- editing in process -
The torture program's presentation starts with its appearance then progressively proceeds through its complexity.
The terms "gang stalking," "organized group stalking," and their variants are misleading misnomers employed as the tools of semantic deception in the disinformation campaign to conceal the practice of these illegal activities of torture and cruel and inhuman treatment against citizens.
The "stalkers" are the principal means.
In addition, everyday objects left along the daily walking pathways with artifact casualness, deliberated repetitiveness, and opportune placement are equally effective stimuli.
Further, basic, token manifestations of cyber-stalking avoid any online interruption of the sensory overstimulation.
The multitude of agents and pawns represents the apparent aspect of the implementation of this complex torture program, in the victim's experience.
This lack of full appreciation supports the nonanalytic and superficial definition of "gang stalking" misnomer and its variants, imposed by the disinformation campaign.
One stalkers' function is that of sensory bullets.
For the maximal effectiveness of the visual bombardment, the modality takes into account that acuity is high only in the center of the visual field.
So, the proxies in their function of visual bullets preferably cross and temporarily occupy the center of the visual field of the victim by moving along opportune intersecting trajectories.
Such crossing and occupancy happen systematically in each visual field generated when the victim turns his heard to explore the surrounding or try to escape the impacting overstimulation.
The sensory bombardment provokes the consequential overload generating the induced interpretation and cogitation of the constant flow of stimuli.
Hence, the "stalkers" also have the important function of cognitive bullets.
Therefore, in the highly artificial habitat purposely prepared and orchestrated, the victim experiences a sensory-cognitive bombardment by living surrounded by the constant flow of stalkers forming like floating cages.
Under the pretense of casualness through duplicitous behavior, rarely betrayed but usually characterized by limited instructions, the stalkers or proxies perform their actions to accomplish a combination of pre-determined functions.
As the visual bullets, they invade the target's visual field to draw his attention on the visual information their are attempting to convey.
As the auditory bullets, they make loud noises, like slamming a door beyond the victim's back immediately after his passage, or small sounds to direct his attention to something else.
As the olfactive bullets, typically, they annoy a non-smoker target by getting him to inhale the passive smoke.
As the tactile bullets, they pester the victim by brushing him repeatedly in the same body part directly or by using an object, like a bag.
As the cognitive bullets, they always stimulate the interpretation and cogitation of the conveyed pieces of sensory information. Additionally, like incidental messengers, they throw a proper verbal communication to the victim at the right timing or carry a meaningful text written on their clothes.
These basic actions, their combinations, their variations, and their continual repetition implement the sensory-cognitive overload torture technique in the highly artificial habitat of the victim.
By integrating the sensory-cognitive bombardment with other psychological techniques, this environmental manipulation by proxies maximizes its psychological efficacy to assault the victim's mind.
"Psychological torture breaks down the human mind through a powerful assault on the victim’s basic conditions for mental survival.
Psychologists refer to these conditions as “homeostasis,” originally a term of physiology referring to the ability of an organism to adjust internally to maintain a stable equilibrium even in response to external changes [stressors].
Under normal circumstances, an individual will respond to disruptions in homeostasis through periods of readjustment.
However, the stress applied in torture, including psychological torture, is designed to elicit high levels of arousal without the appropriate action that allows arousal to readjust. [...]
Because torture techniques deny different needs of victims, they disrupt homeostasis in different ways."⁵
Second, on the other side of this spectrum, torturers target the complementary human need for moderation of stimuli, by placing victims in environments that overwhelm the senses [the perception, the cognition, the emotion, the attention]"⁶.
Under such ambient circumstances, the stimuli become too strong for the victim brain to accommodate and the stress is impossibile to reduce.
The victim cannot evade the stimuli bombardment, cannot habituate to such overload in the short-term, and cannot distract himself from such overstimulation.
The attack completely overbalances the homeostatic adaptation to stressors by the continual flow of stimuli, overpowering the individual defense maneuvers of stress reduction.
In fact, the general principle of this torture's program to attack the victim's mind is the overstimulation.
Although the introduction and description of the theory may require to treat the different elements separately, they interact and interconnect interdependently like in a precise mechanism.
The designed stimulation enforces its effects of psychological torture by the continual repetition of the stimuli, their intensification, and their multiplication.
The overstimulation conducts the assault to the major brain areas through different pathways to the victim's mind.
The potent psychological manipulation starts with the sensory overload, concerted as the continual repetition of sets of stimuli in the artificial environments.
The proxies or stalkers convey to the victim the same stimuli everyday: the same colors, the same sounds, [...], the same gestures, the same body language, [...], the same actions, the same street scenes, [...], the same objects, the same symbols, [...], the same kinds of clothings and vehicles, [...], and so on.
The incessant repetition of stimuli is the foundation of the psychological attack.
By enduring the repetitiveness of the sensory information, mostly the visual one, the victim develops the disturbing feelings of anxiety caused by a mysterious phenomenon in the habitat now perceived creepy and unsafe.
