u/Atoraxic

Researching through scientific literature published about the covert assaults and torture there is an easily recognized echo chamber where the same disinformation is repeated in many scientific papers from many sources. It’s intentional disinformation that has been introduced into online communities of susceptible traumatized victims urgently attempting to answer the inescapable questions of who is doing this, why are they doing it, how is it being done, etc. Every real victim is urgently hunting how to deal with this, how to protect ourselves/escape and finally how do we bring the filth behind this to Justice.

The levels of torture and evil this assault wields is upon victims is unprecedented. It is a true living nightmare. Because it’s so covert and performed on innocent people it’s very difficult to answer these questions. Due to the ever present assault and the resultant sustained trauma it’s almost impossible to ignore these questions. Answering these questions and taking appropriate steps to end the torment is how humanity has historically dealt with trauma. But currently you can‘t run from it, you cant find it so you can’t destroy it, you cant shield from it very well so you cant hide and we don’t know for sure who is behind it.

The assault continues and this means we are all looking for the answers to the important questions so we can finally escape this filthy weapon. This unfortunately leaves many victims extremely susceptible to suggestion. The people behind this both create and join in on victims online communities and use them to introduce and spread disinformation to victims. Many victims latch onto the disinformation they present in order to have the psychological protection an answer provides.

The disinformation is then echo chambered by influenced victims, while the implanted ideas are encouraged and reinforced by the participation of the programs online presence.

This is done to implant delusional ideas into victims and the communities they frequent. This discredits victims claims and reports. It promotes experiences that further programs goals like isolation, the destruction of personal identity and constant levels of intense stress. It also causes to victims to fall into complex futile rabbit holes. If we are collectively searching for the Fountain of Youth, Eldorado and the Philosophers Stone then we aren’t going to be putting much productive effort into blowing this filth off the Earth.

Currently there is an interesting dynamic where victims online echo chambers that are frequented, influenced and cultivated by the people behind this have caused a resultant echo chamber in the scientific literature about it.

When you study this using online communities you going to have to learn how to distinguish fake delusion indoctrinating “victims” from real victims, both influenced and uninfluenced.

If researchers and investigators are not able to do this then the implanted discrediting and delusional content will have powerful negative effects on the people researching and their publications about this.

We have clear dynamics around these crimes that allow for the easy formation of echo chambers and information cocoons.

  1. There are very limited resources to look at to find and study published information about victims experiences. Limited source research has been identified as a cause of published Scientific literature echo chambers.
  2. There is active discrediting and delusional implantation being performed by people and intelligences involved in the current programs.
  3. The victims are innocent people that are bombarded with a sustained covert assault that results in prolonged trauma leaving many of us highly susceptible to influence and suggestion.
  4. Previous scientific publications stated discrediting and delusional content forming a flawed platforms and resources for scientific publications that follow. Due to the nature and method of science, given certain efforts and parameters, it unfortunately is susceptible to echo chamber formation and once disinformation is adopted it becomes extremely difficult to jettison.

Looking at echo chambers and information cocoons.

Conceptualizing Echo Chambers and Information Cocoons: A Synthesis of Curent Knowledge and Future Directions. Journal of Strategic Information Systems June 2025

“Defining the problem context

The emergence of confined online information environments

Before the advent of Internet-enabled personalization technology, confined online information environments like echo chambers and information cocoons began to take shape within social groups where homophily (the inclination to associate with like-minded individuals) led to a limited exposure to diverse viewpoints (Colleoni et al., 2014). As Sunstein (2018) noted, this phenomenon led to confined online information environments where shared values and communicative norms reinforced certain perspectives, making it difficult to bridge differing viewpoints. Our study builds on Sunstein’s foundational work, which highlights both the group-driven nature of echo chambers and the individual-driven creation of information cocoons (Sunstein, 2001Sunstein, 2006). Traditional media played a significant role in fostering echo chambers by curating content tailored to specific audience demographics (Prior, 2007). Not only did this curation cater to the interests of particular groups, but it also contributed to a narrowed scope of information available to individuals, thus limiting the diversity of perspectives encountered (Barberá, 2020).

The advent of social media intensified the debate over the effects of echo chambers (Barberá, 2020). Platforms use algorithms that learn and reinforce preferences to boost user engagement (Gillespie, 2022Guess et al., 2018), prompting content that aligns with existing beliefs (Bakshy et al., 2015). As highlighted by Del Vicario et al. (2016) and elaborated on Kitchens et al. (2020), this self-reinforcing cycle of engagement can lead to confined online information environments where dissenting opinions are marginalized, limiting user exposure to alternative viewpoints.

