2002 Series by Dr. Allen Barker . Part I – Models of Synthetic Telepathy | Part II – Acoustic Signal Modulation | Part III – Working Models . Part IV – Bayesian Stopping Criterion
Part I: Models of Synthetic Telepathy
Allen Barker, July 31, 2002
This article, the first of a series, deals with models of the mind control network. It is an elaboration and summary of some of the ideas expressed in my earlier essay “The Autopig.” See also “Mental Firewalls” and “Special Powers and ESP.” For a list of some of the basic abbreviations used in the current series, see the document outlining abbreviations used in the essays. The later articles in this current series are listed at the end.
Please bear with the intro, even if the ideas seem unfamiliar at first. The sections near the end should make sense even without a complete grasp of the early sections, and will tend to clarify the ideas and make them more concrete. I do not cover the mental illness possibility and cover lie here because I have discussed it elsewhere, but remember that torture is not called torture because it is a picnic in the park. It leaves scars and sequelae.
Model independent reasoning
In the context we are working in, a model is an assumed framework for what facts hold. There are various possible models. Multiple model reasoning involves considering various models simultaneously. Model independent reasoning involves making decisions or coming to conclusions that hold in all models — or at least in all tangibly likely models or in some collection of models. As a brief example, consider this binary tree split: Either the government is involved directly (CIA, etc.) or it is not (and non-government people are the perpetrators, with government at most indirectly involved). These are two models (or classes of models). It can be useful to evaluate the facts and the data with respect to each of these models. In some cases the government is directly involved and in others it is not, so this is an individual, victim-based model system. What model independent conclusion can be drawn?
The government is culpable and is the responsible party to petition for redress in both cases. So this conclusion is model independent with respect to those models. In the first case the culpability is obvious. In the second, it is clear that one of the main functions of government is to protect the citizens, especially their fundamental rights. The most fundamental right, underlying all others, is the freedom of thought. By refusing to fairly consider victims’ claims and implicitly supporting such repression the government is also indirectly at best supporting a system of repression. These “psychic lynchings,” — under any model — are very much in line with the long US history of civil rights abuses which the government has long turned a blind eye to. Note also that most victims still undergo criminal stalking and harassment in addition to the mind violations — whatever the model.
The standard model
I refer to the assumption that technological mind control techniques are the underlying mechanism for most mind control abuses as the standard model. This model also includes techniques such as drugging and hypnosis — which are known to have been applied in projects like MKULTRA and Bluebird — as well as the combinations of these techniques with recent technology like voice-to-skull transmission devices.
As an example of an alternative model, consider what I call the natural model. This model assumes that what is occurring with many mind control victims is the abuse of natural psychic abilities. For example, it might be originating from a hostile remote viewing/harassment unit. Or it may be some other group of evil people with assumed real “psychic powers” sufficiently strong to cause the reported effects. I call the model where both technological methods and natural psychic methods are employed the mixed model because it is a mixture of both the standard model and the natural model.
This brings up the main split that will be considered as an example in this article. Is it technology or some natural psychic phenomenon? As I have pointed out in the above links, for many purposes it does not matter and the conclusions are model independent. The standard model is pure technology. We know that it exists. Psychic phenomena strong enough for the voice-to-skull phenomena reported by victims, if it exists, must have been kept secret by a conspiracy lasting millennia. There are various other incongruities with the natural model, including “facts” which are missing their logical consequences and thus are suspect. (This is especially true where those consequences are subject to arbitrage or profit — though that can also be a motive for secrecy.) The natural psychic model would require a “psychic mafia” holding for generations, including for children, adolescents, and old people on deathbeds. It would require some enforcement mechanism so that even the disaffected members would not reveal a conspiracy that was not there to help them at all.
As I have also pointed out, though, the standard model of pure technology exists right now. Thus, in the current world, the pure natural model is obsolete (if it ever held). Could you tell the difference? So we have either the standard model or a mixed model with both natural psychic effects and technological ones.
Exposing the technology helps to bring out the the concepts and the violations even in the unlikely case that the natural model holds and a weaponized “psychic space” is the source of some people’s harassment. Thus the decision or conclusion to bring out the existence of the technology and its known history of abuses follows in both the standard model (directly) and the natural model (indirectly). [And is the right thing to do regardless, because of the victims still suffering and denied redress. Human rights are axiomatically model independent with regard to any model.]
Why consider the natural model?
Although it provides a very good example of multiple model reasoning, there are some good reasons for victims to avoid the psychic model altogether. It may be used as a psyop to distract from the technology — even that which is known openly to exist. It may be used to deceive technology victims into thinking they are “just psychic” and that the torture is “natural” (which it is not in either model). It is hard to take a natural psychic model to court, and so justice would have to proceed on other channels. The very association may be (and at times has been) used to connotationally tar mind control victims and their human rights plight with the “kookiness” that psychic phenomena tend to be regarded with in our society.
The reasons I consider the natural model — even though I think the evidence supports the standard model — are as follows:
It is how the technology would seem to unwitting victims. There could well be a standard model with a psyop of a natural psychic model built on top of it. That is, many people with MC technology used on them unwittingly may be fooled into thinking they are psychic and know nothing of “the man in the middle” or the technology.
The concepts of “telepathy,” etc., are very familiar to many people from books and movies. Many people are even familiar with thinking about things like nonconsensual psychic attacks on their minds. In this sense it provides a natural introduction to some elements of the subjective mind control experience, i.e., how it feels to a victim. (This empathy may then extend to real, technological victims of similar horrors.) Of course the differences also need to be sharply highlighted.
If we assume the natural model is not “magic,” then there is a physics and a brain mechanism involved. If so, then this biological system can be and almost surely has been reverse engineered. This actually increases the likelihood of the standard model (or mixed model under this assumption) in many ways.
Taking a multiple model approach generally minimizes the chances of being surprised should things turn out differently than you supposed originally.
Many people believe the natural model already, whether it corresponds to ground truth or not. Such people are potentially attractive victims to those testing the technology, so they should be alerted to that possibility.
Some people may psychologically prefer the natural model and be unable to cope with the standard model because they cannot deal with the idea that other humans would essentially put them in a technological cow pasture to exploit and manipulate them.
Please do not forget that the technology does exist and whatever the status of the “natural model” there are technological MC victims. Finally, there is something I call algorithm generica. This algorithm allows you to generalize or reason by analogy across models. It is amazing how much reasoning — if you do the real, hard reasoning — carries over to other models from thinking about a particular model. Whole subtrees remain essentially intact, to use the tree analogy. Generica is a bitch, as I say.
Reasoning around uncertainties
In reasoning it is important to know as much as you can, but also to keep in mind what you do not know. Many people know a little that some others do not, but think they know much more than they actually do. Model independent reasoning allows you to take uncertainties into account and find that, for some conclusions, what you do not know does not matter. What you know is enough. Of course this depends on your choosing the models correctly and covering all the possibilities. Bad data or deceptive data can be worse than no data: set a reasonable threshold and toss the garbage.
This ends the introductory part of the article. The remainder is a less structured collection of ideas and questions. If fully developed the above ideas would lead to a whole book, at least. These paragraphs hint at what that might look like. Victims in such situations probably do not need it all spelled out. And as the saying goes also, some horses start at the shadow of a whip. The main purpose of this article is to get the information out to those it may help. I mainly deal with “telepathy,” natural or synthetic, by which voices and other audio productions are sent to victims in a voice-to-skull manner and whereby the victims’ inner subvocal speech is transmitted out to others.
General Concepts in Synthetic Telepathy Models
Recall that an RTI is a realtime idiot, and is like a DJ at a radio station you are forced to listen to constantly and cannot turn down. They can access your private thoughts and harass you with this fact in their “broadcast.” An AP is an autopig, which is an AI-like machine or expert system doing the job of an RTI. The combination is similar to a DJ playing taped segments between live segments.
Model neutral decisions. Rather than being completely model independent, some decisions are model neutral. This means that they hold in some models but for the other models they do not make any difference one way or another.
The third ear. This is a useful way of considering auditory phenomena not coming from the ears (or coming to the ears in a disguised way, where such a send is not apparent; certain known devices are capable of doing this). It is nothing but a sixth sense, whether it is natural or artificial. Even if it is a brain implant, it is essentially just like an additional sense organ. If you would not believe something sent to your real ears, why would you believe it if it were sent to your third ear without your consent? Partly this is because of denial of the phenomenon and the fact that people tend to confuse such signals with their own inner verbal thought processes. The modulation of such speech signals is typically pathological lies meant to harass, distract, and manipulate victims. Some such applications are subtle, while others are the blunt Chinese water torture of constant harassment. In the nonconsensual case, it is just like if Ewen Cameron forcibly strapped headphones onto your real ears and forced you to listen to harassing or manipulating audio 24 hours a day.
New term. The Cameron number of an autopig phrase (or RTI phrase) is the number of times it has been repeated. When a phrase has a large Cameron number it tends to become a strongly conditioned phrase (SCP). This essentially causes a form of brain damage to the victim. There is a tendency to hear such a phrase even when only vaguely similar phrases are heard, both on the third ear and through the actual ears.
Network structure of the communications channel. What we are dealing with in an abstract sense is a communications channel. The fact that it is often nonconsensual does not change this. The nodes of such a network are people, both perpetrators and victims. Some nodes might also be machines with AI-types of monitoring or harassment software. There is such a network structure in all models, though the exact details will vary. Considering questions of network details helps in fitting the data you gather to a particular model, though beware that psyops are intended to purposely conceal the real, underlying structure. These are some things to consider:
Local vs. regional vs. global. Is there a spatial component? I.e. do people nearby tend to send or receive more strongly than those far away? Note that local interactions tend to be more noticeable than larger-scale ones because you have more direct feedback from individuals. More distant realtime spatial feedback might come from live radio or TV, for example, or a long-distance phone call. I have noticed a strong non-local component in my situation, but there may be a local component also that is partially masked by this. Of course a global or regional effect also tends to be local.
Send power vs. receive power. Do some on the network send more strongly than they receive (i.e. more volume)? Do some receive more strongly than they send (i.e. more sensitive to weak signals)?
“Control” or “consent” status. Do some nodes on the network have more control over the data they send or receive than others, such as an on-off switch or volume control? Are some witting versus others that are unwitting?
Spatial distribution of senders and receivers. If there is a spatial component, what is the geographic distribution of people with the various send vs. receive parameters?
Audience model. Is there a silent “audience” larger than the direct participants, the equivalent of Usenet lurkers? In the case of harassment, do they enjoy the “rape show,” just tolerate it, or work to help the victims?
Subnetworks. If there are localized subnetworks (or spatial regions, assuming a spatial component), are there different “cultures” within such subnetworks? Might harassment occur on one subnetwork, silent monitoring occur on another, and maybe even something useful and consensual on another?
On the notion of subnetworks, there are several ways such can arise. Note that they need not be completely isolated from each other, just clusters of higher connectivity. As an example, if the effect had a spatial component then spatial subnetworks would arise. They might also arise even within a spatial region. For example, if a frequency-specific nonthermal EM effect were responsible and people varied with respect to what frequencies they “sent” and responded to most strongly (according to their physiology and perhaps learning effects).
Psychic suppression units. If you assume a mixed model — or even a weaponized pure natural model — might there be the psychic equivalent of cointelpro? Control freaks seek out any channel for control and manipulation of individuals and groups. How might a “groupmind” be affected by manipulating or torturing a few select individuals? How might political murders or discrediting campaigns be carried out? What sort of economic exploitation would be possible?
Ground truth is the correct model. Keep in mind that the real “audience” and “perpetrators” are only those specified by the correct model (which is unknown). In conditionally evaluating any model, keep in mind what assumptions are assumed true within the model. This can avoid some fuzzy confusions across models which can tend to occur.
Ultimately internal, though also work on the external. Your reactions and response to mind control of this sort is ultimately internal. In some models you cannot ever “turn off” the signal without externally turning off or blowing up the machine responsible. (Shielding is another possibility, but there has been no reported long-term success in blocking the signals.) This is like if Ewen Cameron forcibly put earphones on your real ears that you could not remove. You would have to hear the sound. In other models such as certain EM models you might be able to modify your brain’s response to “tune out” the sounds. In either case, you need to internally adjust your own response to understand and either tune out or ignore the incoming assault. With the Cameron earphone sorts of models this is difficult, and the conditioning will take its toll, but that is what you have to work with until external actions can change the external situation. It may help some victims to work on their ability to focus their attention on two or more places at once, though of course such divided attention tends to cause performance degradation.
Psychosexual torture. Torturers very often tend to focus on sex. This is the equivalent of torturers in a Central American country attaching electrodes to victims’ genitals and shocking them. This is a very common sort of thing among torturers. Why is that? Here are a few possible reasons:
Violating the victims’ sexual organs is intended to demean the victims. The torturer displays the power to strip the victim of the ordinary sorts of societal expectations of privacy. Because the genitals are typically private, exposing and assaulting them may cause a real (though undeserved) sense of shame in the victims. The torturer makes clear that the victim is a 2nd class citizen at best, not deserving of the cultural norms, social mores, and social compact of “real” citizens. The sadistic violator wants to also be a prude, and exploit such societal expectations while violating them at an almost unthinkable level.
They’ll harass people until they destroy their private sex lives, while the culture peddles Viagra to the public to sell people a sex life again.
Torturers, at least the lowest-level lackey torturers who carry out the actual physical deeds, tend to be sadists. (Those at higher levels tend to be amoral and conscienceless, treating people as worthless fodder, but tend not to want to get their hands dirty or have anything to do with the victims directly.) Sadists focus on genitals because it increases the terror and trauma to the victim, but also because it increases their thrill with the act of torture.
People are infatuated with sex, and love to titter and gossip about it. Thus sexual gossip and smears put out in a whispering campaign will tend to spread.
Similar sorts of reasoning hold for other sorts of privacy violations flaunted to the victim, including the violation of the privacy of the victim’s mind (which also is the primary sexual organ, or so sex therapists would tell us).
In all models: Adult torturers teach children or young adults how to torture and thus perpetuate the cycle of atrocities and repression.
The following are more of my observations of the techniques that certain mind control torturers employ.
As I wrote in my essay “Excuses and Manipulations in Mind Control,” torturers will first torture a victim for whatever reason. Usually because they thought a victim was vulnerable or they could get away with it. They will later concoct various “reasons” and “rationalizations” for why they did it. These often tend not to be even sensical on the surface level, but are employed in the subtext and on the trigger level. This both keeps the conspiracy informed of how to “rationalize” the atrocities and keeps the victims traumatized and in “dismay fatigue.”
It is systematic, brutal as hell, and organized. There are large numbers of people who run the operations in what can only be described as a supremacist sense. A bunch of lilliputians who conspire and use their secret torture conspiracy to keep others down. Something like the conspiracy that tried to keep men like Paul Robeson down even though the people involved were several orders of magnitude his lessers.
How large a population is conditioned and propagandized unwittingly by the same people involved in the mind control operations? Either by widespread or wide-field mind control methods or by the standard propaganda and cointelpro methods?
