The silent massacre


Automated Computer-to-Brain Interfacing



Download 0.99 Mb.
View original pdf
Page9/85
Date21.08.2022
Size0.99 Mb.
#59350
1   ...   5   6   7   8   9   10   11   12   ...   85
Silent-Massacre by Max H. Williams
Automated Computer-to-Brain Interfacing
As the number of targets increase, the powerbrokers must find, hire, and train an increasing number of attackers. The powerbrokers fear, however, that as the number of attackers increases, so does the possibility of the secret becoming known. Moreover, lack of manpower in the USA is a great disadvantage in training attackers when comparing that country with
China, India, and other more populous nations. Thus, the powerbrokers wish to limit the manpower necessary to control the targets.
To do that, I believe that the powerbrokers are presently experimenting with the development of a super computer and software that can interface with targets’ minds through automation without the use of human attackers. Large businesses already use computers that interact by phone with customers’ voices. Some of that programming is very realistic. Remember that mainstream American technology is always twenty to thirty years behind that known and employed by the Department of Defense. If human thoughts can be translated into actual words and those words processed through super computers, computer-target interfacing is a realistic goal.
I further believe that those super computers are being designed to connect to and work with the massive data bases kept on targets already established for that purpose. That data base may be the Echelon system, which is already in usage by the U. S. Government to glean information on American citizens. Echelon scans the data and spits out information fetched out of the data by using key search words. Much of the attackers’ psychological material is already automated in the form of the previously recorded messages played to targets’ subconscious. It is not farfetched to believe that in the future, human attackers will either be altogether unnecessary or drastically reduced in number.
My attackers consistently use certain expressions in their subliminal talking, such as “That’s true,” or simply “True;” and “That’s good” or only “Good.” They also often use the word “Dad.”
The speakers are always the same voices. For a long time, I wondered why the attackers used those expressions, sometimes when they seemed irrelevant to what I was thinking. Now
I believe that they are computer-generated expressions that alert the computer to mark certain thoughts of the targets. Those thoughts are then analyzed by the computer and categorized in special areas for future automated use.
The attackers also carry out their mind control on targets through code expressions that cause targets to act or react in a presupposed manner. Although most targets cannot hear those codes, their minds do. Once targets get used to hearing and responding to those codes, a computer can take over the work of the attackers. Incredible, you say? Perhaps, but

one cannot overestimate the evil designs of the powerbrokers and the super high-tech equipment in their possession for putting those designs into action.
The attackers themselves are probably totally unaware of the reason behind their using the codes and other expressions. They only follow the established protocol laid out in the training manual. A part of the entire scheme is to ensure that the various units work independently without knowing what other units are doing. That is the way a conspiracy normally works.
Only the powerbrokers’ most trusted lieutenants have access to the combined knowledge of those various operational units.
I also believe that the U.S. Government and other governments are working on a phone system that will electronically extract information from the phone owner. Here is the way it will work. A caller will telephone the phone owner, hypnotize him (or previously hypnotize him) using particular words or methods, and use pre-determined codes to ask the person questions. The person who answers will provide answers to the questions posed to him. He will be told under hypnosis not to remember the phone call. After the conversation ends, the phone owner’s memory will blank out completely his ever having received such a call.
Psychiatrists would probably label paranoid anyone with ideas such as machine-to-mind interfacing and hypnotic info-gathering by phone. On the other hand, perhaps those methods only barely touch upon the possibilities concerning the subject of electronic stalking and mind control.

Download 0.99 Mb.

Share with your friends:
1   ...   5   6   7   8   9   10   11   12   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page