The silent massacre


Torture Software and How It Is Used



Download 0.99 Mb.
View original pdf
Page8/85
Date21.08.2022
Size0.99 Mb.
#59350
1   ...   4   5   6   7   8   9   10   11   ...   85
Silent-Massacre by Max H. Williams
Torture Software and How It Is Used
Regardless of how a target is “hooked,” to perform electronic stalking and mind control on that target requires a computer and computer software. The software is used for both electronic physical and neurological assault. Much of the software utilized can be bought off the shelves in retail stores. Other software, particularly that used for neurological assault, is specialized and probably can only be procured by medical personnel and authorized persons in the military-intelligence-law enforcement-industrial complex. That computers and software are used for those purposes strongly argues that targets carry some type of foreign object in their bodies for them to act upon.
Once a microchip is implanted, the attackers, using its I.D, can employ dozens of software programs with that microchip. The various programs can speed up the heartbeat, slow down the heartbeat, cause sensations on the skin, make the digits on the hands and feet twitch,

actually shut down organs, and perform many other functions. Ostensibly the software was invented to do good, but it can just as easily do bad.
Physical Effects
Everybody has seen movies in which scientists manipulate radioactive and other devices from behind glass walls with instruments by remote. Nowadays doctors can do the same thing, except at a much greater distance. Physicians can monitor and adjust their patients' heart beat rate, blood pressure, and other bodily functions by remote over hundreds, probably thousands of miles. I know a person in south Louisiana whose heart doctor lives and practices in Houston. Whenever the person experiences an irregular heartbeat, he simply calls the doctor who then monitors the patient's heart using his computer software and adjusts the heartbeat rate by remote. The doctor's device must necessarily key in the ID number or symbol on the patient's pacemaker to be able to do that.
It is only too logical that the same device that the physician uses to regulate a heartbeat can also be used to cause the opposite effect, an irregular heartbeat. My attackers often attempt to interfere with my normal heartbeat while repeating subliminally through the V2K, “Heart attack.” Targets call that “faux heart attacks,” or “induced heart attacks.” Many other targets also suffer from irregular heartbeats caused by their attackers. Those targets only very rarely wear pacemakers, which argues that they must host some other type of receiver-transmitter in their body that carries an ID that can connect with similar software.
In addition to the software that causes faux heart attacks, the attackers possess software that allows them to cause severe gastric problems, including the formation of much stomach gas or air on the targets' stomachs, and to light up the interior of targets' stomachs, intestines, and esophagi. I suggest that the attackers employ software used for performing colonoscopies.
Although a doctor who does a colonoscopy operates from nearby, the device nevertheless operates by remote. If a device operates by remote, the device could just as easily be located hundreds or thousands of miles away.
The attackers use software that provides a light that allows them to view our organs and the inside of our throats and stomachs by remote. Moreover, the attackers can perform sodomy on targets, as they have on me and on many of my correspondents both male and female.
When that occurs, it feels exactly like the tube used for the colonoscopy. If a device can function from a few feet away by remote, what is to prevent its performing that same sensation from many miles away?
Doctors also perform eye, nose, and sinus surgery using computers by remote. Once again, normally the computer and the computer software are in the same room with the patient.
However, it could easily be used by remote over a great distance. Likewise, hearing technicians who fit hearing aids check and adjust the hearing by remote. That could be done a thousand miles away as easily as from the desk in front of the hearing aid recipient.
Prostate problems are often treated by instruments run off computers using specially designed software. Many male targets complain that their attackers cause them pain in the groin and cause unnatural erections. By stimulating parts of the penis or vagina and the colon by remote, the attackers can cause erections in men and unnatural orgasms in women.
Playing with the targets' sexual organs by remote is seemingly one of the favorite activities of