In the space of the third ear there may be multiple voices. These might all be one machine programmed to distract and manipulate. They may be some bunker RTIs, often “enhanced” with autopig machines like radio DJs running taped announcements between live segments. In a model containing the natural psychic model as a submodel, or in a standard model with interconnected groups (perhaps deceived by a psychic psyop), these voices may represent individual, real people. Some are overtly machinelike, repeating Cameron phrases with numbing, annoying, and damaging regularity. Others actually say new things from time to time — though one that can string together two sentences in succession is rare. Occasionally you even get one that can “converse.” Thus far they invariably refuse to respond to the protocol authentication challenge of “what is the cosine of xxxx in radians to six digits after the decimal.” (That allows a hard confirm of a true external and a rough authentication.) Note that even in the standard model there can be different groups — perhaps different intelligence agencies — on the same channel and accessing the same victims. Whatever the ground truth, the voices are not all pushing the same agenda and some argue with others. How to interpret this is model-dependent, but in a mixed model or certain “psychic psyop” standard models there may be some halfway semi-decent people on the channel (who still maintain the conspiracy used to torture). Or it may all be a good Nazi, bad Nazi act.
One game that voices in collusion play is the “false defender” game, a variant of good Nazi, bad Nazi. The bad Nazi will harass and goad and a good Nazi will seem to defend the victim. But the “defense” assumes all the phony premises of the bad Nazi and treats an illogical, harassing pig as a regular “person” whose idiotic babble is worth serious consideration.
In the space of autopigs and RTIs there are several sorts of processes I have not listed before. They are:
Distraction autopig. Like a cointelpro agent they want to distract from any thought they deem “subversive.” They also just generally distract like a Bergeron pulse, interfering with anyone trying to seriously think. They often tend to use sex-type distractions such as “sex with an underage girlfriend” or the more graphically repugnant “sex with a 10 year old.” These distractions seem to occur more frequently if the voice-space “conversation” tends toward any dissent… They mainly just distract victims trying to think or get any work done.
Platitude boy is a new named AP-RTI which repeatedly spews some common cliche or platitude.
Logical negation boy just parrots the logical negation of anything you think. Sort of like a 5-year old: “It is x,” “No, it is not x.”
The echo repeats your thoughts, for whatever reason or motive or intention.
Timid boy always tries to induce anxiety or doubt in something you think or say. “You made a big mistake.” “I warned you.”
Beavis and Butthead are two babbling morons who think they are the Marv Alberts of the rape show. They provide their running commentary of anything you think (or even dream) as filtered through their idiotic awareness. They were actually named by some other “voices” who also seemed annoyed by their incessant babble. They constantly harass and attempt to demean. If any of the “underground bunker” sorts of models hold, these two sound like they are sitting in a booth down there with microphones and headsets, harassing.
A babbler is a process that just babbles seemingly random, non-connected words — usually at a level just perceptible. It may be part of a trigger search algorithm, looking for what you react to. It is similar to the techniques used in technologies like the Russian acoustic psycho-correction devices now owned by a Richmond company.
The usual tiresome processes “listen” to whatever you are thinking about and babble about them. If your thought included the word “Volkswagen,” for example, the AP-RTI would then essentially let x=”Volkswagen” and plug that value into several of the AP phrases of one variable. It is really syntax-level stuff, often not even making sense. They also repeat the AP phrases without variables constantly.
The ugly distorting mirror. You think a fraction of some thought. Before you can even finish the thought train, it is telemetered out to some filthy rapist. This rapist first interprets your half-thought in terms of his or her own idiot awareness. This distorted, ugly reflection is then sent back at you as if it somehow represents your whole thought. Besides the basic miscomprehension of the raped thought, the return signal also reflects the purposeful, sadistic intention to harm you and cause trauma. This external kneejerk can derail your normal thought train easily if you let it. If you think like a moron you’ll be a moron. (Your internal kneejerks and conditioned thought habits can be hard enough to deal with without some external idiot’s hateful reflection also imposed on you.)
Garbage in. If you have a filth channel coming in, you will have some filth associations. That is just the nature of the brain. That specifically refers to the third ear, but also applies to newspapers, TV, etc. Understand how the thought arises. Observe. It does not reflect on you. The best and most useful brain circuits, when fed trash and filth, will tend to produce trash and filth. Don’t spin your wheels on worrying about this crap. Observe and stay aware and unperturbed. The pigs, if they are real people, are revealing their own filthy selves and minds. Point that out to any “audience” in whatever model you are assuming. I change models like I change a pair of pants. You do not have to explain. I am wearing blue jeans now.
Kick you in the leg till you limp, then blame you for limping. They’ll torture you for a year and then “blame” you for thinking like a torture victim. Similarly for all years thereafter. They’ll autopig you with a phrase 100,000 times and then blame you for tending to think that phrase. They also rush to both reinforce and ridicule any such tendencies. After a phrase becomes strongly conditioned, even a snippet of it or a similar rhythm can tend to set it off. The victim will anticipate hearing it, because he or she has been conditioned to expect it after so many occurrences.
One common thought occurrence is for a random noise on any ear to trigger a strongly conditioned phrase (SCP). Even just the anticipation of such an event is seized upon by an RTI-AP to mock, goad, and reinforce the SCP. The mind rapists also seem to be able to access the “pre-subvocal area” and see you forming an idea there. Even if you choose not to subvocalize it, they will often pick up pieces of it for their harassment. You can test this by barely thinking something but not even subvocalizing it, and quietly observe what happens. You can sometimes even “lead” the voices that way. Triggers and SCPs tend to work two ways even between torturer and torture victim, and barely thinking an SCP is more likely to set off the particular RTI or AP whose phrase it is. In an AI sense it seems something like a blackboard system running off of your brain data. (Keep in mind the effect of conditioned internals here, though.)
Stockholm syndrome is induced by forced intimacy plus abuse and torture. With third ear Cameron harassment directly into the brain this can happen if you are not careful. After years of abuse, they’ll pretend to be your “friends.” Like the bait and babble and bait and trigger, this is only to get you to pay attention and open up to the next traumatic brain insult.
The trigger search algorithm. This algorithm repeats with mind numbing regularity. The RTI-APs are not called idiots for nothing, but one thing they are good at is spotting any sort of reaction to their goading and babbling. This is especially true of any sort of trauma or distress reaction. They notice this like a pack of jackals sensing a wounded animal. They home in on it instantly. Any sort of perceived weakness quickly draws their attentions. Anything they notice you responding to is likely to be sent to the trigger search algorithm for “testing.” They also repeat the trigger search algorithm at periods of, say, 30 minutes, 1 hour, and often 1 day and several days later. If the test “succeeds” then you get a new autopig phrase goading you long-term. They also watch as you read things and go about your daily life for anything that might get a reaction or be associated with a traumatic situation. Some of these paths like newspapers and radio are also employed deliberately as feedback pathways in trying to trigger or goad the victim.
Professional triggerers. The RTIs and their AP machines are the lowest-level sorts of Brownshirt harassers and goaders. They are the useful idiots for others behind the scenes. They constantly harass to annoy and weaken the victim. They drip, drip, drip, like water torture. In the background there are also what I call professional triggerers. They will lurk in the background or be called up when the victim needs extra suppressing. They trigger based on a long history and profile of the victim, and quite pointedly. You can even sometimes hear them directing the lower-level harassers as to the “theme” of the next harassment skit. I call one of these “Major Mengele Psych Degree.”
Why are spies called spooks? They are called spooks because they are spooky, or at least try to be. That is their first line of operation. They want to intimidate with a bare, deniable hint of blackmail, for example. They want to scare you, intimidate you, or confuse you in a way they can deny and that others will not pick up on — “you must be crazy.” They also bluff and lie constantly, and create various deceptions which they then try to market to their targets. They want to induce anxiety and uncertainty in their targets, and alter their courses of action from what the spooks at least imagined it would otherwise be.
In anything you read there tends to be the text, the subtext, and the subsubtext. Like with harassing audio, harassing and smearing subtext tends toward playground level stuff — though applied and implied by supposed adults. The subsubtext represents the underlying intention of the subtext and the deeper implied message. It tends to be picked up by those used to “reading the tea leaves” as opposed to only picking up bits of the basic smears directly between the lines. Keep in mind that all the subtexts tend to be BS; people can lie between the lines more deniably than on them.
An Example Model
The remainder of this article presents a particular hypothetical model scenario as an extended example.
As an exercise, assume the unlikely case of the purely natural model. Assume that some subset of people are born with some natural ability as “hearers.” Assume they have managed to keep this situation secret for centuries via a strong taboo and mafia-like omerta. Assume that even children with such abilities somehow know not to talk about it, and that attempts to write about it or tell people meet with suppression. Assume also that there are some people who are naturally strong “senders.” Assume that strong “senders” in many cases do not even know that they have this somewhat rarer gift/curse. How would they know, if they do not “hear” and the hearers keep it a secret? The “hearers” participate in a conspiracy which is used to keep the unwitting “senders” vulnerable and exploitable. Suppose that, besides just listening, exploiting, raping, and peeping at these “senders,” some of the “hearers” decide to have sadistic fun with them. These “senders” are harassed and driven crazy if even a few “hearers” decide for whatever reason they do not like them or just want to. They may be driven to suicide or may be driven to the waiting arms of psychiatry where they are drugged into being zombies.
Perhaps these “senders” are even just like the “hearers” except that they are the equivalent of deaf people exploited worse than any freak show “entertainers.” Suppose this mafia-like conspiracy is widespread and uses triggers and other such techniques to maintain control of those not in on the secret — as well as to police its own members. These triggers would develop over the years until they were almost stylized caricatures of the “best” triggers that the harassing jackals finally homed in on. Like a pathetic word or symbol representing how to put down any particular person and which even children could use — never mind if it is stupid or reveals atrocities on actual inspection. The victims tend to be dismayed at the stupidity and the evidence of widespread conspiracy against them, more than the actual pathetic triggers. Not all such “hearers” would actually be Nazis in this model — though collaborator is close. In fact the majority might even be like the “good people” who did nothing even as they heard the cries from the death camp down the street.
If a “sender” also had some “hearing” ability, or developed it over the course of time, he or she might not know how to interpret it. If harassment had already started, this would be just one more harassment feedback path to the victim. A way to manipulate and goad the victim. The victim might think it was technology because such technology does indeed exist. Alternately, technology might be used for a “send” to the victim, while the victim’s natural “send” ability would be used for the return “hearing” feedback path from the victim. The victim would be traumatized, angry, suspicious, and confused, not knowing what was happening.
How does this model meet with the facts? What inconsistencies and unlikelihoods does it have? How well does it explain what mind control victims report experiencing, such as going into a library and having people snickering at them and goading them with their own “private” thoughts? If the “senders” knew that they tended to send more strongly, wouldn’t they be in an interesting position. How could “senders” ever learn to control and use their abilities if they never got any feedback but harassment? What psyops could create the illusion that this model holds? What “experiments” could a victim or other person conduct to support this model over another one, in the face of psyops and deception ops? What if a “sender” gradually became a “hearer” too, even under harassment? Could it be distinguished from a technological “send” to the victim? Assuming this model holds, how could a victim knowing this ground truth best deal with the harassment and come to uncondition himself or herself from the pathetic triggers and ongoing harassment?
If the natural model is not magic, how does the advance of technology play into things? Are there any curves crossing or about to cross? How does the new mixed model, with the standard model thrown in, change things? Everyone has a cell phone these days, and soon they’ll be so tiny people will mount them on their heads or affix them to their bodies (neurophone-phone?). That is a consensual sort of network essentially like the ones discussed in this article. Even the open, non-secret technology related to synthetic telepathy is advancing rapidly.
Consider the above model, in both its strong points and weak points. Think about the supporting data and possible experimental design. This is a useful exercise in any case, both to practice thinking in terms of conditional models and because parts will generalize to the mixed models and standard models. Generica is a bitch.
Part II – Surreptitious Acoustic Signal Modulation, Voice Projection, and Direct Brain Interface
Allen Barker, Aug. 19, 2002
This article deals with the technology to surreptitiously or overtly send “voices” to people. This is a longtime dream of psychological warfare and operations people, and much research and development has gone into it. Huge sums of money have been spent developing ways to send voices, in any and all ways, to targeted people. Many technologies are openly known to exist, and more sophisticated ones no doubt exist in secret. One name for this is synthetic telepathy; another is voice-to-skull (v2s) technology. I also discuss methods for sensing brainwaves and converting these to voice signals, i.e., brainwave-to-voice (b2v) devices.
I assume the standard model of all technology, but at the end I mention the mixed model for those into that (and for the reasons I have outlined earlier). For the background of the model system on which this article is based, see the previous article in the series, “Models of Synthetic Telepathy.” Later articles in the series are listed at the end.
I cover a lot of possibilities, which I hope is not confusing. But the reality is that under uncertainty you have to keep all reasonably likely models in mind. As before, I do not cover the mental illness possibility because I have written about that elsewhere. I have gotten enough external confirms to know my case is not that. There are many other credible victims, there is a long history of US mind control abuses, there are documented victims still ignored, and all of the technology either exists in the open or likely exists in the secret sector.
Subliminal and surreptitious voices
Of all the sounds that can be sent, why voices? Why the fascination with that, as opposed to other sounds? The obvious reason is deniability, since our society is currently set up so anyone claiming to experience such things risks being called crazy, and anyone talking of such things risks being called a kook. The deeper reason is because human beings are social animals living in a society and communicating by language. People tend to think in terms of language. People can be controlled by language. You can put a voice projector in a dog’s brain and tell it to “sit” and “stay,” but only humans can take complicated directions in language. In this sense, humans are more vulnerable than other animals. Consider how language is used by the con man, the hypnotist, the politician, the lawyer, and the preacher. The playground taunter. Words can indeed hurt you.
There are many methods for sending surreptitious sound. Openly known devices exist which can localize sounds to a particular location from 30 yards and more, for example. In a simple application, one could just hide a small piezo speaker to simulate high-frequency sounds like bird songs and crickets chirping. (One might also consider the effects of certain EM waves on real crickets and birds.)
One technique to hide subliminals is to mask them with ambient noise in the environment. This noise might be purposely created and disguised as ambient, like a fake bird call that is run for a while and then has subliminal speech slipped in, or it may be naturally occurring noise that the voice modulated signal is matched to in frequency. This is analogous to hiding the transmission frequency of an audio bug near something like a radio station to make detection difficult. Another technique to hide subliminals is to process the signal so it does not consciously register as a voice signal but has some subconscious effect. On something like a direct brain send a very low “volume” signal may register subconsciously but not consciously.
The main technique this article deals with is subliminal voices hidden in the natural sounds of appliances like air conditioners, refrigerators, computer fans, and other electric devices, especially those with motors. This follows largely from my own empirical study of the harassing voices I am bombarded with day and night, as well as from listening to other victims. I speculate on some possible methods of modulating and sending such voices. For a description of some experiments in this regard, see the web site [ …. ], where it is described how a computer disk drive’s sound can be modulated with transients on the power line. According to a demonstration there by John Vincent, “transients and RF on 120VAC Neutral return and ground lines can and do induce annoying acoustic resonance into various appliances.” Any sort of controllable acoustic effects can likely be voice-modulated. Sound might even be modulated onto the low-frequency signals of acoustic sources like large transformers, and thus carry over large distances. In a city there is almost nowhere you can go to escape the hum of motors and electrical devices.
For people who hear voices “in their head,” try this just as an experiment. If you hear a voice, stop and listen closely to the ambient noise, especially hums and rattles of electrical equipment. Turn your head slowly to see if it has a directionality. In my case that turns out to almost always be the source of the “voice.” It seems like it is in your head, but it may be externally sent to your “simulated third ear.” The Russian acoustic psycho-correction devices were reported to use such an acoustic modulation technique to cause a voice that seemed to originate in a person’s head (and the rights are currently owned by a Richmond, Va. company). Musicians and audiophiles may have a better ear for this, since they are used to picking out one part of a sound from a soundscape. The sound is very directional to the sound source when you externalize it.
