“Ismail Ax” and the Latest Mind-Controlled Assassin
By Ishmael | Submitted to redicecreations.com
This article, I believe, will bring some light to the VA Tech massacre that took place on the morning of April 16, 2007 and took 33 lives, including the assassin, Cho Seung-Hui, himself. Two words, "Ismail Ax," were written in red ink on the arm of Cho Seung-Hui. ‘Ismail’ is the Arabic version of the name ‘Ishmael’, the brother of Isaac, son of Abraham, and regarded as the forefather of Islam. Because I have the same name, I immediately became interested in this subject.
The purpose of this article is to explain the significance of "Ismail Ax" from a different perspective, in which this incident is viewed as a black-ops, mind-controlled, "Manchurian Candidate" operation aimed at paving the way towards fascism in the United States and stripping the rights of the citizens of the United States.
Fritz Springmeier's "The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave" has been a very useful tool in understanding the details of how human beings have been systematically turned into machines and robots using many different and complex techniques to turn people into whatever "they" deem necessary. The assassin is a prime example of one of these. "The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave" is located at http://www.whale.to/b/sp/for1.html and in Chapter 4 - 'Science No 4 - Hypnosis Understanding the Basics About Hypnosis' topics like "A. Dissociation, trance, & its historical use", "Keeping the mind dissociative" and "Hypnotic triggers & cues" are discussed. This book and it’s sequel (discussed later) are massive books with tons and tons of detailed information on the processes, programs, organizations, people, and belief systems involved. To really get a sense of how much there is in these books, they really should be printed out. These are reference books to mind control. Springmeier is also the author of “Bloodlines of the Illuminati.” Here is a quote from Chapter 4 of “The Illuminati Formula”:
"Monarch Mind Control Codes Contents:
H. HYPNOTIC INDUCTIONS
I. JANUS-ALEX CALL BACKS (End-times) Main link to a System’s programs to ALEX coded 44334223112. Scramble code to ALEX is 34424313221. Individual code to ALEX = 55434232312. Link to JANUS coded 3323432123. Report back- X441062F Main JANUS tracking/reprogramming code-JAN US 9341 00569XXY99632 [x3]; its back up code X44420-61F. (There is a Janis 2 computer at 666 Connecticut Ave. Washington , D.C. Disinformation by the Network is that the PACER computer equipment is called Janus/Janis)."
If you don't know what this means, that's okay. I highly recommend people read as much as they can of this book as well as "Deeper Insights into the Illuminati Formula" which can be found at http://www.whale.to/b/sp/deep.html Found in "Deeper Insights", and in the "MONARCH MIND-CONTROL CODES" section is:
"I. JANUS-ALEX CALL BACKS (end-times)
END-TIME ACTIVATION CODES
Most slaves have end-time programming. The programming to activate a slave’s end-time programming often runs pages upon pages of coded messages. A number of Monarch slaves have been de-programmed enough that they began accessing and spewing out pages and pages of these activation codes
Some of those systems are Monarch systems of the Theta Model, and many of those in the military are young men of the Illuminati. Some have been seen at NORAD, in Colorado, which helps confirm that Theta models are being employed to bring in the Anti-Christ. (NORAD is a main center for Alex and Janus end-timed programming.)"
"D. DELTA (assassination)
Delta alters --are activated to kill by the following three things: seeing specific clothing, items held in a persons hand, and particular words. Since these items would specific for a particular murder there is no particular specifics that can be given."
Under "HYPNOTIC CODES, CUES AND TRIGGERS" is the following:
"This chapter will provide some more of the hypnotic codes, cues, triggers or whatever one wants to call these words, noises, and sensory inputs that manipulate these poor victims turned into Monarch robots. The reader is encouraged to refer to Vol. 2 for the principle list of codes. Other chapters will explain about the structures these codes go to, and also the spiritual dimensions of these codes and structures."
