Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

13
Part I - Models of Synthetic Telepathy | Part II - Acoustic Signal Modulation | Part III - Working Models Part IV - Bayesian Stopping Criterion Part IV: Bayesian Stopping Critireon and the Optimization Thereom Allen Barker, March 22, 2003 This is the final article in this series on mind control mo dels, methods, and techniqu es. I think it is about finis hed, and there is not much I have not covered. I hope the a rticles help pe ople to und erstand these issues by providing models, terminology, examples, and language, and that the articles will help to expose and end the ab uses. I also hop e they he lp victi ms to heal from the abu ses infli cted on them. As a vict im of such harassment myself, I have described some things that have helped me to cope with and understand the true, hideous state of affairs. This last article builds on the basic model structure described in the first article of the series, "Models of Synthetic Telepathy." It also continues some discussion and observations from the second and third articles in the series, "Surreptitious Acoustic Signal Modulation, Voice Projection, and Direct Brain Interface;" also, "Working Mode ls. ". For a list of s ome o f the basic abb reviations used in these articles, s ee "Abbre viati ons." Parts of this current article can be read literally or figuratively, but the torture is completely real as are all the examples. Remember Part II of my earlier ser ies of articles, " Resisti ng the Mind Co ntrol State," at http://www.datafilter.com/mc/protestResist.html . If y ou ge t angry, focus your anger an d don 't be go aded into actions you have n ot fully considered. Act in aware ness, get the righ t ones, etc. The first s ection of this ar tic le discusses the optimizati on theorem and the Bayesian stopping criterion. Next, there is a section discussing triggers and general concepts related to triggers. Following that I discuss some of the social and p ropa gand a aspects of the US mind control syst em. There is then a section containing some gene ral comments and a sect ion containing more of my per sonal obser vations of harassment. Finally, there is an optional postscript on the mixed model for people into that. The Optimization Theorem I will start right off by stati ng what I call the optimizat ion theorem. What is bein g op timiz ed w ith this "theorem" is your resistance to the torture inflicted, as well as your ability to try to maintain your life as best as you can. The main context being discuss ed he re is dea ling with torture by voice-to-sk ull incoming, but the gene ral principle ho lds in much wider settings. It als o holds for the low er-tech surveillance-based cointelpro style of harassment, for example. Opti mization Theorem: It may seem paradoxical, but the best way to take action is to remain completely calm. This is not t he first impulse whe n subjected to hara ssment and g oading , and it is hard to do. It does turn out to be the most eff icient response. The be st way to slam a fis t back at the face of your pig harasser is to remain completely calm and ob serve it or igno re it. Work in the real wo rld to agitate for human righ ts and expose the abuses. It is lik e a greed y algorithm in computer science, versus an optimal algo rithm. The greedy algorithm takes the best move in an immediate sense but does not look ahead to take the best overall move. The optimal algo rithm will loo k ahea d a nd not necess arily make the locally most t empting move. Try to train yourself toward this imperturbability. If you do ge t angry, focus y our ange r, and let it moti vate you to something productive.

Transcript of Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

Page 1: Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

7/31/2019 Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

http://slidepdf.com/reader/full/part-iv-bayesian-stopping-critireon-and-the-optimization-thereom-allen-barker 1/13

Part I - Models of Synthetic Telepathy | Part II - Acoustic Signal Modulation | Part III - Working Models Part IV - Bayesian Stopping Criterion

Part IV: Bayesian Stopping Critireon and the Optimization

ThereomAllen Barker, March 22, 2003

This is the final article in this series on mind control models, methods, and techniques. I think it is aboutfinished, and there is not much I have not covered. I hope the articles help people to understand theseissues by providing models, terminology, examples, and language, and that the articles will help to exposeand end the abuses. I also hope they help victims to heal from the abuses inflicted on them. As a vict im ofsuch harassment myself, I have described some things that have helped me to cope with and understand thetrue, hideous state of affairs.

This last article builds on the basic model structure described in the first article of the series, "Models ofSynthetic Telepathy." It also continues some discussion and observations from the second and third articlesin the series, "Surreptitious Acoustic Signal Modulation, Voice Projection, and Direct Brain Interface;" also,"Working Models.". For a list of some of the basic abbreviations used in these articles, see "Abbreviations."

Parts of this current article can be read literally or figuratively, but the torture is completely real as are all theexamples. Remember Part II of my earlier series of articles, " Resisting the Mind Control State," athttp://www.datafilter.com/mc/protestResist.html. If y ou get angry, focus your anger and don't be goaded intoactions you have not fully considered. Act in awareness, get the right ones, etc.

The first s ection of this article discusses the optimization theorem and the Bayesian stopping criterion. Next,there is a section discussing triggers and general concepts related to triggers. Following that I discuss someof the social and propaganda aspects of the US mind control system. There is then a section containingsome general comments and a section containing more of my personal observations of harassment. Finally,there is an optional postscript on the mixed model for people into that.

The Optimization Theorem

I will start right off by stating what I call the optimization theorem. What is being optimiz ed with this"theorem" is your resistance to the torture inflicted, as well as your ability to try to maintain your life as bestas you can. The main context being discuss ed here is dealing with torture by voice-to-skull incoming, but thegeneral principle holds in much wider settings. It als o holds for the lower-tech surveillance-based cointelprostyle of harassment, for example.

Optimization Theorem:

It may seem paradoxical, but the best way to take action is

to remain completely calm.

This is not the first impulse when subjected to harassment and goading, and it is hard to do. It does turn outto be the most eff icient response. The best way to slam a fist back at the face of your pig harasser is toremain completely calm and observe it or ignore it. Work in the real world to agitate for human rights andexpose the abuses. It is like a greedy algorithm in computer science, versus an optimal algorithm. Thegreedy algorithm takes the best move in an immediate sense but does not look ahead to take the best overallmove. The optimal algorithm will look ahead and not necessarily make the locally most tempting move. Tryto train yourself toward this imperturbability. If y ou do get angry, focus your anger, and let it motivate you tosomething productive.

Page 2: Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

7/31/2019 Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

http://slidepdf.com/reader/full/part-iv-bayesian-stopping-critireon-and-the-optimization-thereom-allen-barker 2/13

Turn off y our (internal) moron anticipator. Recall that the moron anticipator is a thought process thatanticipates the likely reaction or response of a moron to something before you speak it or publish it -- or evenbefore you think it if your mind is being raped. Don't even interpret the pigs' incoming babbling as language.If the pigs don't get language, don't antic ipate language. Your moron anticipator is probably a lot s marter thanthem, anyway, and just gives them fodder for more harassment. They'll feed your anticipations right back atyou. The pig incoming is just a machine, or might as well be. My microwave oven always says, "E njoy yourmeal," after I make tea. I can tell it 5000 times that I only made tea, but it will not learn.

