PODCAST · society
Ne Bouge Pas!
by Dispatches from inside the Fire
Ne Bouge Pas! investigates contemporary systems of global repression, tracing how states, corporations, and security actors collaborate across borders to surveil, silence, and control civilian populations. Through personal testimony, comparative case studies, and strategic analysis, it maps emerging patterns of transnational authoritarianism and offers tools for understanding, resisting, and documenting a worldwide repressive network. drtamaradixon.substack.com
-
62
When Your Lawyer Fails You in a High Stakes Case. What to Do and How to Respond.
Thank you to everyone who tuned into my live video! Join me for my next live today at 9pm CET (Central European Time). https://open.substack.com/live-stream/171582?utm_source=live-stream-scheduled-upsell This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
61
Tent 23: Removal, Reassignment, and Re-Exposure to Harm
LuxembourgIntroductionThis post documents a documented sequence in which removal from a harmful environment is followed by decisions that reintroduce the same individuals and conditions.This is a clearly identifiable sequence involving removal, return, and now a pending reassignment that risks reintroducing the same actors and behaviors after separation was already deemed necessary.Initial Incident and Police ResponseOn a prior occasion, I was housed in Tent 1023.During that period, multiple individuals inside the tent engaged in coordinated harassment. During that same period, I was also subjected to toxic exposure within the tent environment.The situation escalated to the point that law enforcement was called to the site.When officers arrived, I informed them that:* I am a victim of transnational repression* I am a human rights defender* I was being subjected to coordinated harassment* individuals inside the tent were participating in that conductI also stated that:* the activity appeared organized* individuals within the tent were acting in coordination* there were concerns regarding involvement of security and Red Cross staffNo formal report was taken.Instead, I was told that the individuals would be instructed to remain calm and that I would be moved the following day.I was subsequently removed from Tent 1023.Return and Escalation of ConditionsAt a later point, I was placed again in Tent 1023.At that time:* some of the same individuals were present* additional individuals had been introduced* coordinated harassment resumedIn addition, new methods were observed.One individual was dispersing a substance from a perfume bottle, resulting in toxic exposure within the environment. This represented a shift in method compared to the prior incident.Similar exposure patterns were subsequently observed across multiple tent placements following removal from Tent 1023.Other individuals were observed using concealed, portable devices, consistent with previously observed patterns of conduct.As a result, I was again moved out of that environment.Institutional Response and Limitation of MeasuresVictims in these situations are instructed to relocate to another tent.When I raised this issue with Red Cross staff, I was informed that there was nothing further that could be done beyond removing me from the tent.I explained that this did not resolve the issue, as the harm was occurring within the camp environment itself, not limited to a single tent.Concerns regarding the involvement of security and Red Cross staff had already been raised.Despite this, the response remained limited to relocation.Current Situation: Reversal of SeparationI have now been informed that occupants from Tent 1023 will be reassigned into my current accommodation.This creates a direct contradiction:* I was previously removed from Tent 1023 due to harm* that removal functioned as an acknowledgment that separation was necessaryNow:* the same individuals from that environment are being moved into my current spaceDuring a discussion with two Red Cross workers regarding this reassignment, I recorded the conversation. I was informed during that exchange that the police would be called because I was recording.Structural IssueThis is not simply a housing adjustment.It reflects a reversal of a protective measure:* separation was implemented in response to harm* that separation is now being undone* without addressing the underlying conductThe result is re-exposure to the same individuals and conditions that led to removal in the first place.The audio recording of the reassignment discussion, including statements made during the exchange, is embedded at the top of this post for review.Final StatementThe issue is straightforward.Separation was implemented in response to harm and is now being reversed. The same individuals are being reintroduced into my environment without addressing the underlying conduct.This creates a foreseeable and preventable risk.This post documents that sequence and establishes a record of the prior incidents, the institutional response, and the current decision to reintroduce known risks. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
60
Second Police Encounter in Vianden, Luxembourg. Valid Reservation Denied After Youth Hostel Blacklisting. Audio Available
Vianden, LuxembourgThis evening I arrived at a youth hostel in Vianden, Luxembourg with a valid reservation confirmed by phone earlier that day. Upon arrival I was informed that I had been blacklisted from the international youth hostel network by the youth hostel in La Rochette and was denied entry.Police were called. A second interaction with Luxembourg police followed.The audio recording of that interaction is below.This is the second police interaction documented on audio this evening. The first interaction at La Rochette is covered in the preceding post.Audio EvidenceAudio recording of the second police interaction: This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
59
Police Called Over Bathroom Window in Luxembourg. Officer Responds by Saying “Shut Up” as I Begin Speaking. Audio Available.
