The Perverse Structure as psychoanalytic disavowal. The pervert disavows castration; he/she perceives that the mother lacks the phallus, and at the same time refuses to accept the reality of this traumatic perception (Lacanian Theory). This psychoanalytic theory plays into homosexual compromise but it is also rooted in personality disorders such as the paranoid-schizoid.
I contend with adversarial arguments that insist the phenomenon of Group (Gang) Stalking with electronic targeted physical assaults and psychotronic torture are delusions and hallucinations made manifest from the diseased mind. As a person who has suffered electronic targeted physical assaults and psychotronic torture as part of her stalking, I have had my ability to speak impaired through remote artificial electronic stimulus that induces sedative states. The American culture has been steeped in racial conflict simply because our founding forefathers wrote into its nation’s legal instrument a doctrine with deep caustic roots which is near to impossible to excise from the social order (see Butler, 2021). The historical-based dichotomy of “valuable groups” and “nonvaluable groups” dates back centuries to past various Inquisitions and Holocausts that tend to isolate certain groups from the main group. That is to say, isolation from the group that possesses the dominant power. In light of this information, we might consider the Department of Defense’s work with Google in uncovering “Deep Fakes.” Deep Fakes are video/photos and audio recordings of individuals speaking a specific dialogue but who, in fact, never spoke the words. These are the latest in the tools of counter-intelligence, espionage, and the spreading of lies. In fact, there is a new app in the Google Play Store called “Re-face.” I had a bit of fun with it and anyone can download it for a free trial period.
I contend with any adversarial argument that the technology of Deep Fakes is built into the technology of Group (Gang) Stalking with electronic targeted assaults and psychotronic torture as tools of audio surveillance in recording possible time voice signatures and the creation of “data”. I say this because an aspect to this technology is “listening” (intelligence gathering). As such this data, just like a photo or video, can be subject to corruption.
This technology also usurps an individual’s identity from the targeted subject and reshapes it to the desire of the controller/operator/agent. Consider Bourdieu’s argument that language is primarily shaped by nation-state supporters whose desire is to influence an elite-based standard of linguistics. But this is not just limited to linguistics, it also ties into forming and shaping the conduct of the subject and can play into Lacanian perverse scenarios. (See Butler, 1997; and Friederich Nietzsche’s Genealogy of Morals; Georg Wilhelm Hegel’s Phenomenology of Spirit.) Combine this argument with the argument that analysis of symbolic power in relation to political institutions concerns itself with the separation between professional public figures and the general public and the purpose for this separation is to reduce the public to the status of “consumers.” (Bourdieu, 1991, p. 172) This aspect of control places the symbolic power in the hands of certain homogenous groups who desire may be to promote their own personal ideologies and political positions. “This separation, [Bourdieu] argues in “Political Representation,” is one that leaves professionals with the cultural capital to create political products, programs, and campaigns, but to do so within a limited set of options.” This makes sense when we consider the entire criminal purpose of Group (Gang) Stalking with electronic targeted physical assault and psychotronic torture exists as a mechanism for controlling certain targeted individuals. “The limited set of options” we might conclude, as in the case of the Colonial Pipeline hack, was the resulting prosecution by the Justice Department of the criminal group known as Darkside which provided a means to dike and recuperate damages resulting from these cyber-attacks. (Please see Justice News, Justice.gov, Monday, June 7, 2021.)
The symbolic expression of language can be used as a therapeutic mechanism as artists have used creative mediums to arrive at closure upon a subject matter. Painters, sculptors, engineers, writers all use their crafts as a means of expression. But symbolic expression can also become a creative perversion with detrimental outcomes for certain groups. If we read the silencing of various groups during the German Holocaust; Jews, Jehovah Witnesses, homosexuals, and the disabled as a cause to their “nonvaluable” status and the more modern event of ransomware attacks that target suspected wealthier middle- or upper-class individuals and organizations to pay money to entitled criminal groups. The perverse solution is perhaps closer to the truth than a sham if we know how to read its silencing and denial correctly, and as Janine-Chassegeut Smirgel tells us we are all open to the perverse solution because creative problem solving is rooted in the human psyche. As she tells us, “…all of us are open to the perverse solution which constitutes a balm for our wounded narcissism and a means of dissipating our feelings of smallness and inadequacy. This temptation can lead to our losing the love for truth and replacing it with a taste for sham (pg. 24).” The person carrying out my Group (Gang) Stalking with electronic targeted physical assault and psychotronic torture represents as “a Lacanian pervert” for all intense purposes of this psychoanalytic investigation in that it represents “a disavowal of a denied phallus (e.g.; the little boy’s/girl’s ability to castrate).” The truth that is exposed is in how he/she gets around the inescapable nature of natural human destiny with his/her feelings of smallness and inadequacy. He/she cannot allow the natural course of events to transpire uninterrupted. He/she must re-divert destiny to an alternate world of his/her own creation. A creation where he/she will reign as the supreme creator God (through sadistic attacks) in an alternate reality. Hence, we arrive at an understanding and purpose for the world of Group (Gang) Stalking with electronic targeted physical assaults and psychotronic torture. Except, torture is a felony! (Please refer to the character traits known as the Dark Triad and Dark Tetrad see Sources.)
Bourdieu, Pierre. (1991). Language and Symbolic Power. Cambridge. Polity Press.
Butler, Judith. (1997). The Psychic Life of Power: Theories in subjection. Stanford, California. Stanford University Press.
Butler, Judith. (2021). The Force of Non-Violence: An ethico-political bind. New York. Verso Publishing.
Chasseguet-Smirgel, Janine. (1984). Creativity and Perversion. London. Free Association Books.
“Department of Justice Seizes $2.3 Million in Cryptocurrency Paid to the Ransomware Extortionists Darkside.” The United States Justice Department. Justice News Press Release. Justice.gov. Monday, June 7, 2021. Retrieved online October 31, 2021. https://www.justice.gov/opa/pr/department-justice-seizes-23-million-cryptocurrency-paid-ransomware-extortionists-darkside
Harris, Laurie A. & Sayler, Kelley M. “Deep Fakes and National Security.” Congressional Research Service. Updated June 8, 2021. https://crsreports.congress.gov/product/pdf/IF/IF11333
Jacobs, Amber. (2007). On Matricide: Myth, Psychoanalysis, and the Law of the Mother. New York. Columbia University Press.
Lyons, M., & Jonason, P. (2015). “Dark Triad, Tramps, and Thieves.” Journal of Individual Differences, 36(4), 215–220.
Niedecken, D. (2016). “The primal scene and symbol formation.” The International Journal of Psychoanalysis, 97(3), 665–683.
Paulhus, D., Gupta, R., & Jones, D. (2021). “Dark or disturbed?: Predicting aggression from the Dark Tetrad and schizotypy.” Aggressive Behavior, 47(6), 635–645.
Schnell, Mychael. “FBI confirms DarkSide ransomware group behind pipeline hack.” MSN News (MSN.com). Published online May 10, 2021. Retrieved online October 31, 2021. https://www.msn.com/en-us/news/us/fbi-confirms-darkside-ransomware-group-behind-pipeline-hack/ar-BB1gzP5l
Sheridan, Lorraine; James, David V.; and Roth, Jayden. (March 12, 2020). “The Phenomenology of Group Stalking (‘Gang Stalking’): A Content Analysis of Subjective Experiences.” International Journal of Environmental Research Public Health. 17(7), 2506. https://www.mdpi.com/1660-4601/17/7/2506/htm#B5-ijerph-17-02506
Walker, Michelle Boulous. (1998). Philosophy and the Maternal Body: Reading silence. New York. Routledge.