The silent massacre



Download 0.99 Mb.
View original pdf
Page22/85
Date21.08.2022
Size0.99 Mb.
#59350
1   ...   18   19   20   21   22   23   24   25   ...   85
Silent-Massacre by Max H. Williams
Other Uses of the Voices
The REA assailants are also able to project voices and other sounds through objects near the victim, i.e., the TV, a PC, and other electrical devices and even into the open air near him.
Their sounds can take the form of knocking on the walls, wind and rain, dogs barking, falling stacks of lumber, and birds cooing or singing. Some of those sounds might be heard by others if they were present; however, the stalkers are careful not to make the noises if there are visitors. I live alone, as many victims do, and my dog often barks at some of the noises that the stalkers project into the yard and pasture. One can buy computer programs that make those same sounds.
The stalkers can send their voices through a radio, even when the radio is turned off. They can also make you think that people at nearby tables in restaurants and other public places are talking about you by projecting voices into your ears/brain that seem to come from their direction. (Directed sound again?) In applying their evil, the electronic stalkers make use of equipment that changes their voices to hide their identity. Voice changing programs are readily available on the internet for purchase. They can also duplicate the voices of people with whom you often talk.
The attackers also bombard your brain with loop play tapes using words that they want you to hear on TV and radio. Probably through hypnosis, the attackers instruct the targets that they will hear those words whenever the syntax, syllables, prefixes and suffixes in the language used on TV and radio sound similar to the loop play words. I discovered that while watching
TV. The speakers were saying words that I knew had no relation to their subject matter. It took over a year to figure out that the attackers were, in effect, substituting their words for words used by the speakers.
The attackers’ voices have also programmed me to reverse many of the letters in words that I type, for example, placing a particular vowel before a particular consonant or vice versa. I used to type accurately. Now I have to be very careful in typing and then go back and review what I have written before sending anything by email. Usually simple words like “about” become “aobut.”



Download 0.99 Mb.

Share with your friends:
1   ...   18   19   20   21   22   23   24   25   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page