Besides the ever-present electrical hum, there are other sources of sound like jets passing overhead that might be voice-modulated or have voice signals hidden under them. At least as early as Vietnam, psyop sounds were broadcast from helicopters, for example.
I mentioned possible power-line modulation methods above, but there are other possibilities. How might a pulsed EM wave interact with an operating motor for example? The motor effect might even be a side effect of another send technique. There are other methods of sending voice-to-skull, like pulsed microwave techniques. These might be matched to the ambient noise in order to hide the signals, or even hidden in a tinnitus-like signal, natural or artificial. One technique may even be used to mask the use of another. (“I couldn’t discern the Frey signal voices because of the acoustic masking voices or frequencies.”) A complicated sound source like an electric motor driving a fan can have a fairly large spectrum. There may even be more than one voice layered in there at different frequency bands or with different modulations.
[I’ve been making a few recordings to try to capture these voices that harass and berate me day and night now. It is somewhat hard to evaluate the recordings, though, because they try to mess with your perceptions when you listen. The real-world low frequencies permeate everything, even earplugs. I have even caught them at this a few times when listening to recordings. They send signals on the external ambient audio (and whatever other send technique) to deceive you as you listen. They cannot quite keep it up consistently, though. I can pull off my headphones real fast and catch the signal in the external ambient noise. You can actually hear that they turn up the external sources when you have on headphones to listen. They cannot quite synchronize with the digital recordings if you start at a random place or move it slightly, or if you repeat it enough times. (Once I forgot to turn on the microphone and they still tried to fake a signal there.) They either want me to think something is there when it is not or they want me to not hear what is really there.]
Finally, suppose there really is no external modulation — even though the signal seems highly directional and sometimes blatantly obvious. This is a very important possibility to keep in mind. It may be that, rather than modulating the signal on the audio send, they are modulating it on the audio receive in your brain. If you assume a direct brain read, then you also need to consider a direct brain send, which I discuss in the next section. And of course keep in mind that there are multiple techniques which could be used simultaneously in a large-scale operation.
Direct brain interface (DBI)
Assume now a direct brain interface. The most likely model for this is some sort of miniaturized brain implants, probably a distributed array of microsensors. Assume as one model that these microsensors are injected or blasted into the auditory cortex and surrounding regions of the brain. Perhaps other sections also, like the visual cortex. They might just scattershot truly miniature sensors and have them self-organize via feedback later. Perhaps a compressed air blast up the nostril, for example.
Some mind control literature mentions liquid crystals, or there may be ways to crystallize a fluid flowing in the bloodstream through the brain such as by external EMF; this is an interesting hypothetical model. Other methods are possible and surely under development, such as remote-sensing methods. It might also be something like some subdermal EEG (and other signal) sensors. Or there may be some fairly easily readable sources for subvocalized speech in other parts of the body, like the nerves to the voice box. For the purposes of this article I will assume a brainwave reading capability over a significant portion of the auditory cortex.
From my empirical “studies” there already exists fast brainwave-to-voice (b2v) conversion software and the sensors to do it. At this stage I would assume brain implants, but the same software could probably be adapted to other sensing technologies as they became available. Note that in b2v the brainwaves represent both sounds heard through the ears (as with the cats they wired up in the 1960s) as well as subvocalized and pre-vocalized “inner speech.”
Extending this another step, one harassment technique is brainwave-to-voice-to-skull (b2v2s) where they read your brainwaves and feed them back to you via the external channel as a harassment technique. I have personally experienced this harassment technique. Of course it is really b2v2(RTI/AP)2s so they can process the signal and add “commentary” along the way. There is a “man in the middle” of the signal path. It also seems as if they are working on some sort of brain cloning/modeling technique to “steal” a person’s thought patterns and predict what he or she will think. And as I mentioned in “Motives for Mind Control,” prediction is a fundamental part of control.
[I describe what they do and write about it, as I have all along. I’ve explained that before. It helps my credibility. About everything I’ve said before has turned out to be the case, hasn’t it? I’ve had enough external confirms to know it is not just in my head, and no protocol confirmation to conclude that they are “friendlies.” One has to always consider the effects of conditioned internals, though, with the Ewen Cameron-style psychic driving of SCPs and sleep deprivation. That and the ongoing trigger algorithm. It is not called torture for nothing.]
Consider a brainwave-to-voice-to-skull (b2v2s) send using, for example, electrical appliances such as with power line modulation. This model accounts for victims’ descriptions of people seeming to know what they are thinking. The voice-to-skull is really voice-to-public, including the victim. Next time you are out on the street or in a store, pause and listen to all the background noise sources you typically do not notice. Some street theater “harassers” might have figured it out and become witting collaborators in a “game” of torture, while others might be influenced subliminally. Some may even pick up the signal consciously but be unaware of its origin and think they are “psychic.” Either way, it would be quite unnerving to victims. This sort of “voice-to-public” wide-field send model is interesting to consider. It does require a conspiracy among the conscious voice hearers to not talk about “the voices” around the voice senders (or perhaps not even amongst themselves). Aside from that it might explain a lot (and the send method could be any wide-field voice projection device: acoustic, electromagnetic, or other).
Now, suppose the send is not auditory, but only seems like it. Once we assume brain implants the victim has to suspect all sensory input, since deceivers are messing directly with the brain. This holds for any technology to directly alter the brain, implanted or remote. Suppose there is a self-organizing array of miniature stimoceivers somehow implanted in the auditory portions of the brain. (Recall the tonotopic map, as the sounds are laid out by frequency in the brain.) If a sound is coming in, it will cause neural firing patterns. Whatever frequency bands you hear, there will be increased neural activity there. So if the stimoceivers first sense the activation level and then send the signal only if the activity is above a threshold, the imposed sound will seem to be part of an external ambient noise source. (What can be concluded in this model about strongly directionalized sound sources with superimposed voice? Are there techniques where a targeted person would falsely attribute directionality to a signal, by falsely associating it with a real external sound? Would a simple send proportional to activation level do that? Are there any remote or wide-field send techniques like EM methods that could also accomplish this sort of brain manipulation? This is an important question to consider.)
One question is, if they are sending directly to the brain, at least part of the time, why would they bother to make it sound like an external acoustic signal coming in through the ears? One reason is that in a noisy environment their signal must “compete” with natural external sounds, and so to be noticeable it has to fit in with the rhythm and frequency. Another possible reason is that they do not want it to be too noticeable. They may try to hide such sounds in external ambient frequencies to give them more of a subliminal effect, so they don’t stand out like a sore thumb in the mind. Another likely reason, in the case of a direct brain send, is that they want to misdirect the victims to think it is an external acoustic modulation. This way the victim may claim to hear things in external signals which others truly cannot hear, and will be less likely to detect or measure the true send signal. Finally, it may simply be a way to drive a victim crazy and induce a schizophrenia-appearing condition in those susceptible to such conditioning. By repeatedly trauma-conditioning the victim to associate berating voices with external sounds, the victim will tend to anticipate them even when hearing sounds without the overlaid harassment. (Can you imagine berating phrases — psychologically tailored to psychologically harm you — bombarding you for weeks and months at a time, hundreds of thousands of times, in a psychic driving fashion?)
Finally, consider direct brain-to-brain (b2b) interfaces. Consider that if the victims are implanted or otherwise have a direct brain interface, there is a good chance that the harassers do also. In this case the underground bunker could be distributed, much like the victims’ concentration camp system is distributed to each victim’s brain and mind. What possibilities are available in this model that are not in a literal underground bunker model? For one thing, the perpetrators would be mobile, just like the victims, with a connection maintained everywhere they go. This might allow for street theater.
With a direct brain interface the perpetrators would just have to “think” the harassment. The obvious asymmetry is that the victims are nonconsensual and do not have an on/off switch or a volume control. They are kept in the dark about what is happening by a real conspiracy of silence; a conspiracy that aids, abets, and allows their rape and torture. One could also consider direct hookups from one brain to another at the neural level, rather than the linguistic level. This might be used to “steal minds.”
Suppose, hypothetically, that you had a brilliant scientist, no morals or ethics, and wanted to “clone” this scientist’s thinking. You get 100 volunteer privates in the secret police unit who agree to a direct hookup. Voila! After 10 years, maybe a few of them have picked up the skills of the nonconsensual (or even consensual) scientist. (Over time the patterns will likely self-organize to interpolate and resemble the imposed patterns.) What if you then start sending to the scientist? Visual? Auditory? Motor control? What functions could then be controlled or influenced? There are various permutations on the theme. If this level of direct brain connection has not yet been tried on humans it will not be too long before it is. And what about machine simulation and modeling? Those ignorant of the current state of technology may scoff, but the time is now to make sure that if such experiments are (or have been) done they are done humanely and consensually. Human rights demands that all participants be consensual. (See “Motives for Mind Control,” for more on this sort of motive.)
One argument against the harassers running off direct brain interfaces themselves is that they don’t sound like real people thinking. They sound like machines simulating a playground taunting, feeding back on the victims’ reactions and using profile information. That, or some goading moron at a microphone. Perhaps the RTIs actually receive training in “using” the devices or have a less invasive interface. Some RTIs may have direct interfaces, but the communication network can have many nodes on it (just like an Ethernet). Imagine hooking up an autopig machine just like you’d hook up a printer to a network. And an RTI’s microphone and VR monitor at another node. The difference is that some of the “nodes” of this network are direct interfaces into human brains. And some of the human beings are nonconsensual and are being purposely tortured.
General Thoughts on the Situation
Americans juvenilize human rights abuse. Look at COINTELPRO. Largely a bunch of sophomoric dirty tricks applied against people to discredit and neutralize them. Juvenile as they are, to the victims they are nonetheless devastating. This juvenilization helps people to dismiss the abuses and the taunting ridicule. Another reason for the juvenilization and taunting is to regress people to a juvenile state. This is a common technique for interrogators and torturers. The intention is to make the person regress and be more childlike so they accept the torturer (or the “good Nazi”) as an authority figure to be obeyed. Cointelpro of the mind.
Another cover deception is that it’s just children. Hmmm. Children who beam voices into people’s brains to drive them to suicide for amusement? How does that work, exactly? Are they sitting at microphones or do they have chips in their brains? They surely do not build or buy the technology. If an adult really made a child part of a torture operation then that child is a victim also. More likely it is a covert operation unit running a deception operation. Just another psychological operation, a long-running cover, a theme for the deception. Juvenilize the victims. (And would it really matter in a model independent sense, when people are being tortured?)
The voices harassing me all speak English exclusively and all have similar, though differing, accents. They sound like white men aged 18-40 or machine simulations thereof. As far as the indirect feedback I get about who seems to hear the voices, it seems to cut across all demographic boundaries. Men and women of all races and ages — and children also.
If the Russians did this it would be an act of war. It is nothing but psychological warfare against the domestic population. Who are these people? Where are they? Did you vote for them? People are afraid to even talk about them. These torturers cower in a literal or metaphorical underground bunker, harassing citizens and trying to stir up trouble. They harass, goad, and torture. They rape people in public (if you assume a model with an audience). They sadistically drive people to suicide for amusement. (How many?)
Once you know this to be reality, what other facts have to be updated in the truth database? Facts have logical consequences. 2+2=4. If the logical consequences are hideous, many people turn away and go into denial. They pretend they are living in the fantasy world and ignore the facts staring them in the face. Are there any real men in this society?
Here is a useful model to consider, at least to clarify some ideas. It is something like the UCLA violence project, proposed in the early 1970s. Assume brain implants or some other sensor capable of reading some significant aspect of brain functioning. The brainwaves are telemetered to the communication network (maybe low earth satellite or other), the communication network feeds to the underground bunker (literal or metaphorical), the underground bunker processes the telemetered brainwaves to voice, the voice signal is filtered through autopigs and RTIs, the processed signal is sent back out to the communication network, and the final signal is sent to a targeted or wide-field voice-to-skull device. Most of this is basic engineering. (A cellphone network is a similar sort of setup.)
In the underground bunker there are the Auschwitz guard RTIs who do the actual sadistic harassing, computer aided by autopigs. They are commanded by Major Mengele, who has a master’s degree in psychology. He uses that and his torture experience to design new pet theories of torture, control, and direction which he has the RTIs test on victims. Whether they “work” or not, the victim experiences torture. (“When you pull all the legs off a fly it cannot hear.” “The lobotomy cured the patient’s hyperactivity.”)
Who is the pig holding the leash of the man in the middle (Major Mengele’s commander or his commander)? How far up does the command chain of torture go? Who profits? Those are the ones to hold most accountable and the ones to get. Not that the lower-level participants are not fully accountable.
Don’t take your feedback from a bad monitor. As an electric guitar player I tend to think of the feedback sound sources as amps. It is just my nonconsensual direct brain interface sent to the “effects loop” of the underground bunker, and then sent back to “amps” around me to provide the final acoustic effect. (Of course it may also be something other than an acoustic signal at the final voice-to-skull step.) This is actually a fairly good analogy, except that the “amp” may be something like your refrigerator. If the effects loop is evil, the feedback is intended to destroy you. Like a phase-locked loop, there is a tendency to lock in and entrain when realtime direct feedback of your own thoughts is present. This may be used to control a victim. Aside from gathering data, try not to lock onto such signals if you detect them. Don’t slow down your thinking or work to articulate it on a bad amp (unless you assume an audience model you are also educating or you are gathering data).
Reprogram the triggers. The trigger algorithm is a basic way they keep victims traumatized. Anything that gets under your skin or that might get a reaction from you is a potential trigger. They will often use a babbling trigger search (BTS) algorithm where they go through a list that Major Mengele developed from studying the transcript of your harassment. They babble various phrases looking to see which ones get a reaction. This algorithm may also be automated. When they find one — a potential trigger — they send it to the trigger algorithm (TA) which applies it in almost a clockwork, machinelike fashion. The “successful” triggers that cause trauma or distraction become autopig phrases to be pounded into the victim’s brain with a huge Cameron number. This psychic driving causes a form of brain damage where the victim tends to hear such phrases even where they are only hinted at (trigger abbreviation) or in random noises or anticipations. If they try to trigger you with some phrase that they have associated to trauma or anger or distraction, try to reprogram it. Consciously associate it with another concept, like human rights abuse or the trigger algorithm itself. Each time you hear it, make that association to yourself to reprogram the trigger.
Assume an impostor. If you are under voice harassment, do not assume the source of the voices is local. If you are interacting in society, do not assume that those around you are the sources of the voices. In some models they might be, but even in the mixed model they may well be long-range manipulating and harassing voices. In the underground bunker they always cower and look for ways to harass and goad and stir up trouble in the real world for the victims. They will impersonate anyone or, for that matter, feed back to you anything they think you might buy. They try to induce anxiety, they try to distract, and they try to stir up trouble. To say the harassment channel is unsecure and unauthenticated is an understatement — at least from the victim’s viewpoint. Information warfare exploits such channels.
The permanent words of the day are asymmetry, belie, and nonlocality.
For more information, visit the website Mind Control: Technology, Techniques, and Politics at http://www.datafilter.com/mc
In particular, see “Mental Firewalls” and “The Autopig”.
“We’ve been watching you a long time. We know more about you than you think.” — What an RTI blurted out, angry, when I told him he was “powerless.”
Optional Postscript: Mixed Model
In this final segment, I consider the above scenarios from the perspective of the mixed model of natural psychic abilities plus technology reverse-engineering such abilities and/or employing other methods. Caveat: I do not think this is the correct model, but that the standard technological model is. Feel free to skip the rest of this article. I discuss the mixed model because some people do believe psychic powers are more than just something like enhanced intuition, and thus may be vulnerable to psyops exploiting that belief system with technology. It is also useful just to think about, to get a different perspective. Who knows, it might even turn out to be partly true. How would you know you had such abilities if they were being masked by technology? Could you tell the difference (especially if you didn’t know to look)? Please see “Models of Synthetic Telepathy” for more explanation.
With that caveat out of the way, I discuss the above sorts of brainwave-to-voice-to-skull systems assuming they are some sort of natural phenomenon.
First suppose an actual acoustic signal really is embedded in appliance noises, etc. How does it get there in the natural model? Perhaps the electrical patterns in a person’s brain somehow interfere with electrical equipment and impose a discernible pattern. Given the extremely low power levels of EM radiation put out by the brain, it would have to be a very sensitive “detection device.” Could your refrigerator be more sensitive than SQUIDs in a laboratory? Maybe there are vibrational modes (like PDE solutions) that an extremely low power signal can shift between. Something like a transistor or a catalyst. This mode shift would have to be large enough to produce an audible result. The results would somehow have to be interpretable as language. It would also have to operate over a fairly long range. For these reasons, this explanation does not seem very likely at all if you assume standard physics. (And how would other people talk on your refrigerator? Why would a natural psychic hide a signal in a refrigerator rattle?)
What if natural psychic powers result from an EM signal emanated from one brain and received by another brain, like with microwave hearing? Justesen made some calculations in his paper that the power levels for the effect, though low, are still too large for the brain’s tiny natural microwave emissions. (See the end of http://www.angelfire.com/or/mctrl/justesen.htm.) Perhaps some people are super-sensitive to this effect, or there are other lower-power nonthermal effects which are currently unknown. This does not seem to account for the nature of the harassers, who badger and demean but never seem to think like real people would think. With the microwave hearing effect, this would also be just a voice effect. (And how could directional sound be sent by such methods?)
Next, suppose some sort of direct brain interface at a neural level that somehow naturally occurs. Again, the problem is the transmission method which must operate at extremely low power (and often over long distances). Assuming standard physics and biology, there is no known way for this to occur. Moreover, the science departments at all the top universities ignore the “phenomenon.” This implies a huge conspiracy to keep the powers secret or else powers so weak and unreliable that they cannot be measured experimentally (and do not meet the v2s level of strong signals victims report). If people had these powers, wouldn’t they wonder how they work? Would they just think this is magic but they can learn about the eyes and ears in a biology book? Are none of these people scientists? Can’t someone design and conduct a convincing, repeatable statistical experiment to at least show information transmission by some unknown means? Are these people not worried about the reverse engineering of this ability with technology in secret labs?
Given the above, this model does not seem likely. Nonetheless there are a few possibilities. It may be that the brain can be an extremely sensitive detector when strongly tuned to receive a signal. If one person’s brain were “in sympathy” with another person’s brain then some sort of extremely low power effect might occur. It would be like a pencil balanced on its tip, which can be knocked over by a tiny force. The brain also recognizes patterns it is conditioned with more readily than a random pattern (and hence often incorrectly). The anticipation feeds back with the sensory input. So these patterns may require lower power levels for reception. One could also postulate some sort of unknown biological quantum effect.
As I have mentioned before, the technology exists whether or not the natural model holds. Thus the pure natural model is obsolete and there is at most a mixed model with both technology and natural abilities. There could be weak “psychic” powers being masked by stronger technological signals. Note that if you reverse-engineer a hypothetical natural psychic signal that operates on low power, you could likely turn up the power tremendously when you plug the device into a wall socket.
Part III: Working Models Under Mind Control Torture
Allen Barker, Sept. 15, 2002
This article again builds on the model structure developed earlier in “Models of Synthetic Telepathy.” See that article and the links therein for the basic background information. See also the previous article in the series, “Surreptitious Acoustic Signal Modulation, Voice Projection, and Direct Brain Interface.” All the articles in the series are listed at the end. This current article starts off describing audience models, as a foundation for working models to apply in the world. I then discuss working models. In the section following that I describe and analyze some of the harassment I have recently been subjected to. Then, as with the earlier articles, I end with some general thoughts on the situation.
An audience model is a model of who all has “access,” at one level or another, to your private thoughts and other private information. It is also a model of their intentions and consent status.
There can be various levels of “access,” first of all. The levels of invasiveness range all the way from violating your private thoughts, to monitoring video and audio surveillance of you in your home, to tracking your actions outside your home, to reading your “private” email, etc. (In the spy world, once you get one agency watching or monitoring you, you are liable to get several.) For a large group of mind control victims the primary concern is their own private thoughts and mentation, and who has “read” access and “write” access, so to speak.
The basic audience model concerns the public. Who in the general public can “access the thoughts,” consensually or nonconsensually, wittingly or unwittingly, of a particular victim? At one extreme is a pure “voice to public” model where almost everyone can access your thoughts but they maintain a conspiracy of silence about it (or else are unwitting). The other extreme is that only you and the torturers in the underground bunker (literal or metaphorical) have access to your private thoughts. [Some victims may have even been psyoped into thinking their thoughts are read when they are not, but for many it is real.] Keep in mind that there will be deception operations to conceal the true audience model and focus blame on the wrong people, as well as “voices” which will impersonate anyone you know or interact with.
Why an audience model? Victims have to interact in society each day. Unlike in a prison camp operated according to the Geneva Convention, the torturers do not have to feed the prisoners or provide them with any shelter. The prisoners have to try to support themselves despite the ongoing and constant psychological and often physical torture. They have to deal with a very real conspiracy to keep them from success at whatever livelihood they choose or are trained in — and which exploits them in any way possible. They have to choose a livelihood that they can somehow succeed in despite having their every thought stolen from them the moment they think it and Bergeron harassment when they try to concentrate. Thus many professions tend to be ruled out or made purposely more difficult for these “free citizens.” In whatever they do, they have to deal in public with whatever audience model has access to their most private thoughts and where people try to inflict trauma by way of that. Then again, mind control has already stripped these citizens of every fundamental, inalienable human right already, right at the root of freedom of thought.
Example: The voice-to-public standard model
Perhaps the best way to illustrate audience models and think it through here is with an example. I will call this example model the “voice-to-public standard model.” Assume the standard model of all technology. Assume some collection of victims with direct brain interfaces to the underground bunker control center. Assume a voice-to-public model whereby the underground bunker sends out a wide-field signal containing portions of a victim’s private thoughts. How this wide-field send occurs could vary: from an EM signal, to widespread acoustic signals, to direct brain interfaces in the “audience” members’ heads too. The important point is that a large segment of the population receives the signal. Exactly which segment receives this wide-field send is unspecified, and presumably is controlled by “the man in the middle.” In one model, for example, perhaps all agents in some nameless agency have access to the victim’s thoughts and the control to vary the connection topology among the consensual and nonconsensual “brains” on the network. In another example, perhaps a wide-field microwave hearing broadcast is used in one area, and an acoustic modulation is used in another. This network traffic may be delivered to specific targeted individuals via voice-to-skull devices or brain interfaces, or might be sent out on larger “amps” or “antennae” that broadcast to some segment of the public at large.
Assume that some of the “audience” members are witting, and some are unwitting. The witting ones know it is a technological send. Some may have just figured it out, but the perpetrators or consensual collaborators are also in this group. The unwitting “hearers” have never consciously noticed the signal or paid attention to it, though there may nonetheless be subliminal and unconscious effects. There is yet another group, which I sometimes call “half-witting.” They know something about the true model [here assumed] but have been psyoped into a false belief system about it. They may know about the “hearing” and something of the true “send” source in the victim’s mind, but may, for example, think that they are psychic and have special powers. They may also know nothing about the “man in the middle” and assume it is some sort of a natural peer-to-peer communication.
What follows from this particular audience model? Consider the consent status of the “audience members.” Any unwitting audience members or “hearers” are clearly nonconsensual, and any half-witting audience members clearly did not give informed consent. The consent status of witting audience members is indeterminate. Remember what mind control victims have been through, with vicious harassment and street theater constituting torture. Any unwitting audience member cannot really be held accountable for this. The witting and half-witting ones are responsible. Even the half-witting ones know enough to know what they are doing even if they do not know the full true model. The sorts of gleeful sadistic torture that victims have seen indicates that. It would only take a few “audience members” out to get a particular victim for them to be able to inflict torture.
Once torture has been inflicted the victim obviously thinks like a person under torture. In this way a few pigs can set off a snowball rolling down a hill called gutter culture, when the other audience members — or just the general public — then start to harass and criticize the victim for the torture-inflicted thought patterns and for speaking out and resisting. If professional torturers start off the torture and do the initial dissection and trigger installation then even the amateurs can later pick up the triggers. It is a vicious cycle, but at its root is nonconsensual brain rape. From a few vicious pigs to shaming the nation.
Familiarity breeds contempt, and this can hold true even when that familiarity is forced onto the victim and the rapists keep returning to rape again and again. Even the audience members who do not directly inflict the torture still do nothing to stop it and maintain the conspiracy of silence that allows it to continue.
Are there any nonconsensual “hearers” or “audience members” besides the direct victims hearing their own thoughts and being harassed? Suppose there are, perhaps half-witting. (This also assumes that they can’t easily just “tune out” a “voice.”) In this case they are victims also, in a way, though not as extreme as those whose thoughts are raped and broadcast. They are forced to “hear” things without their consent, though presumably not relating directly to them or used directly to destroy their minds. In this case, though, they are also participating in the conspiracy used to violate themselves and torture others to death. By keeping silent they are collaborating (though some might claim it is through intimidation). They apparently get to “hear” people being tortured to death, and many of them seem to participate.
What sort of person forced to hear another’s thoughts would want to hear that person undergo torture, versus have normal thoughts? Entertainment for sadists? The nonconsensual senders certainly did not choose to have their thoughts opened to the world for anyone to exploit and turn against them. To blame them is like blaming the rape victim for having to witness the crime against her. Blow up machine and shoot the operator, don’t blame nonconsensual rape victims. Audience members in this model could have tactfully approached victims like civilized human beings and let them know what was happening, but that did not happen. The victims know they are conspired against to keep information away from them, and it concerns something as vital as their being tortured every day. Thinking about this can be one of the most dispiriting things and makes one want to assume an “all baboon” audience model. How do you even look a person who does that in the eye with anything but contempt or disgust?
Are there any “friendly senders”? You have to be a bit careful about assuming “friendly” senders, whether you assume they are consensual or not. You do not want to Stockholm syndrome on harassers or give them an opening — which they will take anyway, with impostors and impersonators of anything they see you respond to. The evidence I’ve seen shows almost no senders who can really “converse” and none give actual useful or verifiable information except unintentionally. I am the only one on “my channel” who actually sounds like a real person thinking to himself. It is probably similar for other victims. Apparently everything I even slightly think at the back of my brain blasts out to God knows who around the globe on whatever network or medium. It is as if the network administrator put me on multicast mode. And apparently even when I just talk out loud the signal goes out too. As much as humans flap their lips all day long, no one else on the channel sounds like they are actually talking normally, let alone thinking. It would be a cacophony. This indicates a strong asymmetry. The other “voices” tend not to even be able to string two sentences together or do much but repeat the same formulaic, manipulative, harassing, directing, and triggering phrases. This implies no “friendly” senders.
On the other hand, you also do not want to limit your own freedom to engage in alternative modes of thought. This includes conversations “with yourself” without compromising your principles or opening yourself to manipulation. You need to be able to let your guard down at times without worrying about it. Once you know you mind has been violated you have to question even “your own” thoughts. [And to anticipate a spinning pig, it is clearly not all an internal conversation because of the many external confirms and the nature of the imposed signals.] IFT of course allows you to do that, but you need to be very careful with it. Note that you have two classes of feedback on your “private” thoughts. You have the voice-to-skull senders but you also have “hearers” giving feedback on the normal channels such as regular speech that you are listening to, email, etc. Remember that if they maintain the conspiracy of silence used to torture you and others (often to death) then they are complicitous in the crimes. Ignoring all senders and remaining orthogonal except for data gathering seems to be the best policy in general.
This brings me to what I call a working model. Multiple model reasoning is an extremely powerful technique that can allow you to reason despite missing information. It is surprising what all follows just from what you do know. Nonetheless, for everyday thinking it is much easier to have a single model and not have to evaluate everyday data across several different ones.
Having a single “everyday wear” model also helps in developing certain guidelines for your own thinking. You have complete freedom of thought, but within that freedom you can choose how to hold your own mind — or at least what to train yourself toward despite whatever obstacles, internal or external. Not all thought patterns are productive, some are destructive, and certain ways of dealing with even external harassment may be better than others.
There are a few criteria for choosing a working model. First, it should be as widely model-neutral as possible. It should naturally incorporate as many of the important points of the other models, according to how likely they are. That is, it should be something like a weighted maximum likelihood model, fitting the known data. Notice how the example model above, the “voice-to-public standard model,” subsumes the pure natural model and mixed model for most practical purposes. Some half-witting “audience members” were psyoped into thinking they are psychic. [Diehard mixed model fans can still assume the natural model additionally, but the standard model with fake psychic psyops is still there, as are technological psychic suppression units as a new feature.] For me, a head-in-the-sand model is unacceptable, but some people prefer to just pretend that none of this happens at all. That is similar to my preferred model, but I think it is necessary to add a justice process that does see and notice everything, gather data, and freely talk and write about it all.
As a second criterion, the working model should not lead to Stockholm syndrome. Victims have been tortured for years and should not assume any model where they dignify those Nazi pigs in any way. People have been tortured to death, and others are still tortured with that intention. Any “audience” has at best remained silent and watched while these atrocities were committed. A few may have worked behind the scenes to end it, but then again after France was liberated everyone claimed to have been in the resistance. Keep in mind also that the “audience” mind control victims encounter is not generally a uniformly distributed one. Harassers tend to be drawn to distraught mind control victims like a magnet.
As a final criterion, a working model should be one that allows you to live your life as well as possible given the circumstances of torture that you obviously did not get to choose. It should also allow you to keep protesting and resisting the ongoing human rights abuses. I will not describe my actual working model here, because I am still working on it and, as always, am free to change it. I have given enough indications of what it is like. Others are free to come to their own conclusions about their own working models.
My Recent Observations
In this section I describe and analyze some of the recent harassment I’ve been subjected to. As usual I directly describe what is going on without worrying whether someone will second-guess it or try to smear me. I again use the electric guitar amplifier analogy mentioned in an earlier article. Music analogies in general tend to apply when complex sounds are being produced and analyzed by the brain. Consider a “signal” as going from the brain’s thought process, to an effects loop where it is further processed and added to, to an amp producing audible sound, and back to the ear — or perhaps bypassing the ear and going right to the auditory cortex in some models. [Recall that the modulation might be applied at the send of the sound source, but if you assume direct brain or ear manipulation it might also be applied at the receive end. See the previous articles in the series for more discussion of that point.]
“Amps” in this case can be things such as air conditioner noises, refrigerator noises, or computer fan noises. They can also be fake chirping crickets and calling birds, or overlaid signals hidden in the ambient noise of those natural sounds. Such “amps” have different speeds at which they can be modulated with voice or have it hidden in their ambient noise. This follows from the characteristic frequencies and rhythms in the noise source. (To be heard in the orchestra but not stand out too much you have to not be too much louder, play in rhythm, and play with similar, harmonic frequencies.) For a quiet send to be heard through somewhat loud background noise without trying to overpower it, it needs to be matched to the background. Partly this is just a practical matter of acoustics, but it can also be a way to try to keep the sends subliminal. Some “amps” are more articulate than others when voice modulated, and produce very clear speech, as opposed to more muddled ones. Articulateness is largely a function of response speed and the presence of higher frequencies.
