“Ismail Ax” and the Latest Mind-Controlled Assassin
By Ishmael | Submitted to redicecreations.com
This article, I believe, will bring some light to the VA Tech massacre that took place on the morning of April 16, 2007 and took 33 lives, including the assassin, Cho Seung-Hui, himself. Two words, "Ismail Ax," were written in red ink on the arm of Cho Seung-Hui. ‘Ismail’ is the Arabic version of the name ‘Ishmael’, the brother of Isaac, son of Abraham, and regarded as the forefather of Islam. Because I have the same name, I immediately became interested in this subject.
The purpose of this article is to explain the significance of "Ismail Ax" from a different perspective, in which this incident is viewed as a black-ops, mind-controlled, "Manchurian Candidate" operation aimed at paving the way towards fascism in the United States and stripping the rights of the citizens of the United States.
Fritz Springmeier's "The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave" has been a very useful tool in understanding the details of how human beings have been systematically turned into machines and robots using many different and complex techniques to turn people into whatever "they" deem necessary. The assassin is a prime example of one of these. "The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave" is located at http://www.whale.to/b/sp/for1.html and in Chapter 4 - 'Science No 4 - Hypnosis Understanding the Basics About Hypnosis' topics like "A. Dissociation, trance, & its historical use", "Keeping the mind dissociative" and "Hypnotic triggers & cues" are discussed. This book and it’s sequel (discussed later) are massive books with tons and tons of detailed information on the processes, programs, organizations, people, and belief systems involved. To really get a sense of how much there is in these books, they really should be printed out. These are reference books to mind control. Springmeier is also the author of “Bloodlines of the Illuminati.” Here is a quote from Chapter 4 of “The Illuminati Formula”:
"Monarch Mind Control Codes Contents:
H. HYPNOTIC INDUCTIONS
I. JANUS-ALEX CALL BACKS (End-times) Main link to a System’s programs to ALEX coded 44334223112. Scramble code to ALEX is 34424313221. Individual code to ALEX = 55434232312. Link to JANUS coded 3323432123. Report back- X441062F Main JANUS tracking/reprogramming code-JAN US 9341 00569XXY99632 [x3]; its back up code X44420-61F. (There is a Janis 2 computer at 666 Connecticut Ave. Washington , D.C. Disinformation by the Network is that the PACER computer equipment is called Janus/Janis)."
If you don't know what this means, that's okay. I highly recommend people read as much as they can of this book as well as "Deeper Insights into the Illuminati Formula" which can be found at http://www.whale.to/b/sp/deep.html Found in "Deeper Insights", and in the "MONARCH MIND-CONTROL CODES" section is:
"I. JANUS-ALEX CALL BACKS (end-times)
END-TIME ACTIVATION CODES
Most slaves have end-time programming. The programming to activate a slave’s end-time programming often runs pages upon pages of coded messages. A number of Monarch slaves have been de-programmed enough that they began accessing and spewing out pages and pages of these activation codes
Some of those systems are Monarch systems of the Theta Model, and many of those in the military are young men of the Illuminati. Some have been seen at NORAD, in Colorado, which helps confirm that Theta models are being employed to bring in the Anti-Christ. (NORAD is a main center for Alex and Janus end-timed programming.)"
"D. DELTA (assassination)
Delta alters --are activated to kill by the following three things: seeing specific clothing, items held in a persons hand, and particular words. Since these items would specific for a particular murder there is no particular specifics that can be given."
Under "HYPNOTIC CODES, CUES AND TRIGGERS" is the following:
"This chapter will provide some more of the hypnotic codes, cues, triggers or whatever one wants to call these words, noises, and sensory inputs that manipulate these poor victims turned into Monarch robots. The reader is encouraged to refer to Vol. 2 for the principle list of codes. Other chapters will explain about the structures these codes go to, and also the spiritual dimensions of these codes and structures."
