V. 2
- editing in process -

This blog's section progressively explores the environmental psychological torture starting with its propagandized falsification.

Like an iceberg in the fog, the visible part, what is publicly and limitedly known by the disinformation campaign, does not permit to understand the whole structure below the sea's surface, what is cognizable by immersion in the theory.

As thet introductory definition, the gang stalking phenomenon is the sophisticated environmental implementation of the sensory overload in synergy with other influencing techniques, as the means of psychological torture for an intended victim by employing proxies.
The term "gang stalking" and its variants are misleading misnomers employed as the tools of semantic deception in the disinformation campaign to conceal the practice of these illegal activities of torture and cruel and inhuman treatment against citizens.

In fact, the term "stalker" infers to a deceitful minimization of the phenomenon.
Instead, the correct denomination of proxies implies the execution of specific and necessary functions.

In truth, the environmental implementation of the sensory overload induces the overstimulation of the physical senses of the victim, in his daily situations, through a multimodal stimuli bombardment in a highly artificial habitat purposely prepared and orchestrated by controlling the continual flow of proxies.
Also, the use of everyday objects left along the daily walking pathways with suitable placement and deliberated repetitiveness is an equally effective stimulation's mean.

Further, token manifestations of cyber-stalking avoid any online interruption of the sensory overstimulation.

The primary function of the proxies is that of sensory stimuli.
In the sensory assault, they involve four of the five traditional human senses: sight, hearing, smell, and touch.

Therefore, in the highly artificial habitat, the victim experiences a sensory bombardment caused by the constant flow of stalkers always moving around him like a floating box.

The transition between floating boxes and the synchrony of the proxies' actions happen by conventional activations through a common environmental noise or a mobile communication or a visual contact or other practical inputs.
Sometimes, that works like the baton pass in a relay race.

In particular, for the optimal visual bombardment, the modality of the movements and actions of the proxies take into account that visual acuity is high only in the center of the human visual field.
So, for the optimal visual stimulation, the proxies preferably cross and temporarily occupy the center of the visual field of the victim by moving along the intersecting trajectories.

With these techniques, the encirclement of the flowing proxies always stimulates the victim during his daily movements even when he turns his head to explore the surrounding or try to avoid the impacting overstimulation.

The same techniques of the floating box and the crossing of the central visual field are applied when the victim moves by vehicle.

Inevitably, the sensory bombardment provokes the victim's effortful attempts to appraise the unfathomable situation.

In fact, the constant flow of sensory stimuli causes their continual cogitation and interpretation generating the consequential cognitive overload.

In the execution of the sensory-cognitive overload, as the stimuli directed towards a target, the proxies work like sensory-cognitive bullets hitting vision, audition, olfaction, taction, and cognition of the victim.

As the visual bullets, they invade the center of the visual field to draw his attention to the visual information they are attempting to convey.

As the auditory bullets, they make loud noises, like slamming a door beyond the victim's back immediately after his passage, or other sounds to direct his attention to some other stimulus.

As the olfactive bullets, typically, they annoy a non-smoker target by getting him to inhale the passive smoke.

As the tactile bullets, they harass the victim by brushing him repeatedly in the same body part directly or by using an object, like a bag.

As the cognitive bullets, they always stimulate the interpretation and cogitation of the conveyed pieces of sensory information.
Directly, like incidental messengers, they throw a proper verbal communication to the victim at the right timing or carry a meaningful text written on their clothes.

These necessary actions, their combinations, their variations, and their continual repetition implement the sensory-cognitive overload torture technique making highly artificial the victim's habitat.

To comprehend the effectiveness of the sensory-cognitive overload, as torture technique, it needs to understand the psychological principles applied.

"Psychological torture breaks down the human mind through a powerful assault on the victim’s basic conditions for mental survival.

Psychologists refer to these conditions as “homeostasis,” originally a term of physiology referring to the ability of an organism to adjust internally to maintain a stable equilibrium even in response to external changes [stressors].
Under normal circumstances, an individual will respond to disruptions in homeostasis through periods of readjustment.

However, the stress applied in torture, including psychological torture, is designed to elicit high levels of arousal without the appropriate action that allows arousal to readjust. [...]

Because torture techniques deny different needs of victims, they disrupt homeostasis in different ways."⁵

"First, humans require constantly changing stimuli. [...]

Second, on the other side of this spectrum, torturers target the complementary human need for moderation of stimuli, by placing victims in environments that overwhelm the senses [and perception, emotion, attention, and cognition by the conséquent interrelations]"⁶.

Under such ambient circumstances, the stimuli become too strong for the victim brain to accommodate and the stress is impossibile to reduce.

The victim cannot evade the stimuli bombardment, cannot habituate to such overload in the short-term, and cannot distract himself from such overstimulation.

The attack completely overbalances the homeostatic adaptation to stressors by the continual flow of stimuli, overpowering the individual defense maneuvers of stress reduction.

The impact of such overstimulation entirely unbalances the victim''s psychology.

Distressed, intimidated, puzzled, and deceived, the victim naturally shows unusual behaviors.

The aggressors need to shift the blame on the victim and may exploit his unusual behaviors for their slandering tactics.

Isolated from his social network and controlled in all the interpersonal interactions, the victim must also resolve the cognitive dissonance of his situation systematically invalidated by the proxies.

The resolution variably occurs by modifying the attitude and behaviors as if he was not living under continual psychological torture and aggression or by defending his values and beliefs by informing the proxies about the situation although hard to understand and explain.

The third way would be changing or degrading his value and belief system under the extreme conditions.

Back to the psychological torture, the general principle of the attack is the overstimulation.

The overstimulation's components are the continual repetition of the stimuli, their intensification, and multiplication.

The overstimulation conducts the assault to the major brain areas.

Although the introduction and description of the theory may require to treat the different elements separately, they interact and interconnect interdependently like in a precise mechanism.

The potent psychological manipulation starts with the sensory overload, concerted as the continual repetition of sets of stimuli in the artificial environment.

The proxies conveys to the victim the same stimuli everyday: the same colors, the same sounds, [...], the same gestures, the same body language, [...], the same actions, the same street scenes, [...], the same objects, the same symbols, [...], the same kinds of clothings and vehicles, [...], and so on.

The incessant repetition of stimuli is the foundation of the psychological attack.

By enduring the repetitiveness of the sensory information, mostly the visual one, the victim develops the disturbing feelings of anxiety caused by a mysterious phenomenon in the habitat now perceived creepy and unsafe.

By exploiting the interrelation between perception and cognition, like the connecting bridge between the sensory information and the cognitive processes, the sensory assault generates the consequential cognitive overload.

In practice, the continuous overflow of repetitive stimuli imposes the intimidatory interpretation of an unfathomable phenomenon by an inefficient, inaccurate, and inconclusive cogitation in conditions of distress, anxiety, fear, and lack of specific knowledge.

Inevitably, the disconcerted victim misinterprets his situation more than once and rests vulnerable to the implemented tactics of deception and induced self-deception.

Besides, the cognitive assault depletes the executive functions, and undermines the emotional self-regulation.

By integrating the threat conditioning, the classic conditioning by pairing neutral stimuli to the fear, the sensory-cognitive overload intensifies its psychological influence through the systematic stimulation of this powerful emotion in the victim's mind.

So the colors, sounds, gestures, body language, actions, street scenes, objects, symbols, and every other everyday stimulus of the sensory-cognitive bombardment become threats for the victim eliciting his fear as the conditioned reaction.

The threats to the personal safety and survival are multiple and separately associated to a different cluster or sequence of congruent stimuli.

Collectively delivered in rapid successions, like a constant motion of impacting waves, the stimuli are all paired with the fear through simultaneous or forward conditioning.

Individually, the isolated repetitions of stimuli reinforce the conditioning, like the sea's motion between waves in deep-water.

The bio-electromagnetic bombardment, the daily exposure to radiations at a low intensity by multiple sessions targeting different corporal parts, provides the associative learning experience that pairs otherwise neutral or emotionally meaningless stimuli to the conditioned reaction of fear.

The generic symbolism about the electromagnetic spectrum represents a rational assumption for the victim and reflects the uncertainty about a phenomenon hard to discern.

The aggression by invisible electromagnetic beams, the experience of their effects on the personal health and physical integrity, the lack of understanding, the factual anxiety and fear, and the emotional bias on the radiations, all concur to the initial effectiveness of the threat conditioning.

For reasons of the elusiveness and influence, the selected neutral stimuli are frequent and ordinary, like, for example, the car's flashing light.

The phenomenon of the stimulus generalization extends the results of the threat conditioning to every stimulus similar to that one initially conditioned, making the manipulation subtler and pervasive.

The line of explanation is that "impressions resist change."

By the classic pictorial example provided by prof. Richards J. Heuer, in the transitional bi-directional sequence, if your starting percept and concept are either a woman body or a man face, you interpret the most ambiguous images in the middle by your first impression inertially, barring subjective experimental interference.

Under threat conditioning, the effect magnifies by including a broader group of visual generalizations.

The manipulative visual stimulation takes advantage of such phenomenon by deliberately proposing isomorphic shapes or structures to the victim attention after the conditioning.

Therefore, the frequent generalization of everyday stimuli, the continuous sensory overload make the overstimulation pervasive in the artificial habitat.

Then, the threat conditioning of such flow of stimuli extend the conditioned reaction of fear to the predominant environmental cues.

Additionally, for the overstimulation's maximization, each visual stimulus is preventively selected, as much as possible, to provoke multiple threatening interpretations (semiotic polysemy), if entirely understood or elaborated by a victim under a sensory-cognitive overload.

Alternatively, for the elusiveness' maximization, multiple and distinct visual stimuli in a sequence or cluster adequately and convergently induce one unique threatening interpretation (semiotic monosemy).

For example, the following picture.

By the principle of the semiotic monosemy, distinct and adequate visual stimuli may form highly variable clusters or sequences and convergently induce one unique threatening interpretation for the victim's intimidation.

Such exploitations of the stimuli elevates the elusiveness of the program's implementation to the maximal level, also considering the other psychological effects of the powerful manipulation.

Everyday stimuli have acquired the affective information of environmental threats for the manipulated victim while they remain neutral information for all the observers not conditioned by the same experience, like bystanders and spectators of videos.

Otherwise neutral information emotionally meaningless to which be indifferent has become affective information with intimidatory meaning and psychological torturing effects in the overstimulating surrounding.

The proxies dynamically as carriers, and the disseminated objects, statically as environmental signs, embody the sensory-cognitive and affective information fueling the psychological manipulation.

The sistematic stimulation of fear intensifies the psychological attack explosively.

The amygdala responds to the uncontrollable overstimulation automatically before awareness, and rapidly by releasing the stress hormones.

The elicited fear deflagrates untempered by the ineffective cognition sabotaged in synergy by the cognitive attack that causes the mistaken and inconclusive appraisal of the unfathomable situation, the depletion of the limited executive resource by the overwhelming stimulation, and the resultant undermining of the emotional modulation.

The induced emotional phenomena propagate their influence through the interactions of the brain processes by involving effects on perception, cognition, and attention.

The fear alters the perception of the artificial environment to an extreme extent.

The main alteration is the shift from global to local perceptual focus, that is to say from the perceptions of the wholes to those of details, the threatening stimuli overflowed in the highly artificial habitat.

By a common saying, the victim “can’t see the forest for the trees” or by more specific words he can't see the environment for the threats.

