Morally Conscious


Logo Design by FlamingText.com
Logo Design by FlamingText.com
Logo Design by FlamingText.com

Tuesday, June 5, 2018

Let Me Show You The World In Her Eyes: Doctus iPredopath [iP3] and Lori LaFond


Hey everyone, I was looking online for information regarding the criminals that engage in sexploitation and cyberstalking and found this incredible site.  I'm really impressed with it's modern approach to updating predators and stalkers in an information aged setting as opposed to the pre-information age way that these people target their victims.  It is fascinating to say the least.

www.ipredator.org has some fascinating new information that has really got me interested in how stalking has evolved.  It would seem that cyberstalking and sexploitation have evened the sick playing field between genders when it comes to stalking.  The anonymity and cloaking of the iPredopath seems to allow these types of people the luxury of obtaining information about their targets without disclosing their own personal information.  It basically adds a new layer of convenience to the iPredator which did not previously exist pre information age.  Stalking from the convenience of their own homes or businesses via the internet  appears to be the reason, but there are lots of factors as to whether or not these people will turn violent.

Lori and Brian appear to be a type of iPredator that bridges the gap between violent and non violent Predopaths.   This is called the Doctus iPredopath or [iP3].  While there are allegedly many iPredopath out there, most of them appear to be non violent and unlikely to meet their targets in person.  The iP3, apparently has the opposite in mind.  It is geared for them to manipulate and use information to obtain an entrance into the lives of their targets.

Let me give you an explanation that maybe will make more sense.

Lori and Brian's victims of BCI (brain computer interface) has two elements.  First the device has to have a human brain to work.  This requires that the iP3, Doctus iPredopath, has contact with their targets.  In the case of the Palm Springs victims, someone has to knock out the victim/target, physically engage them, and insert the RFID chip or interface into the human body.  The second half of that element is computer.  The signals sent from the human victims' brain are then sent, via cellphone number to a computer that translates them and is embedded on a secret social website known only for reading the thoughts of a human being.  Basically, the human victim is turned into his own social website where operators can see what a person is thinking and comment upon it.  In the Information Age with iPredopaths, this is the best of both worlds.  Not only can information be gleaned from the Dark Web, Verizon Wireless customers  or social websites, the predator also has the huge advantage of BEING a website where his most private thoughts are monitored like a facebook page.

In terms of harassing a target, all the tools available are in place to communicate with their victim which is a physical relationship with their victims.  We literally hear our iP3 predator telling us what they are going to do to us and if we think of a way out, they already know it and can engage other computers or people to stop that from happening.  Whereas MOST iPredopaths do not have direct contact with their victims, Lori and Brian have more contact than they could in a single encounter.   These two have 24 hour a day contact with their target.  It's the MOST predator that you could be.

It's as if there is a new kind of facebook out there, more personal, and in some cases far more social than a person would ever want.  I call it thinkbook.  Of course there is license with this thinkbook.  Since the victim is not in control of his website, the perpetrator now creates an online profile of the victim based on their own needs, not the need of the person being watched.  Unlike other website where the iP3 creates other personalities so that they can not be caught, the dynamic is completely changed. On this website, the victim's every thought is recorded without exception.  The predators tell one another via chat that this person is so and so...a child molester, drug dealer and so forth without any input from the victim.  Whoever logs into the website can choose who to watch think.  The need, then, for other social media, like Twitter or facebook or Instagram is different, they aren't using the information they learn on those sites to stalk their victim, they are using them to destroy the victim with what they learn from his own thinking.

In some way the person being stalked, if a non violent relationship was sought by the stalker, is as stalked as they can by physically.  Knowing all about the victim is as easy as listening in.  No more neighbors, friends, coworkers are needed to gather information only to smear the victim.

The one constant that I am seeing is that iPredators, no matter what level of sophistication, all rely on the stealthiness of their crimes online to keep their identities safe.  Most think they won't be caught.  Few are as brazen as Lori and Brian whose information is coming directly from the person that they raped to install the technology.  How else could a brain computer interface work without having a human, in our case, unaware that they are implanted?  The information that Lori primarily deals with are first hand thoughts from the victims.  The data is supplied by the crime itself.  No crime, no website.

Essentially, Lori and Brian work backwards from most iPredators.   Because the crime can not be committed without a rape, the target is usually found online.  In our case, gay dating websites like adam4adam or tinder are used in two ways.  First, most basic, is to find someone to target for sexual purposes or for control.  Second, though, is not as obvious.  Once a target has been implanted, these dating/hunting grounds become something different.  The BCI allows both Lori and Brian to learn usernames and passwords for the victim, who the siblings then pose as online.  No longer do they need to create catfishing profiles on these websites.  The stalker becomes the victim...or at  least, they take over the persona of the victim online. 

I developed a way to avoid username and password theft through the BCI, by not knowing my password and simply cutting and pasting it.  Lori can't pretend to be the victim if she can't log in to his account, unless she sets up another account using his pictures.