La Rochette, LuxembourgAudio recordings of both the police interaction and the call made by hostel staff to Luxembourg police are available in the links below. Video footage of the incident was also recorded but is not included in this post.The call made by hostel staff to Luxembourg police was conducted in Luxembourgish. Because I do not speak Luxembourgish, I cannot independently verify the exact content of the complaint reported to police.The recordings are published for documentation and evidentiary purposes in connection with ongoing legal and institutional proceedings.This afternoon, at a youth hostel in La Rochette, Luxembourg, I was approached by a male staff member who threatened to blacklist me and call the police because I opened a bathroom window after using the restroom and showering.Opening a bathroom window after using the restroom and showering is not a crime. It is not a policy violation that warrants police involvement. The issue was ventilation.Opening the window was the only self protective mechanism available to me in an enclosed building where I was experiencing symptoms consistent with prior documented toxic exposure events. Ventilation through open windows dilutes airborne substances. Closing the windows removes that protection. The demand that the window remain closed eliminated the only available means of ventilating the space and reducing airborne exposure.Staff had already raised the issue of the bathroom window several times over the previous days, including earlier that afternoon and again a few hours before the police were called.In situations involving ongoing harassment, complaints sometimes arise around actions that allow an individual to protect themselves or document events, such as opening windows for ventilation, recording interactions, or requesting a room change.The staff member claimed that I had repeatedly opened the window and further claimed that I had not been showering. At this facility the bathroom and the shower are located in separate rooms within the women’s area. Staff were not present inside either room. For a male staff member to claim knowledge of which room I used and what I was doing inside those private spaces raises questions about how that information was obtained.I had already paid for a full week at this facility. I had made a phone reservation to leave early because of the harassment I had been experiencing on the property. Within approximately five to ten minutes of making that reservation, staff appeared at my door with this complaint and informed me that police had been called. The timing of the complaint occurred almost immediately after I arranged to leave the property.The complaint initially concerned the bathroom windows being opened. When police arrived, the officer stated that someone had called about a problem in the building but did not identify any specific rule violation. I repeatedly asked what rule I had violated or what conduct had been reported that I had done.No specific rule or violation was identified.Later in the interaction, the explanation shifted. The officer stated that my speech during the conversation itself was harassing others. The interaction therefore moved from an initial complaint about windows being opened to a claim that my speech during the police encounter was the problem.The basis for the police call therefore changed during the interaction, shifting from an alleged rule violation involving a bathroom window to a claim that my speech during the police encounter itself was the problem.The following interaction with the police is documented on audio.I began recording as the officers arrived. I observed the police vehicle enter the property with its siren activated. Shortly afterward I heard officers moving through the hallway, and the audio recording captures the knock on my door and the beginning of the interaction.When I began explaining the situation, the officer told me to “shut up.” This statement is clearly audible on the recording. I immediately responded that he did not have the right to tell me to shut up.During the interaction, the officer told me that I was not allowed to record. The officer also stated that if he instructed me to stop recording, I would have to stop. However, he did not actually issue such an instruction, and the recording continued.The officer asked for my passport. I explained that asylum seekers in Luxembourg do not retain their passports because they are held by immigration authorities during the asylum procedure. Instead, asylum seekers are issued a document known as a papier rouge, which functions as their official identification while their case is pending.The papier rouge contains a unique identification number linked to the individual’s asylum file. When an asylum application is filed, personal documentation is registered with authorities and identity checks are conducted as part of the asylum procedure.When I presented the papier rouge to the officer, he appeared unfamiliar with the document and returned it to me.During the interaction I identified myself as an asylum seeker, a human rights defender, and a victim of transnational repression experiencing coordinated harassment.The officer had no framework for receiving that information. He characterized the situation as “speech against speech.” I asked where the nearest police station was so that I could file a report. The officer directed me to a station approximately 20 kilometers away and did not offer to take a report at the scene.The officers confirmed that I had paid through the following day and that there was no violation. They left without taking any action against me.This incident occurred on the same day that I submitted a formal forensic toxicology request to the Institut für Rechtsmedizin in Frankfurt, published documentation of my clinical evidence of chemical exposure on Substack, and publicly announced my March 24 asylum appeal hearing.This interaction illustrates the institutional gap identified in my petition to the European Parliament and in my submissions to United Nations human rights mechanisms. When individuals report coordinated harassment or transnational repression, local authorities often lack training, protocols, or mechanisms for receiving and documenting those complaints.The interaction documented here occurred in real time and is preserved in the accompanying recordings.Audio EvidenceAudio files will be added to this post shortly.Audio recording of the call placed by hostel staff to Luxembourg police:Audio recording of the police interaction: This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
58
Pegasus Series: Section 5.3.4. The Global Surveillance Market