Further, an indirect effect of the fearful phenomena caused by the psychological manipulation is the exclusion of contextual stimuli either visual or conceptual from being processed by the victim's mind, as the result of the limited attentional resources prioritized by the selection of the most relevant information concerning the personal safety.

The fear completely narrows the attentional focus on the threatening stimuli, including words within messages.

On the street, the proxies, in their secondary function of cognitive bullets, exploit such laser focus by speaking referential words to capture the attention of the passively listening victim.

Extrapolated by the daily electronic surveillance or the dossier on the victim, these words evocative of emotions, memories, and other pieces of biographic information direct the attention and the cognitive effort to ponder anxiously any personal relevance in the matter in discussion.

The manipulation of the attention continues through the exploitation of the attentional bias, the tendency for people's perception to be affected by their recurring thoughts at the time.

Under the victim's condition, the psychological attack profoundly influences the thinking process almost uninterruptedly by the continual flow of sensory, cognitive, and fearful stimuli opportunely designed.

For the exploitation of the attentional bias, every casual and relevant stimulus inserting itself in the stream of the artificial overstimulation will be elaborated exclusively or primarily within the dominant manipulative frame of the imposed experiential references.

The exploitation of the attentional bias triggers a survival mechanism.

As described by the evolutionary psychology, our primitive ancestors were scanning continuously and advantageously​ the dangerous environment to detect possible threats to their survival.

This evolutionary mechanism, a by-product of the natural selection, is a valid target of psychological attack.

The manipulated activation of this survival mechanism induces the victim to actively and continually explore, scan, detect, interpret and assess the conditioned stimuli purposely flooded in the artificial habitat as the imminent threats to personal safety.

Mutually, the artificial abundance of environmental risks, amplified by the exploitation of the stimuli generalization, promotes the sustainment of this survival mechanism by generating a powerful feedback loop.

The technique of the central vision's occupancy, as already illustrated, warranties the process' ineluctability.

This manipulation of the victim's perception works like a polarizer filtering on only the perceptual representations of the environmental threats in the photography of the artificial habitat.

The manipulation of the attentional focus not deriving from the exploitation of the attentional bias continues the strategy of influencing both perception and cognition through their interactions.

The fearful phenomena also influence the pre-attentive perceptual processes by the enhancement of contrast sensitivity, an effect on early visual processes to detect relevant aspects of the environment, the threats, by making them easier to see.

Under ordinary circumstances, the pop-up effect of the pre-attentive processing of visual information makes some elements of visual displays perceived suddenly and automatically, without the attention's mediation, in function of their distinctive properties, like color, shape, orientation, extravagance, and individually affective references of the beholder.

Under the extraordinary conditions of the psychological attack, the manipulation systematically takes advantage of the pop-up effect of visual information of both kinds.

For the universal cases, the involvement of road maintenance workers, street musicians, and agents of various street events has enough distinctiveness to assure the pop-up effect.

For the individual cases, the pop-up effect relies on the affective references derived from the personal dossier about the victim and his feedbacks from the field collected under the electronic surveillance.

So, if the victim usually turns his head to look at beautiful girls with spacious curly hair, the perpetrators will use that specific somatotype to select the next proxies to convey the intentional threat embodied in the contemporary pieces of visual information, like appearances, gestures, and proposed actions.

The psychological manipulation is overarching in all the sectors, like overflowing water penetrating and occupying any available place in its continuous expansion in the surrounding space: not only the stimuli repetition and intensification but also their multiplication.

The multiplicative effects of the hostile stimulation derive from the synergy of different factors: the generalization of the everyday stimuli used for the threat conditioning, the threatening semiotic polysemy, the exploitation of the attentional bias and the local perceptual focus, and the specificity of the cognitive overload.

First, the exploitation of the stimuli generalization relies on the choice of everyday stimuli, like simple objects, ordinary gestures, colors, and so on.

The advantage is double: not only the procedural elusiveness but also the multiplication of the potential threatening stimuli through all those perceived accidentally by the victim because of their ordinarily high frequency.