The current conceptualization of confined online information environments and their limitations

Kitchens et al. (2020) identified two constitutive characteristics of echo chambers. The first distinctive feature is the limited diversity of information stemming from constraints imposed on information sources. This reduces the variety of perspectives available to individuals within echo chambers (Bakshy et al., 2015Garrett, 2009aKitchens et al., 2020Shore, et al., 2016). The second attribute of echo chambers is ideological segregation. This phenomenon amplifies the tendency for like-minded individuals to congregate and interact, fostering an environment that reinforces prevailing ideological viewpoints while constricting exposure to dissenting opinions (Barberá et al., 2015Dubois et al., 2018Garrett, 2009aKitchens et al., 2020Shore, et al., 2016). Consequently, Kitchens et al. (2020) proposed a general model that lays out the interplay among network homophily, algorithmic filtering, and individual behavioral responses to shape access to information sources (Fig. 1). The model emphasizes that network homophily, the natural tendency of individuals to associate with like-minded peers, forms the foundation. This homophily is exacerbated by algorithmic filtering, where social media platforms tailor content based on user preferences. As a result, individuals are exposed primarily to information that resonates with their existing viewpoints. This curated content promotes individual behavioral responses, reinforcing the preference for similar information and further solidifying network homophily.

Fig. 1. Information

Source Consumption under Echo Chambers from Kitchens et al. (2020).

While Kitchens et al. (2020) offered a useful model for understanding the dynamics of echo chambers, a significant limitation was its emphasis on algorithmic filtering without fully addressing the role of selective user behavior (Pandey et al., 2023). By focusing predominantly on how algorithms shape content exposure, the model overlooks the agency of users in actively seeking out information that aligns with their beliefs. The current focus on source diversity and source slant underemphasizes user-driven selective exposure, where individuals actively seek content that aligns with their beliefs, and how these intentional choices influence the information environment (Jungherr, 2023Jungherr et al., 2023Jungherr et al., 2023). Shifting the focus to incorporate user-driven selective exposure could reveal other factors that influence information diversity and ideological slant and thereby enrich understanding of how echo chambers work in digital spaces.

Towards a unified model of echo chambers and information cocoons

To address our research question, we first develop a conceptual differentiation between information cocoons and echo chambers. We present a model that illustrates how behavioral and social factors can lead to variation in information source consumption, resulting in the formation of either information cocoons or echo chambers. This process-based view offers two key advantages: (a) it conceptualizes the phenomenon through the lens of information processing flow; and (b) by removing algorithmic filtering from the model, it allows us to consider the role of user agency in creating confined information environments.

As illustrated in Fig. 2, selection homophily and network homophily represent two pivotal forces influencing the information sources a user is exposed to. We begin by describing the processes that lead to the formation of information cocoons. Selection homophily underscores an individual’s selective consumption of information. Before the advent of recommender algorithms, the phenomenon of the individual’s selective information consumption was already evident. Sunstein (2006) described information cocoons as environments in which individuals lock themselves into “communication universes in which we only hear what we choose and only what comforts us and pleases us” (Sunstein, 2006, p. 9). For instance, based on their preferences and research areas, people subscribe to magazines and select specific academic journals. This active consumption of homogenized information is corroborated by the principles of selective exposure (Freedman & Sears, 1965) and cognitive dissonance (Festinger, 1962) described in academic literature. Individuals show a bias for seeking information that reinforces preexisting opinions while disregarding contradictory information. Moreover, they display a preference for engaging with supportive content (Sears & Freedman, 1967), engage in impulsive information sharing (Arendt et al., 2016), and show information avoidance behaviors (Momsen & Ohndorf, 2022).

Fig. 2. A Model of Echo Chambers and Information Cocoons.

As Sunstein (2006) posited, information selection involves two primary categories: topics and viewpoints. The phenomenon of selective exposure to issues of interest is pervasive. To illustrate, vegetarians tend to prioritize news related to vegetarianism (Lueders et al., 2022), and owners of a specific car brand are more inclined to view marketing advertisementsfor that brand (Sunstein, 2017). Selective exposure to confirmatory information frequently results in suboptimal decision outcomes, and the phenomenon may intensify in the context of the Internet (Fischer & Greitemeyer, 2010). In the contemporary era, individuals have access to vast amounts of information. While they tend to selectively consume information that aligns with their viewpoints, this selectivity is also a practical response to information overload, not just a psychological tendency. This homophily of choice leads to information bias and narrowing, which further leads to individuals becoming siloed in information cocoons. Scholars have posited that even when individuals are exposed to diverse content on the Internet, it only sometimes leads to the consumption of varied perspectives. Bakshy et al. (2015) collected datafrom over 10 million American Facebook users and compared the news categories that users voluntarily read with the information presented to them through algorithms. Their findings indicate that users are more likely to consume information aligned with their existing viewpoints, leading the authors to conclude that homogenization was occurring. In short, users’ selective choices based on their points of view and interests are the driving force behind the formation of information cocoons.

