Sexual Assault (Rape)
HELP FOR VICTIMS (MALE OR FEMALE) OF RAPE & ASSAULT
Rape can be a devastating and humiliating experience. Rape - where reported or not - is more common than supposed by those who have not been long in the counseling field. Rape of men is far more common than supposed, and occurs in prisons, boys schools, military bases and war zones with startling frequency. It can devastate a person to the point of suicide. If not successfully processed, it can be the root of such protest against society - even existence itself - that the person can be pulled down into inversion into the role of abuser, which when dramatized on another victim, can harden the person against all goodness in life. Evil organizations depend on this phenomenon for recruitment and deployment of these sadistic warriors for their extreme terrorizing effect. Restoring harmony of civilization depends greatly on successful resolution of rape trauma. Having techniques for recovering from a rape or assault is an essential assist to victims. Recovering from a rape can involve deep shame and is often a spiritual crisis and emergency, since in extreme cases, it can be cause for suicidal thoughts or violence. * If this is an emergency, and you need someone to talk to, we have noticed another support site that can be found here: https://1in6.org/ This is a list of processes developed mainly for use in Scientology (auditing) processing, but its first steps might be useful in getting a person started who has no access to an auditor or who knows nothing of Scientology. The process questions can actually be answered working on oneself, using a sheet of paper or notebook in a technique we call, "journaling." ("Auditor" = "listener") http://freescientologycenter.org/drop-directions.html Note that these processes may appear overly simple or obvious to the outsider or one who has already partially overcome a trauma. Just remember for the recently traumatized person, nothing is overly simple or obvious. The questions are not direct, at first, giving the person a chance to build in mental strength as the processes are completed one-by-one. In a rape, efforts to put up self-defense were obviously unsuccessful - or may even have been punished. One should certainly reflect on how self-defense might have been applied, and should be applied in the future. Because of the extreme nature of the crime, retaliation separate from the immediate incident cannot be ruled out or considered unethical, since it would very well serve as a deterrent from the rapist inevitably carrying such an action out on future victims. Since such a reaction is almost always forbidden by the legal systems in place, such a natural instinct must be heavily suppressed and the person should be helped through this when it comes up, with empathy, sympathy and understanding. If you are recovering from the shock of having been raped, it is in fact, an emergency, and after you have run out of people to talk to and reasonable things you can do about it, it is suggested you get these feelings and thoughts out of the spinning-around in your mind, and down onto paper: (You can also use these processes using communication, to listen to another and get them acknowledged, which accomplishes a very helpful relief.) Important Note: If you are dealing with someone who has been tortured or subjected to MK-Ultra mind-control, heavy abuse or institutional abuse, it is important to get them journaling on their own before they are engaged in any communication therapy (as outlined more thoroughly in in the book by Cathy O'Brien called "A Time to Heal "). Use your judgment and their interest after they have journaled all that they can remember, before going on to these spiritual healing processes. |
0A. (Emergency) Orientation
* Look Around and Find Something You Can Connect With (acknowledge and repeat this until you feel more connected to present time and oriented in your surroundings) 0B. Orientation - Part 2 * Find Something Comfortably Real (acknowledge and repeat this until you feel some improvement, comfort or release) 0C. Orientation - Part 3 * Touch & Let Go of Things in Your Environment (repeat until you feel some improvement and feel ready to process) 1. Safe * a) Where Would a Victim Be Safe? * b) Where Would a Victim Find You Safe? (alternating asking and acknowledging answers to - a) and b) until you reach a sense of relief and/or have some kind of realization) 2. Confronting * a) What Would You Be Willing to Confront? * b) What Would You Rather Not Confront? (alternating asking and acknowledging answers to - a) and b) until you reach a sense of relief and/or have some kind of realization) 3A. Ownership * Who Has Been Responsible for Your Body? (repeat asking and acknowledging answers to the question until you reach a sense of relief and/or have some kind of realization) * Who Owns Your Body? (this may seem obvious, but run the process to total certainty on the answer, getting the person to seriously consider the answer, looking at it newly, each time) 3B. Wronged Body * a) What Is Okay to Do With a Body? * b) What Should Not Be Done With a Body? (alternating asking and acknowledging answers to - a) and b) until you reach a sense of reief or have some kind of realization) 4A. Hurt http://freescientologycenter.org/ * Have You Been Hurt? - "Tell (me) About That" * Did Someone Hurt You? - "Tell (me) About That" * Did You Hurt Someone Else? - "Tell (me) About That" * Did You Hurt Yourself? - "Tell (me) About That" The next series is best done with a Scientology auditor using an e-meter, but can be also used to extend the work done in step 4A. Write all the specific details you can think of. Time-Place-Situation-Actors-Actions-Events-Perceptions-Thoughts-Emotions-Efforts-Details... 4B. (Audited) Hurt http://freescientologycenter.org/severequadrudiments.html (Go to 1st Set) * Have You Been Hurt? ___ * Have You Been Abused? ___ (F3) Has Another Been Hurt? ___ (F1) Has Someone Hurt You? ___ (F2) Have You Hurt Another? ___ (F0) Have You Hurt Yourself? ___ (F3a) Has Someone Been Abusive? ___ (F1a) Has Someone Abused You? ___ (F2a) Have You Abused Another? ___ (F0a) Have You Failed to Protect Yourself From Abuse? ___ (F0b) Have You Failed to Stop Abuse? ___ (F0c) Have You Abused Yourself? ___ *NOTE* In the following processes, use the following words that apply, in order. Use the words as given, at first, unless there is a need to use a substitute for words that do not apply. It is okay to repeat a process using a different word that may apply, after completing the original wording. Save the strongest for last: -Intrusion-Violation-Abuse-Assault-Rape (if possible, have a dictionary handy to clear up exact definitions, variations and roots of the word) Note that the word "Violation" is used more commonly throughout this line-up, since it covers all of these as a general area, wherein these things are likely to connect. 5A. Orientation by Definition * What Is an Intrusion? * What Is Not an Intrusion? (alternate these back-and-forth in your answers until you are satisfied the process is complete) 5B. R1C - Intrusion * What Have You Done About Intrusion? (and as an occasional variation) How Have You Tried to Handle Intrusion? (just listen, acknowledge once in a while when appropriate, and ask the question again to continue the process until a sense of relief has occurred) 5C. DSPS - Intrusion (write down your answers to the alternating questions of each set, one set at a time, until you are out of answers and feeling complete, or have had an astounding realization and release) * 1a. How Has Intrusion Been Handled? * 1b. How Have You Been Handled? * 2a. How Have You Handled Intrusion? * 2b. How Has Intrusion Handled You? 6. Repetitive Processes (After doing the above, it's time to zoom out and look at the general subject. This also proofs one up for withstanding any future violations that may happen.) - answer the same question - one question at a time, repeated - until you are out of answers and feeling complete, or have had a very good feeling of relief or release (only go on to the next question once you have achieved completion - if you run on too far, spot the moment you had a feeling of relief and declare the process complete back at that point with no further work necessary) 6A. *What Violation Has Taken Place? *How Has It Been Handled? 6B. *What Is a Violation? *What Is Not a Violation? (alternate these back-and-forth in your answers until you are satisfied the process is complete) 6C. *How Have You Handled Violation? 6D. *What Intrusion Could You Confront? *What Intrusion Would You Rather Not Confront? (alternating-question process) 6E. *What Problem Have You Had With Intrusion? *What Solutions Have You Had for That Problem? 6F. *What Problem Have You Had With Violation? *What Solutions Have You Had For That Problem? 6G. Communication Process *If You Could Talk to a Victim, What Would You Talk About? *Okay, If You Were Talking to a Victim, What Would You Say, Exactly? 6H. Conditions Process *What Condition Have You Encountered That Was a Violation? *How Have You Handled It? 6-I. *What About a Victim Could You Be Responsible For? (HCOB 25 Jan 60) (for this next process, take up one incident of intrusion at a time, and answer all follow-up questions to it before taking up another instance) 7. *Tell Me About an Intrusion -What Problem was the Intruder Trying to Solve? -How Else Was That Intrusion Justified? -What Led Up to That Intrusion? (depending on how recent - use the most appropriate wording of these two - in some cases, both) -What Were the Consequences of That Intrusion? (and/or) -What Might Be the Consequences of That Intrusion? -What Happened to the Communication? -What Expectation Was Violated? -What Happened to Your Reality? -What