For example, if each time the victim sees a dot or a tiny disk he gets a harmful exposure to an electromagnetic field, then every point, circular shape, roundish object, real or perspective, regular or approximative, detected in the habitat, will provoke his conditioned reaction of fear.

In this example, each object, a generalized stimulus in the same intrinsic conditions of isolation of the first conditioned one, may provoke fear as the additional effect of the threat conditioning based on a subjective response.

Secondly, the employment of the principle of the semiotic polysemy permits to convey multiple threatening interpretations per stimulating sign.

For one continuative example, every roundish object in degraded or damaged conditions not only may elicit the conditioned reaction of fear as a generalized stimulus but also for the interpretation and cogitation of the other negative pieces of visual information opportunely preselected.

Thirdly, the detection of threatening pieces of visual information, now affective information for the victim while still neutral information for the viewers, is made unavoidable by the effects of the manipulation of the attentional bias and the local perceptual focus.

On the cognitive level, the specificity of the psychological attack unfolds the stimuli multiplication by employing linguistic ambiguity or vagueness or polysemy, and lexical games, conjointly with the exploitation of the confirmation bias and the local perceptual focus.

Hence, the above four principal factors unfold the multiplicative effects of the psychological attack, after the continual repetition and intensification of the stimulation.

Regarding the specificities of the cognitive attack, as the manifestations of the schizophrenia's language disorders of the instigator, they are counterintuitive and uneasy to understand for the victims.

For these intrinsic difficulties, when such specificities are not understood, they work only as painful repetitive stimuli, while when they are misunderstood, they equally participate in the overwhelming cognitive overload.

Eventually, the same perpetrators may provide some of the instructions to transcode their communications so to shorten the learning curve for the overwhelmed victim and make easier exerting the cognitive manipulation.

The perpetrators occasionally suggest the cognitive appraisal to the distressed victim; for the instructions to understand the communication style and content that may happen only once at the beginning of the torture program.

In that occasion, fundamental is the instruction "the message is the missing part," almost impossible to spot by inductive reasoning for the victims and paradigmatic to get the elusiveness of the torture program.

Other times, the victim may learn from the experience of the stimuli repetitiveness by inductive reasoning because sometimes the message is not exactly the missing part but rather the reversal.

In any case, even if cognitively misinterpreted or unprocessed, as the continual repetitive stimuli, the sensory information is complessively disturbing and frightening.

The main components of the linguistic and lexical games are words within one word, anagrams, homonyms, homophones, and homographs, and the overuse of metaphors and parallels.

Over time, by induction or suggestion, the victim will be able to learn the communication rules used by the perpetrators, like for example the presence of words with one word.

The repetitive and vague messages are resolved by the induced attentional bias focused on the environmental threats in the highly artificial habitat.

When the interpretation and cogitation of repetitive stimuli do not resolve in their predisposed cognitive meaning, because the victim's brain suffers the cognitive overload or the lack of understanding, the psychological effects are disturbing due to the repetitiveness alone.

Other times, the abundance of stimuli repetitions permits a more straightforward interpretation, like for the below instance of an anagram of a few letters.

The psychological attack first influences the attentional bias through the tactile bombardment then exploits also the local perceptual focus through the repetitive visual stimulation to induce the intentional cognitive interpretation sequentially.

Conclusively, the unique interpretation of the hidden threat occurs as a function of the synergistic fearful effects of the bioelectromagnetic bombardment targeting the specific part in the low body for the intended psychological manipulation.

-under construction -

The repetitions of stimuli are not casual but preselected to offer the overabundance of repetitive threatening information to which victims respond on a subjective basis.



¹ From unaware, manipulated, tricked, blackmailed, submitted to authority, obeying, opportunistic, operative.

² The effects of psychological torture - Barkely (pdf)

³ Ibid. ²

⁴ Ibid. ²

⁵ Ibid. ²

⁶ Ibid. ²