Lately I have been harassed every night by what I call Articulate Cricket. This is a blatant voice modulation on a cricket tone. (See the earlier articles in the series for discussion of the possible modulation methods.) Believe me, I’ve heard crickets all my life and didn’t just “not notice” such blatant voice signals. If you listen very closely, it seems to be a voice signal overlaid on top of the natural cricket sound — though I wouldn’t rule out a complete fake cricket sound. Try listening to it as two sounds, the ambient and the overlay. It is like someone or some machine “speaking” to the rhythm of the ambient chirping, with a similar frequency, modulation, and directionality. The matching of seeming directionality and volume levels is an interesting piece of information, as discussed in an earlier article.
I doubt any real cricket can truly be as articulate with the English language (always English) as the sounds they harass me with. All the phonemes come out crisp. What are the chances that a real cricket, by rubbing its wings together, can make all the sounds of the human vocal tract? Chimpanzees can’t even do that; a parrot only learns a few phrases over a long time period. Why do the crickets and cicadas repeat the same dumb conditioning and harassment phrases as the refrigerator and air conditioner, except “chirpified”? If you listen as two sounds, sometimes the harassers seem to “miss a change” when a group of crickets is chirping and the patterns shift. If two crickets are chirping out of phase sometimes the “one syllable per chirp” triggering of the speech overlay gets mixed up and the syllables of a sentence alternate from one cricket to the other. When the cricket overlay is tracking your subvocal thoughts (“locked on”) with direct feedback you can change your thoughts (when “talking” on the cricket) but you typically cannot change the speed of the underlying cricket chirp.
Often the voice modulation will only start up a few seconds after you consciously direct your attention to something like the cricket sound or air conditioner sound. Listen to the sound in those first few seconds to get the background. Other times, the voice modulation being there is what causes you to notice it. When working at my computer it will often “chirp out” whatever I am thinking as I am typing, like the letters as I think them. It also likes to do things like “announce” my passwords, presumably as an attempt to demean and anger me. The cricket at least is easy to block; earplugs or a pillow over the head cuts out those high frequencies. Other sources tend to start up then, in whatever regular background signal there is to hide an overlaid harassing voice in.
So the crickets noises are just one more cover for harassing voice modulation and use the same jackal-like trigger algorithm and strongly conditioned phrases. For instance, after someone suggested I try something like Tylenol PM to get some sleep with all the harassment going on, the cricket added the sleep deprivation goad, “he’s addicted to sleeping pills,” to its list of autopig phrases. Without any dismay you can see right through the American clown suit to what is nothing but a despicable torture technique. What if someone purposely harassed you all day and all night and violated your most private thoughts and moments? Would you be fooled if the wielder of the cattle prod wore a clown suit? You would shoot that clown dead if the police couldn’t stop him, and any jury in the country would agree it was self-defense. But the cowardly American “warriors” hide in bunkers to treasonously torture the domestic population. They use that cover of secrecy as one of their torture goads: “he doesn’t have any idea how we do this,” is a fairly common autopig taunt these days.
There may be a combination of methods being used, but the evidence seems to indicate that at least some of the the modulation is taking place at the ear or brain. That is, modulation of the received sound rather than modulating the sound at the source. Taped sounds tend to get different overlays placed on them when replayed (though masking techniques might be being used here). It is like they detect the sounds as you hear them, telemeter them out, hear them themselves in realtime, and then send back an overlay — whether by direct brain interface or other techniques bypassing the external sound.
One interesting effect I have noticed about the modulation of certain sounds like the air conditioner noises and computer fan noises is that if you are paying attention sometimes you can detect when they turn on the machine. The sound gets a more ragged, annoying tone to it — almost like someone stepped on a light distortion pedal. Then the voice kicks in within that band of sound. If the sound is actually modulated on the “receive” end, at the ear or brain, then in this case the fuzzy sound of “turning on the machine” may be a ruse to make the modulation sound external. Or else it may be a technique to help blend in the voice overlay with the ambient noise. Or there may be both external acoustic modulation techniques and brain/ear-level modulation methods being used in conjunction.
Very often the subjective effect seems blatantly to be external modulation at the source. Some in the “public” — or at least some street theater actors — seem to hear the sounds also, by whatever modulation method. Nonetheless, when the brain itself is being tampered with with the intention of harassment, manipulation, and deception you have to at least suspect that the sound is only made to seem externally modulated on the send. You also have to consider conditioning effects as a form of purposely inflicted brain damage when you are bombarded with the same harassing or triggering phrases 100,000 or more times (as with Ewen Cameron’s psychic driving). Sometimes anyone can hear sounds that sound something like words when a line printer is printing or a train is going by, etc. The voice modulation I am describing is completely different, interactive, and blatant.
You can draw some interesting conclusions from what the “effects loop” of an “amp” contains:
Buffers — a slower “amp” will save up and finish your more rapid thought.
Delay line — your thoughts repeated with a delay of a couple of seconds.
Sample and hold — a thought is held and repeated back over and over.
Paraphrase — sometimes a different word or phrasing is substituted in.
Rapid direct connect — a fast “voice” that can keep up with your fastest verbal thoughts (unlikely to be a relay man in middle there).
RTI — comments, jeers, taunts, and “advice” that you did not think, often using words or phrasing that you would not have used.
AP — a machine-simulated RTI with simple syntactic transformations on your thoughts and phrases in the “harassment database” repeated ad infinitum.
MCI — an RTI that tries to summarize your complex thoughts in simplistic English.
Chirp effect — process voice to have a cricket-like sound to it and match syllables to trigger off of an ambient chirp sound as an overlay.
They can turn the harassing voice modulation off. It is then that you really realize what a stressful thing it is to be constantly berated by the voices of vicious pigs you know are trying to drive you to suicide, in a society where it continues and continues. You find yourself tensing up when you listen even to the unmodulated sounds of crickets or air conditioners. Any second you expect the same old harassing taunts to start up again. Soon enough they do — and you knew all along that they were still monitoring your thoughts, anyway. You know exactly how they operate after a while, so it is no surprise when they start up again. After I posted my article “human rights update” a short while back the harassment was cut back dramatically. (That was the article where I described how they were taunting me with phrases like, “are you having fun being tortured to death?”) The harassment then slowly seems to build back up. The times when it does decrease or increase often tend to correspond to external events. If I get back to making progress on my math paper I know it will instantly ramp up. For now, then, writing this is the most important thing for me to be working on.
Apparently there has been a true revolution in military (and civilian) affairs thanks to secret research during the Decade of the Brain in the 1990s — or earlier. Again, there are many techniques and any victim may experience one or several at different times. They are always improving the technology, and there is always something new to test on nonconsensual citizens. Apparently also there is theft from and suppression of open technology researchers. The pigs may try to excuse torture by saying something like “they are only trying to slow you down,” but torture is torture is torture is torture. What gives them any right to extrajudicially “slow down” a free civilian citizen’s intellectual work even if they didn’t use torture and you bought that phony line? They can call anything having to do with math or computers “dual use”; toilet paper is dual use. (Most mathematicians or computer scientists would laugh if you openly tried to tell them my research was any threat to national security.) There is something in free enterprise called hiring someone or buying their work or approaching them like civilized people and discussing things with them.
What a pathetic supposed rationalization; but then again I have seen about all of them by now. Once they start torturing someone they cycle through the rationalizations, hoping one will stick. There’s another one that makes me out to be a danger to all the poor little kids reading the internet and exposed to my dangerous ideas. That one is supposed to justify my harassment and the rapists acting as cointelpro agents and censoring “gatekeepers” on the internet. And what about all the other mind control victims? Do they make up different rationalizations for each one? Why is it never real criminals like murderers, rapists, and torturers who get the mind control treatment? [Though of course they still have basic human rights and would have to consent to any brain monitoring.] If I throw a soda can out the window it is treated like the crime of the century.
Some General Comments
Phony gradualism. People are being tortured. Society is currently set up to deny it is happening at all. The gradualist says you need to slowly move the current level of “allowed” public discussion toward the true state. Will it ever get anywhere near? In some things the gradualist approach may be justified, but remember that these are real human beings being tortured every day. “Maybe in 50 years of being tortured every day the truth will come out” is easy to say if it is not you being tortured — though callous and cruel. I respect a sincere gradualist, though I do not share the same opinion in this case. Too often it is just a manipulative tool of the American social control system. I tend to describe things the way they really are when people are being tortured, and in this case I am also one of the victims. Things can change rapidly at times — sometimes noticeably, like when a newspaper breaks a real story or a major world event happens, but other times more subtly.
1) the rapist blames the victim, always
2) inflict and blame [for the effects inflicted]
3) inflict and “advise” [on how to deal with what they inflicted]
4) the thief complains of stolen goods
5) peeping tom wants to use the TV remote too
6) the rapist complains of having to rape the victim
7) the rapist tells the victim he’s really helping
8) the rapist plays for sympathy like the rape victim hurt his feelings
9) the rapist puts the victim “on display” and blames the victim
10) the rapist claims embarrassment at the act of rape
11) the rapist smears the victim to any “audience”
12) Mengele impugns the “morals” of the rape victim
13) categorize and blame [based on phony implications of the assumed category]
14) the propagandists smear, trigger, and try to discredit
The cake theorem: You can’t have your cake and eat it. You can’t play-act like a prude and expect to embarrass people with their private sexual and toilet habits, etc., when you are the sadist voyeur raping them and attempting to demean them. There are some instances where the cake theorem does not apply, which are interesting to note, but this is not one of them.
Algorithm canonica. This is a personal thought-algorithm of mine (and probably of other people as well, but I named it). You can take a personal situation involving real people and apply algorithm generica to consider it in a different or more general setting. But you still think in terms of those people acting as canonical elements of that different or more general setting. That does not reflect on the actual people involved, and in fact the semantics of bad parses or unlikely tree branches can still yield perfectly good instances of canonica. The actual people are in a sense forked off or cloned as canonical examples or thought handles for this particular idea — even if it does not literally apply to them. If you know this in your own mind, don’t worry about a rapist misinterpreting it. NPT, IFT. Adults do not have to think only thoughts suitable for children or rapist morons — and children also have complete freedom of thought.
It is sometimes even a useful exercise to imagine everyone around you in their underwear, as public speaking teachers sometimes recommend. For that matter, if you want to imagine getting nasty with that sexy person you saw in the grocery store then that is OK too, though I prefer to keep my fantasies impersonal so they don’t interfere with my real-world interactions. What it means or doesn’t mean is my own private business. It is your free mind; you get to choose how to use it. I personally don’t really want to know your private fantasies, but some people are obsessed voyeurs. If you think “gosh I’m not supposed to think that” then you almost surely will think it, especially if you know there is an “audience.”
The goal of the harassment is to harass and torture. They want to drive people to suicide for their sadistic amusement and whatever larger political purpose (or experiment) the lowest-level scum were hired for. They want to keep people from being able to think. (Not that they won’t steal from what you are able to think.) In my case recently, they turned on the constant auditory harassment when I tried to write a math paper. They keep telling me to be a guitar player, over and over. They “reinforce” that, if that is the word, and harass other thought. Of course if I decide to do that (independent of their “advice”) they’ll likely start harassing that too, perhaps telling me to be a dentist next. They’ll feed back to you anything they think you will fall for, and reinforce any anxieties, misconceptions, or perceived weaknesses. Drip, drip, drip. No matter how stupid it is. Constantly. This is a psychological operation intended to destroy people’s minds. It is difficult to describe all the effects of such torture continuing for months and years.
Do not even entertain the goads and phrases that come in on channels that supposedly do not exist from people you do not even know. Observe for data purposes, but do not even accept the premises implied in the nonconsensual incoming. They will have you thinking like a moron if you’d let them, and that includes even accepting their phony premises “from the other side,” where you refute them as if the underlying premise is sound. Don’t debate the autopig, even if it is easy (unless you feel like it). No semantics except for data gathering, after you consider the nature and source of the signal.
$10/hour torturers harass and goad day and night, computer aided.
weaponize — verb, to turn into a weapon, a means to kill, destroy, manipulate, or control. Potentially applies to anything, with the applier being domestic or foreign.
Weaponize medicine, weaponize technology, weaponize religion, weaponize psychiatry, weaponize nationalism, weaponize ignorance, weaponize superstition, weaponize smug pigs in a superpower with a phony superiority complex who think they are living in Disneyland, weaponize the suburb, weaponize the mind.
They always want to trade you something imaginary for something real. Their empty promises are like deeds to the Brooklyn Bridge. Your actions or non-actions in response are real, though. If your phone is not ringing with a real person on the other end or you do not have it on paper it is not real. Ignore their con games and focus on your own actions in the reality.
The actual present sounds like the future. Welcome to the present.
Please have no illusions about American politics and society. Americans are the biggest two-faced hypocrite torturers on the planet. Our elected representatives are either complicitous, ignorant of the true situation and kept that way, or suspect the true situation and are powerless against the unelected shadow government. If a former East German citizen described events like the US mind control victims describe and blamed the Stasi, Americans who know the technology exists would believe it and at least sympathize with the victim. [The newspaper wouldn’t print it, because it would reveal the existence of the political torture and harassment technology still used in the US.] What is the difference then? What makes someone think that the same thing in one place is political torture but in another it is “delusional”? There is even a psychological diagnosis called “Stasi Persecution Syndrome,” but no corresponding diagnosis for American secret police operations. The difference is the widespread expedient lie and public delusion that such abominations do not take place every day in the USA (such as with operation mind control). The Big Lie technique is still at work in 2002. The Ministry of Truth declared it a thoughtcrime to speak or even think such things.
Part IV: Bayesian Stopping Criterion and the Optimization Theorem
Allen Barker, March 22, 2003
This is the final article in this series on mind control models, methods, and techniques. I think it is about finished, and there is not much I have not covered. I hope the articles help people to understand these issues by providing models, terminology, examples, and language, and that the articles will help to expose and end the abuses. I also hope they help victims to heal from the abuses inflicted on them. As a victim of such harassment myself, I have described some things that have helped me to cope with and understand the true, hideous state of affairs.
This last article builds on the basic model structure described in the first article of the series, “Models of Synthetic Telepathy.” It also continues some discussion and observations from the second and third articles in the series, “Surreptitious Acoustic Signal Modulation, Voice Projection, and Direct Brain Interface;” also, “Working Models.”. For a list of some of the basic abbreviations used in these articles, see “Abbreviations.”
Parts of this current article can be read literally or figuratively, but the torture is completely real as are all the examples. Remember Part II of my earlier series of articles, “Resisting the Mind Control State,” at http://www.datafilter.com/mc/protestResist.html. If you get angry, focus your anger and don’t be goaded into actions you have not fully considered. Act in awareness, get the right ones, etc.
The first section of this article discusses the optimization theorem and the Bayesian stopping criterion. Next, there is a section discussing triggers and general concepts related to triggers. Following that I discuss some of the social and propaganda aspects of the US mind control system. There is then a section containing some general comments and a section containing more of my personal observations of harassment. Finally, there is an optional postscript on the mixed model for people into that.
The Optimization Theorem
I will start right off by stating what I call the optimization theorem. What is being optimized with this “theorem” is your resistance to the torture inflicted, as well as your ability to try to maintain your life as best as you can. The main context being discussed here is dealing with torture by voice-to-skull incoming, but the general principle holds in much wider settings. It also holds for the lower-tech surveillance-based cointelpro style of harassment, for example.
