PROTOCOL

V. 2
11.01.2018
- editing in process -

The protocol's presentation starts with its appearance then progressively proceeds through its complexity.
Gang stalking is the sophisticated environmental implementation of the sensory overload technique as the mean of psychological torture for an intended victim by efmploying proxies.


The terms "gang stalking," "organized group stalking," and their variants are misleading misnomers employed as the tools of semantic deception in the disinformation campaign to conceal the practice of these illegal activities of torture and cruel and inhuman treatment against citizens.

Sensory Overload Torture Technique is the artificially induced overstimulation of the physical senses in the target's daily situations through a multimodal stimuli bombardment in a highly artificial environment purposely prepared and orchestrated.

The "stalkers" are the principal means.

In addition, everyday objects left along the daily walking pathways with artifact casualness, deliberated repetitiveness, and opportune placement are equally effective stimuli.

Further, basic, token manifestations of cyber-stalking avoid any online interruption of the sensory overstimulation.


The multitude of agents and pawns represents the apparent aspect of the implementation of this complex torture protocol, in the victim's experience.

This lack of full appreciation supports the nonanalytic and superficial definition of "gang stalking" misnomer and its variants, imposed by the disinformation campaign.



Like an iceberg in the fog, the visible part, what is publicly and limitedly known by the disinformation campaign, does not permit to describe the whole structure below the sea's surface, what is cognizable by immersion in the theory.


One stalkers' function is that of sensory bullets.


In the sensory assault, they work like exploding projectiles hitting the target by involving four of the five traditional human senses: sight, hearing, smell and touch.


By generating the consequent interpretation and cogitation of the constant flow of stimuli, the sensory overstimulation provokes the consequent cognitive overload.

Hence, the "stalkers" also have the important function of cognitive bullets.




Therefore, in the highly artificial habitat purposely prepared and orchestrated, the victim experiences a sensory-cognitive bombardment by living surrounded by the constant flow of stalkers forming floating cages.


Under the pretense of casualness through duplicitous behavior, rarely betrayed but usually characterized by limited instructions, the stalkers or proxies perform their actions to accomplish a combination of pre-determined functions.


As the visual bullets, they invade the target's visual field to draw his attention on the visual information their are attempting to convey.

As the auditory bullets, they make loud noises, like slamming a door beyond the victim's back immediately after his passage, or small sounds to direct his attention to something else.

As the olfactive bullets, typically, they annoy a non-smoker target by getting him to inhale the passive smoke.

As the tactile bullets, they pester the victim by brushing him repeatedly in the same body part directly or by using an object, like a bag.

As the cognitive bullets, they always stimulate the interpretation and cogitation of the conveyed pieces of sensory information. Additionally, like incidental messengers, they throw a proper verbal communication to the victim at the right timing or carry a meaningful text written on their clothes.

These basic actions, their combinations, their variations, and their continual repetition implement the sensory-cognitive overload torture technique in the highly artificial habitat of the victim.

By integrating the sensory-cognitive bombardment with other psychological techniques, this environmental manipulation by proxies maximizes its psychological efficacy to assault the victim's mind.
To comprehend the complex design of the torture's protocol, beyond the informative limits istructed by the disinformation campaign, it needs to understand the psychological framework by the immersion into the applied theories.


"Psychological torture breaks down the human mind through a powerful assault on the victim’s basic conditions for mental survival.

Psychologists refer to these conditions as “homeostasis,” originally a term of physiology referring to the ability of an organism to adjust internally to maintain a stable equilibrium even in response to external changes [stressors].
Under normal circumstances, an individual will respond to disruptions in homeostasis through periods of readjustment.

However, the stress applied in torture, including psychological torture, is designed to elicit high levels of arousal without the appropriate action that allows arousal to readjust. [...]



Because torture techniques deny different needs of victims, they disrupt homeostasis in different ways."⁵



"First, humans require constantly changing stimuli. [...]