Don't imbue the incoming, the intrusions, with any meaning. You've probably gathered all the data that is worth bothering with on t hat rape channel. Don't verbalize mentally unless you are doing it for your own selfand want to. Don't explain unless you are doing it for your own self. If you are not anticipating a moronraping your private thoughts you will not be tempted to waste time and even dumb down your own thinking.(Of course you still need the anticipator for your public speaking, writing, etc. -- but even there, you don'tneed to go complete lowest common denominator or absolute most pathetic spin. You can assume somelevel of common sense, at least the 6th grade level of US discourse.)

You know how they operate. Anything a retard thinks will annoy, distract, anger, or otherwise get a reactionfrom you they will throw at you. Anything they think will traumatize you or terrorize you. Any triggers oranything else they ever see you responding to they'll pick up, bombard you with, and imitate. For example, Iresponded on once with sarcasm and anger when the pig said "don't criticize the government." They put thatin the harassment file and still repeat it over and over to this day. You might call it "the way of the jackal."

This is true in all models, whether RTIs or an autopig programmed by Major Mengele's software people andpsychological profilers.

They will not respond to reason or argument. They may reflect some phrases back, "Eliza"-lik e, to keep youengaged, but soon they reset the machine and go back to exactly the same things as before. They will dothis on any and every feedback channel (FIP) they can, from voice-to-sk ull to the internet. But you know theoptimization theorem. What they hate most is when you ignore them, tune them out, or drown them out, and

when you work regularly in the real world to end their human rights abuses. This is the most effic ientresponse. You can talk to a machine all day long, but then you have wasted another of your valuable daysand the machine has burned a few watts of power from the outlet it is plugged into. My mic rowave oven says"enjoy your meal" after it f inishes cooking something, but I am not tempted to talk to it. I can try to tell it Ionly made tea and did not cook a meal, but it will not learn.

The optimization theorem is not a form of "learned helplessness," even though victims are put in exactly thesorts of positions where such responses tend to arise. The victims literally cannot escape from theirtormentors, who truly do abuse victims like an experimenter shocking a dog for weeks on end to see howlong it keeps on jumping. If the victims die, freak out "psychotically," or commit suicide that is justamusement and data to them -- perhaps making the experiment a resounding success . But human beingsare not dogs, and have not only fundamental, inalienable human rights but also the power to reason. Theoptimization theorem is the result of reasoning about the true situation, and which variables victims currentlycan and cannot control.

Knowing the optimization theorem intellectually is easy. Acting like you know it is diffic ult. The pigs useevery playground trick ever invented to goad, taunt, harass, and annoy you. They sink to any level toattempt to demean and manipulate you. They want to anger condition you, in addition to trauma conditioningyou. Emotionally, also, it is heavy, oppressive stuff to know that there are other "human beings" in your own

society who not only want to inflict such suffering, but actually do it to you each day for their gleeful sadisticpleasure. Inside your "private" home and even inside your mind. They are the equivalent of Auschwitzguards; it is that level of depravity.

There are many similarities t o the Holocaust, but there are also important differences. Open repressionversus secret, c overt, deniable repression. Being driven to suicide vs. shot or gassed and burned. Peoplecontrolled in their brains by external pigs versus lock ed up in concentration camps. The pigs don't even haveto feed and house their distributed concentration camp victims. I heard one pig in the background of theincoming say one day -- and I do not know the full context -- "she does what she's told." In a purely physicalconcentration camp at least the victims still have their own private thoughts.

An important difference from a physical concentration camp is that the "walls" are, to a large extent,psychological ones. At least for now, victims still have some control over their own minds -- which are the

walls of the camp. It is as if by concentrating and focusing their attention someone in a concentration campcould dissolve the gates and guard towers, and perhaps expose a few Nazis also. Not that this is easy at all,and it in no way shifts the blame to the victims for the hideous atrocities infl icted on them. There are sti ll

Page 3: Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

7/31/2019 Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

http://slidepdf.com/reader/full/part-iv-bayesian-stopping-critireon-and-the-optimization-thereom-allen-barker 3/13

physical effects lik e Delgado buttons and voice-to-skull transmissions. There are basic conditioning effectsthat are "hardwired" into human physiology, and real physical damage from torture, harassment, and stress.And of course there is all the low-tech cointelpro stuff that accompanies and intensifies the otherharassment.

Emotionally, there is still that death camp air. You look at people and you know . You saw groups of themconspiring to drive you to suicide or make you an empty, controlled, mindless, husk. All while others stoodby doing nothing or even cheering it on. The ignorant and expedient who know something of what is going on

often rationalize that the victims somehow "deserved it" -- while the true criminals as bad as the worst on anydeath row are treated as respectable citizens and live among normal people. This can lead to a sense ofapathy after a while, and disgust with human nature altogether. These people were fellow countrymen, andoften "friends" and acquaintances -- or even family members. So there is a strong element of betrayaltrauma along with all the rest of it. I hope the learning curve for some other vict ims can be cut down to thepoint where this does not happen, and they can learn all of this before their lives and anything they still careabout are completely destroyed. I hope these essays help to take away the elements of surprise andsecrecy that tend to keep the walls in place, and reduce the learning curve for other victims.

Bayesian Stopping Criterion

Besides remaining completely calm and working in the real world to expose and end the abuses -- as in the

optimization theorem -- at some point you should start training yourself to completely ignore the mind controlharassment as much as possible. (That is only the goal, don't feel bad or blame yourself if it is diff icult in theface of all the abuse.) When you are first harassed you typically do not know what is going on, and so evenif you remain calm you still need to study and observe what is being done to you. You need to know, anddon't want to be manipulated by it. At s ome point, though, you have gathered enough data so that you havethe picture pretty clearly. A million examples, no counterexamples, call it a rule and be done with it.Measurements and observations have a cost ass ociated with them. In Bayesian analysis this is k nown asthe Bayesian stopping criterion. It is based on the concept usually referred to as diminishing returns.

Below are some sample internal dialogs. They are meant to illustrate the points and provide examples, ratherthan to tell anyone how they should think. People have their own thought sty les in their free minds. Don't beafraid to think anything, even if it is something that tends to set off a pig barrage. If they get one little wedgein there they'll try to open it wider. Don't cede one millimeter of y our free mind and free thought.

This first internal dialog is an earlier one, before the stopping criterion was reached. Imagine RTIs andautopigs babbling their gibberish and trying to play psyop mind games in between each sentence. This wouldbe stretched out over some time period or would be a period of intense torture incoming. Between this you

would try to have your normal mentation, as normal as possible under the circums tances.

shut up, pig. did that fool anyone? how about that one? pig babbling gibberish. we

all know how they operate. did that fool anyone? what's the Cameron number on that

one? shut up, pig. PBG. that's an autopig of one variable, simple syntax

transformation. that damn machine. it's a machine, with a few RTIs. shut up pig.

that's 30,000 times conditioning that crap. that was an SCP triggered by a bad parse.

list-reading monkey. that was one trick pig trying to feed back my anticipation. that's

timid boy, trying to induce anxiety. trigger abbreviation. my entourage of simulatedborderline retards.

