Wednesday, November 16, 2016

Ganstalking victims story

I do not yet know how the perpetrators of the  electronic and mind control assault “hooked” my brain by remote; however, I  suspect that I was implanted with a microchip or several microchips over the  years. I have had many inoculations, much dental work, and several minor medical  procedures performed in various locations. Locating the microchips is a major  problem, for they can be inserted in any part of the body, either only slightly  below the surface of the skin or very deep into the muscle tissue. I have  determined that there are probably nineteen or twenty locations on and in my  body where microchips could have been implanted.

Not being able to pin down the location makes finding  the devices much more difficult. In addition, if doctors know that a victim  wants an x-ray, CT Scan, or MRI to look for a microchip, they will not write  orders for those searches. In fact, they will ordinarily advise the authorities  of your purpose in wanting those pictures, in effect suggesting that you are  paranoid schizophrenic.

As the reader will later see, whatever method was  used to “hook” my brain had been employed in my case perhaps by the early- or  mid-1970s and no later than the mid-1980s. More recently, I have recalled  conditions and events that indicate that I could have been targeted even in the  early 1960s. If the latter date proves correct, it would probably implicate the  military doctors and other military medical personnel who gave me shots and  inoculations when I served in the Active Army Reserves in 1961. I used to wonder  how our U.S. rescue forces were able locate lost servicemen who had become  separated from their units during a battle. The capability of locating those  disoriented troops suggests that all servicemen are routinely microchipped upon  entry.

Theories of Methods Used in  ESMC

We know that electronic and mind control assault  operates by remote, but we know little about its delivery system. The delivery  has to be either satellite-driven, land-based, or a combination of the two. The  debate about which one it is goes on. Likewise, there is still some question  about whether the delivery system requires a device implanted in the human body  or can be delivered without that implanted device.

“Remote” means that some object is used to make  contact with the human body over a distance through the air. Whatever is beamed  into the body does not waft aimlessly through space but follows a line of  trajectory, or a frequency. Anything that makes a sound or a movement creates a  frequency. There are thousands, probably millions, of frequencies. Almost  anything today can be controlled by remote using particular radio frequencies.

Today remote-controlled objects are also used in  guiding satellites and unmanned space ships, sending and operating military spy  drones, changing TV functions, opening garage doors, turning on light switches,  and working almost any other motorized or electrical object. It would be  difficult today for an American to live without remote devices.

Electromagnetism may play a role in the targeting. A  field of electromagnetism seems to envelope the target’s surroundings. In my  case, it appears to cover my house and the pastures and fields immediately  around it, as whenever I am outside, the handlers’ voices, or V2K, come through  stronger and clearer. Once again, we do not know whether that electromagnetic  field is projected by satellite, from a land site, or from a hidden device in or  near the victim’s house. Notwithstanding, what if there were some type device  that could make contact with that electromagnetic field that surrounds the  target and then operate within that field to attack us along our particular  brain frequencies? If that were true, distance would be no object and a person  could be pinpointed among several nearby people for electronic assault.

Satellites now possess amazing capabilities, all  performed by remote, and they may very well be utilized in electronic assaults  and mind control. In a 2003 article called Shocking Menace of Satellite  Surveillance, John Fleming wrote about the use of satellites in ESMC  assault. Discussing the realities of satellite-driven ESMC, Fleming said: “The  victim’s movements will be known, his conversations heard, his thoughts picked  clean, and his whole life subjected to bogus moralizing, should his tormentor  diabolically use the information gained. A sadist could harass his target with  sound bites, or audio messages, directly broadcast into his room; with physical  assault with a laser; with subliminal audio messages that disturb his sleep or  manipulate persons around him into saying something that emotionally distresses  him . . . .”

