The silent massacre



Download 0.99 Mb.
View original pdf
Page12/85
Date21.08.2022
Size0.99 Mb.
#59350
1   ...   8   9   10   11   12   13   14   15   ...   85
Silent-Massacre by Max H. Williams
(2) Monitor movements. The attackers not only know one’s vehicular movements but they can also view him and follow his movements on his property and even inside his house. Once they “hook” the target with their equipment, they have ready access to him at all times. Their torture follows the target wherever he goes, even to other states and abroad.
Many targets believe that cell phones may play a role in monitoring their movements; however, if they are correct, that use is not universal. It is true, however, that many TIs trace the origin of their electronic torture and mind control to the early 2000’s, when cell phone usage was becoming increasingly more popular. In my opinion, the cell phone itself is not a device used in targets’ torture but only a useful tool of the people who do so. I have intentionally gone days without using or being near cell phones, and my physical and neurological attacks continued unabated.
It is also true that cell phones have to be used in gang stalking, which goes right along with
REA. In fact, the stalkers could not coordinate their harassment against targets without the use of cell phones or some type of walkie-talkie. Cellular phones may even somehow be used with the device that renders the electronics effects on victims. It is known that cell phones carried on one’s person near credit cards can cause those cards to malfunction and wear out quickly. Credit cards are one of the hundreds of items that operate through the RFID (radio frequency identification).
The cell phone, however, has nothing to do with the voices and other physical and neurological effects. I have purposely left my cell phone behind on various occasions to

determine whether it might figure in the REA. It simply does not. I have gone days without being around a cell phone. If it is used at all, it may be used in locating some targets.
However, its main usage is for the attackers’ convenient communication concerning the target.
The attackers appear to be able to map out your house or apartment. They probably first locate your residence, using Google Earth or some other program of that type, and then learn the configuration of the structure. Once they have the layout of your house or apartment, they seem to divide it into grids, probably with the help of an architectural-type computer program.
Then, they slowly zoom in on various locations where you habitually sit, stand, or lie and program those locations on their device. In my case, they first located the chair in the living room where I sit, then the lavatory and commode in the bathroom where I stand. Finally, they had programmed every area of the house, and they were able to jolt me and vibrate me in any location inside my house. We know that devices and methods exist for accomplishing those actions.
The attackers seemingly make a grid map of the target’s dwelling. Then, they track the target within his dwelling and learn his habitual locations within the dwelling. Using the grid map and their computer software, the attackers can program their device to perform various effects on the target in those locations. Their computer would probably use a Microsoft tool bar. The attackers probably only have to highlight that particular grid on their screen and then open
Tools on the tool bar to choose from a variety of physical and psychological effects with which to hit the target.
Likewise, in my opinion, cell towers and electrical power lines in themselves are not used specifically for electronic torture. Nevertheless, like the cell phone, the cell towers and power lines perhaps somehow aid the attackers in their operations.

Download 0.99 Mb.

Share with your friends:
1   ...   8   9   10   11   12   13   14   15   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page