Counter-mapping attackers and organized crime in Canada, US and Europe

Mapping patterns for surveillance and criminalization of targeted individuals in public institutions


During the time I was a precarious PhD sholar in academia (2007-2013), I observed how policies of criminalization and victimization are being instrumentalized against targeted individuals by the colluded dark State with malveillant attacks (Debaveye, 2015) to support frauds and power abuses.

With the increase of tech authoritarism and procedural laws aiming at targeting individuals for serving the personal interests of state attackers, the instrumentalization of breaches – caused by situations of vulnerability as precarity, social exclusion, gender, ethnia or lack of education and means – can cause high prejudices and deep hurts at society.

State agents target at certain persons or categories of persons, as women, foreigners or intellectuals, unfairly based on assumptions and stereotypes, and by doing so, deprive them from valuables, resources and personal data, preventing them from contributing positively, and at their full extent, to the social transformations allowed by emergent technologies, through processes of persistent and systematic denials of the integrity of their online identity.

As I have pointed in my PhD dissertation (2012b), in science and technology studies, there are a certain number of issues and claims that have been raising concerns about the surveillance of targeted individuals by networks of crime and public paid agents, with the help of monitoring technologies and normative procedures (Debaveye, 2012a).

The persons facing abusive surveillance have to constantly fight against the extinction of their narratives in the public spheres as if they would stop for one minute, their words and writings will be distorted, decontextualized, falsely argumentated, culturally appropriated, erased and manipulated to serve the personal interests, recognition and profits of some privileged individuals employed by State, governments and international organizations.

These agents manipulate the authority and leadership bestowed by institutions, using their access to infiltrate the private spheres of the targeted individuals. That’s what female STS scholars as Jasanoff call the ‘god trick of science’ (Debaveye, 2012).

Having experienced these forms of exclusion and ostracization while being a precarious PhD scholar at University Laval and UQAM in Montreal, I can testify about the procedures employed by institutional attackers to track down the personal details of their target :

They also accessed places and people I have been in touch with while on my personal time or on holidays.

When I was still a Ph.D scholar, I have come to be part of a community of research in Gender, Science and Technology that led me to discuss the notion of sexuality in social networks and was even asked by members of the Committee thesis ‘what I meant by that’. I mean that everything that is linked with too much proximity with the physical body or sexuality is considered as an attempt to “purity’ by science :

I observed how private persons become the target of persistent cabals portraying targeted individuals as impure to justify the negation of their rights. In response, targeted persons often concede to give extensive descriptions of their personal lives to agents to escape jail or persecution.

In the perspective of the recent AIs development in health sector, at borders and with the Homeland Security Departments, at work with US and European policies, it is crucial to establish what spheres of the public affairs, urban planning, control immigration, police at borders, aviation industry, intell agencies services for national security policies, heath sectors or privately funded academia might be putting targeted persons’ bodies, works and identities at risk by using such rhetorics.

Furtherly we’re questioning the responsibility of national governments, consultancy firms and international organizations in charge with the regulation and governance of the policies and procedures of the management of populations and public systems of informations, on the negative impacts of power abuses and abusive surveillance for human self-preservation.

What occur when public administrations and public organizations as academia and cities are being influenced with logics of global forces and systemic self-preservation that are detrimental to citizens’ survival and targeted individuals conditions of living ?

How to find the means to control and fight the pressures of financial capitalism to make the State complies with the duty of protecting its citizens and the vulnerable groups as women at borders, patients in hospital, illiterate persons from exposure to frauds, abuses, thieves, harassment ?

Are networks of organized crime, human trafficking and financial corruption secretly contributing into the reinforcement of discriminative policies against targeted individuals in order to silent them by the means of coercion so to maintain the networks of human exploitation that benefit them active?

Through the use of technical procedures, the dissemination of over-generalized beliefs and criminal convictions – based on the systemic trackdown of the most personal details : holidays, homes, friends, lovers, family relatives,… – might contribute indeed at restricting permanently the civic liberties and individual freedoms of targeted persons as whistle blowers, critical academics or independent thinkers, putting them into situations of oppression where they are exposed to unconceivable rates of technical, structural, procedural and bureaucratic violence (Debaveye, 2012b).

To restaure the loss and damage of identities for the people living under oppression, we need to better define and categorize our future practices, our social identities and the economical and political forms it will take to encourage the decentralization and the diversification of social practices and to better integrate the views of new comers, with high potential and sparkling intelligence.

In this work, the ontology of authenticity has been acquired through the capture of live streaming emotional responses as acts of sousveillance on Twitter and from narratives of persons and groups targeted by violence, with the help of an in-depth and fine-grained qualitative information design. These texts are seen as new ways to reground and shape personal experiences and everyday expertises through memories, artistic works and testimonies posted and shared online.

Mass and targeted surveillance through procedures of exclusion causing high damage

Putting into question the problem of the derealization caused by data manipulation and multiple misuses and misconducts in AI development as well as the influence of desinformation is at the core of this work. By doing so, we want to show how predictive policies and governmental rational procedures might be held accountable for producing systemic violence and causing poverty and crimes. The point of this work is to push organizations and third parties agents not to hide under the veil of immunity.

Vulnerable persons and groups are being exposed for their physical and psychical vulnerability in contexts of war, due to situations of precarity and scarcity. As they have high sexual, reproductive and symbolical value, their bodies and works can be exploited for forced marriage, sexual trafficking, prostitution and pornography by networks of crime. Immigrants and travellers are often targeted by ostracized procedures of criminal networks.

In Canada, 105 cases were filled by travellers to complaint about police misconducts at borders. Refugees advocates are concerned with the criminalization of migrants and asylum seekers while bills are passing that associate asylum seekers to crime which might lead to discriminative policies.

In emerging economies, protective policies deployed by public administrations and international organizations have put vulnerable persons and targeted individuals at risk with the illegal practices of obscure economic laws of subjugation as domestic works, sexual abuses and human trafficking.

Even the simplest mind can understand the value of the human body when a warrior gets weapons in exchange of women’s bodies and works. It is easy for anyone to take advantage of situations of vulnerability leading to child prostitution or forced marriage into foreign contexts, as targeted individuals are away from home, deprived of ressources provided by the social circle, family and relatives. Isolated women and child became easy preys for predators.

The victims of the institutional cyber-violence and public agents cyber-terrorism are being denied of their basic human rights and integrity by the colluded state as the right to information and the freedom of speech when they try to make their claims heard and visible by officials or through social media or by ways of Justice.

Sensitive persons and groups are being exposed when being in contact with the procedural apparatus like in the e-health sector with the administration at public and private hospital. There are issues that need to be adressed about the administration of treatments by staff and e-teams on patients, with lack of ethical procedures and compliance, and regarding of the problem of false estimations.

Frequent SQL requests of sensitive, private and sensitive informations, undue procedures of private fact checking directed at targeted persons, data manipulation caused by mistakes, the use of non-ethical judgemental procedures – as deleting files and past data or using discriminative labels against targeted individuals – are all cases opening path for denouncing the pattern of abusive surveillance from State on citizens.

In spite of justified claims from the targeted persons exposed to sensitive information targeting, personal surveillance and criminalization based on stereotypes and miscategorizations, processes of inquiry and claims are systematically being denied, divered and tampered in order to censure potential feedbacks about errors, limits and problems linked with public administrations.

To stem from processes of evaluation and report on threats and attacks, intimidation is used against targeted individuals, going even until targeting the physical lives and goods, by ways of assaults.

As networks of crime get obsessional with their targets, miscategorization, victimization and dissmisal of people’s views and citizens’ rights expose targeted persons to further acts of violence. We argue that State is willingly engaging in the process of increasing abuses with the conduct of fascist politics instead of recognizing of their own faults and failures in order to give access to measures of reparation and compensation for the targeted victims.

Writing local stories to build alternative identities

Social media texts and narratives from social identities and pertinent sources for information have been analyzed with a bottom-up perspective, and by the means of an inductivist and qualitative design based on fine-grained qualitative observations, to describe the realities of whose exposed in their everyday lives to high rates of structural and social violence by State.

To render our work accessible, we made use of persona to embody the expressions of local productions, experiences and expertises disseminated in the network.

This work aims at countering, fighting and debunking desinformations, filters, bias and helping in naming processes, with the use of qualitative research methods in computational social science, for ethical decision making.

This work offers to highlight the accurate production leading to critical findings linked with direct levels of exposure to threat and exclusion during global economical transactions operated by Canadian, EU and British institutionnals.

It critically considers the impacts of automation, code tyranny, economics ideologies, privacy and data manipulation to underline the causes for ostracization.

We argue that evolution can be achieved BY CREATING VALUE FROM HYBRIDATION to enrich intuitive visioning (Debaveye, 2012). By identifying bias and misrepresentations into the normative code of law and technology and by labelling attacks appropriately, we can disrupt the dominant narrative of financial capitalism and help at reconstructing the transient, honored and flexible identities of the targeted individuals.

The experiences from the insiders and counter-tactics deployed for survival as acts of sousveillance defined as “critical appropriations of dominant technology” (Debaveye, 2015) reveal the multiple patterns and structures employed by central power to corrupt our public institutions and common goods.

Analysis and reports based on local stories and narratives can thus contribute to raise awareness about the pressing issues of the dissents’ criminalization and of the weaponization of tactics used on civilians with the persistence of well-documented social logics for persecution in State.

Texts and narratives perceived as minor, idiosynchrasic and thus ignored or denied, just as gatekeepers tend to judge “reasonable” contents by referring to the common wisdom or normative standards on which they base their view and moral judgement are under scope.

Sorting things out from messy texts

The only thing needed for the triumph of Evil is for good men to do nothing.

Edmund Burke.

Via the study of acts of “sousveillance” and social texts locally produced (Debaveye, 2015), we offer to give more congruent definitions of what is going on in economical and transactional contexts experienced with public spaces and at borders.

We use emergent methodologies mixing qualitative observations, community narratives, intuitive coding and large data set social network analysis that overpass the watcher’s comprehension (Debaveye, 2012b) to reveal the processes that allow to an idea or a concept to come to creative fruition (Kuhn, 1978).

Insider views are considered as accurate ways of producing new forms of knowledge that cannot be accessed with traditional tools of inquiry and of providing feedback about real-life contexts instead of basing views on subjective interpretations or flawed correlations (Debaveye, 2012b) . It gives more pertinent, fair, authentical, and accurate views.

Most critics made to positivist paradigm (Kuhn, 1978) made apparent the problems of the lack of empiricity and the one of manipulating data into figurative models based on subjectivity, fictions and lack of ground luring readers into pseudo-science and demarcationism (Popper). I had the opportunity to be introduced to this thought during my PhD scholarship but I won’t discuss it here.

Briefly, in hypothetico-deductive models, data are forced into theories and concepts before their emergence, with the definition of prior hypothesis and the selection of factors and criterias that cause the reproduction of mistakes, past actions and discriminative bias to create frontiers and manipulations, artificial models and assumptions biased by scientific interests or paradigmatic ideology.

By showing and categorizing the multiple types of exclusion in a mapping of the diverse situations, people and places that use violence against targeted persons, we wish to put and end to painful experiences and the social exclusions of smart citizens and individuals that could contribute to improve society.

The point is to produce an account of real-time processes that can be refined over time to achieve higher quality and allow for the emergence of the newness (Debaveye, 2012b).

Localizing toxic places and enabling spaces

As some spaces and hubs are enablers for transformation and social change, others create toxic backgrounds preventing social change and emancipation to happen.