The satellite-guided GPS almost certainly figures  somehow in the electronic assault and mind control activities. Programs such as  Google Earth can locate and zoom in on houses and other objects on maps. That a  victim can be targeted regardless of his location and movement argues that a  satellite is very likely involved. For a satellite to be able to follow and  pinpoint the target wherever he goes, however, probably requires an object, a  substance, or a special condition in the target’s body or, as suggested above, a  device that can operate within and upon the electromagnetic field around the  target. The voices that many targets hear may be piggybacked over the GPS into  that electromagnetic field. Targets know that the intelligence community and  other agencies possess through-the-wall surveillance capability.

If satellites are used, distance is no object. Our  torture could be carried out from other countries just as easily as from the  United States. China, India, Israel, Russia, and other countries possess that  capability. Consider the use of drones in warfare. Today (November, 2009), the  United States often sends drones, or unidentified aerial vehicles (UAVs), to  strike targets in Afghanistan and Pakistan. Forward observers identify the  target, get permission to call in, and then communicate with the drone  operators. Those drones are guided by computer software by remote from  facilities in the United States, notably Fort Meade, Maryland, from thousands of  miles away through the GPS with pinpoint precision.

The use of satellites, however, does not prove that  the attacks come from a great distance. Satellites can also be used along with  the GPS from nearby. Handlers who live near targets can utilize satellites and  the satellite-driven GPS, using the same devices and methods, just as easily as  handlers who operate thousands of miles away. Information concerning weaponry  capable of being used by satellite for physical and neurological torture is  purposely vague about distances. Eventually we shall know from what range our  handlers operate. It will probably vary from case to case. Many targets believe  that our electronic harassment comes from U. S. Government facilities near  Fairbanks, Alaska called High Frequency Active Auroral Research Program, or  simply HAARP.

This paper does not explore in depth the methods used  to zero in on a person body and mind by remote. There are many schools of  thought on that subject. Here are some of them.

One theory believes that one’s voice can be recorded,  transferred to a computer, and the computer then used to locate the particular  voice and lock onto that voice’s brain. Experiments show that that can indeed be  done. Voices give off distinct vibrations that are as peculiar to a person as  his fingerprints and DNA. One day when the handlers were vibrating me  mercilessly, I tensed my throat, and the vibrations stopped.

That caused me to remember an incident that occurred  when I served in Africa in the 1980s. One day while working in my office, the  secretary from the embassy political section, the office that serves as a front  for our CIA agents, called me to ask some question that anyone could have  answered. I hardly knew the caller; thus, I instantly realized that the real  purpose of her call was to record my voice.

However, I believed that it was probably for security  purposes in case of kidnapping or being held hostage at some point. Voices are  very distinctive, and they can certainly be used to distinguish one voice from  another. That our intelligence community was recording voices in the 1980s makes  me believe that there may be some validity to the theory that perpetrators of  ESMC may be able to “hook” our brains, or at least determine our locations, by  zeroing in on our voices.

Some evidence also suggests that targets’ minds can  be “hooked” if the handlers know the targets’ DNA. If that is true, targets  would not necessarily have to have a microchip or other object or substance in  his body to be hooked. There may be some remote device that with the aid of the  GPS will locate a person and “hook” him using his DNA. If DNA can be utilized,  society is in deep trouble, for obtaining DNA samples of people is a very simple  matter. Even touching a glass or a can will leave useable traces of DNA.

It is reported that since 1979 all hospitals in the  United States have been required to send DNA samples of all babies born in the  U. S. to the Federal Government. I do not know the office or agency that is  supposed to keep that data. If that information is true, it adds credence to DNA  perhaps being involved in ESMC.

Still another theory talks about small devices  (nano-microchips) made so small that they can fit between molecules of water and  other liquids and be injected into the body in shots and inoculations. Patents  taken out by scientists describe that very procedure. Those same nano-microchips  can probably also be swallowed in food and beverages, attaching themselves to  the lining of the stomach.

There is also evidence that even human breath or  breathing somehow figures in electronic torture and mind control. Every  movement, even breathing, gives off a frequency. I later found out that when I  hold my breath for a few seconds, the vibrations temporarily cease. Yet, we do  not know whether breathing in itself has any connection with “hooking” a  target’s brain. The breathing theory does not explain how a target can be  pinpointed while in the close presence of others.

