Want more features on Pastebin? Sign Up, it's FREE!
Guest

Be ready... #231134421

By: a guest on Oct 31st, 2013  |  syntax: None  |  size: 17.59 KB  |  views: 115  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1. Just copied this from here so that it will not disappear: http://bitbin.it/2oft9RLS
  2.  
  3. Be ready .... 231134421
  4.  
  5. code:
  6. Artifact TET incoming.Log:................................................................................................................................................................................................................................................................................................................................................................L1 QIA Query::::>>>>INSERT (TALK 1-5) <> Do you have any evidence**** (name)****?<>>>>>INSERT (TALK 6-9) <> Do you think the government is doing a good job**** (name)****?<>?<>>>>>INSERT (TALK 10-15) <> Do you think this is real**** (name)****?<>?<>>>>>INSERT (TALK 16-21) <> What is your opinion on (T-WORD) **** (name)****?<>?<>GREEN A. Threat to NSEC? (SP0200) B. QIA + Trigger word (GOTO T-WORD) C. SAURON (T/T) /BULLRUND. Threat potential - OCONUS Y=1 or N=0 ( HOAX / SHILL/FF protocol (App vi))IF GREEN &#8805; 1 EscalateE. IFB TW OSM/IRC(NEW) (1-4)F. Employment/ Finances/ Family/Relations/Neighbors IF GREEN &#8805; 2 GOTO AMBER ///////////// T-WORD ///////////////////////////////////////(5D+FOAM+ FUSION(~)+CODE+TIME+GODS+LIVING+INVASION+YELLOW+WATER+ISON+EPIDEMIC+OWNERS (Run T-Book Update now))AMBERA. GREEN+ T-WORD context correct? Y=1 or N=0 B. Server check -SIGINTC. Ip =AIRHANDLER + MARINA D. Credible? Y=1 or (N=0 GREEN - Refresh 1 week)E. Allow QAI protocol ELEVATION? Y=1 or N=0F. Use Targeted BACKDOOR- XOS and MOS (LEO with NSA oversight)>>>>>>>>>>>>>If AMBER &#8805; 2 GOTO RED>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> RED –Notify CSOA. L-Code detected? MABUS / NOTIFY SUPERVISOR-CODE BLACK (F2 standby)**************B. Temporal disturbance? NOTIFY SUPERVISOR -CODE BLACK (F1 and F2 standby)C. Has QAI (E) detected a fractal? NOTIFY SUPERVISOR-CODE BLACK(F2 standby)*******D. Probable Traveller or NSB? NOTIFY SUPERVISOR -CODE BLACK (F1 and F2 standby)E. Check NUCLEON/FALLOUT (Dual-Route)F. QAI (E) = 90% +?(F1 and F2 standby)G. Confirm TEST / NO TEST.‘’’’::::::::::::::::::::::::::::::::///////////////////////////////TEST.....NO TEST////////////////////////////////////////::::::::::::::::1/ TEST + NO- GREEN - END 2/ NO TEST+YES - Escalate - NOTIFY SUPERVISOR -CODE BLACK (F1 and F2 imminent)CODE BLACK +MABUS A. QAI (E) –90% +?B. Traveller /Human / NSB/ L-Code?D. OODA / MAUI E. A-D = YES - ALERT C3 / COMINT >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>..F. QAI (E) BK - up-link-R/T1. Human/Traveller (4) - TEAM 1 (Dam Neck<>) – Run C/S and DRILL protocol (Notify PR)2. L-Code/NSB - TEAM 2 (Pent 225 ext 7) Is EMP / BACKDOOR required? (Pent 225 ext 7)3. FEMA on stand by ? (Pent 227 ext 311) Run C/S and DRILL protocol (Notify PR)4. Can (1 / 2 ) be contained? (5)A/ Yes – PR + FF– return to GREEN – Pass to Monitoring TeamB/ No – QAI (E) still at 90% +?>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>LEVEL 5 EXPOSURE>>>>>>>>>>> Do all LEVEL 5 Supervisors agree?>>>>>>>>>>QAI (E) agree?>>>>>>>>Initiate ***F1*****F2******F3***>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>C/ Human/Traveller -Is martial law required? Activate FF+ EAN / EBS + LOCKDOWN (//****//)L-Code/NSB – Deploy BACKDOOR world wide (FEMA + LOCKDOWN+ FF)APP (//*****//) -..........>>>>>>>>>>>>>>>>>>>,,,,,<<<<<<<<<Invasion Protocol (IVP) – F1Containment Protocol (CP) – F2Evacuation Protocol (EP) – F3>>>>>>>>>>>>>>>>>(1) FISC 1 (Not FISC 2 unless > 1 hr) (2) T132 + T133 (3) E-1&#8486;*************((((((((((((((((()))))))))))))))))))))))****************FF -projected- fv-11dbbcfddvvcjvfffv-bullrun-12bwhshdd-vbn ffb-ecncduduc-maui-ncncdssxx-fff-dd—ddde-27bddbsssdddd-25-35% dead-ffndddudud--dard-e4r5gvcvv-darpa-eyryrtetsfwl oboe-casualties %%%-hfhfhfhdreeied-errorprint---dhfywwmdjf-ffdeowrbddd-lcode-erroefnwnixcd-esdbese-frac-dwwwucmzpwebc
  7.  
