Cyber Torture is the new crime for the new times.
Unbelievable but true. Directed energy, mind reading technology, victimization across the earth, the deep web, artificial intelligence, and cybernetics. Implantation of people on earth. Welcome to the new cybernetic human trafficking and torture era.
A particular area of concern, which does not appear to have received sufficient attention, is the possible use of various forms of information and communication technology (“cyber-technology”) for the purposes of torture. Although the promotion, protection and enjoyment of human rights on the internet has been repeatedly addressed by the Human Rights Council (A/HRC/32/L.20; A/HRC/38/L.10/Rev.1), torture has been understood primarily as a tool used to obstruct the exercise of the right to freedom of expression on the internet, and not as a violation of human rights that could be committed through the use of cyber-technology
This seems surprising given that some of the characteristics of cyber-space make it an environment highly conducive to abuse and exploitation, most notably a vast power asymmetry, virtually guaranteed anonymity, and almost complete impunity. In fact, States, corporate actors and organized criminals not only have the capacity to conduct cyber operations inflicting severe suffering on countless individuals, but may well decide to do so for any of the purposes of torture. It is therefore necessary to briefly explore, in a preliminary manner, the possibility and basic contours of what could be described as “cyber torture”.
In practice, cyber-technology already plays the role of an “enabler” in the perpetration of both physical and psychological forms of torture, most notably through the collection and transmission of surveillance information and instructions to interrogators, through the dissemination of audio or video recordings of torture or murder for the purposes of intimidation, or even live streaming of child sexual abuse “on demand” of voyeuristic clients (A/HRC/28/56, para.71), and increasingly also through the remote control or manipulation of stun-belts (A/72/178, para.51), medical implants and, conceivably, nano- or neurotechnological devices. Cyber-technology can also be used to inflict, or contribute to, severe mental suffering while avoiding the conduit of the physical body, most notably through intimidation, harassment, surveillance, public shaming and defamation, as well as appropriation, deletion or manipulation of information.
The delivery of serious threats through anonymous phone calls has long been a widespread method of remotely inflicting fear. With the advent of the internet, particularly State security services have been reported to use cybertechnology, both in their own territory and abroad, for the systematic surveillance of a wide range of individuals and/or for the direct interference with their unhindered access to cyber technology (A/HRC/32/L.20; A/HRC/38/L.10/Rev.1). Moreover, electronic communication services, social media platforms and search engines provide an ideal environment both for the anonymous delivery of targeted threats, sexual harassment and extortion, but also for the mass-dissemination of intimidating, defamatory, degrading, deceptive or discriminatory narratives.
Individuals or groups systematically targeted by cyber-surveillance and cyber-harassment generally are left without any effective means of defense, escape, or self-protection and, at least in this respect, often find themselves in a situation of “powerlessness” comparable to physical custody. Depending on the circumstances, the physical absence and anonymity of the perpetrator can even exacerbate the victim’s emotions of helplessness, loss of control, and vulnerability, not unlike the stress-augmenting effect of blindfolding or hooding during physical torture. Likewise, the generalized shame inflicted by public exposure, defamation and degradation can be just as traumatic as direct humiliation by perpetrators in a closed environment. As various studies on cyber-bullying have shown, already harassment in comparatively limited environments can expose targeted individuals to extremely elevated and prolonged levels of anxiety, stress, social isolation and depression, and significantly increases the risk of suicide. Arguably, therefore, much more systematic, government-sponsored threats and harassment delivered through cyber-technologies not only entail a situation of effective powerlessness, but may well inflict levels of anxiety, stress, shame and guilt amounting to “severe mental suffering” as required for a finding of torture.
More generally, in order to ensure the adequate implementation of the prohibition of torture and related legal obligations in present and future circumstances, its interpretation should evolve in line with new challenges and capabilities arising in relation to emerging technologies not only in cyberspace, but also in areas such as artificial intelligence, robotics, nano- and neurotechnology, or pharmaceutical and biomedical sciences including socalled “human enhancement”.
Challenges of new technologies: In order to ensure the adequate implementation of the prohibition of torture and related international legal obligations in present and future circumstances, its interpretation should evolve in line with new challenges and capabilities arising in relation to emerging technologies not only in cyber space, but also in areas such as artificial intelligence, robotics, nano- and neurotechnology, or pharmaceutical and biomedical sciences including so-called “human enhancement”.