We now turn to the phenomenon of echo chambers. Following the occurrence of selective homophily driven by user choices, there arises the possibility of dynamic group homogeneity. Network homophily, established on the foundation of social interactions, may be fostered through interpersonal diffusion, facilitating the formation and interaction of homogeneous groups (Flaxman et al., 2016Geiß et al., 2021Shore, et al., 2016). During user-prompted interpersonal communication, individuals seek out others with viewpoints that align with their own (Shore et al., 2016). This can manifest in various contexts, like daily face-to-face interactions or mutual attraction in online settings. Individuals with congruent viewpoints aggregate and form multiple distinct groups. The dissemination of homogenized information within these groups fosters homogeneous perspectives. For example, Röchert et al. (2022)found that in online conspiracy communities, there is a high level of homogeneity in discussions among advocates of these theories. In another study of online discussions about public events, Strauß et al. (2020) found a positive correlation between the frequency of discussions and the level of homogeneity within the group.

Furthermore, heterogeneity between online groups tends to increase. In the context of technology-mediated social interactions, the role of technology is amplified, serving as a potent force in driving information dissemination. One such influence is collaborative recommendationtechnology, which plays a crucial role in content recommendation. Notably, even users who do not exhibit pronounced viewpoint biases may be exposed to a high frequency of supportive information related to a particular stance. This phenomenon can be attributed to the impact of social algorithms as described by Lazer (2015).

In conclusion, the subjectivity of user preferences enables the construction of personalized, homogenized information environments – referred to as information cocoons. Both user-initiated interpersonal diffusion and social interactions demonstrate the existence of perspective heterogeneity between groups and homogeneity within groups. User preferences for homogenized choices can result in echo chambers through iterative dissemination of homogeneous information in human interactions, which can, over time, lead to the emergence of identifiable information cocoons.”

A write up about

Echo Chambers in Science? The impact of Academic Recommender Systems on the Dissemination of Scientific Knowledge.

This work looks into search engines ability to form echo chambers in Scientific Literature. Due to the factors listed above an easily recognizable Scientific Echo Chamber has formed in the published work studying reports of these heinous crimes.

Most if not all published work begins with something almost exactly like this:

“Gangstalking is a novel persecutory belief system whereby those affected believe they are being followed, stalked, and harassed by a large number of people, often numbering in the thousands. The harassment is experienced as an accretion of innumerable individually benign acts such as people clearing their throat, muttering under their breath, or giving dirty looks as they pass on the street. Individuals affected by this belief system congregate in online fora to seek support, share experiences, and interact with other like-minded individuals. Such people identify themselves as targeted individuals.”

Linguistic Analysis of Online Communication About a Novel Persecutory Believe System: A Mixed Methods Study 2021

Related content

https://www.reddit.com/r/Overt_Podcast/comments/1cpvg64/gang_stalking_reallife_harassment_or_textbook/

Gangstalking is an easily recognized promoted delusion that’s used to discredit victims reports. The terminology commonly used by victims is group talk installed by criminals behind this in an attempt to control cognition of victims by employing group think and to mystify the general public as well as researchers and investigators.

The most difficult part of this is determining what is real and whats not.

reddit.com
u/Atoraxic — 12 days ago

https://www.sciencedirect.com/science/article/pii/S1008127525000495#bib13

Abstract

Sonic weapons are non-lethal weapons that some countries around the world are actively developing and equipping in their troop. Its injury to the human body is increasingly valued. Given that previous research on the injury, prevention, and treatment of sonic weapons to the human body were not systematic and comprehensive, after explaining certain acoustic concepts, these authors introduce infrasonic and intense sound weapons from aspects of weapon types and applications, injury mechanisms and characteristics, injury thresholds, biological effects, injury diagnosis, and injury prevention and treatment. Finally, ultrasonic weapons are briefly introduced, based on a small amount of public literature reports both domestically and internationally. This study aims to provide a reference for future prevention, and treatment of sonic weapons injury.

1. Introduction

Sonic weapons are a type of non-lethal weapon that has increasingly received attention from people in modern warfare for their effects and injuries to the human body. Sonic weapons can be divided into infrasonic weapons, intense sound weapons, and ultrasonic weapons based on their frequency. Scientists in China have previously reported on the concept of infrasonic weapons,12345 infrasound field characteristics,^(6) infrasound focusing and targeting,^(7)^(,)^(8) psychological effects of infrasound,^(9) biological effects of infrasound,101112the influence of infrasound on the central nervous system and neural-psychological aspects,^(13) military applications of infrasound,^(14) and physical protection against infrasound.^(15)For intense sound weapons, Chinese scientists have introduced its concepts and applications,1617181920 the biological effects,^(12)^(,)^(21) and the effectiveness evaluation system.222324 However, there are relatively few literature reports on ultrasonic weapons, with only sporadic reports on the physical characteristics of ultrasound^(12)^(,)^(21) and the basic principles of ultrasonic weapons.^(17)