In addition, MRI and other machines have been  successfully combined with computers and used by remote along radio frequencies  to move digits and limbs, detect emotions, and “detect lying, racism, and even  identify which image a person is looking at, suggesting [that] one could  visualize scenes from a person’s dreams or memory” (Hospital Soup.com, June 10,  2008). The uses of a device such as that are endless if used on the brain’s wave  lengths or frequencies. Yet, those actions require an implant in the person on  whom the actions are performed.

Similarly, neurotransmitters can be used by remote to  communicate with brain cells through electrical impulses. That device can tap  into the brain’s functions that cause body movement, thought, feelings  (emotions), and communication. It could probably also influence the thalamus, or  the inner part of the brain, which regulates body temperature and controls urges  such as eating, sleeping, and sexual behavior, all of which figure among many  targets’ ESMC effects.

Laser guns may play a role in ESMC. A CNN news  program on February 23, 2009, reported that 148 incidents of lasers aimed at  airplanes had already been reported since the beginning of the year. In the last  incident, the laser was green in color and about the size of a pencil. If a  laser beam can be focused to such a fine point over several miles of distance,  imagine what it could do when trained on an individual or an object from a  closer distance over a period of time.

Mounting evidence suggests that a substance or an  object can also be introduced sexually into a target’s body to “hook” his or her  brain. Several of my correspondents mention that their ESMC began after having  had an intimate relationship with somebody. Those relationships may have been  set-ups. Spies and undercover agents have used sex for centuries to entrap  individuals. Some such object (nano-microchips) or substance could possibly be  introduced into targets vaginally, orally, or anally through sexual contact.

Some targets believe that the perpetrators’ device  enters through the targets’ eyes to carry out the electronic attacks on the  targets’ bodies. Presumably that would happen after the targets are already “hooked.” One target whom I know wears professional goggles that she says help  keep out the light used by the assailants. Another target also believes that he  is attacked using light. He describes the lights as very bright street lamp-type  elevated lights that seem to rotate. He believes that his attackers piggyback  their laser, or whatever the remote device might be, on the beams of light.

Remote cognitive neural monitoring is one of the most  recent theories. That theory has the targets’ minds being located and “hooked” using some type frequency by remote that somehow connects with the brain without  anything being implanted in the targets. I believe that theory is pure  disinformation, disseminated by the very elements who are carrying out the  remote torture. Why do I believe that? Use your brain. If it were that simple to “hook” a person’s brain, all the drug lords and pushers, heads of crime  syndicates, crooked politicians, white collar crooks, prostitutes, child porn  makers and distributors, foreign and domestic terrorists, bank robbers,  embezzlers, money launderers, and other criminals would already have been caught  and sent to prison. That has not happened; therefore, in my opinion, that  theory, which has caught on in the targeted community and is believed by many  targets, is not valid. Let me repeat: remote cognitive neural monitoring, in my  opinion, is not a valid theory.

Other theories include wiring in the ear that  connects with the brain and pins that penetrate the skull. If those ideas are  valid, the procedures would have to be done in medical facilities or at least  while the target is under sedation. If true, this further indicts the medical  community for its complicity in electronic and mind control assault.

All that said, pick a theory. In truth, we do not yet  actually know how high-tech assailants can focus on a single individual and  capture that person’s mind; neither do we know what instruments are used in the  process. Both are highly guarded secrets shrouded in deception. In fact, there  may be several methods of “hooking” the target as well as several methods of  administering the electronic and mind control effects. However, the only proven  method thus far is through implanted microchips.

Whatever device is used to “hook” the brain, it has  the capability of using that system on diverse targets in a variety of  circumstances in all types of locations. A super computer necessarily has to be  used along with the device, and that computer uses programs with an amazing  range of capabilities. Only the government, research institutions, and  mega-businesses and organizations would probably be able to own such computers  and be able to acquire some of the more sophisticated computer programs. We  shall later see some of its capabilities and the effects they have on the human  body and mind.