"From the co-author Fritz Springmeier’s experience, the following is a continuation of favorite code words that have been used to program slaves with:
AARON, ABBY, ABIGAIL, ABLE, ABNER, ABRAHAM, ACACIA. ACE, ADAM, ADELPHI, AGATE, AIR +, ALABASTER, ALADIN, ALBERT, ALFA or ALPHA. ALICE, ALLEY CAT, ALLIGATOR, AMOS, AMY, ANGEL, ANNA, ANTHONY, APACHE, APOLLO, APOSTLE, APPLE +, ARCHER, ARGUS, ARK, ARROW, ASK +, ASTER, ATHANTIS, ATLAS, AUDREY, AURORA. AUTUMN +, AZTEC, B +, BABE, BABY, BACK ROOM, BACK BONE, BAD, BAKER, BALD, BAMBI, BANANA, BANJO, BANKNOTE, BARBARA. BARK, BARON, BEACH +, BEAST, BECKY, BEE HIVE, BEETHOVEN, BELSHAZZER, BERMUDA, BERTHA, BETA, BETSY, BETTY, BEULAH, BEWITCH, BICYCLE, BIG BROTHER, BINGO, BIRD DOG, BIRTHDAY, BLACK, BLACK +, BLACK
SHEEP, BLACK WIDOW, BLANCA, BLONDIE, BLOODHOUND, BLOODY +, BLUE +, BOA. BOB CAT, BOMBAY, BONANZA. BOODLE, BORAX, BOXCAR, BRASS +, BRIDGET, BROOMSTICK, BUCCANEER, BUICK, BULL, BULLDOG, BULLFROG, BUMBLEBEE, BUNNY, BUTTERCUP, BUZZARD, BYRON, T-BIRD, TADPOLE, TALISMAN, TAN, TANGO, TANYA, TARA, TARZAN, TEACUP, TEARDROP, TEEPEE, TERRIER, TERRY, TESTAMENT, THOR, THREE SISTERS, THUNDER, THUNDERBOLT, THUNDERCLAP, THUNDERFLASH, THUNDERSTORM, TIAMET, TIGER, TILLIE, TITAN, TOM CAT, TONI or TONY, TOPAZE, TOPSOIL, TORNADO, TOTENKOPF, TRINITY, TURTLE, UGLY, ULYSSES, UMBRELLA, UNCLE +, UNDERDOG, UNICORN, UNIFORM, URSULA, VAGABOND, VAMPIRE, VANCOUVER, VARSITY, VELVET, VENUS, VERONICA, VICKY, VICTOR, VIKING, VIOLA, VIOLET, VIPER, VIRGINIA VOODOO, VULCAN, VULTURE, WAGON WHEEL, WALDORF,
WALLFLOWER, WANDA. WARRIOR, WASP, WATCHDOG, WEASEL, WHISKEY, WHITE +, WIDOW, WILD CAT, WILLOW, WINNIE, WINTER +, WIZARD, WOLF,
WOLF +, WYOMING, X-FORCE, X-RAY, XYZ, YANKEE, YANKEE DOODLE, YELLOW, YOGI, & YO YO.
The intelligence organizations prefer to code a single project with a single word, and an ongoing operation with two words. A nickname of something will consist of two words. The reader needs to bear several things in mind. First, the programmers generally have intelligent, well sounding codes, that do form patterns. For instance, a woman’s name from the Bible will be used as a code, with subparts or subcodes having other female names from the Bible. Deeper Illuminati parts will have goddess & god names, and king & queen names for cult alters. These are the names the handler or cult uses--NOT their access codes."
"The science of Ciphers developed rotors that require lines to line up. Some simple schemes using this principle appear in some Monarch systems. This is part of the science of structuring. Intelligence codes often come from the Bible or popular fiction books. The deeper codes are occult words, often in foreign languages such as Arabic, which is an important language in the upper occult world. Slaves will be given COVER NAMES for ops, and often males receive female names and vice versa.
The patterns used in programming slaves will represent the world view of the programmer. If the interests of the programmer are known, that will be a major clue to the codes they like to install. For this reason, it would be worthwhile to review the access clearance codes that are used for external security of some agencies, because these same types of clearance codes may be found in mind-controlled slaves."
