The easiest way for a non-victim to infiltrate the torture group is through the victim. All you have to do is be seen or heard by the audio and visual recording technology. All you people who are reading my blog and leaving comments you’re part of my torture in a small way right now. Thanks for the pleasant diversion.
Even if the entrance to the torture group computer remained hidden to non-victims they would still access it. People have this way of always being social which the computer can’t avoid. Imagine how it is for the torture group that relationships are a bane. If you want in walk on in. The computer is ready to be infiltrated.
When I interact with other victims I know for a fact that I have entered into the torture they are receiving at least for the moments we interact. It’s my responsibility to behave well but not my responsibility to affect their torture. I solely want to connect to the computer. I’m not trying to interact with the victim through their torture I’m going through the victim to get to the computer. They’re acting as a messenger. Yes, that is something, something amoral.
You can create change in the victim’s torture by inserting information into the semi-automated computer system. It wants a good amount of stimuli. It needs to be fed. The torture group has to go in and delete some information but they can’t get it all. Because computer programs that generate speech for twelve hours straight and also pick up information to analyze and use in torture are massive and hard to clean up.
Sometimes victims can detect what the torture has picked up from their environmental interactions. If they’ve been tracking the torture they can figure out what the semi-automated computer system recycles.
I’ve still got items from over twenty years ago rolling around. One time Tommy said to me “if you throw up you have to wash your teeth right away or the acids eat your teeth.” So if I throw up the computer will remind me of this advice.
It’s interesting that though the computer ingests information this way the torture group seeks to control what information is available to it by isolating the victim. In their home the victim will still get a fair amount of activity happening to feed the computer. It’s much less random though.