Below is a sample script of some more current internal dialog. In it you don't care what they even

tried to say, or whether it was an autopig or an RTI. Again, imagine a pig trying to say something,

the usual garbage, between each sentence. Each sentence cuts off a pig or even anticipates it before

it spews its garbage.

kill it. that one too. and that one. kill that one. I don't care what it tried to say. kill it.

cut their pig throats. I don't care. kill that one. I don't care what model, and I don't

care how it happens. kill that one. kill it. it doesn't matter what kind of lies and BS

come out of their pig snouts. cut that one's throat. kill that one. kill that one too. no

exceptions. it doesn't even get language, it just gets its pig throat cut. kill it. kill it. kill

Page 4: Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

7/31/2019 Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

http://slidepdf.com/reader/full/part-iv-bayesian-stopping-critireon-and-the-optimization-thereom-allen-barker 4/13

that one. bad parse, kill it anyway for trying to say something, that's even better. kill

that one. kill it. kill it. fake ambient, kill that one. kill it. first metaphorically, then

literally. kill it. find it, make it dead. kill it. what is that one's name and home

address? that's all, kill it. I don't care how it happens. I don't care what model. I

don't care what it tried to say. cut that pig's pink pig throat. track that one. lock on.

fire. I don't care, pig. find that pig and kill it; that's all that one ever hears. I know

how the machine operates.

It doesn't matter if they're RTIs or autopigs in this script, internally. All incoming gets cut off with the samething. You do not bother after the stopping criterion to even sort them into RTIs vs. autopigs. In that senseit is model independent. If i t is an autopig rather than an RTI then kill i t means kil l the machine operator andanyone else involved in the real world, and metaphorically any influence it has in your brain. Train yourself to

just cut them off. It works literally and metaphorically , internally and ext ernally, for RTIs and autopigs, andfor all models. It is so model-independent it is scary.

In addition to the usual autopig babble, there are also certain phrases that tend to be stereotypically repeatedafter you "respond" to one of their primary phrases. Some examples: "took you a long time to see that," "areyou sure" (a timid boy variant), "that helped you" (operant conditioning positive reinforcement), "made yourespond." These occur just as mechanically as the primary phrases, and typically because they saw you

respond even once, or you once let the phrase slip by as a "legitimate" incoming. Kill these ones too; don'timbue them with any meaning either. They are just there to keep you listening -- they've never sent a 6-digitprotocol confirmation either.

Alternate the above "kill it" training with periods where you completely ignore them, and "say" nothing to themin your internal dialog. This is the goal, but sometimes you need to train in the "kill it" mode and shift intothat, especially if you have heavy incoming. If you have to do that all day it is better than listening to onerapist pig babbling. I call a temporary shift to "kill that pig" mode "taking a coffee break." If you find yourselftempted to respond, or distracted, go back to the above and train yourself some more to cut the pigs off and,most importantly, don't even consider what they try to say. It is not even language, it is a nonconsensualcattle prod to the "ugly spot" on your brain where that incoming arrives.

Nature and source, and sensation. Optimization theorem. When you are completely calm and their crap

does not affect you at all their BS just hangs in the air, stic king out like a sore thumb. It does not even getmeaning. It then tends to fade out and wait for another chance when the jackals think you are vulnerable orneed to be punished for a thoughtcrime. At s ome level you are aware of it even as you ignore it, becauseyou don't want to be subliminally manipulated, but it is off encapsulated in some distant zone that has noeffect on you.

Any time you want to switch modes to completely ignoring them, invoke IFT to clear out all the previousmental crap. Come into the present: Poof, you're there. If you notice you're thinking thoughts that areunproductive or that you don't want to be thinking (like being influenced by externals), invoke IFT, poof themout of exist ence, and come back to the present. Switch to "kill it" mode if necessary. (Or whatever worksfor you; that works for me.) "This is my free mind, and I can think anything I want right now. What do I wantto be thinking?"

Pattern recognition is a beautiful field of study. But I mean really, just with common sense, how manyrepetit ions does it take before you see the pattern? If you see it, how long does it take you to act like youknow it? Do 10,000 repetitions suffic e? 20,000? More? When you see how they do it it is not thatcomplicated, just vicious and jackal-lik e. At that point it is nothing but Chinese water torture. A drippingfaucet forced to the brain can inflict the same torture: drip, drip, ... drip. When they want to punish a"thoughtcrime" they intensify the goading, and similarly when they want to degrade your performance in

working on something, etc. This is the "rheostatic capability" of the torture device as a variable aversivestimulus and performance-degrading weapon.

Don't worry about a false reflection -- or any reflection of your private thoughts off of a thought-rapist, for thatmatter. By NPT you do not care about a rapist Nazi pig's opinions. If y ou are on a baboon safari in the midstof baboons, you do not care what they are hooting at you unless you are studying baboon hoots. You canstill gather data, but at some point that should become almost automatic and calmly detached. After a fewyears of mind control torture there is not much that can surprise you. Disgust you, disappoint you, anger youstill, but not surprise you.

Page 5: Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

7/31/2019 Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

http://slidepdf.com/reader/full/part-iv-bayesian-stopping-critireon-and-the-optimization-thereom-allen-barker 5/13

Kill the pigs. First metaphorically, then literally (though if you can do it literally first it will save you andprobably a lot of other people some trouble). If they are 70 years old 40 years from now, kill them.Wiesenthal on those Nazi pigs. I don't care what model and I don't care how it happens. (Barring someactual justice in the meantime where the pig is sent to a humane prison cell.) I mean that quite seriously,

with whatever influence I have in whatever s ense. I don't even have a "need t o know" how it happens forthose purposes (though I do have a "need to know" what all has been done to my body, mind, and health).These pigs torture people to death for entertainment, and they will keep doing it until someone slits theirdamn throats or locks them up. That is a sad fact, but not liking it does not change it. How many more

people are going to be tortured if they are not stopped?

Is the FBI going to "visit" me for calling for literally killing some sadistic torturers it insists "do not exist"?Who use torture implements it claims do not exist (but which it knows do)? For calling for some action to do

what should have been their job of ending domestic torture and arresting the torturers? Even if the torturers work for the government -- or especially if they work for the government -- the FBI is one agency that should have taken care of this a long time ago.

If it is n't a six-digit numeric, k ill it -- and even then it's your discretion. The sadist pigs torture forentertainment. They try to destroy people's minds and drive them to suicide. It is a repeated and ongoingconspiracy of torture and attempted murder. Kill them. First metaphorically, then literally. Get the rightones, though, and don't be misdirected by their psyops. Kill them. You don't care what they tried to say.The very fact that the pig nonconsensually and intentionally intruded on your free mind: kill them. But do it

on your own schedule and the way you choose to optimize -- don't be goaded or taunted into actions.Optimization may not even involve you literally killing them, but rather working to facilitate that or otherwisestop them; remember Part II. In any model, they've weaponized nonconsensual access to people's minds,trying to turn citizens' minds, accessed against their will, into battlegrounds.

In the usual sorts of spin that one might anticipate being used against this essay, people might insinuate thatthis is somehow against my religion. But I do not belong to any religion which tolerates its people -- or anypeople -- being tortured or made into slaves. Some might spin that I am hypocritical because I am"advocating the same things the pigs do." But I am not. Don't torture them, kill them humanely. I'd preferthey end up in humane prison cells, but for the time being the routes to that sort of justice are beingobstructed. There is also a false symmetry implied between torturing, slaver-like exploiters and those who

would help the victims . Between people committing vicious crimes and those who would use necessarymeans to stop them.

For victims it is purely self-defense, because it is clear the pigs are trying to murder them every day and willnot stop unless forced to. Some people may misapply or misconstrue what I am saying here, but I cannot

worry about how every moron might misunderstand or misapply (purposely or not) the things I write. We aretalking about literal, ongoing, protracted torture and the sadist torturers commit ting these acts. And we'retalking about justice.

There are sadistic pigs in this world who try to torture me to death and inflict any sort of psychologicaldamage they can. That is just the way it is right now -- my not liking it does not change it. It isunderstandable to feel some sadness for the pitiful pigs and wonder why they are so sadistic, vicious, andstupid. But it is a waste of time -- and that is for the RTIs, never mind the machine APs. They'll play off ofeven the emotions of pity and contempt, jackal-like. Don't be fooled by the clown suits and never Stockholmsyndrome on the torturing pigs. Even the obsolete Model 100 autopig is still Chinese water torture, dripping

from a high-tech faucet. Kill the pigs responsible, metaphorically and literally.

We all know now how they operate, so no one will be surprised. They won't st op unless they are made to.They may back off a bit if the heat is turned up, but soon enough they'll be right back to it. They'll even keepusing the exact same triggers on me that I have written about here and described to everyone. It is similar toa scene in the movie "Jackass" where the practical jokers are annoying a golfer by sounding a loud soundevery time he gets ready to hit the ball. They keep doing it until he gets so mad he decides to drive a ballstraight at them. When he gets ready to hit the ball at them and draws the club back they set off the soundagain. That is the sort of harassment, the level of the big superpower's domestic polit ical control torturetechniques. Exc ept it is inside people's minds, 24 hours a day. In their homes. Destroying their lives. Andthe harassers cower in their hiding places far away inflicting the harassment. Instilling the triggers to bepassed along to those who can use them to repress deniably while acting like the blood is not on their hands,too.

Triggers and Related Concepts

Page 6: Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

7/31/2019 Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

http://slidepdf.com/reader/full/part-iv-bayesian-stopping-critireon-and-the-optimization-thereom-allen-barker 6/13

A trigger is some verbal phrase or sound (or image, etc.) which has special significance to a vict im. It is astimulus that has been selected or conditioned to cause a response in the victim. Very often it is a linguisticstimulus. Classical conditioning is often blatantly carried out to condition a victim to associate trigger words

with trauma. I have had hateful-sounding RTIs spend hours in torture sessions trying to condition me likePavlov conditioned dogs -- except with the desired response being trauma.

To get an idea of how triggers work by an extremely un-subtle but close analogy, imagine the following.Consider a Paraguayan detention center of a few decades back, with brute torturers using direct violence,

electric s hocks to the genitals, cattle prods, etc. (and perhaps a CIA "adviser" looking on). Now suppose avictim in this detention center is undergoing a torture session. Each time the torturer zaps the victim with acattle prod he shouts out "beautiful pleasure sensations." He does this over and over. Now suppose thevictim surviv es and somehow escapes. The victim is still in a society set up to deny that the torture centerdown the road even exist s. If the victim starts to speak out she may open up the controlled newspaper thenext day and read a story alluding to her and repeating the phrase "beautiful pleasure sensations" a fewtimes. People may walk up behind her on the street and mutter "beautiful pleasure sensations." If sheresponds with outrage and anger she is ridiculed. Most people do not know the situation of why thatinnocuous-sounding phrase would make her respond like that, and they may be so naive as to think torturers

would never do that to conceal their vicious crimes.

Much of the whole current mind control system in the US is based around triggers. Once a trigger is instilled,that is only t he beginning of it. Note that a trigger is not necessarily a strongly conditioned phrase (SCP) but

strongly conditioned phrases tend to be triggers. For example, they may trigger you with some words meantto remind you of a traumatic situation they observed or caused and have it work the first t ime. If s o, they'lltend to repeat it over and over, resulting in a trigger that is also a "psychic driving" SCP. Here are a few othertrigger-related concepts:

trigger reinforcement -- This is where the trauma associated with a trigger is induced by the trigger and thentends to further reinforce the trauma conditioning. It is a vicious cycle: Trigger, trauma, further association ofthe trigger to the trauma, trigger again, etc. (If you anticipate a trigger they also tend to quickly send thattrigger to reinforce your anticipation.) If they think they see you experiencing any strong negative emotionslike fear, trauma, or doubt, they'll jump in with a trigger to both reinforce the trigger's negative associationsand to intensify your pain and distress.

trigger abbreviation -- This is where a trigger is shortened to just one small part of the original trigger

phrase. For example, it may just be the first word of the trigger phrase with its characteristic inflections.Other abbreviations are possible, in the general sense of associative keying of triggers. SCPs tend only toneed a hint of a key presented to evoke the full trigger and concomitant response -- and before long theabbreviation works as well as the trigger itself. SCPs leave strong "attractors" in the space of brain flow, as aform of brain damage. Even just the characterist ic rhythm pattern of an SCP will tend to evoke the phrase.Random events also tend to evoke SCPs, a fact which acts as a "torture multiplier."

trigger speedup -- This is where the trigger phrase is speeded up. It is very s imilar to trigger abbreviation,and still tends to evoke the response. They presumably hope to "slip it by" your conscious awareness of

what is going on.

trigger transfer -- This is where a secondary trigger is conditioned to the conditioned response of a primarytrigger by pairing them. It c an also occur in a slow evolution of a phrase like children's sing-song taunts

slowly morphing into other phrases and nicknames but keeping the same meaning.

trigger export -- Once a trigger has been instilled in a victim, anyone can use it. It will tend to set off atrauma response or other unpleasant reaction in the vict im. So the direct torture squads instill and inducetriggers in victims and then pass trigger lists on to higher-level operatives. These agents can then use thetriggers against the vict ims without "getting their hands dirty." After a few layers of trigger transfer, theresulting trigger will seem innocuous to someone who does not know the torture conditioning that has goneinto it. That is part of why they purposely use trigger transfer. These "innocuous" (i.e. deniable) triggers maybe worked into propaganda, internet messages, or street theater, for example. This turns out to be a verycommon control technique for suppressing mind control victims in the US, and it is obvious once you see

what they are doing. This may be part of why they seem to prefer linguistic triggers.

A common source for triggers is surveillance of a person's home or mind. Certain codewords tend to appear

on a FIP alluding, for example, to what the vict im did the night before in "private." If the victim responds,such codewords may be treated as triggers and further conditioned. By the way, once you know you areunder conspicuous surveillance they will then start to insinuate that they know some other things from the

Page 7: Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

7/31/2019 Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

http://slidepdf.com/reader/full/part-iv-bayesian-stopping-critireon-and-the-optimization-thereom-allen-barker 7/13

surveillance, such as that your spouse is cheating on you. That typically is not true, but has the obviousintention of trying to destroy the victim's family and personal relationships.