  8.  
  9. decoded:
  10. Log:................
  11.  
  12. L1 QIA Query:::: >>>>INSERT (TALK 1-5) <> Do you have any evidence**** (name)****?<> >>>>INSERT (TALK 6-9) <> Do you think the government is doing a good job**** (name)****?<>?<> >>>>INSERT (TALK 10-15) <> Do you think this is real**** (name)****?<>?<> >>>>INSERT (TALK 16-21) <> What is your opinion on (T-WORD) **** (name)****?<>?<>
  13.  
  14. GREEN A. Threat to NSEC? (SP0200) B. QIA + Trigger word (GOTO T-WORD) C. SAURON (T/T) /BULLRUN D. Threat potential - OCONUS Y=1 or N=0 ( HOAX / SHILL/FF protocol (App vi)) IF GREEN &#8805; 1 Escalate E. IFB TW OSM/IRC(NEW) (1-4) F. Employment/ Finances/ Family/Relations/Neighbors IF GREEN &#8805; 2 GOTO AMBER
  15.  
  16. T-WORD (5D+FOAM+ FUSION(~)+CODE+TIME+GODS+LIVING+INVASION+YELLOW+WATER+ISON+EPIDEMIC+OWNERS (Run T-Book Update now))
  17.  
  18. AMBER A. GREEN+ T-WORD context correct? Y=1 or N=0 B. Server check -SIGINT C. Ip =AIRHANDLER + MARINA D. Credible? Y=1 or (N=0 GREEN - Refresh 1 week) E. Allow QAI protocol ELEVATION? Y=1 or N=0 F. Use Targeted BACKDOOR- XOS and MOS (LEO with NSA oversight) If AMBER &#8805; 2 GOTO RED
  19.  
  20. RED –Notify CSO A. L-Code detected? MABUS / NOTIFY SUPERVISOR-CODE BLACK (F2 standby)************** B. Temporal disturbance? NOTIFY SUPERVISOR -CODE BLACK (F1 and F2 standby) C. Has QAI (E) detected a fractal? NOTIFY SUPERVISOR-CODE BLACK(F2 standby)******* D. Probable Traveller or NSB? NOTIFY SUPERVISOR -CODE BLACK (F1 and F2 standby) E. Check NUCLEON/FALLOUT (Dual-Route) F. QAI (E) = 90% +?(F1 and F2 standby) G. Confirm TEST / NO TEST.
  21.  
  22. TEST 1/ TEST + NO- GREEN - END 2/ NO TEST+YES - Escalate - NOTIFY SUPERVISOR -CODE BLACK (F1 and F2 imminent)
  23.  
  24. CODE BLACK +MABUS A. QAI (E) –90% +? B. Traveller /Human / NSB/ L-Code? D. OODA / MAUI E. A-D = YES - ALERT C3 / COMINT >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>.. F. QAI (E) BK - up-link-R/T 1. Human/Traveller (4) - TEAM 1 (Dam Neck<>) – Run C/S and DRILL protocol (Notify PR) 2. L-Code/NSB - TEAM 2 (Pent 225 ext 7) Is EMP / BACKDOOR required? (Pent 225 ext 7) 3. FEMA on stand by ? (Pent 227 ext 311) Run C/S and DRILL protocol (Notify PR) 4. Can (1 / 2 ) be contained? (5) A/ Yes – PR + FF– return to GREEN – Pass to Monitoring Team B/ No – QAI (E) still at 90% +?
  25.  
  26. >LEVEL 5 EXPOSURE Do all LEVEL 5 Supervisors agree?>>>>>>>>>>QAI (E) agree? >>>>>>>>Initiate ***F1*****F2******F3*** C/ Human/Traveller -Is martial law required? Activate FF+ EAN / EBS + LOCKDOWN (//****//) L-Code/NSB – Deploy BACKDOOR world wide (FEMA + LOCKDOWN+ FF)
  27.  
  28. APP Invasion Protocol (IVP) – F1 Containment Protocol (CP) – F2 Evacuation Protocol (EP) – F3 (1) FISC 1 (Not FISC 2 unless > 1 hr) (2) T132 + T133 (3) E-1&#8486;
  29.  
  30. projected-25-35% dead-darpa-casualties %%%-errorprint
  31.  
  32.  
  33.  
  34.  
  35.  
  36. --------------------------------------------------------------------------------------------------------------------------
  37. The original site: http://www.231134421.com/
  38.  
  39. (The site plays a video continuously: "http://www.youtube.com/watch?v=pTL6BwCqjds")
  40.  
  41. (The site has the text: "#231134421. BE READY." on it.)
  42.  
  43. (Clicking the boat changes the site to "http://www.231134421.com/#", but nothing changes.)
  44.  
  45. (Also noteworthy is that there are links to social networking sites, like "Twitter", "Facebook", "Google Plus" and "Pinterest".)
  46.  
  47. Whois: http://www.whois.net/whois/231134421.com/
  48.  
  49. Whois reveals nothing, except that the site is hosted by 1&1.
  50.  
  51. "Decoder": Searching the text "#231134421" on DuckDuckGo reveals the site: "http://decoder.moy.su/index/0-26", which reveals "Codes to all the various basic systems".
  52.  
  53. The page (and codes) seem to be about "Monarch programming"; "programming" a human being to play certain "roles" in society.
  54.  
  55. The different programs seem to be about the "masters" and the "slaves". The programs "slaves" follow, seems to differ for each "slave", since every "slave" undergoes the PAS (Personality Assessment System). They get a different role based on the three differentiations. [See PAS in the "Programs:" section for more information]
  56.  
  57. Codes to all the various basic systems: CAROUSEL 532342223 CASTLE SYSTEM 221435321 COMMUNICATION 311146623 DOUBLE HELIX 432443321 LEVEL 211343231 MENSA SYSTEM 323542321 PENTAGRAM 421136113 POOL OF DEATH 231134421 (Seems to be important somehow?) PUPPET 341124321 SOLE METRIC 665421134 SPIDER WEB 321654321 STAIRWELL 432111132 QUABALA 423454334 TORNADO 332146444 UMBRELLA SYSTEM 314321014
  58.  
  59. The code & aberration underlaying leukemia is: "it turns my blood to water"
  60.  
  61. YATRUS (Heliatros, Iatrox, Iahu, Haoo, etc) deceitful encodings within Lambda (in phi-lambda-theta Conversion Program) as postulates were:
  62.  
  63. "You and I Forever" "We are so Good, Clean and Pure that We shan't Ever Part"
  64.  
  65. Programs:
  66.  
  67. ALICE IN WONDERLAND PROGRAM The White Rabbit is a programming figure for Alice in Wonderland programming who will allow you to go to otherwise inaccessible places for adventure He represents the master The White Rabbit is an important figure to the slave White rabbit gives a wafer (coke-sugar-cocaine) to Alice and says "EAT ME" or "EAT IT AND I'LL TAKE YOU THROUGH THE DOOR" --takes master into closed part of System, or perhaps over the rainbow The Queen of Hearts is also an important figure for commands in the Looking Glass World which the slave enters upon command When a deep slave alter is needed to perform they are sent into the looking glass world where a looking glass person carries out the command--but in a way that reality is thought to be a dream In other words, this is a preparatory command to the slave ready for abuse
  68.  
  69. >  USE THE KEY  PUT IT IN THE LOCK  TURN  OPEN THE DOOR  AND STEP THROUGH A WINDOW (or MIRROR) INTO NEVER NEVER LAND
  70.  