The top down design imposes the perspective of the dominant expert who can, as God, and from his privileged position of distanciation, gives a universal account of the views. In response, we offer a bottom-up perspective.

This paradigm – mostly criticized today by critical academics – is source of the mere basic logics of domination spread via the culture of engineering and disseminated, with AI technics, in public administrations and international organizations. It overvalues the control of procedures and neglect the social dimensions involved, creating the conditions for blocking access at victims and whistle blowers’ economic emancipation (Debaveye, 2012b) – stateless in their own states, and exposed to criminal violence.

Instead we advocate for the representation of the mosaic of realities experienced from an insider perspective (Debaveye, 2012b).

It is thus critical to map the places, resources, means and practices that lead to the persistence of logics of exclusion as academia and the ones that can lead to social change and freedom from the double perspective of the individual part of society and the one of the qualitative researcher as small or medium entrepreneurship.

Mapping networks of attackers

More serious concerns appear for society when discrimination and stereotyping are instrumentalized to exploit the vulnerabilities of individuals in order to steal their sensitive informations, private data and local resources, as observed with banks and customers, health care sector with patients, administrative services with citizens, employers with employees.

This pattern is also observable in circles of innovation colluding with academia that concentrate financial capital and exploit private data and citizens’ works and resources without retributing them. Finally these two hubs are deeply interconnected raising issues for copyrights infrigements, plagiarism and data collection of sensitive informations.

By observing the attackers’ background in Montreal, Toronto, London, and Birsbane, we have listed the tactics of intimidation and attacks appearing though a typology of repetitive and obsessional behaviors and attitudes from attackers (as they persist over time and extended periods of time at different scale).

I categorized these behaviors as, 1. abrasive remarks (lack of skills, justification), 2. diverse acts ranging from minor micro-aggressions to higher aggressions (abrasivity, voice intonation, defamation), 3. calling and false representation (uncompetent, dangerous, frivolous, tourist). 4. mockeries 5. dismissing someone’s expertise or knowledge, 6. Attributing the credit of her work to others or 7. plagiarizing  9. intimidating and interacting physically 10. physically harassing, attacking or sexually/physically assaulting ( rape attempt, rape, physical violence).

Politics of repression and rhetorics of victimization from attackers are also commonly expressed through violent acts or campaigns of harassment and cyber-harassment consisting in spreading false rumors and defamation, with sometimes dramatical outcomes as revenge porning, doxxing, stealing of personal informations, hacking accounts.

The pattern of victimization typically consists of agents pretending to be assaulted or objects of attacks to mask the attacks they conduct meanwhile on targeted individuals.

The attitudes attackers use aim at belittling people in order to make them look or feel like inferiors, uncompetent or irrational  (edit nov 17), causing them discapacitations and feeling of inaptitudes due to the use of militarian and coercice forces  (works on war will document also that the killing of local populations also go through indirect harms as starvation, blocking access to care, autonomization or resources).

These processes of exclusion can go beyong the virtual and impact people’s physical relations through various sets of random behaviours. Predation – walking out of one’s way to intentionnally cross the other’s line, laught load, comment about someone’s appearance loadly or looking bad at people – indicates high level of stress and poor emotional responses in face of the challenges that pose big cities’ competition and cohabitation.

Harassment, insults, or physical assaults from the group of attackers freaking out are endangering the others’ lives and their opportunities to live a decent life.

Health services might cause sterotyping at naming distressed patients crazy, nuts, hatred, asocial or disabled following unprecise coding and overgeneralizations on groups encrypted in procedures and labels by technical agents who lack expertise in social sciences.

At borders, fake assumptions as labelling women seducive, French people racists, or foreigners hatred and motivated with bad intentions also expose them to repressive policies and acts of violence.

Considering that insults are verbal agressions, it is important to point that normalizations can minimize the impacts of structural and social violence and create a lack of attendance and support towards people in needs of attendance in situations of emergency.