Although I cannot prove it and although I possess  little technical expertise, here is what I believe. The attackers use two  different methods, one for the V2K and another one for the array of physical  effects they are able to cause the body. The V2K is projected to targets via the  use of directed sound and GPS, and the physical effects by software used in  conjunction with implants. Both require frequencies. However, in my opinion,  without an implant, targets cannot receive the continual V2K. There is no way  for attackers to focus on targets with V2K regardless of where targets go, even  using satellite GPS, without their being some type of object in the human body  to receive the signals. I further believe that any other method disseminated  over the internet is probably disinformation coming directly from the perps.

Microchips, the Most Plausible Agent for  Targeting

The only proven method of “hooking” a target’s brain  is through surreptitiously implanting a microchip or a nano-microchip in the  target’s body. Scores of patents dealing with microchips in the human body and  operated by remote have indeed been filed, many of which, in the wrong hands,  could be utilized for electronic abuse. I have read of only two persons who  supposedly located microchips in their bodies, had them surgically removed, and  then had them identified. My efforts to contact those individuals failed;  however, their cases are well documented. I know other targets who have located  foreign objects in their bodies but have not been able to find surgeons who  would remove them. We know that many forms of microchips have been developed for  the human body for many purposes, all of them capable of being controlled by  remote.

If indeed microchips turn out to be instrumental in a  target’s electronic assault and mind control, it directly implicates the medical  profession. Only persons in the medical field, intelligence agents, and perhaps  law enforcement are able legally to acquire microchips. Those microchips had to  have been implanted at some point by a dentist, a doctor, an anesthesiologist, a  nurse, or somebody else in that field unless a target is somehow sedated by a  knowledgeable person who implants the microchip. Those cases have indeed  occurred.

Since syringes are generally used for the  implantations, nurses are particularly suspect in committing that crime. If a  doctor, nurse, or another member of the medical profession would implant a  microchip in a patient, he would also probably not hesitate, if given orders, to  inject that patient with live cancer cells, Hepatitis C, or AIDS. That, of  course, does not mean that every doctor and nurse engages in that sordid  practice.

I got a letter in early 2010 from the mother of a  victim in Scotland who stated that her son was implanted with a microchip while  he was in jail. He could later feel the lump where the microchip had been  implanted. For months he suffered relentless electronic and neurological  attacks. A local doctor later saw the microchip on his scanners and removed it.  The victim instantly improved. Afterward, the doctor refused to discuss it with  the victim and his mother, telling them that he found nothing.

Targets require some object, substance, or  characteristic in their body that will attract frequencies used by their remote  attackers. Otherwise, if the electronic and mind control assault is delivered  along a frequency, how does the effect distinguish that particular person? A  target can receive vibrations while in the presence of other people without the  others feeling it. Certain voice inflections and tones of narrators on TV also  cause jolts in a target’s body without others sitting nearby feeling them.  Something on or about the victim’s body has to act as the receiver for some  device that delivers those effects.

Whales, dolphins, sharks, migratory birds, endangered  animal species, and other animals, fowl, and reptiles have been fitted with  microchips for many years to trace their migratory patterns and monitor their  vital signs. If the animals’ blood pressure and other body functions can be  monitored by remote, they can also be manipulated by remote. If animals can be “tagged,” humans can also be tagged.

The microchip has been around since the 1970s. Since  then, many versions of microchips have been invented and manufactured. One such  microchip was invented by Peter Seth Edelstein of Menlo Park, CA and Benjamin  Theodore Nordell II of San Mateo, CA and patented on September 5, 2006 under the  name Method and Apparatus for Locating and Tracking Persons (Patent No. US  7,102,508 B2).