  71. >  SOMETHING IS LIGHTENING TO TRANSPORT YOU FASTER THEN THE OL'RUBY SLIPPERS  CLICK YOUR HEELS TOGETHER AND BE THERE IN A SNAP (slave clicks heels) ELECTRIFYING ....WITH THE RUMBLE OF THUNDER BOLTING THROUGH TIME....SO YOU WON'T BE LATE....FOR A VERY IMPORTANT DATE (Alice in Wonderland programming) <-- this is a wording to use deep alters
  72.  
  73. CINDERELLA PROGRAM
  74.  
  75. (The code word involves something said about the stroke of midnight)
  76.  
  77. THE MELTING POT PROGRAM
  78.  
  79. A very powerful program is activated by melting the slave into his master The slave will do anything for the master with this program The melting is the ecstasy that is occasionally experienced when lovers having sex seem to melt into each other This feeling of ecstasy-melting is programmed to release when the master says these words:
  80.  
  81. >  MELT INTO YOUR MELTED MIRROR FOR AN ELECTRIFYING RIDE  LOOK DEEP INTO THE BLACK OF MY MELTING MIRROR EYES  SEE YOU REFLECTING ME, REFLECTING YOU REFLECTING ME, REFLECTING YOU, REFLECTING ME,  REFLECTING YOU, REFLECTING ME, REFLECTING YOU, REFLECTING ME, REFLECTING YOU, REFLECTING ME, REFLECTING YOU.... UNTIL WE MELT TOGETHER AND SINK DEEP...(words omitted) INTO THE OTHER SIDE
  82.  
  83. >  MELT INTO MY MIRROR, YOU LOOSE YOURSELF INTO THE POOL OF LIQUID MIRROR, STEP INTO THE LOOKING GLASS, SINK DEEP WITHIN ITS POOL, AND STRADDLE THE DIMENSIONS IN TIME  I'LL SEE YOU THERE....ALONG WITH MY FRIENDS
  84.  
  85. >  SEE IT THROUGH THE LOOKING GLASS --infinity mirror programming involving mirror image people (alters)
  86.  
  87. >  LOSE YOURSELF IN THE INFINITY MIRRORS
  88.  
  89. WIZARD OF OZ PROGRAM
  90.  
  91. The Yellow Brick Road is the script or programmed set of instructions one must follow It also serves as a runway for alters to take off from their internal world and take the body ->
  92.  
  93. >  FOLLOW THE YELLOW BRICK ROAD  
  94.  
  95. There is a code to get through the poppy field (trance state) Some alters to get through the poppy field need to put on a new dress and a new image The poppy field may be called "the field of forget-me-not" In this way it is linked to the daisies of Dr Green To get into the poppy field is easy, it is "SLEEP, SLEEP, SLEEP", see other instruction methods on another page
  96.  
  97. >  THERE'S A PAIR OF MAGIC SHOES TO WEAR WITH YOUR DRESS...SOMETHING IS LIGHTNING...TO TRANSPORT YOU FASTER THAN THE OL'FURRY SLIPPERS
  98.  
  99. When the slave is finished being used they return from Never Never Land to... To do this they are told: "CLICK YOUR HEELS...THERE'S NO PLACE LIKE HOME" They might be reminded "YOU'RE NOW GOING OVER THE RAINBOW TO THE OTHER WORLD"
  100.  
  101. TIN MAN PROGRAM
  102.  
  103. The Tin Man programming is all purpose versatile program for what ever the master needs done, it means that the slave is a well oiled maschine Sometimes the slave is reluctant to do a job but he is being told that he is a well oiled machine The exact words may wary with the mission, but the following are exact words:
  104.  
  105. >  LEAVE YOUR SHELL  ACTIVATE: MACHINE  COUNT DOWN ONE TO TIN  > SOON WE'LL HAVE YOU PURRING LIKE A WELL OILED MACHINE ALL OF YOUR MOVING PARTS ARE PIVOTAL AND GLIDING WITH EASE MELT INTO MY HANDS TAKE MY COMMANDS I'LL HOLD YOUR JAW TO KEEP IT FROM SLIPPING WHILE YOU SLIP THROUGH A WINDOW IN TIME
  106.  
  107. Program code for slave to shatter their memory of an event (used with elecroshock) ->
  108.  
  109. >  MIRROR MIRROR ALL AROUND ON THE CEILING ON THE GROUND, SPINNING FASTER ROUND AND ROUND  ARE YOU UP OR ARE YOU DOWN?  ARE YOU DOWN OR ARE YOU UP?  IT REALLY DOESN'T MATTER  BECAUSE WHEN THIS MIRROR BUBBLE BURSTS, EVERYTHING WILL SHATTER
  110.  