Given the lack of comprehensive and systematic research on the damage to the human body caused by sonic weapons and their prevention and treatment in previous reports, this article retrieves Chinese and English literature published from January 2000 to January 2024 through databases of SinoMed, CMCI, PubMed, Embase, Web of Science, as well as search engines such as Baidu Scholar and Microsoft Bing by using the keywords acoustic weapons, sonic weapons, infrasonic weapons, intense sound weapons, ultrasonic weapons, noise weapons, and prevention and treatment. The literature inclusion criteria were as follows: (1) literature collected from medical databases and internet search engines, and (2) original research papers and research reports. The literature exclusion criteria were: (1) literature that could not be accessed in full text or was not in Chinese or English; and (2) science-promoting papers. Finally, 24 Chinese and 32 English articles were included. The aim is to provide references for future development, protection, and medical treatment of acoustic weapons.

2. Acoustic concepts

2.1. Sound frequency

The number of vibrations per unit time by a sound source is known as sound frequency, also referred to as audio frequency, measured in hertz (Hz). Infrasound frequencies range from 0.001 to 20 Hz. Although infrasound is generally inaudible to the human ear, it can still be sensed and, at sufficiently high power levels, can be heard.^(25)^(,)^(26) Infrasound is commonly present in various industrial, transportation, and living environments, also generated by phenomena such as nuclear explosions, rocket launches,^(9)^(,)^(13) as well as natural occurrences like earthquakes, volcanoes, tornadoes, and waterfalls.^(27)^(,)^(28) Animals such as crocodiles, elephants, giraffes, and whales can use infrasound for long-distance communication.^(27)^(,)^(28)Infrasound has long wavelengths, such as 5 Hz for 68 m and 7 Hz for 48.5 m.^(22)^(,)^(29)Frequencies ranging from 20 Hz to 20 kHz are audible sounds, with the human ear being most sensitive to frequencies between 1 kHz and 3 kHz.252627 Ultrasound refers to frequencies higher than 20 kHz, which are inaudible to the human ear, but can be heard by dogs, cats, turtles, and bats. Also, whales and dolphins use ultrasound for prey detection.252627 Ultrasound is highly directional and can penetrate the body, allowing for medical imaging techniques to obtain structural information of internal organs.^(30) Sound frequencies can also be categorized as low-frequency (<400 Hz), mid-frequency (0.4–1 kHz), and high-frequency (>1 kHz).^(31) Both infrasound and ultrasound can induce resonance in the human body.^(25)

2.2. Noise

Noise refers to sounds that are irritating, excessively loud, and detrimental to human health. It is generated by the irregular vibrations of sound-emitting objects. Noise can be classified as steady-state noise (with fluctuations in sound level not exceeding 3 dB) and pulse noise (short duration with high and sharp amplitudes).^(32) Similar to sound frequencies, noise can also be categorized as low-frequency, mid-frequency, and high-frequency.

The human auditory system has a higher tolerance for low-frequency noise, even at high sound pressure levels (SPLs), resulting only in temporary threshold shifts (TTS) rather than permanent threshold shifts (PTS).^(33)^(,)^(34) Low-frequency noise ranging from 150 to 155 dB can cause chest wall vibration, slight nausea, and dizziness. At 154–171 dB, it can lead to increased heart rate, flushing of the skin, swallowing painvisual impairment, subcostal discomfort, coughingsternum compression, and breathing difficulties.^(33) When mid-frequency noise reaches 120 dB, it can resonate with the nasal cavity or sinus and enhance their tactile sensation. At ≥142 dB, it can stimulate the vestibular system, and at 165 dB, it can cause itching.^(34) For high-frequency noise, TTS or PTS can be caused by SPL ranging from 80 to 120 dB, tactile sensations or itchiness can occur at 120 dB, vestibular reactions can be induced at 125 dB, balance disorders can be caused at 140 dB, and thermal effects can be generated at 160 dB.^(33) The combination of sound intensity and exposure time determine the level of damage, for example 135 dB for 7 min, 140 dB for 40 s, 145 dB for 4 s, 150 dB for 0.4 s, and 160 dB can cause perforation of the eardrum (it is previously believed that the perforation have a protective effect on the inner ear, but human data suggests that eardrum perforation provides no protection, whether unilateral or bilateral).^(35)

2.3. Acoustic power

Acoustic power refers to the amount of sound energy passing through a specified area per unit time. When measured in terms of energy, it is referred to as sound intensity, expressed in W/m^(2). If measured in terms of pressure, it is referred to as SPL with the unit of Pa. The indicator of SPL is in dB.^(25) The conversion formula between dB and Pa is given by L=20, where L is the SPL, P1 represents the sound pressure being compared, and P0 represents the reference sound pressure (often taken as 20 μPa). Acoustic power is directly proportional to the square of sound velocity, sound frequency, and amplitude. Therefore, ultrasound has high acoustic power, while explosion waves own high acoustic power due to their high amplitudes.^(31) When acoustic power exceeds 120 dB, it is considered high-intensity sound, causing discomfort to the human ear and potential hearing loss. At 140 dB (200 Pa), it can be painful to the human ear, above 160 dB (2 kPa) causes eardrum rupture, and 173 dB (9 kPa) for lung rupture.^(30)^(,)^(33)