On the other hands, the patient can be led to conceal sensitive and private data to prove his views when facins such approximations, as institutions tend to dismiss the expertise produced from grassroot, local experience and grounded practices.

The coding of procedures is thereby used to silent and ignore the social texts, tacit knowledges and archival material produced locally by subtituting the local knowledge with paternalistic and stereotypical views. Technology should then give more space for social research, usages and social analysis to refine and adjust procedures.

If not, technologies will become a place for enabling pseudo-science in medecine or policies with the legitimation of rhetorics used for neophytes to exclude targeted persons with diverse backgrounds from the experts group, encouraging a culture of rarity that is only revealed to a privileged class while the profanes remain out.

Predictive policies causing repressive politics via surveillance

Agents rather to act under the radar so there is a need for telling and describing social realities to counter the rhetorics of rationalization justifying the sacrifice of vulnerable  groups of persons for the preservation of the State.

Surveillance, tracking and management of targeted individuals is a very lucrative market for attackers as they make all their living from scams and stealings so they dedicate all their time to look for potential targets, putting their victim in situations of encirclement.

Sensitive areas’ projects planning the use of sensors in public places  to collect private and sensitive data via CCTVing, are involved with lot of pressure from diverse parties interests, putting these areas at risk with corruption and diversion of public goods and technologies into political surveillance of targeted individuals.

Projects in the biotech sector, using technologies that have not completed the Ethical committees’ procedures and approvals are raising serious concerns for eugenics, bodies’ control and exploitation of political online identities in the administration of treatments, responses and procedures.

Agents are diverting the public resources and materials as police equipment and staff, intell agencies officers or surveillance technology, from their purpose to attack targeted individuals.

The projects can be easily manipulated and derived from their initial purpose as with the use of powder sensors injected through bodies or inhaled by patients, that can be used to control targeted individuals’ bodies and minds for terrorist attacks.

Critical and social researchers denouncing these realities face renewed levels of pressure, retaliations and intimidations from colluded agents and attackers that block them access to funds and networks of informed discussion.

Tactics of psychological manipulation, weaponization and jailification on activists by private polices can be used against targeted individuals to silent them with coercive technics as psychological manipulation – as pretending they are friends, coworkers, supportive of you on your private social networks – or force them at doing things they don’t want to do.

Market places and information consumption

What is it that makes a city remain still is again really mysterious to me. Is it the activation of antic tokens without the integration of the otherness – the woman, the Alien, the stranger or the insider – and a sort of stiffness opposed to movement?

Resistant dynamics and archaic mindsets prevent us from experiencing creative transformations. Remains of activities are stucked into stones and still. Streets become concentrative hubs for markets through mass tourism, partisan media and unhealthy urban environment, emptied from the concept of humanness that has been replaced with constant consumption. Selfies. Malls. Dollars. Numbness.

Technologies are not meant to be mere replicants and the echo chamber of the dead old world passing along inappropriate rhetorics based on violence with some tricky technics devoited to legitimize repression and abuse. Technologies are meant to allow the integration of the human, the life and the movement to counter technofascism, as society enabled by technology (that’s the true myth of the cyborg in the harawayan terms).

Technologies should not be used to control or to design the oppressive city of the ubiquitous political technocrates but to enable the reflexions of the insiders on their own living system. City are not objects or chiffers. They’re populated with real selves looking for authentical and meaningful connections and they dare to be considerate as full participants.

Maths and profitability ideologies that encourage the manipulation of our living by State are creating places for war zones and death. It normalizes a permanent culture for threat and torture of the precarious, poors, women, immigrants or foreigners for the sake of a deadly oligarchy, causing the perpetuation of the nothingness.

…When empathy, respect for the others, are long gone, when society encloses people into systems, disembodied and nefarious cities are created.