Much of such conditioning is blatant anger conditioning: Those conducting the surveillance want to taunt thevictim with their power to violate the victim's privacy and induce anger. There was a court case a few yearsback where a reputed mobster was placed under surveillance. Those conducting the surveillance wouldfollow him on the street and repeat things to him like what his partner said during sex. The obvious intention

was to demean and anger him. He ac tually won a lawsuit to curb the harassment, unlike the many ordinary

citizens subjected to similar and even more egregious abuses. Yes, they would do that, they have done that,and they still do that.

Another common thing is for codewords to imply some sort of terror, extortion, or blackmail threat: to revealsomething those conducting the surveillance think you will fear having revealed, to do something they thinkyou fear might happen, even to harm people. With the threat to embarrass, for example, they ty pically don'tactually reveal their raped information except perhaps in whispering campaigns or insinuations. What theyreally care about is the threat and the potential to manipulate the person with the threat -- as well as theirimportant goal of maintaining deniability.

Many vict ims report intense bouts of cointelpro-sty le harassment when they first c ome under assault. Theother sorts of mind assaults often accompany the cointelpro attack s or are gradually added. Then for manyvictims the cointelpro-style low-tech harassment subsides to a lower-level background while the other mind

control assaults, voice-to-skull, etc., continue. I have long suspected that this is quite purposeful. The ideabeing to first massively traumatize the victims and induce PTSD and other torture sequelae in order to makethem more susceptible to the mind control harassment. Hyper-alertness and rational paranoia canaccompany such torture, for example. ("They really are out to get you.") This might "prime" the victims tobe more sensitive to the more subtle tortures and psyops that they otherwise would not notice as readily.

Conditioning introduces a bias in the lower-level sensory data processing. This is t he hardwired, Pavloviansort of layer: antic ipating, responding. The higher levels have to be aware of this (consciously one mightsay) and take it into account. To train oneself take such biases into account and hopefully uncondition theresponses -- or at least understand that's all they are. This holds in all situations, but is purposelyaggravated for the purpose of torture and manipulation in the case of conditioning with psychic driving SCPs.

Sometimes Major Mengele comes up with some phrase that he is just sure will cause trauma -- presumably

by studying the transcripts of y our torture sessions and applying his psych training. He then gives thisinformation to the RTIs and the autopig programmers. The phrase is then repeated over and over, even if itdoesn't actually work. They are so hopeful about some phrases that they just keep repeating them,presumably because they think they should work. For example, after they finally destroyed my marriage andmy wife decided she could not live with a mind control torture victim and activist any longer, they startedrepeating, "y ou're impossible to live with," over and over and over. The intention was obvious: Taunting thatthey ripped my wife away from me and hoping to tap into the trauma of that s eparation. It was so transparentto me what they were doing and what they intended that it did not work, but they k ept repeating it. They'llalso chant over and over other phrases like "you can't have no kids" to try to anger me based on their family-destroying abuse -- literally, that is what they do.

The pigs try to induce new anxieties and exploit any existing anxieties you might have. They want to alwaysstay c owered in their bunker but inflic t the maximum psychological trauma on their victims. If they think you

are worried about microwaves (or will become worried about it), a favorite autopig phrase to send at you is"we're microwaving your whole family ." Literally, they sent that one over and over. To me it has almostbecome symbolic of how they will sink to any depths to induce trauma in their victims, by saying anything,as long as they can stay hidden in their bunker. How many victims were there who got traumatized andterrorized with that, when there was no microwave and only a vicious psyop? How many got hospitalized ordriven to suicide? Not that I would entirely rule out the microwaves or any other of the new technologiesbeing developed and tested, but typically t hey'll lie about even that so you think it is something else. Even ifyou think they are testing such technologies on you, panic only makes things worse. It is horrible but youalmost have to come to the point where you just shrug and observe, say, your heart beat irregularly a fewbeats. Are they going to murder me this time? They've already killed me over and over. The optimizationtheorem applies here, too.

Victims, Society, and Propaganda

The suicide inducement squads attack y ou with third-grade taunting machines, in secret. They subject youto torture inside your home. They sleep-deprive you. This goes on for years. Then if you write the truth in

Page 8: Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

7/31/2019 Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

http://slidepdf.com/reader/full/part-iv-bayesian-stopping-critireon-and-the-optimization-thereom-allen-barker 8/13

the appropriate language for the crimes against humanity being committed, they'll criticize you for not writingsome dry academic tome. If everything I say is the case -- and it is -- how should I respond, react, or write?The academic tome might let me play at some sort of externally bestowed "respectability" that I frankly don'tneed to worry about, but it would also be placed on a shelf with other academic tomes to gather dust and noaction. When I try t o write a math paper or write computer code I get increased harassment directed at mybrain. So what is the priority, the most important thing to work on? How should atrocity sound from someoneunder torture? When I also know that they torture many other people in the same way they torture me?

When they insinuate that a torture victim should be "diplomatic" they really mean you should shut up or atleast become easier to ignore. How diplomatic is their goddamn third-grade taunting machine? I call thempig filthy Nazi pieces of human garbage because that is what they are. They torture people to death forentertainment, profit, and political control. They want to portray themselves as all clean and dainty, whilethey have paid their thugs to drag their victims through the pigsty. How "diplomatic" was Frederick Douglass

when he excoriated the abominable US institution of slavery?

The pigs seem to think if they can pick some citizen, harass and torture them, and install various trauma-conditioned triggers, then they get to "keep" them as slaves. If the victim speaks out, the pigs spew traumatriggers and psychic driving triggers intended, presumably, to re-traumatize the victim into silence. A curiousthing is how in the larger context the conspirators seem to use the same codewords and triggers almost as asymbolic language or a "currency" among themselves. There do seem to be different political fact ions evenamong the conspirators. Maybe they're trying to reinforce their conspiracy, rallying sadists. Spreading

triggers. Perhaps they are trying to intimidate any co-conspirators who might develop a conscience. Whoknows.

The victim, seeing this, may be tempted to be dismayed at just how widespread the conspiracy is -- thoughbe sure to calibrate relative to a "normal" background as discuss ed in "Mental Firewalls." The actual smearagainst the victim is really nothing, just as Mengele cannot truly discredit or impugn the morals of a victim hedissected and exploited. Often you need to stop and think: A nyone who knows what the trigger is at all, inthe first place, almost surely knows that too. "But wait, if they knew that, they'd know that too" exposesmany of the fallacies of the harassers. If they know about the codeword triggers and the conditioning thenthey also know it is a vicious human rights abuse. We basic ally have a conspiracy of secret slavers trying tohold on to the free citiz ens they have abducted and treated as their property. They have experimented on,harassed, manipulated, exploited, and profited from these human beings. The whole coded load of crap istheir way of trying to maintain their secret atrocities, their crimes against humanity.

