On Transformation of Gangs: When Extremist Groups Include Former Military and Policing Personnel

This essay entertains a discussion on some contributing factors to gang stalking, electronic targeted assaults, and psychotronic torture. This essay considers unlawful police gangs and former members of the military who go on to form extremist groups in light of the recent phenomenon in U.S. policing politics.

In my personal experience with electronic targeted assaults and electronic psychotronic torture revealed to me that the use of this invisible technology is being utilized by individual police officers in the police force and/or being utilized by the local police departments. Examining extremist groups in America has revealed 12% of the people arrested for storming the U.S. Capitol had previous military training or present or former police officers.

In a paper, Policing Gangs and Extremist Groups: A Different Viewpoint, Charles F. Williams “looks at U.S. homegrown, transnational extremist groups acting at a national level, which he argues present a clear and present danger to local, county, state, federal, and international policing cooperation. His essay offers a different viewpoint that posits that these groups are not under control in their current form.” This was in 2009. I believe this fact may have changed with the storming of the U.S. Capitol on January 6, 2021. He reports these groups are changing their ‘Modus Operandi’ (MO) while remaining engaged in all areas of criminality. His paper advocates these gangs to be designated as terrorist organizations so that the provisions of the USA Patriot Act, intelligence agencies, and military intelligence can be deployed against them to protect the best interest of the United States. Will surveillance of the gangs that stormed the U.S. Capitol be included in this new deployment of protection?

Since the advent of gang stalking with electronic targeted assaults and psychotronic torture, there has been little in the way of controlling the invisible terror this form of activity seeks to inflict on local residents. Historically, gangs were visibly seen. They had signs, colors, special clothing, with clear gang markings. The list of gangs in U.S. history is lengthy. They have ranged from well-known U.S. gangs like the Hell’s Angels and Aryan Brotherhood to immigrant gangs like Malasalvatruchas (MS-13), Costa Nostra, and the Mexican Mafia. The transformation of violent gang activity has now manifested to include gang stalking with electronic targeted assaults and psychotronic torture. It is my opinion the people that make up this new type of invisible terrorism may be people with previous military training, knowledge of special operations, surveillance techniques, and either active or former members of the policing community. Individuals who hunt, stalk, and electronically torture are no different than the street gangs in which America has become familiar.

In 2009, with the inauguration of a new presidential administration, and the closing of an era on predominantly white presidential masculinity authority, it was reported by some media and federal law enforcement that recruitment in some white supremacist groups increased in several states. The timeline of the advent of the phenomenon known as gang stalking with electronic targeted assaults and psychotronic torture is of importance because these groups pose a clear and present threat to America’s national security problem (Krisberg 2007; Lovato 2007).

I propose the way gangs are carrying out their violence has transformed from that of the “visible” to that of the “invisible” for a very specific purpose. They no longer want to receive any recognition of identification, either publicly or by law enforcement. Identifiers are how we classify data. If data cannot be classified, it cannot be identified. They want to be the sole “master signifier.” As signifiers create meaning, words will take the place of the things they refer to. This means, psychologically speaking, that speaking beings are creatures of absence — and a barrier of meaning protects us from a direct confrontation with THE THING — this is what the psychotic is unable to do because of a defect in the foundation of language.

In addition to the “invisibility” aspect in the transformation of gangs, they maintain a cache of weapons (electronic targeting devices) that carry out surveillance of their surroundings (space and property) and control ingress and egress from the sites they stalk. These compound groups would try to micro-manage (individual people) and minimize outside contact on the properties they surveil. If you think of groups that do not transform and remain in their compounds (for example, polygamist sects seen in Waco Texas) can be watched easily as compared to those blending into general society. Or at least this is what was formerly assumed. New developing technologies may allow for the individual tracking of people as they move around the towns and communities where they live.

Jamison (2008) reported that the Hell’s Angels have learned to disperse, dress the same as the community they live in, live next door quietly, enroll their children in school and no longer have identifying tattoos or markings on their motorcycles. In other words, they blend in and act like the new Harley Davidson motorcycle social phenomenon, while they control a vast criminal operation making huge sums of money. Even prison gangs are no longer tattooing themselves with identifiers in which they can be sorted and classified.

The important key piece of information given here regarding the transformations of gangs is: They do not want any attention. They want to operate quietly, unobtrusively, and dispose of their enemies very quietly. Interesting, long-term gang stalking with electronic targeted and psychotronic torture achieve these ends. Although the effects of this type of torture are not immediate, they will eventually cause lifestyle changes and the onset of illness. Williams discussed this loss of visibility from tattoos, dress, etc., with an intelligence analyst (Lee 2009) at the North Texas Fusion Center, McKinney, Texas. This intelligence analyst alluded to unverified information that a scar or scars in a certain spot on the body or cut in a particular fashion may replace ink tattoos. The development of simple visible identifiers would increase “invisibility.”

If extremist group transformations aimed at dispersing and camouflaging themselves within communities contribute to the group’s opacity, how does this change pose a special challenge to the enforcement of laws, or to how federal law enforcement uncover local policing conspiracies? How can law enforcement monitor these groups? Surveillance is possible through ground, communication, aerial, and satellite should they become imminent, widespread threats. To do so effectively, however, federal law enforcement needs a proactive policy and effective intelligence sharing. The advent and manifestation of electronic targeted assaults and psychotronic torture de nouveau is a form of service security surveillance that capitalizes on the science and art of punishment.

The Federal Bureau of Investigation’s immediate response to capture individuals who were part of the group that stormed the U.S. Capitol has been persistent and successful. How are we to catch the invisible crime of electronic targeted assaults and psychotronic torture?

When we consider information sharing between police agencies, please consider the following,

“This instant inter-jurisdictional information-sharing brings up a number of privacy and ‘agency turf’ issues, government surveillance, policy issues, budgetary and so on (Sacco 2000; Schneider and Kitchen 2002; Tonry 1997; Webster 2001). It also appears to be a surveillance system, which is simply not the case. General surveillance of the public is avoided, only those persons identified, arrested or convicted of gang activities put into the system are subject to surveillance. So, unless an individual has committed some act, e.g. an arrest, conviction, gang membership established, etc., that would put them into the system, the system would not have any information on that individual. This is the system’s safeguard against general surveillance of the population and forces the system to narrowly apply its data searches within the system datasets (nodes) thus preventing any constitutional rights abuse.”

Even this surveillance is not physically violating with electronic targeted assaults or psychotronic torture. State surveillance of individuals who have been entered into their database and identified as “gang-related members” or people who have engaged in criminal activity is done strictly for information sharing purposes between “nodes.” Nodes are the various points of entry into the system which is shared between the nodes. The database is protected through security and secrecy by only vetted persons trusted to view the data. This database system should be used only for agency use and the systemic integrity and control of the data remains the responsibility within each node of ownership. However, people are human and may fail at the integrity of upholding the secrecy of the data. We have at least one possible conclusion as to how gang stalking using electronic targeted assaults and psychotronic torture may be exploited by policing and administrative personnel. Could this possibly represent one avenue in which gang stalking with electronic targeted torture is allowed to develop?

Sources:

Williams, C. (2009). Policing Gangs and Extremist Groups: A Different Viewpoint. Policing: A Journal of Policy and Practice, 3(3), 275–280.

Goldsmith, S. and Eggers, W. (2004). Governing by Network: The New Shape of the Public Sector. Washington DC: Brookings Institution, pp. 80–185.

Krisberg, B., Marchionna, S., Baird, C. et al. (2007). Continuing the Struggle for Justice. Thousand Oaks, CA: Sage, pp. 21, 33–45, 89, 267.

Lovato, R. (2007). The Smog of Race War in LA. New York: McGraw-Hill, Art. 25, p. 113.

Sacco, V. (2000). “Media Constructions of Crime.” In Silverman, R., Teevan, J., and Sacco, V. (eds), Crime in Canadian Society, 6th edn. Toronto: Harcourt Brace.

Schneider, R. and Kitchen, T. (2002). Planning for Crime Prevention: A Transatlantic Perspective. London: Routledge.

Tonry, M. (1997). Ethnicity, Crime and Immigration: Comparative and Cross-National Perspective. Chicago, IL: Chicago University Press.

Webster, C. (1997). The Construction of British ‘Asian’ Criminality. International Journal of Sociology of Law 25:65–68.

Wortley, S. (2001). “Under Suspicion: Race and Criminal Surveillance in Canada.” In Chan, W. and Mirchandani, K. (eds), Crimes of Colour: Racialization and the Criminal Justice System in Canada. Peterborough: Broadview

The Secret Society of The Mob: Making a connection to organized gang stalking, electronic assaults, and psychotronic torture

Image for post
PHOTO: The Boardwalk Empire: Atlantic City, NJ during the prohibition. In ‘Boardwalk Empire’ Nucky is also seen to be closely associated with Charles ‘Lucy’ Luciano. Above (fourth from l.) the mobster is seen in 1930 alongside Ed Diamond, brother of Jack, Jack “Legs” Diamond, New York racketeer leader, Fatty Walsh. With Nucky hosting, Luciano and fellow crime bosses met in Atlantic City in 1929 to discuss organizing the underworld into a ‘National Crime Syndicate.’ The Atlantic City Conference of 1929 is considered one of the earliest ‘crime summits’ held in the United States

The mafia, which translates to “brave men” lived by a secret code known as Omerta. The code of omerta means that an honorable man does not talk. That a “real man” does not run to the law. A real man does not talk about his confederates. He handles his own problems. It was an inviolable code adhered to within the mob and it was an oath taken not to reveal any information under any circumstances. It implied that membership to the mob came above and beyond your wife and children and everything else in your life until death.

“You know the old phrase, “The poor will always be with us.” Well, the mafia will always be with us. They’re still dangerous. They’re still lethal.” ~America’s Book of Secrets: Special Edition, Crime and Punishment

The criminal creativity of the mafia has allowed them to adapt. It has allowed them to look at something new and ask, “How can I make some money out of that?”

“They killed for power, they killed for money, they killed for revenge, they killed if the guy was an informant, they killed if guy slept with a made-members wife, and they killed if you disobeyed your boss.” The number one character trait to organized schizoids known as mafias and gangs is this; Eventually, they turn on one another. Greed and self-interest disrupt loyalty within the organization and leads to bloodshed.

At the peak of the mafia’s power in the 1930s, 1940s, and 50s; the mafia was believed to be bigger than General Motors and US Steel combined. According to the FBI, the American mafia still has approximately 3,000 active members. And just like the iconic mobsters of the past, the most modern mafia’s ill-gotten games still come at a price; blood, bullets, and a massive body count.

What was the secret to their strength and influence? Two things promoted the success of the mob; secrecy and violence. And violence was the grease. Violence was the fuel that drove the respect they would be given. Violence is what made the mafia effective. Except violence is a visible measure of the total lack of control one truly has over a situation and is a demonstration of a failure to introject and mourn through losses. The respect that is given to a mobster, is only given out of fear.

The masculinities that are a part of the Cosa Nostra mentality can be summed in proving two things about yourself as a man. One, that you are not a “little girl”; and two, that you will not be humiliated and made to feel like a “little boy” by another prominent male figure. In psychoanalysis, this is what is known as the Achilles Complex, and this is what spawned the violence and control the mafia would eventually gain over others.

The image that the mafia leaders projected to the public was like that of Italian senators. They dressed well, wearing the finest of clothing and jewelry. They drove nice cars and lived in well-maintained houses. They operated business and with it, carried a level of respect from the larger culture who may not have known about the “real business” they were actually involved in. This allowed them to carry an air of superiority and arrogance with them like a cloak that was to defend against the degradation of introjecting some basic principle truths. One, no one is as powerful as they liked to believe, and two, the respect these “made-men” would receive, as their image, was insincere; a false veneer. This defense mechanism defended them from losing a sense of their superior cultural identity. And if they were exposed as “little boys” then these men would resort to violence to resolve the dispute like young bullies on the playground. One of the fundamental truths based in psychoanalytic theory was that these men were not men, but in fact, little boys who didn’t know how to legitimately win or lose. This was the narcissism that promoted the dysfunction and chaos of the mafia. It was a defense against the anxiety of being or being made to feel humiliated, a “less than” or a “have not” or “weak with no power.” The riches and wealth mafia dealings would earn, brought with it respect and a system of honor. These were, after all, self “made-men.”

There is a reason America has maximum security penitentiaries with CMUs (communication management units). It’s because the worst of the worst of criminals (mostly terrorists) might communicate messages as the mafia did with the simple image of a “black hand.” Criminals housed in penitentiaries like Marion, Illinois, and Florence, Colorado, where inmates are not allowed to receive visitors and communications, locked down for 23 hours out of the 24-hour day cycle because if they did, they might promote and communicate a plan that could endanger many American lives.

Now, how can we connect the dots to the phenomenon known as the Targeted Individual (TIs) and the new uprising of a new form of “mafia.” All we have to do is compare the downfall of the South American drug trade with the uprising of the Mexican drug trade. While things change from century-to-century and from decade-to-decade, somethings never change. They just reshape and reform themselves into new forms of phenomena.

Written By: Karen Barna

Mother, Daughter, Student, Graduate, Lover of Books, Reader of Philosophy, Interested in Psychoanalysis, Criminology, Sexual Deviance, Social Justice & Law

The Proximate Cause and Effect of Outcomes Known as Distal Effect and How This May Help Explain Electronic Targeted Assaults

Image for post
An image of a diagram that describes the distal effects of pollution at the community level.

This story was originally published on May 11, 2019 over www.ProclivitiesPrincipleWisdom.wordpress.com which I am the administrator and to which it has since been updated.

Distal Effects — A proximate cause is an event that is closest to, or immediately responsible for causing, some observed result. This exists in contrast to a higher-level ultimate cause (or distal cause) which is usually thought of as the “real” reason something occurred.

In most crimes, we work backward from the outcome to those responsible. Money is missing from the till, and we look for the thief. Control often is literally hidden “behind closed doors.” In addition, as emphasized, coercive control as it pertains to domestic violence can also be difficult to detect because its means and effects merge with behaviors widely associated with women’s and children’s devalued status in personal life — being deferential, thrifty, thin, and unnoticed. Also, coercive control’s means and effects can merge with behaviors of the dominant cultural environment, giving meaning to “class.” For example, just like being too thrifty or thin is associated with some lower-class women’s behaviors, so too can being overweight, unemployed, sedentary, and dependent. These traits can be associated with “genetic inheritance” but they can also be the by-product of clandestine, invisible abuses that go unnoticed in the public eye.

The use of electromagnetic frequency against a subject/victim, a target for grooming behavior, can be very difficult to detect and uncover as well. First, electromagnetic frequency waves are invisible. Second, the onset of agitation or lethargy in a subject/victim may be observed but the reason for its occurrence misdiagnosed and attributed to something else entirely thereby allowing the unseen root cause to continue in the environment of the subject/victim. This obstruction, this ambiguity in the viewing details by those witnessing behaviors, can and will completely obliterate any truth to the proximate cause and effect thereby thwarting uncovering the real reason and meaning behind the abuse and render any meaning given to its proximate cause or distal effect invalid.

The strategic analysis assumes that our behavioral repertoires in these and other nontrivial facets of everyday life are relatively consistent, have identifiable temporal and spatial dimensions, and are unintelligible apart from the matrix of power in which they arise, the norms to which they respond, the relative benefits and sanctions they elicit in specific social and historical contexts, and the general consequences they effect. The proximate means and motives by which these strategies are implemented are a function of individual personalities, preferences, and situational variables as well as of their perceived efficacy, and the tactics selected tend to be spatially diffuse and highly individualized. Moreover, the pattern that makes these behaviors strategic is recognizable largely in retrospect. What marks behaviors as strategic is their collective reality, aggregate consequence, and the extent to which the link that joins this reality to its consequences is mediated by structural dimensions of the economy, polity, and civil life.

The subset of collective behaviors that encompasses how men and women constitute themselves as such, how they “do masculinity” and how they “do femininity” in a particular epoch at the range of sites where gender takes on its social meaning, including school, work, family, and intimate relationships. The substantive benefits/losses persons derive or experience from enacting these gender strategies constitute their “materiality.”

Thus, the “materiality of coercive control” refers to the tangible and symbolic visible results that men take advantage of, and to which are accrued from dominating and exploiting, not just their female partners, but those they come to gain power and control over. The substantive deprivations women and children suffer can be observed, but difficult to clearly define. Similar to the invisible electronic targeted assaults now happening to various individuals within the United States, this “materiality” can be defined as the benefits and losses that constitute what feminists have historically defined as the gender politic of a dominant male patriarchy. When the dominant gender enacts power over the subordinates, seldom does anyone consider electromagnetic frequency torture. This can mark the silencing imposed on individuality and the silencing of their sexuality as a part of their personhood and an ambiguous by-product of depravations inflicted as the result of this “materiality” in a dominant male politic. In the concept of materiality, its convention within the aspect of “auditing” within accounting practice relates to the importance or significance of an amount, the validity of a transaction, or discrepancy thereof. The objective of a financial audit is to enable the auditor to express an opinion as to whether or not the financial statements were prepared, in all material respects, to the conformity of a financial reporting framework such as in Generally Accepted Accounting Principles (GAAP).

“What marks control is not who decides, but who decides who will decide; who decides what, whether, and how delegated decisions are monitored; and the consequences of making ‘mistakes.’”

Evan Stark, Coercive Control

Similarly, the use of electromagnetic frequency signals to arbitrarily stimulate or sedate the human mind or attack the body of victims seek to perform a similar audit, albeit an audit related to behavior or forced acceptance of another person’s opinion and/or domain.

Men set out to realize their individual purpose in the world, most do not seek out to become controllers. Establishing mastery over another independent adult in personal life is complex and difficult work for which there are no guide books, not even for “dummies.” If it is recognized at all, the fact of domination in personal life is usually perceived only indirectly through signs of assertion, command, dependence, and subordination within relationships. We see a controlling or a demanding husband or relative or servile or timid wife, but not the lines of power that join the power of control to its command. These are subtle elements that have contributed to invisible empires, invisible empires that have flourished throughout history in terrorizing fashion over minority groups. The Free Masons and the Ku Klux Klan are just two clubs that conducted their activities in secret and these invisible secret societies have gone on to re-organize and re-shape the social order.

Written by:Karen Barna

Mother, Daughter, Student, Graduate, Lover of Books, Reader of Philosophy, Interested in Psychoanalysis, Criminology, Sexual Deviance, Social Justice&Law

Invisible Chains: Coercive control and how new technological innovations are abusing and entrapping people in everyday life

Image for post

This is a re-posting of an original article published on May 3, 2019 over http://www.proclivitiesprinciplewisdom.wordpress.com

“The domestic violence field faces a similar predicament when it tries to account for how battered women behave without identifying their “cage” …. the cage remains invisible as long as we omit the strategic intelligence that complements these acts with structural constraints and organizes them into the patterns of oppression that give them political meaning.”  (1) pg. 198

I would like to open my discussion today about the coercive control of men over female bodies. But this is not just about women, although it is men who primarily victimize women, this is about clandestine technological victimization of people through implants that work on wireless radio waves signals. I would like to integrate into this discussion of coercion the use of advanced technologies that have been developed for mastery and control over the human body and to note the element of boundary violations in man’s attempts to master and control a subject. Men, for centuries, have tried to conquer and manage their death in terms of its prevention, curing, and thwarting progressive symptoms of disease. Some of these new technologies developed in modern medicine run off of radio frequency signals. The same strategies that doctors use to prevent, cure, and stymie progressive disease symptoms are the same types of strategies abusive men use over their partners in response to thwarting the dreaded death drive in support of the life drive. The death drive is one of the three fundamental drives Sigmund Freud hypothesized about which include also the sex drive. These drives in the human psyche can create unconscious repetitive behaviors that become maladaptive to everyday living. The roots of these unconscious behaviors are cloaked in delusions, fantasies, and myths. It is these maladaptive repetitive behaviors that do not serve us well when it comes to our intimate partner relationships and can be very one-sided in that they do not consider the other person as a speaking subject in her own right, with her own wishes, and own autonomy. I use the pronoun “she” but it could just as well be “he” as we are a gender-fluid and presumably inclusive society and perversions rooted in the primal scene are part of a growing social diversity. It totally forecloses upon the subject’s position in the argument and completely closes down any discussion that may produce fruitful negotiations where both parties may benefit.

“To identify an active, aggressive woman with Truth is to defy a very long tradition that identifies strong females with deception and virtuous females, including muses, with gentle inactivity.” ~Alicia Ostriker, “The Thieves of Language: Women Poets and Revisionist Mythmaking.”

Coercive control over women is seen in the personalities of abusive men over their wives, intimate partners, and children. It can also be observed in women, in their everyday interaction with co-workers, friends, business associates. It has been seen in police interrogations, political leadership, religious leadership, as well in the everyday interactions with abusive individuals who must maintain control and dominance at all costs in order to prevent annihilation from the death drive. The scope of this discussion will focus on the coercive control of advanced technology over human beings in domestic battery and domestic violence situations. One of the aspects of coercion in intimate partner relationships is known as microsurveillance. Microsurveillance is described as:

“….to detect disobedience or disloyalty, they may survey the minute facets of a woman’s everyday conduct in ways that are inseparable from the microregulation unique to coercive control, targeting not merely where they go, but how fast they drive, or how much money they spend, entering everyday routines in ways that obliterate autonomy. This type of surveillance injects fear even into such perfunctory choices as whom they ask for directions or which route they take home as well as when they arrive, until choice itself becomes frightening. Intimate surveillance extends from going through drawers, pocketbooks, diaries, or closets to monitoring time, phone calls, bank accounts, checkbooks, and stealing identity, using global positioning devices (cyber-stalking), or installing video cameras to track or monitor a partner’s movement. Surveillance is almost universal in abusive relationships. Eight-five percent of the women in the Tolman study and over 90% of the English women reported that their abusive partner monitored their time, for instance. Particularly in combination with microregulation, microsurveillance gives coercive control an intensiveness found in no other form of oppression.(1)

Surveillance makes intimidation portable. It is at this place in my discussion that I would like to reflect on my previous post about the military’s transition in new technological innovations. Our US government has a direct interest in advanced project research. In fact, the Defense Advanced Research Project Agency (DARPA) supports universities, large companies, and small companies in their research, if their research will produce beneficial technologies that our military can monopolize upon. DARPA is working to develop and promote artificial intelligence (AI) for its beneficial uses and Google has signed on with DARPA in some advanced research projects. (2)(3) If you think about our smartphones, they run on Android systems. Part of Android systems is something call Google Play Services. Google Play Services grants permissions to Android Systems in accessing Body Sensors, Calendar, Camera, Contacts, Microphone, Phone, SMS (text messages), and Storage. Understanding that Body Sensors are sensors that are worn outside the body to monitor internal biological rhythms like heart rate, pulse, (Fitbit) even blood sugar (continuous glucose monitoring), the questions become, “Could Google be working with the military on biological implanted sensors that can be remotely accessed using an Android phone? Or has some rouge computer scientist discovered a way to clandestinely imbed software into a phone via the Google Play Store and access these implants in unsuspecting citizens?” Since devices can not only be worn outside the body, they can also be implanted inside the body, it is very reasonable to think that new technologies associated with implanted devices in experimental medicine (e.g., sensors) as well as other types of implants that could be used to access a person’s body remotely via Android systems through Google Play Services. It’s interesting to note that sensor diagnostics are used in modern-day automobiles with navigational “On-Star” systems linked to satellites. How these two might potentially be connected raises an interesting question; can this technology provide the very real possibility of giving a rouge agent access to another’s body and motor vehicle through remote monitoring. These new projects could also touch upon aspects of mind control and coercion of a human subject through remote clandestine rouge operations as well as eves dropping aspects that can be used to monitor behavior. Eves dropping issues have been reported in some published news reports as a potential problem with the android technology known as Alexa as well as new Smartphones and laptops that can “talk” and “listen” to our voices. This is the scenario I have theorized regarding my own personal victimization with what many individuals have described as targeting, mind control, and gang stalking. In a court of law, or as an adversarial argument to its detrimental possibilities this is purely speculation and is insightful in knowing how new advancing technologies may be moving individuals into an uncertain future with regard to privacy, safety, and protection of our 4th amendment rights.

The type of microsurveillance I have encountered and endured attempts to microregulate my behavior according to my perpetrator’s wishes and desires. This is accomplished by inducing electromagnetic fields that make a subject feel ill. When the individual performs the desired action, the electric current is turned off and the subject receives relief from the torture of the electromagnetic field. The period of relief does not last long and the cycle of control and dominance continues as the other person maintains absolute reign through surveillance over the subject by monitoring their activity. So, for example, the perpetrator may want me to stop using my computer. This could be accomplished in a few different ways. One, outfitted with tracking technology, my computer can be remotely accessed and located through a location finder. It can be either shut down, or they can make my online experience unpleasant and difficult for me by slowing down my computer system when they notice computer activity. GPS type tracking can be installed in my laptop computer, software that can activate an alert system, thereby alerting my perpetrators to my online or offline activity. Working with a slow computer system makes accomplishing a task very difficult and wastes precious time. Sensors implanted in the body can be activated wirelessly through a similar alert system and turn on or off via an electromagnetic field (radio frequency). So when I sit down in front of my computer laptop and turn it on the software alerts a third-party viewer. This is also done over my cell phone too with a type of Google tracking I previously described when Google Play Services interacts with Android Systems. I have noticed a decrease in electronic targeting if I do not sign in to my Google Gmail or connect my cell phone to Google Play Services. Also, when new “updates” occur over my cellphone when it is connected to Google Play Services, updates that allow me the use of even more features, immediately I have been located, my device finder turned on through the Google update and electronic targeting starts all over again. In addition, jamming devices might be used to intervene in computer operations and jam cell phone transmission. As far as targeting goes inside my house, this has also been accomplished. If the perpetrator wants you to physically move from one room to the next, and I believe this might be part of some type of gang stalking device, where the perpetrator has installed sensors or monitors that pick-up on movement. The electromagnetic field will be turned on, which in turn may force the subject to move away from its original position, say the living room to the basement. The signal fades or is either turned off as the subject changes location and moves farther away from the source. I have had this technology turned on when attempting to cut my grass and maintain an orderly lawn. I have had it turned on during crucially needed exercise sessions (I’m a diabetic) in the privacy of my own home which exercise is beneficial behavior aimed at maintaining wellness and good health. I have had it turned on when attempting to detail an account of my own abuses, thereby impeding cognition and scattering my thoughts. I have it turned on when I try to create new blog post articles about abnormal psychology and perverse deviant behaviors and unfair practices in medicine.

The direct consequences of microsurveillance can be dramatic. If a victim fails to accommodate her abuser’s “house rules” they may be made to endure an evening of cursing and screaming, or she may be denied privileges like visits with friends and/or the use of the car. This tight scrutiny turns some abused women into recluses as one of the aims of a batterer is alienation. In my personal experience, I have been made to endure long bouts of torture throughout the day and night, making everyday living difficult. I blame this technology for the onset of my weight gain. One of the obvious dramatic results of abuse may be seen in the physical appearance of the victim. The victim may physically appear uncared for, may have gained weight, and look disheveled, may have bruises, scars, or burns. Whereas before she became a victim of abuse, she maintained her weight and appearance well. This could also be a direct result of the technology being turned directly against her at night while she sleeps, waking her up and disrupting her sleep pattern or it is turned on during daily routines making it difficult for her to make accomplishments and create goals. The common symbolic theme is a theme of “disruption, disruption, disruption” in the production of invisible chaos. These “disruptions” have their origins with the onset of low-level frequency vibrations I receive to my lower body while sleeping and to which I have been awoken during my sleep repeatedly at night. These attacks have also turned on frequency in my head, which has caused me to feel discomfort. These attacks against the female body are routed in primal scene fantasy and can not only be explained through psychoanalysis but can also be explained through the philosophy of silence. Plato’s cave metaphor explains the philosophy of silence in which he disfigures the maternal body with his cave metaphor, rendering the fecund woman as an “oppressive place men seek escape” thereby denying the female body a voice within the domain of philosophy.

Plato’s Cave, Matricide, and Forensically Reading Silence

“Noelle Neumann suggested that silencing minorities usually happens by using social innuendos and non-verbal cues about the “right” opinion, her work does not rule out the possibility that some times social pressure may take a more active form with people supporting or even taking action to silence voices of disagreement.” (4) Neumann(p. 82) noted Rousseau wrote about a special tribunal, “the Censor,” that never existed, but that censorship is an important element in public opinion that preserves manners and morals by preventing opinions from growing corrupt and by hindering the dissemination of corrupted ideas (Rousseau, 153, pp. 140–141). (5) (6)

We might analyze the actions of the angry mob that stormed the White House and the violence that ensued after a Trump rally. The actions taken by US citizens that utilized violent aggression as a means to settle a perceived dispute suffered by the mobsters demonstrate how the “silencing” of corrupted ideas has been handled by the federal government. Destruction of property, violating personal boundaries through physical assault, and breaking and entering a protected federal complex while proclaiming threats to kill and harm innocent people is not how civilized people handle disputes. It is how people without a sound logical argument settle a dispute through the use of violence because they are lacking in the capacity to formulate a sound and rational argument based on a philosophical debate. Its method is quick and easy versus long and arduous.

I propose the rouge clandestine attacks of US citizens through gang stalking and targeting violence and the use of electronic assaults are part of the same subculture that stormed the White House. The silencing of groups and their unfavorable opinions can be observed in many cultures and under various conditions. During the civil rights movement, many whites wanted to silence every Negro who had the courage to stand up and fight for their rights. In the modern history of war, we witnessed the German Holocaust, the genocide of Serbs by the Ustashe, the genocide of the Bosniaks and Croats by the Chetniks, Bangladesh genocide, East Timor genocide, the Cambodian genocide, Guatemalan genocide, Anfal genocide, Rwandan genocide, Bosnian genocide, and the list goes on.

The racial tensions in America have not changed with yet more killings of young black people amidst the backdrop of COVID Lockdown. What we are witnessing in the phenomenon of the electronically targeted individual and the targeted individual suffering gang stalking is no different, albeit may not be based on racial or ethnic differences, but rather just conflict itself. In studying criminology, I learned sociologists have analyzed inner-city populations to understand how values and norms contribute to violence and the manifestation of violent subcultures. I propose there is an organized subculture that is clandestine (invisible like the mafia and the KKK) that utilizes violence as means to settle individual disputes or perceived wrongdoing through clandestine attacks. This subculture that utilizes violence is also utilizing advancing technology to do so and possesses a “mafia mentality” in the use of their ideological motivated violence.

There is an obvious element of sadistic pleasure a perpetrator derives in the degradation of punishing and abusing their victims:

“Controlling men establish their moral superiority by degrading and denying self-respect to their partners, a violation of what Drucilla Cornell calls “the degradation prohibition.” (7) According to philosopher John Rawls, self-respect is a “primary good” without which “nothing may seem worth doing, or if some things have value for us, we lack the will to strive for them. All desire and activity become empty and vain, and we sink into apathy and cynicism.” (8) (1)

A person who is being abused may report feeling “dead inside”, and this sentiment illustrates how important self-respect is to the personhood of an individual.

“Emotional abuse is particularly harmful in the context of a primary dependence, as when a parent degrades a child, when survival depends on approval, alternative sources of support are unavailable, and when the object of degradation is deeply invested in how the other feels about them (as well as in their judgment) and is unable to muster positive self-talk or other forms of resiliency to counter negative messages. The adult victim of coercive control is in no sense childlike. But the tactics used in coercive control can so disable a woman’s capacity to affirm her femininity that she mimics a childlike dependence on approval that significantly amplifies the effect of insults.” (1)

At this point in the discussion, I would like to detail the name-calling I have endured. Words like “whore” and “stupid,” along with malignant narcissist phrases like, “Look at her. She can’t do nothing about it.” Using the term “it” as a reference to the stalking, gang stalking, surveillance, microsurveillance, and electronic torture I have endured. The phrase, “You were nothing but his whore!” Are all testaments to voices that possess victim blaming mentalities that persist in mainstream thinking today. Ideologies that have monopolized on the victims’ past sexual histories that seek to place responsibility on to victims and allow sexual perpetrators to elude responsibility for any wrongdoing and to which has had a history in state law. This mentality has served mainstream patriarchy and has allowed for the continuation of brutal sexual assaults and promoted femicide. In the history of law, early childhood physical and sexual abuse, in the case histories of sexual assault victims, was permissible evidence at trial. They were known as “promiscuity laws,” and these laws prevented the victim of sexual assault any rights to prosecute the perpetrator if her past history revealed she suffered physical and sexual abuse in childhood. Phrases like, “She deserved to be beaten,” and “She deserves to be raped,” reveal the myth-making mentality that physical assault and rape are viable solutions, perhaps even “therapeutic solution” to unwise action, outspoken voice, or choice on the part of the female victim, or even perhaps the solution as a cure to her “deviant mental illness.” (9) (10)

Insults and put-downs are effective in coercive control because they play off complementary forms of deprivation, intimidation, and control that disable a victim’s capacity to respond and stand up for herself. It also facilitates the creation of self-doubt, as the victim questions her own perceptions and abilities. Targeting areas of female gender identity where the partner’s self-confidence may already be poor, the use of coercive control as a tactic for disabling a woman’s capacity to affirm her femininity utilizes forms of violence to establish the superiority of the abuser. As a result of the abuse, she may become alienated and withdrawn. Compromised by such forms of violence, the victim may feel helpless and without the necessary power to overcome such abuses. (1)

Shaming is another tool in the toolbox of abusive men and male batterers. “In shaming, perpetrators of coercive control demonstrate a victim’s subservience through marking or the enforcement of a behavior or ritual that is either intrinsically humiliating or is contrary to her nature, morality, or best judgment. In a perverse inversion of the 1950s high school practice in which girls proudly wore rings or letter jackets to signify their “trophy boyfriends,” abusive men have forced women in [reported] caseloads to bear tattoos, bites, burns, and similar marks of ownership visible to others.

Markings signify that a man has a personal interest in this woman that he will defend. But it also signifies she is vulnerable to exploitation or further abuse by others. Because of its link to ownership, marking often becomes a source of self-loathing and can prompt suicide attempts. Although there is no study evidence on this practice, it is so common that the National Coalition Against Domestic Violence (NCADV) and the American Academy of Facial, Plastic, and Reconstructive Surgery have developed a jointly run free program for removing tattoos and other scars inflicted on battered women and their children by abusers.” (1)

It is important to link the importance of body weight and physical appearance in the “marking” of a female in ownership by abusive men. Weight gain and diminished physical appearance are a by-product of not only the microregulation and microsurveillance, but also of degradation, and shaming of the victim. Bodily disfigurement furthers erodes a woman’s self-confidence and confuses her autonomy and self-identity with aspects the batterer imposes on her. In the case of the triumphant haircutter, Louise Kaplan describes a relationship between husband and wife, in her book Female Perversions, in which a wife was forced to endure her husband sexualized ritual of clipping a portion of her long golden locks during the act of sexual intercourse. Her punishment to wear a hairstyle that looked like a really bad haircut was the product of her husband’s unconscious fantasies rooted in his primal scene experience with his alcoholic mother and his fantasy involving female degradation. (11)

“The victim of coercive control is isolated from the moorings of her identity and, because identity is first and foremost a social construction, from her own unique personhood.” (1)

“Shaming also involves ritual enactments associated with sex, or basic bodily functions, such as eating, showering, dressing, sleeping, or using the toilet. Clients in my practice have been made to sleep standing up, wear their “bad” clothes for days without changing, eat without utensils, shower repeatedly or in cold water, denied toilet paper, and forced to use the bathroom with the door open, locks removed, or with a timer.” (1)

“Burt (1980) defines rape myths as “prejudicial, stereotyped, or false beliefs about rape, rape victims, and rapists” (p. 217). According to Lonsway and Fizgerald (1994) these beliefs are “widely and persistently held” and generally “serve to deny and justify male aggression against women” (p. 133). Because of the pervasiveness of these beliefs, some scholars and feminists use the term “rape culture” to describe the presence of rape myths in media and public discourse, as well as the general acceptance of these myths in general society (Whisnant 2009).” (10)

There is a believed myth rooted in fear when it comes to female sexuality, a myth that perpetuates a language of silence cross-culturally for women.

“It is obvious in clinical work that women’s silence is deeply influenced by their interactions with their mothers, as well as by the more familiar silencing by men of their wives and daughters that have been identified as manifestations of a heliocentric society……the historian Merry Weisner-Hanks draws a connection between silence and virtue in women: ‘Because Eve tempted Adam by using words, women’s speech becomes linked with sin and disobedience, and female silence is thus interpreted as a divine command.’ She goes on to say that, “Italian, English, and German, Protestant, Jewish and Catholic men all agreed that the ideal woman was……’ chaste, silent and obedient.’” (12)

The ideology that a woman, or any person for that matter, is required to be arbitrarily controlled through remote advanced technology, completely foreclosing on the subject’s voice as a speaking subject, in his or her own right, and the right to her own statements regarding her Truth in the matter. This is a violation of civil rights law which guarantees freedom and liberty in the pursuit of happiness set to one’s own autonomy. I used to wonder quietly to myself, “Why do some men and women fear women’s sexuality to the degree they are willing to kill?” Some unconscious reasons have directly to do with the female’s power to give life and become “the creator god,” or in aspects rooted in the fear of her power as the taker of life in sentencing one to death through literal and metaphorical withholding of the breast and the denying of mother’s vital nourishment and love. This fear is tangled-up in the human psyche’s experience of Oedipus, with the castrating defeat of the little boy by his father during early childhood development. It is also associated with the fear of being replaced in lateral sibling relations by the arrival of a new offspring. (13)(14)(15) But whatever the reason, female procreative power is feared by both men and women alike.

“Childbirth is woman’s talisman, manifest and indisputable evidence of female power. The ability to create new life is the earliest and most profound source of power, and we all, men and women, fear it.” (16)

Will we ever understand envy and jealousy in terms of female procreative power? Can we understand vehement hatred and psychotic foreclosure in the radical violent silencing of women as speaking subjects? It is only through delving into psychoanalytic literature and research, case studies, feminist writings, and queer writings that help to reveal the origins of this foreclosure and its possible psychotic nature in its foreclosure against the mother, and the father as well; how fetishized behaviors are formed, and aspects of sexual orientation established. (17)

SOURCES:

(1) Stark, Evan. (2007) “Coercive Control: The entrapment of women in personal life.” New York. Oxford University Press. pg. 229–288. Chapter 8, The Technology of Coercive Control

(2) Jill Aitoro. “DARPA’s director on how the Pentagon can transition innovation.” IT and Networks. C4ISRNEThttp://www.c4isrnet.com (April 17, 2019).

(3) “Six Paths to the Nonsurgical Future of Brain-Machine Interfaces.” (2019) Defense Advanced Research Projects Agency. US Department of Defensewww.darpa.mil https://www.darpa.mil/news-events/2019-05-20

(4) Neumann, E. (1984). The spiral of silence: Public opinion — Our social skin. Chicago. University of Chicago Press.

(5) Rousseau, J.J. (1953). The Social Contract. In F. Watkins (Ed. and Trans.) Political writings. London. Nelson.

(6) Tsfati, Yariv and Dvir-Gvirsman, Shira. (2018). Silencing Fellow Citizens: Conceptualization, Measurement, and Validation of a Scale for Measuring the Belief in the Importance of Actively Silencing Others. International Journal of Public Opinion Research, 30(3), 391–419.

(7) Cornell, Drucilla. “The Imaginary Domain.” New York. Routledge. (1995) pp-8–10

(8) Rawls is quoted in Cornell, “The Imaginary Domain,” p. 9

(9) Dijkstra, Bram. “Idols of Perversity: Fantasies of feminine evil in the fin-de-seicle culture.” New York. Oxford University Press. (1986). The Mythology of Therapeutic Rape; The Fetish of Death; and Why The Identity of My Perpetrator Must Be Female

(10) Anna E. Kosloski, Bridget K. Diamond-Welch, and Olivia Mann. “The Presence of Rape Myths in the Virtual World: A qualitative textual analysis of the Steubenville sexual assault case.” Violence and Gender. Vol. 5, №3. (October 5, 2018).

(11) Kaplan, Louise J. (1991). Female Perversions: The Temptations of Emma Bovary. New York. Doubleday pgs. 145–154, Chapter 2, Perverse Scenarios, The Case of Mr. R.: The Triumphant Hair Cutter.

(12) Balsam, Rosemary. “Women’s Bodies In Psychoanalysis.” East Essex Canada. Routledge. (2012).

(13) Freud, Sigmund. (1924). The dissolution of the Oedipus Complex. Standard Edition. Volume 19. London: Hogarth Press.

(14) Chasseguet-Smirgel, Janine. (1984) Creativity and Perversion. London. Free Association Books, pgs. 35–43. Chapter 4, A Re-reading of Little Hans.

(15) Mitchell, Juliet. “Mad Men and Medusas: Reclaiming hysteria.” New York. Basic Books. (2000).

(16) Holmes, Lucy. “Wrestling with Destiny: The promise of psychoanalysis.” New York. Routledge. (2013). The chapter on The Medicalization of Childbirth.

(17) www.lovehoney.com “The Sexual Happiness People.” Electro Medical Fetish. Electrastim | Electro Sex | Lovehoney

ElectraStim EM60-M Flick Electrosex Stimulator Multipack Set — Lovehoney US

Doc Johnson The Stinger Electro Play Wand — Lovehoney US

ElectraStim EM140 SensaVox Power Unit Dual Channel Electrosex Kit — Lovehoney US

The comparison to be made here with this last cited reference should be between electronic stimulation used by the US military and the use of the electromagnetic spectrum in electronic warfare and the use of electronic stimulation in sexual perversion involved in BDSM sex and sexual role-play and observed in acts of bondage and discipline. This connection cannot and should not be ignored as both are rooted in primal scene fantasy (War). Modern advancing technologies current and experimental capabilities against the backdrop of a nation in conflict with itself regarding gender, racial, ethnic, religious, and political differences and how those connections may very well contribute to the phenomenon we now know as the Targeted Individuals (TIs) and electronically Targeted Individual (eTIs).

Other source worthy to consider but not quoted from:

Review of the Roots of Youth Violence: Literature Reviews. Ontario Ministry of Children, Community and Social Services. Last Modified May 5, 2016. Retreived online February 17, 2021. http://www.children.gov.on.ca/htdocs/English/professionals/oyap/roots/volume5/chapter09_subculture_violence.aspx

Anderson, Elijah. (1999). The Code of the Streets: Decency, Violence and the Moral Life of the Inner City. New York: WW Norton.

Ball-Rokeach, Sandra J. (1973). Values and violence: A test of the subculture of violence thesis. American Sociological Review, 38(6), 736−749.

Berburg, Jon Gunnar and T. Thorlindsson. (2005). Violent values, conduct norms and youth aggression: A multilevel study in Iceland. The Sociological Quarterly, 46, 457−478.

Brezina, Timothy. (2004). A quantitative assessment of Elijah Anderson’s subculture of violence thesis and its contributions to youth violence research. Youth, Violence and Juvenile Justice, 2(4), 303−328.

Erlanger, Howard S. (1974). The empirical status of the subculture of violence thesis. Social Problems, 22(2), 280−292.

Felson, Richard, A.E. Liska, S.J. South and T.L. McNulty. (1994). The subculture of violence and delinquency: Individual vs. school context effects. Social Forces, 73(1), 155−173.

Hayes, Timothy C. and Mattew R. Lee. (2005). The Southern culture of honor and violent attitudes. Sociological Spectrum, 25, 593−617.

Nisbett, R.E. and D. Cohen. (1996). Culture of Honor: The Psychology of Violence in the South. Boulder, CO: Westview Press.

Ousey, Graham C. and Pamela Wilcox. (2005). Subcultural values and violent delinquency: A multilevel analysis in middle schools. Youth Violence and Juvenile Justice, 3, 3−22.

Sampson, Robert and William Julius Wilson. (1995). Toward a theory of race, Crime and urban inequality. In John Hagan and Ruther Peterson (Eds.), Crime and Inequality (pp. 37−54). Stanford: Stanford University Press.

Smith, Michael. (1979). Hockey violence: A test of the violent subculture hypothesis. Social Problems, 27(2), 235−247.

Stewart, Eric and Ronald Simons. (2006). Structure and culture in African American adolescent violence: A partial test of the “code of the street” Thesis. Justice Quarterly, 23(1), 1−33.

Surratt, Hilary L., James A Inciardi, Steven P. Kurtz and Marion C. Kiley. (2004). Sex work and drug use in a subculture of violence. Crime and Delinquency, 50(1), 43−59.

Washington, Earl M. (1996). A survey of the literature on the theories of violence and its prevention. Journal of Negro Education, 65(4), 403−07.

Wolfgang, Marvin and Franco Ferracuti. (1967). The Subculture of Violence. London: Tavistock.

WRITTEN BYKaren Barna

Mother, Daughter, Gardener, Student, Graduate, Cook, Care-Giver, Lover of Books, Reader of Philosophy, Interested in Psychoanalysis

The Reason Behind Gang Stalking and the Targeted Individual: One Person’s Account and How Shame Plays into Its Obscurity and Confusion

Image for post
Image: Dart that made a “bullseye” hit and a dartboard is a favorite game played by many.

The most intense electronic targeting began after I was involved in a hit and run accident while driving under the influence of alcohol and opiates. This event may have rendered me a target (a test subject) by researchers at the hospital I was sent to. A local hospital is known for its advances in treating brain trauma, and the trauma of war can cause brain damage in the form of mental illnesses like PTSD. Are these rogue attacks the result of state interest surrounding in “curing” me of my “disease?” The proclivity of the human race, especially in a police surveillance state, tends to ascribe negative traits to individuals who possess individual differences and has always been an obstacle in achieving peaceful human relationships. Another aspect to this targeting was an intimate relationship I had with a close friend of mine that wasn’t sexual in any way but rather turned rouge friendship. I, my close friend, and her husband were all using drugs and alcohol, and when her husband turned on me and forced sex, which ended in sexual assault, my friendship dissolved. This may have been the point of inception for my targeting, but this would make my targeted experience a criminal conspiracy, not by the federal government, but by the people who were involved in the drug deal and sexual assault, as I believe there exists more than just one lone operator. They may call me “narc” but it’s not because I’m a narcissist. In fact, the person who raped me is far more likely to be part of the paranoid-schizoid personality constellation.

When I describe these events, it makes me feel shameful, and I suspect this is the reason why people ascribe their targeting to rogue government conspiracies involving mind control, or NSA and CIA service security surveillance utilizing advanced technology that can “read minds” and transmit auditory voices into human skulls. It’s easier to ascribe this occurrence to government intrusion, and clandestine secret military operations because it allows the targeted individual to elude the responsibility that, they themselves, may have acquired a psychopathic personality within their orbit because of their past behavior, and these personalities are interested in destroying them because of psychic arousal for primal scene fantasies. My own shady past association may be the reason for my targeting. Targeted individuals may be having difficulty facing their truth which is, they themselves are/were abusing substances and/or the people responsible for abusing them are people who have always been part of their friendships and family arrangements. It’s simply this, that the psychopathic personality didn’t reveal his true identity to them until he had their victim exactly where they wanted their victim. That is, in a powerless and subjugated position. This is what psychopaths do. They wait, patiently, until the time is ripe for the yielding. Still, this does not give the perpetrator the right to get away with the harm they are inflicting on society.

I have not used illicit chemical substances since October 3, 2006. I no longer associate with my former “close friends” and have made the necessary adjustments to my lifestyle choices. However, this did not stop a psychopath from stalking me online and hacking a variety of my on-line accounts like Facebook, my e-mail server, and my WordPress blog. It didn’t stop them from inflicting pain and suffering into my world, utilizing electronic stimulation, attempting to stimulate and sedate me through clandestine, rogue orchestrations utilizing a wirelessly controlled implantable device like some type of sex toy that delivers stimulation to my genitals and anal regions and sedation through a neural radio frequency link. Nor did it stop them from targeting me both outside and inside of my residence during necessary activities like cutting the grass, aerobics and weight lifting (workouts beneficial for health), and cleaning my home.

Although I refuse to believe that this phenomenon is part of some clandestine secret military operations utilizing some form of abbreviated code name, I can’t deny my past history. But this past history shouldn’t be used like former “promiscuity laws” were used to exonerate men accused of acts involving brutal forms of rape because of “the victim’s past history with physical and/or sexual abuse in childhood.” This history isn’t meant to be used as an excuse to give some deranged lunatic a “defense” to continue his behavior and illude the responsibility he owes to the federal and state government and to the victims themselves!

WRITTEN BYKaren Barna

Mother, Daughter, Gardener, Student, Graduate, Cook, Care-Giver, Lover of Books, Reader of Philosophy, Interested in Psychoanalysis

DECEPTIVE CRIMINAL RELATIONSHIPS: Comparing the penetration of electronic targeted assaults and non-penetrative targeted assaults against the criminal penetration and non-penetration of deceptive sexual relations

Image for post

Targeted Individual (TIs) and Electronically Targeted Individual (eTIs): Concepts in crisis

Please consider the following excerpt from Conflict Is Not Abuse: Overstating Harm, Community Responsibility, and the Duty of Repair in which Sarah Schulman writes:

“The definition of “violence” has now expanded to include a new continuum of behaviors and feelings that are also generically used to ascribe a negative value to a person’s actions. The word “violence” has expanded far beyond the field of physical assault to also mean emotional abuse and, unfortunately, emotional conflict where there is no abuse. In recent years, we see “violence” and “abuse” being ascribed to social criticism, efforts to understand phenomena, and social and psychological analysis. “Abuse” is also regularly used to describe disagreement and misunderstanding. Accusations of “policing,” “shaming,” and other expressions of “call-out culture” demanding “safety” from uncomfortable ideas represent people and actions as laden with blame, refusing interactivity around the content of ideas and perceptions. This is in line with the similar practice of calling racial analysis “playing the race card.” Trying to understand and explain structures of pathology is repressed by accusations of wrong-doing. Thinking is wrong. Saying is wrong. Not only are revelations unwanted, they get mischaracterized as harm.” (1)

Now comparing this above-stated information and comparing it to the penetrative electronic assaults of the electronically Targeted Individual (eTI) I’d like to now present theories in the philosophy of law and deceptive sexual relations. The paper, Deceptive Sexual Relations: A Theory of Criminal Liability published in the Oxford Journal of Legal Studies, draws on historical accounts of deceptive sexual relations involved in medical procedures, in cases of teaching, and deceptions involving intent in the sexual activity of partners. Past cases involving doctors who, misrepresenting sex as a surgical operation to cure fits, another doctor surreptitiously replacing a medical instrument with his penis during an intimate examination, and a voice coach (music teacher) disguising sex as a therapeutic aid to help his pupil’s singing voice. However, the most extreme deception takes place when the victim isn’t even aware sexual penetration has taken place as observed in cases where some form of mind-altering substance such as alcohol or opiates or, more recently, the use of electronic stimulation (e-Stim) to sedate. This is being observed as the newest ritual in manipulating the victim’s conscious state of awareness, thereby making it difficult for the victim to determine the extent of the criminal liability and the relationship he/she has to the perpetrator of such penetrations. We can compare victim relationships to their perpetrators in cases involving sexual assault and deceptive sexual relations. (2)

In referring back to the opening excerpt I used to alert my readers’ attention to the nature of “shaming.” Historically in the realm of law, rapists were protected from prosecution through what had been previously known as “promiscuity laws.” These laws gave courts the right to expose a sexual assault victim’s past history regarding sexual abuse, especially if the victim was under the age of 14 to 16 years of age. As a result of these laws that exposed victim’s childhood maltreatment and nature of abuse and sexual abuse to the public, many rapists eluded prosecution by placing blame on the victim and through its exposure, shamed and stigmatizing the victim as somehow responsible for their own victimization. To my knowledge, these laws are no longer in use. However, with similar respect, the aspect of shaming in stigmatizing Targeted Individuals and electronic Targeted Individuals (eTIs) when it comes to the nature of these electronic assaults and victimizations, shaming is also utilized as a defense by the perpetrator. Society has projected TIs and eTIs as being “mentally ill” and in need of “medical therapy” or “medical assistance” which, in my opinion, obscures the Truth with regard to the real nature and causes for this phenomenon and it is the reason why it has been consistently kept an ongoing problem. It has been my conclusion what is known as electronic targeted assaults overlooks the nature of intimate partner violence (IPV) and domestic violence (DM) through a third-party proxy; accomplices that may be medical doctors and scientists.

With the advent of e-Stim or electronic stimulation, experimental medicine has moved into new areas of remote wireless electronic stimulation. There are various medical techniques that utilize electronic devices, computer microchip technology, the use of computers and computer software programs, hand-held devices that deliver radio frequency signals to implants and/or wearable head and body gear as recently seen in DARPA Military News (3). The latter as part of wearable body gear in the sex play of bondage and discipline in acts of BDSM and the electro-medical fetish. (4) In applications used in psychiatry and spinal nerve stimulation; such as Vegus Nerve Stimulation (VNS) and most recently with paraplegics and quadriplegics in helping them to regain mobility. We are now witnessing a move into the area utilizing light photonic physics (5). Optogenetic research has claimed to induce aggression in experimental project mice utilizing neurological implants. (6) But never have I witnessed in the modern era, where laws have been established structuring the nature of consent both in medicine, law, and finance, the financial and legal responsibilities involving medical and legal malpractice and financial malfeasance and boards positioned within hospitals and medical research facilities outlining responsibilities demanding adherence to ethical medical practices in research. These “at will” attacks in uncontrolled settings, for example when the person is driving down the road in a motor vehicle which is outside of hospitals and doctor’s office, places equipped with addressing issues of medical emergencies should they arise from such experimental procedures. These “left-wing assaults” usurping the legal rights away from a person’s autonomous action through the form of electronic attacks against their will, unbeknownst to them, and without the knowledge of the identities of the perpetrators.

These new advances in neuroscience involve manipulating the conscious mental state of mice and in some psychiatric applications, so too, involve manipulating the conscious mental state of human beings under controlled settings. In the practice of law that criminalizing deceptive medical procedures, which is similar to the legal practice of criminalizing deceptive sexual relations as prosecutable criminal offenses, both areas raise two vital questions. How accurately do definitions within these two categories of offenses capture the harmfulness and wrongfulness of the criminal acts involved? That is to say, deceptive sexual assault and the penetration of targeted electronic frequency into the human body and the human mind, and should there be separate criminal offenses specifically outlining, clearly describing, and separating the Targeted Individual (TIs) from the electronically Targeted Individual (eTIs) as victims involved in deceptive criminal acts aimed at harming the public at large? Should there be a separately defined outline to procedural law and how the law identifies, handles, prosecutes, and punishes the perpetrators responsible for the phenomenon of electronic Targeted Individuals and electronic targeted assaults? And how do we as a nation go about protecting vulnerable populations that are being abused by these criminal perpetrators? The difference between the TI and the eTI is the difference between non-penetrative and penetrative assaults. That is the difference viewed between sexual assault involving penile penetration as “rape” and non-penile penetration of sexual assault which is classified as “gross indecency.” Gross indecency as described as a deceptive sexual encounter involving sexual activity using a video camera to record a partner by misleading him/her into believing the encounter is genuine but instead the encounter is recorded and used to humiliate the victim by exposing him/her to public scrutiny. Likewise, the deceptive medical practice of implanting individuals with devices that respond to electronic signals the individual has no control over. Technological advances are occurring far too quickly and we, as ordinary men, are at a loss in grasping the social threads needed to pull together a clearer picture regarding this phenomenon and to which the social values of men may be contributing to the quick unraveling of these social threads. It is my opinion exposing this phenomenon for what it really is, that is, high gross indecency of a segment of society responsible for controlling these targeted assaults aimed at the mind and body of individuals through a third-party proxy; a rogue person in a position of power and in a position of leadership within the community.

While I can understand public misperceptions regarding the Targeted Individual (TI) and the electronically Targeted Individual (eTI) as being test subjects taking part in government mind control programs, it is my opinion these public perceptions further obscure the truth behind the true nature of what’s really happening. I’ll give a few examples of how misconceptions involving military experiments and our government secret use of hospitals, university, and military installations to carry out top-secret programs. In October 1995, former President Bill Clinton announced the federal government was responsible for top-secret military projects and apologized to the US public for these “secret projects.”

The Philadelphia Experiment. Although the Philadelphia Experiment was said to have never happened, it was an “alleged” military experiment reported to have been carried out by the U.S. Navy at the Philadelphia Naval Shipyard in Philadelphia, Pennsylvania in the United States sometime around October 28, 1943. The USS Eldridge was claimed to have been rendered “invisible” or “cloaked” to enemy devices. Although many people claimed the experiment involved an attempt at “time travel” which no actual proof of this exists and it is surmised was not the case. The experiment utilized Albert Einstein’s “Unified Field Theory” combining electromagnetism and gravity in an attempt to bend light around objects thereby making the object “invisible” or “cloaked” from enemy radar. There were reports by some naval personnel, who claimed to be part of the experimental project, of physical ailments resulting from “exposure.” Intensive electromagnetic fields have been known to cause symptoms like nausea, dizziness, and disorientation. It was my perception, if this experiment did take place, it may have been one of the United States’ first attempts at exploring “stealth technology.”

Modern stealth technology experiments begun in 1958, but there must have existed a long line of “trial by error” by experimenters in determining what parts of our physical world might work and what parts would not work regarding invisibility and cloaking. However, the Philadelphia Experiment is said to have never happened. But, two aspects of our physical world are in fact electromagnetism and gravity and man has never lost his insatiable desire to control his natural world.

The Stargate Project. In response to 1970s government intelligence sources claiming the Soviet Union was spending 60 million rubles a year on psychotronic research, the federal government through the U.S. Army established the Stargate Project secret program in 1978. It was an attempt to utilize psychics for “remote viewing” capabilities to assist in acquiring intelligence that would assist the United States with national security and cold war issues. It is reported that a few of the psychics were acquired from the Church of Scientology. Individuals who reach the highest level of discipline within the church were recruited. One researcher said that a minimum accuracy rate of 65% required by the clients was often exceeded in the later experiments. One of the project’s most successful operations was the location of a lost Soviet spy plane in 1976 by Rosemary Smith, a young administrative assistant recruited by project director Dale Graff.

Elon Musk’s new company Neuralink

Elon Musk’s newest company Neuralink established in 2016 is attempting to outfit human brains with interfaces that communicate with computers. Musk proclaimed that in a lot of ways his newest development in computer and advancing technological interfaces is “a lot like Fitbit for your brain (7).” Neuralink’s plan is to replace a small portion of the human skull with a dollar-coin sized device that can read your mind. Although neuroethical questions need to be addressed, the intentions for Musk’s technology seemed geared to help benefit man. However, the existence of the dark side of man has not changed through the course of human history and the fact remains there exists a small population within the human race who would use this technology against man’s better interests forever changing the landscape of fighting crime in ever-advancing world of hi-tech gadgetry. Proponents asking questions regarding neuroethical research wonder what living in a future world might be like if human thoughts and brains could be harnessed so as to nudged a person’s decision-making process in a different direction? What will the future of crimes like sexual assault and murder look like?

Source References:

(1) Schulman, Sarah. (2016). Conflict Is Not Abuse: Overstating Harm, Community Responsibility, and the Duty of Repair. Vancouver, Canada. Arsenal Pulp Press.

(2) Gibson, M. (2020). Deceptive Sexual Relations: A Theory of Criminal Liability. Oxford Journal of Legal Studies, Advance Article.

(3) “Six Paths to the Nonsurgical Future of Brain-Machine Interfaces.” (2019) Defense Advanced Research Projects Agency. US Department of Defensewww.darpa.mil https://www.darpa.mil/news-events/2019-05-20

(4) LoveHoney.com “The Sexual Happiness People” Online Retailer of Sex Toys, Clothing, and Supplies. Of particular interest is their “bondage” section with the “electro-medical-fetish.” Accessed February 12, 2021. https://www.lovehoney.com/bondage/electro-medical-fetish/electro-sex-toys/p/electrastim-em140-sensavox-power-unit-dual-channel-electrosex-kit/a13006g13042.html

(5) Hashimoto, M., Hata, A., Miyata, T., & Hirase, H. (2014). Programmable wireless light-emitting diode stimulator for chronic stimulation of optogenetic molecules in freely moving mice. Neurophotonics, 1(1), 011002. https://doi.org/10.1117/1.NPh.1.1.011002 Also available at: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4478966/

(6) Lasers Turn Lab Mice Into Brutal Killers. New York Post. Published January 17, 2017. https://www.youtube.com/watch?v=stuzzyIIMRU

(7) Jackson, Ryan. Elon Musk’s Neuralink device focused on the computer, but what about the brain? MSN.com. & Cnet.com. Technology News. Published September 1, 2020. Retrieved online February 14, 2021. https://www.msn.com/en-us/news/technology/elon-musks-neuralink-device-focused-on-the-computer-but-what-about-the-brain/ar-BB18yVB6

Other source references to consider but not actually cited for the paper:

Krick, A., Tresp, S., Vatter, M., Ludwig, A., Wihlenda, M., & Rettenberger, M. (2016). The Relationships Between the Dark Triad, the Moral Judgment Level, and the Students’ Disciplinary Choice. Journal of Individual Differences, 37(1), 24–30.

Lyons, M., & Jonason, P. (2015). Dark Triad, Tramps, and Thieves. Journal of Individual Differences, 36(4), 215–220.

Johnson, L., Plouffe, R., & Saklofske, D. (2019). Subclinical Sadism and the Dark Triad. Journal of Individual Differences, 40(3), 127–133.

Conaghan, .J. (2019). The Essence of Rape. Oxford Journal of Legal Studies, 39(1),

McClintock, A. (1993). Maid to Order: Commercial Fetishism and Gender Power. Social Text, (37), 87–116. doi:10.2307/466262. Social Text is a journal published by Duke University Press. https://pdfs.semanticscholar.org/94de/42b7efda8383d0484d0265d39be4e4a18906.pdf?_ga=2.70378576.1963094556.1613328525-1035488512.1612888872

Stark, C.A. (2019). Gaslighting, Misogyny, and Psychological Oppression. The Monist, 102(2),

Jill D. Weinberg. (2016) Consensual Violence: Sex, sports and the politics of injury. Oakland, California. University of California Press.

Richard von Krafft-Ebing. Psychopathia Sexualis, trans. Franklin S. Klaf. New York. Stein & Day, 1965. For analyses on the discourse of perversion and sexual deviance.

Jeffrey Weeks. Against Nature: Essays on History, Sexuality, and Identity. London. Rivers Oram, 1991. For analyses on the discourse of perversion and sexual deviance.

Jonathan Dollimore. Sexual Dissidence: Augustine to Wilde, Freud to Foucault. Oxford. Clarendon, 1991. For analyses of the discourses on perversion and sexual deviance.

Engle, Gigi. (2019). These E-Stim Sex Toys Zap You With Electricity — and You Might Actually Like It.” www.menshealth.com. Published online January 8, 2019. Accessed online February 12, 2021. https://www.menshealth.com/sex-women/a25799460/e-stim-sex-toys/

Butler, Judith. (1997). The Psychic Life of Power: Theories in Subjection. Stanford, California. Stanford University Press.

Knafo, Danielle and Feiner, Kenneth. (2006) Unconscious Fantasies and the Relational World. Hillside, NJ. The Analytic Press, Inc. Part of the “Relational Perspective Book Series” Volume 31.

Freud, Sigmund. (1924). The dissolution of the Oedipus Complex. Standard Edition. Volume 19. London: Hogarth Press.

Niedecken, D. (2016). The primal scene and symbol formation. The International Journal of Psychoanalysis, 97(3), 665–683.

Wieland, C. (1996). Matricide and Destructiveness: Infantile Anxieties and Technological Culture. British Journal of Psychotherapy, 12(3),

Douglas, H., Harris, B.A., & Dragiewicz, M. (2019). Technology-facilitated Domestic and Family Violence: Women’s Experiences. The British Journal of Criminology, 59(3),

Dickes, R. (1963). Fetishistic Behavior: A Contribution to Its Complex Development and Significance. Journal of the American Psychoanalytic Association, 11(2), 303–330.

WRITTEN BYKaren Barna

Mother, Daughter, Gardener, Student, Graduate, Cook, Care-Giver, Lover of Books, Reader of Philosophy, Interested in Psychoanalysis

Maid to Order: The Commercial Fetishism of High Technologies in the Era of the Electronically Targeted Individual

gps-phone-web
The new age of computer technology and wireless devices has given rise to issues surrounding cyber-surveillance (illegal security-service surveillance) and has been associated with crimes like cyberstalking, sextortion, murder, cyber misbehavior, and terrorizing intimate partners with newly developed 21st-century technologies, and to which encompass the United States “National Security Cyber Investigation” in the 21st century and beyond (The United States Attorney’s Bulletin, 2016; Department of Justice Journal of Federal Law and Practice, 2019).

Just like Madonna’s erotic photo album “Sex” is filled with the theatrical paraphernalia of BDSM: boots, chains, leather, whips, masks, costumes, and scripts, so too, is there a potential for newly advancing technologies that seek to subjugate Objects (victims) using an electromagnetic tether and electronic devices to control the victim. These high technologies provide an avenue for the sexual pervert to carry out a form of BDSM in fantasy. To warn of the ominous dangers inherent in these new advancing “service-security surveillance” technologies, technologies that are at play as part of the phenomenon otherwise known as the electronically targeted individual, become grossly understated (Douglas, Harris & Dragiewicz, 2019). Like BDSM, these new advancing technologies target, harass, assault, and torture victims and it runs the risk of unleashing a truly insidious dark side found within human nature itself. A power unleashed on an unsuspecting greater public with even more horror. Its uses are of particular danger to women, children, and anyone lacking power. People belonging to minority groups who lacking education, wealth, and connections of power to defend against it. For the most part, it has been women who run the risk of being raped, but children are also in danger at the hands of pedophiles. Homosexuals and transgender men and women are also targets of violence. A new tide has been unleashed in the era of the 21st century, and it is one that may bring with it a murderous and disastrous undoing.

Harnessing control of the human body utilizing radiological devices (electronic devices that respond to frequency) against the will of the human target is one of the most insidious and clandestine attempts of absolute power rooted in the paranoid-schizoid personality position. Its attempt to humiliate and dehumanize, usurping power away from human Objects (victims) is on par with the murderous machinery of the Holocaust and the inhumane experiments that followed in its aftermath performed by Nazi doctors (see Jacobs, 2007). Its actions are rooted in psychotic fantasies of the primal scene and because of its cloak of invisibility, a concept of crisis has developed. How are we to adequately describe these invisible violations if we can’t accurately explain what they are?

In the theatre of BDSM, patriarchy’s traditional theme is offered. The theme that manhood is synonymous with mastery, and submission is bound to female fate (see Neidecken, 2016; Knafo & Feiner, 1996; Knafo & Feiner, 2006). In the theatre of BDSM, a dominant’s foot may be presented as bound and a leash straps him or her to the neck of their submissive. This bondage fetish performs identity in theatre performance and displays for an audience that power is intertwined with independence. Scenes of bondage are often stapled with scenes of abandonment and separation. For if it were to display unity, there would be no need for the props it utilizes; chains, whips, handcuffs, blindfolds, leather leashes, straps, and wooden paddles (Madonna, 1992). Sex as high theatre and in the world of BDSM, high theatre parades images of servile obedience in the conventional modes of power. BDSM is situated within primal scene symbolism and it borrows its power from the everyday scenes of the cultural economies it is found in. Money, prisons, dungeons, bathrooms, and the houses of elite empires. In reality, it is nothing more than psychopathologies of the flesh. According to Richard von Krafft-Ebing, “Sadism was an aberrant and atavistic manifestation of the “innate desire to humiliate, hurt, wound, or even destroy others in order thereby to create sexual pleasure in one’s self (McClintock, 2013).” In the intercourse of the sexes, sexuality affords both men and women, not only the power but the greater pleasure in “winning over,” and “conquering.” It was Krafft-Ebing’s opinion that while men tend toward aggressive postures, women derive pleasure from innate coyness and, with her victory over attracting the gaze of her male aggressor, affords her intense gratification and satisfaction (McClintock, 2013). Especially when it runs against other females in competition for sex (Sarteschi, 2017). For the most part, men and women utilize violence in two very different ways. Similar to Krafft-Ebing’s opinion, statistical records record that the percentages of violence and favors male aggression (Fox & Fridel, 2017; Hudak, Corry, Schwimmer & Rupp, 2020). Whereas women tend toward more passive-aggressive modes of aggression, utilizing more hidden and clandestine alternatives (e.g., deception, pathological lying, and high impression management).

It is my opinion, I have an adult child harassing me, utilizing power over me with the use of electronic devices that respond to electromagnetic frequency signals (radio waves). A personality void of empathy and the capacity to feel any real concern for the welfare of others. He plays with me like a toy, a remote-control human toy. And in my opinion, it is one of the grandest criminal conspiracies rooted in organized crime I have ever come to know. This phenomenon possesses such a threat to the national security of the United States of America, that I fear for everyone’s safety in defense against it because it has harnessed the power to inflict even greater harm on American citizens walking freely within our country’s borders by usurping free will and acting as that person’s individual sovereign. It is bigger than just gang stalking. It has the power to control people like cattle. Like Hitler did with the Jews, it corrals people like livestock and groups them together as something “other.” And where ever there is absolute power, absolute virtue never follows. We know this from past history. Tyrants are little children who have never learned how to navigate loss and separation and mature into proper adult development (see Yardley, 2004). In a paper entitled “Dark Triad, Tramps, and Thieves” the authors write:

“Despite the obvious importance of individual differences in understanding offending behavior (e.g., Miller & Lynam, 2001; Wilcox, Sullivan, Jones, & van Gelder, 2014)there has been relatively little research exploring the relationships between personality and petty thefts in non-incarcerated adults (Lyons, & Jonason, 2015).”

This means there is a clinical lack of understanding regarding sadism’s relationship to personality within the population of non-incarcerated adults. That is to say, there is a tremendous lacuna in the research literature with regard to the prevalence of sadistic traits and their connection to personality in the world of non-incarcerated adults today, and how these individual-specific sadistic traits contribute to the invisible crime of electronic targeting. Because Lyons and Jonason’s research was based on the information provided by the self-reported crime that went unnoticed, it reveals to us the higher prevalence of sadism within adult non-incarcerated populations. This data is usually obtained by researchers utilizing the information provided by prison institutions who have access to the base of clinical evidence for incarcerated populations (see Lyons & Jonason, 2015; Buckels, Jones, & Paulhus, 2013; Johnson, Plouffe, & Saklofske, 2019; Krick, Tresp, Vatter, Ludwig, Wihlenda, & Rettenberger, 2016; Nitschke, Mokros, Osterheider, & Marshall, 2013).

Primal scene experiences and fantasies are viewed as a blueprint for internalized object relationships. The concept of the primal scene dramatically depicts a blending of past and present, fantasy and reality in the child’s relationships (see Niedecken, 2016; Knafo & Feiner, 1996; Knafo & Feiner, 2006). So, his use of objects in identificatory ways reveals to the onlooker his unanalyzed unconscious connection which speaks of a “human absence,” an empty and impoverished childhood. Because his behavior demonstrates a great absence in his ability to “connect” with the Object interpersonally, he uses a theatre stage with inanimate props and human subjects. In order for the perpetrator to establish his “connection” with one of his victims, he must utilize a prop that serves as an intermediary position, an electronic device. A device that functions as a counter-phobic object to ward of anxieties induced by this Object (Fabozzi, 2016; Gaddini, 2003; Galligan, 1994; Chatterji, 2009; Hull, 2004); electronic technology in the form of a handheld toy. Once he creates this “connection” he establishes a remote, from a distance, approach to establishing a relationship with the human target and thereby “wins” his “possession” based on unequal advantage (Winnicott, 1971). The stage of sexual commerce of BDSM is the transformation of power (Chescheir & Schulz, 2004),and this transformation is also witnessed in domestic violence and terrorism. This technology is no different than rape (Conaghan, 2019) or the coercive control used by the abuser in intimate partner relationships (Stark, 2007). It demonstrates a deeply troubled mind in terms of object relations, and I am going to theorize this troubling behavior may be the product of avoidant or ambivalent attachment in childhood (Wallin, 2007). Children who suffer from avoidant attachment possess the greatest potential for inflicting harm. As a result of avoidant attachment, persistent parental abandonment, and neglect force the child to play independently by himself with his toy props. These children appear very well behaved to onlookers because they don’t cry once their parental objects have left the room. And because of this persistent parental abandonment and neglect, the child may have trouble establishing relationships in adulthood. This troubling behavior may also be due to a learning disability like autism. It may also be the result of “payback” for some perceived wrong and the human Object (victim) has now become part of the “bad breast” in the paranoid splitting of the mother. The paranoid-schizoid personality suffers from the psychic splitting of the mother into two parts; the good breast and the bad breast (see Jacobs, 2007). It is also termed the ambivalent breast which makes up ambivalent attachment. Either way, whatever is at the root of this troublesome behavior it MUST be stopped!!!

Source references that have provided me a window of clarity and a better perspective on the subject matter at hand follow here:

Buckels, E., Jones, D., & Paulhus, D. (2013). Behavioral Confirmation of Everyday Sadism. Psychological Science, 24(11), 2201–2209.

Chatterji, A. (2009). “Psychoanalysis and the Unconscious” and D.W. Winnicott’s Transitional and Related Phenomena. The Psychoanalytic Review, 96(5), 785–800.

Chescheir, M., & Schulz, K. (2004). The development of a capacity for concern in antisocial children: Winnicott’s concept of human relatedness. Clinical Social Work Journal, 17(1), 24–39.

Conaghan, .J. (2019). The Essence of Rape. Oxford Journal of Legal Studies, 39(1),

Cybercrime and Cyber Threats. Department of Justice Journal of Federal Law and Practice. United States Department of Justice. Vol. 67, №1. February 2019.

Cyber Misbehavior. The United States Attorneys’ Bulletin. Department of Justice. Vol. 64, №3. May 2016.

Douglas, H., Harris, B.A., & Dragiewicz, .M. (2019). Technology-facilitated Domestic and Family Violence: Women’s Experiences. The British Journal of Criminology, 59(3),

Fabozzi, P. (2016). The Use of the Analyst and the Sense of Being Real: The Clinical Meaning of Winnicott’s “The Use of an Object.” The Psychoanalytic Quarterly, 85(1), 1–34.

Fox, James A., & Fridel, Emma E., Phd. (2017) Gender Differences in Patterns and Trends in U.S. Homicide, 1976–2015. Violence and Gender, Vol. 4, №2.

Gaddini, R. (2003). The Precursors of Transitional Objects and Phenomena. Psychoanalysis and History, 5(1), 53–61.

Galligan, A. (1994). Transitional Objects: A Review of the Literature. Journal of Child and Adolescent Psychiatric Nursing, 7(4),

Hudak, L., Corry, D., Schwimmer, H., & Rupp, J. (2020) Firearm-Facilitated Sexual Assault: Using Emergency Department Data to Provide a Novel Perspective of the Problem. Violence and Gender. Vol. 7., №1.

Hull, J. (2004). Videogames: Transitional phenomena in adolescence. Child and Adolescent Social Work Journal, 2(2), 106–113.

Jacobs, Amber. (2007). On Matricide: Myth, Psychoanalysis, and the Law of the Mother. New York. Columbia University Press.

Johnson, L., Plouffe, R., & Saklofske, D. (2019). Subclinical Sadism and the Dark Triad. Journal of Individual Differences, 40(3), 127–133.

Knafo, D., & Feiner, K. (1996). The Primal Scene: Variations on a Theme. Journal of the American Psychoanalytic Association, 44(2), 549–569.

Knafo, D., & Feiner, K. (2006). Unconscious Fantasies and the Relational World. Hillside, NJ. The Analytic Press, Inc. Part of the “Relational Perspective Book Series,” Volume 31.

Krick, A., Tresp, S., Vatter, M., Ludwig, A., Wihlenda, M., & Rettenberger, M. (2016). The Relationships Between the Dark Triad, the Moral Judgment Level, and the Students’ Disciplinary Choice. Journal of Individual Differences, 37(1), 24–30.

Lyons, M., & Jonason, P. (2015). Dark Triad, Tramps, and Thieves. Journal of Individual Differences, 36(4), 215–220.

Madonna. Sex. Published by Warner Books. https://archive.org/details/sex_20190913/page/n1/mode/2up

McClintock, Anne. (1993) “Maid to Order: Commercial Fetishism and Gender Power. Social Text. №37, A Special Section Edited by Anne McClintock Explores the Sex Trade (Winter 1993), pp.87–116. Duke University Press. https://pdfs.semanticscholar.org/94de/42b7efda8383d0484d0265d39be4e4a18906.pdf?_ga=2.88683026.869618494.1612888872-1035488512.1612888872

Miller, J.D., & Lynam, D. (2001). Structural models of personality and their relation to antisocial behaviour: A meta-analytic review. Criminology, 39, 765–798.

Niedecken, D. (2016). The primal scene and symbol formation. The International Journal of Psychoanalysis, 97(3), 665–683.

Nitschke, J., Mokros, A., Osterheider, M., & Marshall, W. (2013). Sexual Sadism. International Journal of Offender Therapy and Comparative Criminology, 57(12), 1441–1453.

Sarteschi, Christine M., (2017). “Jodi Arias: A Case of Extreme Violence.” Violence and Gender. Vol. 4, №3. (September 2017).

Stark, Evan (2007) Coercive Control: Entrapment of women in everyday life. New York. Oxford University Press.

Wallin, David J. (2007). Attachment in Psychotherapy. New York. The Guilford Press.

Wilcox, P., Sullivan, C.J., Jones, S., & van Gelder, J.L. (2014). Personality and opportunity: An integrated approach to offending and victimization. Criminal Justice and Behavior, 41, 880–901.

Winnicott, D.W. (1971). “The use of the Object and relating through identifications.” In Playing and Reality. Harmondsworth. Penguin, 1980.

Yardley, S. (2004). Response to Lovell: “Cognitive Development and Empathy”. Journal of Adult Development, 6(4), 227–229.

WRITTEN BYKaren Barna

Mother, Daughter, Gardener, Student, Graduate, Cook, Care-Giver, Lover of Books, Reader of Philosophy, Interested in Psychoanalysis

If we can’t say what electronic targeting and electronic torture “is”, how can we defend against it as a criminal act?

Image for post

A Concept in Crisis

Misleading truths that obscure the real nature of electronic targeting, electronic harassment, electronic assaults, and electronic torture compound the misunderstandings surrounding the phenomenon. In an academic paper entitled The Essence of Rape by Joanne Conaghan published in the Oxford Journal of Legal Studies (2019) states,

“…if perceptions of rape vary so extensively, how can it properly signify a shared understanding around which public debate may be conducted (Conaghan, 2019)?”

Likewise, this same problem exists with the phenomenon of electronically targeted individuals. These individuals claim government interference, police misconduct, police stalking and harassment, gang stalking by other citizens, and that they are being used as a part of “government secret operations in clandestine experiments of mind control.” One website has suggested the phenomenon of the electronically targeted individual’s most accurate description is “security-service stalking.” (Karlstrom, 2018) “Security-service stalking” is called “cyberstalking” by the FBI. (United States Attorney’s Bulletins & Journal of Federal Law Practices, May 2016).

I am going to try and weave an understanding between professional moral misconduct and the electronically targeted individual. Last night I watched a 20/20 documentary about the tragic death of Anna Nicole Smith (e.g., Viki Lynn Hogan) who was pronounced dead from a drug overdose and an abscess that infected her body at the site of an injection given to her by her personal psychiatrist, Dr. Khristine Eroshevich. The doctor who gave her the injection and wrote her the 10 prescription drugs Anna Nicole had in her system at the time of death eluded a prison sentence (Ceasar, 2015). She had all charges dropped and only one count, a misdemeanor, for writing a prescription drug, not in the name of the person it was intended. Since the law recognizes and guides how the structure of consent is established, was it perceived that Anna Nicole contributed to her own death because she had the money to pay an immoral doctor the necessary cash required for acquiring those needed prescriptions? Similarly, in cases of rape, the courts look at how “consent” was structured for the activity. Since the making of consent is not unfettered but not vested with one source; it is a dialectic between ordinary people and the law, and the social reality that orders relationships within a prescribed legal category. The law is not so much concerned with a person freely giving consent to engage in an activity, as much as it is with the social and moral value of the activity to which the person is consenting. If this is true then why was, psychiatrist Khristine Eroshevich, responsible for medical misconduct and the manslaughter death of Anna Nicole Smith, acquitted on practically all the charges (Associated Press, 2010)? It’s because consent isn’t enough to guarantee that a person’s behavior is moral. Yet we live in a world that evaluates a person behavior by looking at their accumulated wealth, their credit score, their bank accounts, how timely they pay their bills and taxes, level of education, along with security background checks, and none of those things provide any indication that the person actually possesses an ounce of morality. In the final court decision in the trial, People v. Samuels (1967), a case involving BDSM, the court wrote:

“It is a matter of common knowledge that a normal person in full possession of his or her mental faculties does not freely and seriously consent to the use upon his or her self of force likely to produce great bodily harm. Those persons that do freely consent to such force and bodily injury no doubt require the enforcement of the very [criminal] laws that were enacted to protect them and other humans (Weinberg, 2016).”

One might make the argument that Anna Nicole Smith was perhaps not of her right sound mind and body and that Dr. Eroshevich’s professional opinions were being influenced by the money and fame Anna Nicole Smith offered. The promise of lucrative cash payments and high profile, luxurious lifestyle in exchange for prescription drugs and doctor services, and how the subtle nuances of coercive control played back and forth in this scenario. But shouldn’t have Dr. Eroshevich’s professional training make her more responsible for the wrong done? Now, let’s make the leap from this sensationalized tragic case of a beauty queen to the phenomenon of the electronically targeted individual. Supply “On Demand.” [This pun was purposely intended to make my case because we now live in an age where wireless frequency (wi-fi) is made available on demand.] The addicted are a vulnerable population within our communities and, as such, require more protection under the law from those wishing to do them bodily harm. It’s not likely the addicted “freely” choose (for their actions may be unconscious to them) to impose “the force” (the long-term side effects of drug and alcohol use) against their bodies, but rather they are responding to unanalyzed and unconscious past trauma(s). Behavior resulting from a subjugating process, and “a psychic life of power” instilled in them from early childhood. If one is to undo the damage of a brain “hard-wired” for behavior then it would take a pretty strong force to influence and try and “change” its path. The new advances in medicine manipulating human consciousness utilize radio frequency and artificial electronic stimulation.

To say that, “Money is the God that rules all fools” is a gross understatement. To make the leap from the manslaughter charge Dr. Eroshevich should have been given to the phenomenon of the targeted individual isn’t too difficult. When we make the leap from the case of Anna Nicole Smith to the phenomenon of the electronically targeted individual we may see a very similar picture of moral misconduct, coercive control, and the taking of hostages which are all found in the phenomenon now known as electronic targeting, electronic assault, electronic harassment, electronic bodily torture which may be part of a hidden subculture possessing the disposable income, a large financial base of economic support, and the hidden network connections to ensure its continued operations.

Supply “On Demand” in Sadistic Enjoyments. If the outrage of sex play involving bondage and discipline is its insight into consensual sadomasochism as higher theater, then, we could also say, the phenomenon of the electronically tortured and assaulted target individuals also plays into this “higher theatre.” A theatre that involves cruelty as high entertainment. How can we make the phenomenon of the electronically targeted individual’s connection to “higher theatre and higher entertainment?” Is it through the connection of “On-Demand Services,” providers supplying us with the connection to tap into its security-service stalking nature? To argue that in acts of sadism the “dominant” has power and the “slave” has not is to read theater for reality, and it is to read the theatre of WAR. And here we arrive at the unveiling in the nature of some individuals’ primal scene fantasies which act out in bloody murderous aggression against their fellow man (Neidecken, 2016). How does this tie into BDSM and the electronically targeted, assaulted, harassed, and tortured individual? It ties in through man’s proclivity to demonize groups and the very human enjoyment derived from dehumanizing, degrading, and destroying, and stealing from those same groups. It is as Michael Foucault said,

“Sadomasochism, as Foucault puts it, “is not a name given to a practice as old as [Love]; it is a massive cultural fact which appeared precisely at the end of the eighteenth century, and which constitutes one of the greatest conversions of Western imagination: unreason transformed into delirium of the heart.” The sadism in bondage and discipline “plays the world backwards.” It plays it backward because it nudges us ever closer to our Neolithic ancestors and the savage beatings that made up humanity as a whole.

From Domestic Violence to Coercive Control. At the core of security-service stalking is coercive control and,

“the core of coercive control theory is the analogy to other capture crimes like hostage-taking and kidnapping, a comparison that illustrates its “generality.” The singular advantage of the analogy is that it links, not just women [and their children] to the large discourse of rights and liberties we apply to citizen-victims, including human rights discourse, implicitly undermining a major rationale that limits justice intervention in what are “deemed just family matters.” By using gender-neutral language of power and control to frame abuse, the hostage analogy also supports an approach woman have repeatedly used to gain legal rights men already possess, such as the right to vote or sit on juries. Called “formal equality,” courts or legislators are asked to imagine the wrong involved if men were denied these rights solely because of their sex, to attribute the observed lack of parity to discrimination, and then to level the playing field so that women are treated identically to men. From this vantage point, the right of abuse victims to “equal protection” reflects the resemblance of abuse to assault and other harms from which men and strangers are already protected. The analogy also supports the belief that battered women are “hostages at home,” suggesting abuse is a political crime like terrorism (Stark, 2007).”

Utilizing this understanding of domestic violence and the nature of coercive control used to carry out such violence, we can come to an understanding of “security-service stalking” and its analogy to hostage-taking and kidnapping. Acts the obstruct the exercise of a person’s full civil liberties. In short, imprisonment within the confines of an electromagnetic cage that tethers the human body electronically to a controller.

Sources:

Conaghan, .J. (2019). The Essence of Rape. Oxford Journal of Legal Studies, 39(1),

Karlstrom, Dr. Eric. (2018). “In the Post 9/11 Era, Understanding the Targeted Individual Phenomenon is No Longer Optional (T. McFarlan).” GangStalkingMindControlandCults.com Published online January 10, 2018. Retrieved online February 8, 2021. https://gangstalkingmindcontrolcults.com/in-the-post-9-11-era-understanding-the-targeted-individual-phenomenon-is-no-longer-optional-t-mcfarlan/

“Cyber Misbehavior” (2016) United States Attorney’s Bulletin. Department of Justice. Vol. 64, №3. May 2016. https://www.justice.gov/usao/file/851856/download

Caesar, Stephen. (2015). “No jail time given to doctor in Anna Nicole Smith case.” Los Angeles Times. Published online April 17, 2015. Retrieved online Febraury 8, 2021 https://www.latimes.com/local/lanow/la-me-ln-doctor-in-anna-nicole-smith-20150417-story.html

“Anna Nicole Smith’s Doctor Acquitted in Drug Case, Psychiatrist and Boyfriend Convicted.” Associated Press. FoxNews.com. Published October 28, 2010. Retrieved online February 8, 2021. https://www.foxnews.com/entertainment/anna-nicole-smiths-doctor-acquitted-in-drug-case-psychiatrist-and-boyfriend-convicted

Weinberg, Jill D. (2016). Consensual Violence: Sports, sex and the politics of injury. Oakland, California. University of California Press.

Stark, Evan. (2007). Coercive Control: The entrapment of women in everyday life. New York. Oxford University Press.