Second, on the other side of this spectrum, torturers target the complementary human need for moderation of stimuli, by placing victims in environments that overwhelm the senses [the perception, the cognition, the emotion, the attention]"⁶.

Under such ambient circumstances, the stimuli become too strong for the victim brain to accommodate and the stress is impossibile to reduce.
The victim cannot evade the stimuli bombardment, cannot habituate to such overload in the short-term, and cannot distract himself from such overstimulation.



The attack completely overbalances the homeostatic adaptation to stressors by the continual flow of stimuli, overpowering the individual defense maneuvers of stress reduction.



In fact, the general principle of this torture's protocol to attack the victim's mind is the overstimulation.



Although the introduction and description of the theory may require to treat the different elements separately, they interact and interconnect in a precise mechanism interdependently.


The designed stimulation enforces its effects of psychological torture by the continual repetition of the stimuli, their intensification, and their multiplication.




The overstimulation conducts the assault to the major brain areas through different pathways to the victim's mind.



The potent psychological manipulation starts with the sensory overload, concerted as the continual repetition of sets of stimuli in the artificial environments.

The proxies or stalkers convey to the victim the same stimuli everyday: the same colors, the same sounds, [...], the same gestures, the same body language, [...], the same actions, the same street scenes, [...], the same objects, the same symbols, [...], the same kinds of clothings and vehicles, [...], and so on.

The incessant repetition of stimuli is the foundation of the psychological attack.



By enduring the repetitiveness of the sensory information, mostly the visual one, the victim develops the disturbing feelings of anxiety caused by a mysterious phenomenon in the habitat now perceived creepy and unsafe.






By exploiting the interrelation between perception and cognition, like the connecting bridge between the sensory information and the cognitive processes, the sensory assault generates the consequential cognitive overload.

In practice, the continuous overflow of repetitive stimuli imposes the intimidatory interpretation of an unfathomable phenomenon by an inefficient, inaccurate, and inconclusive cogitation in conditions of distress, anxiety, and lack of specific knowledge.

Inevitably, the disconcerted victim misinterprets his situation more than once and rests vulnerable to the implemented tactics of deception and self-deception.

The cognitive assault also depletes the executive functions, and undermines the emotional self-regulation.




By integrating the threat conditioning, the classic conditioning by pairing neutral stimuli to the fear, the sensory-cognitive overload intensifies its psychological influence through the systematic stimulation of this powerful emotion in the victim's mind.


So the colors, sounds, gestures, body language, actions, street scenes, objects, symbols, and every other stimulus of the sensory-cognitive bombardment become threats for the victim eliciting his fear as the conditioned reaction.

The threats to the personal safety and survival are multiple and separately associated to a different cluster of stimuli.


Collectively delivered in sequences, like a constant motion of impacting waves, the stimuli are all paired with the fear through simultaneous or forward conditioning.



The bio-electromagnetic bombardment, the daily exposure to radiations by multiple sessions targeting different corporal parts, provides the associative learning experience that pairs otherwise neutral or emotionally meaningless stimuli to the conditioned reaction of fear.


The generic symbolism about the electromagnetic spectrum represents a rational assumption for the victim under uncertainty about a phenomenon hard to understand that includes thermal, painful, and pathogenic effects by the invisible and unknown radiations.

Such uncertainty about the unfathomable phenomenon, the factual anxiety and fear for the unkown health consequences of the irradiations, and the emotional bias about the concept of radiation concur to the effectiveness of the threat conditioning.

For reasons of the protocol's elusiveness and influence, the neutral stimuli are frequent and ordinary, like, for example, the car's flashing light.



The phenomenon of the stimulus generalization extends the results of the threat conditioning to every stimulus similar to that one initially conditioned, making the manipulation stealthier and pervasive.

The line of explanation is that "impressions resist change."


