Under Pressured

The torture is not as extreme as it could be. The torture can’t be run in a sustained state for the entire duration of a victim’s torture. It can’t even go more than five minutes without needing a change in activity. The torture group has allowed the flaws of the torture computer to dictate how the torture will run. The torture is designed to run in attacks; raises in torture intensity.

The multi-technology attack the torture group has chosen to do limits their use of the technologies by the flaws of a few setting the running time for the attack. The sensation technology’s running flaw is how it is ineffective at doing constant sensation activity and is therefore moved in location striking the victim by the torture group. This limits a multi-technology attack by inhibiting that extreme torture the torture group desires and believes they are achieving.

The torture group will try to go the length and do discordant attacks with the technologies but these attacks typically fall short of the most discombobulating that could theoretically be done. Because the torture group wants the victim cognizant of the torture activity, engaged and following along they do just under the intensity required to be fully disturbing.

We can track the downtime of victims when their torture is not disruptive by their actions on social media and in person. The more intensely the victim’s torture is the more focused on it they are. Victims will exclusively discuss the torture during the torture. It’s a very human reaction of seeking out help from others when something you can’t control is occurring.

Published by ti30years

Living in So. California. Victim of the T.I. torture since 1990. Child and adult victim of the torture. I share my torture experience to help people learn about the torture which continues to plague me and others. Not your average schizophrenic.

Leave a comment

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Create your website at WordPress.com
Get started
%d bloggers like this: