badbadman

WARNING: BY ACCESSING THIS FILE YOU HAVE BEEN EXPOSED TO SEVERAL DORMANT COGNITOHAZARDS. DO NOT CLOSE THIS DOCUMENT BEFORE READING THE BELOW CONTAINMENT PROCEDURES.


Approved Site-01 terminal detected. Cognitohazards locally neutralized. Please disregard above warning.


Item #: XXXX

Object Class: Keter

Special Containment Procedures: Because a description of the containment procedures for SCP-XXXX-A constitutes a breach, they are to be excluded from all Foundation documentation. Currently, containment of SCP-XXXX-A is managed by an automated computer algorithm, responsible for the covert distribution of containment protocols encoded in instructions of mundane tasks to be unknowingly performed by staff. Addendum XXXX-a2, located at the bottom of this document, is to be checked daily to ensure the continued containment of SCP-XXXX. In the event of a containment breach, SCP-XXXX-A's containment algorithm is to be reintroduced to public communication networks to adjust its profile of SCP-XXXX-A if needed, and protocols used during Event XXXX-532 (see addenda) are to be repeated.

Additionally, SCP-XXXX-A is not to be referenced in written or verbal communication in any context not referencing its connection to SCP-XXXX, and it is not to be referred to or described with any noun or adjective outside of "SCP-XXXX-A" and descriptors of its relevance to the SCP-XXXX anomaly. These descriptive parameters exist to avert the risk of unintentionally constructing a subconscious profile of SCP-XXXX-A as an entity. This file is laced with several Foundation-engineered dormant amnestic cognitohazards that are triggered upon an affected subject's failure to stay within the specified verbal parameters when discussing and describing SCP-XXXX-A, causing a complete wipe of all memories acquired by the subject while the cognitohazards were present, before dispersing. The cognitohazards possess a weak area of effect, and will also affect the memories of additional subject located in close proximity, erasing their memory of the last five seconds, thus purging the hazardous description of SCP-XXXX-A. Digital-based mentions of SCP-XXXX-A that fail to uphold descriptive parameters will be intercepted and censored by SCP-XXXX-A's containment algorithm.

Any recollection of a description of SCP-XXXX-A, even if believed false, is to be immediately reported to medical staff to receive appropriate amnestic treatment, and the amnestic cognitohazards are to be tested for reliability.

Description: SCP-XXXX is an extremely powerful memetic phenomenon affecting human subjects that learn of the existence of an entity, designated SCP-XXXX-A, through either direct perception followed by cognizance of its presence, or, at minimum, partial descriptions provided by already affected subjects. SCP-XXXX is characterized by the irrational attribution of all undesirable/painful personal experiences, phenomena, and knowledge to [INFOHAZARD EXPUNGED] SCP-XXXX-A.

Once infected, subjects will begin to perceive SCP-XXXX-A to be directly responsible for all isolated negative incidents that occur after that point in time. SCP-XXXX-A will over time gradually occupy more and more of a subject's headspace until they become cognizant of its prevalence, leading to the twofold realization that SCP-XXXX-A is the root cause of all problems on a personal, societal, and/or existential level,1 and that said problems are all directly connected through their shared origination from SCP-XXXX-A. This invariably results in a drastic shift in habits and daily behaviors. At this point subjects often begin to engage in political activism, journalism, and campaigning with a negative focus on SCP-XXXX-A, forming vectors through which SCP-XXXX spreads as public awareness of SCP-XXXX-A increases.

Both the escalation of symptoms and behavioral changes of affected subjects are believed to be a byproduct of human psychology interacting with the SCP-XXXX infohazard rather than the anomaly itself. Because of this, it is thought that non-anomalous social engineering, persuasion, intimidation, and other forms of behavioral manipulation can be used to modify how infection advances.

When SCP-XXXX becomes sufficiently widespread, it will begin to overtake the world's political landscape and culture. The eventual result is the collective identification of SCP-XXXX-A as [INFOHAZARD EXPUNGED], followed by the unanimous agreement to divert large quantities of global resources and manpower to neutralizing, combating, and/or resisting SCP-XXXX-A in some way. Infected societies are invariably restructured into totalitarian collectivist regimes wherein citizens collectively agree to sacrifice a significant degree of individuality and civil freedom for the sake of completing procedures that are perceived to assist in the "fight" against SCP-XXXX-A, resulting in drastic reductions in crime rates, international trade,2 cultural developments, [INFOHAZARD EXPUNGED], and quality of life. An SCP-XXXX infection of this scale is to be considered an LK-Class Loss-of-Normalcy Scenario, and would necessitate a recreation of protocols used during Event XXXX-532 (see addenda).

It is noted that SCP-XXXX appears to trigger only upon the formation of a direct and descriptive understanding of SCP-XXXX-A as an entity in and of itself. A description of SCP-XXXX-A with regards to its connection to SCP-XXXX does not constitute an infohazard3 so long as additional descriptors are not included. Because of this property, individuals exposed to an incomplete form of the infohazard will accept false descriptors of SCP-XXXX-A and integrate them into their mental profile of the entity, so long as they do not contradict the subject's prior understanding.

Addendum XXXX-a1: Event XXXX-532
Event XXXX-532 refers to a span of time between the initial discovery of SCP-XXXX and the reversal of an LK-Class Loss-of-Normalcy Scenario caused by the object.

Members of the O5 Council had managed to avoid infection due to their prior reliance on computer-based communicational proxies, which were outfitted with advanced infohazard filtration systems. The Council modified these computer proxies to include an algorithm that would privately construct a profile of SCP-XXXX-A through its interactions with infected human society. O5 was then able to reverse SCP-XXXX's effects using a combination of temporal manipulation and modification of the noosphere4 via computer proxy.

The algorithm containing SCP-XXXX-A's profile was then modified to also construct containment procedures for SCP-XXXX-A, under the axiom that SCP-XXXX-A and its containment procedures are never be observed by humans. The containment algorithm, originally developed as a separate entity, was then metastasized and implemented into the central Foundation containment and communications network to prevent personnel from constructing a profile of it, where it would analyze information passed to and from staff members and encrypt containment protocols as various unrelated tasks and plant them in files describing said tasks.

Addendum XXXX-a2: Containment Status
This section of the SCP-XXXX object file is connected to SCP-XXXX-A's containment algorithm, and will automatically update in the event that SCP-XXXX-A breaches containment, the containment algorithm is compromised, or SCP-XXXX-based infohazards are detected in the Foundation communications network.

ANOMALY STATUS: CONTAINED

ALGORITHM STATUS: NO FAILURES DETECTED

NETWORK STATUS: NO INFOHAZARDS DETECTED