13.10.2012 Views

Monarch-mind-control

Monarch-mind-control

Monarch-mind-control

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

chapter_4<br />

QUAIL, QUEBEC, QUEEN, QUEEN BEE, QUEENIE,<br />

QUEST, QUICK SILVER<br />

RACHEL, RAINBOW, RAM, RANGER, RASCAL,<br />

RAT, RAVEN, REBECCA, RED DIAMOND, RED<br />

HILL, RENO, REX, RHUBARB, RITA, ROBOT,<br />

ROMEO, ROOSTER, ROSIE, ROVER, RUBY, RUTH<br />

SABRE, SAINT, SAINT + [another word], SALLY,<br />

SAN ANTONIO, SAPPHIRE, SARAH, SATURN,<br />

SCAMPER, SCOUT, SEA GULL, SEAL, SERGEANT,<br />

SERGEANT-DELTA, SHADOW, SHARK,<br />

SHENANDOAH, SHO, SICKLE, SIGMA, SILVER,<br />

SNOW + (other word)<br />

ZEBRA, ZENITH, ZERO, ZYPPER, ZOMBIE, ZULU,<br />

ZUNI."<br />

The word FOX is an example of a significant occult code word.<br />

F-o-x consists of the 6th, 15th (1+5), & the 24th (2+ 4) letters of<br />

the alphabet, which yield 666. The reader needs to bear several<br />

things in <strong>mind</strong>. First, the programmers generally have intelligent,<br />

well sounding codes, that do form patterns. For instance, a<br />

woman’s name from the Bible will be used as a code, with subparts<br />

or subcodes having other female names from the Bible. Deeper<br />

Illuminati parts will have goddess and god names, and king and<br />

queen names for cult alters. These are the names the handler or cult<br />

uses--NOT their access codes.<br />

The codes for slaves follow patterns. There are standard and unique<br />

codes. The internal programming alters have the power to change<br />

codes if they need to protect the programming. They will have to<br />

hypnotically work with alters when they trance out at night. In other<br />

words, most of their programming of front alters will be done when<br />

a System lies down for "sleep"--more accurately described as "for<br />

trance." If the internal alters change many codes, in their efforts to<br />

protect the system, they will even make it difficult for the<br />

handler/programmer to get into the system.<br />

http://mercury.spaceports.com/~persewen/fritz/fritz-ch4-2.html (14 of 16) [7/15/2000 7:56:11 PM]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!