"From the co-author Fritz Springmeier’s experience, the following is a continuation of favorite code words that have been used to program slaves with:
AARON, ABBY, ABIGAIL, ABLE, ABNER, ABRAHAM, ACACIA. ACE, ADAM, ADELPHI, AGATE, AIR +, ALABASTER, ALADIN, ALBERT, ALFA or ALPHA. ALICE, ALLEY CAT, ALLIGATOR, AMOS, AMY, ANGEL, ANNA, ANTHONY, APACHE, APOLLO, APOSTLE, APPLE +, ARCHER, ARGUS, ARK, ARROW, ASK +, ASTER, ATHANTIS, ATLAS, AUDREY, AURORA. AUTUMN +, AZTEC, B +, BABE, BABY, BACK ROOM, BACK BONE, BAD, BAKER, BALD, BAMBI, BANANA, BANJO, BANKNOTE, BARBARA. BARK, BARON, BEACH +, BEAST, BECKY, BEE HIVE, BEETHOVEN, BELSHAZZER, BERMUDA, BERTHA, BETA, BETSY, BETTY, BEULAH, BEWITCH, BICYCLE, BIG BROTHER, BINGO, BIRD DOG, BIRTHDAY, BLACK, BLACK +, BLACK
SHEEP, BLACK WIDOW, BLANCA, BLONDIE, BLOODHOUND, BLOODY +, BLUE +, BOA. BOB CAT, BOMBAY, BONANZA. BOODLE, BORAX, BOXCAR, BRASS +, BRIDGET, BROOMSTICK, BUCCANEER, BUICK, BULL, BULLDOG, BULLFROG, BUMBLEBEE, BUNNY, BUTTERCUP, BUZZARD, BYRON, T-BIRD, TADPOLE, TALISMAN, TAN, TANGO, TANYA, TARA, TARZAN, TEACUP, TEARDROP, TEEPEE, TERRIER, TERRY, TESTAMENT, THOR, THREE SISTERS, THUNDER, THUNDERBOLT, THUNDERCLAP, THUNDERFLASH, THUNDERSTORM, TIAMET, TIGER, TILLIE, TITAN, TOM CAT, TONI or TONY, TOPAZE, TOPSOIL, TORNADO, TOTENKOPF, TRINITY, TURTLE, UGLY, ULYSSES, UMBRELLA, UNCLE +, UNDERDOG, UNICORN, UNIFORM, URSULA, VAGABOND, VAMPIRE, VANCOUVER, VARSITY, VELVET, VENUS, VERONICA, VICKY, VICTOR, VIKING, VIOLA, VIOLET, VIPER, VIRGINIA VOODOO, VULCAN, VULTURE, WAGON WHEEL, WALDORF,
WALLFLOWER, WANDA. WARRIOR, WASP, WATCHDOG, WEASEL, WHISKEY, WHITE +, WIDOW, WILD CAT, WILLOW, WINNIE, WINTER +, WIZARD, WOLF,
WOLF +, WYOMING, X-FORCE, X-RAY, XYZ, YANKEE, YANKEE DOODLE, YELLOW, YOGI, & YO YO.
The intelligence organizations prefer to code a single project with a single word, and an ongoing operation with two words. A nickname of something will consist of two words. The reader needs to bear several things in mind. First, the programmers generally have intelligent, well sounding codes, that do form patterns. For instance, a woman’s name from the Bible will be used as a code, with subparts or subcodes having other female names from the Bible. Deeper Illuminati parts will have goddess & god names, and king & queen names for cult alters. These are the names the handler or cult uses--NOT their access codes."
"The science of Ciphers developed rotors that require lines to line up. Some simple schemes using this principle appear in some Monarch systems. This is part of the science of structuring. Intelligence codes often come from the Bible or popular fiction books. The deeper codes are occult words, often in foreign languages such as Arabic, which is an important language in the upper occult world. Slaves will be given COVER NAMES for ops, and often males receive female names and vice versa.
The patterns used in programming slaves will represent the world view of the programmer. If the interests of the programmer are known, that will be a major clue to the codes they like to install. For this reason, it would be worthwhile to review the access clearance codes that are used for external security of some agencies, because these same types of clearance codes may be found in mind-controlled slaves."
