The silent massacre


Theories of Methods Used in REA



Download 0.99 Mb.
View original pdf
Page5/85
Date21.08.2022
Size0.99 Mb.
#59350
1   2   3   4   5   6   7   8   9   ...   85
Silent-Massacre by Max H. Williams
Theories of Methods Used in REA
We know that electronic and mind control assault operates by remote, but we know little about its delivery system. The delivery has to be either satellite-driven, land-based, or a combination of the two. The debate about which one it is goes on. Likewise, there is still some question about whether the delivery system requires a device implanted in the human body or can be delivered without that implanted device.
“Remote” means that some object is used to make contact with the human body over a distance through the air. Whatever is beamed into the body does not waft aimlessly through space but follows a line of trajectory, or a frequency. Anything that makes a sound or a movement creates a frequency. There are thousands, probably millions, of frequencies.


Almost anything today can be controlled by remote using particular radio frequencies.
Today remote-controlled objects are also used in guiding satellites and unmanned space ships, sending and operating military spy drones, changing TV functions, opening garage doors, turning on light switches, and working almost any other motorized or electrical object. It would be difficult today for an American to live without remote devices.
Electromagnetism may play a role in the targeting. A field of electromagnetism seems to envelope the target’s surroundings. In my case, it appears to cover my house and the pastures and fields immediately around it, as whenever I am outside, the attackers’ voices, or
V2K, come through stronger and clearer. Once again, we do not know whether that electromagnetic field is projected by satellite, from a land site, or from a hidden device in or near the victim’s house. Notwithstanding, what if there were some type device that could make contact with that electromagnetic field that surrounds the target and then operate within that field to attack us along our particular brain frequencies? If that were true, distance would be no object and a person could be pinpointed among several nearby people for electronic assault.
Satellites now possess amazing capabilities, all performed by remote, and they may very well be utilized in electronic assaults and mind control. In a 2003 article called Shocking Menace
of Satellite Surveillance, John Fleming wrote about the use of satellites in REA assault.
Discussing the realities of satellite-driven REA, Fleming said: “The victim’s movements will be known, his conversations heard, his thoughts picked clean, and his whole life subjected to bogus moralizing, should his tormentor diabolically use the information gained. A sadist could harass his target with sound bites, or audio messages, directly broadcast into his room; with physical assault with a laser; with subliminal audio messages that disturb his sleep or manipulate persons around him into saying something that emotionally distresses him . . . .”
The satellite-guided GPS almost certainly figures somehow in the electronic assault and mind control activities. Programs such as Google Earth can locate and zoom in on houses and other objects on maps. That a victim can be targeted regardless of his location and movement argues that a satellite is very likely involved. For a satellite to be able to follow and pinpoint the target wherever he goes, however, probably requires an object, a substance, or a special condition in the target’s body or, as suggested above, a device that can operate within and upon the electromagnetic field around the target. The voices that many targets hear may be piggybacked over the GPS into that electromagnetic field. Targets know that the intelligence community and other agencies possess through-the-wall surveillance capability.
If satellites are used, distance is no object. Our torture could be carried out from other countries just as easily as from the United States. China, India, Israel, Russia, and other countries possess that capability. Consider the use of drones in warfare. Today (November,
2009), the United States often sends drones, or unidentified aerial vehicles (UAVs), to strike targets in Afghanistan and Pakistan. Forward observers identify the target, get permission to call in, and then communicate with the drone operators. Those drones are guided by computer software by remote from facilities in the United States, usually Fort Meade,
Maryland, from thousands of miles away through the GPS with pinpoint precision.
In early December 2011, the Iranians tricked one of the U.S. drones into landing in their territory by blocking the U.S.-controlled GPS and then using its own GPS to cause it to land in


Iran. The Iranians outsmarted the Americans by using the Americans’ own technology. As I write, the Iranians are dissecting the drone to learn all of its secrets, including what type information that it gains in its surveillance.
The use of satellites, however, does not prove that the attacks come from a great distance.
Satellites can also be used along with the GPS from nearby. Attackers who live near targets can utilize satellites and the satellite-driven GPS, using the same devices and methods, just as easily as attackers who operate thousands of miles away. Information concerning weaponry capable of being used by satellite for physical and neurological torture is purposely vague about distances. Eventually we shall know from what range our attackers operate. It will probably vary from case to case. Many targets believe that our electronic harassment comes from U. S. Government facilities near Fairbanks, Alaska called High Frequency Active
Auroral Research Program, or HAARP. I doubt that.
This paper does not explore in depth the methods used to zero in on a person body and mind by remote. There are many schools of thought on that subject. Here are some of them.
One theory believes that one’s voice can be recorded, transferred to a computer, and the computer then used to locate the particular voice and lock onto that voice’s brain.
Experiments show that that can indeed be done. Voices give off distinct vibrations that are as peculiar to a person as his fingerprints and DNA. One day when the attackers were vibrating me mercilessly, I tensed my throat, and the vibrations stopped.
That caused me to remember an incident that occurred when I served in Africa in the 1980s.
One day while working in my office, the secretary from the embassy political section, the office that serves as a front for our CIA agents, called me to ask some question that anyone could have answered. I hardly knew the caller; thus, I instantly realized that the real purpose of her call was to record my voice.
However, I believed that it was probably for security purposes in case of kidnapping or being held hostage at some point. Voices are very distinctive, and they can certainly be used to distinguish one voice from another. That our intelligence community was recording voices in the 1980s makes me believe that there may be some validity to the theory that perpetrators of
REA may be able to “hook” our brains, or at least determine our locations, by zeroing in on our voices.
Some evidence also suggests that targets’ minds can be “hooked” if the attackers know the targets’ DNA. If that is true, targets would not necessarily have to have a microchip or other object or substance in his body to be hooked. There may be some remote device that with the aid of the GPS will locate a person and “hook” him using his DNA. If DNA can be utilized, society is in deep trouble, for obtaining DNA samples of people is a very simple matter. Even touching a glass or a can will leave useable traces of DNA.
It is reported that since 1979 all hospitals in the United States have been required to send
DNA samples of all babies born in the U. S. to the Federal Government. I do not know the office or agency that is supposed to keep that data. If that information is true, it adds credence to DNA perhaps being involved in REA. In addition, I believe that the DNA of all prisoners and persons who have spent time in jail as well as anyone who has undergone treatment in hospitals have been collected for the DNA data bank. DNA samples are easily collected. It is

