On Transformation of Gangs: When Extremist Groups Include Former Military and Policing Personnel
This essay entertains a discussion on some contributing factors to gang stalking, electronic targeted assaults, and psychotronic torture. This essay considers unlawful police gangs and former members of the military who go on to form extremist groups in light of the recent phenomenon in U.S. policing politics.
In my personal experience with electronic targeted assaults and electronic psychotronic torture revealed to me that the use of this invisible technology is being utilized by individual police officers in the police force and/or being utilized by the local police departments. Examining extremist groups in America has revealed 12% of the people arrested for storming the U.S. Capitol had previous military training or present or former police officers.
In a paper, Policing Gangs and Extremist Groups: A Different Viewpoint, Charles F. Williams “looks at U.S. homegrown, transnational extremist groups acting at a national level, which he argues present a clear and present danger to local, county, state, federal, and international policing cooperation. His essay offers a different viewpoint that posits that these groups are not under control in their current form.” This was in 2009. I believe this fact may have changed with the storming of the U.S. Capitol on January 6, 2021. He reports these groups are changing their ‘Modus Operandi’ (MO) while remaining engaged in all areas of criminality. His paper advocates these gangs to be designated as terrorist organizations so that the provisions of the USA Patriot Act, intelligence agencies, and military intelligence can be deployed against them to protect the best interest of the United States. Will surveillance of the gangs that stormed the U.S. Capitol be included in this new deployment of protection?
Since the advent of gang stalking with electronic targeted assaults and psychotronic torture, there has been little in the way of controlling the invisible terror this form of activity seeks to inflict on local residents. Historically, gangs were visibly seen. They had signs, colors, special clothing, with clear gang markings. The list of gangs in U.S. history is lengthy. They have ranged from well-known U.S. gangs like the Hell’s Angels and Aryan Brotherhood to immigrant gangs like Malasalvatruchas (MS-13), Costa Nostra, and the Mexican Mafia. The transformation of violent gang activity has now manifested to include gang stalking with electronic targeted assaults and psychotronic torture. It is my opinion the people that make up this new type of invisible terrorism may be people with previous military training, knowledge of special operations, surveillance techniques, and either active or former members of the policing community. Individuals who hunt, stalk, and electronically torture are no different than the street gangs in which America has become familiar.
In 2009, with the inauguration of a new presidential administration, and the closing of an era on predominantly white presidential masculinity authority, it was reported by some media and federal law enforcement that recruitment in some white supremacist groups increased in several states. The timeline of the advent of the phenomenon known as gang stalking with electronic targeted assaults and psychotronic torture is of importance because these groups pose a clear and present threat to America’s national security problem (Krisberg 2007; Lovato 2007).
I propose the way gangs are carrying out their violence has transformed from that of the “visible” to that of the “invisible” for a very specific purpose. They no longer want to receive any recognition of identification, either publicly or by law enforcement. Identifiers are how we classify data. If data cannot be classified, it cannot be identified. They want to be the sole “master signifier.” As signifiers create meaning, words will take the place of the things they refer to. This means, psychologically speaking, that speaking beings are creatures of absence — and a barrier of meaning protects us from a direct confrontation with THE THING — this is what the psychotic is unable to do because of a defect in the foundation of language.
In addition to the “invisibility” aspect in the transformation of gangs, they maintain a cache of weapons (electronic targeting devices) that carry out surveillance of their surroundings (space and property) and control ingress and egress from the sites they stalk. These compound groups would try to micro-manage (individual people) and minimize outside contact on the properties they surveil. If you think of groups that do not transform and remain in their compounds (for example, polygamist sects seen in Waco Texas) can be watched easily as compared to those blending into general society. Or at least this is what was formerly assumed. New developing technologies may allow for the individual tracking of people as they move around the towns and communities where they live.
Jamison (2008) reported that the Hell’s Angels have learned to disperse, dress the same as the community they live in, live next door quietly, enroll their children in school and no longer have identifying tattoos or markings on their motorcycles. In other words, they blend in and act like the new Harley Davidson motorcycle social phenomenon, while they control a vast criminal operation making huge sums of money. Even prison gangs are no longer tattooing themselves with identifiers in which they can be sorted and classified.
