Appendix I: The "Auditing" Dimension: Technology-Enhanced Psychological Torment

 What "Auditing" Means in This Context

The surveillance people have subjected me to technologically enhanced "auditing", a practice sharing similarities with techniques from Scientology, where an "auditor" uses an E-meter (a lie detector measuring skin electrical changes) while subjects discuss intimate past details, supposedly to locate mental "engrams" (Hubbard, 1950; Scientology International, 2020).

My abusers have weaponized this concept using surveillance technology with built-in polygraph-like capabilities that detect physiological responses in real time. They use this to:

  • "Test" whether I am lying or telling the truth
  • Manipulate my emotions, values, and identity
  • Make me feel extremely guilty and inherently bad or criminal
  • Induce constant feelings of dread and fear, even when things are going well

The Initial Torment (2023)

This was most intense in 2023 when I first became fully aware of their presence. After returning to Canada from New York and staying indoors for over two months, I was psychologically tormented to feel as if I were the worst person on Earth. The experience nearly made me feel schizophrenic, I saw patterns in everything, linking ordinary occurrences to overwhelming guilt.

The Auditing Process They Enforce

1. Memory Extraction: Compelling me to recall past memories, particularly highlighting "negative" or sinful instances

2. Amplification of Guilt: Using these memories to torment me relentlessly

3. Creation of New Traumas: Using these moments to create new psychological traumas and unhealthy associations

4. Spiritual Accusation: Accusing me of falling from grace, making me feel guilty for believing in God

5. Forced Visualization: Making me visualize violent and immoral thoughts linked to guilt and worthlessness

Connection to Biblical Understanding

This aligns with Revelation's description of Satan and his fallen angels constantly tormenting and accusing, making you feel guilty even when you have done nothing wrong (Revelation 20:10). The accuser never rests.

The Purpose Behind the Torment

Those behind this use fear, dread, uncertainty, and guilt to influence my actions, mood, behaviours, and physical health, a form of psychological warfare designed to break me from within.

Appendix J: A Brief History of Mass Surveillance, Context for Understanding

The Cold War Origins (1940s-1970s)

The roots of today's mass surveillance systems trace back to the UKUSA Agreement of 1946, a secret treaty between the United States and United Kingdom that later expanded to include Canada, Australia, and New Zealand, forming what we now know as the "Five Eyes" alliance (Rosenzweig, 2012). By 1971, this collaboration had evolved into a global surveillance network code-named "ECHELON," designed to intercept electronic communications on a massive scale (Keefe, 2006).

During this early Cold War period, surveillance wasn't just about foreign threats. The FBI's COINTELPRO projects targeted civil rights leaders, anti-war protesters, Native American activists, and anyone labeled "subversive", sometimes with deadly consequences (Church Committee, 1976). Dr. Martin Luther King Jr., Malcolm X, and even First Lady Eleanor Roosevelt were among those monitored. The FBI kept dossiers on more than 10 million people by 1939, using wiretaps, mail tampering, and infiltrators to compile information (Church Committee, 1976).

The Church Committee Exposes the Truth (1970s)

In 1975, Senator Frank Church led a congressional investigation that revealed decades of intelligence abuses (Church Committee, 1976). The committee discovered that intelligence agencies had been spying on American citizens without warrants, opening mail, and keeping files on millions of ordinary people.

Senator Church famously warned: "The NSA's capability at any time could be turned around on the American people, and no American would have any privacy left.... That is the ability to impose a totalitarian regime in the United States such as this country has never seen." (Church Committee, 1976)

This exposure led to the Foreign Intelligence Surveillance Act (FISA) of 1978, designed to create oversight and prevent such abuses (Rosenzweig, 2012).

The Post-9/11 Expansion

Following the September 11, 2001 attacks, domestic and international mass surveillance capabilities grew immensely (Greenwald, 2014). President George W. Bush signed a message of "State of National Emergency" on September 14, 2001, which has been renewed annually by every subsequent president, remaining active as of November 2024 (Brennan Center for Justice, 2024).

Key developments included:

  • The USA PATRIOT Act: Granted broad new powers for surveillance and intelligence gathering (Electronic Frontier Foundation, 2024)
  • Section 702 of FISA (2008): Authorized warrantless collection of communications, with U.S. citizens' data swept up "incidentally" (Electronic Frontier Foundation, 2024)
  • PRISM and XKeyscore: Programs revealed to collect internet communications directly from major technology companies (Greenwald, 2014)

The Snowden Revelations (2013)

In June 2013, former NSA contractor Edward Snowden disclosed thousands of classified documents revealing the massive extent of NSA spying, both foreign and domestic (Greenwald, 2014). These revelations showed that:

  • The NSA collects and stores phone records of all American citizens (Greenwald, 2014)
  • Programs like XKeyscore allow analysts to search through vast databases containing emails, online chats, and browsing histories of millions (Greenwald, 2014)
  • The Utah Data Center, a $1.5 billion facility, was built to store and process this collected data (Electronic Frontier Foundation, 2024)

Ongoing Concerns and Abuses

Recent investigations continue to document surveillance abuses. In 2025, the Electronic Frontier Foundation exposed how automated license plate reader networks allowed law enforcement to track protesters, target minority groups with discriminatory searches, and surveil women seeking reproductive healthcare (Electronic Frontier Foundation, 2025). A single query could access more than 83,000 cameras spanning almost the entire nation.

The Inter-American Commission on Human Rights warned in October 2025 that invasive digital surveillance techniques are becoming increasingly normalized, creating a permissive environment for human rights violations (Inter-American Commission on Human Rights, 2025). Surveillance has been used for political control, repression of dissent, and targeting journalists and human rights defenders.

Comments

Popular posts from this blog

A Separate Defense of My Family, My Faith, and My Path: On Love for My Dad, Understanding My Mom, and Navigating a Confusing World

Public Security Statement: Grooming, Criminal Psychology, and the Worst Abuses of Surveillance Technology: A Warning and a Public Service Announcement

A Staged Death, Mockery, and Why I Still Speak Honestly