The Global Surveillance MarketThe preceding section examined how counterinsurgency doctrine migrated from overseas military campaigns into domestic security institutions. Intelligence methods originally designed to map insurgent networks and monitor civilian populations in conflict zones gradually became embedded within homeland security systems after the attacks of September 11, 2001. Behavioral analysis, pattern-of-life monitoring, and predictive risk assessment moved from battlefield environments into civilian governance structures. This transition occurred through a combination of institutional reorganization, contractor participation, training exchanges, and technology procurement programs that transferred intelligence methods and analytic systems from military theaters into domestic security environments.Once these analytical methods were incorporated into software platforms and data integration systems, they became transferable beyond the institutions that first developed them. Intelligence techniques originally applied within military theaters could now be embedded in commercial technologies capable of processing large volumes of behavioral data.Private technology firms began building platforms that replicated many of the analytic functions originally developed within military intelligence environments. Data fusion systems capable of integrating communications metadata, financial records, geospatial information, and open-source reporting allowed analysts to reconstruct patterns of association and movement across large populations. Predictive analytics tools transformed these data streams into behavioral models that could identify anomalies and estimate potential security risks.As these capabilities matured, a commercial surveillance industry began to emerge. Governments increasingly acquired surveillance infrastructure through procurement contracts with private vendors. These firms specialized in data analytics, cyber intelligence, communications interception, and behavioral modeling software. Within this environment, a growing sector of cyber intelligence and commercial spyware companies began marketing surveillance technologies as dual use security tools intended for counterterrorism, law enforcement, and national security operations.The surveillance architecture described in earlier sections of this series was therefore not constructed solely by public institutions. It was assembled through procurement chains and partnerships with private surveillance technology firms and cyber intelligence vendors that developed systems capable of monitoring and analyzing human activity at scale.After intelligence methods were encoded within commercial software platforms, they could circulate internationally through export markets, security partnerships, and technology transfers. Systems originally developed for specific military or intelligence purposes became widely available to governments seeking to monitor communications, analyze behavioral patterns, and manage perceived security risks.Understanding the emergence of this global surveillance market is essential for interpreting the broader significance of modern monitoring technologies. Systems such as Pegasus are not isolated innovations but examples of a larger commercial ecosystem in which private firms develop tools that allow governments to access personal communications, map social networks, and generate behavioral intelligence about individuals and populations. The expansion of this market has significant implications for democratic accountability and civil liberties, particularly when surveillance technologies are deployed against journalists, political opposition figures, and human rights defenders, raising urgent questions about regulation, oversight, and legal remedies.The Surveillance Vendor EcosystemModern surveillance systems are rarely produced by a single organization. Instead they are assembled through networks of specialized companies that provide distinct technological capabilities. These firms form a vendor ecosystem in which governments purchase surveillance capacity through a combination of software platforms, data integration tools, interception technologies, and analytic services.One layer of this ecosystem consists of companies that develop large-scale data analytics platforms. These platforms integrate multiple streams of information, including communications metadata, financial transactions, geolocation records, and public reporting. The software allows analysts to map relationships between individuals, reconstruct movement patterns, and identify networks that might otherwise remain invisible within fragmented datasets.Another layer of the ecosystem focuses on communications interception and cyber intelligence. Companies operating in this sector produce tools capable of accessing mobile devices, intercepting encrypted communications, or extracting information from digital networks. These systems often operate through remote intrusion techniques that allow operators to obtain messages, contact lists, call histories, and other forms of personal data.Additional vendors specialize in the integration and visualization of large datasets. Their products transform raw data into interactive maps, link analysis diagrams, and behavioral timelines that help analysts understand patterns within complex information environments. These visualization tools are essential for converting large volumes of surveillance data into actionable intelligence.The commercial surveillance ecosystem therefore operates as a supply chain rather than a single industry. Governments procure capabilities from multiple vendors whose products interact with one another inside broader intelligence architectures. Data collection tools feed information into analytics platforms. Visualization systems help analysts interpret patterns. Communications interception technologies provide access to new streams of data.When these components are combined, they create a comprehensive surveillance environment capable of monitoring social networks, identifying behavioral anomalies, and generating predictive assessments about potential security risks.International Diffusion of Surveillance TechnologiesOnce surveillance technologies became commercial products, they began circulating through international markets. Governments could acquire capabilities that previously required extensive intelligence infrastructure simply by purchasing software systems and analytic platforms from private vendors.Export markets played an important role in this diffusion. Surveillance firms often marketed their technologies globally, presenting them as tools for combating terrorism, organized crime, and national security threats. These marketing narratives framed surveillance capabilities as essential components of modern security governance.Security