By exploiting the interrelation between perception and cognition, like the connecting bridge between the sensory information and the cognitive processes, the sensory assault generates the consequential cognitive overload.
In practice, the continuous overflow of repetitive stimuli imposes the intimidatory interpretation of an unfathomable phenomenon by an inefficient, inaccurate, and inconclusive cogitation in conditions of distress, anxiety, and lack of specific knowledge.
Inevitably, the disconcerted victim misinterprets his situation more than once and rests vulnerable to the implemented tactics of deception and self-deception.
The cognitive assault also depletes the executive functions, and undermines the emotional self-regulation.
By integrating the threat conditioning, the classic conditioning by pairing neutral stimuli to the fear, the sensory-cognitive overload intensifies its psychological influence through the systematic stimulation of this powerful emotion in the victim's mind.
So the colors, sounds, gestures, body language, actions, street scenes, objects, symbols, and every other stimulus of the sensory-cognitive bombardment become threats for the victim eliciting his fear as the conditioned reaction.
The threats to the personal safety and survival are multiple and separately associated to a different cluster of stimuli.
Collectively delivered in rapid sequences, like a constant motion of impacting waves, the stimuli are all paired with the fear through simultaneous or forward conditioning.
The bio-electromagnetic bombardment, the daily exposure to radiations by multiple sessions targeting different corporal parts, provides the associative learning experience that pairs otherwise neutral or emotionally meaningless stimuli to the conditioned reaction of fear.
The generic symbolism about the electromagnetic spectrum represents a rational assumption for the victim under uncertainty about a phenomenon hard to understand that includes thermal, painful, and pathogenic effects by the invisible and unknown radiations.
Such uncertainty about the unfathomable phenomenon, the factual anxiety and fear for the unkown health consequences of the irradiations, and the emotional bias about the concept of radiation concur to the effectiveness of the threat conditioning.
For reasons of the program's elusiveness and influence, the neutral stimuli are frequent and ordinary, like, for example, the car's flashing light.
The phenomenon of the stimulus generalization extends the results of the threat conditioning to every stimulus similar to that one initially conditioned, making the manipulation subtler and pervasive.
By the classic pictorial example provided by prof. Richards J. Heuer, in the transitional bi-directional sequence, if your starting percept and concept are either a woman body or a man face you interpret the most ambiguous images in the middle by your first impression inertially, barring subjective experimental interference.
Under threat conditioning, the effect magnifies by including a broader group of visual generalizations.
The manipulative visual stimulation takes advantage of such phenomenon by deliberately proposing isomorphic shapes or structures to the victim attention after the conditioning.
Additionally, for the overstimulation's maximization, each visual stimulus is preventively selected, as much as possible, to provoke multiple threatening interpretations (semiotic polysemy), if entirely understood or elaborated by a victim under a sensory-cognitive overload.
Alternatively, for the elusiveness' maximization, multiple distinct visual stimuli in sequence of stimulation or cluster adequately and concurrently induce one single threatening interpretation (semiotic monosemy) by the contextual learning of the threat conditioning.
For example, the following picture.
By the principle of the semiotic monosemy, distinct and adequate visual stimuli, in combinations with or without repetitions, form variable clusters or sequences identificating one single specific threat for the daily overstimulation of the victim.
Such exploitations of the stimuli elevates the elusiveness of the program's implementation to the maximal level, also considering the other psychological effects of the powerful manipulation.
Otherwise neutral information emotionally meaningless to which be indifferent has become affective information with intimidatory meaning and psychological torturing effects in the overstimulating surrounding.
The sistematic stimulation of fear intensifies the psychological attack explosively.
The amygdala responds to the uncontrollable overstimulation automatically before awareness, and rapidly by releasing the stress hormones.
The induced emotional phenomena propagate their influence through the interactions of the brain processes by involving effects on perception, cognition, and attention.
The fear alters the perception of the abnormal environment to an extreme extent.
The main alteration is the shift from global to local perceptual focus, that is to say from the perceptions of the wholes to the perceptions of details, the threatening stimuli overflowed in the highly artificial habitat.
By a common saying, the victim “can’t see the forest for the trees” or by more specific words he can't see the environment for the threats.
Further, an indirect effect of the fearful phenomena caused by the psychological manipulation is the exclusion of contextual stimuli either visual or conceptual from being processed by the victim's mind, as the result of the limited attentional resources prioritized by the selection of the most relevant information concerning the personal safety.
The fear completely narrows the attentional focus on the threatening stimuli, including words within messages.
On the street, the proxies or stalkers, in their secondary function of cognitive bullets, exploit such laser focus by speaking referential words to capture the attention of the passively listening victim.
Extrapolated by the daily electronic surveillance or the dossier on the victim, these words evocative of emotions, memories, and other pieces of personal information direct the attention and the cognitive effort to anxiously ponder any personal relevance in the matter in discussion.