2.4. Acoustic propagation

Infrasound and audible sound propagate at the same speed,^(3) which is about 300–340 m/s in the atmosphere and 1480 m/s in water.^(7)^(,)^(21) The energy of sound wave undergoes attenuation and absorption during propagation, which is influenced by factors such as humidity, temperature, and pressure.^(19) The rate of sound attenuation is directly proportional to the square of its frequency, so higher frequencies result in faster attenuation.^(12) As a result, infrasound experiences less attenuation, allowing for long-distance propagation (thousands to tens of thousands of kilometers).^(7)^(,)^(21) On the other hand, ultrasound experiences significant attenuation, resulting in shorter propagation distances.^(29) The penetrating power of sound waves is inversely proportional to the sound frequency. For example, 7 Hz infrasound can penetrate through reinforced concrete walls several meters thick, as well as steel plates, seawater, and soil layers, while audible sound at 7 kHz cannot pass through a piece of paper.^(14)^(,)^(30)

^(continued)

^(https://www.sciencedirect.com/science/article/pii/S1008127525000495#bib13)

reddit.com
u/Atoraxic — 23 days ago

There are a few popular theories as to the cause of natural tinnitus. We are going to look at the discordant theory as it provides a strong theoretical explanation for the "hum" / induced tinnitus that so many of us experience and report.

Here is a great overview of natural tinnitus

Types of tinnitus: What You Need to Know. American Hearing Audiology 2025

The

  • Discordant theory explains tinnitus as a mismatch between damaged outer hair cells and intact inner hair cells.

https://preview.redd.it/01c88v6ygzvg1.png?width=3492&format=png&auto=webp&s=fbd2512a36e72a75cfac203c6e2677717614a74c

https://preview.redd.it/etsinsuyfzvg1.png?width=1018&format=png&auto=webp&s=9d299d6d376b4a5b8e0b08ecf4df7fffc62b8df2

In this diagram we see the Outer and Inner hair cells represented in the bottom image.

Here is a text covering INNER AND OUTER HAIR CELLS

In the discordant theory of natural tinnitus we have damage to the OEH and healthy IEH. With this we have normal signals being transmitted by the Inner Ear Hairs while the signals coming from the OEH are abnormal or missing. The brain then may not know how to interpret the abnormal combination of signals it is receiving and as such these abnormal signals are perceived as tinnitus.

"There are several theories that explain how subjective tinnitus begins:

  • Edge theory suggests tinnitus comes from abnormal activity between healthy and damaged hair cells.
  • Discordant theory explains tinnitus as a mismatch between damaged outer hair cells and intact inner hair cells.
  • Auditory plasticity theory describes how the brain rewires itself after hearing loss and exaggerates missing sound frequencies.

Each of these theories points to altered communication in the auditory system. The brain is trying to fill in gaps, and the result is phantom sound."

"How It Sounds

People describe subjective tinnitus in many ways:

  • High-pitched ringing
  • Hissing or static
  • Roaring or rushing water
  • Buzzing or electrical hum"

https://americanhearing.us/types-of-tinnitus/?srsltid=AfmBOopyB-NDwSgDqpieZ7S2LGqMY_s828vQqARtXDTau8b1WaEtpkcO

Tinnitus: Characteristics, Causes, Mechanisms, and Treatments

A more in depth explanation

"According to discordant theory, tinnitus is induced by the discordant dysfunction of damaged OHCs and intact inner hair cells (IHCs) of the organ of Corti. Intense noise and ototoxic agents initially damage OHCs in the basal turn of the cochlea, and subsequently, if continued or repeated, affect IHCsthis is due to IHCs being more resistant to such damage.^(9) IHCs are the receptor cells for sound transduction, and almost all afferent fibers in the auditory nerve (95%) innervate IHCs.^(8) In contrast, OHCs work as mechanical amplifiers, enhancing weak sounds by providing up to 50 dB, which can be evaluated by measuring otoacoustic emissions.^(8) In almost all situations OHCs are damaged more than IHCs, which results in the disinhibition of neurons in the dorsal cochlear nuclei (DCNs).^(8) Spontaneous activity is increased when neurons in the DCN receive excitation from IHCs but not from the damaged OHCs, and this is perceived as tinnitus.^(8) Normally there is a small gap between the top of the cilia of the IHCs and the bottom of the tectorial membrane, but in the area in which OHCs are affected but IHCs are intact, the tectorial membrane might touch the IHC cilia, thus causing the IHCs to depolarize.^(41) The OHCs normally recover with a few days, but this can be delayed for up to a few months.^(42)^(,)^(43) Therefore, it is hypothesized that tinnitus represents a consequence of a central gain adaptation mechanism when the auditory system is confronted with a hearing loss.^(44) Discordant theory explains why many individuals with tinnitus have normal hearing if there is only partial damage to OHCs, since up to 30% of OHCs can be damaged without inducing hearing loss.^(45) OHCs die at a rate of approximately 0.5% per year beginning during the first years of life, and OHC-induced hearing loss does not usually appear before the end of the fifth decade of life.^(8) Discordance is absent in totally deaf individuals with complete damage to both OHCs and IHCs, and hence tinnitus is not induced. If there is increased gain within the CNS, tinnitus is present even in deaf subjects.^(23)Similarly, noise-induced tinnitus is caused by discordant damage between OHCs and IHCs.^(41)Two types of noise-induced tinnitus have been identified: tonal and complex. Tonal tinnitus results from discordant dysfunction of OHCs and IHCs manifesting in a single area, whereas complex tinnitus results from multiple areas of discordance.^(4)"

