The silent massacre


(14) READ A VICTIM’S THOUGHTS



Download 0.99 Mb.
View original pdf
Page17/85
Date21.08.2022
Size0.99 Mb.
#59350
1   ...   13   14   15   16   17   18   19   20   ...   85
Silent-Massacre by Max H. Williams
(14) READ A VICTIM’S THOUGHTS. There is irrefutable proof that university, medical, independent researchers, and defense contractor scientists have developed various devices and methods that, when operated with computer programs, are capable of reading human thought. Many of those methods have been patented. Scientists know that certain radio frequencies can pick up the natural frequencies of the human brain.
My attackers at first made me believe that their equipment picked up only a few one- and two- syllable words of my thoughts. I even heard them talking excitedly about picking up those fragmentary thoughts. That was total deception. They have had the ability to pick up complete thoughts for many years. Their “discovery” was only a part of the mind game, which must be very amusing to the attackers. In reality their device actually intercepts a target’s thoughts
BEFORE those thoughts fully develop in the target’s conscious. The attackers always hear the target’s thoughts a few words before the target becomes conscious of their thoughts.
For some time, my attackers have repeated my thoughts in their subliminal talking. At first I thought that their repetitions of my thoughts was simply another psychological tool thrown into the equation to annoy me. However, I now believe that perhaps the attackers are repeating my thoughts for the benefit of accomplices or their superiors who are listening on radios, cell phones, and other instruments. Or they are making recordings of what they hear on their ear phones.
People think without realizing that they are thinking. They cannot help thinking. That is quite natural. But, strangely, once targets are aware that the attackers can read their thoughts, the targets subconsciously articulate those thoughts carefully, knowing that somebody else is
“listening.” Instead of simply thinking naturally, targets become very conscious of their thoughts and will make sure that those thoughts are very clear. They will even “explain” those thoughts.
Moreover, whenever they handle or use an object, they will think the name of that object.
Certain software used by the perpetrators causes targets to articulate those thoughts and

even visualize them. When I take my vitamins, for example, the software makes me form the thought of each one and name the particular vitamin as I take them. When I think of a person, the software will cause me to visualize that person.
One of the major objectives of the attackers’ mind reading ability is to interrogate the victim.
Their device and software include a remote lie detector. The attackers interrogate the target through their subliminal voices to his brain (whether or not the target hears the voices), and the software indicates whether his answers are true or not. Knowing about the attackers’ lie detectors, the target can often deceive them by introducing several answers. As the attackers try to get the target to identify the correct answer, the target can totally confuse the attackers by introducing incongruent information. The target can also have just as much fun playing that game as the attackers! I enjoy frustrating the attackers who think that they control my life.
The attackers’ software also allows the attackers not only to hear targets’ thoughts but also to see those thoughts. Of course, some of the targets’ thoughts are not his own but are induced by the attackers. As a target’s thoughts occur, the attackers’ computer program will use the target’s thoughts or his induced thoughts to steer him in a particular direction to a specific topic. The attackers reinforce the computer’s capability by whispering instructions to the target.
Sometimes the attackers will say only one word to the target’s brain. That word can be the name of a person, the name of a food that they want you to eat, or the name of a topic that they want the target to think about. I have learned that whenever I get a sudden thought while watching TV or puttering, that thought is usually an induced handler topic. Thus, I intentionally get off of that thought.
The attackers want targets eventually to be unable to distinguish their own thoughts from the attackers’ induced thoughts. Their objective is to control that person’s mind and actions. I have learned to separate out my natural thoughts from the attackers’ induced thoughts that they want me to repeat as if they were mine. With practice, all targets can develop that defensive ability. I often tell my attackers telepathically, “if your thoughts and commands just happen to coincide with my natural thoughts and actions, it is mere coincidence, you assholes.”
I have already mentioned that mind control cannot be achieved without the subliminal voices.
Likewise, it cannot be accomplished without the computer programs that the attackers use.
Those programs not only make sound effects, simulate voices, and perform other readily discernible sounds but they also program many of the mind control functions. For example, the computer can program a target’s thoughts to view people in a negative context. A target’s thoughts about a specific person can be programmed in a specific way, and they can also be programmed differently for particular persons.
Programmed thoughts about others are often sexual; they can also make the target believe that a person is stealing from him, that another person is poisoning him, that a person is talking about him behind his back, etc. They can also program the target to act and react in certain ways. The programmed thoughts and actions aid the attackers in totally isolating the target from society and convincing him and others that he is crazy.
The attackers probably hear one’s thoughts using a headset attached to a computer. My

attackers have tried to make me believe that my thoughts also appear on their computer in written form and can be printed out. To convince me of that, the attackers subliminally exaggerate the pronunciation of some words, for example “the,” as if they are second graders reading from a book. I do NOT believe that one’s thoughts can yet be made to appear as prose. In the future, however, that will almost certainly be possible.
The attackers’ equipment and software can also see and record the very images that your thoughts see. In other words, they can also see what you see in your thoughts on their monitor. Science fiction? Hardly. Knowing that they can see my thoughts, I have learned to project images, scenes, and actions to the attackers. Sometimes when I hear good jitterbug music, I show myself dancing. They comment on the dancing steps.
The mind reading capability not only gives stalkers access to everything in the victim’s mind but also provides them massive amounts of information about friends and family members of victims. The stalkers feverishly exploit this information 24/7. In my case, the stalkers constantly whisper the names of my son, two sisters, friends and acquaintances, and even people whom I do not really know but who might creep into my thoughts to gather information about those individuals. Knowing my thoughts also gives the stalkers my computer passwords
(and thus control over my communications), information about my business matters, and previous knowledge of my actions and movements.
While dozing, I have awoken to thoughts that I knew were not my own. The attackers were introducing past events, places, and people into my mind. The purpose was not to “mine” information. They already knew that information. Their real motive was to make me remember the event, place, or person to instill guilt/humiliation and/or to let me know that they had that information. That is supposed to rattle me. It doesn’t.
The attackers’ equipment and software also have the capability of inducing “dreams” and thoughts while the victim sleeps. In those dreams and thoughts, the attackers introduce certain people, some of whom the victim knows, though not always very well, and others who are unknown to the victim. In the dreams, they set up particular scenarios in which the victim is the principal actor, doubtlessly to study his interaction with the other actors. In those skits, the attackers actually direct the actors while looking for signs of phobias, sexual foibles, anxiety, health problems, and other human conditions and characteristics that they can exploit.
In addition to the induced dreams and thoughts, the attackers start sentences and then stop, letting the victim finish those sentences. And they also flash photos before the victim’s eyes while he is in a dream-like state of consciousness and ask him questions about those people.
I have awoken suddenly to see pictures being passed in rapid succession before my eyes.
Their monitors register the victim’s pulse rate, emotions (including his sexual inclinations toward other people and his level of anxiety), whether the victim is telling the truth about questions he is being asked, his dislike of or fondness for certain people, places, or objects, and many other physical and psychological reactions. The attackers’ objective is to instill fear and anxiety in the targets.

Download 0.99 Mb.

Share with your friends:
1   ...   13   14   15   16   17   18   19   20   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page