They'll "rate" you as if your attempts to end ongoing torture and human rights atrocities are some sort ofentertainment. They'll torture you 24-hours-a-day for years and then, if this performance-degrading weapon

works at all, they'll play at being critics of your "performance" -- treating the torture as if it didn't exist, ofcourse. This includes your private life in your home as some sort of "performance" for voyeur/spectators, not

just your public work. They view every action you make in living your life and trying to succeed andaccomplis h something as if it were only part of their sordid "game" that they dragged you into. The want tokeep their victims suppressed and keep them from positions where they will have a voice or any realinfluence -- all because the victim got dragged into the torture in the first place and it is self-perpetuating.They don't want their victims who resist to succeed at any endeavor -- though they don't mind exploiting themand stealing from them anything they can. If y ou speak that truth, even after they've harassed and torturedyou for years, they'll sneer that you're just making excuses.

Where you would think any ordinary person would long ago have stopped beating a dead horse,propagandists just keep on going with the same tired triggers and insinuations. Perhaps they figure with theirgreater distribution power they can repeat something over and over to make it "more true" (when it was all BSto begin with). Perhaps they do not want to change the triggers because they have invested so much effortin trying to get their audience to pick t hem up from the repeated subtext. And invested hundreds ofthousands of Cameron repetit ions to condition the victims. But as above, those who know what it meansalso likely know how phony it is. So what is it really saying? Is it lik e some "Heil Hitler" declaration ofallegiance to the Gestapo? Is that the true meaning?

The pigs exploit your desperation. You are under torture. You are rightfully desperate. The "bad Nazi" isharassing you. So the "good Nazi" has an opportunity. The "good Nazi" keeps promising to help you. As atorture victim, you tend to keep paying attention to the "good Nazi," because there is no alternative. In the"real" world no one even knows (or admits to knowing) what is going on. You are under an intolerable torture.The "good Nazi" exploits this. The "good Nazi" c an even turn "bad Nazi" from time to time and the vict im willstay tuned in, because that seems to be the only hope. The "good Nazi" will promise help and anything else,as long as it is only between the lines or otherwise deniable. The "good Nazi" c an appear on any FIP, for

Page 9: Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

7/31/2019 Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

http://slidepdf.com/reader/full/part-iv-bayesian-stopping-critireon-and-the-optimization-thereom-allen-barker 9/13

example as another voice on the nonconsensual voice-to-sk ull send. Or it might be a collaborator on anormally legitimate channel -- pigs at a Mockingbird newspaper, for example. But if you buy the bait theydangle to a desperate human being under torture, they then start trying to manipulate you. Whoops! If onlyyou hadn't done that! Well, your freedom was all lined up if you hadn't done that! Your basic human rights

will be restored s oon, if only you will...

Why would anyone listen to some pig voices in their head once they know they are externally induced?Exc ept to track down those harassing pigs and kill them? It is more than obvious that they are not

"friendlies," that they are quite intentionally violating people's minds without consent, and that they try toinflic t harm. They may be Russians for all you know. It is far more likely they are other Americans -- butthat is hardly any better. People get furiously angry if you cut them off for a parking place, but somehow

when strange voic es invade their brain and either harass them or try to direct them they act like it isnothing... People tell their children not to talk to strangers, but then these pigs invade their little heads, too.And people either think this is somehow normal or are afraid to talk about it. (And Americans have the nerveto taunt the French as "surrender monkeys," etc.)

It takes a nation of millions of idiots to produce the third-grade taunting machine. "Puritanical" prudes whopractice sadist ic, v oyeuristic, serial rape in secret. And people dumb enough, duped enough, intimidated andcowardly enough, complicitous enough, or just plain evil enough to do nothing as the big superpower third-grade taunts its "free" adult citizens. The pathetic clown suit does not hide the vicious psychologicalmanipulation and Chinese water torture of citizens in their homes and minds. Their rape violations are not

really about sex, though they are obsessed with it; the violations are about power and trying to demeanpeople and strip away their dignity. This is the "secret weapon" with which the big superpower tortures its owncitizens.

General Comments

These days, in thinking, I tend to have a habit of considering certain conclusions across different models.Are there model-dependent assumptions there, or does it hold in all models? If it passes a quick test formodel independence, I say to myself, "put a star by that." That assumes the "usual" set of models which Irun things against. Recall that a model independent conclusion or decision does not depend on theassumptions of any one particular model, so is stronger in that sense than a model dependent conclusion.You can put more faith in it and act like you know it, without worrying that you'll have to backtrack if youchange models (even hypothetically, in conditional evaluations).

A slightly weaker condition than model-independent (or model-neutral) is "model-interpretable." Modelinterpretable means that you have to interpret the situation slightly differently in the different models, butsubject to that common-sense level of interpretation it holds in all models. An even weaker condition I call"metaphor-interpretable." For some situations metaphor-interpretable is good enough; for others you wantmodel-independent or model-neutral.

The thoughtcrime known as applied logic. There is no such thing as a thoughtcrime. Only some fascis t who wants to dictate what and how people are allowed to think.

New named RTI/AP: "one trick pig" rapes your anticipation, bad parses, or pre-verbal and feeds that back atyou -- usually in a pure syntactic rearrangement. Don't let "one trick pig" unnerve you. This pig (or algorithm)is similar to people who try to anticipate and finish your sentences for you, except it is on an illegitimate rape

channel and has pure evil intentions. It ty pically doesn't even understand what it rapes. It hopes to grabsomething from your own thinking and reasoning process that it can incorporate into a trigger which will get areaction from you. Or else to reinforce your anticipation of exist ing triggers (trigger reinforcement). In this

way they try to turn your own fears, anxieties, and antic ipations against you, to create new triggers for theirtrigger file. They are feeding pieces of your own thoughts back at you.

I can just see the PowerPoint slide shows the Mengele-pigs give in secret Nazi meetings, describing theirnonconsensual human experimentation on the domestic population. The "brave warfighters" hiding inbunkers are helping to keep us "free" by torturing helpless domestic citizens so they can study:

stress responses

decisionmaking under stress

"anomalous phenomena"

behavior control

neural prosthesis and thought cloning

Page 10: Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

7/31/2019 Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

http://slidepdf.com/reader/full/part-iv-bayesian-stopping-critireon-and-the-optimization-thereom-allen-barker 10/13

conditioning and verbal triggering

linguistic behavior modification

covert hypnotic suggestion

sleep suggestibility and dream modification

sleep deprivation

electromagnetic bioeffects

stimulus-response measurement and modelingbehavior modeling and prediction

fake paranormal deception operations

etc.

I'm sure they give a completely different PowerPoint presentation full of lies to the legislators and otheroffic ials who pretend to have oversight powers on such activities. If they even bother to tell them at all.They may just not mention it, or claim it is too secret for Congress (except perhaps for their lapdogs there).They similarly keep the truth from anyone in any other branch of government or position of oversight orfunding with any sense of decency and responsibility. In reality, they are running a treasonous covertpolitical control operation in the domestic United States that surpasses in reality even Orwell's imagination.

