freezes in motion and can’t move until another code is given.“CODE RED” — Victim gets angry and violent “CODE RED” -Another Code Red has the standard Monarch meaning, “serious self-destruct” program“CODE YELLOW” — Victim gets jealous, angry and wants to violently get even“CODE BLACK” — Used to get victim’s to get on their ritual clothes.“CODE WHITE” — Code to protect the cult members from arrest. When police see the Code White they treat the people as untouchable.

“CODE 911” — To activate the slave for an emergency calling for superhuman strength. Certain alters will have extra strength.“CODE 911” — Also used with standard Monarch meaning of “Call your programmer/handler”.“DISARM” (3x) — to get rid of a dangerous alter two snaps + “SHUTDOWN” — to shutdown an alter.“LET THE KINGS BE KINGS, LET THE BANKERS BE BANKERS, LET THE PRIESTS BE PRIESTS — saying to justify their Master-slave relationship to the masses of humanity.

There are code words for Illuminati members to tell police and judges that will automatically get them set free. Masonic handshakes and codes also work well with judges, police & govt. workers.

The Sun setting the following day was used as a trigger for slave to forget events. For the cat alters a certain word is given to trigger them to go “over the rainbow” after an event in order for them to forget it. “FROM THE RISING OF THE SUN TIL THE GOING DOWN OF THE SAME” –programmed in by using the scripture. “GO INTO THE SEA OF FORGETFULNESS” –a hypnotic structure in the mind to forget. Waterfalls are also used as a hypnotic image to forget pain and memory.

“RETYPE A LETTER” -reprogram, “JEWELS” = programs. “THE CATS & THE FIDDLE NEED TUNED UP–Slave to handler, I need to be reprogrammed.

There are three words to trigger a suicide program – 1. Bait, 2. [intentionally left out], 3. hook

Another suicide program trigger is when the dominoes fall. “GO OVER THE BLUFF” (3X)- causes suicide in some alters SACRED HEART = Catholic/Jesuit suicide program Some suicide programs are set off with a long tone over the phone along with a code number.

“KERMIT THE FROG” –a type of access code. “KERMIT” may be a code relating to computers, because Kermit is the universal language for connecting computers together. It is a single standard to exchange files between any two systems.

All memories, traumas, and tortures are coded. Body programs are coded. One set of body programs uses Hebrew, Greek, and Druidic letters.

clone program creates clones of an alter (also called lollipop or lobster program) imagery is that sesame seeds fall off of a hamburger bun and becomes another hamburger.

Codes to all the various basic systems

Carousel 532342223Castle System 221435321Communication 311146623Double Helix 432443321Level 211343231Mensa System 323542321Pentagram 421136113Pool of Death 231134421Puppet 341124321Sole metric 665421134Spider Web 321654321Stairwell 432111132Quabala 423454334Tornado 332146444Umbrella System 314321014

Alice In Wonderland Program

The White Rabbit is a programming figure for Alice In Wonderland Programming who will allow you to go to otherwise inaccessible places for adventure. He represents the master. The White Rabbit is an important figure to the slave.White rabbit gives a wafer (coke-sugar-cocaine) to Alice and says “EAT ME” or “EAT IT AND I’LL TAKE YOU THROUGH THE DOOR” — takes master into closed part of System, or perhaps over the rainbow.

The Queen of Hearts is also an important figure for commands in the Looking Glass World which the slave enters upon command. When a deep slave alter is needed to perform they are sent into the looking glass world where a looking glass person carries out the command–but in a way that reality is thought to be a dream. In other words, this is a preparatory command to get the slave ready for abuse.

“USE THE KEY. PUT IT IN THE LOCK. TURN. OPEN THE DOOR…AND STEP THROUGH A WINDOW [or MIRROR] INTO NEVER NEVER LAND.”

“SOMETHING IN LIGHTENING TO TRANSPORT YOU FASTER THAN THE OL’ RUBY SLIPPERS. CLICK YOUR HEELS TOGETHER AND BE THERE IN A SNAP. (SLAVE CLICKS HEELS) ELECTRIFYING …. WITH THE RUMBLE OF THUNDER. BOLTING THROUGH TIME … SO YOU WON’T BE LATE … FOR A VERY IMPORTANT DATE.” (Alice in Wonderland Programming) (This is the wording to use deep alters.)

Cinderella Program

The code word involves something said about the stroke of midnight.

The Melting Pot Program

A very powerful program is activated by melting the slave into his master. The slave will do anything for the master with this program. The melting is the ecstasy that is occasionally experienced when lovers having sex seem to melt into each other. This feeling of ecstasy-melting is programmed to release when the master says these words, “MELT INTO YOUR MELTED MIRROR FOR AN ELECTRIFYING RIDE. LOOK DEEP INTO THE BLACK OF MY MELTING MIRROR EYES. SEE YOU REFLECTING ME, REFLECTING YOU, REFLECTING ME, REFLECTING YOU, REFLECTING ME, REFLECTING YOU, REFLECTING ME, REFLECTING YOU … (cont. this several times) UNTIL WE MELT TOGETHER AND SINK DEEP… [words omitted] INTO THE OTHER SIDE.”

“MELT INTO MY MIRROR, YOU LOOSE YOURSELF INTO THE POOL OF LIQUID MIRROR, STEP INTO THE LOOKING GLASS, SINK DEEP WITHIN ITS POOL, AND STRADDLE THE DIMENSIONS IN TIME. I’LL SEE YOU THERE … ALONG WITH MY FRIENDS”

“SEE IT THROUGH THE LOOKING GLASS” — infinity mirror programming involving mirror image people (alters)

“LOSE YOURSELF IN THE INFINITY MIRRORS.”

Wizard of Oz Program

The Yellow Brick Road is the script or programmed set of instructions one must follow. It also serves as a runway for alters to take off from their internal world and take the body. “FOLLOW THE YELLOW BRICK ROAD”

There is a code to get through the poppy field (trance state). Some alters to get through the poppy field need to put on a new dress and a new image. The poppy field may be called “the field of forget-me-not”. In this way it is linked to the daisies of Dr. Green. To get into the poppy field is easy, it is “SLEEP, SLEEP, SLEEP”, see other induction methods on another page.

“THERE’S A PAIR OF MAGIC SHOES TO WEAR WITH YOUR DRESS.. .SOMETHING IN LIGHTNING…TO TRANSPORT YOU FASTER THAN THE OL’ FURRY SLIPPERS.”

When the slave is finished being used they return from Never Never Land to Kansas. To do this they are told: “CLICK YOUR HEELS … THERE’S NO PLACE LIKE HOME.” They might be reminded “YOU’RE NOW GOING OVER THE RAINBOW TO THE OTHER WORLD.”

Tin Man programming

The Tin Man programming is all purpose versatile program for what ever the master needs done, it means that the slave is a well oiled machine. Sometimes the slave is reluctant to do a job, but he is being told that he is a well oiled machine. The exact words may vary with the mission, but the following are exact words,

“LEAVE YOUR SHELL. ACTIVATE: MACHINE. COUNT DOWN ONE TO TIN….”“SOON WE’LL HAVE YOU PURRING LIKE A WELL OILED MACHINE. ALL OF YOUR MOVING PARTS ARE PIVOTAL AND GLIDING WITH EASE. MELT INTO MY HANDS. TAKE MY COMMANDS. I’LL HOLD YOUR JAW TO KEEP IT FROM SLIPPING WHILE YOU SLIP THROUGH A WINDOW IN TIME.”

Program code for slave to shatter their memory of an event (used with electroshock):

“MIRROR MIRROR ALL AROUND ON THE CEILING ON THE GROUND, SPINNING FASTER ROUND AND ROUND. ARE YOU UP OR ARE YOU DOWN? ARE YOU DOWN OR ARE YOU UP? IT REALLY DOESN’T MATTERBECAUSE WHEN THIS MIRROR BUBBLE BURSTS,EVERYTHING WILL SHATTER.”

“GO KEY WEST IS KEY” — several slaves have this code, related to Sen. Robert Byrd Oz progamming.

GALAXY programming (for the end times) is also connected to the Oz programming.

In upper level Illuminati slaves, Dorothy in the Oz story will represent the Mother of Darkness alters, Ozma will represent the Ruler of the Castle, and Glinda will have the Great Book of Records. The ring of Glinda (from Glinda of Oz, p. 16) gives protection.