When the most repelling thing is that people cannot escape the world made at the image of them, the city they live in, the media they read, the politics they choose, in a world that they had never contributed to create, when all the vibrant voices will silent, then this same world will loose all its savour, taste and interest…

Yes States, what would you do when everything is silent ?

The process of ostracization is so routinely integrated into the systemic procedures used for demarcations by states and policies (through random acts as recruitment procedures, training, funding process, immigration procedures, etc) that complex knowledge are needed.

Epilogue : Copenhagen and back to home


Did I ever know this city?

Everything’s been perfect since my first seconds in there and I finally came to define what makes a culture smoothly integrative. Only a look at the city suffishes to make you feel serene. Some cult of gigantism and invasive screens in North america have made an image of pleasures filled with excitation and thrill. But screens are barriers.

A more in-depth and anchored connexion lasting to reveal, allowed by some infinite degrees of patience, empathy and tolerance, that leave the necessary spaces for a targeted person to express vision, meaning and courage, was the way to start an experiment that was not material but symbolical.

A shortened internal experience of combustion and synchronicity pre-existed; filled with the smiles and good intentions of the people around. Was it because I was a woman by my own? The sharing of genetics between Danish as Flamish creating an invisible thread?

Or the cultural process of being refined and respectful enough to refrain from the easy temptations of taking advantage of the rapist perspective, unwantedely willing by the victims.

The whys didn’t matter.

People were celebrating the return of the Spring and new beginnings, inviting others into their talks, showing high interests and suddenly sharing intimacy with more trust and confidence than they had ever done in the past, like some kids discovering and playing around, free of lust, full of joy.

We human are made of atoms and pieces of informations that connect, interact and intertwine permanently like a plasma.

I felt and appreciated the attention of the divine.

The magic of resilience is linked with the intrinsic nature of the city to welcome hosts but it’s also build from human activities, the proper energy surrounding a person of culture and love, as a unique gem, to overpass cultural differences and to take risk out of the physical limits of this world.

Biking the city with its smart networks free of any cars was a tremendous experience, riding all day long until 10pm, and talking with beautiful strangers to figure out who they were and what motivate them in life, engaging deeper into self exploration, interpersonal commitment and improvement of communications, arts and writings.

What made this first experience truly unique was its connection in a different space-time preceeding the hidden but extactic feeling of feeling home that inspired some original art crafts and creative writings.

Could we contribute to spread it around the same way we have experienced the manifestations of the divine ?

Digital revolution started with the Fée Electricité, The Fairy Electricity, as the first flux of information commonly shared among human. Information flowing into antic canals remixed with the newness and silently conveyed by the mix of media and technology, the interrelated networks of texts, subjects and interfaces entertwinned by people’s social practices and knowledges…

The Fairy Electricity described in Apollinaire’s poem is a Fairy for party and fun. Fun for all.

Advanced states of consciousness have allowed alternative ways to emerge and change the world we live in while stable dead forms have derailed into contempt and self-complacency.

The city i imagined is the resilient city my resilient soul and body are calling for : the informational city made as fluid as we dreamed it. A city of the minds and souls where people can go free without being enslaved in patterns of domination and annihilation.


This work was first of all a fight against the chimera that are being driven by AI technologies and AI propaganda without anyone noticing.

In Baudelaire’s poem, men are holding chimeras as parts of themselves, free of indignation, indifferent to them and resignated towards their ends.

The only emotions of the indignation remained to testify of the extent of the prejudices targeted persons have been exposed by politics of crime and perpetuation.

Chimeras, I’m waiting for you Chimeras.

'Il ne suffit pas de lire que les sables des plages sont doux ; je veux que mes pieds nus le sentent. Toute connaissance qui n'est pas précédée d'une sensation m'est inutile.'

Gide, Les Nourritures terrestres (1897)

Licence Creative Commons
Ce(tte) œuvre est mise à disposition selon les termes de la Licence Creative Commons Attribution – Pas d’Utilisation Commerciale – Partage dans les Mêmes Conditions 4.0 International.