the attackers.
There is also various specialized dental software that allows the user to view the patient's teeth and mouth in great detail by remote. Those programs work with x-rays of the patient's mouth. Dentists normally use a simple laptop computer for that purpose. I suspect that a dentist, using the dental records of a particular person, could locate with his dental software that person wherever he might be. The same type program can be used with x-rays of any part of the patient's body, either internal or external. Many targets complain that their attackers are able to focus on particular teeth to make them feel like they are being drilled without an anesthesia. Although that computer software is normally used only a few feet from the patient, it can also be used from many miles away.
Today there is specialized computer software that can affect practically every part of the body by remote. Through such a software program, actions can be carried out on the lungs, liver, and kidneys by remote using highly specialized computer software. Renal and kidney failure can thus be induced by remote. Several forms of cancer procedures can also be done by remote. In the hands of the wrong people, that software can just as easily be used for medical torture instead of medical healing.
An MRI machine, functioning by remote, can view our entire body. It requires little imagination to think that if attackers can view our bodies, they can also perform many effects on our bodies. The sophistication of medical software and its range of activities are truly impressive.
In addition to performing the physical effects, the same software can also doubtlessly indicate with precision a target's location, especially if it has the I.D. number of an implanted microchip.
Neurological Effects
In addition to the physical effects caused by remote-operated computers and computer software, those devices can also assail the mind. We do not yet know how our enemies invade our minds. However, once they do so, they must use computer programs for their neurological torture, thought-mining, neural programming, and interrogations. Most of the computer software is probably secret, difficult to obtain, and highly classified.
The attackers' software allows them with the stroke of a particular key on their computer keyboard to send various messages and loop play tapes to the targets' minds. They can not only send the recordings and loop play tapes to the victim’s mind but they can also send multiple recordings and tapes that literally inundate the victim’s mind. Whether or not the target hears the attackers' voices, the voices are always there.
One software program that the attackers use works as an interrogation tool and lie detector.
The attackers ask the target a question and the target thinks the answer to their question without being aware of it or without being able to resist. The attackers' software can further determine whether the target's answer is true or false.
Other software can analyze the targets' voices and heartbeat to detect emotions such as anger, sadness, untruthfulness, loneliness, anxiety, depression, and others. One such program measures target's pulse to accomplish that same purpose. The pulse rate tells the attackers whether the target is lying, being deceptive, excited, or exhibits other emotions.


The same software or perhaps a similar version of it can cause a target to reveal data that he would not voluntarily tell another soul. When he hears a particular word or sees a particular object that reminds him of that secret, the software somehow alerts the attackers. They then proceed to question the target about that secret until finally the attackers know every detail.
There is also software that programs the targets to think certain things or react in a certain manner when he hears particular words. Those words can be persons' names, places, or objects. The attackers particularly like to use that programming in a sexual context. For example, a male target is supposed to experience an arousal when he hears certain people's names or sees a particular scene. That software is re-enforced by the attackers' subliminal talking into the victim's subconscious.
All of the software used for neurological assault is re-enforced by the attackers' synthetic telepathy or subliminal talking to the targets' subconscious. Not all targets can hear those voices; nevertheless, targets who receive electronic harassment also receive the voices whether or not they hear them. The subliminal talking itself may be the result of computer software, for in their synthetic telepathy the attackers most certainly use software to disguise their voices, make distinctive sounds, and project sounds to particular areas.
Most targets who hear the voices also suffer from induced tinnitus. I have often pondered the origin of the tinnitus. Although the tinnitus could be intentional simply to annoy the target and affect his hearing, it could also be unintentional, i.e., a side effect of either the device that
“hooks” our brain or of some of the software used by the attackers. In my case, I hear a change of tone in my tinnitus (to a much higher or lower pitch) whenever the attackers attempt to cause a faux heart attack.
Programmable Software
All or most of the software mentioned above is programmable. The attackers can use their computers to schedule the various physical and psychological effects to function at particular times of the day or night. They can also program the neurological software to be triggered by certain target thoughts, actions, colors, and code words that they hear on TV, radio, and in conversation. They can also use habitual locations of targets to trigger those effects. For example, when I stand in front of my commode, my legs are struck with pin prick-type sensations.
Neither electronic harassment nor mind control could be carried out without the use of computers and computer software. The sophistication of the software requires the participation of medical personnel and thus implicates doctors, nurses, and other health workers in the electronic stalking and mind control scheme. If not, medical personnel had to have trained the attackers to use those programs. In addition, the software that allows the attackers to perform mind control on targets requires training provided by law enforcement and intelligence. Thus, there can be little doubt that personnel in the medical field, law enforcement, and U. S. intelligence are somehow involved in the overall electronic stalking and mind control scheme although their participation may be rogue-type actions.
Many targets claim that they receive “directed conversation” from family members, friends, and other people. I suspect that those people are being manipulated by the same attackers

who manipulate the targets. Evidence suggests that millions and millions of Americans are already “hooked” but most of them are not subjected to electronic stalking and mind control.
However, their frequencies have been identified, catalogued, and entered into a mega- computer. The computer programs used by the attackers may be able to connect the minds of the targets with those of other people to achieve the “directed conversation.’ Those engaging in the directed conversation may be completely unaware of it or unable to resist using it. On the other hand, directed conversation perhaps does not exist; and the target’s subconscious is only told subliminally that he will hear that conversation. Then again, the people “directing” the conversation may be accomplices.

Download 0.99 Mb.

Share with your friends:
1   ...   4   5   6   7   8   9   10   11   ...   85




The database is protected by copyright ©ininet.org 2024
send message

    Main page