The silent massacre



Download 0.99 Mb.
View original pdf
Page4/85
Date21.08.2022
Size0.99 Mb.
#59350
1   2   3   4   5   6   7   8   9   ...   85
Silent-Massacre by Max H. Williams
The Discovery
In looking back, I now know that I have been targeted since no later than the mid-1970s and very probably even from the early 1960s. However, I did not actually realize that I was targeted until 2005, when my assailants started bombarding me with electrical-like jolts, strong vibrations, and other physical torture. The first electronic vibrations struck me with such force that I could hardly stand on my feet. On that occasion, my attackers were almost certainly in an adjoining hotel room, using some type of handheld device that reacted with something peculiar to my body. Only a few days later, I began hearing voices from unseen speakers. I later learned that only I could hear those voices.
The physical electronic effects were intended to frighten me, throw me into a state of panic and confusion, destabilize my body, and inflict pain, all of which they initially did. I gradually learned, however, that those effects were used by the attackers to “soften” or “sensitize” or
“pre-condition” me for the real objective – mind control. I also later learned that victims are normally targeted for years before they finally realize it. Some targets suffer physical attacks for long periods and visit doctors frequently without realizing that their symptoms are not natural consequences. Other targets die, sometimes probably from the consequences of their torture, without ever having discovered that they were targeted.
Four days after the first all-out electronic attacks, the attackers, began "talking" to me subliminally through my brain. I later discovered that TIs call that communication voice-to- skull, or V2K. It is also sometimes called “synthetic telepathy, microwave hearing,” or
“subliminal communication.” Of course, only the victim can hear the talking, which, by design,

is intended to make the victim sound crazy. At the time that the electronic attack hurled me into reality, I was sixty-eight years old and in exceptional physical and mental health. I knew full well that I was not delusional.
The voices first occurred as I drove in Texas near the Mexican border. The vehicle radio was not on. At first the voices sounded like they came from the door panel on the driver’s side. I thought that someone for some reason had perhaps planted a bug in the door. I later learned that targets can be located using their cell phones. However, at that time, I did not use a cell phone.
During that trip, when I reached Houston I spent the night with a sister who lived there. After retiring, I heard voices that seemed to come from right outside the window of the room in which I was sleeping. When I went outside with a flashlight to investigate the voices, naturally there was nobody there.
When I arrived at my destination in Baton Rouge, Louisiana, I sought out a private detective who did a bug sweep on my vehicle without finding anything. At that time, the voices that seemed to come from the vehicle were very weak. The detective found nothing. Still convinced that there was some type of microphone in the vehicle, I believed that the private investigator was simply incompetent.
Shortly after visiting the private detective, I figured out that the voices were not coming from the vehicle but from my own body. Having had much dental work performed overseas, I at first suspected that a bug might be hidden in a tooth. A few days later, I went to a dentist and requested that he take full x-rays of my teeth and mouth. He saw nothing unusual in the x- rays.
I did not see anything either at the time, as I was looking for a clearly visible, well-defined object; however, later, in May of 2009, I took a much closer look at those x-rays. In the roof of my mouth were two tiny specks of what looked to be the same metallic substance used for fillings. In my gums was a very slender, light-colored, cylindrical-shaped sliver of some object.
Those objects are still unidentified, as I can get no doctor to examine more closely those specks.
A different dentist later told me that if a microchip were embedded in the mouth, it would probably be injected into the soft tissue, i.e., the roof of the mouth or the gums, and not the teeth. However, logic tells me that the best place to implant microchips in the mouth is to build them into the posts that secure for crowns. The metal used in the crowns, which surround the posts, would then keep an x-ray from revealing the hidden microchips. Few targets can afford to have their crowns removed, even temporarily, to test for microchips.
The first few months of electronic and mind control attacks threw me into a state of confusion.
I was completely disoriented, as I could not understand what was happening. I later discovered that all targets go through that stage of initial bewilderment and befuddlement without having anywhere to turn for help. Depending on the target, that first stage can last from six months or less to over a year, sometimes much longer. Indeed many targets fail to get over the trauma of that first stage of targeting, and they live in constant fear.
As an historian and former government employee, I understood the value of documentation.


Thus, on the very day that the electronic effects first pounded me, I started recording a detailed journal in which I recount my experiences and my thoughts concerning them. I later realized that my attackers could utilize my journal as a written record of the effects of their torture, could adjust their effects on my mind and body accordingly, and could circulate a written copy of my journal among themselves. Despite that, I felt that it was more important to keep a record of those occurrences than to attempt to shield myself by not keeping it. The journal today comprises ten volumes and well over fifteen hundred pages of single spaced typescript.
I do not yet know how the perpetrators of the electronic and mind control assault “hooked” my brain by remote; however, I suspect that I was implanted with a microchip or several microchips over the years. I have had many inoculations, much dental work, and several minor medical procedures performed in various locations. Locating the microchips is a major problem, for they can be inserted in any part of the body, either only slightly below the surface of the skin or very deep into the muscle tissue. I have determined that there are probably nineteen or twenty locations on and in my body where microchips could have been implanted.
Not being able to pin down the location makes finding the devices much more difficult. In addition, if doctors know that a victim wants an x-ray, CT Scan, or MRI to look for a microchip, they will not write orders for those searches. In fact, they will ordinarily advise the authorities of your purpose in wanting those pictures, in effect suggesting that you are paranoid schizophrenic.
As the reader will later see, whatever method was used to “hook” my brain had been employed in my case perhaps by the early- or mid-1970s and no later than the mid-1980s.
More recently, I have recalled conditions and events that indicate that I could have been targeted even in the early 1960s. If the latter date proves correct, it would probably implicate the military doctors and other military medical personnel who gave me shots and inoculations when I served in the Active Army Reserves.
I believe that American soldiers are routinely implanted with microchips to locate them if they become stranded, taken prisoner, or go AWOL. I also believe that they are implanted with microchips to study their reaction to the effects of war and the stress of serving in the armed forces. The latter purpose would fall under neurological experimentation. Other readers probably wonder, as I do, how our U.S. rescue forces are able to locate lost servicemen who have become separated from their units during battle. I believe that it is done electronically.

Download 0.99 Mb.

Share with your friends:
1   2   3   4   5   6   7   8   9   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page