determine whether it might figure in the REA. It simply does not. I have gone days without being around a cell phone. If it is used at all, it may be used in locating some targets.
However, its main usage is for the attackers’ convenient communication concerning the target.
The attackers appear to be able to map out your house or apartment. They probably first locate your residence, using Google Earth or some
other program of that type, and then learn the configuration of the structure. Once they have the layout of your house or apartment, they seem to divide it into grids, probably with the help of an architectural-type computer program.
Then, they slowly zoom in on various locations
where you habitually sit, stand, or lie and program those locations on their device. In my case, they first located the chair in the living room where I sit, then the lavatory and commode in the bathroom where I stand. Finally, they had programmed
every area of the house, and they were able to jolt me and vibrate me in any location inside my house. We know that devices and methods exist for accomplishing those actions.
The attackers seemingly make a grid map of the target’s dwelling. Then, they track the target within his dwelling and learn his habitual locations within the dwelling. Using the grid map and their computer software, the attackers can program their device to perform various effects on the target in those locations. Their computer would probably use a Microsoft tool bar. The attackers probably only have to highlight that particular grid on their screen and then open
Tools on the tool bar to choose from a variety of physical and psychological effects with which to hit the target.
Likewise,
in my opinion, cell towers and electrical power lines in themselves are not used specifically for electronic torture. Nevertheless, like the cell phone, the cell towers and power lines perhaps somehow aid the attackers in their operations.
Share with your friends: