Vous êtes sur la page 1sur 25

WHAT THE ATTACKERS V2K TELLS US Explanation of the Study Targets of remote-delivered physical and neurological torture have

neglected for years to analyze the voices (V2K) that many of them receive to learn more about the attackers behind those voices. In July-August, 2012, nine voice-hearing targets set out to do just that by studying what the attackers say and how they say it. The group hoped that the study would show a pattern in the tactics that the attackers use. And indeed it did. Of the nine participants, seven were female and two were male, ranging in age from the thirties to the seventies. Participants represented the South (4), Southwest (3), Mid-West (1), and the Pacific Northwest (1). Seven of the nine targets were Caucasian. Although the number of the participants was small, the targets were representative of the targeted population in gender, location, age, and race. A similar study using the same questions but with different targets, hopefully in different areas, will be conducted in the future to validate or revise the initial findings. Methodology The methodology of the study was simple. The participants answered approximately 170 questions in sets of 10 and 20 questions at a time about what they hear from the attackers. Those questions are found in the Appendix. The answers for each set were tabulated and a summary of the tabulation was provided to the participants after each set. Afterward, I performed an analysis of the tactics used by the attackers in their V2K based on the participants answers. The analysis focused only on those answers provided by the targets that showed agreement among them (at least 6 of the 9 targets in agreement). Special attention was given to the unanimous answers. At the completion of the analysis, all nine targets participated in a conference call in which they discussed the study and the findings. A study of this type has inherent weaknesses: (1) The survey covers only a small number of targets who receive the voices. (2) There is no standard terminology used in targeting; thus, some participants may have interpreted the questions differently. (3) There is no way to determine whether targets who claim to be targets are true victims, mentally impaired, or perhaps feigning their symptoms (perps). (4) The targets answers are subjective, based on their own experiences and beliefs. (5) The survey may not ask the right questions.

The purpose of the study was to see what tactics the attackers use in their voice projections. After gathering the information from the participants, I was faced with the problem of how to present our findings. Finally, I decided to let the answers from the participants suggest how the analysis would be presented. Those answers seemed to fall under two general headings, or topics: general tactics and specific tactics. The specific tactics are sub-divided under still other headings. Since the attackers employ psychological methods in their talking, my analysis deals largely with the psychology behind the V2K attacks. I am neither a psychiatrist nor a psychologist; nevertheless, having been a victim of psychological usage for many years, I have become very knowledgeable of how the attackers use psychology in attempting to ruin targets lives. The interpretations are mine and mine alone, as are the other views expressed in this analysis. The reader will have to make his own judgment about the accuracy of my interpretations and views. I am not sure that I have used the correct method for describing the tactics of the attackers. There may be a better way to categorize the tactics than the system that I used. In addition, I may have failed to see a major objective of the attackers. If so, I invite the readers to make suggestions about the format and the objectives identified in presenting the material. The reader should keep in mind that some tactics of the attackers that I list could fall as easily under two or more headings. To avoid repetition, I listed them under only one heading. General Comments The lives and backgrounds of the targets who receive the voices are diverse, and those targets share very few commonalities among themselves. That suggests that various groups engage in the attacks. Naturally, each group will probably identify and attack more than one target and thus will have a cadre of trained attackers. Each group must be large and powerful enough to provide the manpower and finances to sustain the torture that they inflict on their victims. The group may represent several entities: (1) Private citizens who have some twisted reason for targeting people they do not like or whom they wish to neutralize. Bob Boyce, a Georgia inventor, was injected with a microchip after his partner drugged him. The motive in that case appears to be greed and power. Although individuals may often target persons, they cannot sustain the 24/7 voices. Thus, in our cases, we can rule out individuals as our attackers. (2) The Federal government, including the military, the intelligence communities, and the defense conglomerate. (3) Medical and research institutes (pharmaceuticals, etc.). (4) Scientists and research doctors acting on their own. (5) Religious Right groups. (6) Social/civic groups, including so-called vigilantes, or cause stalkers. (7) Well-heeled and organized PACs with special interest agendas,

especially those representing the interests of foreign countries. (8) Perhaps others. Most of the groups probably have sub-groups and/or accomplices in the larger cities and perhaps even all over the United States. What is important is that each group must have access to the same object(s), device(s), and method(s) used to conduct the remote torture on their victims. To me, that shouts microchips, the only method that has so far been proved. Microchips are readily available from scores of manufacturers in many sizes, forms, and shapes and easily implanted in the victims through medical procedures, surreptitious drugging and implanting with syringes, through ordinary shots and inoculations, and, if nanomicrochips are used, perhaps through sexual acts (vaginal and anal) and through ingestion in food and drink. Many microchips contain both receivers and transmitters that, with software, can be used by remote using common and specialized software with common computers to conduct the voices and perform the physical effects. There may be other torture and voice-sending methods that do not involve microchips; however, if they exist, they have not been verified. This study does not try to determine or explain the method used for the attacks. However, the method is important to know if targets are ever to receive relief from their torture. Technically inclined targets and sympathizers are working toward identifying the method(s) used. Most targets also experiment with shielding, with very poor results. Thus far, no enduring shielding device or method has been developed. Although important, the object/device/method of targeting is an entirely different matter from this study and does not figure in this study. Regardless of the nature of the groups behind the attacks, their objective is always the same: to neutralize the target. Neutralization begins with isolating the target, breaking him financially (often by causing him to lose his job), and getting him to appear crazy. Most of that is achieved through the neurological attacks, especially the V2K, rather than the physical attacks. Neutralization occurs with the eventual death of the target, either from the results of his physical attacks or by his own hand (suicide), causing him to be committed to a mental institution, or perhaps through behavior modification, causing him to succumb to the groups agenda. I might mention, however, that although the two latter results may be accomplished, the torture almost always continues. Thus, we can probably state accurately that the ultimate objective is the death of the target, probably even when the target is used for experimentation purposes. Dead victims do not talk. What the Study Found About the Attackers Themselves

The purpose of the study was to study the tactics of the attackers, not the attackers themselves. Nevertheless, the answers of the participants do tell us something about the attackers. In most cases, the attackers appear to be native-born Americans or at least persons who are either perfectly bi-lingual or whose first language is English. Seven of the participants said that the attackers did not have a noticeable accent. That in itself is not particularly significant, as we know that software programs that can be bought off the shelf allows the users to adopt various accents, including an American accent. However, six participants said that the attackers even use local words and expressions in common usage in their areas. Most of the participants also agree that the attackers do not appear to be above average in education and intelligence. Despite the ingenious plan used for the attacks, the actual attackers are probably just plain, ordinary--though evil-minded--government personnel or other people who one would expect to see on the street every day. All targets state that their attackers use profane language, dirty slang, or curse words. That information and their use of tactics dealing with degenerate sex disproves the notion that the attackers are religious zealots who are attacking targets for the targets beliefs or trying to convert the targets to some form of religion. Indeed, although some radical religious groups would doubtlessly target certain people if they had the means to do so, the actual attackers are sorely lacking in personal religious convictions. If my interpretations are accurate, the attackers do appear to follow some common guidelines set out in an original master plan. That hints that one or more of the attackers may date back to the shaping of that plan or were at least trained by one of those earlier individuals. Thus, if I am correct, some of the attackers will be in their 60s and even in their 70s or still older. The Attackers General Tactics V2K is a form of neurological assault, which always includes mind reading along with the voices. The voices themselves are complex, for there are audible voices, i.e., the usual V2K, as well as the inaudible voices, aimed at the subconscious. The latter are sometimes referred to as layered voices, imposed upon the usual V2K and/or underlying the V2K. Unfortunately, very few targets are able to hear the inaudible voices, which produce far more negative results than the audible voices. Deception runs deep throughout the verbal attacks. Without deception, the voices alone would probably have little effect. The tactics that the attackers use reflect that deception. Everything that the attackers say and do has a purpose. The plan of attack is carefully contrived, and psychology plays a major role in its implementation.

The following actions identified in the V2K study demonstrate some general tactics that all attackers seem to use in their neurological assault. -- Talk in a very low volume that allows targets to hear only snatches of what they say. Eight of the nine targets said yes.
A well known tactic of speakers who want people to listen closely is to lower their voices to a scarcely audible pitch. That is a basic psychological tactic on the part of the attackers.

-- Command the attackers to go somewhere or not to go somewhere. Eight targets answered "yes." -- Accompany their V2K with strange noises that seemingly come from outside, like a dove cooing or a dog barking (when there is no nearby dog). Eight of the nine targets answered "yes." -- Sometimes tell the targets that they are very smart/intelligent. Seven participants said "yes." -- Attempt to cause sleep deprivation. All nine participants answered yes.
Sleep deprivation is a form of psychic driving, or rendering the target to a physical and mental state of exhaustion. It promotes lethargy and grogginess in the targets. It also makes targets prone to having accidents, gaining much weight, and being unable to think and reason carefully. With sleep deprivation, targets are far more easily transformed into faux schizophrenics and paranoids.

-- Pretend to extort money from or blackmail the victims. In eight of the nine cases, the attackers pretended to extort money from the targets.
That is pure deception. Although the attackers say that they want money, they do not follow through with instructions about how to get them the money. Blackmailers and extortionists always have a plan for the delivery of funds. Our attackers do not. Few targets would be unwise enough to follow those instructions, anyway.

-- Tell the victims that they are going to hell or to jail. Eight of the targets report that their attackers tell them that theyre going to hell. Of those eight, four targets state that the attackers also said that they were going to jail.
Nobody knows for certain whether there is a hell and, if there is, who will go there. However, the attackers know that most targets hold some religious belief about hell, which receives much hype in the JudeoChristian realm. Telling targets that they are going to hell is a blatant attempt to frighten targets, to fill them with fear, and to induce anxiety. It is deception at its height.

-- Address victims by a code name, nickname, or some other name that the victims do not use. Seven participants say that their attackers use code names, or nicknames, for them.
Code words and expressions are used throughout the attackers psychological assault. Although targets will not always know why their attackers use particular code names for them, the code names have something to do with their targeting. For example, my code name is estados unidos because I lived in Latin America for years and speak Spanish. Much of their talking contains code, which may be disguised to make it sound like regular talking. The use of code words and expressions strongly suggests that targets have been pre-hypnotized, either before they were actually targeted or early in their targeting. . .

-- Claim to be or suggest that they are various groups. All but one participant stated that the attackers have suggested that they represent various groups.
The attackers will NEVER reveal their true identity. They may be cowardly creeps, but they are not utterly stupid. Yet, they deceive the targets by telling them or suggesting to them that they represent various groups. The only way the attackers may possibly identify themselves is when they claim to be various groups. One of the groups that they claim to be may just be the correct affiliation. The problem is that the targets will not know which one. Deception again.

-- Give the victims commands when they know that the victims are going to do that action anyway (washing your hands, brushing your teeth, closing the door, turning out the lights, etc.), All nine targets answered yes.
This is a psychological trick on the part of the attackers, which amply demonstrates that psychologists and psychiatrists had a hand in developing the attack plan. The attackers seek to get the targets used to hearing their commands. Psychologically, although the targets are going to do those actions anyway, they are aware that they are following the attackers instructions. The orders that the attackers give for mundane actions lay the groundwork for later orders of a more serious nature. Hearing the attackers commands about simple tasks also make the targets more receptive to obeying the commands of the attackers during the latters subliminal interrogations and programming. More psychological deception.

-- Repeat particular numbers to victims. Seven targets answered "yes."


Once again this is a psychological trick. By repeating certain numbers, they know that the minds of the targets will relate somehow to that number. In the minds of the targets, the number becomes a particular age in the lives of the targets, perhaps the number of children that they have, or perhaps the year in which they married. The attackers state the number and then listen to the targets thoughts about that number. Pure psychological deception.