partnerships between states also contributed to the spread of these technologies. Intelligence cooperation agreements frequently involved the exchange of technical expertise and analytic systems. Countries participating in security alliances adopted similar surveillance platforms and analytic methods, creating interoperable intelligence environments.Private vendors further accelerated this diffusion by offering technical support, training programs, and software updates that allowed governments to integrate new capabilities into existing security institutions. These services helped ensure that surveillance technologies remained operational and adaptable within changing technological environments.As a result, surveillance systems originally developed in specific national contexts gradually became part of a global market. Governments across different regions adopted similar analytic tools and monitoring technologies, creating a shared architecture of surveillance capabilities.The Privatization of Surveillance InfrastructureThe growth of the surveillance market also reflected a broader shift in how security institutions acquire technological capabilities. Rather than building intelligence infrastructure entirely within government agencies, states increasingly relied on private companies to design and maintain surveillance systems.Private firms developed the software platforms that integrate data streams, manage large databases, and generate predictive analyses. They also produced many of the specialized tools required to access communications networks and digital devices.This reliance on private vendors created new forms of collaboration between public institutions and commercial actors. Government agencies defined operational requirements, while technology companies developed products capable of meeting those demands. Procurement contracts and long-term service agreements established enduring relationships between security institutions and private technology providers.These arrangements also raised complex questions about oversight and accountability. Surveillance technologies developed by private companies often operate within legal and regulatory environments that were not originally designed to govern such capabilities. The involvement of commercial actors in intelligence infrastructure can therefore complicate efforts to monitor how surveillance systems are used.Surveillance as a Global Governance ModelAs surveillance technologies spread through commercial markets, they began shaping how governments manage security and social stability. Behavioral data analysis, predictive modeling, and large-scale monitoring systems became central tools in the administration of modern security institutions.These systems allow governments to identify patterns of activity that may signal emerging risks. Instead of relying solely on traditional investigative methods, security institutions increasingly use predictive analytics to anticipate potential threats before they materialize.The result is a governance model in which populations are continuously observed through digital data streams. Behavioral signals extracted from communications networks, financial transactions, and mobility patterns are analyzed to identify individuals or groups that may warrant closer attention.In this environment, surveillance systems function not only as investigative tools but also as mechanisms for managing uncertainty within complex societies. Governments seek to reduce perceived security risks by analyzing behavioral patterns across large populations and intervening when anomalies appear within those patterns.This transformation has profound implications for democratic governance. Systems capable of monitoring communications and mapping social networks can also be used to observe journalists, political opposition figures, and human rights defenders. When such technologies operate without meaningful oversight, they risk undermining fundamental civil liberties and weakening the institutional safeguards that protect democratic societies.The global surveillance market therefore represents more than a technological development. It reflects a broader shift in how states understand security, risk, and governance in an era defined by large-scale data collection and advanced analytic capabilities.BibliographyBeraja, Martin, Andrew Kao, David Y. Yang, and Noam Yuchtman. “Exporting the Surveillance State via Trade in AI.” Working paper, MIT Department of Economics, 2023. PDF, https://economics.mit.edu/sites/default/files/inline-files/aitrade_September_1.pdf.Council of Europe Commissioner for Human Rights. Pegasus Spyware and Its Implications on Human Rights. Strasbourg: Council of Europe, 2022. PDF, https://rm.coe.int/pegasus-spyware-report-en/1680a6f5d8.European Parliament. Pegasus and the EU’s External Relations. Study requested by the Committee of Inquiry to Investigate the Use of Pegasus and Equivalent Surveillance Spyware (PEGA). Brussels: Policy Department for Citizens’ Rights and Constitutional Affairs, 2023. PDF, https://www.europarl.europa.eu/RegData/etudes/STUD/2023/741475/IPOL_STU(2023)741475_EN.pdf.[3]European Parliament. The Use of Pegasus and Equivalent Surveillance Spyware: The Existing Legal Framework in EU Member States for the Acquisition and Use of Pegasus and Equivalent Surveillance Spyware. Study requested by the Committee of Inquiry to Investigate the Use of Pegasus and Equivalent Surveillance Spyware (PEGA). Brussels: Policy Department for Citizens’ Rights and Constitutional Affairs, 2022. PDF, https://www.europarl.europa.eu/RegData/etudes/STUD/2022/740151/IPOL_STU(2022)740151_EN.pdf.[5]Hertie School, Centre for Digital Governance. “Pegasus Spyware in Europe.” Student Working Paper Series, 10 October 2022. Berlin: Hertie School, 2022. PDF, https://www.hertie-school.org/fileadmin/2_Research/2_Research_directory/Research_Centres/Centre_for_Digital_Governance/5_Papers/Spyware_Working_Paper_10_October_2022.pdf.NSO Group. Transparency and Responsibility Report 2023. Herzliya: NSO Group, 2023. PDF, https://www.nsogroup.com/wp-content/uploads/2023/12/2023-Transparency-and-Responsibility-Report.pdf.Robert F. Kennedy Human Rights. International Human Rights Law and Targeted Unlawful Surveillance: Briefing Paper on Pegasus Spyware. Washington, DC: RFK Human Rights, 2021. PDF, https://rfkhumanrights.org/wp-content/uploads/2021/08/IHRL-and-Targeted-Unlawful-Surveillance-Briefing-Paper.pdf.Young, Michael. “Privatized Espionage: NSO Group Technologies and Its Pegasus Spyware.” Thunderbird International Business Review (2022). PDF, https://onlinelibrary.wiley.com/doi/pdf/10.1002/tie.22321.Zisberg, Amit. “Algorithmic Surveillance and Digital Occupation: Pegasus Spyware as a Tool of Control.” Working paper, 2025. PDF, https://dash.harvard.edu/bitstreams/3ac393b4-9511-44f8-9f9a-d3d1f60075dd/download.“Towards an International Government Surveillance Framework: Technological, Legal and Ethical Factors.” 2015. PDF, https://www.academia.edu/17344176/Towards_an_International_Government_Surveillance_Framework_Technological_Legal_and_Ethical_Factors.World Journal of Advanced Research and Reviews. “How Foreign AI Surveillance Technologies Reshape Domestic Governance.” World Journal of Advanced Research and Reviews 2025. PDF, https://journalwjarr.com/sites/default/files/fulltext_pdf/WJARR-2025-2845.pdf. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
