The torture is not as extreme as it could be. The torture can’t be run in a sustained state for the entire duration of a victim’s torture. It can’t even go more than five minutes without needing a change in activity. The torture group has allowed the flaws of the torture computer to dictate how the torture will run. The torture is designed to run in attacks; raises in torture intensity.
The multi-technology attack the torture group has chosen to do limits their use of the technologies by the flaws of a few setting the running time for the attack. The sensation technology’s running flaw is how it is ineffective at doing constant sensation activity and is therefore moved in location striking the victim by the torture group. This limits a multi-technology attack by inhibiting that extreme torture the torture group desires and believes they are achieving.
The torture group will try to go the length and do discordant attacks with the technologies but these attacks typically fall short of the most discombobulating that could theoretically be done. Because the torture group wants the victim cognizant of the torture activity, engaged and following along they do just under the intensity required to be fully disturbing.
We can track the downtime of victims when their torture is not disruptive by their actions on social media and in person. The more intensely the victim’s torture is the more focused on it they are. Victims will exclusively discuss the torture during the torture. It’s a very human reaction of seeking out help from others when something you can’t control is occurring.