Tin Can Telephone

The easiest way for a non-victim to infiltrate the torture group is through the victim. All you have to do is be seen or heard by the audio and visual recording technology. All you people who are reading my blog and leaving comments you’re part of my torture in a small way right now. Thanks for the pleasant diversion.

Even if the entrance to the torture group computer remained hidden to non-victims they would still access it. People have this way of always being social which the computer can’t avoid. Imagine how it is for the torture group that relationships are a bane. If you want in walk on in. The computer is ready to be infiltrated.

When I interact with other victims I know for a fact that I have entered into the torture they are receiving at least for the moments we interact. It’s my responsibility to behave well but not my responsibility to affect their torture. I solely want to connect to the computer. I’m not trying to interact with the victim through their torture I’m going through the victim to get to the computer. They’re acting as a messenger. Yes, that is something, something amoral.

You can create change in the victim’s torture by inserting information into the semi-automated computer system. It wants a good amount of stimuli. It needs to be fed. The torture group has to go in and delete some information but they can’t get it all. Because computer programs that generate speech for twelve hours straight and also pick up information to analyze and use in torture are massive and hard to clean up.

Sometimes victims can detect what the torture has picked up from their environmental interactions. If they’ve been tracking the torture they can figure out what the semi-automated computer system recycles.

I’ve still got items from over twenty years ago rolling around. One time Tommy said to me “if you throw up you have to wash your teeth right away or the acids eat your teeth.” So if I throw up the computer will remind me of this advice.

It’s interesting that though the computer ingests information this way the torture group seeks to control what information is available to it by isolating the victim. In their home the victim will still get a fair amount of activity happening to feed the computer. It’s much less random though.

Published by ti30years

Living in So. California. Victim of the T.I. torture since 1990. Child and adult victim of the torture. I share my torture experience to help people learn about the torture which continues to plague me and others. Not your average schizophrenic.

Leave a comment

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Create your website at WordPress.com
Get started
%d bloggers like this: