A few years back, well maybe more than just a few years back, my dad was still alive. I was greeted at the lunch meat counter at my local Ewing Shop Rite by an old acquaintance. Will call him “Joe.” He was a former acquaintance from a former lifetime.
But in order for you to understand the whole picture of my story, I need to explain a few things. The time period this “meeting” occurred in was a few years after a sexual assault I reported to my local prosecutor’s office. I was sexually assaulted by a person I was familiar with and with whom I trusted. Following the tragic and sudden death of a close relative, I relapsed into drug use again after 5 years of sobriety. After this sudden death, I had begun to work out a lot to ward off the anxiety I felt about not being accepted by my family. As a result, I lost a lot of weight. One night, while out with one of my “friends,” my “friend” kept encouraging me to use again. I resisted attempts several times and, then, at the last moment, before leaving the bar, I gave in. This was the point of a trajectory.
When women are sexually assaulted while actively using drugs or alcohol as part of their lifestyle choice, they are usually recommended to a rehabilitation center. A few years after my sexual assault, I was forced into treatment. I then made a conscious decision to never use street drugs again and to distance myself as far as I could from the people I had previous associations with. That was in 2006. Although I would still imbibe alcohol a few times a week, I had come to a point in which I could actively imagine a better lifestyle for myself, free from my former associations.
Then, one day at the lunch meat counter, “Joe” tried to strike up a conversation with me. He asked me about a former boyfriend I had dated while I was between the ages of 19 and 20 years old. Let’s call him “Dean.” I was very cold and stand-offish to “Joe” because he had instructed “Dean” to push my head into a couch chair and hold it there one day while “Dean” and I were in the middle of an argument. Because of Joe’s guidance, Dean physically assaulted me. Because of this I always viewed “Joe” as a predator and most likely a psychopath. Who encourages a guy to physically assault a woman? Aren’t men supposed to respect a lady? I don’t believe anything that comes out of this man’s mouth. Joe was also with a woman at the lunch meat counter who had light reddish-blonde hair, and I believe light-colored eyes although my memory is a little faulty. Joe kept referencing this woman with glances for guidance from here. Joe apologized to me and said he truly didn’t have any memory of those specific events. He said he was “sorry” and asked if “I would forgive him?” I looked at him like he was a plague of locus come to destroy my crops. I said, “No.” I couldn’t care less if he could not remember those events from that day or not, and I told him in no uncertain terms, to basically, “FUCK OFF!” I told him I had been so far removed from my former lifestyle I used to entertain in my early adulthood that I didn’t want to know any of those people anymore. Recovery is about avoiding people, places, and things and also because I believed that probably half of my former associations were either psychopaths or sociopaths. People who had been ill-informed about the purpose of life, just like myself. The lifestyle I had led, active in the drug culture and bar scene, no longer plagued me simply because I actively chose recovery and now preferred a healthy lifestyle. I told him I was healthy and a practicing vegan and exercising daily. He then told me that he had “cancer” and was “dying” and “would I please forgive him.” This is the classic ploy of psychopath/sociopath. A “feel sorry for me” game card pulled from the trickster’s bag of tricks. They feign some type of “struggle” and try to win you to their side through sympathy. I’ve seen it a million times.
I believe Joe’s occupation is as a day contractor, although I’m not certain of this. But, in any event, why would I grant a liar forgiveness? I could feel the aversion toward Joe and Dean reverberate in every part of my body. I had allowed myself to be manipulated by men who were rotten and no good for me. Joe had asked if “I wanted to see Dean again.” I thought to myself, “What the fuck do you think?” I replied, “No.”
Honestly, I might have never come to this point in my recovery unless I had been raped which ended the trajectory events, a trajectory that started with my relapse in 2003. A distasteful and bitter pill to swallow; it truly was a revelation that unveiled itself before my eyes. It had somehow pulled all those dark puzzle pieces together to show me that what I had been doing was seriously wrong, even though I secretly knew this deep down inside of me. Such are the lies we tell ourselves. I believed that “my drug use was okay” because “everybody I knew was doing it.” I had even heard of some professional doctors who did it. And besides, these people were my “friends.” Certainly, a friend wouldn’t victimize me. Would they?
Of all the Creepypasta, this story could make one of the best urban legends although it is far from being a myth. The story where the girl who believes it’s okay to get drunk or use street drugs because everyone, she is with, is also doing it. And so, she must somehow be “safe” is far more common than you think. The myth that “surely these people would “respect” me because we commonly identify with one other” is never a certainty. In fact, when considering the nature of man, it is mostly not true. How could a bunch of people that don’t know how to respect themselves be informed about how to respect others? So, my cold and stand-offish stance towards Joe was a psychic defense elicited by a predator who had presented himself to me. I was trying to stay safe.
Shortly after this, my electronic and psychotronic targeting and torture began. I became known as a Targeted Individual. How does this play into the possible reasons for my targeting? Honestly, I don’t know, simply because there are so many other events to consider in my timeline as well.
The most important point I want to make regarding my electronic targeting, psychotronic torture, and group (gang) stalking is this. Over the platform Quora.com, when I discussed my experiences as a Targeted Individual. I was greeted with a response from a man, presumably white, who informed me “it’s because you can’t imagine something better for yourself.”What the fuck? Really? That’s the reason!? The reason I deserve to be tortured and punished!? This means the reason for my targeting is rooted in difference. It is rooted in the difference of identity. It is rooted in the things that divide us and not join us together. The targeting implies that I am not favored because I don’t belong to the right “social grouping.” This is an age-old phenomenon that has gone by many names throughout human history. Most noted for these horrors, based in difference of identity, were the Jewish and Christian holy wars from the Bible (Pagels, 1995), witch trials (Hill, 2002) and other religious inquisitions as well as the many genocides that have taken place over the ages (Santner, 1990). We could look to more modern events like what happened in Charlottesville Virginia. Where on August 11–12, 2017 a Unite the RightRally took place. Many far-right supporters of white supremacy actively protested including the groups alt-right, neo-Confederates, neo-fascists, white nationalists, neo-Nazis, Klansmen, and various right-wing militias. As a result, conflict, and fights broke out when counter-protestors supporting the proposed removal of the statue of General Robert E. Lee from Charlottesville’s former Lee Park. Later a counter-protestor was killed by rally participants who purposefully and willfully drove his car into the crowd (Berreby, 2018, pp.48–49). It is far more than a science of race. It is a science of psychoanalysis, object relations, and identity. The “feverish pitch” that ensues after the realization of a collective narcissistic wound suffered, has marked historical events like the end of World War I and the events that spoked the Charlottesville race riots. Facts tying events of white supremacy and a crisis of white masculinity, to a prior time in American presidential history, when a black Senator from Illinois took the oval office which was immediately followed by a fascist leader.
“In a review of Cullen Murphy’s book, Edward Peters writes, “Murphy ponders ‘what . . . any inquisition really is: a set of disciplinary practices targeting specific groups, codified in law, organized systematically, enforced by surveillance, exemplified by severity, sustained over time, backed by institutional power, and justified by a vision of the one true path. Considered that way, the Inquisition is more accurately viewed not as a relic, but as a harbinger.’ In this sense then, Jane Mayer, author of “Dark Money” writes, ‘Cullen Murphy finds the ‘inquisitorial impulse’ alive, and only too well, in our [modern] world.’”
Subnote: My original studies began with an investigation into religious philosophy as I was educated in a Roman Catholic school system for 13 years. Later I would take up Bible study in my young adult life, between the ages of 23–25. As a result of my early education, I was influenced to pursue readings in religious philosophy as conflict is often rooted in differences of religious identity (Capp, 2009).
Berreby, David. “The Things That Divide Us”. National Geographic Magazine. April 2018. Vol. 233, №4. pp.46–67. “We are wired at birth to tell Us from Them and to favor our own group.” The focus of this special issue is on race, Black and White, and group identity.
Hill, Frances. (2002). A Delusion of Satan: The full story of the Salem witch trials. Cambridge, Mass. Da Capo Press. Original copyright 1995.
Mayer, Jane. (2016). Dark money: the hidden history of the billionaires behind the rise of the radical right. New York. Doubleday.
Murphy, Cullen. (2012). God’s Jury: The Inquisition and the making of the modern world. Boston, Mass. Houghton Mifflin Harcourt.
Pagels, Elaine. (1995). The Origins of Satan. New York. Random House. The focus of this book is on the New Testament gospels following the fall of Christ and how the character “Satan” develops during this historic and influential time period.
“An era can be considered over when its central illusions have been exhausted.” ~Arthur Miller
WARNING THERE IS DISTURBING CONTENT PUBLISHED ON THIS POST. DO NOT READ ON IF YOU ARE FAINT OF HEART.
John Cusack tweeted this quote about our political environment. It’s a compelling quote. Of course, when I think of political central illusions, and a time era, I think of Adolf Hitler. Of course, when it comes to discussing perverse acts the like of Adolf Hitler, we believe that era has ended but it’s only become an infinite game in business and profits. It’s only become more conventional through the use of advancing clandestine technologies that can hack into peoples’ lives and steal away their rights and their bodies through cyber warfare. We now live in the era of eSTIM (wireless electronic stimulation). We also live in an era of wireless communication in which handheld devices have been placed in our hands. There is a very real connection to man’s proclivity to use eSTIM sex toys as a form of BDSM and the electronic targeted physical assaults and psychotronic torture both have connections rooted in the human pregenital instincts and the pregenital human ego. That is to say, acts of sadism and the creation of the anal sadistic universe.
For the last few days, I have been excessively manipulated with electronic convulsive shock therapy during the nighttime hours as I sleep, again. I can’t see my predator, his identity, his ethnicity, his nationality, the color of his eyes, nor the color of his skin.
There seems to be a connection between past violence (past domestic/physical violence element), Capital Health Systems at Fuld (medical facility element/medical access to victims’ bodies), the police (state authority element), and the electronic physical assaults and psychotronic torture (continued violence element against a human body) of victims. At least, as I have experienced it in my case.
When analyzing sadistic targeted physical assaults utilizing electronics and psychotronics, at random and at will assaults, there is the pregenital instinct of the pregenital ego of the perpetrator to consider. When I say “pregenital instincts” and “pregenital ego” that’s a clue that’s been uncovered about the psychological state and persistency of character of the perpetrator. The suspect who is responsible for torturing me from “a far”, who may in actuality be very close in proximity, will have as part of their personality tendencies and repertoire persistent sadistic and anal sadistic phantasies(unconscious wishes towards annihilating victims) and fantasies (the acting out these same sadistic fantasies in their relational world. This is something that escapes the barrier of invisibility to that point of observations to hint towards suspicion). (1) There seems to be a basic breach in human decency and standards of conduct with this perpetrator who is acting out his/her sadistic conscious or unconscious phantasies against me.
“The real problem of humanity is the following: we have Paleolithic emotions, medieval institutions and god-like technology.”
E.O. Wilson, September 9th 2009
Since human violence first takes the form of aggression, some type of conflict is most likely an element that proceeds the initiation of mind and body physical assaults the targeted individual experiences. And we know from past time eras, that the label “mental illness” has been used to manipulate wives and love interests, and to satisfy the male pregenital instinct and pregenital ego in management of his anger toward female flesh (in fact, any flesh), as a result of his maternal Object’s initial ambivalence towards him in infancy. That is to say, he/she not only cast females in delusional images and images of Evil, but males as well. It is an indexical sign of the perpetrator’s warped and distorted notion surrounding their mothers accompanied by notions of feminine evil. He is from the middle class. (2)
Here, when we speak of a time era where the anal sadistic universe manifested, I think of the World War II era. What if Hitler said, “I’m sorry but I didn’t know what I was doing.” Would this be an acceptable excuse for his actions? Certain actions are just beyond the pale of human decency. (3) Arthur Miller said,
“Betrayal is the only truth that sticks.”
Exactly why does REVENGE and VENDETTA tap into the pregenital instincts in the pregenital ego to satisfy the human proclivity for sadistic attacks against human flesh? The answer to that question is rooted in theories of matricide and the paranoid-schizoid personality position.
For me, I have to ask, “Why do these attacks increase and coincide with phone calls from psychiatric service facilities and calls from my insurance company to remind me of “services” that are available to me?” And, “Why are these attacks happening in the privacy of my own home?” This makes me believe it is more about violence and territory. The canvas of the human body in the form of female flesh echoes the past violence of the pregenital stage (preOedipal stage). That is to say, the unconscious territory of the female sexual body is locked in the masculine and feminine mind from our pre-Oedipal phase of psychosexual development. There, in our unconscious mind, resides our pregenital instincts and the pregenital ego. Here is what stranded objects do with their psychic fodder that remains unsublimated:
Trash, City, and Death
Below are the images of Elizabeth Short. In the case known as the Black Dahlia murder.
Additionally, “Why do these attacks end after I’m placed in psychiatric care in the hospital and start again a few days after release if it’s not about controlling a human body as an Object Other?”
Please consider reading the following post to better understand historical phenomenon and how phenomena can be considered harbingers for change.
Janine Chassegeut-Smirgel. (1984) Creativity and Perversion. London. Free Association Books. Chapter 7, “Psychoanalytic Study of Falsehood” and Chapter 9, “Aestheticism, Creation and Perversion.”
Bram Dijkstra. (1986) Idols of Perversity; Fantasies of Feminine Evil in Fin-de-Siècle Culture. New York. Oxford University Press.
Eric Santner. (1990). Stranded Objects: Mourning, Memory, and Film in Postwar Germany. Ithaca and London. Cornell University Press. The interesting connection to the opening of the play by Rainer Werner Fassbinder’s 1975 play entitled “Trash, City, and Death” was a speech of commemoration by the cardinal of Cologne, Joseph Höffner, in which he declared that the Germans “should not, again and again, exhume past guilt and mutually committed injustices, in constant self-torment.” Yet the connection being made here, by me, is to this fact, German Nazis have not left us but are still living with us in the form of white supremacist narcissism and group (gang) psychology. The only way this can be explained is through personality and the existence of the paranoid-schizoid personality position rooted in pregenital instincts and the pregenital ego of the individual. That is to say, human sadism.
“Life as we know it, and probably throughout the universe, if there is life elsewhere, means the universe, if there is life elsewhere, means Darwinian life. In a Darwinian world, that which survives survives, and the world becomes full of whatever qualities it takes to survive. As Darwinians, we start pessimistically by assuming deep selfishness at the level of natural selection, pitiless indifference to suffering, ruthless attention to individual success at the expense of others. And yet from such warped beginnings, something can come that is in effect, if not necessarily in intention, close to amicable brotherhood and sisterhood. This is the uplifting message of Robert Axelrod’s remarkable book.”
The above quote was written by Richard Dawkins for the new edition’s Foreward of Axelrod’s book, The Evolution of Cooperation. In evolutionary game theory, it is believed that nature bestows genes that make a species behavior strong and successful while making other’s species behavior weak and unsuccessful and this evolutionary fact is what has given rise to the successful evolution of modern man; Homo Erectus. However, the term “Darwinian life” has become somewhat of an obsolete term. This theory was believed at a time before man acquired the ability to manipulate the genome of a wide range of species by manually introducing “snippets” of foreign genetic material which give rise to “hybrid” organisms. This process is known as CRISPR. It also doesn’t address his ability to introduce stimulus into species environments that cause the species to either flourish or perish, like vast amounts of toxins introduced into the ocean waters during oil spills, and man’s ability to manipulate populations of genetic material (test subjects) in unethical, inhumane ways. Consider the development of Genetically Modified Organisms known as GMOs.
It appears to me, the phenomenon known as gang stalking, electronic targeted assaults, and psychotronic torture attempts to tilt the stage of what Darwinian called “natural selection” in a very similar way to how man has created genetically modified products. Like the introduction of toxic material into the ocean environment through large-scale toxic spills, a whole chain of events and responses are set in motion. Similarly, I propose the game of electronically targeting individuals through electronic bodily assaults can be understood through game theory and it is similar to the game known as the Prisoner’s Dilemma and expressed through the game of “Hawk and Mouse”. In the “Hawk and Mouse” game, game theory tells us that it is an evolutionary game and that it is also a form of limited warfare if evolutionary stable. That is, even though some organisms may be sacrificed, there will still remain a stable portion of the species within the population. Limited warfare is conflict that doesn’t end in serious injury. In this case, complete and total annihilation of an entire species. Similarly, it appears that man has waged this form of “limited warfare” within the planet’s environment through limited resource depletion known as game seasons; fishing season, rabbit season, duck season, deer season, etc. In the game theory of gang stalking with electronic targeted assaults, and psychotronic torture it appears to be “limited war” simply because it is being waged on a fractional portion of American citizens within the United States where a portion of the population is sacrificed while the remaining much larger portion remains a stable portion of the population.
There is another aspect to the game theory we must consider known as Grim Strategy. Grim Strategy is the “dark” form of Prisoner’s Dilemma games. If you’ve been reading my post, you might remember I discussed personality constellations known as the “Dark Triad” or “Dark Tetrad” traits. These personality types have a strong tendency to play “dark games.” We now can come to understand how these “dark” games are played. In a “Dark Tit for Tat” Prisoner’s Dilemma game. The thinking goes like this, “I’ll cooperate with you as long as you always cooperate with me, but if you double-cross me…….” These types of games can be most readily understood when we look at organized crime activities or classic Mafia games.
So here is ONE of my dilemmas:
I’m laying in bed and in the early morning hours, very early morning hours right before dawn, ELF (extremely low-level electromagnetic frequency) is turned on inside my body which causes me to feel fatigued and become tired. Now, what is it that my “prison guard(s)” are anticipating in my behavior? I assume they have knowledge of my routine and have anticipated behaviors like; to wake-up, get dressed, and start exercising. Which is what a lot of healthy people choose to do. This is, by the way, a personal decision that differs from a game.
Now, the purpose of games is to “win,” and the purpose of game theory is to learn how to understand all the angles, so as competitors we play our best strategies and, hopefully, anticipate our opponents’ strategies as well. If game theory exercises are carefully controlled thought experiments that allow a person to guess how the other person is going to act, we might understand the control and manipulation of gang stalking, electronic targeted assaults, and psychotronic torture as a way of controlling our opponent’s thoughts, behaviors, and decisions thereby affording us an upper advantage in winning the game. This would in effect eliminate the problem in game theory where games do not play out as their theory predicts. And only when one has harnessed the power to control his opponents, like we will come to see with grooming and targeting in predatory sexual behavior on college campuses through the use of alcohol and deceptive sexual practices we will make the connection to issues of civil rights violations. This is where individual and personal decisions (freedom to exercise one’s free will) are usurped by another interested in winning the advantage. Grooming and targeting in predatory sexual behavior on college campuses will be discussed later.
Back to my prison guards who know me and know which responses I am most likely to choose. My guards understand my choices so much so, that this game incorporates the psychological re-grooming of behavior. The question posed is this: “Under what conditions will cooperation emerge in a world of egoists who have no central authority?”
Now, I have only studied a few lectures on game theory but I believe the answer to this question is the following:
Conditions of cooperation emerge in a world of egoists with no central authority where and when there is a shared interest do so. If we turn to the theatre of war during World War I where peace periodically broke out all along the front of trench warfare. Both the German and Allied parties agreed to cooperate and not shoot one another. They did not attack each other’s food truck deliveries. They agreed to a cease-fire on all holidays and if they were instructed to shoot by headquarters, they agreed to purposefully miss. To “Shoot where they ain’t” as it were. This was because there existed between both groups a shared interest in survival.
Now, let’s consider this game looking through the lens of Grim Strategy in a “Dark Tit for Tat” scenario. In this scenario, we take into consideration unlawful gang activity and the games gangs employ to manage their “illegal authority over others.” In classic Mafia game theory, these games were played to manage their “rackets” and “control their business security.” In this scenario, we have what is known as a form of “dark warfare” where two different groups, in conflict with each other, play the “Dark Tit for Tat” game for the purpose of gaining a stake in whatever is being fought over, say a certain cut in the profits or access to a port terminal of entry to smuggle illegal cargo into the United States or in what has historically been seen in the political theatres of war, to win the right over eliminating a political rival and/or re-establishing the ownership of the political opponent territories.
In Grim Strategy game theory, the grooming and targeting in predatory sexual behavior on college campuses through the use of alcohol and deceptive sexual practices is expressed as masculine entitlement to possess the female object body. Let us consider game theory on college campuses in college games, “party games that groom for sex” and later we will consider this type of game for the purpose for “re-grooming for illness” in what I have a very personal experience with, gang stalking, electronic targeted assaults, and psychotronic torture.
Understanding the rise of sexual predation on campus, namely those individuals who prey on others to meet their own sexual needs and/or exert a sense of power and control through sexual assault and rape, requires an understanding of dark personality traits and dark game theory. “Predators use coercion and grooming behaviors to lower the defenses of the target and increase their vulnerability to sexual violence. Predators seek to lessen a victim’s ability to advocate for personal safety and disempower them from bringing concerns forward to authorities (Armstrong et al. 2006; Humphrey and Kahn 2000; LaViolette and Barnett 2000; Meloy and Fisher 2005).” This type of grooming also takes place for the annihilation of one’s competitors (“re-grooming for illness”) so the playing field is cast uneven and tilted in which the predators achieve the higher ground and ultimately win bigger shares of the bounty. Since, one of the goals of dehumanization is “status-reducing” interpersonal maltreatments (Barna, 2021), a social-cognitive process termed as “mechanistic dehumanization” in which humans are likened to objects or automata and denied human qualities like warmth, human emotion, and individuality (Haslam, 2006).
I am not going to reconstruct a basic game diagram of the game played on college campuses between predators to sexual assault offering alcohol to their opponents; fellow female college students. But I am sure you can reconstruct a basic game diagram yourself. Some good questions to ask are, “What do you think is going to happen in this game?” and “What are the dominant strategies of the two players?” A dominant strategy is always the strategy that will make it most likely for each player to win. NASH EQUILIBRIUM is easy to determine in game theory because it’s simply where both parties choose to play their dominant strategy. It may not be immediately obvious where the players will end up and what the outcomes might be, but in the game of gang stalking with electronic targeted assaults and psychotronic torture, the intent is clear. Remember, INTENT is what we need in order to establish MENS REA, the mental state the proves the actors acting with intention to harm and determine whether or not a crime has been committed.
In a game aimed toward the “grooming for the annihilation of your competitor,” I have come to call “grooming for illness” we can see how becoming intimately versed in your opponent’s behavior allows for you to set up the scenario of the prisoner’s dilemma that incorporates a Grimm Strategy; early morning extremely low electronic frequency stimulation (ELF). I use the play on the word Grimm to refer to Grimm’s fairytales and the association made with unconscious fantasies and the relational world in object relations theory. This is a game that is repetitively played over and over again in what is known as a Repeated Prisoner’s Dilemma. The perpetrator, under a veil of secrecy in which identity cannot be decerned, speaks to me through a mode of physical assault where language and speech have fallen away and has been rendered in the form of representations, symbolism, and metaphor. That is the phallic power of the possessed electronic weapon that reigns over me with intentions of a Grimm strategic purpose. In this game, both opponents arrived at what is known in game theory as the Nash Equilibrium. Both of us are playing our dominant strategy. It is in my best interest not to move out of my home? Although this scenario may not be in my best interest, there is no guarantee that the electronic targeting will not follow me. If I do choose to move out, and the electronic targeting follows me, will I be worse off? Or is it more likely that if I move out, the person electronically targeting me will stop their incessant punishments and let me go?How am I to know what my best strategy is? While I value independence and cooperation which is played out in the goal of interdependence, I am allowing a form of abuse to continue which I absolutely do not support. We can pose a simple question: When should a person cooperate, and when should a person be selfish, in an ongoing interaction with another person? Should a friend keep providing favors to another friend who never reciprocates? Should a person continue to provide another with continued cooperation in the face of clear and present hostile abuse which is taking place against them? Should a business provide prompt service to another business that is about to be bankrupt? How intensely should the United States try to punish the Soviet Union for a particular hostile act, and what pattern of behavior can the United States use to best elicit cooperative behavior from the Soviet Union? All of these are really good questions to ask when we discuss interpersonal relations, intersubjectivity, and the decisions made when playing political and social games.