57
Pegasus Series: Section 2. Capabilities and Reach of Pegasus
Geneva, SwitzerlandPegasus is not ordinary spyware. It is a military grade digital weapon engineered for covert access, long-term persistence, and total information dominance over a target’s mobile device. Unlike consumer grade spyware or conventional government surveillance tools, Pegasus operates with a level of sophistication designed for intelligence and warfare. It is capable of penetrating a smartphone through zero click and zero day exploits, often without any interaction or indication to the user.A zero click exploit allows Pegasus to silently infiltrate a device through missed calls, push notifications, or hidden messages sent via common applications such as iMessage or WhatsApp. The user does not need to tap a link, open an attachment, or take any action at all. A zero day exploit refers to a previously unknown vulnerability in software that has not yet been patched. These vulnerabilities are highly valuable and often traded for millions of dollars. NSO Group has leveraged these vulnerabilities to deliver Pegasus with precision.Once installed, Pegasus gains total control of the infected device. It can monitor and record calls, extract messages from encrypted apps like Signal or WhatsApp, access files and photos, track real-time GPS location, and remotely activate the phone’s microphone and camera. This turns the device into an always on surveillance tool, even when locked, idle, or appearing to be powered down.Unlike traditional intelligence operations that require human surveillance or physical contact, Pegasus allows remote, scalable, and deniable monitoring. It requires no physical proximity to the target and leaves minimal forensic traces. This makes it extremely difficult to detect and even harder to attribute. These capabilities have made Pegasus attractive not only to state intelligence agencies but also to law enforcement and private intelligence contractors.According to investigations by Amnesty International and the Citizen Lab, Pegasus has been deployed in more than 45 countries. Confirmed and suspected clients include governments in Saudi Arabia, India, Mexico, Morocco, Rwanda, and Hungary. Targets have included journalists, opposition politicians, human rights advocates, election monitors, lawyers, and whistleblowers. In several documented cases, Pegasus was deployed ahead of major political events such as elections, protests, or high-profile leaks. It has been used to intimidate, monitor, or neutralize individuals who posed a threat to powerful interests.Pegasus is not just a surveillance tool. It plays a central role in a broader strategy of hybrid repression. This includes digital monitoring, legal harassment, psychological operations, smear campaigns, and in some cases, coordinated physical targeting. The tool has been used to preempt the release of information, sabotage legal strategies, compromise internal activist communications, and fracture trust within civil society networks.NSO Group maintains that it sells Pegasus only to vetted government clients for counterterrorism and criminal investigations. However, the evidence shows a repeated pattern of abuse. The export of Pegasus is regulated by Israel’s Ministry of Defense, but this oversight has failed to prevent misuse. Reports suggest that when NSO comes under scrutiny, it often rebrands or operates through shell companies to continue selling to questionable clients. There is little transparency regarding who buys Pegasus, under what terms, and with what safeguards.This is not a story about one rogue company. Pegasus is part of a global surveillance market that treats cyberweapons as commercial products. These tools are sold through classified bidding processes, diplomatic channels, and private security partnerships that evade meaningful regulation. Pegasus exemplifies how governments and private firms bypass both domestic laws and international norms in order to surveil and suppress their critics.The implications are severe. Pegasus enables governments and proxy actors to erase legal boundaries by reaching across borders into the private lives of civilians. It has given rise to a class of digital mercenaries: private contractors operating under the protection of state power and shielded from accountability. It undermines journalism, compromises attorney-client privilege, and threatens the integrity of democratic processes.Pegasus also has strategic value beyond surveillance. It disrupts organizing, neutralizes legal defense teams, and disorients political opposition. In modern asymmetric warfare, information and perception are as decisive as kinetic force (physical or military action). Pegasus provides a way to dominate information environments preemptively. It is used to suppress opposition before they speak rather than punish them after.This is why Pegasus remains in active use despite lawsuits, blacklistings, and international condemnation. Its architecture has been studied, copied, and redeployed by other firms, creating a competitive global marketplace for spyware. The threat has evolved beyond NSO Group.The next section will examine the broader ecosystem that supports this technology. It will explore the private security firms, legal loopholes, and cross-border data-sharing frameworks that sustain a global suppression architecture. Understanding Pegasus is only one step. To confront it, we must expose the system that allows it to thrive. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
56
Pegasus Series: Section 1. The Weaponization of Pegasus