  111. >  GO WEST WEST IS KEY -- several slaves have this code, related to Sen. Byrd & Oz programming  In upper level Illuminati slaves Dorothy in the Oz story will represent the Mother of Darkness alters, Ozma will represent the Ruler of the Castle, and Glinda will have the Great Book of Records  The ring of Glinda (from Glinda of Oz, p 16) gives protection
  112.  
  113. PAS (Personality Assessment System) This is an extraordinary method to evaluate human behavior and predict their future behavior As far as we know, most of the PAS is still classified SECRET The PAS is based on the ability to differentiate different types of people There are 3 major differentiations (or dimensions) They are called:
  114.  
  115. E-I /dimension R-F /dimension A-U /dimension
  116.  
  117. People are born with their original placement within each of these three spectrums In other words there are 3 axes that can be graphed to describe a baby's personality The baby might me graphed-- I (Internalizer), F (Flexible) and A (Role Adaptive) If the baby were graphed this way (i.e. I-F-A), then the Programmers would automatically know this child's mind will become a social or religious reformer The child's programming chart would then be labelled some suitable occupation such as "Environmental Activist", "Pentecostal church reformer", "Consumer Advocate", or "Activist against Narcotics" The programming of that child then would follow 6 month goals to develop that mind-controlled slave into one of the best in that occupation
  118.  
  119. In the book Moonchild, the villa used to produce a Moonchild was called "The-Butter-fly-Net" The Monarch Project then which is named after the Monarch Butterfly is also an allusion to the Moonchild where Butterflies are an allusion to souls
  120.  
  121. PTSD (post-traumatic stress disorder)
  122.  
  123. PTDS are the psycho-pathic debilitating effects of trauma and chronic nature of reactions to trauma Intrusive flashbacks of the trauma will occur if the mind doesn't protect itself from reminders of the trauma The mind creates avoidance patterns to protect itself from thinking about the trauma Panic symptoms occur when the person undergoes physiological arousal to traumatic cues A trauma will create certain "shatteredness" within the victim The victim will develop life assumptions about being vulnerable, about having little personal worth, and that life is not fair They may develop phobias to costantly check their environment for safety and constantly monitor others to make sure they are not mistreated \cut\
  124.  
  125. \uncut\
  126.  
  127. TYPES OF TRAUMA IN MONARCH PROGRAMMING
  128.  
  129. One thing discovered by the research into genetic transmission of learned knowledge by humans to their children was that people are born with certain fears Snakes, blood, seeing internal body parts, and spiders are all things that people are born fearing The phobias toward these things are passed down genetically from one generation to another In searching for traumas to apply to little children, the Programmers found that these natural phobias which occur in most people from birth will work "wonderful" to split the mind Along this line, the following are samples of traumas done to program slaves:
  130.  
  131. a. being locked in a small confined spot, a pit or cage with spiders and snakes; b. being forced to kill, and cut up and eat innocent victims; c. immersion into feces, urine and containers of blood
  132.  
  133. The being made to eat these things These are standard traumas Often a slave will experience not only all of the above but many others before they reach 4 or 5 years of age It is important to traumatize the child early before it has a chance to develop its ego states
  134.  
  135. (materials in preparation - admin)
  136.  
  137. "Illuminati": Searching the text "#231134421" on Google reveals the forum: "http://www.godlikeproductions.com/forum1/message2396309/pg1"
  138.  
  139. The title of the thread is: "POOL OF DEATH - #231134421 MONARCH ACTIVATION CODES <o><o>", which means that (if the poster "INTERNETWORK" is right) the code used in the original site means: "POOL OF DEATH".
  140.  
  141. The user INTERNETWORK claims he is an Illuminati Orientation Manager (The one who is responsible for the introduction of new members into the outer ring of the Illuminati super-structure.)
  142.  
  143. He also claims that the hashtag is a code for Monarch. He also says that "A clone program creates clones of an alter (also called lollipop or lobster program)".
  144.  
  145. He then posts some codes to all the various basic systems, which are listed in the "decoder" section.
  146.  
  147. After that, he says: "Anyway, yes, there will be an event in NYC", "Better get your snorkel and canned Chicken of the Sea", "" and "PS This is such a weird time to be alive...".
clone this paste RAW Paste Data