Whereas most iPredators would be content to stalk their victim through their emails or online messages on a website, Lori and Brian become the victim to create more victims for their BCI website.  They don't just single out a person for torment, they look for his friends after implantation creating a larger neural network of victims.  It's a cycle that hasn't been broken, until now.  Part of the excitement that both Lori and Brian have is in new victims and communicating with them.

New victims are far easier to manipulate.  They believe everything.   It is only after a victim has been led down the garden path enough times, only to find nothing but jail or arrests, that they stop following the instructions of the siblings.  New victims don't protect or monitor their bank accounts the way they should.  New victims can be led to believe that the siblings work for the police because implanted police officers repeat what Lori tells them to say.

What this new site seeks to explain is the evolution of what stalking has become in the age of computers and information processing.  It, however, is insufficient in explaining the kind of stalker that would implant a victim to make them part of the information superhighway.  This is a predator that creates victims that become technology.  The victim is no longer a person, bones and flesh, they are also made up of what they think, an essential part of privacy.   With Lori and Brian the frontier has been crossed.  Now human beings are what their thoughts are made up of as well as their physical state.  What use to be contained within the victim's own mind has become a Tweet.

There is no off switch for the victims, they are at the mercy of the stalker.  So think about it.  If the iPredator can communicate directly with the victims' brain, they can also manipulate them.  This creates an effect of what does their mind think about it and it is immediately Tweeted out without any restriction.  It leaves the human being victims without any protection from predators that could or would harm them.

In summation, both the iPredator and iVictim have seen a significant change in their roles with information age technology.  The iPred has more access to the iVic than ever before and thus there is a stronger ability to influence the iVic's life.  The level of torture is uncontrollable and that is where the iPred likes it.   They can do this from a location far away too, so deniability is also a factor.  In the crimes that many of the iVics face, the predator would normally have to be there to eyewitness them in order to tattle to the police.  Not in this case since the iVics thinking goes with them wherever they go.  iPredaors engage in fantasies and this allows them to use a piece of the truth, like the location of the vic or say renting a rental bicycle, to come up with a story to have them arrested.  Instead of renting the bicycle, the iPred calls the police and says he stole it.  The iPred is able to control the iVic much longer than that of a normal rape victim.  The iPred can literally rape them over and over and state, I wasn't even in that city.  A computer doesn't have to be near the crime for the perpetrator to use the computer to create the lie.  iVics in Palm Springs are often the victims of what Lori weaves together from the truth.


As we mover from the information age of computers into the new phase of development, the artificial intelligence/synthetic telepathy age aspect of this crime, becomes quite blurred.  When do we draw the line between what is innately human and essential to privacy and what is collectible and sharable?  The choice, I believe, should be up to the human being, but in the case where that choice is made for you and enforced by the police, where are we now, looking at this crime?

How do you measure the damage caused by the theft of thought?  Can it be measured in terms of what it cost the victim?  How about their parents?  How about society or business?  The long term effects of stealing thoughts from human beings for profit and terror is spooky.  When you are dealing with Doctus iPredopath, like Lori and Brian, there is the fear of the physical as well as the internet threat, both have been used.  The crime could not exist.

Let me put it to some of you this way.  Remember camera film?  You would take pictures and wonder what they would look like until you got them developed, right?  Some were good, some sucked, one had your thumb in it.  Then we moved into the information age and along with it came digital photography, but what about those old pictures?  How could you share those online?  Unless you took the old and combined it with the new by scanning the photo into the computer it wouldn't work.  

Human thoughts had to be translated into something the computer could recognize too, deciphered and made available for use.  How that information is used is determined by the iPredator.  A website was made by some iPredator that was set up primarily for perpetrators to see what their targets were thinking.  That's one level.  The next level would be the iPred that would take that information and use it in a negative way to hurt the victim or profit.  The iP3, would do what the previous predator did but if the victim got wise to it, the iP3 would be willing to cause physical harm, again, to the victim.  Could be homicide or intentional infection of HIV.

In the end one thing really hasn't changed about stalkers, cyber or otherwise, they seek control of a person or a community.  Pre-information age or information age, the stalker has someone that they seek to control.  In our case, it was an entire community.  The LGBTQ community primarily gay males were targeted as a personal preference to the iP3.  They could have picked anyone, but their predilections were towards gay men, uninfected with HIV, at first.  There were other shallow preferences too like top or bottom, dick size and whether or not someone was into kids....ewww!!!

So the perpetrators that we are looking for are people that are homophobic, overtly obvious in their physical sexual requirements and they were looking for someone that might have the same perversions as them.  Oh yeah, then there were drugs...they had to use drugs or know who did.  We know from DNA that the HIV virus is spread by a woman with a brother that trades off infections with one another.  The initial infection between the two was sister to brother...first.  So who do we know that is like that?