10 Cyber Crimes Used Against Women: Making a comparison to wireless electronic assault torture

Karen Barna
13 min readMar 27, 2024

Technology is making cyber crime against women more common place and causing significant problems for society and the worldwide economy. I want to briefly list them here and then briefly discuss how the phenomenon of Electronic Harassment and wireless electronic assault torture can be analyzed as a form of cyber crime. Since I am a female, I discuss my own form of female victimization and make note of the “female victim.” However, there is no need to think this experience is different for men. I am not a man, so I cannot say if it is the same or different. Also, some statistics indicate that more women suffer wireless electronic harassment then men. The top ten (10) cyber crimes perpetrated against women are:

Cyber Grooming — This is when an online predator befriends a female victim, wins over their trust and then take advantage of that trust.

Cyber Hacking — Cyber criminals usually target women, manipulating them to gain unauthorized access to their personal and sensitive information such as financial details, address, and private conversations.

Cyber Blackmail — cyber criminals surreptitiously seek sensitive information against a female victim and then threatens them with exposure to humiliate and shame if they the cyber criminals demands aren’t meet.

Cyber Pornography — Cyber criminals gain access to intimate images, videos, and stories without the actual consent of the female victim. This is a form of cyber exploitation that mostly happens with women.

Cyber Stalking — Cyber stalking involves keeping an eye on an individual’s social media accounts and their activities. This may impersonate online identity in order to harm reputation or relationships with your loved ones. Cyber stalking can be converted into hacking to gain access to the accounts after manipulating them to reveal their passwords.

Cyber Bullying — When a female victim is threatened, harassed, humiliated, embarrassed or otherwise targeted by another person using the Internet using interactive digital technologies or mobile phones is referred to as “Cyber-bullying.”

Cyber Defamation — Cyber-defamation is a serious problem for many women who often need support from mental health professionals. It happens when untrue and harmful things are said about them on the internet. This can make life difficult because it harms their reputation often leaving them with emotional damage.

Cyber Morphing — Cyber-morphing is altering or changing the pictures of the person into someone else using morphing tools available online. Women often suffer with emotional distress due to cyber-morphing as altering and misuse of their images are done without their consent. This can lead to severe reputational damage.

Hijacking and Impersonation — Women are often victims of online hijacking and impersonation where attackers take control of their social media and online accounts or create fake profiles. This can lead to the spread of false information damaging the victim’s reputation and can also be used for blackmailing.

DeepFakes — Deep fakes manipulate facial appearance through deep generative methods. Deep-Fakes leverage powerful techniques from machine learning and artificial intelligence to manipulate or generate visual and audio content that can more easily trick users. Women are more vulnerable to DeepFakes technology which can be used to fake content that appears genuine leading to reputational harm.

Comparison of the 10 Types of Cyber Crime to Wireless Electronic Assault Torture Known as Electronic Harassment

The physical and psychological sequelae of wireless electronic assault torture, also called Electronic Harassment as I have experienced them, share similar side effects to the shaming and reputational damage female victims of cyber crime endure. (Abbreviations: EA = Electronic Assault, EH = Electronic Harassment)

Wireless EA Grooming — One aspect of Wireless Electronic Assault Torture (EA’s) also called Electronic Harassment (EH) is its ability to induce states of sedation as well as states of alert wakefulness done through wireless EA stimulation. The brain works on two signals: one is chemical and the second is electrical. In analyzing my own experiences with these EA’s I have concluded one of the reasons it is being used on people is to change mood, perspective, personal choice, and even personality. This is done to exert control and domination over the individual. This satisfies the perpetrator’s lurking fears of personal differences in relation to the victim-Object. These are differences in direct conflict with the perpetrator’s own set of differences, whether it be gender, sexual, racial, professional, or a simple personality difference. How EA’s compares to online cyber crimes perpetrated against females: Wireless EA’s as a grooming medium are non-consensual and instantaneously executed from a distance, as asymmetrically medium utilizing technology in cyber/radio space with satellite/cellular and/or antenna technology, with possible multiple contributing parties in relation to the one victim (ie: ganging up or group bullying). It is done with anonymity and concealment of the contributing parties identities, anonymously. It is done with a lack of respect for personal borders of the victim as the violations penetrates the very private and intimate spaces of the female victim’s life (ie: genitals via wireless electronic stimulation, recorded personal conversations of relationships, and harms the victim’s mind via humiliation and shame). It also lack distinction because the symptomolgy wireless EA’s can induce in its victims can mimic other “diseased human states.” For example, wireless EA’s sedative states can induce disorientation and drowsiness that mimic alcoholic intoxication or some other neurological disease, while EA’s stimulation can induce wakefulness and insomnia.

Wireless EA Hacking — Another aspect of Wireless EA’s is in the field of “service security surveillance.” In my personal experience with this technology, my private conversations between myself, intimate lovers, family members, and even possibly my doctor’s conversation between myself have been broadcast for a certain “viewing audience” to hear in a form of clandestine eavesdropping. Who make up this “viewing/hearing audience” remains to be seen except that my very private and personal life is broadcast for viewer/listener scrutiny. Whether I am having sexual relations with a partner, masturbating in my own bed (unlike like my brothers, I never went blind for my sexual deviations), using the toilet, showering, eating, passing gas from gastrointestinal flus, it’s all open to the viewing/listening eyes of some concealed audience. How EA’s compares to online cyber crimes perpetrated against females: Wireless EA’s as a hacking medium are non-consenual and instantaneously executed from a distance, as an asymmetrical medium utilizing technology in cyber/radio space with satellite/cellular technology and/or antenna technology utilizing multiple contributing parties against the one victim (ie: ganging up or group bullying). It is done with anonymity and concealment of the contributing parties identities, anonymously. It is done with a lack of respect for personal borders of the victim as the violations penetrate the very private and intimate spaces of the female victims (ie: genitals via wireless electronic stimulation, recorded personal conversations of relationships, and harms the victim’s mind via humiliation and shame).

Wireless EA Blackmail — Although I have nothing to offer the cybercriminal who is surreptitiously gathering the sensitive information (audio/personal information) against my person-hood, the effects are similar to cyber blackmail in that it seeks to humiliate and shame me by exposing compromising audio of me (ie: farting, in sexual ecstasy of orgasm, urinating, chewing loudly like a cow, etc.) as none of my private moments are left unexposed. How EA’s compares to online cyber crimes perpetrated against females: Wireless EA’s as a blackmailing medium are executed non-consenual and instantaneously from a distance, as an asymmetrical medium utilizing technology in cyber/radio space with satellite/cellular technology and/or antenna technology utilizing multiple contributing parties against the one victim (ie: ganging up or group bullying). It is done with anonymity and concealment of the contributing parties identities, anonymously. It is done with a lack of respect for personal borders of the victim as the violations penetrate the very private and intimate spaces of the female victims (ie: genitals via wireless electronic stimulation, recorded personal conversations of relationships, and harms the victim’s mind via humiliation and shame).

Wireless EA Pornography The only aspect of wireless EA’s use as a medium of pornography would be in the audio that is captured during periods of sexual intercourse and masturbation. Audio that could be used as DeepFake audio content or incorporated somehow into an actual pornographic video via a “voice over.” Also, the use of wireless EA’s to stimulate the female genitals to prompt the victim into sexual arousal for the perpetrator’s “listening pleasure.” How EA’s compares to online cyber crimes perpetrated against females: Wireless EA’s as a pornographic medium are executed non-consenually and instantaneously from a distance, as an asymmetrical medium utilizing technology in cyber/radio space with satellite/cellular technology and/or antenna technology utilizing multiple contributing parties against the one victim (ie: ganging up or group bullying). It is done with anonymity and concealment of the contributing parties identities, anonymously. It is done with a lack of respect for personal borders of the victim as the violations penetrate the very private and intimate spaces of the female victims personal life (ie: genitals via wireless electronic stimulation, recorded personal conversations of relationships, and harms the victim’s mind via humiliation and shame).

Wireless EA Stalking — The aspect of wireless EA stalking involves the constant “viewing/listening surveillance” of my personal private physical activities, the subsequent stalking of my online accounts which was converted into the hacking of my online email accounts and social media accounts to harm and violate the victim’s sense of safety and privacy. How EA’s compares to online cyber crimes perpetrated against females: Wireless EA’s as a stalking medium are non-consenual and instantaneously executed from a distance, as an asymmetrical medium utilizing technology in cyber/radio space with satellite/cellular technology and/or antenna technology utilizing multiple contributing parties against the one victim (ie: ganging up or group bullying). It is done with anonymity and concealment of the contributing parties identities, anonymously. It is done with a lack of respect for personal borders of the victim as the violations penetrate the very private and intimate spaces of the female victim’s life (ie: genitals via wireless electronic stimulation, recorded personal conversations of relationships, and harms the victim’s mind via humiliation and shame).

Wireless EA Bullying As I have experienced this technology, wireless EA’s as a bullying medium use satellite/cellular and/or antenna technology to deliver electronic signals to threaten, harass, humiliate, embarrass, physically assault, mentally assault, or otherwise target female victims using either or radio/digital, mobile phone technologies an can be considered as a form of cyber bullying as it is done in the invisible space utilizing electromagnetic frequency and the physics of time and space. How EA’s compares to online cyber crimes perpetrated against females: Wireless EA’s as a bullying medium are non-consenual and executed instantaneously from a distance, as an asymmetrical medium utilizing technology in cyber/radio space with satellite/cellular technology and/or antenna technology utilizing multiple contributing parties against the one victim (ie: ganging up or group bullying). It is done with anonymity and concealment of the contributing parties identities, anonymously. It is done with a lack of respect for personal borders of the victim as the violations penetrate the very private and intimate spaces of the female victim’s life (ie: genitals via wireless electronic stimulation, recorded personal conversations of relationships, and harms the victim’s mind via humiliation and shame).

Wireless EA as DefamationAs I have experienced this technology, wireless EA’s as a medium for defamation of character happens when the wireless EA’s sedates or stimulates the female victim. For example, if wireless EA’s are used as a sedative medium to induce disorientation causing the female victim to become unbalanced and appear “intoxicated,” then the victim can be observed in a state that would make onlookers suspect she is intoxicated. On the other hand, if the wireless EA’s are used to stimulate the female victim thereby causing consecutive nights of sleeplessness and the female victim appears “tired and unkept,” this might cause onlookers to believe that she is“using street drugs” or suffering “mental illness.” When these states are induced by an invisible electromagnetic force unseen to the naked eye the viewing public can be decieved. How EA’s compares to online cyber crimes perpetrated against females: Wireless EA’s as a defamation medium are non-consenual and executed instantaneously from a distance, as an asymmetrical medium utilizing technology in cyber/radio space with satellite/cellular technology and/or antenna technology utilizing multiple contributing parties against the one victim (ie: ganging up or group bullying). It is done with anonymity and concealment of the contributing parties identities, anonymously. It is done with a lack of respect for personal borders of the victim as the violations penetrate the very private and intimate spaces of the female victim’s life (ie: genitals via wireless electronic stimulation, recorded personal conversations of relationships, and harms the victim’s mind via humiliation and shame).

Wireless EA as Morphing Here is where it gets very interesting! Where cyber morphing technology only manipulates the pictures or voice of a person turning them into something that looks “disgusting,” “degenerate” or “over exaggerated”, the use of wireless EA’s as a morphing technology does actually work on the physical appearance of the person in their “actual reality” and not just in the “virtual world” of Internet platforms through fantasy. Long-term targeting via the use of wireless EA’s has the potential to make people eat more due to loss of happiness and joy, drink more due a lack of social relationships, and workout less due to the pain and suffering the wireless EA’s induce making walking, dancing, jogging, maintaining balance, etc. more difficult thereby causing the onset of weight gain. It also, like I previously stated, can make a person appear “intoxicated” and facilitate a fall or sustain injury via disorientation and loss of balance. Someone using EA’s against another person could potentially harm the victim, potentially fatally via the induction of suicide, due to the bullying and harassment this technology represents. How EA’s compares to online cyber crimes perpetrated against females: Wireless EA’s as a morphing medium are non-consenual and executed instantaneously from a distance, as an asymmetrical medium utilizing technology in cyber/radio space with satellite/cellular technology and/or antenna technology utilizing multiple contributing parties against the one victim (ie: ganging up or group bullying). It is done with anonymity and concealment of the contributing parties identities, anonymously. It is done with a lack of respect for personal borders of the victim as the violations penetrate the very private and intimate spaces of the female victim’s life by purposefully obstructing daily goal attainment, and as such undermines their confidence, induces humiliation and shame, and causes financial, social, and personal difficulties.

Wireless EA Hijacking — The hijacking of female victims is accomplished through wireless EA’s via the “groooming” aspect of cyber crime. In my personal experience with this technology, it is the female victim suffering from wireless EA induced pain and suffering causing the female victim to lose social contacts, familial contacts, as well as a loss of interest in hobbies such as daily routine exercise, thereby changing the female victim’s “associations.” The female victim is not herself, her personality has been evacuated and replaced with another personality that does not belong to her, in an attempt to control and dominate the victim’s choices. This is similar to how a drug addict’s personality is different from his/her sober self identity. Where in cyber grooming, charm and charisma might be used to influence and win over the victim’s trust, with wireless EA hijacking the person’s personality is commandeered against her will via wireless EA. How EA’s compares to online cyber crimes perpetrated against females: Wireless EA’s as a hijacking medium are non-consenual and are executed instantaneously from a distance, as an asymmetrical medium utilizing technology in cyber/radio space with satellite/cellular technology and/or antenna technology utilizing multiple contributing parties against the one victim (ie: ganging up or group bullying). It is done with anonymity and concealment of the contributing parties identities, anonymously. It is done with a lack of respect for personal borders of the victim and the victim’s rights as a U.S. citizen, as the violations penetrate the very private and intimate spaces of the female victim’s life by purposefully obstructing her mind’s use of her own unique personality, likes and dislikes, and personal choices. As such, the use of EA’s undermines her confidence, induces humiliation and shame, and causes financial, social, cognitive and personal difficulties.

Wireless EA as DeepFakeWhere DeepFakes manipulate facial appearance through deep generative methods, the use of wireless EA as a form cyber stalking technology that leans on techniques of service security surveillance and eavesdropping technology to acquire audio data, audio data that might be manipulated by the use of machine learning and artificial intelligence to easily trick users. Women are more vulnerable to generated visual and audio content that can be used to fake the content, making the content appear genuine leading to reputational harm. We now have listening devices in our homes via our laptops (Cortana & Google), cell phones (Cortana & Google), Smart technology we speak to and are spoken to. How EA’s compares to online cyber crimes perpetrated against females: Wireless EA’s as DeepFake medium are non-consenual and instantaneously executed from a distance, as an asymmetrical medium utilizing technology in cyber/radio space with satellite/cellular technology and/or antenna technology utilizing multiple contributing parties against the one victim (ie: ganging up or group bullying). It is done with anonymity and concealment of the contributing parties identities, anonymously. It is done with a lack of respect for personal borders of the victim as the violations penetrate the very private and intimate spaces of the female victim’s life via the usurping of audio via radio broadcasting (ie: recorded personal conversations of relationships, and harms the victim’s mind via humiliation and shame).

Conclusion

Historical patterns of persecutions emerged as authoritative law enforcement approach to discipline and punish individuals for unlawful social behaviors, such as homosexuality and prostitution as well as non-complaint religious defectors of specific time periods. Modern patterns of persecution have now emerged and transformed into remote wireless electronic assault torture, various cyber crimes such as ransomware attacks and online sex crimes against females that appear to be a form of “social discipline” and “grooming techniques” to discipline and punish behavior as well as the emergence of mass random gun violence. In fact, the phenomenon of wireless Electronic Harassment share five (5) similar vulnerabilities with most, if not all, cyber security threats: Instantaneous Action From A Distance, An Asymmetrical Medium, Anonymity and Concealment, Lack of Borders, and A Lack of Distinction.

I’m a white female who identifies as a heterosexual with a homosexual fetish (bi-sexual). I live at, or below the poverty line as I have relatively no income. I am on social services from my local board of social services; Food stamps (only/no welfare) and clinical healthcare. Is this white racism, homophobia, sexism, homeless hate, or am I the victim of white supremacist’s hate for my “non-valuable,” “worthless,” “get a job” group status? Why am I being targeted with wireless Electronic Harassment? This is not just remote wireless electronic assault torture to my brain and body, but also online harassment and hacking of various personal email accounts and social media platforms.

Yet more patterns of modern-day persecutions have included, but are not limited to, the following:

Dylann Roof, the Charleston Emanuel African Methodist Episcopal Church shooter (black hate crime);

Robert Bowers, the Pittsburgh L’Simcha Congregation synagogue shooter (antisemitic hate crime);

Omar Mateen, the Pulse shooter at the Orlando gay night club (gay hate crime);

Robert Aaron Long, the shooter at several Atlanta massage parlors (female hate crime);

Patrick Wood Crusius, the shooter at a Walmart in El Paso (Spanish ethnic hate crime).

Sources:

https://proclivitysprinciplewisdom.medium.com/the-5-vulnerabilities-of-cyber-security-that-are-shared-with-wireless-electronic-physical-assaults-fbb5e7b687a6

Crompton, Louis. (2003). Homosexuality and Civilization. Cambridge, Massachusetts. The Belknap Press of Harvard University Press.

--

--

Karen Barna

I am a Targeted Individual suffering electronic harassment. I write about gender difference and object relations and feminism. I am Gen. X