It may seem paradoxical, but the best way to take action is to remain completely calm.
This is not the first impulse when subjected to harassment and goading, and it is hard to do. It does turn out to be the most efficient response. The best way to slam a fist back at the face of your pig harasser is to remain completely calm and observe it or ignore it. Work in the real world to agitate for human rights and expose the abuses. It is like a greedy algorithm in computer science, versus an optimal algorithm. The greedy algorithm takes the best move in an immediate sense but does not look ahead to take the best overall move. The optimal algorithm will look ahead and not necessarily make the locally most tempting move. Try to train yourself toward this imperturbability. If you do get angry, focus your anger, and let it motivate you to something productive.
Turn off your (internal) moron anticipator. Recall that the moron anticipator is a thought process that anticipates the likely reaction or response of a moron to something before you speak it or publish it — or even before you think it if your mind is being raped. Don’t even interpret the pigs’ incoming babbling as language. If the pigs don’t get language, don’t anticipate language. Your moron anticipator is probably a lot smarter than them, anyway, and just gives them fodder for more harassment. They’ll feed your anticipations right back at you. The pig incoming is just a machine, or might as well be. My microwave oven always says, “Enjoy your meal,” after I make tea. I can tell it 5000 times that I only made tea, but it will not learn.
Don’t imbue the incoming, the intrusions, with any meaning. You’ve probably gathered all the data that is worth bothering with on that rape channel. Don’t verbalize mentally unless you are doing it for your own self and want to. Don’t explain unless you are doing it for your own self. If you are not anticipating a moron raping your private thoughts you will not be tempted to waste time and even dumb down your own thinking. (Of course you still need the anticipator for your public speaking, writing, etc. — but even there, you don’t need to go complete lowest common denominator or absolute most pathetic spin. You can assume some level of common sense, at least the 6th grade level of US discourse.)
You know how they operate. Anything a retard thinks will annoy, distract, anger, or otherwise get a reaction from you they will throw at you. Anything they think will traumatize you or terrorize you. Any triggers or anything else they ever see you responding to they’ll pick up, bombard you with, and imitate. For example, I responded on once with sarcasm and anger when the pig said “don’t criticize the government.” They put that in the harassment file and still repeat it over and over to this day. You might call it “the way of the jackal.” This is true in all models, whether RTIs or an autopig programmed by Major Mengele’s software people and psychological profilers.
They will not respond to reason or argument. They may reflect some phrases back, “Eliza”-like, to keep you engaged, but soon they reset the machine and go back to exactly the same things as before. They will do this on any and every feedback channel (FIP) they can, from voice-to-skull to the internet. But you know the optimization theorem. What they hate most is when you ignore them, tune them out, or drown them out, and when you work regularly in the real world to end their human rights abuses. This is the most efficient response. You can talk to a machine all day long, but then you have wasted another of your valuable days and the machine has burned a few watts of power from the outlet it is plugged into. My microwave oven says “enjoy your meal” after it finishes cooking something, but I am not tempted to talk to it. I can try to tell it I only made tea and did not cook a meal, but it will not learn.
The optimization theorem is not a form of “learned helplessness,” even though victims are put in exactly the sorts of positions where such responses tend to arise. The victims literally cannot escape from their tormentors, who truly do abuse victims like an experimenter shocking a dog for weeks on end to see how long it keeps on jumping. If the victims die, freak out “psychotically,” or commit suicide that is just amusement and data to them — perhaps making the experiment a resounding success. But human beings are not dogs, and have not only fundamental, inalienable human rights but also the power to reason. The optimization theorem is the result of reasoning about the true situation, and which variables victims currently can and cannot control.
Knowing the optimization theorem intellectually is easy. Acting like you know it is difficult. The pigs use every playground trick ever invented to goad, taunt, harass, and annoy you. They sink to any level to attempt to demean and manipulate you. They want to anger condition you, in addition to trauma conditioning you. Emotionally, also, it is heavy, oppressive stuff to know that there are other “human beings” in your own society who not only want to inflict such suffering, but actually do it to you each day for their gleeful sadistic pleasure. Inside your “private” home and even inside your mind. They are the equivalent of Auschwitz guards; it is that level of depravity.
There are many similarities to the Holocaust, but there are also important differences. Open repression versus secret, covert, deniable repression. Being driven to suicide vs. shot or gassed and burned. People controlled in their brains by external pigs versus locked up in concentration camps. The pigs don’t even have to feed and house their distributed concentration camp victims. I heard one pig in the background of the incoming say one day — and I do not know the full context — “she does what she’s told.” In a purely physical concentration camp at least the victims still have their own private thoughts.
An important difference from a physical concentration camp is that the “walls” are, to a large extent, psychological ones. At least for now, victims still have some control over their own minds — which are the walls of the camp. It is as if by concentrating and focusing their attention someone in a concentration camp could dissolve the gates and guard towers, and perhaps expose a few Nazis also. Not that this is easy at all, and it in no way shifts the blame to the victims for the hideous atrocities inflicted on them. There are still physical effects like Delgado buttons and voice-to-skull transmissions. There are basic conditioning effects that are “hardwired” into human physiology, and real physical damage from torture, harassment, and stress. And of course there is all the low-tech cointelpro stuff that accompanies and intensifies the other harassment.
Emotionally, there is still that death camp air. You look at people and you know. You saw groups of them conspiring to drive you to suicide or make you an empty, controlled, mindless, husk. All while others stood by doing nothing or even cheering it on. The ignorant and expedient who know something of what is going on often rationalize that the victims somehow “deserved it” — while the true criminals as bad as the worst on any death row are treated as respectable citizens and live among normal people. This can lead to a sense of apathy after a while, and disgust with human nature altogether. These people were fellow countrymen, and often “friends” and acquaintances — or even family members. So there is a strong element of betrayal trauma along with all the rest of it. I hope the learning curve for some other victims can be cut down to the point where this does not happen, and they can learn all of this before their lives and anything they still care about are completely destroyed. I hope these essays help to take away the elements of surprise and secrecy that tend to keep the walls in place, and reduce the learning curve for other victims.
Bayesian Stopping Criterion
Besides remaining completely calm and working in the real world to expose and end the abuses — as in the optimization theorem — at some point you should start training yourself to completely ignore the mind control harassment as much as possible. (That is only the goal, don’t feel bad or blame yourself if it is difficult in the face of all the abuse.) When you are first harassed you typically do not know what is going on, and so even if you remain calm you still need to study and observe what is being done to you. You need to know, and don’t want to be manipulated by it. At some point, though, you have gathered enough data so that you have the picture pretty clearly. A million examples, no counterexamples, call it a rule and be done with it. Measurements and observations have a cost associated with them. In Bayesian analysis this is known as the Bayesian stopping criterion. It is based on the concept usually referred to as diminishing returns.
Below are some sample internal dialogs. They are meant to illustrate the points and provide examples, rather than to tell anyone how they should think. People have their own thought styles in their free minds. Don’t be afraid to think anything, even if it is something that tends to set off a pig barrage. If they get one little wedge in there they’ll try to open it wider. Don’t cede one millimeter of your free mind and free thought.
This first internal dialog is an earlier one, before the stopping criterion was reached. Imagine RTIs and autopigs babbling their gibberish and trying to play psyop mind games in between each sentence. This would be stretched out over some time period or would be a period of intense torture incoming. Between this you would try to have your normal mentation, as normal as possible under the circumstances.
shut up, pig. did that fool anyone? how about that one? pig babbling gibberish. we all know how they operate. did that fool anyone? what’s the Cameron number on that one? shut up, pig. PBG. that’s an autopig of one variable, simple syntax transformation. that damn machine. it’s a machine, with a few RTIs. shut up pig. that’s 30,000 times conditioning that crap. that was an SCP triggered by a bad parse. list-reading monkey. that was one trick pig trying to feed back my anticipation. that’s timid boy, trying to induce anxiety. trigger abbreviation. my entourage of simulated borderline retards.
Below is a sample script of some more current internal dialog. In it you don’t care what they even tried to say, or whether it was an autopig or an RTI. Again, imagine a pig trying to say something, the usual garbage, between each sentence. Each sentence cuts off a pig or even anticipates it before it spews its garbage.
kill it. that one too. and that one. kill that one. I don’t care what it tried to say. kill it. cut their pig throats. I don’t care. kill that one. I don’t care what model, and I don’t care how it happens. kill that one. kill it. it doesn’t matter what kind of lies and BS come out of their pig snouts. cut that one’s throat. kill that one. kill that one too. no exceptions. it doesn’t even get language, it just gets its pig throat cut. kill it. kill it. kill that one. bad parse, kill it anyway for trying to say something, that’s even better. kill that one. kill it. kill it. fake ambient, kill that one. kill it. first metaphorically, then literally. kill it. find it, make it dead. kill it. what is that one’s name and home address? that’s all, kill it. I don’t care how it happens. I don’t care what model. I don’t care what it tried to say. cut that pig’s pink pig throat. track that one. lock on. fire. I don’t care, pig. find that pig and kill it; that’s all that one ever hears. I know how the machine operates.
It doesn’t matter if they’re RTIs or autopigs in this script, internally. All incoming gets cut off with the same thing. You do not bother after the stopping criterion to even sort them into RTIs vs. autopigs. In that sense it is model independent. If it is an autopig rather than an RTI then kill it means kill the machine operator and anyone else involved in the real world, and metaphorically any influence it has in your brain. Train yourself to just cut them off. It works literally and metaphorically, internally and externally, for RTIs and autopigs, and for all models. It is so model-independent it is scary.
In addition to the usual autopig babble, there are also certain phrases that tend to be stereotypically repeated after you “respond” to one of their primary phrases. Some examples: “took you a long time to see that,” “are you sure” (a timid boy variant), “that helped you” (operant conditioning positive reinforcement), “made you respond.” These occur just as mechanically as the primary phrases, and typically because they saw you respond even once, or you once let the phrase slip by as a “legitimate” incoming. Kill these ones too; don’t imbue them with any meaning either. They are just there to keep you listening — they’ve never sent a 6-digit protocol confirmation either.
Alternate the above “kill it” training with periods where you completely ignore them, and “say” nothing to them in your internal dialog. This is the goal, but sometimes you need to train in the “kill it” mode and shift into that, especially if you have heavy incoming. If you have to do that all day it is better than listening to one rapist pig babbling. I call a temporary shift to “kill that pig” mode “taking a coffee break.” If you find yourself tempted to respond, or distracted, go back to the above and train yourself some more to cut the pigs off and, most importantly, don’t even consider what they try to say. It is not even language, it is a nonconsensual cattle prod to the “ugly spot” on your brain where that incoming arrives.
Nature and source, and sensation. Optimization theorem. When you are completely calm and their crap does not affect you at all their BS just hangs in the air, sticking out like a sore thumb. It does not even get meaning. It then tends to fade out and wait for another chance when the jackals think you are vulnerable or need to be punished for a thoughtcrime. At some level you are aware of it even as you ignore it, because you don’t want to be subliminally manipulated, but it is off encapsulated in some distant zone that has no effect on you.
Any time you want to switch modes to completely ignoring them, invoke IFT to clear out all the previous mental crap. Come into the present: Poof, you’re there. If you notice you’re thinking thoughts that are unproductive or that you don’t want to be thinking (like being influenced by externals), invoke IFT, poof them out of existence, and come back to the present. Switch to “kill it” mode if necessary. (Or whatever works for you; that works for me.) “This is my free mind, and I can think anything I want right now. What do I want to be thinking?”
Pattern recognition is a beautiful field of study. But I mean really, just with common sense, how many repetitions does it take before you see the pattern? If you see it, how long does it take you to act like you know it? Do 10,000 repetitions suffice? 20,000? More? When you see how they do it it is not that complicated, just vicious and jackal-like. At that point it is nothing but Chinese water torture. A dripping faucet forced to the brain can inflict the same torture: drip, drip, … drip. When they want to punish a “thoughtcrime” they intensify the goading, and similarly when they want to degrade your performance in working on something, etc. This is the “rheostatic capability” of the torture device as a variable aversive stimulus and performance-degrading weapon.
Don’t worry about a false reflection — or any reflection of your private thoughts off of a thought-rapist, for that matter. By NPT you do not care about a rapist Nazi pig’s opinions. If you are on a baboon safari in the midst of baboons, you do not care what they are hooting at you unless you are studying baboon hoots. You can still gather data, but at some point that should become almost automatic and calmly detached. After a few years of mind control torture there is not much that can surprise you. Disgust you, disappoint you, anger you still, but not surprise you.
Kill the pigs. First metaphorically, then literally (though if you can do it literally first it will save you and probably a lot of other people some trouble). If they are 70 years old 40 years from now, kill them. Wiesenthal on those Nazi pigs. I don’t care what model and I don’t care how it happens. (Barring some actual justice in the meantime where the pig is sent to a humane prison cell.) I mean that quite seriously, with whatever influence I have in whatever sense. I don’t even have a “need to know” how it happens for those purposes (though I do have a “need to know” what all has been done to my body, mind, and health). These pigs torture people to death for entertainment, and they will keep doing it until someone slits their damn throats or locks them up. That is a sad fact, but not liking it does not change it. How many more people are going to be tortured if they are not stopped?
Is the FBI going to “visit” me for calling for literally killing some sadistic torturers it insists “do not exist”? Who use torture implements it claims do not exist (but which it knows do)? For calling for some action to do what should have been their job of ending domestic torture and arresting the torturers? Even if the torturers work for the government — or especially if they work for the government — the FBI is one agency that should have taken care of this a long time ago.
If it isn’t a six-digit numeric, kill it — and even then it’s your discretion. The sadist pigs torture for entertainment. They try to destroy people’s minds and drive them to suicide. It is a repeated and ongoing conspiracy of torture and attempted murder. Kill them. First metaphorically, then literally. Get the right ones, though, and don’t be misdirected by their psyops. Kill them. You don’t care what they tried to say. The very fact that the pig nonconsensually and intentionally intruded on your free mind: kill them. But do it on your own schedule and the way you choose to optimize — don’t be goaded or taunted into actions. Optimization may not even involve you literally killing them, but rather working to facilitate that or otherwise stop them; remember Part II. In any model, they’ve weaponized nonconsensual access to people’s minds, trying to turn citizens’ minds, accessed against their will, into battlegrounds.
In the usual sorts of spin that one might anticipate being used against this essay, people might insinuate that this is somehow against my religion. But I do not belong to any religion which tolerates its people — or any people — being tortured or made into slaves. Some might spin that I am hypocritical because I am “advocating the same things the pigs do.” But I am not. Don’t torture them, kill them humanely. I’d prefer they end up in humane prison cells, but for the time being the routes to that sort of justice are being obstructed. There is also a false symmetry implied between torturing, slaver-like exploiters and those who would help the victims. Between people committing vicious crimes and those who would use necessary means to stop them.
For victims it is purely self-defense, because it is clear the pigs are trying to murder them every day and will not stop unless forced to. Some people may misapply or misconstrue what I am saying here, but I cannot worry about how every moron might misunderstand or misapply (purposely or not) the things I write. We are talking about literal, ongoing, protracted torture and the sadist torturers committing these acts. And we’re talking about justice.