-- Praise the targets for something that they do or think, a form of good cop/bad cop.. Seven targets answered that the attackers sometimes praised them; eight targets stated that they played good cop/bad cop.

Here we go again. The attackers want to throw the target off guard. They sometimes do so with flattery. Then, just as suddenly, the attackers strike the target down with gross insults. That confuses the target, which is what the attackers want. It also teaches the targets what the attackers like and what they do not like. Subconsciously, people want to think and behave in a manner acceptable to those around them. Thus, this tactic is a form of conditioning the targets. By using this method, the attackers know that in the future the targets will try to please the attackers in what they say and do.

-- Use other voices that victims believe that they are not supposed to hear underlying or superimposed over the usual V2K. Most of the participants sometimes hear those additional voices.
Targets are not supposed to hear consciously those inaudible, or silent voices. Unlike the regular V2K, these voices cannot be heard by the conscious, but only by the subconscious. Occasionally, targets will hear those silent voices, but usually they do not. The subconscious voices are the most dangerous form of V2K for they lead the targets to act, do, and think in ways that are not truly characteristic of those targetsall without the knowledge of the targets.

-- Cause the victims to make mistakes, have accidents, or ruin something that they are doing. All nine participants answered "yes."
This is caused by the silent voices referred to above, voices that the target does not usually hear. Although the target cannot hear what the attackers say, the attackers constantly, through the inaudible voices, play with the targets, for example, causing them to take the wrong exit while driving, to be careless in using dangerous tools, and to use the wrong measurements in building, sewing, etc. This makes targets unsure of themselves in making decisions and thus makes them to be more vulnerable to the attackers other tactics. .

-- State units of time such as Four thousand years ago, etc. or twelve years ago. Six targets said "yes."
This is a form of programming by the attackers. Whenever targets hear those units of time, they will think along the lines of their pre-hypnotism. Stating expressions of time also causes targets to ponder and worry about the meanings. The attackers want targets to think about their targeting every waking second. Those expressions make the target concentrate on the meaning and thus on his targeting. Once again, a clumsy attempt on the part of the attackers to use psychology.

-- Make innuendos about why the targets were selected for targeting. Eight particpants said that the attackers made innuendos about the reasons.
By making innuendos about the reasons for their attacks, the attackers know that the targets will relate that reason to their past. It is a form of interrogation, for in every case in which a target receives voices, his mind is also being read. .

-- Give the victims specific instructions about what to do or not to do or what to think and what not to think. All nine participants answered "yes."

This is a test of the will of the target. If a target follows those instructions, the attackers know that he is weak and malleable. Hopefully the targets will not fall for that trick.

-- Invite the victims to join them. Eight of the participants were asked to join the attackers.
This is a cheap psychological ploy to test the targets strength and resolve. The attackers want to trap the targets into an admission that the attackers have reason to attack the targets by making the targets believe that they might be able to join the attackers. Asking targets to join them suggests legitimacy for the attackers assaults. That is both deception and basic psychology.

-- Use obvious recordings interspersed in their real-time talking (although those recordings may be in the same voice). All nine participants agreed.
The recordings serve several purposes; however, its main purpose is saving labor. With recordings linked by a sporadic real-time voice, one lone attacker can carry on the V2K for hours.

-- Tell victims that they are hardheaded or stubborn. Eight targets said yes.
Psychology once again. By telling the victim that he is stubborn, the attackers are suggesting that if the target capitulates, he will be freed from his torture. It also suggests that the attackers have a good reason for their attacks and are attempting to help the targets through behavior modification. More deception.

-- Suggest to victims that if they do a certain act or think in a certain way that their attacks will stop. Seven targets said at one time or another the attackers hinted that if the targets did as the attackers wished, their attacks would cease.
More deception. I know of only two cases where targets torture allegedly stopped. Willingness on the part of the target to do or think as the attackers wish signals to the attackers that targets are desperate for relief from their targeting. Regardless of what a victim does or does not do, he remains targeted. Deception.

-- Sometimes express anger and frustration. Six targets said yes.


This is more child psychology. The attackers place themselves in the position of a teacher. An expression of exasperation or anger of the part of the teacher, suggests that the pupil (the target) is not performing well. It is human nature to want to please and to perform well for the teacher. This is psychology at its worst.

-- Talk negatively about particular ethnic, political, or religious groups? All nine participants said that the attackers talk negatively about a particular group.
Pure deception whose aim is to confuse the targets.

-- Pretend that they are religious. In eight of the nine cases, the targets were told that they are going to hell.
Pretending that they are religious makes the attackers look like they are in the right in their assaults on the targets and that the targets have sinned and thus deserve the torture. Psychology and deception.

-- Sometimes hint that they have been assigned to the victims and that the attackers are responsible for them.
Being responsible for somebody usually suggests some benign being who is trying to help that person for that persons own good. The attackers have indeed been assigned to the targets, but their intentions are anything but benign. Psychology and deception.

-- Attempt to take credit for negative things that happen in victims lives. Eight targets answered yes.
Making the targets believe that everything negative that happens to them empowers the attackers and make them appear omnipotent. The attackers want targets to believe that they are all-powerful.. Once again, pretending to be all-powerful suggests that they are rightful in their attacks. Psychology and deception

The Attackers Specific Tactics Everything that the attackers say and do is a part of the attack plan and has an objective. Many of those objectives are obvious in analyzing the answers to the questions. Although we have known those objectives for some time, we have not attempted to determine whether they are commonly used by the attackers. Listed below are some tactics employed by the attackers that our study shows are widely used to accomplish those objectives. Cause Anxiety in Targets Instilling anxiety in targets is a main objective of the attackers. In fact, anxiety is one of their major tools in neutralizing the targets. Anxiety is a horrible condition, as those who have experienced it know very well. For those who have not experienced anxiety, it is a fear of unknown origin, a disquiet that the person cannot fathom. The person is filled with dread, especially at night when the whole world seems to close in upon him. He is like a caged wild animal who seeks an escape, but there is no possible escape. He goes to bed with fear, sleeps fitfully, and wakes up with fear. What better condition could the attackers ask for? Because of anxiety, some targets eventually commit suicide. Others become psychological basket cases and totally discredited by their fear and the bizarre behavior that it creates. Here are some tactics that the attackers use to induce anxiety in targets.

-- Induce dreaming in which they stage scenarios or create skits and make the targets the principal actors. Eight of the nine participants said yes.
Those dreams and scenarios are designed to place targets in frightening or problem-solving situations that cause anxiety. They also show the targets proclivity to various fears (heights, enclosed places, mobs of people, etc.).

-- Call targets ugly names. All nine participants stated that the attackers call them ugly names.
Nobody likes to be called ugly names; yet, the voice hearers have little defense against that verbal assault. The names as well as the lack of defense induce anxiety.

-- Try to make targets believe that certain foods and drink(s) and medicines in their domicile have been tampered with? Eight particpants said "yes."
This is an attempt on the part of the attackers to induce fear and suspicion in the minds of the targets. In probably 99% of the cases, the food and drink have NOT been tampered with. This is pure psychology conducted via the silent voices that have led targets to believe that intruders have come into their houses to poison them.

-- Comment on and ridicule things that targets write about on the computer. Seven targets said "yes."
Depreciation of peoples actions affects their self-esteem. When this happens repeatedly, it leads to anxiety.

-- Instill phobias in targets minds (fear of snakes, spiders, germs, water, etc.). Eight of the nine targets answered "yes."
Phobias indicate paranoia. This is an attempt on the attackers part to induce faux paranoia in targets. Although my attackers know that I am not afraid of snakes, they play loop-play tapes about snakes found underneath my bed. Whenever I go to bed, I pretend to talk to the snakes, advising them not to come out so that they will not get stepped upon when I sleep walk. Ha ha.

-- Bother targets when they are concentrating on a mental task, such as preparing their income tax returns, etc. All nine targets said that the attackers bothered them while they were concentrating on a particular mental task.
For several years, the voices distracted me as I filled out my tax returns on a computer program. Consequently, I made errors and did not enter items that could have been deducted. That, of course, was a tactic not only designed to frustrate methus creating anxietybut also amounted to a financial loss. By using my mind against their psychology, I learned to concentrate successfully on my tasks, and the attackers can no longer bother me whenever I do my taxes.

-- Suggest that relatives and friends of the victims are also targeted. All nine participants answered "yes."
Targets worse fears are that their loved ones, especially their children, will also be targeted. That fear is totally frustrating, as targets have no control whatsoever over what happens. This is one of the main psychological tricks to cause anxiety in targets.

-- Berate targets about what the targets write or think about and tell them its not true. Eight of the nine targets said "yes." This is designed to cause the targets to explain to the attackers their reasons for writing or thinking about those topics. Having to explain, insinuates that the attackers are in control and thus places the targets in a subordinate position. Pure psychology. -- Cause glitches on the victims computer when they do not like what the targets are writing. Eight participants said "yes."
Frustration leads to anxiety. The attackers know that. Thus, they cause malfunctions on targets computers to cause frustration, letting the targets know that those glitches are not simply computer glitches. I have recorded over 50 glitches that the attackers are capable of performing because of their control over my computer.

-- Relate to the targets stories about incidents in the targets childhoods. All nine participants stated "yes."
The attackers want targets to believe that they have known the targets since childhood. They usually have not. They are instead pulling those memories out of the targets minds through their capability of reading their minds. In other words, they are drawing upon the targets knowledge, not their own. However, that other people know their lives from infancy to the present induces anxiety in targets.

-- Criticize victims for something that they said to somebody or thought about somebody and try to make them feel guilty over it. All nine participants answered "yes." Guilt also causes anxiety. Berating the targets for their thoughts and actions make the attackers seem good and the targets bad. Moreover, it places the attackers in authoritative positions. -- Employ code words and expressions such as hospital and emergency room in their V2K to victims. Eight answered "yes."
The code is used in connection with previous hypnosis conducted on targets. During the hypnosis, the targets were instructed the meanings of those codes and how to respond to them, yet the conscious of

the targets is not aware of them. Most of the codes are intended to induce fear, doubt, suspicion, and anxiety.

-- Lead victims to believe that others are talking about them or making fun of them. Eight targets said "yes."
Another attempt by the attackers to induce faux paranoia. The attackers can project the V2K voices so that they appear to be coming from people nearby, thus making targets believe that they are being talked about.

-- Talk to victims about dead relatives and people whom they once liked very much but are now out of touch with. Seven targets said yes.
The attackers know that everybody thinks about people whom they once knew who are now dead, relatives as well as friends. By mining the memories of the targets, attackers know those relationships. They thus concentrate on those people and relationships that are most likely to cause anxiety in the targets.

-- Make the victims believe that they knew their families long ago. All nine targets report that their attackers pretend to have known the targets families in the past.
Once again, most of the knowledge that the attackers have about the targets pasts comes from the targets own minds. Only in rare cases will the attackers probably have known the targets family. Even if they did, they would not have had knowledge of many of the long-ago stories that the attackers tell about family members.

-- Tell victims that they and their loved ones are going to die. All nine targets answered "yes."
Death means loss, permanent loss. Thus, this is purely for anxiety purposes.

-- Cause one of the voices to sound similar to the victims voices. Seven of the nine targets said that the attackers have used or continue to use a voice similar to their own voices.
Hearing ones own voice is at first supposed to rattle the target. It also causes the target to relate to that attacker using his own voice, as his voice is a familiar one. Reproving and threatening a target in his own voice is intended to induce anxiety.

-- Threaten to burn down victims houses, destroy their possessions, or vandalize their property. Six of the nine targets answered yes. Another target said that they used to but now do not.

This tactic serves various purposes. First of all, it isolates the targets, for he is afraid to leave his domicile for fear it will be vandalized or burned down. It also induces anxiety in targets. In addition, it makes the attackers appear very powerful that they are able to accomplish that action. This type of action is more prevalent with organized gang stalkers than with attackers causing remote physical and neurological effects.

-- Re-enforce the V2K with holographic images. Eight of the targets experienced holographic images at one point or another in their targeting.
The holographic images are intended to awe targets with the power of the attackers. The images also frighten the targets and thus contribute to anxiety.

-- Mention places on victims bodies that are not visible to other people (a scar, a tattoo, etc.)? Six targets said "yes." -- Try to convince the targets that they are crazy. Eight participants answered yes. -- Urge targets to commit suicide. Eight of the nine participants have been or are urged to commit suicide. -- Make targets believe that a person they know said something ugly about them. Eight participants said "yes." -- Encourage targets in voice or thought to hurt or do harm to another person, either physically (including sexually) or emotionally. Seven targets claimed that the attackers do urge them to hurt others. -- Pretend that they can see the targets. All nine participants said "yes." -- Tell victims that they have a life threatening or a debilitating disease. All participants answered "yes." -- Project their voices over objects such as the spewing water when victims shower. Six of the nine targets said that they hear the voices over the running water. -- Increase the physical/neurological torture the night before an important event. All nine participants answered "yes." -- Sometimes use another language in their voices. Six participants answered "yes," and five of them said Spanish. One answered that they spoke English but with perhaps a Swedish or Irish accent. Only three of the targets stated that the language used held some significance for them.

-- Employ the V2K continually 24/7, using real-time and recorded voices. Seven of the nine participants hear the voices continually. . -- Use inaudible, or silent, voicessometimes referred to as layered voices--to make targets forgetful, e.g., of where they put objects, to take their medicine, to make a necessary phone call, to instill doubt about relatives and friends, and to induce anxiety. All nine targets agreed that the attackers use the silent voices on them. -- Blank out the thoughts of targets as well as cause other thoughts to surface in the victims minds. All nine targets said yes. -- Attempt to convince targets that they are ugly, fat, that they smell bad, or are otherwise undesirable. All nine participants answered "yes." -- Cause victims to hear actual voices talking about them without the victims seeing the speakers or seeing the speakers mouths? (Perhaps the speakers backs were toward the targets or the targets could see nobody at all.) Eight of the targets said yes. -- Urge targetsto eat excessively and eat the wrong kinds of food or perhaps drink too much. All nine targets answered "yes." -- Often attempt to make the victims believe that they knew the victims at an earlier age, using statements such as We went to elementary school with you? Or, "We went to high school with you? Six answered yes. -- Relate events in victims infancy and childhood to make them feel guilt, remorse, anxiety, etc. Eight participants said yes. -- Ridicule and make fun of targets during their prayers. Seven targets said that the attackers make fun of their prayers or their praying. Another target said that they sometimes do. -- Repeat the targets thoughts to them as the thoughts come to mind. Eight targets said "yes." One of those said that the attackers did not repeat them directly following the thoughts but did so later. -- Try to make targets think that they are bad and that the attackers are good. Eight targets answered "yes." -- Show targets holographic images of Christ and/or other religious figures. Seven targets answered "yes."

Interrogate the Targets Although it is easier for the attackers to interrogate the targets at night while they sleep, the attackers also interrogate them when they are awake. The interrogations clearly show the handiwork of psychiatrists and psychologists and the intelligence agencies in devising the plan of attack. In true Gestapo fashion, the attackers repeat their interrogation questions day after day until they are satisfied with the answers. Of course, they already know the answers to most of the questions, and through mindreading, they complete the information. One of the main objectives in the interrogations is to let the targets know how much the attackers already know about them. -- Question/interrogate the targets. All nine targets said that the attackers questioned/interrogated them. -- Tell targets that they are investigators. Eight targets answered "yes."
This is a psychological trick to establish authority over the targets. The attackers know that the minds of targets will respond more quickly and more accurately to their questioning if they pretend to be investigators, as Americans have been taught from infancy to yield to authority. It is also a tactic to give targets the impression of the attackers legitimacy in carrying out their assaults. In addition, it is designed to cause fear in the targets, for having investigators questioning them implies that the targets have done something wrong.

-- Pretend to be local law enforcement or to be working with local law enforcement. Eight of the nine targets stated that the attackers claimed to be law enforcement or working with law enforcement. -- Try to convince or suggest to targets that they have committed a crime or a sin. Eight targets answered yes. -- Show the targets photos of people, places, and objects while questioning them. Eight of the nine participants report that the attackers show them photos and question them about the photos. -- Direct targets thoughts to certain people, places, or objects and then question targets about them. Six targets said yes. -- State a number, which causes targets to think back when they or their children were that age or to think something else about that number. Seven targets answered "yes."

This is a fishing expedition on the part of the attackers. The attackers have already been provided general biographies and all existing files on the targets, but they need to fill in gaps in the targets information. Frequent statements of numbers programs the targets to focus on those numbers.

-- State a particular year and then question targets about that year. Six targets answered "yes."
The attackers already know the significant years in the targets lives and where they were during those years. Stating the year prompts targets subconscious to think back to those years. People remember traumatic, negative, positive, and sentimental facts about those years, i.e., whatever is meaningful to them. When attackers are capable of mind reading, as all V2K talkers are, they pick up what targets remember most about those years. .

-- Make targets feel that they have to clarify and articulate carefully their thoughts and even explain them to the attackers? Eight of the participants answered yes.
Targets have probably been hypnotized to visualize the faces of people that they think about and to answer questions carefully about people, places, and objects. (finish)

-- Cause targets to visualize in their minds the faces of people whom they think of or who the attackers cause them to think of. Eight of the participants said yes.
This is probably done through pre-hypnosis applied to the targets at some previous point or early in their targeting. It is a vital part of the interrogations, for while the attackers may have known names of people whom the targets know, they did not know their physical appearance. This allows the attackers to see those people, letting them put names to faces, or, in this case, faces to names.