The patent was sold by the inventors to Persephone,  Inc. of Menlo Park, CA. Interestingly, my online search for Persephone turned up  very little on that company. It very well may be only a front for Department of  Defense contractors who carry out experiments and invent and improve gadgets for  the DOD. At any rate, it is not a highly visible organization.

Although the ostensible purpose of the above patented “device” is to locate and track persons who are lost or kidnapped, it lends  itself to many more devious and sinister purposes. Descriptions of patents of  this type are purposely made very vague; however, reading between the lines, we  can glean the following information about that particular patent as it relates  to targeted individuals.

–  the “device” is indeed a microchip;

–  the microchip can be implanted in virtually every  part of the human body, even in   body cavities (use your imagination);

the microchips serve as both transmitters and  receivers;
those microchips are encased in a substance that  does not irritate the flesh  around them;
– the remote operators [the handlers] use a handheld  device, probably a small radio or a cell phone, that in conjunction with cell  phone towers “activates” the microchips;

– the users, or handlers, also communicate with each  other by cell phone;

– the users do not have to be physically present in  a single location to coordinate  their efforts but can instead use “conference  calls from various locations;”

– the microchips CAN be shut off by the initiators;

– the microchip lasts indefinitely, as it can be  continually recharged;

– the microchip’s software can indeed see the  target’s body and even the organs  inside his body;

– the microchip can be programmed with a vast variety  of software that renders many of the physical and neurological effects (the  voices, etc.) experienced by targets;

– those effects can be programmed to occur whenever  the programmer wishes;

– users/operators of the microchip can monitor  several targets at the same time by  remote.

Distance was not mentioned in the patent. In the  drawing that accompanied the patent, communication is depicted by three cell  phone-looking towers. Patents, however, are often written in a vague and  misleading manner, especially those patents that can also be used for unethical,  intelligence, or military purposes. Thus, the communication system shown could  be the triangulation of satellites. The use of satellites would make the patent  workable at any distance. Even regular radio frequencies patched from one area  to another would allow the handlers to operate from a far  distance.

Likewise, the device used to communicate with the  microchip was not mentioned specifically. Although the three towers were shown  in the figure demonstrating how the patent works, the narrative did not state  whether the device was a radio tuner, cell phone, land line phone, or some type  of scanner/radio. Moreover, the radio towers may have represented a  triangulation of satellites.

The microchip’s computer software determines its  effectiveness. By adding new software, the microchip can be adapted by remote to  the target’s evolving situation and change in location. Additional software,  tailored for the particular target, can be introduced into the microchip by  remote at any time. That software can be continually refigured and reprogrammed  as necessary, based on the target’s actions and reactions.

To be used in the human body by remote, microchips  must have a unique identification (ID) such as a symbol, a number, a word, or a  combination of those. There is even some evidence that a target’s DNA profile,  or a distinct part of it, may be inscribed on the microchip. The target’s ID has  to be known and entered into the handler’s device for a match before it can be  contacted by remote. Once the codes are matched on the microchip and the device  used by the handlers, the device’s computer software, without which the device  is useless, acts through contact with the microchip to carry out its various and  many purposes. There must also be a radio frequency to connect the sender to the  receiver, becoming an RFID (radio frequency identification), much like that used  in store scanners at the check-out counters.

The device used by the handler who operates the  device and software must be reasonably small and portable (battery operated).  The name of that device is carefully avoided in the patents; however, it will  probably be a common or perhaps customized cell phone, a small radio or scanner,  laptop computer, or a similar object that has both receiving and transmitting  features. Logically, only one handler has use of the computer that controls all  the functions of the software on the target through the implanted microchip;  otherwise, the computer commands could conflict and negate each other.  Nevertheless, other handlers using those handheld devices can doubtlessly locate  the target using the device.

The trainer manual doubtlessly instructs the handlers  to vary their methods of attack on their targets. Some targets may get the V2K  and no neighborhood stalking; others may outwardly receive only the electronic  effects, i.e. jolts, vibrations, and pin pricks; still others may get a  combination of electronic effects, V2K, and organized physical stalking. That is  totally by design, for if the same technique were used on every target, it would  be far easier to research that technique, develop shielding for it, and possibly  trace it to its origin.