Geneva, Switzerland In the shadow of public law and international norms, a silent war is being waged. It does not involve bombs or armies but code, signals, and silence. At the heart of this covert battlefield lies Pegasus, a military-grade spyware suite developed by the Israeli cyber-intelligence firm NSO Group. Since its emergence in the early 2010s, Pegasus has quietly become one of the most powerful surveillance tools in the world. Marketed to governments as a counterterrorism and law enforcement solution, it has instead become a tool of political repression, digital intrusion, and psychological destabilization.Pegasus does not need its target to click a link. It can silently infiltrate a smartphone through zero-click exploits, which require no action by the user. The spyware installs itself through missed calls, push notifications, or background system vulnerabilities. Once inside, it turns a device into a live surveillance hub. It captures calls, texts, encrypted messages, emails, photos, location data, and even microphone and camera feeds in real time. The victim does not know it is there. There are no warnings. Once active, Pegasus changes the entire landscape of digital threat.Despite global outcry and its inclusion on the U.S. Entity List in 2021, Pegasus remains active. It has been used against:* Journalists (including individuals within Jamal Khashoggi’s inner circle)* Human rights defenders* Opposition politicians* Whistleblowers, including victims like the very audience this article was written forIt has been linked to regimes in Saudi Arabia, Hungary, India, Mexico, Morocco, Rwanda, and others. These governments have used Pegasus to intimidate, monitor, and silence dissent. This is not an isolated misuse. Pegasus is not a rogue tool. It is part of a recurring pattern, embedded within a larger system of global suppression. Surveillance has been outsourced. Legal oversight has collapsed. Human rights are being reframed as national security threats.This series is not just a technical breakdown of Pegasus. It is an interrogation of institutional power, a primer for investigators, and a source of clarity for victims. It exists to:* Map out how Pegasus operates* Show how it intersects with global covert harassment networks* Expose the contractors, governments, and intermediaries who enable it* Offer practical defense strategies for those under digital siege* Demand international accountability for its usePegasus is not just a software product. It is a warning sign of what happens when militarized surveillance technology is deployed without oversight or ethical constraint. The systems meant to protect civil liberties are failing. This series is written to confront that failure, decode the architecture behind it, and push for the accountability that has so far been denied.In Section 2 of the Pegasus series, we dig into what makes this spyware so dangerous. From zero click exploits to full device takeover, Pegasus doesn’t just spy. It dominates. This next piece breaks down how it works, the global scale of its deployment, and the devastating reach of its surveillance powers. Countries, corporations, and contractors have used it far beyond its stated intent. This isn’t just about data. It is about control. Stay tuned. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
55
Pegasus Series: Section 5.3.3. COIN to Domestic
LuxembourgThe preceding sections established that modern surveillance systems function as operational tools rather than passive archives. Behavioral data is collected, fused across intelligence streams, and converted into risk scores that guide interventions. Pattern-of-life analysis, predictive modeling, and escalation thresholds transform everyday activity into signals within an operational system.Section 5.3.3 traces the doctrinal origins of that architecture. The operational logic underlying modern behavioral monitoring systems did not originate in civilian governance. It emerged from counterinsurgency warfare, where intelligence systems were designed to model civilian populations, detect behavioral anomalies, and intervene before threats materialized.During the wars in Iraq and Afghanistan, military planners developed intelligence frameworks intended to understand complex human environments and identify emerging threats before they became attacks. These frameworks combined large-scale data collection with behavioral analysis in order to detect signals within civilian populations.After the attacks of September 11, 2001, many of the doctrines, analytic tools, and institutional practices developed for those campaigns were gradually redirected inward through homeland security frameworks, intelligence coordination structures, and contractor ecosystems. What began as a strategy for managing insurgent populations abroad evolved into a model of domestic governance built around continuous monitoring, predictive analysis, and behavioral disruption.Understanding this transition requires examining how counterinsurgency doctrine was translated into analytic tools, institutional structures, and ultimately a domestic surveillance system that governs civilian populations through behavioral risk assessment.Counterinsurgency Doctrine and Population ControlCounterinsurgency warfare differs fundamentally from conventional military conflict. Traditional warfare focuses on defeating opposing armies and capturing territory. Counterinsurgency, by contrast, focuses on controlling the environment in which insurgents operate. The objective is not simply to defeat an enemy force but to shape the behavior of civilian populations whose support may sustain insurgent activity.In practice, this means that counterinsurgency doctrine treats populations themselves as the central terrain of conflict. Once populations are defined as terrain, their daily activities become variables that can be mapped, modeled, and analyzed in order to identify potential sources of instability.Military doctrine during the wars in Iraq and Afghanistan increasingly emphasized population-centric strategies. The doctrinal foundation for these approaches appeared most clearly in the United States Army and Marine Corps Counterinsurgency Field Manual FM 3-24, published in 2006 under the leadership of General David Petraeus. The manual argued that modern insurgencies are fought not primarily over territory but over the allegiance and behavior of civilian populations. In this framework, the population itself becomes the strategic center of gravity.Stabilizing contested environments therefore required detailed knowledge of local social structures, economic relationships, and daily patterns of life. Commanders sought to understand how communities functioned, who interacted with whom, and how information and resources flowed through local networks.Intelligence units were tasked with mapping communities, analyzing social relationships, and identifying behavioral indicators that might signal insurgent activity.The objective was predictive awareness. By understanding the routines and relationships within a population, military planners hoped to detect emerging threats before they manifested as attacks.These strategies required the collection and analysis of large amounts of behavioral data. Patrol reports, informant accounts, communications