“Ismail Ax” and the Latest Mind-Controlled Assassin
2007 04 19
By Ishmael | Submitted to redicecreations.com
This article, I believe, will bring some light to the VA Tech massacre that took place on the morning of April 16, 2007 and took 33 lives, including the assassin, Cho Seung-Hui, himself. Two words, "Ismail Ax," were written in red ink on the arm of Cho Seung-Hui. ‘Ismail’ is the Arabic version of the name ‘Ishmael’, the brother of Isaac, son of Abraham, and regarded as the forefather of Islam. Because I have the same name, I immediately became interested in this subject.
The purpose of this article is to explain the significance of "Ismail Ax" from a different perspective, in which this incident is viewed as a black-ops, mind-controlled, "Manchurian Candidate" operation aimed at paving the way towards fascism in the United States and stripping the rights of the citizens of the United States.
Fritz Springmeier's "The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave" has been a very useful tool in understanding the details of how human beings have been systematically turned into machines and robots using many different and complex techniques to turn people into whatever "they" deem necessary. The assassin is a prime example of one of these. "The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave" is located at http://www.whale.to/b/sp/for1.html and in Chapter 4 - 'Science No 4 - Hypnosis Understanding the Basics About Hypnosis' topics like "A. Dissociation, trance, & its historical use", "Keeping the mind dissociative" and "Hypnotic triggers & cues" are discussed. This book and it’s sequel (discussed later) are massive books with tons and tons of detailed information on the processes, programs, organizations, people, and belief systems involved. To really get a sense of how much there is in these books, they really should be printed out. These are reference books to mind control. Springmeier is also the author of “Bloodlines of the Illuminati.” Here is a quote from Chapter 4 of “The Illuminati Formula”:
"Monarch Mind Control Codes Contents:
H. HYPNOTIC INDUCTIONS
I. JANUS-ALEX CALL BACKS (End-times) Main link to a System’s programs to ALEX coded 44334223112. Scramble code to ALEX is 34424313221. Individual code to ALEX = 55434232312. Link to JANUS coded 3323432123. Report back- X441062F Main JANUS tracking/reprogramming code-JAN US 9341 00569XXY99632 [x3]; its back up code X44420-61F. (There is a Janis 2 computer at 666 Connecticut Ave. Washington , D.C. Disinformation by the Network is that the PACER computer equipment is called Janus/Janis)."
If you don't know what this means, that's okay. I highly recommend people read as much as they can of this book as well as "Deeper Insights into the Illuminati Formula" which can be found at http://www.whale.to/b/sp/deep.html Found in "Deeper Insights", and in the "MONARCH MIND-CONTROL CODES" section is:
"I. JANUS-ALEX CALL BACKS (end-times)
END-TIME ACTIVATION CODES
Most slaves have end-time programming. The programming to activate a slave’s end-time programming often runs pages upon pages of coded messages. A number of Monarch slaves have been de-programmed enough that they began accessing and spewing out pages and pages of these activation codes
Some of those systems are Monarch systems of the Theta Model, and many of those in the military are young men of the Illuminati. Some have been seen at NORAD, in Colorado, which helps confirm that Theta models are being employed to bring in the Anti-Christ. (NORAD is a main center for Alex and Janus end-timed programming.)"
"D. DELTA (assassination)
Delta alters --are activated to kill by the following three things: seeing specific clothing, items held in a persons hand, and particular words. Since these items would specific for a particular murder there is no particular specifics that can be given."
Under "HYPNOTIC CODES, CUES AND TRIGGERS" is the following:
"This chapter will provide some more of the hypnotic codes, cues, triggers or whatever one wants to call these words, noises, and sensory inputs that manipulate these poor victims turned into Monarch robots. The reader is encouraged to refer to Vol. 2 for the principle list of codes. Other chapters will explain about the structures these codes go to, and also the spiritual dimensions of these codes and structures."