Body ProgramsControl program. See Omega Programming- Universal Function Codes for internal system codes for body programs. Sometimes these body programs are filed with a combination of hebrew and zodiac signs. Greek letters are also file no.s of at times of body programs. Rivers of blood -circulation control program. This program totally controls the circulatory system. The victim may think they are losing lots of blood & go into heart failure. Octopus- strangulation suicide program The internal defenses consists in part of body programs that are triggered if the Mind-controlled slave steps out of line. Here is a good list of some of these body programs each of which has its own codes:

Auditory problems, Blood flow/circulation, Burning as if on fire, Digestive failure, Headaches-split brain, Heart failure, Histamine production, Optic problems, Respiratory failure, Sleep deprivation, Sleeping program, and Temperature change. The suicide programs that can go off include Armageddon, Clowns cutting, Cutter program “Pain is Love”, Disembowelment, Drug overdose, Gethsemane, “Hypnosleep”,

Injection of bleach (poison), Octopus, Red Sea, Shooting Programs (shotgun, Russian roulette, shooting family, etc.), War in the Heavens & Wrecking the car. Along with the suicide programs that can be triggered are programs that jerk the victim’s mind every which way, which include: Bee Stinging Program (put in by placing the drugged victim being near large swarms of bees humming & then letting a bee(s) sting the victim), Busy Cleaning Program, Crazy program, Flooding (from Atlantis), Isolate & Hibernate Program, Memory Erasure Program, Pain Programming, Paper Doll Program, Protection by trance, Revolving switching, Scrambling Program, and re-Structuring Programming, Tumbleweed program, Waterjar Shaking program (Ahab stomping the grapes Bible-based program making mush out of the brain.)

Cutting programs are often hidden behind the Bee Swarming program. Alpha and Omega is a strong program. Sometimes saying “ALPHA & OMEGA” helps alleviate headaches.

DNA Program (This uses a lot of number codes.) This is a double-helix which is used as an elevator shaft running down through a system. Numbers are used and the names of cities to go down the elevator shafts. This programming is said to be done in hospitals.

Card CodesRegular playing cards have developed from the occult Tarot cards. The four suits correspond to magick, the spades mean the power from the spear of destruction, the diamond means is a double pyramid or demonic power of wealth, and the club is a clover meaning fortune and fate, and the heart means devotion and loyalty. The four suits work well in programming because anything that is broken down in 4’s or a multiple of 4 can be coded with cards. Anything that can be broken down into 12’s or 13’s can be given cards too. Since clocks work off of 12’s, card codes work well with clocks. The suits can denote seasons. With Jokers one gets 13 cards per suit with four suits gives 365 unique symbols to denote the days of the year. Dominos can also be used on a base 13 code system. The blank will equal 13.

Carousel SystemThere is a back side to enter the Carousel.

Carrier Pigeon (slave’s who send coded or uncoded messages) and their contact codes

Birds used for contacts. That is, birds in cages are often used as a sign of a meeting place. The contact would say “What did the bird say?” or “A little bird told me …,Then the courier pigeon delivers her message.

‘‘I’ve come a long long way to see you” -Words to say by System to John or to person to be met. There is an endless variety of contact phrases to indicate that the right person has met the right person.

Sample Code for passing drugs-“RHINESTONE COWBOY” to which the response from the slave would be “I’M NOT A COWBOY, I’M A COWGIRL.”

Emerald ear rings have been the visual signal to customs agents to allow a person carrying drugs through customs. (See D. DELTA for deeper Carrier Pigeon codes.)

Castle SystemMay need a special ring worn by and turned by the handler.

Flower’s Program

CSP94OYP587 — code to designate a flower tieing 3 generations.

UMBRELLA PROGRAM CODE — “R x 4 x 5Y58876”

Gem codes:

Sample correspondences of Gem codes:

1 – Aries – diamond2 – Gemini – topaz3 – Cancer – cat’s eye4 – Leo – ruby5 – Virgo – emerald6 – Libra – opal7 – Scorpio – amethyst8 – Sagittarius – turquoise9 – Capricorn – black onyx10 – Aquarius

crystal11 – Pisces – sapphire

Share this:

You may also like...