metadata, financial records, and geographic movement patterns were integrated into intelligence systems designed to model human environments. Analysts sought to construct a comprehensive picture of daily life within contested regions so that deviations from expected patterns could be detected quickly.During these campaigns, large intelligence platforms were developed to manage this data environment. Systems such as the Combined Information Data Network Exchange (CIDNE) and the Distributed Common Ground System (DCGS) integrated patrol reports, informant intelligence, communications metadata, and geospatial information into searchable databases.Analysts used these systems to reconstruct social networks, identify recurring movement patterns, and detect anomalies that might signal insurgent activity. These platforms represented early examples of large-scale behavioral analytics applied to human environments.A typical intelligence cycle in Iraq might begin with a patrol observation. A unit reports a vehicle repeatedly appearing near a supply route at unusual hours. The observation is entered into CIDNE alongside other patrol reports, communications metadata, and informant reporting. Analysts compare the vehicle’s movement patterns with existing data and identify connections to several previously mapped individuals. What initially appeared to be an isolated observation becomes part of a larger behavioral pattern. This process established a recurring operational template: baseline behavior is mapped, deviations are flagged as anomalies, and those anomalies trigger surveillance or intervention.This approach transformed intelligence gathering from episodic investigation into continuous environmental monitoring. Instead of focusing only on known insurgents, intelligence systems began tracking entire populations in order to identify potential threats through patterns of behavior.The result was the emergence of a new operational paradigm. Warfare was no longer defined solely by kinetic engagements between armed forces. It increasingly involved the management of civilian environments through information dominance and predictive analysis.Activity-Based Intelligence and Pattern AnalysisTo support these strategies, military intelligence units developed analytic techniques capable of processing large quantities of behavioral data. One of the most influential approaches was activity-based intelligence.Activity-based intelligence focuses on patterns rather than individual events. Instead of asking who committed a particular act, analysts examine the rhythms of everyday life within a monitored environment. Movement patterns, communication habits, economic transactions, and social interactions are aggregated into data streams that describe how a population behaves over time.Once a baseline of normal behavior is established, deviations from that baseline can be detected. A vehicle that appears repeatedly at unusual hours, a sudden change in communication patterns, or the emergence of new social connections may indicate the presence of insurgent activity.These signals do not constitute proof of wrongdoing. They function as indicators that guide further observation or intervention.The analytical power of activity-based intelligence lies in its ability to transform ordinary behavior into structured data. Every movement, communication, or transaction becomes a potential signal within a larger behavioral model.Over time, these signals accumulate into detailed portraits of social environments.This methodology required the integration of multiple intelligence streams. Human intelligence gathered through informants and patrol observations was combined with signals intelligence derived from communications systems. Financial intelligence revealed economic relationships, while open-source intelligence captured public discourse and emerging online networks.By fusing these sources together, intelligence systems could construct complex models of human networks and identify individuals whose behavior appeared anomalous or potentially threatening. Activity-based intelligence therefore provided a doctrinal and methodological template for later domestic systems that would apply similar behavioral modeling techniques to entire civilian populations. The same analytical logic would later underpin predictive policing programs, behavioral threat assessment systems, and large-scale data fusion platforms used within domestic security institutions.The Data Infrastructure Behind Modern SurveillanceModern surveillance systems operate because contemporary societies generate enormous volumes of digital data describing everyday life.Telecommunications metadata reveals communication networks. Location data derived from mobile devices records patterns of movement. Financial transaction systems produce detailed records of economic activity. Automated license plate readers track vehicle movements across transportation networks.Additional data streams come from biometric identification systems, border control databases, and commercial advertising platforms that monitor online behavior.When combined, these data streams allow analysts to reconstruct patterns of association, mobility, and economic activity across entire populations. The resulting datasets provide the raw material for the predictive models that underpin modern surveillance systems.Predictive Analytics and Behavioral ModelingAs computational capabilities expanded, intelligence institutions increasingly relied on predictive analytics to interpret the growing volume of behavioral data.Machine learning models and statistical algorithms were applied to identify correlations between observed patterns and previously documented security incidents.These systems do not determine intent. Instead, they estimate probabilities. Individuals whose behavior resembles patterns associated with prior security risks may be assigned elevated scores within analytical systems.Predictive models allow institutions to prioritize surveillance resources and focus attention on individuals or networks whose data patterns appear anomalous within the larger dataset.The Post-9/11 Homeland Security TransformationFollowing the attacks of September 11, the United States undertook a major reorganization of its domestic security architecture.The creation of the Department of Homeland Security brought together numerous federal agencies under a unified mandate focused on preventing future attacks.New institutional frameworks were created to support intelligence coordination. The Information Sharing Environment was established to facilitate communication between federal intelligence agencies, state and local law enforcement organizations, and private sector partners. Joint Terrorism Task