"From the co-author Fritz Springmeier’s experience, the following is a continuation of favorite code words that have been used to program slaves with:
AARON, ABBY, ABIGAIL, ABLE, ABNER, ABRAHAM, ACACIA. ACE, ADAM, ADELPHI, AGATE, AIR +, ALABASTER, ALADIN, ALBERT, ALFA or ALPHA. ALICE, ALLEY CAT, ALLIGATOR, AMOS, AMY, ANGEL, ANNA, ANTHONY, APACHE, APOLLO, APOSTLE, APPLE +, ARCHER, ARGUS, ARK, ARROW, ASK +, ASTER, ATHANTIS, ATLAS, AUDREY, AURORA. AUTUMN +, AZTEC, B +, BABE, BABY, BACK ROOM, BACK BONE, BAD, BAKER, BALD, BAMBI, BANANA, BANJO, BANKNOTE, BARBARA. BARK, BARON, BEACH +, BEAST, BECKY, BEE HIVE, BEETHOVEN, BELSHAZZER, BERMUDA, BERTHA, BETA, BETSY, BETTY, BEULAH, BEWITCH, BICYCLE, BIG BROTHER, BINGO, BIRD DOG, BIRTHDAY, BLACK, BLACK +, BLACK
SHEEP, BLACK WIDOW, BLANCA, BLONDIE, BLOODHOUND, BLOODY +, BLUE +, BOA. BOB CAT, BOMBAY, BONANZA. BOODLE, BORAX, BOXCAR, BRASS +, BRIDGET, BROOMSTICK, BUCCANEER, BUICK, BULL, BULLDOG, BULLFROG, BUMBLEBEE, BUNNY, BUTTERCUP, BUZZARD, BYRON, T-BIRD, TADPOLE, TALISMAN, TAN, TANGO, TANYA, TARA, TARZAN, TEACUP, TEARDROP, TEEPEE, TERRIER, TERRY, TESTAMENT, THOR, THREE SISTERS, THUNDER, THUNDERBOLT, THUNDERCLAP, THUNDERFLASH, THUNDERSTORM, TIAMET, TIGER, TILLIE, TITAN, TOM CAT, TONI or TONY, TOPAZE, TOPSOIL, TORNADO, TOTENKOPF, TRINITY, TURTLE, UGLY, ULYSSES, UMBRELLA, UNCLE +, UNDERDOG, UNICORN, UNIFORM, URSULA, VAGABOND, VAMPIRE, VANCOUVER, VARSITY, VELVET, VENUS, VERONICA, VICKY, VICTOR, VIKING, VIOLA, VIOLET, VIPER, VIRGINIA VOODOO, VULCAN, VULTURE, WAGON WHEEL, WALDORF,
WALLFLOWER, WANDA. WARRIOR, WASP, WATCHDOG, WEASEL, WHISKEY, WHITE +, WIDOW, WILD CAT, WILLOW, WINNIE, WINTER +, WIZARD, WOLF,
WOLF +, WYOMING, X-FORCE, X-RAY, XYZ, YANKEE, YANKEE DOODLE, YELLOW, YOGI, & YO YO.
The intelligence organizations prefer to code a single project with a single word, and an ongoing operation with two words. A nickname of something will consist of two words. The reader needs to bear several things in mind. First, the programmers generally have intelligent, well sounding codes, that do form patterns. For instance, a woman’s name from the Bible will be used as a code, with subparts or subcodes having other female names from the Bible. Deeper Illuminati parts will have goddess & god names, and king & queen names for cult alters. These are the names the handler or cult uses--NOT their access codes."
"The science of Ciphers developed rotors that require lines to line up. Some simple schemes using this principle appear in some Monarch systems. This is part of the science of structuring. Intelligence codes often come from the Bible or popular fiction books. The deeper codes are occult words, often in foreign languages such as Arabic, which is an important language in the upper occult world. Slaves will be given COVER NAMES for ops, and often males receive female names and vice versa.
The patterns used in programming slaves will represent the world view of the programmer. If the interests of the programmer are known, that will be a major clue to the codes they like to install. For this reason, it would be worthwhile to review the access clearance codes that are used for external security of some agencies, because these same types of clearance codes may be found in mind-controlled slaves."