There is a difference between a decision and a game. In a decision, I make a choice to do something without any regard for another person (this makes a clear representation of my independent choice and what the constitution grants as civil rights). In a game, two or more players choose what to do based on what they think the other players are going to do. As such, a game always has a strategy. What should I do given what you think I will do? And what should I do given what I think you will do given what you think I will do? This can become very abstract very quickly. This is the game of gang stalking, electronic targeted assaults, and psychotronic torture except it is being played on a very unlevel playing field where the “fairness” of the game is tilted ONLY to the perpetrators or winning opponents’ side of the game, thereby giving him the upper advantage.
So, to be asked by a police officer, “Why don’t you move out of your home?” makes me very suspicious of the intentions of the officer because my position cannot be reduced to such black and white strategies; “to stay” or “to go.” My position is not as concrete as such because there are deeper abstract positions and alternate strategies to consider because there are alternate players in this game who pose a clear and present danger to the rest of society. That is to say, a whole range of alternative propositions exist where the identities of some of the other players are not known and therefore, what they will do cannot be known with any level of certainty creating an even greater level of abstraction in the game. Typically, these are the types of abstractions played in espionage games where subterfuge is a predominant skillset played with the sole object of winning.
In my position as a Targeted Individual, there exist persons with deep selfishness, pitiless indifference to suffering, and ruthless attention to individual success at the expense of others. If you remember from the opening quote to this essay by Richard Dawkins, he called this position warped.
In a decision, I make a choice to do something without any regard for another person. In my case, to choose to get up and exercise before I go to work and eat tofu and vegetables for lunch. This freedom has been taken away, I no longer have the choice to awake and perform physical exercise in pursuit of health and well-being. This represents a violation of independence and what the constitution grants as civil liberties. Now, I have been thrown into a game, as an unwilling opponent, by another party to play as a competitor, in a very real, very tilted, unfair game that offers ONLY to the other opponent advantages over my body and mind (psychotronic torture).
Now, if we return to the beginning of the essay where evolutionary game theory is defined as the belief that nature bestows genes that make a species behavior strong and successful while making other’s species behavior weak and unsuccessful, we can come to an understanding of why terms like Darwin’s “survival of the fittest” has become obsolete in light of the phenomenon of electronic targeting and psychotronic torture which seeks to impose a form of illegal control over a fractional portion of the American population.
Finally, to conclude, professor Jay R. Corrigan at Kenyon University tells us in economics there are some Prisoner’s Dilemmas known as Trade Wars. “For example, tariffs are placed on imports in any given country as that country’s Dominant Strategy regardless of what other countries are doing. That’s because tariffs have the potential to boost domestic firms’ sales at the expense of their foreign competitors. In this game, the Nash Equilibrium is where all countries play that dominant strategy. But economists are quick to tell you this is not a good outcome because it limits the gains from trade. When you focus on what you are best at, and I focus on what I am best at, and we trade with one another we are both made better off. Tariffs and other trade barriers mean we devote fewer resources to the things we are best at doing, making us poorer in the long run (Anczewska, Roszczynska-Michta, Waszkiewicz, Charzynska, Czabala, 2021).”
Anczewska, Marta; Roszczynska-Michta, Joanna; Waszkiewicz, Justyna; Charzynska, Katarzyna; Czabala, Czeslaw. Empowering Women with Domestic Violence Experience. Retrieved online May 10, 2021. The paper defines the concept of Empowerment as an approach that allows for the enhancement that allows for the possibility for people to control their own lives.https://files.eric.ed.gov/fulltext/ED567107.pdf
Armstrong, Elizabeth A., Hamilton, Laura, & Sweeney, Brian. (2006). Sexual Assault on Campus: A Multilevel, Integrative Approach to Party Rape. Social Problems. Vol.53, №4. pp.483–499. Published by Oxford University Press. https://doi.org/10.1525/sp.2006.53.4.483
Axelrod, Robert. (1984). The Evolution of Cooperation. New York. Basic Books.
Halsam, N. (2006). Dehumanization: an integrative review. Personality and Social Psychology Review. 10, 252–264. doi: 10.1207/s15327957pspr1003_4
Humphrey, S. E., & Kahn, A. S. (2000). Fraternities, Athletic Teams, and Rape: Importance of Identification With a Risky Group. Journal of Interpersonal Violence, 15(12), 1313–1322. https://doi.org/10.1177/088626000015012005
LaViolette, Alyce D. & Barnett, Ola W. (2000). Why Battered Women Stay. London. Sage Publishers.
Van Brunt, Brian; Murphy, Amy; Pescara-Kovach, Lisa; and Crance, Gina-Lyn. (2019). Early Identification of Grooming and Targeting in Predatory Sexual Behavior on College Campuses. Violence and Gender. Vol. 6, №1 Published online March 11, 2019.
Corrigan, Jay R., Ph.D. Understanding Economics: Game Theory. Lectures 1. Game Theory Basics: The Prisoner’s Dilemma. Great Courses Plus. Retrieved on May 9, 2021.
Corrigan, Jay R., Ph.D. Understanding Economics: Game Theory. Lecture 2. Repeated Prisoner’s Dilemma Games. Great Courses Plus. Retrieved on May 9, 2021.
This essay entertains a discussion on some contributing factors to gang stalking, electronic targeted assaults, and psychotronic torture. This essay considers unlawful police gangs and former members of the military who go on to form extremist groups in light of the recent phenomenon in U.S. policing politics.
In my personal experience with electronic targeted assaults and electronic psychotronic torture revealed to me that the use of this invisible technology is being utilized by individual police officers in the police force and/or being utilized by the local police departments. Examining extremist groups in America has revealed 12% of the people arrested for storming the U.S. Capitol had previous military training or present or former police officers.
In a paper, Policing Gangs and Extremist Groups: A Different Viewpoint, Charles F. Williams “looks at U.S. homegrown, transnational extremist groups acting at a national level, which he argues present a clear and present danger to local, county, state, federal, and international policing cooperation. His essay offers a different viewpoint that posits that these groups are not under control in their current form.” This was in 2009. I believe this fact may have changed with the storming of the U.S. Capitol on January 6, 2021. He reports these groups are changing their ‘Modus Operandi’ (MO) while remaining engaged in all areas of criminality. His paper advocates these gangs to be designated as terrorist organizations so that the provisions of the USA Patriot Act, intelligence agencies, and military intelligence can be deployed against them to protect the best interest of the United States. Will surveillance of the gangs that stormed the U.S. Capitol be included in this new deployment of protection?
Since the advent of gang stalking with electronic targeted assaults and psychotronic torture, there has been little in the way of controlling the invisible terror this form of activity seeks to inflict on local residents. Historically, gangs were visibly seen. They had signs, colors, special clothing, with clear gang markings. The list of gangs in U.S. history is lengthy. They have ranged from well-known U.S. gangs like the Hell’s Angels and Aryan Brotherhood to immigrant gangs like Malasalvatruchas (MS-13), Costa Nostra, and the Mexican Mafia. The transformation of violent gang activity has now manifested to include gang stalking with electronic targeted assaults and psychotronic torture. It is my opinion the people that make up this new type of invisible terrorism may be people with previous military training, knowledge of special operations, surveillance techniques, and either active or former members of the policing community. Individuals who hunt, stalk, and electronically torture are no different than the street gangs in which America has become familiar.
In 2009, with the inauguration of a new presidential administration, and the closing of an era on predominantly white presidential masculinity authority, it was reported by some media and federal law enforcement that recruitment in some white supremacist groups increased in several states. The timeline of the advent of the phenomenon known as gang stalking with electronic targeted assaults and psychotronic torture is of importance because these groups pose a clear and present threat to America’s national security problem (Krisberg 2007; Lovato 2007).
I propose the way gangs are carrying out their violence has transformed from that of the “visible” to that of the “invisible” for a very specific purpose. They no longer want to receive any recognition of identification, either publicly or by law enforcement. Identifiers are how we classify data. If data cannot be classified, it cannot be identified. They want to be the sole “master signifier.” As signifiers create meaning, words will take the place of the things they refer to. This means, psychologically speaking, that speaking beings are creatures of absence — and a barrier of meaning protects us from a direct confrontation with THE THING — this is what the psychotic is unable to do because of a defect in the foundation of language.
In addition to the “invisibility” aspect in the transformation of gangs, they maintain a cache of weapons (electronic targeting devices) that carry out surveillance of their surroundings (space and property) and control ingress and egress from the sites they stalk. These compound groups would try to micro-manage (individual people) and minimize outside contact on the properties they surveil. If you think of groups that do not transform and remain in their compounds (for example, polygamist sects seen in Waco Texas) can be watched easily as compared to those blending into general society. Or at least this is what was formerly assumed. New developing technologies may allow for the individual tracking of people as they move around the towns and communities where they live.
Jamison (2008) reported that the Hell’s Angels have learned to disperse, dress the same as the community they live in, live next door quietly, enroll their children in school and no longer have identifying tattoos or markings on their motorcycles. In other words, they blend in and act like the new Harley Davidson motorcycle social phenomenon, while they control a vast criminal operation making huge sums of money. Even prison gangs are no longer tattooing themselves with identifiers in which they can be sorted and classified.
The important key piece of information given here regarding the transformations of gangs is: They do not want any attention. They want to operate quietly, unobtrusively, and dispose of their enemies very quietly. Interesting, long-term gang stalking with electronic targeted and psychotronic torture achieve these ends. Although the effects of this type of torture are not immediate, they will eventually cause lifestyle changes and the onset of illness. Williams discussed this loss of visibility from tattoos, dress, etc., with an intelligence analyst (Lee 2009) at the North Texas Fusion Center, McKinney, Texas. This intelligence analyst alluded to unverified information that a scar or scars in a certain spot on the body or cut in a particular fashion may replace ink tattoos. The development of simple visible identifiers would increase “invisibility.”
If extremist group transformations aimed at dispersing and camouflaging themselves within communities contribute to the group’s opacity, how does this change pose a special challenge to the enforcement of laws, or to how federal law enforcement uncover local policing conspiracies? How can law enforcement monitor these groups? Surveillance is possible through ground, communication, aerial, and satellite should they become imminent, widespread threats. To do so effectively, however, federal law enforcement needs a proactive policy and effective intelligence sharing. The advent and manifestation of electronic targeted assaults and psychotronic torture de nouveau is a form of service security surveillance that capitalizes on the science and art of punishment.
The Federal Bureau of Investigation’s immediate response to capture individuals who were part of the group that stormed the U.S. Capitol has been persistent and successful. How are we to catch the invisible crime of electronic targeted assaults and psychotronic torture?
When we consider information sharing between police agencies, please consider the following,
“This instant inter-jurisdictional information-sharing brings up a number of privacy and ‘agency turf’ issues, government surveillance, policy issues, budgetary and so on (Sacco 2000; Schneider and Kitchen 2002; Tonry 1997; Webster 2001). It also appears to be a surveillance system, which is simply not the case. General surveillance of the public is avoided, only those persons identified, arrested or convicted of gang activities put into the system are subject to surveillance. So, unless an individual has committed some act, e.g. an arrest, conviction, gang membership established, etc., that would put them into the system, the system would not have any information on that individual. This is the system’s safeguard against general surveillance of the population and forces the system to narrowly apply its data searches within the system datasets (nodes) thus preventing any constitutional rights abuse.”
Even this surveillance is not physically violating with electronic targeted assaults or psychotronic torture. State surveillance of individuals who have been entered into their database and identified as “gang-related members” or people who have engaged in criminal activity is done strictly for information sharing purposes between “nodes.” Nodes are the various points of entry into the system which is shared between the nodes. The database is protected through security and secrecy by only vetted persons trusted to view the data. This database system should be used only for agency use and the systemic integrity and control of the data remains the responsibility within each node of ownership. However, people are human and may fail at the integrity of upholding the secrecy of the data. We have at least one possible conclusion as to how gang stalking using electronic targeted assaults and psychotronic torture may be exploited by policing and administrative personnel. Could this possibly represent one avenue in which gang stalking with electronic targeted torture is allowed to develop?
Williams, C. (2009). Policing Gangs and Extremist Groups: A Different Viewpoint. Policing: A Journal of Policy and Practice, 3(3), 275–280.
Goldsmith, S. and Eggers, W. (2004). Governing by Network: The New Shape of the Public Sector. Washington DC: Brookings Institution, pp. 80–185.
Krisberg, B., Marchionna, S., Baird, C. et al. (2007). Continuing the Struggle for Justice. Thousand Oaks, CA: Sage, pp. 21, 33–45, 89, 267.
Lovato, R. (2007). The Smog of Race War in LA. New York: McGraw-Hill, Art. 25, p. 113.
Sacco, V. (2000). “Media Constructions of Crime.” In Silverman, R., Teevan, J., and Sacco, V. (eds), Crime in Canadian Society, 6th edn. Toronto: Harcourt Brace.
Schneider, R. and Kitchen, T. (2002). Planning for Crime Prevention: A Transatlantic Perspective. London: Routledge.
Tonry, M. (1997). Ethnicity, Crime and Immigration: Comparative and Cross-National Perspective. Chicago, IL: Chicago University Press.
Webster, C. (1997). The Construction of British ‘Asian’ Criminality. International Journal of Sociology of Law 25:65–68.
Wortley, S. (2001). “Under Suspicion: Race and Criminal Surveillance in Canada.” In Chan, W. and Mirchandani, K. (eds), Crimes of Colour: Racialization and the Criminal Justice System in Canada. Peterborough: Broadview
“Whenever and to whatever extent there is room for the use of arms or physical force or brute force, there and to the extent is there so much less possibility for soul force.” ~Mahatma Gandhi
To help understand the force of violence being imposed upon U.S. citizens through the use of gang stalking and electronic targeted assault, I would like to include some philosophical thoughts from Judith Butler. Butler tells us moral philosophers and theologians (two of my favorite topics of discourse) have asked:
“What grounds the claims that killing is wrong, and that the interdiction against killing justified? The usual way of handling this question is to ask whether that interdiction, commandment, or prohibition is absolute; whether it has a theological or other conventional status; whether it is a matter of law or one of morality. It is also accompanied by further questions, namely, whether there are bona fide exceptions to such an interdiction, when injuring or even killing is justified(Butler, 2020).”
Self-defense is one of the topics of debate that is usually arrived upon after asking the previously posed question. However, the term “self-defense” is a highly ambiguous term. After all, “self-defense” is usually part of militaristic modes of foreign policy that justify every attack as being part of “self-defense.” Even contemporary U.S. law makes concessions for preemptive killing. Every individual is part of a “broader sense of self.” The people who make up this “broader sense of self” are your loved ones; spouse, child, even animals, and other people considered close to you. You have those that are close to you and who belong to this “broader sense of self,” and you also have those further away from you, at a distance from yourself and your loved ones. In the name of protection, a person may commit violence, even murder in the protection of these loved ones. But the law also sets up the distinction for those at a distance from you whom you may not violate or commit murder against. Judith Butler poses the following questions:
“So, what and who is part of the self that you are, and what relations are included under the rubric of the “self” to be defended? Are we more ethically obligated to preserve the lives of those who are close to us than to stand for the lives of those who are considered far away, whether in a geographical, economic, or cultural sense(Butler, 2020)?”
A topic of debate that is usually arrived upon after asking these questions involves “difference.”Racial and ethnic differences,cultural differences (presented as lifestyle choices), religious differences, homosexuality, and transgender sexuality as difference. I imagine a new group will now emerge as the cannabis-loving group who will soon be stigmatized for their participation in legalized recreational marijuana use if it was not a previously known lifestyle choice. For it is perceived that “potheads” are not part of this egalitarian culture.
If I defend myself and those who are considered part of myself (or proximate enough so that I know and love them), then this “self” that I am, is relational. Yes? Of course, it is, but such relations, considered as belonging to the region of the self, are limited to those who are proximate and similar.One may be justified in using violence to defend those who belong to the region or regime of the self (Butler, 2020). However, the ideology arrived at here may be similar to a U.S. “militaristic mode of foreign policy that justifies violence” in “self-defense” but are also part of the violence belonging to gangs, the drug trade, and mafias which manifested itself as violence descended on the Capitol on January 6, 2021. That is to say, it belongs to part of an imaginary where delusions are bred. A group of men who hate women seek to protect their right to progeny which may be part of their actual biological lineage or part of metaphorical intelligence (e.g., the masculine intelligence that excludes women and other groups as intellectuals). The most frightening wars are the imaginary wars waged in the mind where no real threats to harm ever even existed (Dijkstra, 1986; Mitchell, 2000). It seems to me that gang stalking with electronic targeted assaults and organized crime syndicates like the Mob are part of a human phenomenon rooted in delusional beliefs. Delusional beliefs about one’s self and ‘Other’ which gave rise to phenomenon like the Salem Witch Trials. These groups expand claims of “self-defense,” violence they believe to be worthy protection from future violence: that is a violence done to others so that it is not done to one’s own(Butler, 2020). And what emerges out of this logic sometimes manifests as delusions held by extremist groups, groups whose perceived rights to entitlements and privileges, otherwise not given freely, are a violation to “the self.”This prohibition is now imposed on the other group perceived to be “privileged,” and these privileges will be preemptively taken away (ABC News, Examining Extremism in the Military, April 28, 2021). “Harming,” in this context, is to be perceived as the social behaviors that inflict adverse outcomes or adverse environmental conditions upon a social order that either considers itself to be predominantly egalitarian or is perceived as being egalitarian. The same perceived “harm” is presented in the form of social or cultural differences that target gay and ethnic communities.
If smoking marijuana is a lifestyle or cultural choice, and if smoking marijuana is self-harming, why has it been legalized? If drinking alcohol is believed to be self-harming, why is alcohol consumption even allowed? And are these “self-harming” behaviors a component or by-product of the new phenomenon of electronic targeted assaults? Have new state legalizations surrounding cannabis use opened up an even broader avenue for which the state’s technological apparatus of control may be more broadly deployed through clandestinely electronic assaults? Maybe not, but how is one to find out if one does not fully even understand the phenomenon of gang stalking and electronic targeted assaults? Since clandestinely held secret operations are not only part of government operations, they are part of the mafia and mob hits and gangland-style murders. The use of this technology against U.S. citizens comes under alarming suspicion as it violates the very constitution on which this country was founded. It violates 4th amendment rights.
Another important distinction to recognize is the importance of language and dialogue in conflict resolution. When language and dialogue collapse, whether it be from an inconceivable violation (denial of “privileges”) in the distinction between what is “mine” and what is “yours,” or at some other failed to arrive at consensus, what inevitably will emerge are acts of violence against Other. “The prohibition now opens up into a situation of War, in which it is always right to defend oneself or one’s own violently and in the name of self-defense, but certainly not to defend a whole host of others who do not belong to “one’s broader sense of self (Butler, 2020). “ In the deployment of electronic targeted assaults against U.S. citizens, people’s bodies are being usurped, stolen, and taken away from them which in concept is very similar to deceptive sexual practices and sexual assault which is a category of crime that sometimes presents a concept in crisis in legal studies, and is similar to the concept in crisis surrounding the phenomenon of gang stalking with electronic targeted assaults (Conaghan, 2019; Gibson, 2020). That is, a failure to arrive at conclusion as to whether or not some form of behavior is “assaulting.” That is, a violence or a violation done to the victim so that it is not done to one’s own, as an exception to the prohibition to violence that now becomes a potential state of war, or at least such a state that is coextensive with its logic (Butler, 2020). Since the “stealing of one’s body” has been classified as deceptive sexual relations or sexual assault, and the dehumanization of people within organizational structures becomes part of how corporate business is conducted(Christoff, 2014; Halsam, 2006), and even how gangs and mafia organizations have operated, one must ask the question, “How these electronic targeted assaults fit into the corporate-political agenda? Or even if they fit at all?” Or question, “Is it part of something much more problematic; invisible crime and invisible empires?” That is to say, “Is it a part of RICO?”
How is it still being carried out without federal and state intervention classifying the behavior of electronic targeted assaults as a violation to the constitutional rights of individuals? The war in the Middle East will be ending soon in the Fall of 2021. Will these electronic targeted assaults end too if they are part of the government’s“service surveillance security”operation of Homeland Security (law enforcement operations)?
It is important to convey the knowledge that electronic targeted assaults steal away from the individual their locus of control. When someone’s locus of control is removed, it inflicts a state of unhappiness and dysphoria because it takes away the individual’s sense of individual empowerment (Farnier, Shankland, Kotsou, Inigo, Rosset,& Leys 2021). Its long-term effect inflicts psychological damage and forces lifestyle changes that end up being detrimental to the victim (Sheridan, James, & Roth, 2020).Since cultural differences are a part of social differences, lifestyle choices become altered through this technology’s deployment. It is not hard to see how gang stalking with electronic targeted assaults tie into the drug culture and gang violence, even the phenomenon of dehumanization in organizational and corporate-political settings.
When I was in psyche, following a hit and run, drunk driving incident, where I was involuntarily detained for a week, a claim was made by other patients on the hospital ward. The claim was there were “body snatchers” coming in the middle of the night while the patients slept. These patients were removed from their beds by orderlies who put their bodies on gurneys and took them “away.” I was one of these patients. The patients were roofied but returned to their beds by morning. People wondered where were these patients going in the middle of the night, of which, no answer was ever given. Not even to me and I was one of the bodies that were stolen away in the night! Didn’t I have a right to know? This sounds like a scene right out of an Albert Hitchcock episode of “The Twilight Zone,” but it was really occurring. And now, several years later, I am experiencing “body snatching” electronic targeted assaults that mimic the very phenomenon that was occurring in the hospital ward during my stay there. Law enforcement was involved, of course, because I was in a car accident and struck another driver on the road. So, someone please tell me how this all fits together? Yes, I was guilty of a crime, and yes, I am mentally ill, but do I deserve to be tortured for it for the rest of my life? I am no less mentally ill than the philosophy “man sprung fully formed into his social and political environment, responsible and independent.” Or no more mentally ill than Robinson Crusoe, that solitary man who sprung fully developed into his social and political environment, stranded on an island all by himself never having known dependency. That first figure of primary “natural man,” completely self-sufficient even when he looked at himself in the mirror, blind to his mother’s upholding and support of him, totally and completely self-sufficient. Or no more mentally ill than Karl Marx’s Economic and Philosophical Manuscripts of 1844, in which he ridiculed with great irony, that in the beginning “natural man” is like Robinson Crusoe. A man all alone on an island, providing for his own sustenance, living without dependency, without systems of labor, and without any common organization of political and economic life, without ever having known the dependency of a woman. Except, I was born a female, a woman fashioned in the gender role these very ideologies obliterate! The female all men need to evacuate from their psyches, a mother, a sexual partner, a wife. It’s an annihilation of Other in the service of a masculine self-defense mechanism. I am a dependent. I provide a domestic service as a non-wage earner. A service that has been directly tampered with through these targeted electronic assaults.
The problem with gang stalking with electronic targeted assaults is the element of shame and guilt. People feel shameful and embarrassed if and when they are exposed. As a result, they are afraid to tell their true story which might touch upon their mental illness or some illicit infraction. This directly contributes to the phenomenon’s obscurity because individuals hide the truth and are afraid of exposing the true nature of their experiences. Much like how the mafia controlled law enforcement with intimidation and fear, this technology’s apparatus of control is the same intimidation and fear of castration. For many years, Edgar J. Hoover was afraid to address the mob and enforce constitutional law because he was afraid of its lethal repercussions. He knew that good men, not might die, but that they were going to die in the war against justice. Here is the problem. Some forms of justice are phantoms, delusional apparitions held because of man’s fear of dependency and castration.
It’s very possible that these same mechanisms are working together on a corporate-political scale, and are the same forces responsible for the dehumanization of people within organizational settings, or at least these entities possess the same mentality that dehumanizes people in general. This mentality is adhered closely by sadists and people with the Dark Triad and the Dark Tetrad character traits(Buckels, Jones, & Paulhus, 2013; Johnson, Plouffe, & Saklofske, 2019; Krick, Tresp, Vatter, Ludwig, Wihlenda, & Rettenberger, 2016; Lyons, & Jonason, 2015).
Perhaps I’m missing another organizational structure in which these same mechanisms work and operate, the family, thereby making it a family-corporate-political conglomerate historically known as The Mob and organized crime.
If you haven’t read my previous post, please click on the following link and read Part I first.
Bram Dijkstra. (1986). Idols of Perversity; Fantasies of Feminine Evil in Fin-de-Siècle Culture. New York. Oxford University Press.
Buckels, E., Jones, D., & Paulhus, D. (2013). Behavioral Confirmation of Everyday Sadism. Psychological Science, 24(11), 2201–2209.
Butler, Judith. (2020) The Force of Nonviolence: An Ethico-Political Bind. New York. Verso Publishing
Christoff, K. (2014). Dehumanization in organizational settings: some scientific and ethical considerations. Frontiers in Human Neuroscience, 8,
Conaghan, J. (2019). The Essence of Rape. Oxford Journal of Legal Studies, 39(1),
Farnier, J., Shankland, R., Kotsou, I., Inigo, M., Rosset, E., & Leys, C. (2021). Empowering Well-Being: Validation of a Locus of Control Scale Specific to Well-Being. Journal of Happiness Studies, OnlineFirst, 1–30.
Gibson, M. (2020). Deceptive Sexual Relations: A Theory of Criminal Liability. Oxford Journal of Legal Studies, AdvanceArticle,
Halsam, N. (2006). Dehumanization: an integrative review. Pers. Soc. Psychol. Rev. 10, 252–264. doi: 10.1207/s15327957pspr1003_4
Johnson, L., Plouffe, R., & Saklofske, D. (2019). Subclinical Sadism and the Dark Triad. Journal of Individual Differences, 40(3), 127–133.
Krick, A., Tresp, S., Vatter, M., Ludwig, A., Wihlenda, M., & Rettenberger, M. (2016). The Relationships Between the Dark Triad, the Moral Judgment Level, and the Students’ Disciplinary Choice. Journal of Individual Differences, 37(1), 24–30.
Lyons, M., & Jonason, P. (2015). Dark Triad, Tramps, and Thieves. Journal of Individual Differences, 36(4), 215–220.
Mitchell, J. (2000). Madmen and Medusas: Reclaiming hysteria. New York. Basic Books.
Sheridan, L., James, D., & Roth, J. (2020). The Phenomenology of Group Stalking (‘Gang-Stalking’): A Content Analysis of Subjective Experiences. International Journal of Environmental Research and Public Health, 17(7),
“Between gods and men, territories are set up. At least in the no-man’s land of the heights of heaven, the depths of hell, and inside the boundary traced by the oceans. Dimensions installed by a cosmogonic trilogy that leaves each term in its generic place. There remains the earth ancestress, a fourth term, that was once the most fertile, that has been progressively buried and forgotten beneath the architectonic of patriarchal sovereignty. And this murder erupts in the form of ambivalences that have constantly to be solved and hierarchized, in twinned pairs of more or less good doubles.”
Luce Irigaray, Marine Lover of Friedrich Nietzsche
The purpose of criminal codes is to safeguard the dignity of humankind, its freedom, and rights under a country’s constitution which dictates the behavior of its citizens. However, in 1951 under Stasi rule, the codified offenses for which East German citizens were prosecuted and imprisoned were unique to totalitarian regimes, both fascist and communist. Victims to forms of this particular perversion of justice were usually persons who had requested legal exit permits from the German Democratic Republic (DDR) authorities but who were turned down. In many cases, their “crime” was having contact with a Western consulate to inquire about immigration procedures. Sentences of up to two and a half years’ hard labor were not unusual as punishment for such inquiries. Similar injustices among business partnerships and intimate partner relationships display similar forms of deviance and perversion.
For this reason, it makes absolutely no sense for Targeted Individuals to claim gang stalking, electronic targeted assaults, and advanced military weapons are being used against them, as American citizens, by the US government. At least that is my opinion. What is causing the phenomenon of the Targeted Individual is closely tied to intimate partner relationships, stalking by someone the individual knew or had past business dealings with. In most cases of successfully prosecuted stalking cases, the perpetrators have been someone the victim knew or had a former business or romantic relationship with. In my case, this places several individuals on the front stage in my theatrical production called “Life.” Since going to the Mercer County Prosecutors Office and reporting sexual assault, I have experienced stalking type of behavior, gang stalking, and electronic targeted assaults. But I make no claim that the federal government is doing it. The people from my past weren’t “nice people.” In fact, the twisted code of membership in gangs doesn’t make sense to anyone outside the gang. I term this twisted code of logic “mafia mentality.” In gang mentality, individuals are brutally attacked and killed because the individual didn’t follow the rules of gang membership. There is no world where those thought processes and behaviors are okay. Luce Irigaray spoke on the slippage between the murder of self and the soul in one of her feminist writing:
“Vengeance is practiced, outside of laws or rights, in the form of aggression that may or may not be preconcerted. Thus, a sort of international vendetta is set up, present more or less everywhere, which disorients the female populace, the groups and micro-societies which are in the process of being formed. Real murders take place as part of it, but also (insofar as they can be distinguished) cultural murders, murders of the mind, emotions, and intelligence.”
Gang stalking is exactly what the East German Secret Police carried out on the East German populace through their techniques of “Zersetzung” (corrosion). These techniques were employed as a form of coercive control over problem political dissidents. These same techniques are used by male batterers who tightly control their wives’ behavior because they suffer from a form of delusional paranoia. It is the same techniques that are carried out through gang stalking and electronic targeted assaults. Victims being harassed by some veiled presence become convinced it’s the US government behind it in experimental research programs pertaining to mind control projects, testing new military weapons, and/or new government eavesdropping technologies, etc.
“When victims are used as props to symbolize something for the benefit of the terrorist group, and when one of the more striking features of terrorism is that it always lays claim to virtue by claiming it is confronted with some form of terrible violence, repression, and cruelty and thereby seeks to use those same techniques to destroy an unjust system than what we see is violence masquerading as virtue and revenge impersonating “the rule of law.”
The faux pas of the 1945 peace negotiations, the Allied peace conferences that took place at Yalta and Potsdam to determine the fate of Germany’s territories, was its failure to anticipate the mass oppression and silencing of its political free thinkers. When they handed power over to the Soviet Union, granting communist occupation, what formed was a secret police force even more sinister than the former Gestapo. Engaging in “propaganda hostile to the state” was a punishable offense. To ensure that the people would become and remain submissive, East German communist leaders saturated their realm with more spies than had any other totalitarian government in recent history. The ratio for the Stasi was one secret policeman per 166 East Germans. It is estimated, when combined with regular secret civilian informers, there was at least one spy watching every 66 citizens! Add to this number the amount of part-time snoops and the result would be one spy for every 6.5 citizens. The level of paranoia is unprecedented during the modern common era. From the tapping of phone lines to regulations that required families to report overnight guests to the authorities, the Stasi knew no limits and had no shame for “protecting the party of the state.” Offices and confessional booths in churches were infested with eavesdropping devices.
Absolutely nothing was sacred to the East German Secret Police. These techniques are similar to the techniques employed in gang staling, electronic targeting (GPS tracking and spyware), electronic targeted assaults, and cyberwarfare. The Stasi infiltrated apartments, bedrooms, even bathrooms by boring holes in the wall and setting up secret surveillance cameras that recorded civilian activity. The Stasi, and those who infiltrate the private lives of individual citizens, demonstrate the sinister side of deutsche Grundlichkeit (German thoroughness). This is the clandestine side of intelligence and information gathering used to protect “the state’s” best interests.
Similar nonsense questions particular to American political affairs is, “Is the government causing Asian hatred and violence against Asians by calling China a threat?” We do not live in a totalitarian regime. We live in a democracy in which one is free to express their opinions about China’s lack of transparency, especially in investigations regarding the Coronavirus. There is a debated conflict between whether China really let us “see” the actual records on what transpired in their country in September 2020, intimations suggesting a cover-up, or whether there are a bunch of unanswered questions, and a lack of willingness on the China government to allow further World Health Organization investigations into the various farms that supplied the animals to Wuhan Market. It always comes down to two important questions, Who is telling the truth? And, Who is covering up a lie?
After the fall of the Berlin wall and the fall of the East German regime, before unification could take place, Germans would have to speak of Vergangenheitsbewdltigung (“coming to grips with the past”). Suffering from a troubled and oppressed past, meant Germans would need to arrive at forgiveness or at least find some form of redemption and this is no different for those individuals victimized by gang stalking and electronic targeted assaults. To be reunited with one’s peaceful past existence, in the life they lived before the assaults and oppression, requires a “fall” of the superior power that must take place, and one must address accountability for the crimes committed by the fallen empire. This is what the International War Crimes Tribunal in Nurnberg was assigned to address following the close of World War II. After the East German regime fell, even in the face of thousands of political trials and human rights abuses that were well documented, the German judicial authorities scrupulously avoided the appearance of waging witch-hunts or using the law as a weapon of vengeance. This lack of accountability was particularly difficult for those who suffered under East German rule. In a similar vein, the phenomenon of gang stalking and electronic targeted assaults appears accurately poised in its actions as waging vengeful witch-hunts carried out by some veiled Inquisitors from the medieval past. Arbitrarily dishing out assaults because of some absolute monarch’s requirement for totalitarian control.
One might attribute the fall of the East German regime to political and economic difficulties the country was experiencing. It had to look to West Germany for a loan just to pay its interest payments. One might call East Germany’s failure in communism its “fatal knot.” This often happens when long-term war drains a country’s resources as it did in Napoleon’s Peninsula War and the Vietnam War.
Now apply the following terms from this essay to individual history and individual psychology:
Safeguarding Human Dignity(Are the people involved interested in safeguarding human dignity?)
Totalitarian rule (Are the people involved engaging in a form of totalitarian rule?)
Retribution for making legal inquiries to the authorities(Are victims suffering retribution for rightful and legal inquires?)
Mafia mentality (Do any of the individuals involved demonstrate a form of “mafia mentality?” e.g., modes of violent aggressive narcissism)
Gang Violence (Are the tactics of discipline similar to gang stalking tactics and discipline?)
Zersetzung (Are these individuals engaging in campaigns that seek to frighten and intimidate while unnerving their victims into silent submission?)
Vergangenheitsbewdltigung (Is someone failing in “coming to grips with their past?”)
“From the beginning, the destructive impulse is turned against the object and is first expressed in phantasied oral-sadistic attacks on the mother’s breast, which soon develop into onslaughts on her body by all sadistic means. The persecutory fears arising from the infant’s oral-sadistic impulses to rob the mother’s body of its good contents, and from the anal-sadistic impulses to put this excrement into her (including the desire to enter her body in order to control her from within) are of great importance for the development of paranoia and schizophrenia (Klein, 1946, p. 2).”
In her 1946 piece, under the subtitle, “Some problems of the early ego,” Klein explains that although so far, we know little about the structure of the early ego, she is in agreement with Winnicott’s emphasis on its unintegration, that is the early ego lacks cohesion, or that it tends to alternate in its tendency toward integration with the opposite tendency toward disintegration, a “falling into bits” (Klein, 1946, p. 4). To deal with the anxiety arising from the operation of the death drive, the psyche creates an effect of fear of annihilation, which in its turn is reversed into fear of persecution. As Klein (1946, p.4) stresses, the fear of the destructive impulse attaches itself at once to an object, which is experienced as a bad, overpowering object.
In Melanie Klein’s “On Identification,” (1955) she opts for a curious illustration of processes of splitting of the ego, by analyzing the novel If I Were You, written by the French novelist Julian Green (1949). In Green’s story, a young clerk named Fabian Especel makes a pact with the Devil, which allows him to change himself into other people. Klein accompanies Fabian’s journey through other bodies, as he literally splits himself and projects himself into a new person/identity. Each of these transformations is accompanied by a new kind of disappointment and estrangement. Fabian both exits his body and remains in it.
I believe it is of great importance that Melanie Klein takes us to a work of fiction while working-through the ideas of identification, projection, and splitting. Fabian is a product of fiction, and it is this fictionality that allows him his massive projections onto others, by literally inhabiting new bodies of choice.
Here I pose the questions, “Isn’t this the articulation of actors, illusionists, and performance artists? Is this psychic splitting connected with transformations or reformulations of identity?” as well as “Is this not a staged performance based on a deceptive seduction?”
Perhaps in search of more “eventful” splitting of the ego (which would be encapsulated in Fabian’s misrecognition of his old self when he enters the bodies of others, populated by their own traces and marks; and his sense of loss in relation to the part of the self that he had left in his old body), Klein curiously lands again in the realm of splitting by the ego. Fabian’s transformations remain metaphors of splitting, and no close equivalence of his body-travels can be established with actual patients or subjects. Thus, Fabian’s journey is dreamed-up, phantomized, it is ultimately a series of “mundane” projections. Klein writes:
“The processes underlying projective identification are depicted very concretely by the author. One part of Fabian literally leaves himself and enters into his victim, an event which in both parties is accompanied by strong physical sensations. We are told that the split-off part of Fabian submerges in varying degrees in his objects and loses and memories and characteristics appertaining to the original Fabian. We should conclude, therefore (in keeping with the author’s very concrete conception of the projective process), that Fabian’s memories and other aspects of his personality are left behind in the discarded Fabian who must have retained a good deal of his ego when the split occurred. This part of Fabian, lying dormant until the split-off aspects of his personality return, represents, in my view, the component of the ego which patients unconsciously feel they have retained while other parts are projected into the external world and lost (Klein, 1955, p. 166).”
Although Klein used a work of fiction to describe psychic splitting, this is a very accurate description of when someone is taken over by electronic targeted bodily assaults, and these articulations are best described as “psychotic projections” and the splitting of an object into its “bad” part. As we already have come to find, identification is closely tied to splitting and cannot be separated from the process. The perpetrator, by failing to identify with the victim, thereby casts down the victim by taking him or her over with electronic targeted bodily assaults (physical violence) much like Fabian did to his victims in the novel If I Were You and where strong physical sensations were accompanied by the various assaults. However, unlike Fabian, it is the victim that loses his or her original characteristics pertaining to their original identity, and it is through these electronic attacks that identity is reconfigured, transformed, or reformulated to the likings of the perpetrator, in at least, in how I have experienced electronic targeted bodily assaults. The person undergoes a change in direct response to the long-term physical abuse.
In choosing the novel If I Were You, Klein stimulates provocative questions regarding being inhabited by another through these electronic targeted assaults and that is, “Can any of us truly be said to exist as individuals, or are we rather the recipients of a script dictated to us, which we are generally too idle or cowed to question?” In this light, we can come to an explanation regarding the phenomenon of Targeted Individuals suffering electronic targeted bodily assaults and mind control. To get these individuals to question their reality and their existence in it, by forcing them to be subjected to these long-term physical electronic assaults seems to serve the perpetrators purpose. They are force-feed a script by some unknown perpetrator who is not interested in their long-term well-being. Are these people just “easy targets” because they are too cowed to ask questions? I think these are important questions to be answered because as a mind-control experiment, electronic targeted assaults would affirmatively satisfy the following questions, “Can we change personality and behavior?” To which the answer would be an affirmative, Yes, we can!
Soreanu, Recula. (2018). The Psychic Life of Fragments: Splitting from Ferenczi to Klein. The American Journal of Psychoanalysis, 78(4), 421–444.
Klein, M. (1946). Notes on some schizoid mechanisms. In The writings of Melanie Klein, vol. 3 Envy and Gratitude and other works 1946–1963. (pp. 1–24). London: Hogarth Press. 1975.
Klein, M. (1955). On identification. In The writings of Melanie Klein, vol. 3, Envy and Gratitude and other works 1946–1963. (pp. 141–175). London: Hogarth Press. 1975.
Distal Effects — A proximate cause is an event that is closest to, or immediately responsible for causing, some observed result. This exists in contrast to a higher-level ultimate cause (or distal cause) which is usually thought of as the “real” reason something occurred.
In most crimes, we work backward from the outcome to those responsible. Money is missing from the till, and we look for the thief. Control often is literally hidden “behind closed doors.” In addition, as emphasized, coercive control as it pertains to domestic violence can also be difficult to detect because its means and effects merge with behaviors widely associated with women’s and children’s devalued status in personal life — being deferential, thrifty, thin, and unnoticed. Also, coercive control’s means and effects can merge with behaviors of the dominant cultural environment, giving meaning to “class.” For example, just like being too thrifty or thin is associated with some lower-class women’s behaviors, so too can being overweight, unemployed, sedentary, and dependent. These traits can be associated with “genetic inheritance” but they can also be the by-product of clandestine, invisible abuses that go unnoticed in the public eye.
The use of electromagnetic frequency against a subject/victim, a target for grooming behavior, can be very difficult to detect and uncover as well. First, electromagnetic frequency waves are invisible. Second, the onset of agitation or lethargy in a subject/victim may be observed but the reason for its occurrence misdiagnosed and attributed to something else entirely thereby allowing the unseen root cause to continue in the environment of the subject/victim. This obstruction, this ambiguity in the viewing details by those witnessing behaviors, can and will completely obliterate any truth to the proximate cause and effect thereby thwarting uncovering the real reason and meaning behind the abuse and render any meaning given to its proximate cause or distal effect invalid.
The strategic analysis assumes that our behavioral repertoires in these and other nontrivial facets of everyday life are relatively consistent, have identifiable temporal and spatial dimensions, and are unintelligible apart from the matrix of power in which they arise, the norms to which they respond, the relative benefits and sanctions they elicit in specific social and historical contexts, and the general consequences they effect. The proximate means and motives by which these strategies are implemented are a function of individual personalities, preferences, and situational variables as well as of their perceived efficacy, and the tactics selected tend to be spatially diffuse and highly individualized. Moreover, the pattern that makes these behaviors strategic is recognizable largely in retrospect. What marks behaviors as strategic is their collective reality, aggregate consequence, and the extent to which the link that joins this reality to its consequences is mediated by structural dimensions of the economy, polity, and civil life.
The subset of collective behaviors that encompasses how men and women constitute themselves as such, how they “do masculinity” and how they “do femininity” in a particular epoch at the range of sites where gender takes on its social meaning, including school, work, family, and intimate relationships. The substantive benefits/losses persons derive or experience from enacting these gender strategies constitute their “materiality.”
Thus, the “materiality of coercive control” refers to the tangible and symbolic visible results that men take advantage of, and to which are accrued from dominating and exploiting, not just their female partners, but those they come to gain power and control over. The substantive deprivations women and children suffer can be observed, but difficult to clearly define. Similar to the invisible electronic targeted assaults now happening to various individuals within the United States, this “materiality” can be defined as the benefits and losses that constitute what feminists have historically defined as the gender politic of a dominant male patriarchy. When the dominant gender enacts power over the subordinates, seldom does anyone consider electromagnetic frequency torture. This can mark the silencing imposed on individuality and the silencing of their sexuality as a part of their personhood and an ambiguous by-product of depravations inflicted as the result of this “materiality” in a dominant male politic.In the concept of materiality, its convention within the aspect of “auditing” within accounting practice relates to the importance or significance of an amount, the validity of a transaction, or discrepancy thereof. The objective of a financial audit is to enable the auditor to express an opinion as to whether or not the financial statements were prepared, in all material respects, to the conformity of a financial reporting framework such as in Generally Accepted Accounting Principles (GAAP).
“What marks control is not who decides, but who decides who will decide; who decides what, whether, and how delegated decisions are monitored; and the consequences of making ‘mistakes.’”
Evan Stark, Coercive Control
Similarly, the use of electromagnetic frequency signals to arbitrarily stimulate or sedate the human mind or attack the body of victims seek to perform a similar audit, albeit an audit related to behavior or forced acceptance of another person’s opinion and/or domain.
Men set out to realize their individual purpose in the world, most do not seek out to become controllers. Establishing mastery over another independent adult in personal life is complex and difficult work for which there are no guide books, not even for “dummies.” If it is recognized at all, the fact of domination in personal life is usually perceived only indirectly through signs of assertion, command, dependence, and subordination within relationships. We see a controlling or a demanding husband or relative or servile or timid wife, but not the lines of power that join the power of control to its command. These are subtle elements that have contributed to invisible empires, invisible empires that have flourished throughout history in terrorizing fashion over minority groups. The Free Masons and the Ku Klux Klan are just two clubs that conducted their activities in secret and these invisible secret societies have gone on to re-organize and re-shape the social order.
“The domestic violence field faces a similar predicament when it tries to account for how battered women behave without identifying their “cage” …. the cage remains invisible as long as we omit the strategic intelligence that complements these acts with structural constraints and organizes them into the patterns of oppression that give them political meaning.”(1) pg. 198
I would like to open my discussion today about the coercive control of men over female bodies. But this is not just about women, although it is men who primarily victimize women, this is about clandestine technological victimization of people through implants that work on wireless radio waves signals. I would like to integrate into this discussion of coercion the use of advanced technologies that have been developed for mastery and control over the human body and to note the element of boundary violations in man’s attempts to master and control a subject. Men, for centuries, have tried to conquer and manage their death in terms of its prevention, curing, and thwarting progressive symptoms of disease. Some of these new technologies developed in modern medicine run off of radio frequency signals. The same strategies that doctors use to prevent, cure, and stymie progressive disease symptoms are the same types of strategies abusive men use over their partners in response to thwarting the dreaded death drive in support of the life drive. The death drive is one of the three fundamental drives Sigmund Freud hypothesized about which include also the sex drive. These drives in the human psyche can create unconscious repetitive behaviors that become maladaptive to everyday living. The roots of these unconscious behaviors are cloaked in delusions, fantasies, and myths. It is these maladaptive repetitive behaviors that do not serve us well when it comes to our intimate partner relationships and can be very one-sided in that they do not consider the other person as a speaking subject in her own right, with her own wishes, and own autonomy. I use the pronoun “she” but it could just as well be “he” as we are a gender-fluid and presumably inclusive society and perversions rooted in the primal scene are part of a growing social diversity. It totally forecloses upon the subject’s position in the argument and completely closes down any discussion that may produce fruitful negotiations where both parties may benefit.
“To identify an active, aggressive woman with Truth is to defy a very long tradition that identifies strong females with deception and virtuous females, including muses, with gentle inactivity.” ~Alicia Ostriker, “The Thieves of Language: Women Poets and Revisionist Mythmaking.”
Coercive control over women is seen in the personalities of abusive men over their wives, intimate partners, and children. It can also be observed in women, in their everyday interaction with co-workers, friends, business associates. It has been seen in police interrogations, political leadership, religious leadership, as well in the everyday interactions with abusive individuals who must maintain control and dominance at all costs in order to prevent annihilation from the death drive. The scope of this discussion will focus on the coercive control of advanced technology over human beings in domestic battery and domestic violence situations. One of the aspects of coercion in intimate partner relationships is known as microsurveillance. Microsurveillance is described as:
“….to detect disobedience or disloyalty, they may survey the minute facets of a woman’s everyday conduct in ways that are inseparable from the microregulation unique to coercive control, targeting not merely where they go, but how fast they drive, or how much money they spend, entering everyday routines in ways that obliterate autonomy. This type of surveillance injects fear even into such perfunctory choices as whom they ask for directions or which route they take home as well as when they arrive, until choice itself becomes frightening. Intimate surveillance extends from going through drawers, pocketbooks, diaries, or closets to monitoring time, phone calls, bank accounts, checkbooks, and stealing identity, using global positioning devices (cyber-stalking), or installing video cameras to track or monitor a partner’s movement. Surveillance is almost universal in abusive relationships. Eight-five percent of the women in the Tolman study and over 90% of the English women reported that their abusive partner monitored their time, for instance. Particularly in combination with microregulation, microsurveillance gives coercive control an intensiveness found in no other form of oppression.” (1)
Surveillance makes intimidation portable. It is at this place in my discussion that I would like to reflect on my previous post about the military’s transition in new technological innovations. Our US government has a direct interest in advanced project research. In fact, the Defense Advanced Research Project Agency (DARPA) supports universities, large companies, and small companies in their research, if their research will produce beneficial technologies that our military can monopolize upon. DARPA is working to develop and promote artificial intelligence (AI) for its beneficial uses and Google has signed on with DARPA in some advanced research projects. (2)(3) If you think about our smartphones, they run on Android systems. Part of Android systems is something call Google Play Services. Google Play Services grants permissions to Android Systems in accessing Body Sensors, Calendar, Camera, Contacts, Microphone, Phone, SMS (text messages), and Storage. Understanding that Body Sensors are sensors that are worn outside the body to monitor internal biological rhythms like heart rate, pulse, (Fitbit) even blood sugar (continuous glucose monitoring), the questions become, “Could Google be working with the military on biological implanted sensors that can be remotely accessed using an Android phone? Or has some rouge computer scientist discovered a way to clandestinely imbed software into a phone via the Google Play Store and access these implants in unsuspecting citizens?” Since devices can not only be worn outside the body, they can also be implanted inside the body, it is very reasonable to think that new technologies associated with implanted devices in experimental medicine (e.g., sensors) as well as other types of implants that could be used to access a person’s body remotely via Android systems through Google Play Services. It’s interesting to note that sensor diagnostics are used in modern-day automobiles with navigational “On-Star” systems linked to satellites. How these two might potentially be connected raises an interesting question; can this technology provide the very real possibility of giving a rouge agent access to another’s body and motor vehicle through remote monitoring. These new projects could also touch upon aspects of mind control and coercion of a human subject through remote clandestine rouge operations as well as eves dropping aspects that can be used to monitor behavior. Eves dropping issues have been reported in some published news reports as a potential problem with the android technology known as Alexa as well as new Smartphones and laptops that can “talk” and “listen” to our voices. This is the scenario I have theorized regarding my own personal victimization with what many individuals have described as targeting, mind control, and gang stalking. In a court of law, or as an adversarial argument to its detrimental possibilities this is purely speculation and is insightful in knowing how new advancing technologies may be moving individuals into an uncertain future with regard to privacy, safety, and protection of our 4th amendment rights.
The type of microsurveillance I have encountered and endured attempts to microregulate my behavior according to my perpetrator’s wishes and desires. This is accomplished by inducing electromagnetic fields that make a subject feel ill. When the individual performs the desired action, the electric current is turned off and the subject receives relief from the torture of the electromagnetic field. The period of relief does not last long and the cycle of control and dominance continues as the other person maintains absolute reign through surveillance over the subject by monitoring their activity. So, for example, the perpetrator may want me to stop using my computer. This could be accomplished in a few different ways. One, outfitted with tracking technology, my computer can be remotely accessed and located through a location finder. It can be either shut down, or they can make my online experience unpleasant and difficult for me by slowing down my computer system when they notice computer activity. GPS type tracking can be installed in my laptop computer, software that can activate an alert system, thereby alerting my perpetrators to my online or offline activity. Working with a slow computer system makes accomplishing a task very difficult and wastes precious time. Sensors implanted in the body can be activated wirelessly through a similar alert system and turn on or off via an electromagnetic field (radio frequency). So when I sit down in front of my computer laptop and turn it on the software alerts a third-party viewer. This is also done over my cell phone too with a type of Google tracking I previously described when Google Play Services interacts with Android Systems. I have noticed a decrease in electronic targeting if I do not sign in to my Google Gmail or connect my cell phone to Google Play Services. Also, when new “updates” occur over my cellphone when it is connected to Google Play Services, updates that allow me the use of even more features, immediately I have been located, my device finder turned on through the Google update and electronic targeting starts all over again. In addition, jamming devices might be used to intervene in computer operations and jam cell phone transmission. As far as targeting goes inside my house, this has also been accomplished. If the perpetrator wants you to physically move from one room to the next, and I believe this might be part of some type of gang stalking device, where the perpetrator has installed sensors or monitors that pick-up on movement. The electromagnetic field will be turned on, which in turn may force the subject to move away from its original position, say the living room to the basement. The signal fades or is either turned off as the subject changes location and moves farther away from the source. I have had this technology turned on when attempting to cut my grass and maintain an orderly lawn. I have had it turned on during crucially needed exercise sessions (I’m a diabetic) in the privacy of my own home which exercise is beneficial behavior aimed at maintaining wellness and good health. I have had it turned on when attempting to detail an account of my own abuses, thereby impeding cognition and scattering my thoughts. I have it turned on when I try to create new blog post articles about abnormal psychology and perverse deviant behaviors and unfair practices in medicine.
The direct consequences of microsurveillance can be dramatic. If a victim fails to accommodate her abuser’s “house rules” they may be made to endure an evening of cursing and screaming, or she may be denied privileges like visits with friends and/or the use of the car. This tight scrutiny turns some abused women into recluses as one of the aims of a batterer is alienation. In my personal experience, I have been made to endure long bouts of torture throughout the day and night, making everyday living difficult. I blame this technology for the onset of my weight gain. One of the obvious dramatic results of abuse may be seen in the physical appearance of the victim. The victim may physically appear uncared for, may have gained weight, and look disheveled, may have bruises, scars, or burns. Whereas before she became a victim of abuse, she maintained her weight and appearance well. This could also be a direct result of the technology being turned directly against her at night while she sleeps, waking her up and disrupting her sleep pattern or it is turned on during daily routines making it difficult for her to make accomplishments and create goals. The common symbolic theme is a theme of “disruption, disruption, disruption” in the production of invisible chaos. These “disruptions” have their origins with the onset of low-level frequency vibrations I receive to my lower body while sleeping and to which I have been awoken during my sleep repeatedly at night. These attacks have also turned on frequency in my head, which has caused me to feel discomfort. These attacks against the female body are routed in primal scene fantasy and can not only be explained through psychoanalysis but can also be explained through the philosophy of silence. Plato’s cave metaphor explains the philosophy of silence in which he disfigures the maternal body with his cave metaphor, rendering the fecund woman as an “oppressive place men seek escape” thereby denying the female body a voice within the domain of philosophy.
“Noelle Neumann suggested that silencing minorities usually happens by using social innuendos and non-verbal cues about the “right” opinion, her work does not rule out the possibility that some times social pressure may take a more active form with people supporting or even taking action to silence voices of disagreement.”(4) Neumann(p. 82) noted Rousseau wrote about a special tribunal, “the Censor,” that never existed, but that censorship is an important element in public opinion that preserves manners and morals by preventing opinions from growing corrupt and by hindering the dissemination of corrupted ideas (Rousseau, 153, pp. 140–141). (5) (6)
We might analyze the actions of the angry mob that stormed the White House and the violence that ensued after a Trump rally. The actions taken by US citizens that utilized violent aggression as a means to settle a perceived dispute suffered by the mobsters demonstrate how the “silencing” of corrupted ideas has been handled by the federal government. Destruction of property, violating personal boundaries through physical assault, and breaking and entering a protected federal complex while proclaiming threats to kill and harm innocent people is not how civilized people handle disputes. It is how people without a sound logical argument settle a dispute through the use of violence because they are lacking in the capacity to formulate a sound and rational argument based on a philosophical debate. Its method is quick and easy versus long and arduous.
I propose the rouge clandestine attacks of US citizens through gang stalking and targeting violence and the use of electronic assaults are part of the same subculture that stormed the White House. The silencing of groups and their unfavorable opinions can be observed in many cultures and under various conditions. During the civil rights movement, many whites wanted to silence every Negro who had the courage to stand up and fight for their rights. In the modern history of war, we witnessed the German Holocaust, the genocide of Serbs by the Ustashe, the genocide of the Bosniaks and Croats by the Chetniks, Bangladesh genocide, East Timor genocide, the Cambodian genocide, Guatemalan genocide, Anfal genocide, Rwandan genocide, Bosnian genocide, and the list goes on.
The racial tensions in America have not changed with yet more killings of young black people amidst the backdrop of COVID Lockdown. What we are witnessing in the phenomenon of the electronically targeted individual and the targeted individual suffering gang stalking is no different, albeit may not be based on racial or ethnic differences, but rather just conflict itself. In studying criminology, I learned sociologists have analyzed inner-city populations to understand how values and norms contribute to violence and the manifestation of violent subcultures. I propose there is an organized subculture that is clandestine (invisible like the mafia and the KKK) that utilizes violence as means to settle individual disputes or perceived wrongdoing through clandestine attacks. This subculture that utilizes violence is also utilizing advancing technology to do so and possesses a “mafia mentality” in the use of their ideological motivated violence.
There is an obvious element of sadistic pleasure a perpetrator derives in the degradation of punishing and abusing their victims:
“Controlling men establish their moral superiority by degrading and denying self-respect to their partners, a violation of what Drucilla Cornell calls “the degradation prohibition.”(7) According to philosopher John Rawls, self-respect is a “primary good” without which “nothing may seem worth doing, or if some things have value for us, we lack the will to strive for them. All desire and activity become empty and vain, and we sink into apathy and cynicism.”(8) (1)
A person who is being abused may report feeling “dead inside”, and this sentiment illustrates how important self-respect is to the personhood of an individual.
“Emotional abuse is particularly harmful in the context of a primary dependence, as when a parent degrades a child, when survival depends on approval, alternative sources of support are unavailable, and when the object of degradation is deeply invested in how the other feels about them (as well as in their judgment) and is unable to muster positive self-talk or other forms of resiliency to counter negative messages. The adult victim of coercive control is in no sense childlike. But the tactics used in coercive control can so disable a woman’s capacity to affirm her femininity that she mimics a childlike dependence on approval that significantly amplifies the effect of insults.”(1)
At this point in the discussion, I would like to detail the name-calling I have endured. Words like “whore” and “stupid,” along with malignant narcissist phrases like, “Look at her. She can’t do nothing about it.” Using the term “it” as a reference to the stalking, gang stalking, surveillance, microsurveillance, and electronic torture I have endured. The phrase, “You were nothing but his whore!” Are all testaments to voices that possess victim blaming mentalities that persist in mainstream thinking today. Ideologies that have monopolized on the victims’ past sexual histories that seek to place responsibility on to victims and allow sexual perpetrators to elude responsibility for any wrongdoing and to which has had a history in state law. This mentality has served mainstream patriarchy and has allowed for the continuation of brutal sexual assaults and promoted femicide. In the history of law, early childhood physical and sexual abuse, in the case histories of sexual assault victims, was permissible evidence at trial. They were known as “promiscuity laws,” and these laws prevented the victim of sexual assault any rights to prosecute the perpetrator if her past history revealed she suffered physical and sexual abuse in childhood. Phrases like, “She deserved to be beaten,” and “She deserves to be raped,” reveal the myth-making mentality that physical assault and rape are viable solutions, perhaps even “therapeutic solution” to unwise action, outspoken voice, or choice on the part of the female victim, or even perhaps the solution as a cure to her “deviant mental illness.”(9) (10)
Insults and put-downs are effective in coercive control because they play off complementary forms of deprivation, intimidation, and control that disable a victim’s capacity to respond and stand up for herself. It also facilitates the creation of self-doubt, as the victim questions her own perceptions and abilities. Targeting areas of female gender identity where the partner’s self-confidence may already be poor, the use of coercive control as a tactic for disabling a woman’s capacity to affirm her femininity utilizes forms of violence to establish the superiority of the abuser. As a result of the abuse, she may become alienated and withdrawn. Compromised by such forms of violence, the victim may feel helpless and without the necessary power to overcome such abuses.(1)
Shaming is another tool in the toolbox of abusive men and male batterers. “In shaming, perpetrators of coercive control demonstrate a victim’s subservience through marking or the enforcement of a behavior or ritual that is either intrinsically humiliating or is contrary to her nature, morality, or best judgment. In a perverse inversion of the 1950s high school practice in which girls proudly wore rings or letter jackets to signify their “trophy boyfriends,” abusive men have forced women in [reported] caseloads to bear tattoos, bites, burns, and similar marks of ownership visible to others.