https://pmc.ncbi.nlm.nih.gov/articles/PMC2686891/#:~:text=The%20sound%20perceived%20by%20those,somatosound%20to%20designate%20objective%20tinnitus.

The induced tinnitus so many of us are assaulted with and continuously report could be generated using inaudible low frequency sound to stimulate OEH while leaving IEH unaffected resulting in discordant OEH and IEH signaling that is perceived as tinnitus. Outer and Inner ear hairs perceive different frequencies with the OEH being sensitive to lower spectrum. Outer Ear Hairs are even capable of perceiving consciously inaudible frequencies.

" In this review, we consider possible ways that low frequency sounds, at levels that may or may not be heard, could influence the function of the ear. The inner ear has elaborate mechanisms to attenuate low frequency sound components before they are transmitted to the brain. The auditory portion of the ear, the cochlea, has two types of sensory cells, inner hair cells (IHC) and outer hair cells (OHC), of which the IHC are coupled to the afferent fibers that transmit "hearing" to the brain. The sensory stereocilia ("hairs") on the IHC are "fluid coupled" to mechanical stimuli, so their responses depend on stimulus velocity and their sensitivity decreases as sound frequency is lowered. In contrast, the OHC are directly coupled to mechanical stimuli, so their input remains greater than for IHC at low frequencies. At very low frequencies the OHC are stimulated by sounds at levels below those that are heard. "

  1. Hearing perception, mediated by the inner hair cells of the cochlea, is remarkably insensitive to infrasound.
  2. Other sensory cells or structures in the inner ear, such as the outer hair cells, are more sensitive to infrasound than the inner hair cells and can be stimulated by low frequency sounds at levels below those that are heard. The concept that an infrasonic sound that cannot heard can have no influence on inner ear physiology is incorrect.

Responses of the ear to low frequency sound, infrasound and wind turbines

The induced tinnitus or hum serves many functions for the program. We can get into these on another thread.

reddit.com
u/Atoraxic — 27 days ago

Here is a short article on memory manipulation during sleep that is relevant to the dream manipulation many of us experience. The forced audio pairs tasks with sounds during the waking hours and then the audio cue can be used to reactivate the memory during during slow wave sleep. Because we are not usually consciously aware during sleep we can not “add new information to update thinking.” “Pre-sleep accuracy of the material being learned matters.” A major goal of the program is to alter the thoughts and behavior of a victim without or despite their conscious knowledge. Destruction of personal identity is another major goal of the program and since “Your sleep determines what you know and who you are.” (Ken Paller, CNS 2016) then memory influence techniques during sleep has the ability to attack and rebuild a victims personal identity.

>Memories to sleep on

>Your sleep determines what you know and who you are. (Ken Paller, CNS 2016)

>You’ll forget most of what you do today. Key to what you remember is what you rehearse, and much of that rehearsal happens in your sleep. That’s how Ken Paller kicked off his talk about the role of sleep in memory reactivation.

>Sleep, he said, is far from trivial in our lives: Your sleep influences what you know through your memories and therefore determines who you are.

>So the question becomes: Can we use sleep not only to better understand how memories get stored but also to target what we want to remember?

>The answers may very well lie in the hippocampus, which affects acquisition, storage, and retrieval of memories, Paller said, which we know, in part, through work done in patients with amnesia. His and others’ research has shown a way to do “targeted memory reactivation” through sensory cues, like odors or sounds, played in sleep after pairing the cues with tasks while awake.

>The work represents a new way of thinking about sleep, overturning previous dogma in the field that sensory signals are blocked in sleep. While the signals are not as strong in sleep as when awake, scientists now know they are not blocked, Paller explained. It also builds off work done on memory while awake and focuses on slow wave sleep rather than REM.