Did he say biblical and arabic words?
Okay, so if we aren't very familiar with this stuff, that's all right. I suggest doing some reading of both of these books if you are interested. This will tell you more than you'll ever want to know, believe me.
Now, Springmeier just happens to be in PRISON right now due to a charge brought against him some years ago for allegedly being involved in a bombing, and whom many people, including his wife, believe he was framed, given his exposing the deep secrets of mind-control programs and the family histories of those involved. Read all about it at these sites:
Going by this information, it might be a big step to come out and say that "Ismail Ax" is one of these activation codes or triggers that would have caused Cho Seung-Hui to go on his rampage. BUT, there's more.
After doing a Google search on "Ismail Ax" on Tuesday, April 17th, at the time only 2 results popped up. One was the article of www.propagandamatrix.com and another was found at:
The page turned out to contain thousands of seemingly meaningless words and strings of letters.
"ismail Ax NN-NNP" was one of these. If this page is still available, please go and see for yourself. Compare this to the Springmeier material. Notice the similarities. The site turns out to be at Carnegie Mellon’s School of Computer Science website.
But that's not it.
After my suspicions grew and grew, I decided to download random documents from the site and see if I could find anything incriminating. After reading a few documents, it seemed to me that what this was about was Machine translations of languages, involving very complex linguistic and computer programming coding used for instantaneous language translation between computers or people.
Then I found a document entitled "Domain-limited Interlingua-based Speech Translation" at:
Here is the beginning of this document:
"Evolution of Domain-limited Interlingua-based MT at CMU
The Interactive System Labs (ISL) and the Language Technologies Institute (LTI) at Carnegie Mellon have been pursuing an ongoing research effort over the past fifteen years to develop machine translation systems specifically suited for spoken dialogue. The JANUS-I system (Woszczyna et al., 1993) was developed at Carnegie Mellon University and the University of Karlsruhe in conjunction with Siemens in Germany and ATR in Japan. JANUS-I translated well-formed read speech in the conference registration domain with a vocabulary of 500 words. Advances in speech recognition and robust parsing over the past ten years then enabled corresponding advances in spoken language translation. The JANUS-II translation system (Waibel et al., 1996), taking advantage of advances in robust parsing (Carroll, 1996; Lavie, 1996), operated on the spontaneous scheduling task (SST) -- spontaneous conversational speech involving two people scheduling a meeting with a vocabulary of 3,000 words or more. JANUS-II was developed within the framework of an international consortium of six research groups in Europe, Asia and the U.S., known as C-STAR (http://www.cstar.org). A multi-national public demonstration of the system capabilities was conducted in July, 1999. More recently, the JANUS-III system made significant progress in large vocabulary continuous speech recognition (Woszczyna, 1998) and significantly expanded the domain of coverage of the translation system to spontaneous travel planning dialogues (Levin et al, 2000), involving vocabularies of over 5,000 words. The NESPOLE! System (Lavie et al, 2001, Lavie et al, 2002) further extended these capabilities to speech communication over the internet, and developed new trainable methods for language analysis that are easier to port to new domains of interest. These were demonstrated via a prototype speech-translation system developed for the medical assistance domain. The language processing technology developed within the JANUS-III and NESPOLE! Systems were also incorporated into portable platforms such as the LingWear system and the Speechalator, developed for the DARPA Babylon Program."
Recognize the JANUS system from anywhere? Look at the Springmeier quotes again and see. Do you think this might be the SAME JANUS system? I'm willing to bet a lot right now. Carnegie Mellon and others seem to be involved in the same system Springmeier was talking about. The "DARPA Babylon Program" is also very suspicious sounding as well.