By the classic pictorial example provided by prof. Richards J. Heuer, in the transitional bi-directional sequence, if your starting percept and concept are either a woman body or a man face you interpret the most ambiguous images in the middle by your first impression inertially, barring subjective experimental interference.

Under threat conditioning, the effect magnifies by including a broader group of visual generalizations.




Such stimuli generalization under manipulation elevates the elusiveness of the protocol's implementation to the maximal level because of the overstimulating repetitiveness by similarities based on the subjective detection. 

Everyday stimuli have acquired the affective information of environmental threats for the manipulated victim while they remain neutral information for all the observers not conditioned, including bystanders and spectators of videos.

Otherwise neutral information emotionally meaningless to which be indifferent has become affective information with intimidatory meaning and psychological torturing effects in the overstimulating surrounding.

The"stalkers", dynamically as carriers, and the disseminated objects, statically as environmental signs, embody the sensory-cognitive and affective information fueling the psychological manipulation.



The sistematic stimulation of fear intensifies the psychological attack explosively.



The amygdala responds to the uncontrollable overstimulation automatically before awareness, and rapidly by releasing the stress hormones.

The elicited fear deflagrates untempered by the ineffective cognition sabotaged in synergy by the cognitive attack that causes the mistaken and inconclusive appraisal of the unfathomable situation, the depletion of the limited executive resource by the overwhelming stimulation, and the resultant undermining of the emotional modulation.


The induced emotional phenomena propagate their influence through the interactions of the brain processes by involving effects on perception, cognition, and attention.



The fear alters the perception of the abnormal environment to an extreme extent.

The fearful phenomena involve the shift from global to local perceptual focus, that is to say from the perceptions of the wholes to the perceptions of details, the threatening stimuli overflowed in the highly artificial habitat.

By a common saying, the victim “can’t see the forest for the trees” or by more specific words he can't see the environment for the threats.

The fearful phenomena influence the pre-attentive perceptual processes by the enhancement of contrast sensitivity, an effect on early visual processes to detect relevant aspects of the environment, the threats, by making them easier to see.

Further, the contextual stimuli either visual or conceptual are excluded from being processed by the victim's mind.

The fear draws the attention to the threatening stimuli, including words.

The manipulation is overarching in all the principal brain processes: perception, cognition, emotion, and attention are all affected.


Under Construction







The manipulation of the attentional focus relies on two strategies with multiplicative or incremental effects.

Such overpowering hyperarousal has a devastating impact with dysfunctional effects on the individual psychological integrity.


The conditioned everyday stimuli properly flooded in the artificial habitat signals threats to the personal safety of the victim, 

but it gives no information as to its form or location, so enhanced contrast sensitivity aids in detecting the threat



The sensory assault targets the disruption of the neuropsychological defense mechanisms of homeostasis by eliciting "high levels of arousal without the appropriate action that allows arousal to readjust"².

Convergently, the cognitive component of the assault targets the tempering ability of the emotional self-regulation by influencing the cognitive appraisal and depleting the executive resources of the prefrontal cortex, undermining the ordinary modulation of emotional arousal.

Interrelatedly, the emotional manipulation, and the manipulation of the attentional focus make the neuropsychological attack's effects the most intense possible.

Therefore, the impact is unbearable neurobiologically to the point to potentially bring a victim to the suicidal ideation.



In fact, initially, the victim is entirely vulnerable to deception on his situational judgment.
Moreover, the immense power's display makes believable any contextual itfabrication proposed by the perpetrators, like a mock tactic to soar the induced stress.

The control of the stimuli's interpretation and cogitation in the victim occurs by teaching him a set of communication rules.

The communication techniques in the blog author's experience:
https://notondrangheta.blogspot.com/2017/01/ndrangheta-secret-communication.html

The secret communication rules defend the protocol elusiveness. For the educational lesson, a temporary hacking of a habitual web page is enough.

The cognitive assault respects the general attack's principle of the overstimulation in synergy with the sensory assault.