-- State a particular first name and cause targets to think of all of the people whom they know by that name. Seven participants said Yes. -- Suggest that the targets are not patriotic. Six targets said yes. -- Question targets about their relationship with a particular individual or group. Seven of the nine targets reported that the attackers questioned them about "relationships." -- Ask targets questions about places they have lived in or visited. Six of the nine participants said "yes." Attempt to Isolate Targets -- Tell targets ugly and negative things about their friends and relatives. All nine targets said that the attackers said bad things about their friends and relatives.

-- Make targets suspicious of their relatives and neighbors. All nine targets report that the attackers try to make them suspicious of their neighbors. Induce Dreams Inducing dreams and staging scenarios are not merely for the attackers enjoyment. Those dreams and scenarios are intended to induce anxiety, provide additional information about the targets past (a form of interrogation), and program the targets thoughts and actions. 02. If you get induced dreaming, is there a particular theme to the induced dreams? Eight participants answered yes. One target said that there was no particular theme but that all of the induced dreaming was to build anxiety. 03. If you get induced dreaming, when you awake do you feel anxious, frightened, or upset? Seven targets said yes. 04. If you get the induced dreaming, do you actually see the other actors in a dream or do the attackers tell you who the others are? Eight targets said that they actually see the other people with whom they are interacting. One target said that he sometimes sees them and sometimes hes only told who they are but does not see them. Sometimes, he is not even told who they are. Use Physical Effects with Neurological Attacks 08. The attackers always accompany the voices with physical torture. All nine targets receive physical effects along with the voices. 03. Did the attackers hit you with any physical effects before you started hearing the voices? If so, for how long? Seven said yes. Of those, the previous physical effects ranged from 5 minutes to 25 years. 04. Have you experienced a ringing in the ears (tinnitus) ever since you first heard the voices? Eight of the nine participants report the ear ringing, but one of them said that it occurred about 3.5 years AFTER she started hearing the voices and another one said that it was only "off and on." . Employ Sex and Make Sexual Innuendos

07. Do the attackers ever use the expression (Name of a person) is crazy about you? Or (Name of a person) wants you? If so, which one? Seven targets said that at some point in their targeting or very often the attackers use those same expressions. 05. Did the voices begin shortly after you broke up with a companion or had intimate relations with a person? In six cases, the V2K appears to have something to do with a relationship. 10. Do the attackers try to make you think of relatives or friends when you are engaged in sexual activity? Seven answered "yes." 11. The attackers, along with their voices, touch and manipulate the targets genitals. All 9 targets stated yes. 18. Do the attackers ever use particular trigger words and expressions or show you holographic images that make you feel a sexual arousal? Seven targets said that they are triggered into sexual feelings. 19. The attackers usually attempt to connect targets sexually with friends and family members through their V2K? Seven said yes. 04. Do the attackers refer to you as being gay or try to make you believe that you are gay, that you are sexually attracted to small children, or that you want to have sex with a close family member (daughter, son, mother, father, sibling, etc.)? (Please explain.) All nine participants report that the attackers try to make them think they're gay or to think about having sex with children and close family members. 19. Do you ever feel slight vibrations on your genitals while the attackers are talking? All nine targets feel the vibrations. APPENDIX Set 1 01. When did you first start hearing the V2K? (Year, month, and date) 02. In what location did you first hear the voices? (City, town, etc.) 03. Where were you when you first heard the V2K? (House, car, airplane, etc.) 04. Do you recall what the attackers first said to you? (Please go into detail.) 05. How many voices did you at first hear? 06. Were they male voices or female voices? 07. Did the voices have a particular accent? (If so, please explain.) 08. Did the attackers use the same voices every day?

09. Are the voices you hear today the same ones that you first heard? 10. Do you receive the voices only occasionally, intermittently during the day and night, or continually. (Please explain.) Set 2 01. Do you hear the voices both day and night? 02. If the answer is both, are the voices clearer in the daytime or the nighttime? 03. Is there anything that seems to affect the clarity and volume of the voices? 04. Do the voices criticize you when you go about your daily tasks or are doing somethingthat requires some deeper thought? 05. Do the voices threaten to do harm to you? 06. Do the voices threaten to do harm to family members and/or friends? 07. Do you talk back to or dialog with your attackers through the V2K? 08. Do you believe that the attackers can read your thoughts? 09. Is there somebody or several people whom you know that the attackers often talk about? 10. What do the attackers say about that person or those people? Set 3 01. Do your attackers pretend to be religious? 02. If so, what religion do they claim to represent? (Christian, Jew, Moslem, etc.) 03. In their talking, do the attackers pretend to identify with a particular political party or civic group? 04. Do the attackers tell you that you are going to hell or going to jail?. 05. Do the attackers have a particular code name for you? 06. Have the attackers told you or suggested to you who they are? 08. Have the attackers ever projected their voices to you through the TV or a radio? 09. Do the attackers sometimes make you forget where you put objects and then belittle you for not remembering where you put them? (car keys, cell phone, medicines, toilet items, etc.) 10. Do the voices sometimes tell you that they are responsible for you, suggesting that theyve been assigned to you for your own good? 11. Do you feel that the V2K attackers sometimes blank out your thoughts? 12. Do you feel that the attackers sometimes cause certain thoughts to surface in your mind or tell you what to say, especially when theyre interrogating or programming you? 13. Do you also receive physical torture along with the voices of the attackers? 14. If the answer is yes, what type of physical effects do you get? 15. Do the voices try to convince you that you are crazy? 16. Do they use code words and expressions? If so, what are some of them? 17. Do the attackers use obvious recordings along with their real time talking? 18. As the voices talk, do the attackers sometimes manipulate your sexual organs? 19. Do the attackers attempt to connect you sexually with friends and family members through their V2K? 20. Can you hear the voices when you are conversing with others, watching TV, or are otherwise distracted?