Apparently, Virginia Tech has been an “active” partner with DARPA:
Strange Virginia Tech “Coincidences”
“Janus” is also in "Mind Controlled Killers: What happened at Columbine High School? Was O.J. Simpson innocent? In Defense of Buford Furrow Jr.!" at:
At the very end of the article is this:
"The super-secret Janus Group utilizes very highly-trained psychic assassins, who employ such techniques as the green and red marble systems, as well as the White Glove method. In order to psychically kill enemies of the Illuminati. The Director of Janus (an Illuminatus) wields more political clout than the hierarchy of the National Security Agency. He was an intimate friend of the late Roy Cohn -- a director of Permindex, the group which masterminded the assassination of President John Kennedy. As a cover for his covert activities, he also performs the role of a talk-show host. he has a tendency to drag a pen across the forehead of mind-controlled assassins, when implanting new assassination programs. Now that the programming of several of his assassins has broken down, he will probably face sever punishment at the hands of the Illuminati for ineptitude."
This is a quote from “The Biggest Secret” by David Icke:
“Belgium, this little country between France and the Netherlands, is also the home of the European Union, NATO, and, I am told, a massive computer centre where databases on all the people of the world are being compiled. It is known apparently as ‘the Beast’ and there are a number of these around the world. An Elite mind control operation called the Janus Group is also based in the NATO headquarters.”
A link to the page this quote appears on is:
Now, call me crazy, but I think that THIS IS NOT ONE BIG COINCIDENCE. I then did some looking around, and not surprisingly, I didn't find much on the Janus system. Here is what I did find:
Bios on Alex Waibal, Director of Interactive System Labs (ISL) and one of the founders of C-STAR:
which don't really tell much, except at http://www.janusiii.com/ there is a good bit of friendly Freemason symbolism, oddly enough.
It is my theory that “Ismail Ax” directly connects to the JANUS-ISL-C-STAR global network technologies employed in these covert operations, used quite possibly as an activation code/trigger. Just like previous school attackers, especially at Columbine, Cho Seung-Hui was also another black-ops mind-controlled assassination slave who was more disturbed than anyone could know and had a life that you and I should thank God we never had to live.
Article received from: Ishmael
Virginia School Shooting: Another Government Black-Op?
Chicago Tribune: Cho Seung Hui, Danger signs festered below aloof surface
Latest News from our Front Page
Recent Israeli Synagogue Attack, a Possible False Flag?
2014 11 21
Dear Friends - I woke up yesterday morning to see a newspaper lying on the kitchen table with the front page proclaiming that five people were slain in an Israeli synagogue after a so-called "Palestinian attack." Some members of the media said that four people were killed, others said five, so it seems like that there was some confusion (or ...
The Michael Brown Shooting, Race Baiting for Political Power and Militarization of the Police
2014 11 21
From Youtube: The evidence clearly shows that Officer Darren Wilson was justified in shooting Michael Brown, so why is this case being hyped by the mainstream media and the leftist political establishment?
Ancient Aryan Mummies and Pyramids of China
2014 11 21
After years of controversy and political intrigue, archaeologists using genetic testing have proven that Caucasians roamed China’s Tarim Basin thousands of years before East Asian people arrived.
The research, which the Chinese government has appeared to have delayed making public out of concerns of fueling Uighur Muslim separatism in its western-most Xinjiang region, is based on a cache of ancient dried-out ...
Detekt: A New Malware Detection Tool That Can Expose Illegitimate State Surveillance
2014 11 21
Recent years have seen a boom in the adoption of surveillance technology by governments around the world, including spyware that provides its purchasers the unchecked ability to target remote Internet users’ computers, to read their personal emails, listen in on private audio calls, record keystrokes and passwords, and remotely activate their computer’s camera or microphone. EFF, together with Amnesty International, ...
New UK spy chief says tech giants aid terrorism, privacy not ‘absolute right’
2014 11 21
Robert Hannigan, the new head of GCHQ
The new head of Britain’s GCHQ, the UK equivalent of the NSA in the U.S., said he believes privacy is not an absolute right and that tech giants must open themselves up to intelligence agencies.
“GCHQ is happy to be part of a mature debate on privacy in the digital age,” Hannigan said. “But privacy ...
|More News » |