The imposition of a secret code forces the victim to deplete the limited processing resources to transcode and interpret the possible portion of the messages always flowing beyond the receiving capacity, undermining his emotions self-regulation.

Not only the continuous bombing of cognitions and their linguistic transcoding by the learned rules, but also the transmission of messages transcoded by employing lexical and transformational ambiguity.



The ambiguity's employment other than having a multiplier and overloading effect exerts another significant manipulative influence.

Flooded by stimuli the target unselectively resolves such messages within the framework of his personal experience by recurring to confirmation biases restricted to the situation of the personal danger in a natural projection of his feared and worried scenarios.

This manipulative deployment of the ambiguity represents a trademark of the psychopathic mind that notoriously is hardwired to talented verbal intelligence.

Although the protocol presentation is still partial, the methodological efficacy of this introduced set of procedures is universal.



The analogy in the above picture is introductory to the comprehension of the complexity and subtleness of the procedures deployed by the intelligence agents to keep the operational secrecy.

In that case, it would be very difficult or impossible for the victims trying to document the crime: they would only have their dirty laundry and dirty papers by the similar stains and photos of murals as the inadmissible or inconclusive evidence.

In the case of the linguistic ambiguity, there are even not material evidence.

So, by opportunely using everyday objects instead of inkblots, the serial killer in that example stealthily can persecute a victim, that is defenseless because if he reports the crime's author to the law enforcement authority without admissible evidence is even vulnerable to take the shift of the blame.





The torture's technique definable variously as sensory-cognitive overload, sensory-cognitive bombardment, and sensory-cognitive assault is specifically designed to exploit the repetitiveness and the intensity of the stimuli to disrupt the physiological defense mechanisms.













The vast information asymmetry characterizes and limits the first victim's understandings of an unknown complex phenomenon designed to be elusive, deceptive, and manipulative.

The informative void is unhelpful to the ability to stay calm and rational under intense pressure and offers space to irrational judgments undermining the fear's extinction under threat conditioning.


Initially, the information asymmetry is irreducible. Under heavy emotional stress and cognitive manipulation, a victim formulates wrong and inaccurate judgments about a complicated phenomenon hard to fathom and makes suboptimal decisions inevitably.

Progressively by time, study, analysis, and awareness, a reduction of the information asymmetry may happen even mainly, but never entirely.

The information asymmetry is one of the competitive disadvantages constricting the defensive possibilities of the target, but not the most important of all, that remains the immense disparity of powers.

On the other hand, the knowledge about the victim is complete and comprehensive of the historical information for the perpetrators and the instigator(s) and all the actual pieces of information useful to the plan's execution, like the personal habits.
The dossier includes the profile of every eventual phobia, fear, worry, bother, need that are systematically exploited with malevolence to gain psycho-emotional power over the target.

Anyway, in the long-term, the repeated experience of such weaknesses and vulnerabilities may become an opportunity to maturate a post-traumatic growth (PTG) as undergoing an irregular exposure therapy, rather than exacerbate in a post-traumatic stress disorder (PTSD).






In the threat conditioning applied within this torture protocol, the deliberate induction of pains and diseases through electromagnetic aggressions constitutes the trigger of the neurobiologically potent stimulus of the fear associated with the neutral stimuli.



By the bio-electromagnetic effects of energy radiating weaponized technologies targeting body parts and organs locally, the victim is conditioned to fear everyday objects, symbols, and other visual information manipulatively conveyed through the sensory-cognitive assault.

The electronic aggression inflicting bio-electromagnetic effects constitutes the physical torture complementary to the neuropsychological one within the protocol.

More about the bioelectromagnetism:
 https://modern-torture.blogspot.com/p/bioelectromagnetim.html



Another implementation of the sensory-cognitive bioelectromagnetic bombardment.





The conditioning sequence's execution may include one or two "stalkers" touching a victim's leg more or less gently through their body or some of their object inside the same time frame of the visual bombardment in conformity with the multisensory principle of the attack.