Happened to the Understanding? -What Happened to the Affinity? -What Happened to YOU? 8. More Repetitive Processes (if you are able to work with another person, these can actually be used earlier in the line-up) 8A. *Where Would a Violated Person Be Safe? 8B. *Where Would a Violated Person Find Help? 8C. *From Where Could a Violated Person Regain Control? (for a recent or highly-charged betrayal) 9. Represent the Violation in Clay (label each part of the representation as you go - cut little tabs from cards or folders) -then stand back and look at it, modifying it as needed, until it feels complete -get it acknowledged (and at least take a picture) -write up what occurred (solo version - use 10B if you have an auditor) 10A. *Recall an Intrusion *When Was It? (note down any description of the time - exact, if possible, or general time-of-day, time-of-year, etc.) (you may also use these follow-up questions) IN THAT INTRUSION - a. WHAT ATTITUDE WAS NOT RECEIVED? b. WHAT REALITY WAS NOT PERCEIVED (SEEN)? c. WHAT COMMUNICATION WAS NOT ACKNOWLEDGED? d. [SG] WHAT UNDERSTANDING FAILED? Advanced Processes (having another auditor is highly recommended from here, but not required) (this is audited using an e-meter, if possible) 10B. R2H - VIOLATION *Recall a Violation -When? (this is dated on the e-meter if it is not volunteered by the person) -In the Violation You Recalled, -HAD AN ENGRAM BEEN MISSED? -HAD A WITHHOLD BEEN MISSED? -HAD SOME EMOTION BEEN [REJECTED]? -HAD SOME AFFINITY BEEN [REFUSED]? -HAD A REALITY BEEN REJECTED? -[HAD A COMMUNICATION BEEN CUT SHORT?] -HAD A COMMUNICATION BEEN IGNORED? -[HAD A WRONG REASON FOR AN UPSET BEEN GIVEN?] -HAD A SIMILAR INCIDENT OCCURRED BEFORE? -[HAD SOMETHING BEEN DONE OTHER THAN WHAT WAS SAID?] -HAD A GOAL BEEN DISAPPOINTED? -HAD SOME HELP BEEN REJECTED? -[HAD A DECISION BEEN MADE?] -WAS AN ENGRAM RESTIMULATED? -HAD AN OVERT BEEN COMMITTED? -HAD AN OVERT BEEN CONTEMPLATED? -HAD AN OVERT BEEN PREVENTED? -WAS THERE A SECRET? (for any highly-charged violation) 11. L1C list using the preface, "In Relation to That Violation, Is There..." 12. Advanced Processing 12A. *From Where Could You Communicate to a Violated Person? 12B. *From Where Could a Being Create Safety? 12C. *From Where Could a Being Experience Intrusion? *From Where Could a Being Create a Solution to Intrusion? (alternating process) 13. QUAD RECALLS (run these in the order given, if running off the meter - otherwise, with a meter, use longest-reading Flow and then check them all newly after each completion of running a flow) F3 RECALL A TIME OTHERS CAUSED OTHERS TO BE VIOLATED F-1 RECALL A TIME YOU WERE VIOLATED F2 RECALL A TIME YOU CAUSED ANOTHER TO BE VIOLATED F0 RECALL A TIME YOU CAUSED YOURSELF TO BE VIOLATED (Advanced - use of Scientology terms - clear these up first) 14. DISAGREEMENT FACTORS IN A VIOLATION * IN RELATION TO THAT VIOLATION IS THERE: 1. AN ALTERED SEQUENCE? 2. OMITTED DATA? 3. DROPPED-OUT TIME? 4. A FALSEHOOD? 5. AN ALTERED IMPORTANCE? 6. A WRONG TARGET? 7. A WRONG SOURCE? 8. CONTRARY FACTS? 9. ADDED TIME? 10. ADDED INAPPLICABLE DATA? 11. AN INCORRECTLY INCLUDED DATUM? 12. ASSUMED 'IDENTITIES' WHICH WERE NOT IDENTICAL? 13. ASSUMED 'SIMILARITIES' WHICH WERE NOT SIMILAR OR THE SAME CLASS OF THING? 14. ASSUMED DIFFERENCES WHICH WERE NOT DIFFERENT? 15. AN INCONSISTENCY? 16. A MISUNDERSTOOD WORD OR SYMBOL? [SG - if so, clear up the word using a good dictionary] 17. DEV-T? [SG - "Developed Traffic" (wasted actions, effort, time, etc.)] 18. CROSS ORDERS? 19. COUNTER INTENTION? 20. [AN INJUSTICE?] (Advanced) 15. R3RA Narrative (or TIR procedure) on "most recent Violation" (run these incidents thoroughly and, as per Narrative-style handling - only go earlier-similar after some runs through and checking for "earlier beginning?") (handle these separately if they do not come up on a chain) (Advanced) 16. FPRD (False Purpose Rundown) Procedure on Violateds Assess: (F1) -A Time You Were Violated (F2) -A Time You Violated Another (F3) -A Time You Witnessed a Violation (F0) -A Time You Let Yourself Be Violated for longest read Then: Tell me about the most recent instance of ___(best reading from assessment)___ Then: Follow FPRD procedure by taking the most recent instance earlier-similar to Basic. Then: (F2, F0) Normal FPRD Procedure and Commands - You are asking for an evil purpose. (F1, F3) You are looking for a Postulate (Service Computation, actually) about violation, so this is what you ask for (it -could- be an evil purpose of ones own, but may rather be a computation that continually lures the person into danger). Run this earlier-similar to Basic and then get the Prior Confusion as in FPRD procedure. 17. Process S2 * From Where Could You Communicate to a Victim? |
Storage |
Spiritual Assistance Technology
This is a project of FreeScientology
|
Scott Gordon
scott@scottgordonmusic.us |
We Promise You the FreeScientology
|