An Open Letter To the U.S. Department of Justice

Karen Barna
9 min readMay 14, 2021

--

May 13, 2021

U.S. Department of Justice

950 Pennsylvania Avenue, NW

Washington, DC 20530–0001

RE: COLONIAL PIPELINE ATTACK; GANGS & ORGANIZED CRIME

Dear Sir:

In light of the Colonial Pipeline attack, I would like to address the critical need for the U.S. to look at how this form of cyber-attack relates to the phenomenon of gang stalking, electronic targeted assaults, and psychotronic torture of individual citizens.

Since the codes which define federal crimes are written in a broad manner, I am specifically interested in the type of cyber-crimes that end in death, injury, or property damage and which utilizing forms of cyber digital platforms. I feel these types of cases come closest to the losses endured by the fraction of the United States population reporting clandestine electronic physical assaults and forms of electronic torture from an unknown assailant known as gang stalking, electronic targeted assaults, and psychotronic torture. It has been my experience, some of these cases employ the use of digital platforms to eavesdrop, track, harass, and torture innocent victims through electromagnetic frequencies (radio and microwaves utilizing antennas). I know the verbiage employed in the federal codes are an element of broad description because the tracking could be done over any type of digitalized computer platform that can be accessed by cell phones, laptops, tablet computers, desktop computers, or some other electronic device that can access digital platforms over the internet.

I have previously contacted the Federal Communications Commission (FCC) to see if any type of experimental communicational research was being conducted over a portion of the U.S. which the FCC, at the time, confirmed no experimental research activity. It is my personal experience, the use of an antenna and clandestinely placed eavesdropping devices as well as bioelectronic implants that emit signals types of antennae pick up and transmit. This leads to the problem of distance. The FCC governs the transmission of high-powered transmission used by radio stations as well as other major broadcasting facilities. It does not regulate smaller antennas that may be operating over relatively small distances. I believe this is an element to the criminal activity in my case.

If we consider in 2014 hackers, somewhere in Germany, took over a steel mill. At first glance, the company didn’t know where the attack happened and which company was affected by the attack. A cybersecurity expert said the hackers went through the company’s main office computers and jumped into the production environment. The company knew it definitely happened because the cyber attackers scheduled an unauthorized, unscheduled, uncontrolled shutdown in the facilities blast furnace leaving permanent property damage resulting in infrastructure damage and losses. I have no case to reference because the German Federal Office for Information Security (BSI) did not disclose the actual date of the attack but included the event in its annual report from 2014.

If we consider the surreptitious nature of the German steel mill attack and electronic physical attacks and psychotronic torture taking place among a fractional portion of the United States population we can see how the aim to deceive, deny, and disrupt are its main aims of interest in a biopolitic that seeks domination over fractional portions of large populations of people not unlike the Colonial Pipeline cyber-attack. Michel Foucault first introduced the notion of ‘biopolitics’ through the referential frame of sexuality and psychoanalysis in his work, The History of Sexuality and which Alenka Zupancic critiqued as missing an important key component in the analysis; the human unconscious.

One of the first-ever criminal cases being investigated internationally where a cyber-attack incapacitated the critical systems of a hospital in Dusseldorf Germany ended in the death of one of the hospital’s patients. The cyber attackers infiltrated the mainframe infrastructure of the hospital and accidentally turned off its critical systems. While the hospital couldn’t attend to its patients, one patient was transported by ambulance to another hospital. She died en route. This is yet another example of white-collar crime resulting in the violent crime of murder. This is the kind of crime I am interested in because I believe it to be connected to the phenomenon of gang stalking, electronic targeted assaults, and psychotronic torture belonging to the transformation of gang activity in a new age of cyber gang warfare. A key conceptual component of gang stalking, electronic targeted assaults, and psychotronic torture is the “unconscious sexuality” of the perpetrator. It is this principal protagonist that is responsible for the entire phenomenon and to which the absence of legal precedent allows for it to continue to move in silence among the American population.