The manipulation of the attention continues through the exploitation of the attentional bias, the tendency for people's perception to be affected by their recurring thoughts at the time.
Under the victim's condition, the psychological attack deeply influences the thinking process almost uninterruptedly by the continual flow of sensory, cognitive, and fearful stimuli opportunely designed.
Every exogenous relevant stimulus inserting in the stream of the artificial overstimulation, like the casual occurrences, will be elaborated exclusively or primarily within the dominant manipulative frame of the imposed experiencial references.
As described by the evolutionary psychology, our primitive ancestors were scanning continuously and advantageously the dangerous environment to detect possible threats to their survival.
This evolutionary mechanism, a by-product of the natural selection, is a valid target of psychological attack.
Mutually, the artificial abundance of environmental risks, amplified by the exploitation of the stimuli generalization, promotes the sustainment of this survival mechanism by generating a powerful feedback loop.
The technique of the central vision's occupancy, as already illustrated, warranties the process' ineluctability.
This manipulation of the victim's perception works like a polarizer filtering on only the perceptual representations of the environmental threats in the photography of the artificial habitat.
The manipulation of the attentional focus not deriving from the exploitation of the attentional bias continues the strategy of influencing both perception and cognition through theur interactions.
The fearful phenomena also influence the pre-attentive perceptual processes by the enhancement of contrast sensitivity, an effect on early visual processes to detect relevant aspects of the environment, the threats, by making them easier to see.
Under ordinary circumstances, the pop-up effect of the pre-attentive processing of visual information makes some elements of visual displays perceived suddenly and automatically, without the attention's mediation, in function of their distinctive properties, like color, shape, orientation, extravagance, and individually affective references of the beholder.
Under the extraordinary conditions of the psychological attack, the manipulation systematically takes advantage of the pop-up effect of visual information of both kinds.
For the universal cases, the involvement of road maintenance workers, street musicians, and agents of various street events has enough distinctiveness to assure the pop-up effect.
For the individual cases, the pop-up effect relies on the affective references derived from the personal dossier about the victim and his feedbacks from the field collected under the electronic surveillance.
So, if the victim usually turns his head to look at beautiful girls with spacious curly hair, the perpetrators will use that specific somatotype to select the next proxies to convey the intentional threat embodied in the concomitant pieces of visual information, like appearances, gestures, and predetermined actions.
The psychological manipulation is overarching in all the sectors, like overflowing water penetrating and occupying any available place in its continuous expansion in the surrounding space: not only the stimuli repetition and intensification, but also their multiplication.
The multiplicative effects of the hostile stimulation derive from the synergy of different factors: the generalization of the everyday stimuli used for the threat conditioning, the threatening semiotic polysemy, the manipulation of the attentional bias and the local perceptual focus, and the specificity of the cognitive overload.
First, the exploitation of the stimuli generalization relies on the choice of simple and very frequent stimuli, like basic objects, normal gestures, colors, and so on.
The advantage is double: not only the procedural elusiveness but also the multiplication of the potential threatening stimuli through all those perceived accidentally by the victim because of their normally high frequency.
For one example, if each time the victim sees a dot or a tiny disk he gets a harmful exposure to an electromagnetic field, then every point, circular shape, roundish object, real or perspective, regular or approximative, detected in the habitat, will provoke his conditioned reaction of fear.
In this example, every object, a generalized stimulus in the same intrinsic conditions of isolation like the first conditioned one, may trigger the fear as the effect of the threat conditioning based on a subjective response.
Secondly, the employment of the principle of the semiotic polysemy permits to convey multiple threatening interpretations per stimulating sign.
Further, the detection of threatening pieces of visual information, now affective information for the victim while still neutral one for the viewers, is made unavoidable by the effects of the manipulation of the attentional bias and the local perceptual focus.
On the cognitive level, the specificity of the psychological attack unfolds the stimuli multiplication by employing linguistic ambiguity and polysemy, lexical games, and by exploiting the confirmation bias.
Hence, the sensory overstimulation imposes to the victim's brain the overwhelming interpretation and cogitation of the continual flow of repetitive stimuli opportunely preselected to cause such consequent cognitive overload concurrently by quantity and quality.
Back to the previous instance of threat conditioning, the first visual stimulus brings the conceptual ambiguity of the dot or disk or point or circle or round.
By the successive phenomenon of the stimuli generalization, the ambiguity involves every similar stimulus evoking the conditioned response and belonging to the cluster redundantly proposed in the artificial habitat for the specific psychological manipulation.
Such cognitive multiplicity expands with the intrinsic characteristics of the stimulus.
In our example, from the color black of the dot or disk to the biscuit with chocolate, or from the red of the tomato to the half orange, and so on.
-under construction -
¹ From unaware, manipulated, tricked, blackmailed, submitted to authority, obeying, opportunistic, operative.
² The effects of psychological torture - Barkely (pdf)
³ Ibid. ²
⁵ Ibid. ²
⁶ Ibid. ²