Acoustic-Explotation

Acoustic Coercion & Cognitive Capture (AC³)

Forensic research into how sound is weaponized to disrupt thought, force speech, and maintain coercive control.

Research Status License Forensic


Table of Contents


Overview

Acoustic Coercion & Cognitive Capture (AC³) is an open forensic research initiative investigating how high-amplitude, chronic, and tactically deployed noise is used to disrupt neurological function, degrade executive capacity, and force behavioral compliance in targeted individuals.

This project moves beyond the conventional framing of noise as “nuisance” or “annoyance.” Instead, it treats acoustic harassment as a neurological weapon—one that bypasses the victim’s intellect by physically interfering with the brain’s capacity for internal language, planning, and resistance.

The research is structured around two core reports:

  1. Neurological Disruption of Internal Monologue — How noise degrades the phonological loop, suppresses prefrontal executive function, and induces cognitive capture through HPA axis activation and rhythmic entrainment.
  2. Acoustic Exploitation of Bipolar Mania — How perpetrators leverage the manic brain’s pathologically low speech-inhibition threshold to force verbalization, and how proxy harassment architectures create closed acoustic loops that trap victims indefinitely.

All findings are designed for legal admissibility, clinical validation, and integration with acoustic monitoring systems (e.g., SCADMS, AuraConv).


Research Focus

Report 1: Neurological Disruption of Internal Monologue

Status: ✅ Published (v2.0 Integrated Assessment)

This report examines the intersection of cognitive psychology, neuroscience, and coercive control theory to explain how acoustic assault systematically degrades the victim’s capacity for private thought.

Core Mechanisms:

Scope: Generalized across cults, criminal organizations, residential harassment, neighbor abuse, domestic coercive control, and property management negligence.

Key Deliverables:


Report 2: Acoustic Exploitation of Bipolar Mania & Forced Speech

Status: ✅ Published (v1.0)

This report investigates how perpetrators exploit the neurophysiology of bipolar mania/hypomania to force or trigger involuntary speech in victims through tactical acoustic harassment. It further analyzes a two-layer harassment architecture in which a perpetrator coerces or manipulates intermediary third parties (a “middle group”) to maintain continuous verbal pressure on the victim.

Core Mechanisms:

Scenarios:

Key Deliverables:


Key Features

Feature Description
Forensic Rigor All claims are traceable to peer-reviewed neuroscience, psychology, and acoustics literature. Citations are included for legal admissibility.
Quantified Thresholds WHO and research-based dB(A) thresholds for sleep disruption, cognitive impairment, cardiovascular risk, and dementia.
Vulnerability Mapping Population-specific mechanisms for bipolar, PTSD, autism, elderly, children, and sleep-deprived individuals.
Measurement Protocols Step-by-step forensic documentation using UMIK-1, REW, cortisol biomarkers, cognitive testing, and cryptographic chain-of-custody.
Legal Frameworks Mapped to EU Environmental Noise Directive, Irish Housing Regulations, UK Serious Crime Act 2015, and Istanbul Convention.
Proxy Harassment Analysis First open-source forensic framework for detecting and documenting acoustic harassment via compelled third-party intermediaries.
Countermeasure Library Evidence-based protective strategies for victims, proxies, clinicians, and investigators.
SCADMS-Ready Structured for integration with Side-Channel Acoustic Detection & Monitoring Systems and similar forensic audio pipelines.

Repository Structure

ac3-research/
├── reports/
│   ├── 01-neurological-disruption-internal-monologue.md
│   ├── 02-acoustic-exploitation-bipolar-mania-forced-speech.md
│   └── 03-[future]-measurement-validation-study.md
├── data/
│   ├── who-noise-thresholds.csv
│   ├── acoustic-tactic-matrix.csv
│   └── vulnerability-factors.json
├── protocols/
│   ├── forensic-measurement-protocol.md
│   ├── chain-of-custody-template.md
│   └── proxy-harassment-detection-checklist.md
├── legal/
│   ├── ireland-framework.md
│   ├── uk-framework.md
│   └── eu-framework.md
├── tools/
│   ├── scadms-integration-schema.json
│   └── acoustic-event-logger-template.py
└── README.md

Target Audience


Roadmap

Phase 1 — Foundation (Current)

Phase 2 — Measurement & Validation

Phase 3 — Tooling & Integration

Phase 5 — Global Expansion


Contributing

This is an open research initiative. Contributions are welcome in the following areas:

Please open an issue or pull request. All contributions must include citations for factual claims and must respect victim anonymity and GDPR requirements.


Citations & References

All reports include inline citations to peer-reviewed literature. Key sources include:

Full reference lists are included in each report.


Disclaimer

This research is provided for educational, forensic, and advocacy purposes. It is not a substitute for legal advice, medical diagnosis, or clinical treatment. If you are experiencing acoustic harassment or coercive control, please contact:

The authors accept no liability for actions taken based on this research. All case studies and scenarios are synthesized from documented patterns; no specific individual is identified without consent.


© 2026 AC³ Research Initiative
Licensed under CC BY-NC-SA 4.0