By Matt S.
April 18, 2007
Hello Mr. Adachi,
I just wanted to share an article I wrote about the Va Tech massacre that focusses
on the mysterious "Ismail Ax" ecscribed on the arm of Cho. There some really
interesting coincidences in it and I have referenced Fritz Springmeier's work as well.
"Ismail Ax" and the Latest Mind-Controlled Assassin
This article, I believe, will bring some light to the VA Tech massacre that took
place on the morning of April 16, 2007 and took 33 lives, including the assassin,
Cho Seung-Hui, himself. Two words, "Ismail Ax," were written in red ink on the arm
of Cho Seung-Hui. "Ismail" is the Arabic version of the name "Ishmael", the brother
of Isaac, son of Abraham, and regarded as the forefather of Islam. Because I have
the same name, I immediately became interested in this subject.
The purpose of this article is to explain the significance of "Ismail Ax" from a
different perspective, in which this incident is viewed as a black-ops,
mind-controlled, "Manchurian Candidate" operation aimed at paving the way towards
fascism in the United States and stripping the rights of the citizens of the United
Fritz Springmeier's "The Illuminati Formula Used to Create an Undetectable Total
Mind Controlled Slave" has been a very useful tool in understanding the details of
how human beings have been systematically turned into machines and robots using many
different and complex techniques to turn people into whatever "they" deem necessary.
The assassin is a prime example of one of these. "The Illuminati Formula Used to
Create an Undetectable Total Mind Controlled Slave" is located at http://educate-yourself.org/mc/IlluminatiFormulaindex.shtml and in Chapter 4 - 'Science No 4 - Hypnosis
Understanding the Basics About Hypnosis' topics like "A. Dissociation, trance, & its
historical use", "Keeping the mind dissociative" and "Hypnotic triggers & cues" are
discussed. This book and it's sequel (discussed later) are massive books with tons
and tons of detailed information on the processes, programs, organizations, people,
and belief systems involved. To really get a sense of how much there is in these
books, they really should be printed out. These are reference books to mind
control. Springmeier is also the author of "Bloodlines of the Illuminati." Here is
a quote from Chapter 4 of The Illuminati Formula:
"Monarch Mind Control Codes Contents:
H. HYPNOTIC INDUCTIONS
I. JANUS-ALEX CALL BACKS (End-times) Main link to a System?s programs to ALEX coded
44334223112. Scramble code to ALEX is 34424313221. Individual code to ALEX =
55434232312. Link to JANUS coded 3323432123. Report back- X441062F Main JANUS
tracking/reprogramming code-JAN US 9341 00569XXY99632 [x3]; its back up code
X44420-61F. (There is a Janis 2 computer at 666 Connecticut Ave. Washington , D.C.
Disinformation by the Network is that the PACER computer equipment is called
If you don't know what this means, that's okay. I highly recommend people read as
much as they can of this book as well as "Deeper Insights into the Illuminati
Formula" which can be found at http://www.whale.to/b/sp/deep.html Found in "Deeper
Insights", and in the "MONARCH MIND-CONTROL CODES" section is:
"I. JANUS-ALEX CALL BACKS (end-times)
END-TIME ACTIVATION CODES
Most slaves have end-time programming. The programming to activate a slave's
end-time programming often runs pages upon pages of coded messages. A number of
Monarch slaves have been de-programmed enough that they began accessing and spewing
out pages and pages of these activation codes
Some of those systems are Monarch systems of the Theta Model, and many of those in
the military are young men of the Illuminati. Some have been seen at NORAD, in
Colorado, which helps confirm that Theta models are being employed to bring in the
Anti-Christ. (NORAD is a main center for Alex and Janus end-timed programming.)"
"D. DELTA (assassination)
Delta alters --are activated to kill by the following three things: seeing specific
clothing, items held in a persons hand, and particular words. Since these items
would specific for a particular murder there is no particular specifics that can be
Under "HYPNOTIC CODES, CUES AND TRIGGERS" is the following:
"This chapter will provide some more of the hypnotic codes, cues, triggers or
whatever one wants to call these words, noises, and sensory inputs that manipulate
these poor victims turned into Monarch robots. The reader is encouraged to refer to
Vol. 2 for the principle list of codes. Other chapters will explain about the
structures these codes go to, and also the spiritual dimensions of these codes and
"From the co-author Fritz Springmeier's experience, the following is a continuation of favorite code words that have been used to program slaves with:
The intelligence organizations prefer to code a single project with a single word,
and an ongoing operation with two words. A nickname of something will consist of two
words. The reader needs to bear several things in mind. First, the programmers
generally have intelligent, well sounding codes, that do form patterns. For
instance, a woman's name from the Bible will be used as a code, with subparts or
subcodes having other female names from the Bible. Deeper Illuminati parts will have
goddess & god names, and king & queen names for cult alters. These are the names the handler or cult uses--NOT their access codes."
"The science of Ciphers developed rotors that require lines to line up. Some simple
schemes using this principle appear in some Monarch systems. This is part of the
science of structuring. Intelligence codes often come from the Bible or popular
fiction books. The deeper codes are occult words, often in foreign languages such as
Arabic, which is an important language in the upper occult world. Slaves will be
given COVER NAMES for ops, and often males receive female names and vice versa.
The patterns used in programming slaves will represent the world view of the programmer. If the interests of the programmer are known, that will be a major clue to the codes they like to install. For this reason, it would be worthwhile to review
the access clearance codes that are used for external security of some agencies, because these same types of clearance codes may be found in mind-controlled slaves."
Did he say biblical and arabic words?
Okay, so if we aren't very familiar with this stuff, that's all right. I suggest
doing some reading of both of these books if you are interested. This will tell you
more than you'll ever want to know, believe me.
Now, Springmeier just happens to be in PRISON right now due to a charge brought
against him some years ago for allegedly being involved in a bank robbery and whom many
people, including his wife, believe he was framed, given his exposing the deep
secrets of mind-control programs and the family histories of those involved. Read
all about it at these site:
Going by this information, it might be a big step to come out and say that "Ismail
Ax" is one of these activation codes or triggers that would have caused Cho
Seung-Hui to go on his rampage. BUT, there's more.
After doing a Google search on "Ismail Ax" on Tuesday, April 17th, at the time only
two results popped up. One was the article of www.propagandamatrix.com and another was
The page turned out to contain thousands of seemingly meaningless words and strings
of letters."ismail Ax NN-NNP" was one of these. If this page is still available, please go and
see for yourself. Compare this to the Springmeier material. Notice the similarities.
The site turns out to be at Carnegie Mellon's School of Computer Science website.
But that's not it.
After my suspicions grew and grew, I decided to download random documents from the
site and see if I could find anything incriminating. After reading a few documents,
it seemed to me that what this was about was Machine translations of languages,
involving very complex linguistic and computer programming coding used for
instantaneous language translation between computers or people.
Then I found a document entitled "Domain-limited Interlingua-based Speech
"Evolution of Domain-limited Interlingua-based MT at CMU
The Interactive System Labs (ISL) and the Language Technologies Institute (LTI) at
Carnegie Mellon have been pursuing an ongoing research effort over the past fifteen
years to develop machine translation systems specifically suited for spoken
dialogue. The JANUS-I system (Woszczyna et al., 1993) was developed at Carnegie
Mellon University and the University of Karlsruhe in conjunction with Siemens in
Germany and ATR in Japan. JANUS-I translated well-formed read speech in the
conference registration domain with a vocabulary of 500 words. Advances in speech
recognition and robust parsing over the past ten years then enabled corresponding
advances in spoken language translation. The JANUS-II translation system (Waibel et
al., 1996), taking advantage of advances in robust parsing (Carroll, 1996; Lavie,
1996), operated on the spontaneous scheduling task (SST) -- spontaneous
conversational speech involving two people scheduling a meeting with a vocabulary of
3,000 words or more. JANUS-II was developed within the framework of an international consortium of six research groups in Europe, Asia and the U.S., known as C-STAR (http://www.cstar.org). A multi-national public demonstration of the system
capabilities was conducted in July, 1999. More recently, the JANUS-III system made
significant progress in large vocabulary continuous speech recognition (Woszczyna,
1998) and significantly expanded the domain of coverage of the translation system to
spontaneous travel planning dialogues (Levin et al, 2000), involving vocabularies of
over 5,000 words. The NESPOLE! System (Lavie et al, 2001, Lavie et al, 2002) further
extended these capabilities to speech communication over the internet, and developed
new trainable methods for language analysis that are easier to port to new domains
of interest. These were demonstrated via a prototype speech-translation system
developed for the medical assistance domain. The language processing technology
developed within the JANUS-III and NESPOLE! Systems were also incorporated into
portable platforms such as the LingWear system and the Speechalator, developed for the DARPA Babylon Program."
Recognize the JANUS system from anywhere? Look at the Springmeier quotes again and
see. Do you think this might be the SAME JANUS system? I'm willing to bet a lot
right now. Carnegie Mellon and others seem to be involved in the same system
Springmeier was talking about. The "DARPA Babylon Program" is also very suspicious
sounding as well.
Apparently, Virginia Tech has been an "active" partner with DARPA:
"The super-secret Janus Group utilizes very highly-trained psychic assassins, who employ such techniques as the green and red marble systems, as well as the White Glove method. In order to psychically kill enemies of the Illuminati. The Director
of Janus (an Illuminatus) wields more political clout than the hierarchy of the National Security Agency. He was an intimate friend of the late Roy Cohn -- a
director of Permindex, the group which masterminded the assassination of President
John Kennedy. As a cover for his covert activities, he also performs the role of a
talk-show host. he has a tendency to drag a pen across the forehead of
mind-controlled assassins, when implanting new assassination programs. Now that the
programming of several of his assassins has broken down, he will probably face sever punishment at the hands of the Illuminati for ineptitude."
This is a quote from "The Biggest Secret" by David Icke:
"Belgium, this little country between France and the Netherlands, is also the home
of the European Union, NATO, and, I am told, a massive omputer centre where
databases on all the people of the world are being compiled. It is known apparently as "the Beast" and there are a number of these around the world. An Elite mind control operation called the Janus Group is also based in the NATO headquarters."
which don't really tell much, except at http://www.janusiii.com/ there is a good bit
of friendly Freemason symbolism, oddly enough.
It is my theory that "Ismail Ax" directly connects to the JANUS-ISL-C-STAR global
network technologies employed in these covert operations, used quite possibly as an
activation code/trigger. Just like previous school attackers, especially at
Columbine, Cho Seung-Hui was also another black-ops mind-controlled assassination
slave who was more disturbed than anyone could know and had a life that you and I
should thank God we never had to live.
All information posted on this web site is
the opinion of the author and is provided for educational purposes only.
It is not to be construed as medical advice. Only a licensed medical doctor
can legally offer medical advice in the United States. Consult the healer
of your choice for medical care and advice.