After the period of the forward learning, the overlap with the nociceptive attack completes the process of threat conditioning by associating a caused pain or an inducted ill, both concerning the target's ability of ambulating, to the stimuli of the selected sequence.


The procedure is designed to be hard to fathom to cover the illegal activity.





Looking for admissible evidence you may find or not all those meetings wholly or partially registered by different CCTVs eliciting a neutral perception.



The offensive's plan follows the multisensory attack's strategy by also involving nontraditional human senses.
In particular, the most frequently targeted are thermoception (temperatures difference), nociception (pain), nerves stimulations, like for the urinary bladder and the penis, the rectum, the gag reflex, cardioception (heart's activity), and equilibrioception (sense of balance).





Anyway, among the traditional and nontraditional senses, the vision plays the major role to perpetrate this elaborate torture.



The protocol is designed to apply knowledge and technologies to cause the maximal detriment to the victim​.
Accordingly, the modality of the visual bombardment takes into account the characteristic that acuity is high only in the center of the visual field.




As the visual bullets, the "stalkers" preferably cross and temporarily occupy the center of the visual field to optimize their effectiveness by moving along opportune trajectories.

Such crossing and occupancy happen not only in one static central visual field, as shown in the picture, but dynamically in every contiguous one generated by usually turning the head to explore the surrounding.

The required direction and synchrony of the timed actions are orchestrated in the highly artificial environment by producing a common sound commanding multiple "stalkers" at once or by an individual activation through direct visual contact with the target or with his image reflected on a shopping window or by the receipt of phone messages.

Then, such street theater acts play the repetitions of stimuli in a fully immersive experience in the daily life of the victim, systematically invading his attention.







The bioelectromagnetic bombardment stimulates the nontraditional human senses of thermoception and nociception.




Without any technological localizer of the radiations emitters, the victim experiences sudden thermal and slightly painful sensations from unknown sources without knowing how to defend himself properly from an unseen danger.

Without any personal scientific and technical knowledge about electromagnetic irradiating devices and their weaponization, the victim of the bioelectromagnetic bombardment is initially clueless to correctly appraise the situation and particularly susceptible to the emotional manipulation.


In the daytime, the victim is a mobile and wakeful target, that can interrupt any irradiating session at the first thermal sensations, until the next electromagnetic attack.

The house provide no protection, like living inside a rifle range as the target or like staying inside a gigantic microwaves oven as the food.


Instead, at night, when he sleeps in his bedroom, his stationarity, his altered consciousness, and his limited reactiveness to stimuli make him more vulnerable to such aggressions.





The overall manipulation influences the essential brain processing of sensation, perception, cognition, emotion, attention, and their dynamic interrelationships through an overarching approach.

The stimulation is repeated, intensified, incremented, and multiplied, resulting in the impactful sensory-cognitive overload.




The overstimulation expands its overarching psychological influence through the interactions of the involved brain processes.


                                     




The exploitation of the attentional bias triggers a survival mechanism.

As described by the evolutionary psychology, our primitive ancestors were scanning continuously and advantageously​ the dangerous environment to find possible threats to their survival.

In the ordinary experience of the world population's majority, when one explores wood outside the populated areas, he does not expect to meet any predators; perhaps, he can scan the territory to find some mushroom, if part of the local flora, drawing his attention to avoid the poisonous ones.

Differently, if one would explore the wild jungle, as conditioned by the wildlife documentaries or better as warned by his autochthonous experience, he scanned every angle of his pathway trying to spot and prevent any potential danger.



This evolutionary mechanism, a by-product of the natural selection, can be a valid target for a hostile manipulation.

Under the protocol's application, in particular, through the classic conditioning, otherwise neutral information has become threatening information triggering this survival mechanism of the alert on possible environmental dangers.