[A pathetic spinner would try to distract from the main point here and create divide-and-conquer rifts byinsinuating that I am smearing Microsoft by mentioning PowerPoint®. Or maybe I typed a bad word a fewsections back in describing torture, and that is supposed to distract from the literal atrocities beingdescribed. They literally brought obscenity charges against papers which reported the My Lai massacre inVietnam.]

Here's a practical, low-tech countermeasure against audio harassment to try. It is working on the symptomsrather than the cause, but I have found it to be helpful. It has its own appeal for those with an ear for music:

get a CD changer with 5 (or more) slots

get some CDs from artists you trust with your mind

set the player up for repeat play, random or sequential, as per your tastes

keep it on as background, and tune in to it when you feel distracted by the other crapchange out the CDs when you feel like it

No commercials, no announcers, and so no worries about any harassment hidden there. No surprise songs.Just good music (presumably, by the fact that you selected it).

This will hopefully provide some level of relief, at least while you try to heal from the injuries of previousassaults -- along with the ongoing assaults. The harassers don't want vic tims to even be able to relax; they

want to keep the sparrows flying until they die from exhaustion. One wants to be able to ignore the Stasi-likepigs' harassment, and it is unfortunate that you cannot just enjoy the sounds of quiet in a "free" country, butdon't be masochistic. They try to shove people into second-class citizen status with constant harassmentinside their homes. When subjected to this you need time to heal, and music can be healing as well ashelping to mask the torture signal.

Further Empirical Observations of Their Methods

In the previous articles of the series I described some of my own observations of the sorts of technologiesand techniques they have used on me. Here I present some further observations and analysis.

In further observing the audio harassment, I think the "cricket algorithm" illustrates a general method theyuse. Recall that in this harassment they speak some harassing phrase, syllable by syllable, with eachsyllable triggering off of a cricket chirp. "Your mas tur ba shun tech nik.. .," for example, with each syllablefollowing right after a cricket chirp. (To use one of their favorite pathetic third-grade taunts as an example.Yes, they really do that to adults in their homes in the US. Pure water torture.) This exact same thingoccurs when listening to recorded cricket s ounds, and changes with each playing. They've tried tosynchronize it to fool me into thinking it is on the tape, but they cannot deal with random starting places onthe tape and tend to start the phrase from the beginning regardless of where the tape is. The same algorithmalso tends to be applied to the pinging sounds that certain trucks make when backing up, for example.

Page 11: Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

7/31/2019 Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

http://slidepdf.com/reader/full/part-iv-bayesian-stopping-critireon-and-the-optimization-thereom-allen-barker 11/13

On further observation, that also seems to be how they synchronize the voice send with things like therefrigerator. It s eems as if they first localiz e some roughly periodic part of the signal and filter out the rest.They then threshold that signal and trigger syllables off the peaks (rising edges, for example). Anothertechnique, for basic "hum" signals, seems to involve first loc alizing the frequency band of the hum. Theythen take the RTI or autopig audio and limit it to that same frequency band. They then send this frequency-limited signal voice-to-sk ull. Sometimes the frequency-limiting is quite blatant. The same "voic es" andphrases tend to occur on all the different frequency bands, as well as on the cricket algorithm.

I'm sti ll not sure how they give the illusion of directionality to the signal. It may be some property of the earor auditory cortex that they are exploiting. Another possibility I 've considered is that they may be using aFourier series sound representation but using one of the ambient frequencies as a fundamental harmoniccomponent. I stil l do not rule out that some of the harassment may be actual modulation of the ambient.They could easily be using several techniques. I also suspect that sometimes they may modulate the powerline only to increase the hum, rattle, and periodic components of things like appliance noise -- which theythen overlay with the voice-to-skull cricket algorithm or the frequency-limited hum algorithm. This would givethem more bandwidth in which to hide their "subliminal" signals -- or at least with which to misdirect thosevictims who consciously noticed as to the signal's true source.

Another observation I have made is that during times of strong, obvious incoming there is often a noticeablescalp sensation. (It is not obviously there all the time when there is incoming, though.) Whether it is causeor effect or something else, I do not know. Maybe it is some communication transmiss ion passing through

the scalp in one direction or the other, or some other side effect . Maybe it results from the part of my motorcortex controlling the scalp being influenced. Maybe the scalp manipulation is even the primary effect, andover time has been trained into language recognition. Or maybe it is just some random effect which hasbecome conditioned to the torture, like a certain tension that accompanies the recognition of torture. Etc .One way to test this would be to somehow completely anesthetize the scalp, deadening all muscle reactions,etc., and see if there is any lessening of the incoming. (This assumes they don't have a secondary, backupchannel on which to deliver voice, and assuming the scalp effect actually does have anything to do with it.)I'm curious if other victims have noticed a similar thing.

The old (obsolete) Model 100 Autopig, with its Third-Grade Taunting module. They stil l use that thing,though. Same scripts and all, just like they tortured me with all last summer. Like you booted up an oldTRS80 from 1980 and ran the same old software. Same old lists of triggers and crap. Same old scripts.Fake ambient distractions that get set off to try to thought control you out of some line of thinking. Same old

simple sy ntax-level transforms on the trigger list and the raped thought-data. Autopig phrases of 0 and 1variables. It's clear also that the machines cannot deal with metaphor or irony -- they don't really"understand," they just respond like a state machine. There also seems to be something like a nearest-neighbor algorithm to find the "nearest-trigger" or "nearest SCP" to what you are thinking about. I can justview it from a distance now, since it is so pitiful and they've repeated everything 100,000 times. It would belaughable except that it is a serious, serious human rights violation.

Different voice models on text-to-voice, and a text file full of trigger strings. And a simple genetic algorithmsyntax generator in the trigger search algorithm. The "fitness" function of this genetic algorithm is tomaximize a trauma measure in the torture vic tim. Bits and pieces of the syntax and the limited vocabulary inthe trigger and autopig data file are randomly recombined to form new sentences. They also mix in wordsand phrases taken from your own subvocalized thoughts and anticipations. Strings are plugged into theautopig phrases of one variable. Mostly the result is stupid crap that only annoys you because of the

repetit ive violation and the transparent intention. They hope that once in a while the random search will find anew, improved trigger for them to use to control and manipulate you. If s o, they add it right to the file.Blackboard systems. Production systems.

If it is not a machine or machine-aided, how many full-time idiots does it take to harass a single citizen undersevere harassment? Who is paying their salaries? All day and all night. The same "voices, " largely.Repeating the same dumb phrases over and over, with some simple syntactic transformations and limitedvocabulary. A fiv e-year-old has a larger vocabulary than all of them put together. That is not the way realpeople think in their minds, even idiots. If i t is not a machine they are probably more conditioned with thatcrap aimed at me than I am. Likewise for any "audience" in an audience model forced to "hear" the samepsychic driving and triggering crap.