Did he say biblical and arabic words?
Okay, so if we aren't very familiar with this stuff, that's all right. I suggest doing some reading of both of these books if you are interested. This will tell you more than you'll ever want to know, believe me.
Now, Springmeier just happens to be in PRISON right now due to a charge brought against him some years ago for allegedly being involved in a bombing, and whom many people, including his wife, believe he was framed, given his exposing the deep secrets of mind-control programs and the family histories of those involved. Read all about it at these sites:
Going by this information, it might be a big step to come out and say that "Ismail Ax" is one of these activation codes or triggers that would have caused Cho Seung-Hui to go on his rampage. BUT, there's more.
After doing a Google search on "Ismail Ax" on Tuesday, April 17th, at the time only 2 results popped up. One was the article of www.propagandamatrix.com and another was found at:
The page turned out to contain thousands of seemingly meaningless words and strings of letters.
"ismail Ax NN-NNP" was one of these. If this page is still available, please go and see for yourself. Compare this to the Springmeier material. Notice the similarities. The site turns out to be at Carnegie Mellon’s School of Computer Science website.
But that's not it.
After my suspicions grew and grew, I decided to download random documents from the site and see if I could find anything incriminating. After reading a few documents, it seemed to me that what this was about was Machine translations of languages, involving very complex linguistic and computer programming coding used for instantaneous language translation between computers or people.
Then I found a document entitled "Domain-limited Interlingua-based Speech Translation" at:
Here is the beginning of this document:
"Evolution of Domain-limited Interlingua-based MT at CMU
The Interactive System Labs (ISL) and the Language Technologies Institute (LTI) at Carnegie Mellon have been pursuing an ongoing research effort over the past fifteen years to develop machine translation systems specifically suited for spoken dialogue. The JANUS-I system (Woszczyna et al., 1993) was developed at Carnegie Mellon University and the University of Karlsruhe in conjunction with Siemens in Germany and ATR in Japan. JANUS-I translated well-formed read speech in the conference registration domain with a vocabulary of 500 words. Advances in speech recognition and robust parsing over the past ten years then enabled corresponding advances in spoken language translation. The JANUS-II translation system (Waibel et al., 1996), taking advantage of advances in robust parsing (Carroll, 1996; Lavie, 1996), operated on the spontaneous scheduling task (SST) -- spontaneous conversational speech involving two people scheduling a meeting with a vocabulary of 3,000 words or more. JANUS-II was developed within the framework of an international consortium of six research groups in Europe, Asia and the U.S., known as C-STAR (http://www.cstar.org). A multi-national public demonstration of the system capabilities was conducted in July, 1999. More recently, the JANUS-III system made significant progress in large vocabulary continuous speech recognition (Woszczyna, 1998) and significantly expanded the domain of coverage of the translation system to spontaneous travel planning dialogues (Levin et al, 2000), involving vocabularies of over 5,000 words. The NESPOLE! System (Lavie et al, 2001, Lavie et al, 2002) further extended these capabilities to speech communication over the internet, and developed new trainable methods for language analysis that are easier to port to new domains of interest. These were demonstrated via a prototype speech-translation system developed for the medical assistance domain. The language processing technology developed within the JANUS-III and NESPOLE! Systems were also incorporated into portable platforms such as the LingWear system and the Speechalator, developed for the DARPA Babylon Program."
Recognize the JANUS system from anywhere? Look at the Springmeier quotes again and see. Do you think this might be the SAME JANUS system? I'm willing to bet a lot right now. Carnegie Mellon and others seem to be involved in the same system Springmeier was talking about. The "DARPA Babylon Program" is also very suspicious sounding as well.