Did he say biblical and arabic words?
Okay, so if we aren't very familiar with this stuff, that's all right. I suggest doing some reading of both of these books if you are interested. This will tell you more than you'll ever want to know, believe me.
Now, Springmeier just happens to be in PRISON right now due to a charge brought against him some years ago for allegedly being involved in a bombing, and whom many people, including his wife, believe he was framed, given his exposing the deep secrets of mind-control programs and the family histories of those involved. Read all about it at these sites:
Going by this information, it might be a big step to come out and say that "Ismail Ax" is one of these activation codes or triggers that would have caused Cho Seung-Hui to go on his rampage. BUT, there's more.
After doing a Google search on "Ismail Ax" on Tuesday, April 17th, at the time only 2 results popped up. One was the article of www.propagandamatrix.com and another was found at:
The page turned out to contain thousands of seemingly meaningless words and strings of letters.
"ismail Ax NN-NNP" was one of these. If this page is still available, please go and see for yourself. Compare this to the Springmeier material. Notice the similarities. The site turns out to be at Carnegie Mellon’s School of Computer Science website.
But that's not it.
After my suspicions grew and grew, I decided to download random documents from the site and see if I could find anything incriminating. After reading a few documents, it seemed to me that what this was about was Machine translations of languages, involving very complex linguistic and computer programming coding used for instantaneous language translation between computers or people.
Then I found a document entitled "Domain-limited Interlingua-based Speech Translation" at:
Here is the beginning of this document:
"Evolution of Domain-limited Interlingua-based MT at CMU
The Interactive System Labs (ISL) and the Language Technologies Institute (LTI) at Carnegie Mellon have been pursuing an ongoing research effort over the past fifteen years to develop machine translation systems specifically suited for spoken dialogue. The JANUS-I system (Woszczyna et al., 1993) was developed at Carnegie Mellon University and the University of Karlsruhe in conjunction with Siemens in Germany and ATR in Japan. JANUS-I translated well-formed read speech in the conference registration domain with a vocabulary of 500 words. Advances in speech recognition and robust parsing over the past ten years then enabled corresponding advances in spoken language translation. The JANUS-II translation system (Waibel et al., 1996), taking advantage of advances in robust parsing (Carroll, 1996; Lavie, 1996), operated on the spontaneous scheduling task (SST) -- spontaneous conversational speech involving two people scheduling a meeting with a vocabulary of 3,000 words or more. JANUS-II was developed within the framework of an international consortium of six research groups in Europe, Asia and the U.S., known as C-STAR (http://www.cstar.org). A multi-national public demonstration of the system capabilities was conducted in July, 1999. More recently, the JANUS-III system made significant progress in large vocabulary continuous speech recognition (Woszczyna, 1998) and significantly expanded the domain of coverage of the translation system to spontaneous travel planning dialogues (Levin et al, 2000), involving vocabularies of over 5,000 words. The NESPOLE! System (Lavie et al, 2001, Lavie et al, 2002) further extended these capabilities to speech communication over the internet, and developed new trainable methods for language analysis that are easier to port to new domains of interest. These were demonstrated via a prototype speech-translation system developed for the medical assistance domain. The language processing technology developed within the JANUS-III and NESPOLE! Systems were also incorporated into portable platforms such as the LingWear system and the Speechalator, developed for the DARPA Babylon Program."
Recognize the JANUS system from anywhere? Look at the Springmeier quotes again and see. Do you think this might be the SAME JANUS system? I'm willing to bet a lot right now. Carnegie Mellon and others seem to be involved in the same system Springmeier was talking about. The "DARPA Babylon Program" is also very suspicious sounding as well.