Introduction of the microchip into a target’s body  can be performed in a variety of manners: through shots and inoculations,  through medical procedures, through tiny projectiles (microscopic darts), and  drugging the victim first and then administering the microchip. Apparently many  targets are “tagged” using the latter method. Hypnosis often accompanies the act  so that the target will not remember being drugged.

Although hidden microchips have been recovered from  the bodies of unknowing and involuntary targets, their detection and removal has  proven very difficult, as doctors very reluctantly write orders for the use of  instruments that can detect those microchips. Moreover, today’s microchips are  purposely made too small to detect and with materials designed to conceal them.  Regardless of whatever other device(s) and method(s) might be used to perform  ESMC on involuntary targets, we know that microchips can be and are used for  that purpose.

Most microchips, like implanted medical devices such  as hip replacements and pacemakers, are probably not expected to last beyond a  certain period of time. That argues that targets are implanted with multiple  microchips so that if one stops functioning, another one will continue.  Continuity in electronic stalking and mind control is very  important.

Many targets receive both voices as well as physical  effects from their attackers. There is increasing evidence that the voices and  the physical assaults may stem from two different remote weapons. For example,  in my case I not only receive electronic effects but also get the voices. If the  voices come from an illegally implanted microchip, why did hundreds of holes  appear in sheets of aluminum foil I had placed over my bedroom windows? This  suggests that if indeed microchips are used, they must function in consonance  with the electromagnetism and directed energy weapons.

We have been led to believe that microchips are  cylindrical capsule-looking devices about the size of an oft-quoted “grain of  rice.” That may no longer be true. Today scientists have the capability of  manufacturing a microchip in many forms and shapes and from many substances. A  microchip may now look like a very thin wire no longer than perhaps a quarter of  an inch. Another possible microchip will look like a mole and will probably be  attached to the sub-dermis with very short wires that serve as antennas.  Nano-microchips can also probably be ingested orally.

Microchips have evolved from the traditional,  capsule-like ones often pictured in articles about the Verichip on the internet.  Today microchips take many shapes, forms, and sizes. There is proof that  microchips in the form of tiny darts smaller than a human hair and less than a  quarter of an inch long can be shot into a target from a distance.

I definitely feel that there is at least one  microchip in my body. Some of my symptoms could only come from within the body,  for example, the unusual salivation, the cramps, the gastric disturbances, and  the pin pricks. Those effects can probably be caused only by specialized  software. That software must operate in conjunction with a code from an object  within the body that responds to a computerized command – doubtlessly a  microchip. Let me repeat that despite the many theories, so far ONLY microchips  are PROVEN capable of interacting with victims to produce physical and mental  torture.

In my case, most of the symptoms occur on and around  my head, which leads me to believe that if there is indeed an object in my body  probably located in that region. Here are some of the effects on my head:  tinnitus (ringing in the ears); tops of ears oozing a colorless fluid; sensation  of bubbles popping in mouth; salivating from the mouth at any time; pin pricks  on the eyes and a loss of vision; the top of the nose coating over with a thick  crust; tingling on the skin (as a result a brown spot has appeared on the right  outside nostril and a sore-type depression, on the right side of my chin);  clicking on my head and in my left ear; frequent, long-lasting, pin-like prick  on the back of my neck; the sensation of flies crawling on my face; a  psoriasis-like area on my cheek near the left eye; a very sharp sensation on or  in several teeth (as if a dentist drill had hit a nerve); a heavy pounding,  throbbing in the back of my head; an unnaturally intense itching in the corners  of my eyes and on my eyelids; pin-like pricks in the depths of my ears that  cause me to shudder violently; air that pushes my lips out as if I were snoring  through my mouth; scratching of the throat, which causes either sneezing or  coughing; a tingling inside my nostril that induces sneezing; blockage in my  esophagus that makes it difficult to swallow; constant itching inside my  nostrils that makes me want to “pick” my nose; and of course the voices that  occur in my brain or ears. (More about symptoms later.)

