On The Philosophy Of Control and Power in Theories on How to Discipline and Punish the Criminal

Karen Barna
6 min readDec 24, 2021

--

As a researcher I will comment on how hard it is to describe the phenomenon of Group (Gang) Stalking with wireless electronic targeted physical assaults and psychotronic torture without using key concepts common to cyber security breaches. I will note the narrative found within the phenomenon can neither escape the coincidence that its nature is a throwback harbinger to the practice of torture of the condemned criminal body or the heretic of the seventeenth and eigteenth century. Michel Foucault, writing extensively in philosophy, noted the decline of public torture as spectacle which provides a clearer picture for the raison d’etre for the clandestine acts of what can be considered very public acts of human torture:

“Punishment, then, will tend to become the most hidden part of the penal process. This has several consequences: it leaves the domain of more or less everyday perception and enters that of abstract consciousness; it’s effectiveness is seen as resulting from its inevitability, not from its visible intensity;(1st point) it is the certainty of being punished and not the horrifying spectacle of public punishment that must discourage crime;(2nd point) the exemplary mechanics of punishment changes its mechanism.(3rd point) As a result, justice no longer takes public responsibility for the violence that is bound up with it’s practice (4th point —were we have BLM & Homophobic attacks being addressed and exposed the phenomenon has little government scrutiny). If it too strikes, if it too kills, it is not a glorification of its strength, but as an element of itself that it is obliged to tolerate, that it finds difficult to account for. (5th point — what is its raison d’etre.) [The horror often turns the legal violence of the executioner into shame.] Now the scandal and the light are to be distributed differently (6th point-adds insult to injury and further humiliates and shames the offender); it is the conviction itself that marks the offender with the unequivocally negative sign; the publicity has shifted to the trial, and to the sentence; the execution itself is like an additional shame that justice is ashamed to impose on the condemned man; so it keeps its distance from the act, tending always to entrust it to others, under the seal of secrecy (7th Point — this makes one of the most compelling arguments describing the re-manifestation of torture against innocent, helpless, vulnerable people (Foucault, 1975).”

My 1st point with regard to the nature of wireless electronic targeted physical assaults as seen in Group (Gang) Stalking as one of the most hidden and abstract aspects of punishments demonstrates it’s consistency of its existence from past history leaving the domain of everyday perception, and entering the realm of cyber space as well as the fact civil and federal authorities and criminal agents can both access cyberspace with advancing technologies with relative ease.

My 2nd point, utilizing the game theory of a 2 x 2 game we begin by believing every individual possess a vested interest in playing the game. And that this very notion of playing your best game motivates one to make their best move for the best possible outcome. Thus, engaging in actual cooperative games or, at the very least, appearing like one is being cooperative. (Example, The Prisoner’s Dilemma)

My 3rd point makes the most condemning of all when it comes to theories on philosophy on the control of subjects and that is “exemplary mechanics of punishment changes its mechanism.” The progressive use of cyber since the development of computers gave rise to a new age in crime known as hackers and/or cyber criminals. Since the 1980s, advancing computer technologies have spawned the age of Android development and neurological brain initiatives to help “better refine" the future for our newest generations so that they may thrive more optimally, but this requires research and test subjects. These new projects which are supported by the Department of Advanced Research Projects Agency (DARPA) has issued very alarming questions about medical human ethics and how these new technologies will be regulated thereby placing penalties on abuse. Since passwords can be stolen and encrypted systems hacked and exploited real concerns exist over its ethical uses.

My 4th point, as a result of the ambiguous details of the wireless electronic targeted physical assaults and psychotronic torture and lack of clarity on neurological ethics in brain initiatives, the US Justice Department can no longer take adequate and appropriate responsibility for the violence which is bound up in its own practice. Until issues of US Constitutional Rights violations, regarding the assaultive nature of the phenomenon, are heard by the highest court — citizens are subjected to the ongoing violence that has become part of new age technologies.

My 5th point, what is Group (Gang) Stalkings raison d’etre? And the answer to that question is the same answer to the question “What is the raison d’etre to the discipline and punishment of criminals and of biological diseases through medicine? It is to humiliate and shame the offender except the “offenders” are the innocent and vulnerable tortured at the hands of a deranged lunatic who is spared the shame of exposure along with any shame and humiliation or recompense for his violations. In addition to this, the technology further creates a theatrical seduction, a staged seduction, where one is made to look and possibly even become convinced they are more ill than they actually are. This furthers the purpose of disabling the victim which is one of the 4 D’s of cyber security INTRUSIONS; Disable, Disrupt, Degrade, and finally Destroy. Thus, the phenomenon of wireless electronic targeted physical assaults and psychotronic torture share the same 5 vulnerabilities of the internet when it comes to cyber security:

(1) Instantaneous action at a distance

(2) The use of an assymetrical medium that utilizes cyber space

(3) They carry out anonymous assaults at a distance

(4) The platform utilized is an asymmetrical medium that facilitates and allows for the crossing of boundaries for assaultive purposes (and we all know how much narcissists, psychopaths, and sociopaths, people with personality disorders, love violating other people’s boundaries)

(5) The nature of assaults creates a lack of distinction as the assaults may resemble symptoms of biological and/or psychiatric diseases making it THE PERFECT GASLIGHT for criminal conspirators to use because their targets get labeled “crazy" and the REAL TRUTH gets lost in obscurity.

My 6th point, the raison d’etre for clandestine acts of torture and punishment is that the horror of its nature gets concealed which leaves the victim feeling powerless against a superior enemy. In today’s world, the scandal has re-manifested and the tools for the Inquisition made available, not only to those with wealth, social capital, and political power, but to common degenerates interested in a avenging their own egos.

My 7th and final point, the constant reminder of its invisible presence through acts of repeated torture acts as a mark for the target and subjects them to feelings of humiliation, degradation, and shame. The common knowledge of the successful pervasive presence of these violations among the group (gang) members affirms the solidarity and power of the group. And the nature of these new technologies, for the purpose of torture and punishment, allows the acts to be carried out at a distance. The leader of the group (gang) entrusts other members to carry out these horrors, under a seal of secrecy, so that it’s members can display allegiance to the reigning supreme organization. Sounds a lot like the Third Reich in World War II Germany.

Because the nature of these assaults are abstract, allowing for lack of distinction, it becomes impossible to know who the perpetrators are. This can leave the victim feeling paranoid and thus can further facilitate and promote wrongful blame, which I believe is why this technology creates the PERFECT CRIME because victim’s may become psychologically degraded through repeated attacks and authorities may be ill equipped to address it because of lack of resources.

Quote Source:

Foucault, Michel. (1975). Discipline and Punish: The Birth of the Prison. New York. Pantheon Books.

--

--

Karen Barna
Karen Barna

Written by Karen Barna

I am a Targeted Individual suffering electronic harassment. I write about gender difference and object relations and feminism. I am Gen. X

No responses yet