Apparently, Virginia Tech has been an “active” partner with DARPA:
Strange Virginia Tech “Coincidences”
“Janus” is also in "Mind Controlled Killers: What happened at Columbine High School? Was O.J. Simpson innocent? In Defense of Buford Furrow Jr.!" at:
At the very end of the article is this:
"The super-secret Janus Group utilizes very highly-trained psychic assassins, who employ such techniques as the green and red marble systems, as well as the White Glove method. In order to psychically kill enemies of the Illuminati. The Director of Janus (an Illuminatus) wields more political clout than the hierarchy of the National Security Agency. He was an intimate friend of the late Roy Cohn -- a director of Permindex, the group which masterminded the assassination of President John Kennedy. As a cover for his covert activities, he also performs the role of a talk-show host. he has a tendency to drag a pen across the forehead of mind-controlled assassins, when implanting new assassination programs. Now that the programming of several of his assassins has broken down, he will probably face sever punishment at the hands of the Illuminati for ineptitude."
This is a quote from “The Biggest Secret” by David Icke:
“Belgium, this little country between France and the Netherlands, is also the home of the European Union, NATO, and, I am told, a massive computer centre where databases on all the people of the world are being compiled. It is known apparently as ‘the Beast’ and there are a number of these around the world. An Elite mind control operation called the Janus Group is also based in the NATO headquarters.”
A link to the page this quote appears on is:
Now, call me crazy, but I think that THIS IS NOT ONE BIG COINCIDENCE. I then did some looking around, and not surprisingly, I didn't find much on the Janus system. Here is what I did find:
Bios on Alex Waibal, Director of Interactive System Labs (ISL) and one of the founders of C-STAR:
which don't really tell much, except at http://www.janusiii.com/ there is a good bit of friendly Freemason symbolism, oddly enough.
It is my theory that “Ismail Ax” directly connects to the JANUS-ISL-C-STAR global network technologies employed in these covert operations, used quite possibly as an activation code/trigger. Just like previous school attackers, especially at Columbine, Cho Seung-Hui was also another black-ops mind-controlled assassination slave who was more disturbed than anyone could know and had a life that you and I should thank God we never had to live.
Article received from: Ishmael
Virginia School Shooting: Another Government Black-Op?
Chicago Tribune: Cho Seung Hui, Danger signs festered below aloof surface
Latest News from our Front Page
Scary Times For California Farmers As Snowpack Hits Record Lows
The water outlook in drought-racked California just got a lot worse: Snowpack levels across the entire Sierra Nevada are now the lowest in recorded history â€” just 6 percent of the long-term average. That shatters the previous low record on this date of 25 percent, set in 1977 and again last year.
Morning traffic makes its way toward downtown Los Angeles ...
Sharia Policeman in Swedish School
Editor's Note: Unfortunately this is not an April Fools story.
On monday morning emergency services were called to Eductus in BorĂĄs, a school specialized in teaching Swedish to immigrants, after a Muslim student threatened classmates who did not abide by his strict interpretation of Islam. They were reprimanded for laughing and a Christian woman who refused to wear a veil fainted ...
â€śUsâ€ť and â€śThemâ€ť
Iâ€™ve decided to translate yet another one of Julia Caesarâ€™s popular Sunday chronicles available in Swedish on the website Snaphanen. This one is named â€śUs and Themâ€ť and concerns a scandal of epic proportions, the Swedish governments â€śsociety coachâ€ť program. The plan was for the coaches to assist newly arrived immigrants with getting jobs and becoming integrated into society.
The Expulsion and Extermination of Eastern European Germans: An Overview
"Since the end of the war about 3,000,000 people, mostly women and children and overaged men, have been killed in eastern Germany and south-eastern Europe; about 15,000,000 people have been deported or had to flee from their homesteads and are on the road. About 25 per cent of these people, over 3,000,000 have died. About 4,000,000 men and women have ...
Your Smartphone Could be Tracking You Every 3 Minutes, Study Says
Your apps want to know where you are
Smartphone apps regularly collect large amounts of data on usersâ€™ locations, sometimes as often as every three minutes, new research suggests.
Researchers at Carnegie Mellon University conducted a study where they asked 23 people to use their Android smartphones normally, and tracked location data requests from each device with specially designed software, the Wall ...
|More News » |