>“Entering slow wave sleep is not like shutting down a computer,” Paller said. High neuronal activity in slow wave sleep can enable brain interactions important for memory consolidation.

>Among many findings, researchers have found better memory retention after sleep compared to no sleep, better retention the more slow wave sleep someone has after learning, and that sensory cues during sleep can provoke memory reactivation. For example, researchers had people remember the placement of pictures while listening to various sounds (like a “meow” for a picture of a cat) and then played the sounds while participants took a nap. They found that there was more forgetting for the uncued photos after the nap than for those that were cued with the sounds played while the participants slept.

>But it’s not like in the Dexter cartoon, where playing a record during sleep will suddenly imbue the listener with new knowledge, of say a foreign language. Pre-sleep accuracy of the material being learned matters. Memory reactivation during sleep, Paller said, is like when you are awake except that when awake, you can incorporate new information to update your thinking. In either case, it’s the hippocampal interactions with distributed neocortical networks that changes how the information is stored.

>Paller toured the audience through a variety of studies using sensory cues for target memory reactivation, including for fear conditioning with odor cues and even targeted reactivation to help reduce implicit bias(also see the post on Phelps’ work on this). Importantly, he said, the work with sensory cues in sleep has not yet indicated any deleterious effects on people’s sleep.

>He said he sees a great future in more work on memory reactivation during sleep, including finding ways to reactivate the memories we really want to store and ways to help rehabilitate people with motor or language deficits. He also speculated that perhaps treatment of psychiatric disorders, as well as reinforcing good habits or countering bad ones (e.g. smoking, unhealthy eating), could be supplemented by targeted memory reactivation in sleep.

>-Lisa M.P. Munoz

https://www.cogneurosociety.org/understanding-how-we-trigger-and-rehearse-memories/

u/Atoraxic — 1 month ago

Looking at the laundry list of crimes committed by Foreign Governments transnational repression there are striking similarities to the victims of covert torture program in the United States and around the world.

I'm all for helping all victims of heinous crimes like these, but I'm scratching my head because a Federal Agency of the United States is publicly supporting foreign victims living in the US while reports of extraordinarily similar domestic cases have been flooding their offices and commonplace on mainstream social media for decades. Despite the strong efforts of long suffering victims, there have been no publicly published investigations or positive results by the FBI.

Transnational Repression

When foreign governments reach beyond their borders to intimidate, silence, coerce, harass, or harm members of their diaspora and exile communities in the United States, that is transnational repression. You can get help to stop it.

Robert Contee talks about Transnational Repression

https://www.youtube.com/watch?v=LV1JeGJEosw

Some foreign governments seek to intimidate and silence their citizens who are visiting or living in the United States. These governments may also target members of their diaspora who are permanent residents, naturalized or U.S.-born citizens, members of their family, or friends. These activities threaten U.S. sovereignty, violate U.S. law, and infringe on individuals’ rights and freedoms.

Transnational repression may take the following forms:

  • Stalking
  • Online disinformation campaigns
  • Harassment
  • Intimidation or threats
  • Forcing or coercing the victim to return to their country of origin
  • Threatening or detaining family members or friends in the country of origin
  • Abusive legal practices (e.g., lawsuits, asset freezes, or withholding legal documents such as passports)
  • Cyberhacking
  • Assault
  • Attempted kidnapping
  • Attempted murder

Foreign governments may use transnational repression tactics to silence the voices of their citizens (or non-citizens connected to the country), get information from them, or coerce them to return to the country of origin.

Threat Intimidation Guide

Learn more about the types of transnational repression and what to do if you’ve been threatened. Available in English and many other languages.

How to Report

If you are in the United States, including in a U.S. territory, your freedoms are protected, regardless of your citizenship. If you feel you have been affected by transnational repression, report it to the FBI.

  • Contact the FBI online at tips.fbi.gov.
  • Call 1-800-CALL-FBI (1-800-225-5324).

FBI Philadelphia PRC Police Extortion PSA

FBI Philadelphia PRC Police Extortion PSA

Transcript / Visit Video Source

Who is targeted

Foreign governments typically target:

  • Political and human rights activists
  • Dissidents
  • Journalists
  • Political opponents
  • Religious or ethnic minority groups

continued with Examples and related press releases

https://www.fbi.gov/investigate/counterintelligence/transnational-repression

u/Atoraxic — 2 months ago

The Evolution Of Simple Sabotage and Its Role In This Program

Victims of this program are often hit with many acts of simple sabotage over the long course of the onslaughts.

We are going to look at simple sabotages history, theory and evolution into the modern manifestation endured by sufferers of these vile attacks.

The Simple Sabotage Field Manuel was used by Strategic Services (a precursor to the CIA.)

“The purpose of this paper is to characterize simple sabotage, to outline its possible effects, and to present suggestions for inciting and executing it.