In the United States, the closest case I came to referencing even anything remotely close to my experience with gang stalking, electronic targeted assaults, and psychotronic torture is the case United States vs. Matusiewicz. In this case “the defendants were convicted of conspiracy, interstate stalking resulting in death and cyberstalking resulting in death. This was the first case in the nation where defendants were convicted of cyberstalking resulting in death.”

In electronic targeted assaults and psychotronic torture, the vital systems under attack are in the human body and are accessed through bio-implants. This brings up an important aspect important to the civilian population; hospitals and medical facilities. Whereas in cyber-attacks the vital systems are critical corporate infrastructures like an energy grid or some other centralized hub like in the Colonial Pipeline attack. When new advancing digital systems can monitor and interrupt human activity both on a micro and macro level, how can the two be considered any different from one another? Both appear to be gang-related, both utilizing digitalized platforms with which the attackers can monitor individuals remotely. In light of this, we can come to an understanding of how cyber-attacks using remote gang ransomware and gang stalking utilizing electronic targeted assaults and psychotronic torture are eerily similar to one another. Both share secrecy, invisibility, remote location for purposes of concealment, monitoring/surveillance utilizing digital platforms with electronic devices, and surreptitious attacks for the aim of incapacitating human activity, and a blatant disregard for the rights of people residing in a population. The main difference between the two is a simple one. The one, cyber-attacks on corporations are classified as white-collar and disrupt and deny large portions of a population’s right to infrastructural services which can impact the health and well-being of significant portions of the population. Whereas the cyber-attacks on the individual may be classified as “violent crime” because of its nature of physical injury and injury on an individual human body, except both impact the health and well-being of a significant population of people.

A recent 2020 research study sought to analyze the phenomenology of group stalking (aka: ‘gang-stalking) which analyzed the narratives of the individuals’ subjective experiences with the phenomenon. Researchers broke the phenomenon down into categorial components. The paper proved that the phenomenon is occurring and that it shares similar content narratives (e.g., physical interference, intimidation, harassment, physical and sexual attacks, electronic surveillance, etc.). (Sheridan, L., James, D., & Roth, J. (2020). The International Journal of Environmental Research and Public Safety).

To quote from Judith Butler,

“The task thus becomes to track the patterned ways that violence seeks to name as violent that which resists it, and how the violent character of a legal regime is exposed as it forcibly quells dissent, punishes workers who refuse the exploitative terms of contracts, sequesters minorities, and imprisons its critics, and expels its potential rivals.” ~The Force of Nonviolence: An Ethico-Political Bind

One of the most disappointing moments came when I realized I am caught in the middle of emerging crime that has very little with regard to the number of cases to reference because of this type of crime’s nature and relatively young age. I have to ask for careful scrutiny and jurisdictional prudence when addressing cases that report this new phenomenon as the result of “mental illness” because forms of dehumanization have always plagued humanity throughout history. As a result, subtle mistruths creep into discourse and influence outcomes by the use of what is known as perspecticide and victim blaming and to which promote myth acceptance in certain social cultures. As a result, when perspecticide is coupled with forms of dehumanization, individuals are led to believe that certain populations or groups are “less deserving of protection and civil rights” from violent, white-collar, and flagrant civil rights abuses and to which we see most visible today in the movement known as “Black Lifes Matter.” Perspecticide and victim blaming are most often witnessed in marginalized minority groups like the poor and disadvantaged, immigrant populations, and the mentally ill. Therefore, in the presence of such absence of legitimate prosecutions, the physical, mental, and emotional losses to the victims have not been assessed.

While you may believe the agency responsible for jurisdiction over this type of cybercrime is most likely a state bureaucratic criminal division, in my case, The State of New Jersey, Department of Law and Safety, Office of the Attorney General, Division of Criminal Justice, Gang and Organized Crime. I believe that because this form of cyber-criminal activity is occurring cross-nationally, it resides with the federal jurisdiction of the United States of America simply because it is being carried out against a people classified as United States citizens. The problem. There are no cases with which to reference any type of prosecution, successful or not, regarding this phenomenon. I am dealing with maniacal manipulations. My civil rights are being violated. Specifically, my 4th Amendment right which affords me the right to feel safe in my persons, papers, and effects from unreasonable searches and seizures and to which this technology seeks to steal away.

