The Colonial Hack and How Cyber-Attacks Relate to Gang Stalking, Electronic Targeted Assaults, and Psychotronic Torture

Updated: May 13, 2021

On Friday, May 7, 2021, the Colonial Pipeline reported they had been hacked. FBI confirmed the Colonial Pipeline was attacked by hackers from the DarkSide, a relatively new but prolific ransomware gang thought to be based in Russia. Interestingly, the group posted something of an apology for the hack on its darknet website. Although not directly referencing Colonial Pipeline, it referred to “today’s news,” saying: “Our goal is to make money and not creating problems for society. From today, we introduce moderation and check each company that our partners want to encrypt to avoid social consequences in the future.” DarkSide runs an affiliate programme allowing “partners” to use its malware to attack targets in exchange for a percentage of the ransom profits demonstrating how well cyber-criminal organizations are maturing. In addition, DarkSide has previously said it would start donating some of the extorted money to charities.

Similar to how cyber-attacks on critical corporate infrastructures like the one that incapacitated the Colonial Pipeline in the US, electronic targeted assaults and psychotronic torture seek to incapacitate the individual instead of the corporate infrastructures. Secrecy plays an important aspect in both these types of crimes since invisibility is what allows for its prolific continuation. Secrecy makes electronic targeted assaults and psychotronic torture hard to assess as well and for the same reasons. The invisibility of the attack makes it hard to know exactly who is responsible unless, like in the Colonial Pipeline case, the attacker makes a statement alluding to involvement. Corporations of cyberattacks may pay off their attackers without reporting it to the federal authorities and this allows those involved in the cyber-attacks to continue their ongoing abuse.

With regards to electronic targeted attacks and psychotronic torture, shame, embarrassment, and stigmatization may play into victim silencing. When people who suffer electronic targeted assaults and psychotronic torture are stigmatized and called “mentally ill” or “crazy” because what they are reporting sounds “far-fetched,” shame, embarrassment, and stigma is placed onto the victim. When this happens, people may perceive the victim as “less deserving of protection” through forms of dehumanization and humiliation. This is the exact opposite. In truth, those being victimized by cyber-crime are vulnerable groups and in fact deserve more protection under the law.

In cyber-attacks with ransomware gangs, the attacks on critical infrastructures like hospitals, energy grids, gas pipelines, education facilities, and transportation companies, compromise the health and well-being of entire civilian populations. As a result, these populations are placed at risk.

One of the first-ever criminal cases being investigated where a cyber-attack incapacitated the critical systems of a hospital in Dusseldorf Germany which ended in the death of one of the hospital’s patients. The cyber attackers infiltrated the infrastructure of the hospital and accidentally turned off its critical systems. While the hospital couldn’t attend to its patients, one patient was transported by ambulance to another hospital. She died en route. This is an example where white-collar crime results in violent crime; murder. This is the kind of crime I am interested in because I believe it to be connected to the phenomenon of gang stalking, electronic targeted assaults, and psychotronic torture.

In the United States, the first murder case involving cyber misbehavior involved a case of cyberstalking. A clandestinely planted GPS device was placed in the victim’s car. This allowed her attacker to track her and in fact, her attacker kept a detailed notebook on her whereabouts and behavior. The case is known as the United States vs. Matusiewicz. The justice department wrote, “the defendants were convicted of conspiracy, interstate stalking resulting in death and cyberstalking resulting in death. This was the first case in the nation where defendants were convicted of cyberstalking resulting in death.”

In electronic targeted assaults and psychotronic torture, the vital systems are in the human body. Two vital human systems are the human brain and the human heart. Whereas in cyber-attacks the vital systems are critical corporate infrastructures like an energy grid or some other centralized digitalized system, in electronic targeted assaults it is the systems within the body that operates on electronic signals and chemical signals that are attacked. This further proves the cyber world is impacting us in very physical ways as well as in very detrimental ones. When these systems can monitor and interrupt things like thought processes, body temperature, sleeping and wakefulness (human activity), breathing and respiration rate, heart rate, and even blood pressure utilizing digitalized platforms with which the attackers can monitor individuals remotely. We can come to an understanding of how cyber-attacks using gang ransomware remotely and gang stalking, electronic targeted assaults, and psychotronic torture is eerily similar to one another. Both share secrecy, invisibility, remote location for purposes of concealment, and monitoring. One doesn’t have to look too far to find research papers where experimental medicine, as well as experimental communication research, has given rise to advancing technological systems that have gone on to benefit man in his future.

Another important aspect of cyber-criminal activity is that some of these ransomware gangs have connections to human trafficking (prostitution). How might this relate to the plight of the Targeted Individual suffering electronic targeted assaults and psychotronic torture? Another aspect to consider is how these cyber weapons are used as counterphobic objects that ensure against emasculation (castration). When we consider questions like, “What does it mean to be a man?” Primarily, masculinity has to do with not being feminine or “weak.” Masculinity means men are expected to provide and to defend. And what about the question, “What does it mean to be a woman?” Primarily, femininity has to do with not being dominant and not being masculine. Women are cast into production of services. They provide emotional support and also support male ego management by providing sexual intercourse, companionship, and counseling services. This is a critical service that helps maintain men’s emotional health and well-being. They are also expected to provide domestic services such as childbearing, cleaning services, and child care.

In light of this information, I ask you, “How does the Colonial cyber hack relate to gang stalking, electronic targeted assaults, and psychotronic torture?”


Some Psychoanalytic Comments on the Halo Franchise Video Game and Random Gun Violence — Proclivities’ Principle Wisdom (

Sheridan, L., James, D., & Roth, J. (2020). The Phenomenology of Group Stalking (‘Gang-Stalking’): A Content Analysis of Subjective Experiences. International Journal of Environmental Research and Public Health, 17(7),



I am a Targeted Individual suffering electronic harassment. I write about gender difference and object relations and feminism. I am Gen. X

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Karen Barna

I am a Targeted Individual suffering electronic harassment. I write about gender difference and object relations and feminism. I am Gen. X