A few still images do not make a movie and cannot represent the overloading experience of such psychological torture during all the time.


The manipulated activation of this survival mechanism induces the victim to actively and continually explore, scan, interpret and assess the conditioned stimuli purposely flooded in the artificial habitat as the imminent threats.
Mutually, the artificially abundant finding of environmental risks promotes the activation of this survival mechanism by generating a powerful feedback loop.
The technique of the central vision's occupancy, as already illustrated, warranties the process' ineluctability.

This manipulation effect works like a cognitive polarizer filtering on only the perceptual representations of the environmental threats in the photography of potential environmental dangers.


After the threat conditioning, the perception of an everyday stimulus, like the color yellow, is altered to the point to represent a potential danger.
Under the general conditions of the protocol's application, the victim actively scans, scrutinizes, and interprets every yellow-colored stimulus as a threat.
In the alert's status, the contrast sensitivity is augmented favoring the discernment of the threatening visual information.


The effects are so influencing that after the initial threat conditioning, they extend themselves to the perceptual representations of the objects similar to the triggering ones and their conceptions.






The manipulation of the attentional focus not deriving from the exploitation of the attentional bias continues the strategy of influencing both perception and cognition.

The tactics leverage the pop-up effect of the preattentive processing of visual information: some elements of visual displays pop out to the human attention automatically in function of their distinctive properties, like color, shape, orientation, and subjective preferences of the beholder.




Within the strategy of the projective camouflage, following the procedural elusiveness, the manipulators employ the victim's personal preferences for the pop-out effect of visual information systematically.

To give a practical example, that means that, if the victim turns his head to look at beautiful girls with spacious curly hair every time, the perpetrators will use that kind of somatotype to convey the intentional manipulation. For one example, the girl wears clothes or accessories carrying the pregnant visual information.



As always, the manipulation is overarching in all the sectors, like overflowing water penetrating and occupying any available place in its continuous expansion in the surrounding space: not only the visual information but also the cognitive one.


On the street, the "stalkers" in their function of cognitive bullets target the attentional focus of the passively listening victim by speaking words hooking the attention for subjective reasons.

These words are evocative of emotions, memories, and daily pieces of information.
Extrapolated by the electronic surveillance or the personal victim's profile, they can direct the attention and the cognitive effort to ponder the matter in discussion to scrutinize the immediate personal relevance anxiously.

Additionally, within the classic conditioning practice, ambient sounds like a stalker's simulated cough are utilized to grab the focus on the manipulative dialogues.

Furthermore, as typically within the overstimulating strategy, neutral words acquire intimidating valence by their recurrent repetition inducing the transcoding cogitation through the communication code.

Such cognitive conditioned stimuli spoken with the same tonality, as an auditory repetition, are terms of frequent use in respect of the protocol's elusiveness.







In the reality of the sensory-cognitive bioelectromagnetic bombardment, the victim's obstacles to get justice are insuperable because in addition to all the problems the extraordinary power of the instigator warrants the impunity:

http://modern-torture.blogspot.com/2017/07/the-model-of-impunity-for-this-torture.html







The complete manipulative process is robust, optimized, self-sustained and its efficacy is total on the short-term.

The execution presents only one modest, yet potentially inexorable, intrinsic weakness: the narcissistic needs of the instigator(s).



The sensory-cognitive overflow of stimuli, multiplied by the communicative ambiguity and intensified by the threat conditioning and the synergistic effects, influences perception, cognition, emotion, and attention, in an outer-directed and self-fueled overpowering manipulative system.


The disinformation campaign keeps unknown this program:

https://modern-torture.blogspot.com/p/disinformation.html




                                     



__________________________________________


¹ From unaware, manipulated, tricked, blackmailed, submitted to authority, obeying, opportunistic, operative.

² The effects of psychological torture - Barkely (pdf)

³ Ibid. ²

⁴ Ibid. ²

⁵ Ibid. ²

⁶ Ibid. ²