Any information or consideration you can provide me regarding this would be greatly appreciated.

Sincerely,

Karen L. Barna

References:

https://cyberlaw.ccdcoe.org/wiki/Steel_mill_in_Germany_(2014)

Sheridan, L., James, D., & Roth, J. (2020). The Phenomenology of Group Stalking (‘Gang-Stalking’): A Content Analysis of Subjective Experiences. International Journal of Environmental Research and Public Health, 17(7),

Farnier, J., Shankland, R., Kotsou, I., Inigo, M., Rosset, E., & Leys, C. (2021). Empowering Well-Being: Validation of a Locus of Control Scale Specific to Well-Being. Journal of Happiness Studies, OnlineFirst, 1–30. Since this technology seeks to violate my 4th Amendment rights, I am no longer guaranteed the privileges of this civil right and to which Thomas Jefferson took the phrase “pursuit of happiness” from Locke and incorporated it into his famous statement of a peoples’ inalienable right to “life, liberty, and the pursuit of happiness” in the Declaration of Independence.

Humphreys, L. (2011). Who’s Watching Whom? A Study of Interactive Technology and Surveillance. Journal of Communication, 61(4). Journal article categorizes three types of surveillance which includes lateral surveillance which is asymmetrical, nontransparent monitoring of citizens by one another (Andrejevic, 2006).

Christoff, K. (2014). Dehumanization in organizational settings: some scientific and ethical considerations. Frontiers in Human Neuroscience, 8. This paper addresses dehumanizing attitudes and behaviors frequently occur in organizational settings and are often viewed as an acceptable, and even necessary, strategy for pursuing personal and organizational goals. This paper offers evidence to support institutional structures may perhaps be involved in the dehumanization of certain populations through the use of electronic targeted assaults and psychotronic torture.

Grundy, S. (2021). Lifting the Veil on Campus Sexual Assault: Morehouse College, Hegemonic Masculinity, and Revealing Racialized Rape Culture through the Du Boisian Lens. Social Problems, 68(2), 226–249. Paper examines how college men “do” rape culture. The importance of this paper is expressed on how race is a modality through which men make meaningful connections between masculinity, sex, women, competition, and the repercussions of sexual assault in ways that preserve gender violence on campus. It is a useful research study for the comparison of gang stalking, electronic targeted assaults, and psychotronic torture.

Zupančič, A.(2016). Biopolitics, Sexuality and the Unconscious. Paragraph, 39(1), 49–64. Paper address the way Michel Foucault first introduced the notion of ‘biopolitic’ through the referential frame of sexuality and psychoanalysis in his work The History of Sexuality. The paper argues that this omission has important and far-reaching consequences for the (Foucauldian) concept of a biopolitic.

Bogen, K., Mulla, M., & Orchowski, L. (2020). Gender-equitable Attitudes, Rape Myth Acceptance, and Perceived Peer Acceptance of Violence among High School Students: An Examination of Gender and Athletic Involvement. Journal of Interpersonal Violence, OnlineFirst, 1. Paper is influential in understanding the susceptibility to rape myth acceptance (RMA) as well as RMAs connection to forms of dehumanization where certain groups are perceived as “less deserving of protection and rights.”

Kosloski, Anna E., Diamond-Welch, Bridget K., Mann, Olivia. (2018). The Presence of Rape Myths in the Virtual World: A Qualitative Textual Analysis of the Steubenville Sexual Assault Case. Violence and Gender. Vol. 5., №3. Published online October 5, 2018. This research explores the 2012 Steubenville, Ohio sexual assault case. Using qualitative textual analysis, news articles and social media content were coded to assess how existing rape myth narratives were depicted in the Steubenville case. Emphasis is placed on how reporting and social media responses characterized the victim, perpetrators, and the rape itself. The study found that depictions included both legitimizing rape myths and subverting myths through social media and news coverage. Implications for how social media materials were used as evidence in the Steubenville case are also discussed.

--

--

Karen Barna
Karen Barna

Written by Karen Barna

I am a Targeted Individual suffering electronic harassment. I write about gender difference and object relations and feminism. I am Gen. X

No responses yet