reasonable to believe that the intelligence community has asked large companies to submit samples of DNA of its employees.
Scientists have become obsessed with the possibilities of the use of DNA, as its uniqueness narrows the subject down to one in millions of people. By using computers with the DNA of persons, it is entirely conceivable that those scientists have developed a method of targeting individuals using DNA.
Still another theory talks about small devices (nano-microchips) made so small that they can fit between molecules of water and other liquids and be injected into the body in shots and inoculations. Patents taken out by scientists describe that very procedure. Those same nano- microchips can probably also be ingested by the target in swallowing food and beverages, after which the chips attach themselves to the lining of the stomach. Only the finest equipment, which is normally not available in regular medical facilities, could locate those barely visible objects.
There is also evidence that even human breath or breathing somehow figures in electronic torture and mind control. Every movement, even breathing, gives off a frequency. I later found out that when I hold my breath for a few seconds, the vibrations temporarily cease. Yet, we do not know whether breathing in itself has any connection with “hooking” a target’s brain. The breathing theory does not explain how a target can be pinpointed while in the close presence of others.
In addition, MRI and other machines have been successfully combined with computers and used by remote along radio frequencies to move digits and limbs, detect emotions, and
“detect lying, racism, and even identify which image a person is looking at, suggesting [that] one could visualize scenes from a person’s dreams or memory” (Hospital Soup.com, June 10,
2008). The uses of a device such as that are endless if used on the brain’s wave lengths or frequencies. Yet, those actions probably require an implant in the person on whom the actions are performed.
Similarly, neurotransmitters can be used by remote to communicate with brain cells through electrical impulses. That device can tap into the brain’s functions that cause body movement, thought, feelings (emotions), and communication. It could probably also influence the thalamus, or the inner part of the brain, which regulates body temperature and controls urges such as eating, sleeping, and sexual behavior, all of which figure among many targets’ REA effects.
Laser guns may play a role in REA. A CNN news program on February 23, 2009, reported that 148 incidents of lasers aimed at airplanes had already been reported since the beginning of the year. In the last incident, the laser was green in color and about the size of a pencil. If a laser beam can be focused to such a fine point over several miles of distance, imagine what it could do when trained on an individual or an object from a closer distance over a period of time.
Mounting evidence suggests that a substance or an object can also be introduced sexually into a target’s body to “hook” his or her brain. Several of my correspondents mention that their
REA began after having had an intimate relationship with somebody. Those relationships may have been set-ups. Spies and undercover agents have used sex for centuries to entrap

individuals. Some such object (nano-microchips) or substance could possibly be introduced into targets vaginally, orally, or anally through sexual contact.
Some targets believe that the perpetrators’ device enters through the targets’ eyes to carry out the electronic attacks on the targets’ bodies. Presumably that would happen after the targets are already “hooked.” One target whom I know wears professional goggles that she says help keep out the light used by the assailants. Another target also believes that he is attacked using light. He describes the lights as very bright street lamp-type elevated lights that seem to rotate. He believes that his attackers piggyback their laser, or whatever the remote device might be, on the beams of light. Although those targets may be correct, I suspect that they have been led to believe that through mind control.
Remote cognitive neural monitoring is one of the most recent theories. That theory has the targets’ minds being located and “hooked” using some type frequency by remote that somehow connects with the brain without anything being implanted in the targets. I believe that theory is pure disinformation, disseminated by the very elements who are carrying out the remote torture. Why do I believe that? Use your brain. If it were that simple to “hook” a person’s brain, all the drug lords and pushers, heads of crime syndicates, crooked politicians, white collar crooks, prostitutes, child porn makers and distributors, foreign and domestic terrorists, bank robbers, embezzlers, money launderers, and other criminals would already have been caught and sent to prison. That has not happened; therefore, in my opinion, that theory, which has caught on in the targeted community and is believed by many targets, is not valid. Let me repeat: remote cognitive neural monitoring, in my opinion, is not a valid theory.
Other theories include wiring in the ear that connects with the brain and pins that penetrate the skull. If those ideas are valid, the procedures would have to be done in medical facilities or at least while the target is under sedation. If true, this further indicts the medical community for its complicity in electronic and mind control assault.
All that said, pick a theory. In truth, we do not yet actually know how high-tech assailants can focus on a single individual and capture that person’s mind; neither do we know what instruments are used in the process. Both are highly guarded secrets shrouded in deception.
In fact, there may be several methods of “hooking” the target as well as several methods of administering the electronic and mind control effects. However, the only proven method thus far is through implanted microchips.
Whatever device is used to “hook” the brain, it has the capability of using that system on diverse targets in a variety of circumstances in all types of locations. A super computer necessarily has to be used along with the device, and that computer uses programs with an amazing range of capabilities. Only the government, research institutions, and mega- businesses and organizations would probably be able to own such computers and be able to acquire some of the more sophisticated computer programs. We shall later see some of its capabilities and the effects they have on the human body and mind.

Download 0.99 Mb.

Share with your friends:
1   2   3   4   5   6   7   8   9   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page