Software and Its Uses for  ESMC

Regardless of how a target is “hooked,” to perform  electronic stalking and mind control on that target requires a computer and  computer software. The software is used for both the electronic, or physical  effects, and the neurological assault. Much of the software utilized can be  bought off the shelves in retail stores. Other software, particularly that used  for neurological assault, is specialized and probably can only be procured by  medical personnel and authorized persons in the military-intelligence-law   enforcement-industrial complex. That computers and software are used for those  purposes strongly argues that targets carry some type of foreign object in their  bodies for them to act upon.

Physical Effects

Everybody has seen movies in which scientists  manipulate radioactive and other devices from behind glass walls with  instruments by remote. Nowadays doctors can do the same thing, except at a much  greater distance. Physicians can monitor and adjust their patients’ heart beat  rate, blood pressure, and other bodily functions by remote over hundreds,  probably thousands of miles. I know a person in south Louisiana whose heart  doctor lives and practices in Houston. Whenever the person experiences an  irregular heartbeat, he simply calls the doctor who then monitors the patient’s  heart using his computer software and adjusts the heartbeat rate by remote. The  doctor’s device must necessarily key in the ID number or symbol on the patient’s  pacemaker to be able to do that.

It is only too logical that the same device that the  physician uses to regulate a heartbeat can also be used to cause the opposite  effect, an irregular heartbeat. My handlers often attempt to interfere with my  normal heartbeat while repeating subliminally, “Heart attack.” Targets call that “faux heart attacks,” or “induced heart attacks.” Many other targets also suffer  from irregular heartbeats caused by their handlers. Those targets only very  rarely wear pacemakers, which argues that they must host some other type of  receiver-transmitter in their body that carries an ID that can connect with  similar software.

In addition to the software that causes faux heart  attacks, the handlers possess software that allows them to cause severe gastric  problems, including the formation of much stomach gas or air on the targets’  stomachs, and to light up the interior of targets’ stomachs, intestines, and  esophagi. I suggest that the handlers employ software used for performing  colonoscopies. Although a doctor who does a colonoscopy operates from nearby,  the device nevertheless operates by remote.

The handlers use software that provides a light that  allows them to view our organs and the inside of our throats and stomachs by  remote. Moreover, the handlers can perform sodomy on targets, as they have on me  and on many of my correspondents both male and female. When that occurs, it  feels exactly like the tube used for the colonoscopy. If a device can function  from a few feet away by remote, what is to prevent its performing that same  function from many miles away?

Doctors also perform eye, nose, and sinus surgery  using computers by remote. Once again, normally the computer and the computer  software are in the same room with the patient. However, it could easily be used  by remote over a great distance. Likewise, hearing technicians who fit hearing  aids check and adjust the hearing by remote. That could be done a thousand miles  away as easily as from the desk in front of the hearing aid recipient.

Prostate problems are often treated by instruments  run off computers using specially designed software. Many male targets complain  that their handlers cause them pain in the groin and cause unnatural erections.  By stimulating parts of the penis or vagina and the colon by remote, the  handlers can cause erections in men and unnatural orgasms in women. Playing with  the targets’ sexual organs by remote is seemingly one of the favorite activities  of the handlers.

There is also various specialized dental software  that allows the user to view the patient’s teeth and mouth in great detail by  remote. Those programs work with x-rays of the patient’s mouth. Dentists  normally use a simple laptop computer for that purpose. I suspect that a  dentist, using the dental records of a particular person, could locate with his  dental software that person wherever he might be. The same type program can be  used with x-rays of any part of the patient’s body, either internal or external.  Many targets complain that their handlers are able to focus on particular teeth  to make them feel like they are being drilled without an anesthesia. Although  that computer software is normally used only a few feet from the patient, it can  also be used from many miles away.

No comments:

Post a Comment