Widespread practice of simple sabotage will harass and demoralize enemy administrators and police”

This Manuel was created for use in WWII, but many of the main underlying principals have been adopted and adapted for modern use.

The covert requirements of the program combine perfectly with the ability to remotely sabotage modern technology and technological sabotage is used by Intelligence and Military Forces around the Globe.

Simple Sabotage Field Manuel

“4. TOOLS, TARGETS, AND TIMING

Sabotage suggestions, of course, should be adapted to fit the area where they are to be practiced. Target priorities for general types of situations likewise can be specified, for emphasis at the proper time…

(a) Simple sabotage is more than malicious mischief, and it should always consist of acts whose results will be detrimental to the materials and manpower of the enemy.”

This principal is also followed by modern technical sabatage. Simple sabotage is used to promote goals of the program.

Isolation

Loss of financial stability

Loss of professional success

Loss of housing stability

Loss of independence

Destruction and prevention of personal life

Destruction of romantic partnership

Prevention of romantic interests and relationships

Destruction of friendships and other important personal relationships

Destruction of Family relationships

Separation from Family support

Disruption of virtual life

Disruption of health care

Disruption and harassment of phone and digital communication

Disruption of online services and capabilities

Destruction of personal identity

Elimination of important personal activities and passions

Abandonment of life dreams

Sustained stress

Disruption of self care

Elimination of non family support

Loss of faith in humanity and life

Destruction of sense of safety

Loss of sense of security

Obliteration of Hope

Development of learned helplessness

Personally I have had four devices rendered inoperable by sabotage. Two phones and two computers. I have also been able to fix further attempts; one attempt used the the orientation settings on the display to have the windows show up laterally instead of horizontal and the control of the mouse was set so that the movement produced was the opposite of what was intended. If you tried to manipulate the mouse to go up and to the right it would go down and to the left.

“The saboteur should be ingenious in using his every-day equipment. All sorts of weapons wi

We will look at this later, but one of the goals of simple sabotage is to achieve goals using methods that will generate little LE investigative interest or effort that will be easily ignored and dismissed.

many of the simple sabotages mimic or exploit common everyday technical issues.

“destined for enemy use, and that the most efficient fuels and lubricants also are dest

The sabotage depends on the victims life situation and the current goals of the program.

Techniques like spoof text messages are used to destroy important relationships. If it’s attacking financial stability and self identity then simple sabotage of work technology will be carried out. If the victim is terminated or looses their position then simple sabotage of resumes and job posting websites can make finding a new position much harder.

Again these are performed with uncomplicated techniques often exploiting preexisting glitches ; the victim may find that their ability to fill out an apliction on a company website is blocked by using a technique that blocks the popups the application process utilizes.

“Any communications facilities which can be used by the authorities to transmit instructions or morale material should be the objects of simple sabotage. These include telephone, telegraph and power systems, radio, newspapers, placards, and public notices.

(3) Critical materials, valuable in themselves or necessary to the efficient functioning of transportation and communication, also should become targets for the citizen-saboteur. “

My email and all other accounts were seized early on; I just woke up one day and they had all been taken over. No demands were made to reinstate them, instead they were seized because this significantly disrupts the persons ability to function and enrages and frustrates the victim. Attacks like these can also destroy a persons ability to function adequately at work and deliver a major blow to their sense of safety and well being. The sense of safety is further eroded when the victim can find no help or even interest after reporting these crimes to the proper authorities.

As a persons technology and virtual life are sabotaged they can become paranoid and begin to question the legitimacy of comunications they receive. How can you trust your text messages if you just lost your partner because someone sent you destructive spoof text messages supposedly coming from them.

  1. “SPECIFIC SUGGESTIONS FOR SIMPLE SABOTAGE

(1) Buildings

Warehouses, barracks, offices, hotels, and factory buildings are outstanding targets for simple sabotage. They are extremely susceptible to damage, especially by fire; they offer opportunities to such untrained people as janitors, charwomen, and casual visitors; and, when damaged, they present a relatively large handicap to the enemy.”

Like with brick and mortar sabotage, technological sabotage attacks vulnerable targets and there are no shortage of these. This is especially the case early on in the attack when the victims are least aware and prepared for these types of attacks. It's even likely significant prep work is done before the person even knows an attack has begun.

Unsupported emails are especially vulnerable as once they are seized there is really no recourse to get control back or even shut them down. With control of a main email account and multiple accounts with no added security set up, like two step phone verification, you can have all your accounts seized and end up losing some and spending allot of time getting back control over others. This can not only be a huge pain in the ass, but it can effectively cripple a victim for a decent period of time.

As you can see by this list it's encouraged to disrupt, harass and hamper the enemy in as many ways as possible without getting caught. The simple sabotage used by the program uses techniques to covertly and remotely sabotage technology required to succeed in modern life..

If you want to add sabotage you have encountered please add them in the comments.

reddit.com
u/Atoraxic — 2 months ago