Set 4 01. Have the attackers voices ever sounded like they came from your stomach? 02. Have you awoken at night while the attackers were asking you questions? 03. Do your attackers sometimes threaten to burn down your house or destroy your possessions or vandalize your property? 04. Do you also receive holographic images along with your V2K? 05. If so, what type of images do you see? (people, places, objects, etc.) 06. Do the attackers tell you ugly and negative things about your friends and relatives? 07. If so, what kind of things do they tell you about them? 08. Do you wake at night to hear the attackers questioning/interrogating you? 09. If so, what is the nature of the interrogation? (people, places, events, etc.) 10. Do the attackers sometimes praise you for something that you do or think? 11. Do the attackers pretend that they knew your family years ago? 12. Do the attackers sometimes pretend to be local law enforcement or to be working with local law enforcement? 13. Do the voices sound louder/clearer in one ear than the other? (Please explain.) 14. Do the talkers sometimes cause a clicking sound in one or both ears? 15. If you receive more than one voice, are they all the same volume and seem to come from the same place? [For example, in my case, I often hear a womans high-pitched voice screaming in the background, seemingly from a distance.] 16. If you receive multiple voices, does one of the voices sound similar to your own voice? 17. Do the attackers stage scenarios or create skits and make you the principal actor? 18. Do your attackers often whisper and talk in a very low volume that allows you to hear only snatches of what they say? 19. Do your attackers ever direct your thoughts to certain people, places, or objects and then question you about them? (Please explain) 20. Do your attackers appear to want to cause you sleep deprivation? Set 5 01. Have the attackers ever spoken to you in other languages? If so, what language? 02. If so, does that language have any particular significance in your life? 03. Do the attackers ever ask you about your relationship with a particular individual or group? 04. Have you experienced a ringing in the ears (tinnitus) ever since you first heard the voices? 05. Do the voices ever seem to come from the shower head or the spewing water when you shower? 06. Do your attackers especially bother you the night before an important event? (a job interview, departure for a trip, etc.) 07. Do you sometimes wake at night with the attackers showing you photos of people, places, or objects and interrogating you about them. 08. Do they pretend to extort money from you or blackmail you? 09. Do they ever ask you about places youve lived in or visited? 10. Have they ever told or suggested to you why you were selected for targeting?

11. Do the attackers use local words and expressions in common usage in your area? 12. Do they ever tell you something specific to do or not to do? 13. Do they ever suggest to you that you have a disease, a pain, or a condition? (cancer, Parkinsons disease, etc.) 14. Have the attackers ever asked you or suggested to you that you join them? 15. Do the attackers ever urge you to commit suicide? 16. Do the attackers ever tell you something that everybody said about you? 17. Have the attackers ever urged you in voice or thought to hurt or do harm to another person, either physically (including sexually) or emotionally? 18. Do the attackers pretend that they can see you? 19. Do the attackers ever pretend to be concerned for your safety (for example, telling you not to overwork in the heat, that you have a low tire on your car, warning you about going up on a ladder, etc.)? (Please explain.) 20. Do the attackers ever mention places on your body that are not visible to other people (a scar, a tattoo, etc.)? Set 6 01. Do the attackers try to convince you that you are ugly, that youre fat, that you smell bad, or are otherwise undesirable? 02. Do the attackers encourage you through voices or thoughts to eat excessively and eat the wrong kinds of food or perhaps drink too much? 03. Are you sometimes able to hear other voices that you think that you are not supposed to hear underlying or superimposed over the usual V2K? 04. Do the attackers refer to you as being gay or try to make you believe that you are gay, that you are sexually attracted to small children, or that you want to have sex with a close family member (daughter, son, mother, father, sibling, etc.)? (Please explain.) 05. Does alcohol or a particular drink or food seem to diminish the volume of the speakers? 06. If the attackers play recordings intermittently with their talking, are the recordings the same voices that the attackers use? 07. Do the attackers attempt to make you suspicious of your relatives and neighbors? 08. If you pray, do the attackers ridicule and make fun of you during your prayers? 09. Do the attackers ever repeat your thoughts to you as they come to your mind? 10. Do your attackers try to make you feel that you are bad and they are good? 11. Have the attackers ever shown you holographic images of Christ and/or other religious figures? (Please explain.) 12. Do your attackers ever use profane language, dirty slang, or curse words? 13. Do the attackers call you ugly names? If so, what are some of those names? 14. Do the attackers comment on and ridicule things that you write about on the computer? 15. Do the attackers try to instill phobias in your mind (fear of snakes, spiders, germs, water, etc.)? 16. Do the attackers especially attempt to bother you with their V2K whenever you are concentrating on a mental task, such as preparing your income tax returns, etc.? 17. Do your attackers ever make you hear noises at night to make you get out of bed to investigate?

18. Do your attackers ever tell you or suggest to you that you are being investigated by law enforcement, the IRS, or another entity? If so, name that entity. 19. Do you ever hear strange noises that seemingly come from outside, like a dove cooing or a dog barking (when there is no nearby dog)? 20. When you write or think something, do the attackers sometimes tell you that its not true and berate you for it? Set 7 01. If the attackers do not like what you are writing on the computer, do glitches occur that you know are not natural glitches? 02. Do the attackers ever cause you to believe that a member of your family is being sexually molested or is sexually molesting another person, usually a child? 03. Do your attackers tell you stories about incidents in your childhood? 04. Do the attackers ever criticize something that you said to somebody or thought about somebody and try to make you feel guilty over it? (Please explain.) 05. Do the attackers ever tell you that you are very smart/intelligent? 06. Do the attackers ever try to make you think that certain foods and drink(s) and medicines in your domicile have been tampered with? 07. Do the voices ever seem to come over air ducts? 08. Do the attackers ever tell you that youre going to die or that loved ones are going to die? 09. Do the attackers sometimes state a particular year and then question you about that year? 10. Do the attackers try to make you think of relatives or friends when you are engaged in sexual activity? 11. Do you feel that the attackers, perhaps using the silent talking, encourage you to make mistakes, have accidents, or ruin something that you are doing? 12. Do the attackers ever play you recordings of friends and relatives having arguments, having sex, talking about you or somebody else, etc? 13. Do your attackers ever make reference to time, like Four thousand years ago, etc. or twelve years ago? 14. Do your attackers ever say a number and then cause you to think back when you or your children were that age or think something else about that number? 15. Do your attackers repeat a particular number to you? If so, is that number significant to you? 16. Do the attackers suggest that they have also targeted a relative of yours or a good friend? 17. Do your attackers ever tell you that they are investigators? 18. Do the attackers use code words and expressions such as hospital and emergency room? 19. Do the attackers lead you to believe that others are talking about you or making fun of you? 20. Do the attackers ever tell you not to go somewhere or to go somewhere? (Please explain.) Set 8

01. Do your attackers ever play good cop/bad cop (one says something ugly to you or tells you that you are doing some task wrong and another one of the attackers defends you or compliments you)? 02. If you get induced dreaming, is there a particular theme to the induced dreams? 03. If you get induced dreaming, when you awake do you feel anxious, frightened, or upset? 04. If you get the induced dreaming, do you actually see the other actors in a dream or do the attackers tell you who the others are? 05. If you get the induced dreaming, do you actually see yourself in the dreams or are you simply told by the attackers that it is you? 06. Do your attackers attempt to induce anxiety in you by talking about dead relatives and people whom you once liked very much but are now out of touch with? 07. Do the attackers ever use the expression (Name of a person) is crazy about you? Or (Name of a person) wants you? If so, which one? 08. Do the attackers ever suggest or tell you that you are sexually attracted to a person who is no longer living? 09. Do the attackers ever suggest that you are not patriotic? 10. Do the attackers attempt to take credit for negative things that happen in your life? 11. Do the attackers try to convince you that you have committed a crime or a sin? 12. Do the attackers ever express anger and frustration? (Please explain.) 13. Do the attackers talk negatively about particular ethnic, political, or religious groups? 14. Do the attackers ever tell you that youre hardheaded or stubborn? 15. Do the attackers ever suggest that if you do a certain act or think in a certain way that they will cease their attacks? 16. Are there any indications that make you think that your attackers are very well educated? 17. Do you ever hear recordings of professional-sounding speakers or sermons (other than the regular V2K speakers)? 18. Do the attackers ever use particular trigger words and expressions or show you holographic images that make you feel a sexual arousal? 19. Do you ever feel slight vibrations on your genitals while the attackers are talking? 20. Do the attackers often give you commands when they know that you are going to do that action anyway (washing your hands, brushing your teeth, closing the door, turning out the lights, etc.)? Set 9 01. If the attackers cause induced dreaming, do you awake sexually aroused (having orgasm or an erection)? 02. In public, have you ever heard what seemed like actual voices talking about you but you could not see the speakers or the speakers mouths? (Perhaps their backs were toward you or you could see nobody at all.) 03. Did the attackers hit you with any physical effects before you started hearing the voices? If so, for how long? 04. Did you experience any stalking before hearing the voices? 05. Did the voices begin shortly after you broke up with a companion or had intimate relations with a person?

06. Do the voices ever say anything about knowing you at an earlier age like, We went to elementary school with you? Or, "We went to high school with you? 07. If the attackers talk about events in your infancy and childhood, do they try to make you feel guilt, remorse, anxiety, etc.? 08. Do you feel like you have to clarify and articulate carefully your thoughts and even explain them to the attackers? 09. Do you actually see the faces of people whom you think of or who the attackers cause you to think of in your mind? 10. Do the attackers sometimes state a particular first name and have you think of all of the people whom you know by that name? Additional Questions 01. Do your attackers manipulate your dreams to show you with friends and relatives in situations in which you see them in an unfavorable light (perhaps they are attacking you, arguing with you, or trying to make you do something that you do not want to do)? 02. Do the attackers manipulate your dreams to suggest that you are engaged in sex with someone or with those with whom you would not choose to do so? 03. Do the talkers in your usual V2K sometimes sound like theyre standing right beside you and talking into your ear? 04. Do the attackers ever say anything in the V2K or in the induced dreams that suggests that you have been hypnotized or that you are under hypnosis? (Please explain.) 05. In the induced dreams, are you sometimes interacting with people from the far past in your life? 06. When you awake from induced dreaming or from interrogations, is your body being vibrated/shaken? 07. Do your attackers sometimes start a sentence and stop, waiting for you to finish the sentence? 08. Do the attackers sometimes state a name and you feel yourself telling them involuntarily about your relationship with that person or all that you know about that person? 09. Do the voices tell you that you must leave your present location and go somewhere else, perhaps to another city or state? 10. Do the attackers ever say or suggest that they have the means to murder you if they wish? 11. Do the attackers threaten to kill you if you do not cooperate with them? 12. Do the attackers tell you or have they told you that theyre going to bankrupt you? 13. Does the attackers V2K appear to be PROGRAMMING you to believe something (or to destroy a belief) or do something in particular (or to prevent your doing something)? I4. If the answer is yes, please give an example. 15. Have the attackers ever told you or made you believe something with their V2K that sent you on wild goose chases to try to find something or do something? 16. Have the attackers ever suggested or tried to make you believe that you and some other person whom you know are actually one and the same individual? If so, who was the other person?

17. Have the attackers ever said anything that suggested that they were sorry for attacking you, suggesting that they were forced to attack you? 18. Have the attackers ever suggested a sexual intimacy between you and them or made innuendos about going to have sexual relations with you?

Vous aimerez peut-être aussi