There are sadistic pigs in this world who try to torture me to death and inflict any sort of psychological damage they can. That is just the way it is right now — my not liking it does not change it. It is understandable to feel some sadness for the pitiful pigs and wonder why they are so sadistic, vicious, and stupid. But it is a waste of time — and that is for the RTIs, never mind the machine APs. They’ll play off of even the emotions of pity and contempt, jackal-like. Don’t be fooled by the clown suits and never Stockholm syndrome on the torturing pigs. Even the obsolete Model 100 autopig is still Chinese water torture, dripping from a high-tech faucet. Kill the pigs responsible, metaphorically and literally.
We all know now how they operate, so no one will be surprised. They won’t stop unless they are made to. They may back off a bit if the heat is turned up, but soon enough they’ll be right back to it. They’ll even keep using the exact same triggers on me that I have written about here and described to everyone. It is similar to a scene in the movie “Jackass” where the practical jokers are annoying a golfer by sounding a loud sound every time he gets ready to hit the ball. They keep doing it until he gets so mad he decides to drive a ball straight at them. When he gets ready to hit the ball at them and draws the club back they set off the sound again. That is the sort of harassment, the level of the big superpower’s domestic political control torture techniques. Except it is inside people’s minds, 24 hours a day. In their homes. Destroying their lives. And the harassers cower in their hiding places far away inflicting the harassment. Instilling the triggers to be passed along to those who can use them to repress deniably while acting like the blood is not on their hands, too.
Triggers and Related Concepts
A trigger is some verbal phrase or sound (or image, etc.) which has special significance to a victim. It is a stimulus that has been selected or conditioned to cause a response in the victim. Very often it is a linguistic stimulus. Classical conditioning is often blatantly carried out to condition a victim to associate trigger words with trauma. I have had hateful-sounding RTIs spend hours in torture sessions trying to condition me like Pavlov conditioned dogs — except with the desired response being trauma.
To get an idea of how triggers work by an extremely un-subtle but close analogy, imagine the following. Consider a Paraguayan detention center of a few decades back, with brute torturers using direct violence, electric shocks to the genitals, cattle prods, etc. (and perhaps a CIA “adviser” looking on). Now suppose a victim in this detention center is undergoing a torture session. Each time the torturer zaps the victim with a cattle prod he shouts out “beautiful pleasure sensations.” He does this over and over. Now suppose the victim survives and somehow escapes. The victim is still in a society set up to deny that the torture center down the road even exists. If the victim starts to speak out she may open up the controlled newspaper the next day and read a story alluding to her and repeating the phrase “beautiful pleasure sensations” a few times. People may walk up behind her on the street and mutter “beautiful pleasure sensations.” If she responds with outrage and anger she is ridiculed. Most people do not know the situation of why that innocuous-sounding phrase would make her respond like that, and they may be so naive as to think torturers would never do that to conceal their vicious crimes.
Much of the whole current mind control system in the US is based around triggers. Once a trigger is instilled, that is only the beginning of it. Note that a trigger is not necessarily a strongly conditioned phrase (SCP) but strongly conditioned phrases tend to be triggers. For example, they may trigger you with some words meant to remind you of a traumatic situation they observed or caused and have it work the first time. If so, they’ll tend to repeat it over and over, resulting in a trigger that is also a “psychic driving” SCP. Here are a few other trigger-related concepts:
trigger reinforcement — This is where the trauma associated with a trigger is induced by the trigger and then tends to further reinforce the trauma conditioning. It is a vicious cycle: Trigger, trauma, further association of the trigger to the trauma, trigger again, etc. (If you anticipate a trigger they also tend to quickly send that trigger to reinforce your anticipation.) If they think they see you experiencing any strong negative emotions like fear, trauma, or doubt, they’ll jump in with a trigger to both reinforce the trigger’s negative associations and to intensify your pain and distress.
trigger abbreviation — This is where a trigger is shortened to just one small part of the original trigger phrase. For example, it may just be the first word of the trigger phrase with its characteristic inflections. Other abbreviations are possible, in the general sense of associative keying of triggers. SCPs tend only to need a hint of a key presented to evoke the full trigger and concomitant response — and before long the abbreviation works as well as the trigger itself. SCPs leave strong “attractors” in the space of brain flow, as a form of brain damage. Even just the characteristic rhythm pattern of an SCP will tend to evoke the phrase. Random events also tend to evoke SCPs, a fact which acts as a “torture multiplier.”
trigger speedup — This is where the trigger phrase is speeded up. It is very similar to trigger abbreviation, and still tends to evoke the response. They presumably hope to “slip it by” your conscious awareness of what is going on.
trigger transfer — This is where a secondary trigger is conditioned to the conditioned response of a primary trigger by pairing them. It can also occur in a slow evolution of a phrase like children’s sing-song taunts slowly morphing into other phrases and nicknames but keeping the same meaning.
trigger export — Once a trigger has been instilled in a victim, anyone can use it. It will tend to set off a trauma response or other unpleasant reaction in the victim. So the direct torture squads instill and induce triggers in victims and then pass trigger lists on to higher-level operatives. These agents can then use the triggers against the victims without “getting their hands dirty.” After a few layers of trigger transfer, the resulting trigger will seem innocuous to someone who does not know the torture conditioning that has gone into it. That is part of why they purposely use trigger transfer. These “innocuous” (i.e. deniable) triggers may be worked into propaganda, internet messages, or street theater, for example. This turns out to be a very common control technique for suppressing mind control victims in the US, and it is obvious once you see what they are doing. This may be part of why they seem to prefer linguistic triggers.
A common source for triggers is surveillance of a person’s home or mind. Certain codewords tend to appear on a FIP alluding, for example, to what the victim did the night before in “private.” If the victim responds, such codewords may be treated as triggers and further conditioned. By the way, once you know you are under conspicuous surveillance they will then start to insinuate that they know some other things from the surveillance, such as that your spouse is cheating on you. That typically is not true, but has the obvious intention of trying to destroy the victim’s family and personal relationships.
Much of such conditioning is blatant anger conditioning: Those conducting the surveillance want to taunt the victim with their power to violate the victim’s privacy and induce anger. There was a court case a few years back where a reputed mobster was placed under surveillance. Those conducting the surveillance would follow him on the street and repeat things to him like what his partner said during sex. The obvious intention was to demean and anger him. He actually won a lawsuit to curb the harassment, unlike the many ordinary citizens subjected to similar and even more egregious abuses. Yes, they would do that, they have done that, and they still do that.
Another common thing is for codewords to imply some sort of terror, extortion, or blackmail threat: to reveal something those conducting the surveillance think you will fear having revealed, to do something they think you fear might happen, even to harm people. With the threat to embarrass, for example, they typically don’t actually reveal their raped information except perhaps in whispering campaigns or insinuations. What they really care about is the threat and the potential to manipulate the person with the threat — as well as their important goal of maintaining deniability.
Many victims report intense bouts of cointelpro-style harassment when they first come under assault. The other sorts of mind assaults often accompany the cointelpro attacks or are gradually added. Then for many victims the cointelpro-style low-tech harassment subsides to a lower-level background while the other mind control assaults, voice-to-skull, etc., continue. I have long suspected that this is quite purposeful. The idea being to first massively traumatize the victims and induce PTSD and other torture sequelae in order to make them more susceptible to the mind control harassment. Hyper-alertness and rational paranoia can accompany such torture, for example. (“They really are out to get you.”) This might “prime” the victims to be more sensitive to the more subtle tortures and psyops that they otherwise would not notice as readily.
Conditioning introduces a bias in the lower-level sensory data processing. This is the hardwired, Pavlovian sort of layer: anticipating, responding. The higher levels have to be aware of this (consciously one might say) and take it into account. To train oneself take such biases into account and hopefully uncondition the responses — or at least understand that’s all they are. This holds in all situations, but is purposely aggravated for the purpose of torture and manipulation in the case of conditioning with psychic driving SCPs.
Sometimes Major Mengele comes up with some phrase that he is just sure will cause trauma — presumably by studying the transcripts of your torture sessions and applying his psych training. He then gives this information to the RTIs and the autopig programmers. The phrase is then repeated over and over, even if it doesn’t actually work. They are so hopeful about some phrases that they just keep repeating them, presumably because they think they should work. For example, after they finally destroyed my marriage and my wife decided she could not live with a mind control torture victim and activist any longer, they started repeating, “you’re impossible to live with,” over and over and over. The intention was obvious: Taunting that they ripped my wife away from me and hoping to tap into the trauma of that separation. It was so transparent to me what they were doing and what they intended that it did not work, but they kept repeating it. They’ll also chant over and over other phrases like “you can’t have no kids” to try to anger me based on their family-destroying abuse — literally, that is what they do.
The pigs try to induce new anxieties and exploit any existing anxieties you might have. They want to always stay cowered in their bunker but inflict the maximum psychological trauma on their victims. If they think you are worried about microwaves (or will become worried about it), a favorite autopig phrase to send at you is “we’re microwaving your whole family.” Literally, they sent that one over and over. To me it has almost become symbolic of how they will sink to any depths to induce trauma in their victims, by saying anything, as long as they can stay hidden in their bunker. How many victims were there who got traumatized and terrorized with that, when there was no microwave and only a vicious psyop? How many got hospitalized or driven to suicide? Not that I would entirely rule out the microwaves or any other of the new technologies being developed and tested, but typically they’ll lie about even that so you think it is something else. Even if you think they are testing such technologies on you, panic only makes things worse. It is horrible but you almost have to come to the point where you just shrug and observe, say, your heart beat irregularly a few beats. Are they going to murder me this time? They’ve already killed me over and over. The optimization theorem applies here, too.
Victims, Society, and Propaganda
The suicide inducement squads attack you with third-grade taunting machines, in secret. They subject you to torture inside your home. They sleep-deprive you. This goes on for years. Then if you write the truth in the appropriate language for the crimes against humanity being committed, they’ll criticize you for not writing some dry academic tome. If everything I say is the case — and it is — how should I respond, react, or write? The academic tome might let me play at some sort of externally bestowed “respectability” that I frankly don’t need to worry about, but it would also be placed on a shelf with other academic tomes to gather dust and no action. When I try to write a math paper or write computer code I get increased harassment directed at my brain. So what is the priority, the most important thing to work on? How should atrocity sound from someone under torture? When I also know that they torture many other people in the same way they torture me?
When they insinuate that a torture victim should be “diplomatic” they really mean you should shut up or at least become easier to ignore. How diplomatic is their goddamn third-grade taunting machine? I call them pig filthy Nazi pieces of human garbage because that is what they are. They torture people to death for entertainment, profit, and political control. They want to portray themselves as all clean and dainty, while they have paid their thugs to drag their victims through the pigsty. How “diplomatic” was Frederick Douglass when he excoriated the abominable US institution of slavery?
The pigs seem to think if they can pick some citizen, harass and torture them, and install various trauma-conditioned triggers, then they get to “keep” them as slaves. If the victim speaks out, the pigs spew trauma triggers and psychic driving triggers intended, presumably, to re-traumatize the victim into silence. A curious thing is how in the larger context the conspirators seem to use the same codewords and triggers almost as a symbolic language or a “currency” among themselves. There do seem to be different political factions even among the conspirators. Maybe they’re trying to reinforce their conspiracy, rallying sadists. Spreading triggers. Perhaps they are trying to intimidate any co-conspirators who might develop a conscience. Who knows.
The victim, seeing this, may be tempted to be dismayed at just how widespread the conspiracy is — though be sure to calibrate relative to a “normal” background as discussed in “Mental Firewalls.” The actual smear against the victim is really nothing, just as Mengele cannot truly discredit or impugn the morals of a victim he dissected and exploited. Often you need to stop and think: Anyone who knows what the trigger is at all, in the first place, almost surely knows that too. “But wait, if they knew that, they’d know that too” exposes many of the fallacies of the harassers. If they know about the codeword triggers and the conditioning then they also know it is a vicious human rights abuse. We basically have a conspiracy of secret slavers trying to hold on to the free citizens they have abducted and treated as their property. They have experimented on, harassed, manipulated, exploited, and profited from these human beings. The whole coded load of crap is their way of trying to maintain their secret atrocities, their crimes against humanity.
They’ll “rate” you as if your attempts to end ongoing torture and human rights atrocities are some sort of entertainment. They’ll torture you 24-hours-a-day for years and then, if this performance-degrading weapon works at all, they’ll play at being critics of your “performance” — treating the torture as if it didn’t exist, of course. This includes your private life in your home as some sort of “performance” for voyeur/spectators, not just your public work. They view every action you make in living your life and trying to succeed and accomplish something as if it were only part of their sordid “game” that they dragged you into. The want to keep their victims suppressed and keep them from positions where they will have a voice or any real influence — all because the victim got dragged into the torture in the first place and it is self-perpetuating. They don’t want their victims who resist to succeed at any endeavor — though they don’t mind exploiting them and stealing from them anything they can. If you speak that truth, even after they’ve harassed and tortured you for years, they’ll sneer that you’re just making excuses.
Where you would think any ordinary person would long ago have stopped beating a dead horse, propagandists just keep on going with the same tired triggers and insinuations. Perhaps they figure with their greater distribution power they can repeat something over and over to make it “more true” (when it was all BS to begin with). Perhaps they do not want to change the triggers because they have invested so much effort in trying to get their audience to pick them up from the repeated subtext. And invested hundreds of thousands of Cameron repetitions to condition the victims. But as above, those who know what it means also likely know how phony it is. So what is it really saying? Is it like some “Heil Hitler” declaration of allegiance to the Gestapo? Is that the true meaning?
The pigs exploit your desperation. You are under torture. You are rightfully desperate. The “bad Nazi” is harassing you. So the “good Nazi” has an opportunity. The “good Nazi” keeps promising to help you. As a torture victim, you tend to keep paying attention to the “good Nazi,” because there is no alternative. In the “real” world no one even knows (or admits to knowing) what is going on. You are under an intolerable torture. The “good Nazi” exploits this. The “good Nazi” can even turn “bad Nazi” from time to time and the victim will stay tuned in, because that seems to be the only hope. The “good Nazi” will promise help and anything else, as long as it is only between the lines or otherwise deniable. The “good Nazi” can appear on any FIP, for example as another voice on the nonconsensual voice-to-skull send. Or it might be a collaborator on a normally legitimate channel — pigs at a Mockingbird newspaper, for example. But if you buy the bait they dangle to a desperate human being under torture, they then start trying to manipulate you. Whoops! If only you hadn’t done that! Well, your freedom was all lined up if you hadn’t done that! Your basic human rights will be restored soon, if only you will…
Why would anyone listen to some pig voices in their head once they know they are externally induced? Except to track down those harassing pigs and kill them? It is more than obvious that they are not “friendlies,” that they are quite intentionally violating people’s minds without consent, and that they try to inflict harm. They may be Russians for all you know. It is far more likely they are other Americans — but that is hardly any better. People get furiously angry if you cut them off for a parking place, but somehow when strange voices invade their brain and either harass them or try to direct them they act like it is nothing… People tell their children not to talk to strangers, but then these pigs invade their little heads, too. And people either think this is somehow normal or are afraid to talk about it. (And Americans have the nerve to taunt the French as “surrender monkeys,” etc.)
It takes a nation of millions of idiots to produce the third-grade taunting machine. “Puritanical” prudes who practice sadistic, voyeuristic, serial rape in secret. And people dumb enough, duped enough, intimidated and cowardly enough, complicitous enough, or just plain evil enough to do nothing as the big superpower third-grade taunts its “free” adult citizens. The pathetic clown suit does not hide the vicious psychological manipulation and Chinese water torture of citizens in their homes and minds. Their rape violations are not really about sex, though they are obsessed with it; the violations are about power and trying to demean people and strip away their dignity. This is the “secret weapon” with which the big superpower tortures its own citizens.