Niedecken, D. (2016). The primal scene and symbol formation. The International Journal of Psychoanalysis, 97(3), 665–683.
Another source to considered not referenced here:

Perper, Joshua A., and Cina, Stephen J. (2010) “When Doctors Kill: Who, Why, and How.” New York. Copernicus Books. Excerpt:

“I am God, your Physician” (Ex. 15:26). The prophets also acknowledge God as a Healer and Jeremiah stated: “Heal us, and we will be healed” (from the blessing for healing, Jeremiah 17:14). Throughout the Torah, God is imbued with great healing powers. It is no wonder that it is written, “The Lord giveth, the Lord taketh away” when it comes to health, wealth, and life itself.”

WRITTEN BYKaren Barna

Mother, Daughter, Gardener, Student, Graduate, Cook, Care-Giver, Lover of Books, Reader of Philosophy, Interested in Psychoanalysis

The Primal Scene and Symbol Formation: Why war and the electronically targeted individual

Image for post
Children playing war-games

The following writing considers the theory of Dietmut Niedecken and her psychoanalytic work exploring the primal scene and symbol formation.

Interpreting the Psychic Material

Alfred Lorenzer thinks that the traumatic experience consists of an “intolerable situation” that is available in phantasy being realized (1965, p. 693). If we consider what is being suggested is an “intolerable situation” represented in the fabric of the psyche that is generally dissolved in the fabric and only brought to bear when it is activated by a traumatic irruption, we can then make a connection with its connection to psychosis.

In considering potentially traumatic influences in early childhood, the primal scene was in focus in early psychoanalytic writings. The child is subjected to such an experience, to excitations that are overwhelming and therefore may have a traumatic impact. Freud thought the traumatic event of the primal scene was due to the child’s witnessing the parents’ act of intercourse. But some psychoanalysts believe the “primal scene” isn’t so much connected to witnessing the parents’ act of sexual intercourse as much as it is connected to how the parents treat one another in response to each other’s needs (e.g., in a loving and respectful way or in violent altercation and aggression). When aggressive arguments and physical fights are witnessed by the child, the child may experience traumatic side effects to the excitations that create cortical arousal and these excitations may be overwhelming for the child to process, and as a result, the child may have a hard time processing the event. This is most certainly connected with dissociative states and this becomes the difference between knowing and not knowing the trauma. Melanie Klein takes early phantasy formations as the “combined parent figure” and this combined parent figure is a particularly anxiety-inducing, fusional-destructive representation from the early stages of the Oedipus complex. The primal scene phantasy comes into being on the basis of projections of fear of abandonment, envy, and hatred that the child feels with regard to the parents’ sexual relationship from which he is excluded. Laplanche (2004) considered the primal scene the product of both the result of an event and a phantasy as the child works out the enigmatic message proceeding from the adults. In addition, according to Laplanche the phantasy is not arbitrary but an outcome of the child’s cultural environment which makes available to him for the translation of the enigmatic message of the primal scene some “general cultural . . . narrative schemata” (2004, P.908) These serve the binding and symbolization of the traumatizing enigmatic messages.

Many psychoanalysts have asked the question, “Why war?” And the answer to that question is, “War is how some children work out the enigmatic message of the primal scene (Mitzlaff and Niedecken, 2013, p. 87).” We see these enigmatic messages being played out all the time in child’s play when children will come together and play war-games. A very common game played when I was little was “Cops and Robbers.” In the war-games played by young children (mostly boys), one can observe the obvious encoding of the actions that make up the primal scene into male-sexual and female-sexual stereotypes, and the war scene itself is made up of the props and objects the child recognizes from television and computer games. As part of the primal scene symbolization what is acted out in the child’s game of war is a phallic-aggressive attack. Thus, the enigmatic message of the primal scene is in play here. In the journal paper The Primal Scene and Symbol Formation, Deitmut Niedecken writes:

“We can postulate that the children playing war have already developed a primal scene phantasy in which they assume the place of witnesses of excited events taking place between the parents. In playing, they are concerned now with further translating for themselves the enigmatic message of the primal scene. They are falling back on the metaphor of the war game, which operates as a cultural “translation aid (Laplanche, 2004, p. 908)”

Thus, there is a structure-forming aspect of the primal scene phantasy. Britton develops a concept called “The missing link” which positions a third person within the triangular space of the primal scene. This triangular space is bound by three persons of the Oedipal situation and all their potential relationships. This structure-forming space includes the possibility of being a participant in a relationship and observed by a third person as well as being an observer of a relationship between two people (Britton, 1989, p. 85).

Niedecken has shown when a child works out the exclusion from the primal scene the possibility of the “I think” position is made available and the protagonists of the primal scene are represented in grammar as “subject” and “object” and the relationship between them is governed by the predicate “Father-Subject has a Mother-Object.” I believe her German translates into a possessive form, as in “Father-Subject possess a Mama-Object.” That is, the father possesses the mother and the child is excluded from the sexual relationship.

If we consider it in this way, the development of verbal-discursive thinking is underpinned by an extremely violent, in fact, murderous phantasy and it is not surprising that children convey a perpetrator-victim relationship in their play. In this context, it is easily understood how the instrumentally dissecting external view proceeds from discursive language and allows a sadistic control over what is thought. This sadistic control and extremely violent and murderous discursive thinking underlie the machinery used during the Holocaust and can provide the reason for the sweeping tide of our planet’s self-destruction (Horkheimer and Adorno, 1973).

It is at this point in the paper Niedecken presents the possibility that exclusion from the primal scene may not be the only way a child interprets and experiences the primal scene. There is another possible way the child works through the experience as an inclusive member of the trio. She offers an example in music theory in which “two human voices can sing a love duet while an instrumental part accompanies it and adopts its own position towards it that is heard not as excluded by as belonging; in a fugue, two voices can join each other in a stretto, while a counterpoint is interwoven in it so that the three parts combine to produce an interwoven whole. Such forms of experience suggest to Niedecken that the primal scene experience must also be conceivable as a terzet, and she began to wonder where she could find such a form of the “primal scene as terzet (Niedecken, 2016).”

Niedecken offered two clinical examples of how children may experience the primal scene not as excluded but as included. She writes,

“In being together sexually, the parents do not have to exclude the child from their phantasies; instead, she can latently appear in them as its extremely welcome product, perhaps also as an oedipally desired participant; and the child can experience with them the excitation of the scene herself until the moment when she makes her own entrance and makes herself heard — as a counterpoint that is woven into the stretto of the fugue theme (Niedecken, 2016).”

It is important to note that this inclusion is in no way perverted, but rather demonstrates the healthy love between the two parents and towards the offspring him/herself. That is, the inclusion of a child in the primal scene is based on healthy reciprocity within the relationship, a relationship filled with respect, love, and caring that is consistently and actively demonstrated throughout.

With regard to the material that can be interpreted and analyzed in the phenomenon of electronic target assaults in the experience of the targeted individual, we can read its terzetto. We can read the unconscious unanalyzed fantasy of a child’s exclusion from the primal scene and the Father-Subject’s phallic aggressive attacks against his Oedipal Objects. In object relations theory we interpret the aggressor’s message as the phallic and potent father figure commanding and ordering his subjects/objects of his relational world.

It is my opinion, there is a tremendous lack of understanding in the research literature with regard to the prevalence of sadism in the world of non-incarcerated adults today, and how individual-specific sadistic traits contribute to the invisible crime of electronic targeting. It is also my opinion this phenomenon belongs to a subculture. A subculture interested in the “theatre of cruelty” in acting out a fantasy of control. It also utilizes the world of hi-tech electronic commercial fetishism (consumer hi-tech products) and biological implants that tethered together Objects with electronic devices, devices that act as counter-phobic objects warding off anxiety from these fear-inducing “threats.” Its action is bound to working out the enigmatic message from the child’s exclusion of the primal scene and it demonstrates the sadomasochism associated with other acts of BDSM. Please read further the link below.

STAGE VIOLENCE, POWER, AND THE DIRECTOR: Interpreting the evidence of electronic targeted assaults and body violations using electronic stimulation and radiofrequency — Proclivities’ Principle Wisdom (wordpress.com)

Sources:

Lorenzer, A. (1965). Ein Abwehrsyndrom bei traumatischen Verlaufen [A defensive syndrome in traumtic processes]. Psyche Z psychoanal 19:685–700.

Niedecken, D. (2016). The primal scene and symbol formation. The International Journal of Psychoanalysis, 97(3), 665–683. Video abstract of the paper: http://youtu.be/5XxKSQ3pgWw

Laplanche, J. (2004). Die ratselhafte Botschaft des Anderen und ihre Konsequenzen fur den Begriff des UnbewuBten im Rahmen der allgemeinen Verfuhrungstheorie [The enigmatic message of the other and its implications for the concept of the unconscious in the context of the genderal seduction theory]. Psyche Z psychoanal 58:898–913.

Mitzlaff, S. & Niedecken, D. (2013). Zerstorung des Denkens in Institutionen [Destruction of thinking in institutions]. Frankfurt: Brandes und Apsel.

Britton, R. (1989). The missing link: Parental sexuality in the Oedipus Complex. In Britton R., Feldman, M., O’Shaughnessy, E., editors. The Oedipus Complex Today: Clinical Implications, 83–101. London. Karnac Books.

Horkheimer, M. and Adorno, T.W. (1973). Dialectic of Enlightenment, Cummingm J. translator. London. Allen Lane.

Winnicott, D.W. (1971). “The use of the Object and relating through identifications.” In Playing and Reality. Harmondsworth. Penguin, 1980.

Musical source to consider regarding Niedecken’s theory of a primal scene terzet:

Gustav Holtz. (1925) Terzetto (Flute, Oboe, Violin) https://www.youtube.com/watch?v=C_DsQFfehGE

WRITTEN BYKaren Barna

Mother, Daughter, Gardener, Student, Graduate, Cook, Care-Giver, Lover of Books, Reader of Philosophy, Interested in Psychoanalysis

Modern-Day Medicine and the New Era of “Electronic Slavery” in America

Image for post

Modern American medicine was built on the backs of black slaves. This is a true statement, and there are countless other examples we can draw on in the recorded annals of human history to support this fact, not just the horrific experiments carried out on the Jews by the Germans during World War II. I’m not going to list them all here. If you are interested in a quick read regarding the presence of unethical, inhumane experimentation found in the human archive you can read When Doctors Kill: Who, Why, and How by Joshua A. Perper and Stephen J. Cina published in 2010. It offers a good glimpse into the prevalence of human sadism and the dehumanization of various minority groups within the field of experimental medicine.

“I am God, your Physician” (Ex. 15:26). The prophets also acknowledge God as a Healer and Jeremiah stated: “Heal us, and we will be healed” (from the blessing for healing, Jeremiah 17:14). Throughout the Torah, God is imbued with great healing powers. It is no wonder that it is written, “The Lord giveth, the Lord taketh away” when it comes to health, wealth, and life itself.” (1)

This quote, which was included in Perper’s and Cina’s book, is very interesting because the Bible provided guidance to man on many levels. This guidance came down to him in the form of laws and codes and the very book that governed the reader’s behavior also gave the reader instructions on how to carry out war and genocides, carry out acts of torture and cruelty, how the service of a prostitute was made acceptable and how they were to be paid (by the giving of a goat), bizarre ways of killing children, and how to sell your daughters into slavery and when to stone those daughters to death.

To begin my discussion, we should ask why it is we have all of the current advanced modern technology that we do today? And the answer to this question is, of course, because of the art of war. All of the advanced current modern technology we have today has been developed to make us even more proficient at carrying out acts of war against our enemies. Even the use of neuromodulation therapies can be used on soldiers suffering the traumatic side-effects of war. But like all good things, these very technologies can be used against us in malign and Machiavellian ways. Many of those who claim they are being electronically targeted in some way include antidotal stories recounting their experiences. Antidotal stories are the least creditable source of scientific facts because they lack scientific proof. When trying to make a point that supports an argument claiming electronic targeting you need to provide scientific evidence that supports your claim. When a person claims they are being electronically targeted void of any supporting evidence, people often get labeled a “nut job” or a “conspiracy theorist.” And even still, when the scientific proof is available, you need to tap into the realm of philosophy to untangle the convoluted twisted story of “silence” (e.g., clandestine technologies) and its relationship to abuse.

With the advent of advancing modern technology, we witness within the field of medicine an ever-increasing dependency on new technologies that operate utilizing radiofrequency. We find on the DARPA’s website (Department of Advancing Research Projects Agency) the announcement regarding their new N3 (Next-Generation Nonsurgical Neurotechnology) program. (2) Various uses of neuromodulation have exploded in the field of medicine over the past years. Although DARPA’s program is geared toward developing “wearable” headgear that delivers electronic stimulus to certain regions of the brain, researchers may have moved into the advancing direction of biologically implantable that utilize wireless signals that do not have to be worn as “gear”, but instead remain permanently in place within the body receiving wireless signals from a broadcasting source. I know there are implantable devices like VNS (Vagus Nerve Stimulator) which, planted in the upper shoulder of the human body, delivers and regulates neuromodulation of electronic stimulus from the vagus nerve to the brain in people suffering from Parkinson’s disease and epilepsy. These biological implants come with a remote-control device the person uses to modulate settings of stimulation. It is also important to note these devices are surgically implanted. They are not surgically non-invasive. (3)(4) Other devices that have been coined “experimental” have been observed in surgically implanted microchips in teeth during dental surgery. (5)

PROGRAMMING AND GROOMING IN COVERT IMPLANTATION

The federal government through the CIA has had a long history of wanting a piece of your mind or at least a stake in knowing how to control the mind. As a result, there have been various programs geared toward controlling states of human consciousness:

“Between 1955 and 1960, the CIA conducted a mind control and brainwashing program with the code name “MKULTRA” using psychoactive drugs such as LSD and mescaline at 80 institutions on hundreds of test subjects. MKULTRA was started on the order of CIA director Allen Dulles on April 13, 1953, largely in response to alleged Soviet, Chinese, and North Korean use of mind-control techniques on U.S. prisoners of war in Korea. The CIA wanted to use similar methods on their own captives and possibly to manipulate foreign leaders with such techniques. The project was run by the Office of Scientific Intelligence under the direction of Dr. Sydney Gottlieb, a psychiatrist, and chemist. Prior to MKULTRA, a number of secret US governmental studies had been conducted to study mind control, interrogation, behavior modification, and related topics including Project CHATTER in 1947, and Project BLUEBIRD and Project ARTICHOKE in 1951. Because most MKULTRA records were deliberately destroyed in 1973 by order of then CIA Director Richard Helms, it is difficult if not impossible to have a complete understanding of the more than 150 individually funded research sub-projects sponsored by MKULTRA and related CIA programs. The Agency invested millions of dollars into studies probing dozens of methods of influencing and controlling the mind by chemical, biological and radiological means (Radio Frequency or RF).”(1)

One of the latest methods and systems for altering states of human consciousness has come to us through a new creation by James Gall. (6) On June 23, 1992, the United States of America has granted a patent for altering the states of human consciousness which involves the simultaneous application of multiple stimuli, preferable sounds, having differing frequencies and wave forms. This technology researches the correlation between electroencephalographic wave rhythms exhibited by the human brain in various states of consciousness. For example, when the human brain is in a relaxed state with eyes closed there is a pulse frequency between the range of 7–14 Hz. When a person is aroused and anxious the rhythms exhibit a pulse frequency in the range of 14–28 Hz, and when a person is sleeping the rhythms fall to within 1.75 to 3.5 Hz range. The latest in cutting edge technology utilizes frequency wave stimulation that targets certain regions of the body and the brain through “wearable” gear that have been utilized by scientists studying psychiatric illness, brain damage (brain trauma), and paraplegics who have had their spinal cords damaged or severed resulting in paralysis. (7) However, with regard to the latest advances in wireless communication and new technologies that are surgically implanted in the human body, devices that can regulate states of consciousness, the possibility of controlling human behavior even further presents to researchers even new possibilities in controlling human behavior.

Experiments of this nature are of personal interest with regard to controlling someone’s “sexual arousal” because women have been the targets for violence; sexual assaults and rapes and have been the human cargo for human traffickers interested in selling young girls and women into the sex trade. In addition, how are men to get their wives “in the mood” when we know many couples experience “sexless” marriages after many years of marriage.

MY PERSONAL EXPERIENCE

Before the advent of modern technology, men used alcohol or clandestinely slipped a drug into a woman’s drink to try and control them. Today, it has been my experience, women are being manipulated by those close to them (past associates, friends, acquaintances, pastoral counselors, family, intimate partners) through biological implants that may be used for obtaining sexual favors from them or controlling other aspects of their behavior. How is one to explain the female experience of waking up in the morning with severe vaginal soreness? The kind of soreness that comes from a long session of sexual intercourse. Women are being raped in their “sleep,” while in their homes, using a form of advancing technology against them that allows the perpetrator to easily slip in and out of their bedrooms, obtain sexual relations without resistance and without the possibility of any physical altercation. Since new technologies offer the potential to alter states of human consciousness and induce sleep utilizing frequency (Hz) stimulation, how is this happening in America?

THE NEXT-GENERATION OF NONSURGICAL NEUROTECHNOLOGY (N3)

If you visit DARPA’s website that discusses their N3 program (Next-Generation Nonsurgical Neurotechnology), it reads:

“DARPA has awarded funding to six organizations to support the Next-Generation Nonsurgical neurotechnology (N3) program, first announced in March 2018. Battelle Memorial Institute, Carnegie Mellon University, John Hopkins University Applied Physics Laboratory, Palo Alto Research Center (PARC), Rice University, and Teledyne Scientific are leading multidisciplinary teams to develop high-resolution, bidirectional brain-machine interfaces for use by able-bodied service members. These wearable interfaces could ultimately enable diverse national security applications such as control of active cyber defense systems and swarms of unmanned aerial vehicles, or teaming with computer systems to multitask during complex missions.” (2)

If these research projects are part of research programs in play at major universities throughout the US, and historically many experimental research projects have been funded by the federal government, then this means all these newly created technology will soon be, if not already, marketed to certain groups of people like medical doctors and others in the field of clinical medicine, or to those with advanced degrees in mathematics and physics, undergraduate students interesting in expanding new technologies with regard to its future possible uses. Promoting these new technologies over websites is part of a web-based campaign known as conspicuous consumption. Who has the purchasing power to buy into such experimental technology? Is it just the federal government? The everyday human? Medicine and the field of health care? Obviously, these new technologies have found their way into the hands of modern doctors as well as in the hands of everyday humans. The Mayo Clinic, the number one top-rated hospital in the United States features some of the latest therapies utilizing biological implants that respond to electromagnetic frequency. (8) Since medicines increasing dependence on technology is rapidly growing, utilizing brain-machine interfaces to help “cure” fatigue sounds like a good idea. But as I have experienced the effects of “brain-electromagnetic stimulation interface” to try and coercively control me into therapy sounds like the Machiavellian deception that it is. A way of manipulating the test subject into a certain location/area. Corralling humans like cattle similar to how farmers control their livestock. Yet, as I have experienced it, this form of electronic targeting has worked in exactly this way. And although there were no explicit words spoken to me during this time while being corralled, we can understand the language that is being expressed. In reading Philosophy of the Maternal Body: Reading silence, we can come to an understanding of the dialectic through the lens of philosophy. The dialectic that is being used when an invisible force latches onto your body and you suddenly come under the control of an unknown assailant can be read as, “Do my will.”

So, who else could be interested in utilizing forms of this technology? How about state policing authorities interested in new models of “communication” in aspects of “social control”? Coercive control is used all the time by those in power ruling over their subjects, especially the police. This technology is part of a market economy whose consumers are those interested in utilizing the latest in 21st-century advances of “Invisible Technology”. I’m led back to the same question, who has the purchasing power to buy into such advancing technology in the interest of “ social control” in utilizing this technology for their group’s benefit? Psychiatric hospitals trying to help “cure” the mentally ill? Obviously, this is one aspect of its use. How about the various state governments interested in imposing new forms of “social control” in curbing “deviance” through new cutting-edge surveillance technologies? Surveillance technologies that might help to ensure bringing “peace” to its communities. Who has access with regard to the purchasing power of these new technologies? People in positions of power within local police administrations who make purchasing decisions on what new technologies offer the latest in cutting-edge surveillance power? How about people within the news media interested in new ways of “communicating” with the public? Am I being targeted by my neighbor, the state government, or the federal government, or someone else interested in controlling my vagina and the “service” it might provide men?

There are various forms of devices that run on an electromagnetic frequency that can be used as part of a surveillance state. All the latest technologies; cell phones, laptops, tablets, wireless telephones, ALEXA, global positioning systems, tracking devices in automobile navigation systems utilizing satellites. The creation of many of these technologies has been funded by the US military through the federal government under military contracts. The internet was developed by the federal government for the purpose of gathering a larger knowledge base in support of the space race and its NASA projects.

DARK TRIAD TRAITS, MACHIAVELLIAN DECEPTION, AND THE PRESENCE OF EVERYDAY SADISM

To say, “There exists levels of subclinical sadism in the everyday populations of the world” is a gross understatement. In a 2016 research study, researchers concluded they found higher levels of Dark Triad personality traits in students pursuing business degrees. (9) In a 2013 study, researchers found that sadistic personality traits were a predictor for a test subject’s preference for killing bugs, and in a second study found sadistic personality traits predicted the preference for harming innocent victims. (10) In another research study in 2015, researchers concluded that people who admitted having stolen something in their lifetime were higher on primary and secondary psychopathy, Machiavellianism, and dysfunctional impulsivity than those who had not stolen something. In addition to this finding, secondary psychopathy predicted stealing from a wider range of targets than primary psychopathy, narcissism, and Machiavellianism. The researchers also discussed how their findings might relate to how psychopathy may be part of an adaptive suite of traits that enable a “cheater” strategy. (11)

I would like to reiterate my previous question,

“Women are being raped in their “sleep,” while in their homes, using a form of advancing technology against them that allows the perpetrator to easily slip in and out of their bedrooms, obtain sexual relations without resistance and without the possibility of any physical altercation. Since new technologies offer the potential to alter states of human consciousness and induce sleep utilizing frequency (Hz) stimulation, how is this happening in America?”

“Despite the obvious importance of individual differences in understanding offending behavior (e.g., Miller & Lynam, 2001; Wilcos, Sullivan, Jones, & van Gelder, 2014), there has been relatively little research exploring the relationships between personality and petty thefts in non-incarcerated adults (Lyons, & Jonason, 2015).” (11) I’d like to expand on this quote by comparing how sexual assault and rape may be considered a form of “petty theft”. In researching the attitudes and behaviors of some individuals found within the court system, there is oftentimes experienced by the victim a proclivity by others toward “victim-blaming” when they encounter certain police officers and court administrators. (12) These experiences are often compounded by the fact women often blame themselves for their sexual assault or rape believing they themselves were responsible for it or that the behavior of the male was somehow justified and expected. In a high school sexual assault case that involved the rape of one 16-year-old female by two football players, other students displayed behavior that reflected victim-blaming toward the 16-year-old victim and downplayed the behavior of the two football players. (13) Through the power of social media, researchers were able to positively identify the prevalence of legitimizing rape myths and subverting myths through social media coverage. Myths that excused the behaviors of these two male teenage assailants because they were “good boys” and pinned responsibility on the rape victim herself. As a result of these widely held beliefs, many acts of sexual assault go under-reported. Speaking from my own personal experiences, I have been sexually assaulted many times throughout my life but only once did I ever have the courage to report it. This should be a statement of the type of treatment female victims are expected to endure after reporting sexual assault. Beginning with how women, as a whole, have been taught to expect “no respect” or receive “no fairness under the law” we can come to an understanding of why and how electronic torture is a new phenomenon in the 21st century of “invisible technologies.” Further proof of the covert “grooming” of victims by forcing them to accept the assaults received. If I represent one female, how many more are out there just like me?

It’s interesting to note the first time the term “targeted individual” was googled, was in 2004. (17) The same year Facebook launched. Facebook launched in February 2004.

Now, bring into this discussion of “electronic targeting” and the “targeted individual” suffering a form of abusive “electronic slavery” and “electronic torture” we can begin to unravel the mystery of the phenomenon by citing the prevalence of everyday sadism within non-incarcerated adult populations in various psychoanalytic papers found in the reference section (9)(10)(11), rape myths and subverting beliefs towards others (12)(13), and how these myths and beliefs contribute to the dehumanization of certain ethnic groups and minority groups. New creative technologies that can promote, through self-promoting business strategies, that may actually target and dehumanize certain minority groups by stripping them of their civil rights and denying them their unique human identities (14). Throughout history, we see periodic manifestations of group violence that dehumanize certain groups based on individual differences; ethnic, race, and gender. (15)(16) The electronically targeted individual is no different from other phenomena of historical dehumanization like the institution of slavery.

Reference Sources:

(1) Perper, A. & Cina, S. (2010) When Doctors Kill: Who, Why and How. New York. Copernicus Books.

(2) “Six Paths to the Nonsurgical Future of Brain-Machine Interfaces.” (2019) Defense Advanced Research Projects Agency. US Department of Defense. https://www.darpa.mil/news-events/2019-05-20

(3) “Vagus Nerve Stimulation.” (2020) The Mayo Clinichttps://www.mayoclinic.org/tests-procedures/vagus-nerve-stimulation/about/pac-20384565

(4) “Vagus Nerve Stimulation” (2021) WebMD.com https://www.webmd.com/epilepsy/guide/vagus-nerve-stimulation-vns#1

https://www.webmd.com/epilepsy/guide/vagus-nerve-stimulation-vns#2

(5) “Dental Microchips.” Clinica Dentis Implant. November 19, 2013. http://clinicadentisimplant.blogspot.com/2013/11/microchip-dental.html

(6) US Patent issued to James Gall for his “Method and Systems for Altering Consciousness.” June 23, 1992. Patent №5123899. https://patentimages.storage.googleapis.com/1e/fd/fc/52ecc80170cab1/US5123899.pdf

https://patents.google.com/patent/US5123899

(7) “Paralyzed Rats Made To Walk Again.” Veritasium. YouTube.com. Uploaded December 4, 2012. Using a cocktail of neurotransmitters in combination with electronic stimulation. https://www.youtube.com/watch?v=oPerfpxYJ1U

(8) The Mayo Clinic. (2021) mayoclinic.org. The Mayo Clinic offers cutting-edge therapies utilize electromagnetics and electronic stimulation.

https://www.mayoclinic.org/

https://www.mayoclinic.org/tests-procedures/electroconvulsive-therapy/about/pac-20393894

(9) Krick, A., Tresp, S., Vatter, M., Ludwig, A., Wihlenda, M., & Rettenberger, M. (2016). The Relationships Between the Dark Triad, the Moral Judgment Level, and the Students’ Disciplinary Choice. Journal of Individual Differences, 37(1), 24–30.

(10) Buckels, E., Jones, D., & Paulhus, D. (2013). Behavioral Confirmation of Everyday Sadism. Psychological Science, 24(11), 2201–2209.

(11) Lyons, M., & Jonason, P. (2015). Dark Triad, Tramps, and Thieves. Journal of Individual Differences, 36(4), 215–220.

(12) Friedmann, Sarah (2017) “9 Horrifying Things Judges Have Said to Sexual Assault Victims. Bustle.com. Published May 1, 2017. Retrieved online February 3, 2021. https://www.bustle.com/p/9-infuriating-things-judges-have-said-when-ruling-on-sexual-assault-cases-54674

(13) Kosloski, A., Diamond-Welch, B., & Mann, O. (2018) The Presence of Rape Myths in the Virtual World: A Qualitative Textual Analysis of the Steubenville Sexual Assault Case. Violence and Gender. Vol. 5., №3.

(14) Douglas, .H., Harris, B.A., & Dragiewicz, .M. (2019). Technology-facilitated Domestic and Family Violence: Women’s Experiences. The British Journal of Criminology, 59(3),

(15) Haslam, N. (2006). Dehumanization: An Integrative Review. Personality and Social Psychology Review, 10(3), 252–264.

(16) Haslam, N., & Loughnan, S. (2014). Dehumanization and Infrahumanization. Annual Review of Psychology, 65, 399–423.

(17) Mind Games: The Tortured Lives of ‘Targeted Individuals’ | WIRED

(18) History of Facebook — Wikipedia

Other resources of interest:

(19) “The Subject and Power: Subjugation in the Era of 21st Century Android and Drone Technology. Proclivities’PrincipleWisdom.Wordpress.com https://proclivitiesprinciplewisdom.wordpress.com/2021/01/27/the-subject-and-power-subjugation-in-the-era-of-21st-century-android-and-drone-technology/

(20) “Technologically-Facilitated Violence and Terrorism in Personal Civilian Life: Reviewing the psychoanalytic literature.” Proclivities’PrincipleWisdom.Wordpress.comhttps://proclivitiesprinciplewisdom.wordpress.com/2021/01/24/technologically-facilitated-domestic-violence-and-terrorism-in-personal-civilian-life-reviewing-the-psychoanalytic-literature/

(21) Johnson, L., Plouffe, R., & Saklofske, D. (2019). Subclinical Sadism and the Dark Triad. Journal of Individual Differences, 40(3), 127–133.

WRITTEN BYKaren Barna

Mother, Daughter, Gardener, Student, Graduate, Cook, Care-Giver, Lover of Books, Reader of Philosophy, Interested in Psychoanalysis