Markings signify that a man has a personal interest in this woman that he will defend. But it also signifies she is vulnerable to exploitation or further abuse by others. Because of its link to ownership, marking often becomes a source of self-loathing and can prompt suicide attempts. Although there is no study evidence on this practice, it is so common that the National Coalition Against Domestic Violence (NCADV) and the American Academy of Facial, Plastic, and Reconstructive Surgery have developed a jointly run free program for removing tattoos and other scars inflicted on battered women and their children by abusers.” (1)
It is important to link the importance of body weight and physical appearance in the “marking” of a female in ownership by abusive men. Weight gain and diminished physical appearance are a by-product of not only the microregulation and microsurveillance, but also of degradation, and shaming of the victim. Bodily disfigurement furthers erodes a woman’s self-confidence and confuses her autonomy and self-identity with aspects the batterer imposes on her. In the case of the triumphant haircutter, Louise Kaplan describes a relationship between husband and wife, in her book Female Perversions, in which a wife was forced to endure her husband sexualized ritual of clipping a portion of her long golden locks during the act of sexual intercourse. Her punishment to wear a hairstyle that looked like a really bad haircut was the product of her husband’s unconscious fantasies rooted in his primal scene experience with his alcoholic mother and his fantasy involving female degradation. (11)
“The victim of coercive control is isolated from the moorings of her identity and, because identity is first and foremost a social construction, from her own unique personhood.” (1)
“Shaming also involves ritual enactments associated with sex, or basic bodily functions, such as eating, showering, dressing, sleeping, or using the toilet. Clients in my practice have been made to sleep standing up, wear their “bad” clothes for days without changing, eat without utensils, shower repeatedly or in cold water, denied toilet paper, and forced to use the bathroom with the door open, locks removed, or with a timer.”(1)
“Burt (1980) defines rape myths as “prejudicial, stereotyped, or false beliefs about rape, rape victims, and rapists” (p. 217). According to Lonsway and Fizgerald (1994) these beliefs are “widely and persistently held” and generally “serve to deny and justify male aggression against women” (p. 133). Because of the pervasiveness of these beliefs, some scholars and feminists use the term “rape culture” to describe the presence of rape myths in media and public discourse, as well as the general acceptance of these myths in general society (Whisnant 2009).”(10)
There is a believed myth rooted in fear when it comes to female sexuality, a myth that perpetuates a language of silence cross-culturally for women.
“It is obvious in clinical work that women’s silence is deeply influenced by their interactions with their mothers, as well as by the more familiar silencing by men of their wives and daughters that have been identified as manifestations of a heliocentric society……the historian Merry Weisner-Hanks draws a connection between silence and virtue in women: ‘Because Eve tempted Adam by using words, women’s speech becomes linked with sin and disobedience, and female silence is thus interpreted as a divine command.’ She goes on to say that, “Italian, English, and German, Protestant, Jewish and Catholic men all agreed that the ideal woman was……’ chaste, silent and obedient.’”(12)
The ideology that a woman, or any person for that matter, is required to be arbitrarily controlled through remote advanced technology, completely foreclosing on the subject’s voice as a speaking subject, in his or her own right, and the right to her own statements regarding her Truth in the matter. This is a violation of civil rights law which guarantees freedom and liberty in the pursuit of happiness set to one’s own autonomy. I used to wonder quietly to myself, “Why do some men and women fear women’s sexuality to the degree they are willing to kill?” Some unconscious reasons have directly to do with the female’s power to give life and become “the creator god,” or in aspects rooted in the fear of her power as the taker of life in sentencing one to death through literal and metaphorical withholding of the breast and the denying of mother’s vital nourishment and love. This fear is tangled-up in the human psyche’s experience of Oedipus, with the castrating defeat of the little boy by his father during early childhood development. It is also associated with the fear of being replaced in lateral sibling relations by the arrival of a new offspring. (13)(14)(15) But whatever the reason, female procreative power is feared by both men and women alike.
“Childbirth is woman’s talisman, manifest and indisputable evidence of female power. The ability to create new life is the earliest and most profound source of power, and we all, men and women, fear it.”(16)
Will we ever understand envy and jealousy in terms of female procreative power? Can we understand vehement hatred and psychotic foreclosure in the radical violent silencing of women as speaking subjects? It is only through delving into psychoanalytic literature and research, case studies, feminist writings, and queer writings that help to reveal the origins of this foreclosure and its possible psychotic nature in its foreclosure against the mother, and the father as well; how fetishized behaviors are formed, and aspects of sexual orientation established. (17)
(1) Stark, Evan. (2007) “Coercive Control: The entrapment of women in personal life.” New York. Oxford University Press. pg. 229–288. Chapter 8, The Technology of Coercive Control
(2) Jill Aitoro. “DARPA’s director on how the Pentagon can transition innovation.” IT and Networks. C4ISRNET. http://www.c4isrnet.com (April 17, 2019).
(4) Neumann, E. (1984). The spiral of silence: Public opinion — Our social skin. Chicago. University of Chicago Press.
(5) Rousseau, J.J. (1953). The Social Contract. In F. Watkins (Ed. and Trans.) Political writings. London. Nelson.
(6) Tsfati, Yariv and Dvir-Gvirsman, Shira. (2018). Silencing Fellow Citizens: Conceptualization, Measurement, and Validation of a Scale for Measuring the Belief in the Importance of Actively Silencing Others. International Journal of Public Opinion Research, 30(3), 391–419.
(7) Cornell, Drucilla. “The Imaginary Domain.” New York. Routledge. (1995) pp-8–10
(8) Rawls is quoted in Cornell, “The Imaginary Domain,” p. 9
(10) Anna E. Kosloski, Bridget K. Diamond-Welch, and Olivia Mann. “The Presence of Rape Myths in the Virtual World: A qualitative textual analysis of the Steubenville sexual assault case.” Violence and Gender. Vol. 5, №3. (October 5, 2018).
(11) Kaplan, Louise J. (1991). Female Perversions: The Temptations of Emma Bovary. New York. Doubleday pgs. 145–154, Chapter 2, Perverse Scenarios, The Case of Mr. R.: The Triumphant Hair Cutter.
(12) Balsam, Rosemary. “Women’s Bodies In Psychoanalysis.” East Essex Canada. Routledge. (2012).
(13) Freud, Sigmund. (1924). The dissolution of the Oedipus Complex. Standard Edition. Volume 19. London: Hogarth Press.
(14) Chasseguet-Smirgel, Janine. (1984) Creativity and Perversion. London. Free Association Books, pgs. 35–43. Chapter 4, A Re-reading of Little Hans.
(15) Mitchell, Juliet. “Mad Men and Medusas: Reclaiming hysteria.” New York. Basic Books. (2000).
(16) Holmes, Lucy. “Wrestling with Destiny: The promise of psychoanalysis.” New York. Routledge. (2013). The chapter on The Medicalization of Childbirth.
The comparison to be made here with this last cited reference should be between electronic stimulation used by the US military and the use of the electromagnetic spectrum in electronic warfare and the use of electronic stimulation in sexual perversion involved in BDSM sex and sexual role-play and observed in acts of bondage and discipline. This connection cannot and should not be ignored as both are rooted in primal scene fantasy (War). Modern advancing technologies current and experimental capabilities against the backdrop of a nation in conflict with itself regarding gender, racial, ethnic, religious, and political differences and how those connections may very well contribute to the phenomenon we now know as the Targeted Individuals (TIs) and electronically Targeted Individual (eTIs).
Other source worthy to consider but not quoted from:
Anderson, Elijah. (1999). The Code of the Streets: Decency, Violence and the Moral Life of the Inner City. New York: WW Norton.
Ball-Rokeach, Sandra J. (1973). Values and violence: A test of the subculture of violence thesis. American Sociological Review, 38(6), 736−749.
Berburg, Jon Gunnar and T. Thorlindsson. (2005). Violent values, conduct norms and youth aggression: A multilevel study in Iceland. The Sociological Quarterly, 46, 457−478.
Brezina, Timothy. (2004). A quantitative assessment of Elijah Anderson’s subculture of violence thesis and its contributions to youth violence research. Youth, Violence and Juvenile Justice, 2(4), 303−328.
Erlanger, Howard S. (1974). The empirical status of the subculture of violence thesis. Social Problems, 22(2), 280−292.
Felson, Richard, A.E. Liska, S.J. South and T.L. McNulty. (1994). The subculture of violence and delinquency: Individual vs. school context effects. Social Forces, 73(1), 155−173.
Hayes, Timothy C. and Mattew R. Lee. (2005). The Southern culture of honor and violent attitudes. Sociological Spectrum, 25, 593−617.
Nisbett, R.E. and D. Cohen. (1996). Culture of Honor: The Psychology of Violence in the South. Boulder, CO: Westview Press.
Ousey, Graham C. and Pamela Wilcox. (2005). Subcultural values and violent delinquency: A multilevel analysis in middle schools. Youth Violence and Juvenile Justice, 3, 3−22.
Sampson, Robert and William Julius Wilson. (1995). Toward a theory of race, Crime and urban inequality. In John Hagan and Ruther Peterson (Eds.), Crime and Inequality (pp. 37−54). Stanford: Stanford University Press.
Smith, Michael. (1979). Hockey violence: A test of the violent subculture hypothesis. Social Problems, 27(2), 235−247.
Stewart, Eric and Ronald Simons. (2006). Structure and culture in African American adolescent violence: A partial test of the “code of the street” Thesis. Justice Quarterly, 23(1), 1−33.
Surratt, Hilary L., James A Inciardi, Steven P. Kurtz and Marion C. Kiley. (2004). Sex work and drug use in a subculture of violence. Crime and Delinquency, 50(1), 43−59.
Washington, Earl M. (1996). A survey of the literature on the theories of violence and its prevention. Journal of Negro Education, 65(4), 403−07.
Wolfgang, Marvin and Franco Ferracuti. (1967). The Subculture of Violence. London: Tavistock.
The most intense electronic targeting began after I was involved in a hit and run accident while driving under the influence of alcohol and opiates. This event may have rendered me a target (a test subject) by researchers at the hospital I was sent to. A local hospital is known for its advances in treating brain trauma, and the trauma of war can cause brain damage in the form of mental illnesses like PTSD. Are these rogue attacks the result of state interest surrounding in “curing” me of my “disease?”The proclivity of the human race, especially in a police surveillance state, tends to ascribe negative traits to individuals who possess individual differences and has always been an obstacle in achieving peaceful human relationships. Another aspect to this targeting was an intimate relationship I had with a close friend of mine that wasn’t sexual in any way but rather turned rouge friendship. I, my close friend, and her husband were all using drugs and alcohol, and when her husband turned on me and forced sex, which ended in sexual assault, my friendship dissolved. This may have been the point of inception for my targeting, but this would make my targeted experience a criminal conspiracy, not by the federal government, but by the people who were involved in the drug deal and sexual assault, as I believe there exists more than just one lone operator. They may call me “narc” but it’s not because I’m a narcissist. In fact, the person who raped me is far more likely to be part of the paranoid-schizoid personality constellation.
When I describe these events, it makes me feel shameful, and I suspect this is the reason why people ascribe their targeting to rogue government conspiracies involving mind control, or NSA and CIA service security surveillance utilizing advanced technology that can “read minds” and transmit auditory voices into human skulls. It’s easier to ascribe this occurrence to government intrusion, and clandestine secret military operations because it allows the targeted individual to elude the responsibility that, they themselves, may have acquired a psychopathic personality within their orbit because of their past behavior, and these personalities are interested in destroying them because of psychic arousal for primal scene fantasies. My own shady past association may be the reason for my targeting. Targeted individuals may be having difficulty facing their truth which is, they themselves are/were abusing substances and/or the people responsible for abusing them are people who have always been part of their friendships and family arrangements. It’s simply this, that the psychopathic personality didn’t reveal his true identity to them until he had their victim exactly where they wanted their victim. That is, in a powerless and subjugated position. This is what psychopaths do. They wait, patiently, until the time is ripe for the yielding. Still, this does not give the perpetrator the right to get away with the harm they are inflicting on society.
I have not used illicit chemical substances since October 3, 2006. I no longer associate with my former “close friends” and have made the necessary adjustments to my lifestyle choices. However, this did not stop a psychopath from stalking me online and hacking a variety of my on-line accounts like Facebook, my e-mail server, and my WordPress blog. It didn’t stop them from inflicting pain and suffering into my world, utilizing electronic stimulation, attempting to stimulate and sedate me through clandestine, rogue orchestrations utilizing a wirelessly controlled implantable device like some type of sex toy that delivers stimulation to my genitals and anal regions and sedation through a neural radio frequency link. Nor did it stop them from targeting me both outside and inside of my residence during necessary activities like cutting the grass, aerobics and weight lifting (workouts beneficial for health), and cleaning my home.
Although I refuse to believe that this phenomenon is part of some clandestine secret military operations utilizing some form of abbreviated code name, I can’t deny my past history. But this past history shouldn’t be used like former “promiscuity laws” were used to exonerate men accused of acts involving brutal forms of rape because of “the victim’s past history with physical and/or sexual abuse in childhood.” This history isn’t meant to be used as an excuse to give some deranged lunatic a “defense” to continue his behavior and illude the responsibility he owes to the federal and state government and to the victims themselves!