One phenomenon I have notic ed about the harassment is that it is v ery attention-driven. I do not knowenough about the attention mechanisms of the brain to speculate on how this happens (and I don't expectopen science does either). But the harassment tends to occ ur when you pay attention to something, or whenyou anticipate the harassment from past experiences. It is sort of a "think of the devil" phenomenon. If I

Page 12: Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

7/31/2019 Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

http://slidepdf.com/reader/full/part-iv-bayesian-stopping-critireon-and-the-optimization-thereom-allen-barker 12/13

hear a particular sound and focus my attention on it then about a second later they'll often start to voice-modulate it. But don't be afraid to think anything, even if you suspect it will set off a third-grade taunting. Ifyou are afraid to think anything because of harassment you are definitely not free. If y ou fear thinking onething, they'll leverage that into two things, then four things, etc.

The harassment is not all attention-driven. Sometimes it is attention-distract ing. When thinking of one thingyou notice them blatantly start the voice modulation on a noise source you were not paying attention tobefore -- or even sending voice-to-skull in the plain. It is like they want to get your attention, to distract you,

and to get you to start listening to their abusive manipulation audio. This often tends to happen when thinkingpolitical thoughts the pigs may consider "thoughtcrimes," or when making a breakthrough in something like amath proof. And sometimes just when the jackals think they can annoy you or want to aversively condition(punish) some behavior or thought.

Optional Postscript: Mixed Model

As in several of the earlier articles I will end with an optional section on the mixed model, for people intothat. The usual caveats apply, that I do not think this is the actual model but discuss it for the reasons givenin previous articles.

Many people do believe this model is the true one, for whatever reasons. Some do not know, however, that

the pure natural model is obsolete. The harassers try to exploit this as a psyop. I know that the harassmentI undergo is technology. It is not that I am "just sensitive" and thus subject to "psychic harassment." But Isee certain propaganda trying to insinuate that this is all just "sensitive people stuff."

Even if that were the case, it would sti ll be torture. People are purposely inflic ting torture on other people, inany model. The machine-like jackals purposely intend to cause trauma, and suicide if they can. It is atorture algorithm whether or not it is li terally carried out by a machine. If it were "real psychics" doing it,someone would have to pay them to do it, because they do it all day long and all night, day after day. Thesame boring, repetitive, harassing phrases as if read off a list. It s ure doesn't sound like someone"thinking." Often synchronized with the natural sounds in the victim's environment, and remaining the sameeven when the victim drives hundreds of miles away. That does not sound like a natural psychic. I do notthink my refrigerator is psychic . But even if it were, it would stil l be torture and those pigs would still need tobe tracked down by whatever means.

But suppose the mixed model holds, and that there is some natural psychic component in addition to thetechnological techniques. In this case, then, there must also be a huge conspiracy of silence about suchabilities if they are anything more than just very vague intuitions or occasional sensations. That is, if suchabilities come anywhere near the blatant, constant things mind control victims report experiencing. If so,then this conspiracy of silence has been turned back against the conspirators with technology. If you can'ttalk about telepathy -- sending or receiving -- then you can't complain when someone points a voice-to-skulldevice at you and starts harassing you with it. If y ou do not know the technology exist s, you may not evenunderstand what is really being done to you in the first place. How convenient.

In such a society, anyone with the covert mind control technology can torture and harass with impunity, byhiding behind the psychic conspiracy and mimicking psychic phenomena. Curiously, this works whetherpsychic powers exist or not, in any population of people who believe they exist and believe they can't talk

about them. The psyop agents on the voice-to-sk ull would be quick to reinforce this belief if they thought avictim were susceptible to it. That, and the victim would tend to be scoffed at and dismis sed, and wouldhave any lawsuits tossed out of court. [Of course if the mixed model really does hold in any significant waythen many concepts of mental illness need to be seriously reexamined. If we hypothetic ally assume certainfacts then we also have to consider the logical consequences of those fact s. If the mixed model does holdin a significant way then psychiatry has been abused as a cover for both cointelpro-style harassment and formaintaining a "psychic conspiracy."]

Let's don't be naive: There are plenty of people in society who would just love to have this power and woulduse it with no qualms whatsoever. Look at how many vile people use date rape drugs, for example. Mindcontrol experiments go way back, as do harassment operations and techniques. If they can plausibly denythey are doing it, they will tend to do it, however unethical, immoral, or criminal. If non-negligible naturalpsychic powers really exist, you can bet the CIA, NSA, DIA, former-KGB, and various other agencies haveknown about them for years. Such people also tend not to believe in magic. They have a lot of moneyavailable, and plenty of amoral, unethical scientis ts. First the secret science lab would figure out the physicsand the biology of how it happens. These findings would then be sent to the secret engineering labs, whereengineers and technicians would build machines based on the reverse-engineering of the biological effect.

Page 13: Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

7/31/2019 Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Allen Barker

http://slidepdf.com/reader/full/part-iv-bayesian-stopping-critireon-and-the-optimization-thereom-allen-barker 13/13

Remember also that if such natural powers exist they constitute a potential information path ofcommunication and influence. Some people, on hearing this, immediately think political control. They do not

want any such channel t o exist if they cannot control it. Thus they would want to dominate it, and s uppressany psychics whose thoughts or ideas they did not like. I have called this "psychic c ointelpro," carried outby "psyc hic suppression units ." One could presumably suppress a psychic with just ordinary harassment, as

well as with high-tech methods. Being able t o control such a person might be even more prized. (And whomight benefit, politically or otherwise, if psychics were beaming out terror and trauma instead of living

ordinary lives?)

If there is a conspiracy to keep true psychic powers secret, then, it has long outlived whatever purpose itmight once have had. It has in fact become a danger to the conspirators themselves -- who have had itturned back against them. Those who might now maintain such a conspiracy maintain one that can be usedto control them, as well as others in society. If a natural psychic responded to another natural psychic, forexample, the technological jackals would observe and measure that. They would then start imitating("spoofing") the signal like a mockingbird to try to manipulate things. Do the "true psyc hics" really benefitfrom their powers, anyway? Or is it just s ome feeling of being in a secret club, a sort of supremacy forpeople without much else? The kind that makes for some of the most virulent racists ? Something toconsider in the hypothetical, if unlikely, case that the mixed model holds.

The pure natural model is definitely obsolete, if i t ever held. The standard model exists now. It seems lik e

everyone has a cell phone now, and networks like the internet span the globe. In the near future yourdaughter's earrings will be always-on cellphones and her necklace will pick up her silent vocalizations like anartific ial larynx. That is just one possible embodiment of consensual synthetic telepathy, with open,commercial technology. They are currently marketing soda machines that can send directed ultrasonicsound to passersby. Neurophones, implants, modulated microwaves, advanced sensors, the list oftechnologies goes on and on. The secret sector already has technology well beyond this, which can beapplied nonconsensually.

Now that technology has started to move into the frontier of the human brain and mind it is vital that we asmembers of a supposedly civil ized society maintain basic principles of consent and human rights. These areexpressed in the Nuremberg Code, the Bill of Rights, the Universal Declaration of Human Rights, theConvention Against Torture, and so forth -- as well as being tenets of basic ethics and morality.

Part I - Models of Synthetic Telepathy | Part II - Acoustic Signal Modulation | Part III - Working Models Part IV - Bayesian Stopping Criterion