Apparently, Virginia Tech has been an “active” partner with DARPA:
Strange Virginia Tech “Coincidences”
“Janus” is also in "Mind Controlled Killers: What happened at Columbine High School? Was O.J. Simpson innocent? In Defense of Buford Furrow Jr.!" at:
At the very end of the article is this:
"The super-secret Janus Group utilizes very highly-trained psychic assassins, who employ such techniques as the green and red marble systems, as well as the White Glove method. In order to psychically kill enemies of the Illuminati. The Director of Janus (an Illuminatus) wields more political clout than the hierarchy of the National Security Agency. He was an intimate friend of the late Roy Cohn -- a director of Permindex, the group which masterminded the assassination of President John Kennedy. As a cover for his covert activities, he also performs the role of a talk-show host. he has a tendency to drag a pen across the forehead of mind-controlled assassins, when implanting new assassination programs. Now that the programming of several of his assassins has broken down, he will probably face sever punishment at the hands of the Illuminati for ineptitude."
This is a quote from “The Biggest Secret” by David Icke:
“Belgium, this little country between France and the Netherlands, is also the home of the European Union, NATO, and, I am told, a massive computer centre where databases on all the people of the world are being compiled. It is known apparently as ‘the Beast’ and there are a number of these around the world. An Elite mind control operation called the Janus Group is also based in the NATO headquarters.”
A link to the page this quote appears on is:
Now, call me crazy, but I think that THIS IS NOT ONE BIG COINCIDENCE. I then did some looking around, and not surprisingly, I didn't find much on the Janus system. Here is what I did find:
Bios on Alex Waibal, Director of Interactive System Labs (ISL) and one of the founders of C-STAR:
which don't really tell much, except at http://www.janusiii.com/ there is a good bit of friendly Freemason symbolism, oddly enough.
It is my theory that “Ismail Ax” directly connects to the JANUS-ISL-C-STAR global network technologies employed in these covert operations, used quite possibly as an activation code/trigger. Just like previous school attackers, especially at Columbine, Cho Seung-Hui was also another black-ops mind-controlled assassination slave who was more disturbed than anyone could know and had a life that you and I should thank God we never had to live.
Article received from: Ishmael
Virginia School Shooting: Another Government Black-Op?
Chicago Tribune: Cho Seung Hui, Danger signs festered below aloof surface
Latest News from our Front Page
Virginia TV Shooter Said, "Jehovah Spoke To Me That I Should Take Action"
What causes a guy to go off the plantation enough so that he would murder in cold blood, two of his former colleagues? Guesses are abounding, such as racial tension, mental illness, psychotropic prescription drugs, narcissism, etc. What about the angle of how a destructive religious cult shaped him in his formative years, so that later in life, he would ...
Invasion into Macedonia from Greece - Border Mayhem
Description from video page: These are the desperate scenes at Greeceâ€™s border with FYR Macedonia as overwhelmed security forces made sporadic attempts to stem the flow of invaders heading northwards.
Riot police set off stun grenades and hit invaders with batons but that did little to stop them passing into FYR Macedonia.
Skopje had declared a state of emergency on Thursday (August ...
RamZPaul: TV Reporter Murdered Live On Air
Youtube description: The gunman responsible for the live on air shooting of reporter Alison Parker and cameraman Adam Ward said part of his motivation for the attack was Parker making “racist comments.”
Vid that killer made:
(note the actual shooting vid is being censored fast)
Jesse Benn advocating "White Wounding: just weeks ago:huffingtonpost.com
White House Pushes Race War, Then Blames Guns For Flanagan's "Race War"
"You want a race war (expletive)?" Asked shooter
The Obama administration is blaming guns for the WBDJ-TV shooting, even though the shooter, Vester Flanagan, was influenced by the White House’s race baiting.
The White House has been falsely insinuating that racism is the dominant factor behind numerous events over the past several years, even those that didn’t involve race at all, and ...
How Google Destroyed the Internet
The internet was created to resolve a simple problem: in communications networks, any central node through which all messages passed was vulnerable to attack or takeover. To counter this, engineers designed a network where any node would pass messages to other nodes, routing around any damage.
Then came commerce and the democratization of the internet.
Under this model, frightened sheep flock to ...
|More News » |