The silent massacre


(3) Hear and record one’s conversations along with those with whom one talks



Download 0.99 Mb.
View original pdf
Page13/85
Date21.08.2022
Size0.99 Mb.
#59350
1   ...   9   10   11   12   13   14   15   16   ...   85
Silent-Massacre by Max H. Williams
(3) Hear and record one’s conversations along with those with whom one talks. This can be done even in a moving vehicle or while on foot in a rural area. The harassers occasionally record and play back to the victim excerpts of some of those conversations in his brain. The attackers can also record a person’s voice and then later simulate that same voice.
(4) See through the victim’s eyes. One’s eyes are controlled by his brain; thus, by controlling the victim’s brain, the attackers can probably also see whatever the victim sees.
Not only that but with their specialized software they can also see what he thinks.
Nevertheless, some of what the attackers lead the victims to believe that they can see may be another example of deception through psychological trickery. For example, the attackers often comment on what I am watching on TV or what I am doing in the house. They may know that because of my brain’s processes, as the brain is in constant motion as I watch TV and do chores around the house. Someday we shall know.
(5) View the victim’s interior and zoom in on any part or organ of the body, even in the darkness. EKG, CT scans, and functional MRIs can be performed by remote. The attackers probably use the GPS with directed sound to see and torture the target’s body by remote.
NASA has long used similar telescopic instruments for carrying out delicate space operations.
Although the attackers can target specific areas both on and in the body, that capability is greatly enhanced by communication with the targets’ brains, i. e., using synthetic telepathy.


(6) Inject holographic pictures or images into a victim’s thoughts. In my case, the attackers have shown images of my son drowning, pictures of what Christians believe to be that of Jesus, pictures of family members and friends, sometimes in suggestive poses, and countless numbers of unknown individuals in induced dreams and thoughts. Some of the unknown individuals in the dreams may be images of the attackers and their accomplices themselves, which they display for the fun of it. They are safe in doing this, as the victim usually will not know them and the victim will also very quickly forget those images due to the attackers’ ability to blank out their memories. In addition, their computer software can cause targets’ brains to view all people and all situations in sexual and negative contexts. Again, this is pure mind control.
I may be an unusual target, for I can not only talk back to the attackers but can also project images back to them. I often show images of piles of writhing poisonous snakes, many of them poised to strike. I’ve also shown them huge explosions followed by fire and smoke. I can show them a kaleidoscope of colors, turning and twisting, and blankets of symbols such as those used on the keyboard. I also show them my idea of their appearances, which are, of course, very unflattering.

Download 0.99 Mb.

Share with your friends:
1   ...   9   10   11   12   13   14   15   16   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page