Torturous environments: In practice, torture victims are almost always exposed to a combination of techniques and circumstances inflicting both mental and physical pain or suffering, the severity of which depends on factors such as duration, accumulation and personal vulnerability. Victims tend to experience and respond to torture holistically, and not as a series of isolated techniques and circumstances, each of which may or may not amount to torture. Accordingly, psychological torture may be committed in one single act or omission or can result from a combination or accumulation of several factors which, taken individually and out of context, may seem harmless. The intentionality, purposefulness and severity of the inflicted pain or suffering must always be assessed as a whole and in the light of the circumstances prevailing in the given environment.
V2k is known to attack a great number of people world-wide. V2K is a computer artificial intelligence voice that can connect to a persons brain. These voices or system is capable of reading the minds of others and torture that person by speaking to the individual. There are multiple companies capable of using these machines called HMI, (Human to Machine Interface).
These voices can attack people from any age group or number of people. These communications on people are constant, without escape from the system. Please read the 68 page report from Dr. Max Williams of the state department. Dr. Williams examined 13 different people targeted by these systems and based his information and report on these causes.
The V2K study summary
AUDITORY TARGETS: A STUDY OF SYNTHETIC TELEPATHY, OR V2K, AN ASPECT OF REMOTE ELECTRONIC TARGETING (Max Harrison Williams et al., April, 2021) Executive Summary Many people claim that they hear voices that are not theirs and that they are the only ones who can hear them. Those voices are sometimes called synthetic telepathy, subliminal voices, and other names, but they are generally referred to as V2K, or voice-to-skull. The voices are transmitted to those persons from afar, or by remote, which means that the person or group sending the unwanted voices are unseen and the devices/methods that they use are unseen and largely unknown. This is the fourth of a series of studies made of the voices.
The purpose of this study is to examine the content of those voices to learn more about the tactics that the attackers use in their verbal assault. The study does not attempt to identify the attackers or the weapons that they use. Instead, it only analyzes what the attackers say and how they say it. This study attempts to broaden the knowledge of the reader concerning the phenomenon of the voices and at the same time dispel some of the beliefs that many doubters hold about those voices. Two Types of Voices Targets can actually receive two types of remote-generated voices: (1) “audible” voices, or those readily heard in the targets’ heads or brains (V2K); and (2) “Inaudible,” or “silent” voices, those projected at a very high signal and thus cannot be picked up by a target’s conscious. Instead, they are heard by a target’s subconscious. The latter is far more dangerous in that the victim is not aware of those voices that often tell him what to think, say, and do or what not to think, say, and do. Questions answered by participants in the study cover both types of voices. 1Targeting The voices are only one aspect of remote-delivered physical and neurological assault; thus, to understand the voices, one must also understand the concept of remote-generated targeting. If some person, organization, or group dislikes someone, if they wish to do harm to that person or seek to profit somehow from that person, and if they have the means to do so, that person becomes red-lined, or targeted. The attack process is called targeting, the end result of which is expected to be the neutralization of the victims. Neutralization can mean modifying their thought process and their behavior, totally isolating the targets, sending them to mental institutions or prisons, or causing their eventual deaths. We refer to the people behind the targeting as the attackers, or perpetrators, and the victims of the attacks as targets, targeted individuals, or simply TIs. The result of electronic targeting can only be seen as torture. Many targets believe that the targeting is a spin-off of neurological warfare experiments conducted by the military and the intelligence agencies of the US and other countries.
While the genesis of electronic targeting may have come from one single source, over the years, the method and the devices used to carry out the targeting have doubtlessly fallen into various other hands. An increasing number of people all over the world, and particularly in developed countries, report that they are being attacked by unidentified remote sources using unknown devices or methods to produce many harmful physical and neurological effects. Previous studies show that the number of targets has increased significantly since the early 2000s. Thus, targeting appears to be proliferating. This study concerns only targets in the United States, Canada, and the UK. Critics of people who claim to be targeted often suggest that the targets are instead victims of mass hysteria; however, they fail to describe an event that could lead targets to mass hysteria that would not also affect the entire American population.
Moreover, several thousand targets living in diverse locations who complain of many of the same remote-delivered results are not likely to be victims of mass hysteria. In fact, our experience shows that targets have already been suffering from those effects before they begin researching and communicating with other targets on the web.
You may click the link below that leads to the rest of the report. Courtesy post by Targeted Justice.
Copyright © 2021 Targeted and Trafficked - All Rights Reserved.