These days, in thinking, I tend to have a habit of considering certain conclusions across different models. Are there model-dependent assumptions there, or does it hold in all models? If it passes a quick test for model independence, I say to myself, “put a star by that.” That assumes the “usual” set of models which I run things against. Recall that a model independent conclusion or decision does not depend on the assumptions of any one particular model, so is stronger in that sense than a model dependent conclusion. You can put more faith in it and act like you know it, without worrying that you’ll have to backtrack if you change models (even hypothetically, in conditional evaluations).
A slightly weaker condition than model-independent (or model-neutral) is “model-interpretable.” Model interpretable means that you have to interpret the situation slightly differently in the different models, but subject to that common-sense level of interpretation it holds in all models. An even weaker condition I call “metaphor-interpretable.” For some situations metaphor-interpretable is good enough; for others you want model-independent or model-neutral.
The thoughtcrime known as applied logic. There is no such thing as a thoughtcrime. Only some fascist who wants to dictate what and how people are allowed to think.
New named RTI/AP: “one trick pig” rapes your anticipation, bad parses, or pre-verbal and feeds that back at you — usually in a pure syntactic rearrangement. Don’t let “one trick pig” unnerve you. This pig (or algorithm) is similar to people who try to anticipate and finish your sentences for you, except it is on an illegitimate rape channel and has pure evil intentions. It typically doesn’t even understand what it rapes. It hopes to grab something from your own thinking and reasoning process that it can incorporate into a trigger which will get a reaction from you. Or else to reinforce your anticipation of existing triggers (trigger reinforcement). In this way they try to turn your own fears, anxieties, and anticipations against you, to create new triggers for their trigger file. They are feeding pieces of your own thoughts back at you.
I can just see the PowerPoint slide shows the Mengele-pigs give in secret Nazi meetings, describing their nonconsensual human experimentation on the domestic population. The “brave warfighters” hiding in bunkers are helping to keep us “free” by torturing helpless domestic citizens so they can study:
decisionmaking under stress
neural prosthesis and thought cloning
conditioning and verbal triggering
linguistic behavior modification
covert hypnotic suggestion
sleep suggestibility and dream modification
stimulus-response measurement and modeling
behavior modeling and prediction
fake paranormal deception operations
I’m sure they give a completely different PowerPoint presentation full of lies to the legislators and other officials who pretend to have oversight powers on such activities. If they even bother to tell them at all. They may just not mention it, or claim it is too secret for Congress (except perhaps for their lapdogs there). They similarly keep the truth from anyone in any other branch of government or position of oversight or funding with any sense of decency and responsibility. In reality, they are running a treasonous covert political control operation in the domestic United States that surpasses in reality even Orwell’s imagination.
[A pathetic spinner would try to distract from the main point here and create divide-and-conquer rifts by insinuating that I am smearing Microsoft by mentioning PowerPoint®. Or maybe I typed a bad word a few sections back in describing torture, and that is supposed to distract from the literal atrocities being described. They literally brought obscenity charges against papers which reported the My Lai massacre in Vietnam.]
Here’s a practical, low-tech countermeasure against audio harassment to try. It is working on the symptoms rather than the cause, but I have found it to be helpful. It has its own appeal for those with an ear for music:
get a CD changer with 5 (or more) slots
get some CDs from artists you trust with your mind
set the player up for repeat play, random or sequential, as per your tastes
keep it on as background, and tune in to it when you feel distracted by the other crap
change out the CDs when you feel like it
No commercials, no announcers, and so no worries about any harassment hidden there. No surprise songs. Just good music (presumably, by the fact that you selected it).
This will hopefully provide some level of relief, at least while you try to heal from the injuries of previous assaults — along with the ongoing assaults. The harassers don’t want victims to even be able to relax; they want to keep the sparrows flying until they die from exhaustion. One wants to be able to ignore the Stasi-like pigs’ harassment, and it is unfortunate that you cannot just enjoy the sounds of quiet in a “free” country, but don’t be masochistic. They try to shove people into second-class citizen status with constant harassment inside their homes. When subjected to this you need time to heal, and music can be healing as well as helping to mask the torture signal.
Further Empirical Observations of Their Methods
In the previous articles of the series I described some of my own observations of the sorts of technologies and techniques they have used on me. Here I present some further observations and analysis.
In further observing the audio harassment, I think the “cricket algorithm” illustrates a general method they use. Recall that in this harassment they speak some harassing phrase, syllable by syllable, with each syllable triggering off of a cricket chirp. “Your mas tur ba shun tech nik…,” for example, with each syllable following right after a cricket chirp. (To use one of their favorite pathetic third-grade taunts as an example. Yes, they really do that to adults in their homes in the US. Pure water torture.) This exact same thing occurs when listening to recorded cricket sounds, and changes with each playing. They’ve tried to synchronize it to fool me into thinking it is on the tape, but they cannot deal with random starting places on the tape and tend to start the phrase from the beginning regardless of where the tape is. The same algorithm also tends to be applied to the pinging sounds that certain trucks make when backing up, for example.
On further observation, that also seems to be how they synchronize the voice send with things like the refrigerator. It seems as if they first localize some roughly periodic part of the signal and filter out the rest. They then threshold that signal and trigger syllables off the peaks (rising edges, for example). Another technique, for basic “hum” signals, seems to involve first localizing the frequency band of the hum. They then take the RTI or autopig audio and limit it to that same frequency band. They then send this frequency-limited signal voice-to-skull. Sometimes the frequency-limiting is quite blatant. The same “voices” and phrases tend to occur on all the different frequency bands, as well as on the cricket algorithm.
I’m still not sure how they give the illusion of directionality to the signal. It may be some property of the ear or auditory cortex that they are exploiting. Another possibility I’ve considered is that they may be using a Fourier series sound representation but using one of the ambient frequencies as a fundamental harmonic component. I still do not rule out that some of the harassment may be actual modulation of the ambient. They could easily be using several techniques. I also suspect that sometimes they may modulate the power line only to increase the hum, rattle, and periodic components of things like appliance noise — which they then overlay with the voice-to-skull cricket algorithm or the frequency-limited hum algorithm. This would give them more bandwidth in which to hide their “subliminal” signals — or at least with which to misdirect those victims who consciously noticed as to the signal’s true source.
Another observation I have made is that during times of strong, obvious incoming there is often a noticeable scalp sensation. (It is not obviously there all the time when there is incoming, though.) Whether it is cause or effect or something else, I do not know. Maybe it is some communication transmission passing through the scalp in one direction or the other, or some other side effect. Maybe it results from the part of my motor cortex controlling the scalp being influenced. Maybe the scalp manipulation is even the primary effect, and over time has been trained into language recognition. Or maybe it is just some random effect which has become conditioned to the torture, like a certain tension that accompanies the recognition of torture. Etc. One way to test this would be to somehow completely anesthetize the scalp, deadening all muscle reactions, etc., and see if there is any lessening of the incoming. (This assumes they don’t have a secondary, backup channel on which to deliver voice, and assuming the scalp effect actually does have anything to do with it.) I’m curious if other victims have noticed a similar thing.
The old (obsolete) Model 100 Autopig, with its Third-Grade Taunting module. They still use that thing, though. Same scripts and all, just like they tortured me with all last summer. Like you booted up an old TRS80 from 1980 and ran the same old software. Same old lists of triggers and crap. Same old scripts. Fake ambient distractions that get set off to try to thought control you out of some line of thinking. Same old simple syntax-level transforms on the trigger list and the raped thought-data. Autopig phrases of 0 and 1 variables. It’s clear also that the machines cannot deal with metaphor or irony — they don’t really “understand,” they just respond like a state machine. There also seems to be something like a nearest-neighbor algorithm to find the “nearest-trigger” or “nearest SCP” to what you are thinking about. I can just view it from a distance now, since it is so pitiful and they’ve repeated everything 100,000 times. It would be laughable except that it is a serious, serious human rights violation.
Different voice models on text-to-voice, and a text file full of trigger strings. And a simple genetic algorithm syntax generator in the trigger search algorithm. The “fitness” function of this genetic algorithm is to maximize a trauma measure in the torture victim. Bits and pieces of the syntax and the limited vocabulary in the trigger and autopig data file are randomly recombined to form new sentences. They also mix in words and phrases taken from your own subvocalized thoughts and anticipations. Strings are plugged into the autopig phrases of one variable. Mostly the result is stupid crap that only annoys you because of the repetitive violation and the transparent intention. They hope that once in a while the random search will find a new, improved trigger for them to use to control and manipulate you. If so, they add it right to the file. Blackboard systems. Production systems.
If it is not a machine or machine-aided, how many full-time idiots does it take to harass a single citizen under severe harassment? Who is paying their salaries? All day and all night. The same “voices,” largely. Repeating the same dumb phrases over and over, with some simple syntactic transformations and limited vocabulary. A five-year-old has a larger vocabulary than all of them put together. That is not the way real people think in their minds, even idiots. If it is not a machine they are probably more conditioned with that crap aimed at me than I am. Likewise for any “audience” in an audience model forced to “hear” the same psychic driving and triggering crap.
One phenomenon I have noticed about the harassment is that it is very attention-driven. I do not know enough about the attention mechanisms of the brain to speculate on how this happens (and I don’t expect open science does either). But the harassment tends to occur when you pay attention to something, or when you anticipate the harassment from past experiences. It is sort of a “think of the devil” phenomenon. If I hear a particular sound and focus my attention on it then about a second later they’ll often start to voice-modulate it. But don’t be afraid to think anything, even if you suspect it will set off a third-grade taunting. If you are afraid to think anything because of harassment you are definitely not free. If you fear thinking one thing, they’ll leverage that into two things, then four things, etc.
The harassment is not all attention-driven. Sometimes it is attention-distracting. When thinking of one thing you notice them blatantly start the voice modulation on a noise source you were not paying attention to before — or even sending voice-to-skull in the plain. It is like they want to get your attention, to distract you, and to get you to start listening to their abusive manipulation audio. This often tends to happen when thinking political thoughts the pigs may consider “thoughtcrimes,” or when making a breakthrough in something like a math proof. And sometimes just when the jackals think they can annoy you or want to aversively condition (punish) some behavior or thought.
Optional Postscript: Mixed Model
As in several of the earlier articles I will end with an optional section on the mixed model, for people into that. The usual caveats apply, that I do not think this is the actual model but discuss it for the reasons given in previous articles.
Many people do believe this model is the true one, for whatever reasons. Some do not know, however, that the pure natural model is obsolete. The harassers try to exploit this as a psyop. I know that the harassment I undergo is technology. It is not that I am “just sensitive” and thus subject to “psychic harassment.” But I see certain propaganda trying to insinuate that this is all just “sensitive people stuff.”
Even if that were the case, it would still be torture. People are purposely inflicting torture on other people, in any model. The machine-like jackals purposely intend to cause trauma, and suicide if they can. It is a torture algorithm whether or not it is literally carried out by a machine. If it were “real psychics” doing it, someone would have to pay them to do it, because they do it all day long and all night, day after day. The same boring, repetitive, harassing phrases as if read off a list. It sure doesn’t sound like someone “thinking.” Often synchronized with the natural sounds in the victim’s environment, and remaining the same even when the victim drives hundreds of miles away. That does not sound like a natural psychic. I do not think my refrigerator is psychic. But even if it were, it would still be torture and those pigs would still need to be tracked down by whatever means.
But suppose the mixed model holds, and that there is some natural psychic component in addition to the technological techniques. In this case, then, there must also be a huge conspiracy of silence about such abilities if they are anything more than just very vague intuitions or occasional sensations. That is, if such abilities come anywhere near the blatant, constant things mind control victims report experiencing. If so, then this conspiracy of silence has been turned back against the conspirators with technology. If you can’t talk about telepathy — sending or receiving — then you can’t complain when someone points a voice-to-skull device at you and starts harassing you with it. If you do not know the technology exists, you may not even understand what is really being done to you in the first place. How convenient.
In such a society, anyone with the covert mind control technology can torture and harass with impunity, by hiding behind the psychic conspiracy and mimicking psychic phenomena. Curiously, this works whether psychic powers exist or not, in any population of people who believe they exist and believe they can’t talk about them. The psyop agents on the voice-to-skull would be quick to reinforce this belief if they thought a victim were susceptible to it. That, and the victim would tend to be scoffed at and dismissed, and would have any lawsuits tossed out of court. [Of course if the mixed model really does hold in any significant way then many concepts of mental illness need to be seriously reexamined. If we hypothetically assume certain facts then we also have to consider the logical consequences of those facts. If the mixed model does hold in a significant way then psychiatry has been abused as a cover for both cointelpro-style harassment and for maintaining a “psychic conspiracy.”]
Let’s don’t be naive: There are plenty of people in society who would just love to have this power and would use it with no qualms whatsoever. Look at how many vile people use date rape drugs, for example. Mind control experiments go way back, as do harassment operations and techniques. If they can plausibly deny they are doing it, they will tend to do it, however unethical, immoral, or criminal. If non-negligible natural psychic powers really exist, you can bet the CIA, NSA, DIA, former-KGB, and various other agencies have known about them for years. Such people also tend not to believe in magic. They have a lot of money available, and plenty of amoral, unethical scientists. First the secret science lab would figure out the physics and the biology of how it happens. These findings would then be sent to the secret engineering labs, where engineers and technicians would build machines based on the reverse-engineering of the biological effect.
Remember also that if such natural powers exist they constitute a potential information path of communication and influence. Some people, on hearing this, immediately think political control. They do not want any such channel to exist if they cannot control it. Thus they would want to dominate it, and suppress any psychics whose thoughts or ideas they did not like. I have called this “psychic cointelpro,” carried out by “psychic suppression units.” One could presumably suppress a psychic with just ordinary harassment, as well as with high-tech methods. Being able to control such a person might be even more prized. (And who might benefit, politically or otherwise, if psychics were beaming out terror and trauma instead of living ordinary lives?)
If there is a conspiracy to keep true psychic powers secret, then, it has long outlived whatever purpose it might once have had. It has in fact become a danger to the conspirators themselves — who have had it turned back against them. Those who might now maintain such a conspiracy maintain one that can be used to control them, as well as others in society. If a natural psychic responded to another natural psychic, for example, the technological jackals would observe and measure that. They would then start imitating (“spoofing”) the signal like a mockingbird to try to manipulate things. Do the “true psychics” really benefit from their powers, anyway? Or is it just some feeling of being in a secret club, a sort of supremacy for people without much else? The kind that makes for some of the most virulent racists? Something to consider in the hypothetical, if unlikely, case that the mixed model holds.
The pure natural model is definitely obsolete, if it ever held. The standard model exists now. It seems like everyone has a cell phone now, and networks like the internet span the globe. In the near future your daughter’s earrings will be always-on cellphones and her necklace will pick up her silent vocalizations like an artificial larynx. That is just one possible embodiment of consensual synthetic telepathy, with open, commercial technology. They are currently marketing soda machines that can send directed ultrasonic sound to passersby. Neurophones, implants, modulated microwaves, advanced sensors, the list of technologies goes on and on. The secret sector already has technology well beyond this, which can be applied nonconsensually.
Now that technology has started to move into the frontier of the human brain and mind it is vital that we as members of a supposedly civilized society maintain basic principles of consent and human rights. These are expressed in the Nuremberg Code, the Bill of Rights, the Universal Declaration of Human Rights, the Convention Against Torture, and so forth — as well as being tenets of basic ethics and morality.