The important key piece of information given here regarding the transformations of gangs is: They do not want any attention. They want to operate quietly, unobtrusively, and dispose of their enemies very quietly. Interesting, long-term gang stalking with electronic targeted and psychotronic torture achieve these ends. Although the effects of this type of torture are not immediate, they will eventually cause lifestyle changes and the onset of illness. Williams discussed this loss of visibility from tattoos, dress, etc., with an intelligence analyst (Lee 2009) at the North Texas Fusion Center, McKinney, Texas. This intelligence analyst alluded to unverified information that a scar or scars in a certain spot on the body or cut in a particular fashion may replace ink tattoos. The development of simple visible identifiers would increase “invisibility.”
If extremist group transformations aimed at dispersing and camouflaging themselves within communities contribute to the group’s opacity, how does this change pose a special challenge to the enforcement of laws, or to how federal law enforcement uncover local policing conspiracies? How can law enforcement monitor these groups? Surveillance is possible through ground, communication, aerial, and satellite should they become imminent, widespread threats. To do so effectively, however, federal law enforcement needs a proactive policy and effective intelligence sharing. The advent and manifestation of electronic targeted assaults and psychotronic torture de nouveau is a form of service security surveillance that capitalizes on the science and art of punishment.
The Federal Bureau of Investigation's immediate response to capture individuals who were part of the group that stormed the U.S. Capitol has been persistent and successful. How are we to catch the invisible crime of electronic targeted assaults and psychotronic torture?
When we consider information sharing between police agencies, please consider the following,
“This instant inter-jurisdictional information-sharing brings up a number of privacy and ‘agency turf’ issues, government surveillance, policy issues, budgetary and so on (Sacco 2000; Schneider and Kitchen 2002; Tonry 1997; Webster 2001). It also appears to be a surveillance system, which is simply not the case. General surveillance of the public is avoided, only those persons identified, arrested or convicted of gang activities put into the system are subject to surveillance. So, unless an individual has committed some act, e.g. an arrest, conviction, gang membership established, etc., that would put them into the system, the system would not have any information on that individual. This is the system’s safeguard against general surveillance of the population and forces the system to narrowly apply its data searches within the system datasets (nodes) thus preventing any constitutional rights abuse.”
Even this surveillance is not physically violating with electronic targeted assaults or psychotronic torture. State surveillance of individuals who have been entered into their database and identified as “gang-related members” or people who have engaged in criminal activity is done strictly for information sharing purposes between “nodes.” Nodes are the various points of entry into the system which is shared between the nodes. The database is protected through security and secrecy by only vetted persons trusted to view the data. This database system should be used only for agency use and the systemic integrity and control of the data remains the responsibility within each node of ownership. However, people are human and may fail at the integrity of upholding the secrecy of the data. We have at least one possible conclusion as to how gang stalking using electronic targeted assaults and psychotronic torture may be exploited by policing and administrative personnel. Could this possibly represent one avenue in which gang stalking with electronic targeted torture is allowed to develop?
Williams, C. (2009). Policing Gangs and Extremist Groups: A Different Viewpoint. Policing: A Journal of Policy and Practice, 3(3), 275–280.
Goldsmith, S. and Eggers, W. (2004). Governing by Network: The New Shape of the Public Sector. Washington DC: Brookings Institution, pp. 80–185.
Krisberg, B., Marchionna, S., Baird, C. et al. (2007). Continuing the Struggle for Justice. Thousand Oaks, CA: Sage, pp. 21, 33–45, 89, 267.
Lovato, R. (2007). The Smog of Race War in LA. New York: McGraw-Hill, Art. 25, p. 113.
Sacco, V. (2000). “Media Constructions of Crime.” In Silverman, R., Teevan, J., and Sacco, V. (eds), Crime in Canadian Society, 6th edn. Toronto: Harcourt Brace.
Schneider, R. and Kitchen, T. (2002). Planning for Crime Prevention: A Transatlantic Perspective. London: Routledge.
Tonry, M. (1997). Ethnicity, Crime and Immigration: Comparative and Cross-National Perspective. Chicago, IL: Chicago University Press.
Webster, C. (1997). The Construction of British ‘Asian’ Criminality. International Journal of Sociology of Law 25:65–68.
Wortley, S. (2001). “Under Suspicion: Race and Criminal Surveillance in Canada.” In Chan, W. and Mirchandani, K. (eds), Crimes of Colour: Racialization and the Criminal Justice System in Canada. Peterborough: Broadview