Forces expanded nationwide, integrating federal investigators with local policing institutions.These institutions adopted analytic frameworks originally developed in counterinsurgency environments, where identifying potential threats within civilian populations was considered essential to preventing insurgent activity. Within domestic security systems this logic reframed cities and communities as environments where potential risks could be detected through behavioral signals long before any prosecutable offense occurred.Personnel Transfer and Institutional MemoryDoctrinal migration rarely occurs through written policy alone. It is often carried forward by the individuals who developed and applied the original methods.In the years following the wars in Iraq and Afghanistan, many military officers, intelligence analysts, and private contractors who had worked in counterinsurgency environments transitioned into domestic security roles.Some joined federal agencies within the Department of Homeland Security. Others moved into state and local law enforcement organizations. Many entered the private sector, working for defense contractors, cybersecurity firms, or data analytics companies that partnered with government agencies.Private contractors played an important role in this transition. Defense and intelligence firms that had supported military operations overseas increasingly provided analytic software, data integration tools, and advisory services to domestic security agencies.Through procurement contracts and technical partnerships, the expertise and infrastructure of wartime intelligence systems gradually became embedded within civilian governance institutions. Alongside the technical systems themselves, these actors carried a way of interpreting civilian environments as continuous fields of weak signals that might, under certain conditions, evolve into instability.Fusion Centers and the Institutionalization of Intelligence CoordinationOne of the most significant institutional developments in this transformation was the creation of intelligence fusion centers.Fusion centers were designed to facilitate information sharing between federal agencies, state and local law enforcement organizations, and private sector partners.Their purpose was to integrate data from multiple sources so that analysts could identify emerging threats more effectively.Within these environments, the analytic methods developed in counterinsurgency operations found a natural home.Fusion centers collected and processed diverse data streams including criminal records, communications metadata, financial transactions, and public reporting.These reporting programs encourage law enforcement officers, infrastructure personnel, and sometimes private citizens to document behaviors considered unusual or potentially indicative of risk, producing a civilian form of human intelligence reporting.These reports are combined with automated data streams such as license plate reader records, financial compliance reporting, and telecommunications metadata.A typical domestic example might involve an analyst reviewing Suspicious Activity Reports linked to a particular vehicle. License plate reader data reveals repeated travel between several locations. Financial records show transactions connected to those same locations. When integrated within analytic software, these records produce a behavioral pattern that may trigger additional monitoring or investigative attention.Analytical software organizes these inputs into searchable networks that allow analysts to visualize relationships between individuals, locations, and events.Feedback Loops and Self-Reinforcing SurveillanceModern predictive surveillance systems operate through feedback loops.Data collected from monitored populations is analyzed to identify patterns associated with potential risk. When individuals or networks are flagged within these systems, surveillance resources are often concentrated around them.This increased monitoring produces additional data, which may reinforce the system’s original assessment.As a result, predictive systems can become self-reinforcing over time. Individuals who enter surveillance environments may find that additional data collection continually confirms the analytical models that identified them in the first place. In a population-centric security framework, these feedback loops do not merely track suspected individuals; they gradually influence how entire communities are categorized, monitored, and governed. In effect, the population-centric surveillance logic developed during counterinsurgency campaigns becomes embedded within domestic governance systems.As domestic intelligence institutions expanded, the analytic methods developed in counterinsurgency environments increasingly relied on software platforms built by private contractors. Defense technology firms and data analytics companies began developing systems capable of integrating large data streams, mapping social networks, and generating behavioral risk assessments. Once encoded in software and analytic systems, these methods became transferable, allowing the operational logic of counterinsurgency intelligence to move beyond its original institutional environment and form the foundation for a rapidly expanding surveillance industry.From Battlefield Doctrine to Domestic GovernanceThe migration of counterinsurgency doctrine into domestic surveillance systems represents one of the most consequential shifts in modern security policy.Technologies capable of collecting vast quantities of behavioral data have converged with analytic frameworks originally designed to stabilize contested populations during overseas military campaigns.The result is a surveillance architecture that treats civilian environments as complex data landscapes to be continuously monitored, modeled, and managed.Systems originally designed to map insurgent networks and stabilize war zones now influence how governments monitor and manage civilian societies.The systems described throughout this series are therefore not simply products of technological innovation. They are the institutional descendants of a warfighting doctrine designed to monitor populations, detect instability, and intervene before threats emerge.The next section examines the institutional nerve centers that coordinate these systems. Fusion centers and related command structures serve as the hubs through which surveillance data is interpreted, operational decisions are made, and interventions are directed. They represent the organizational backbone of the architecture described throughout this series. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
54
Fools Rush In: Benjamin Netanyahu, Donald Trump, and a Needless War With Iran
LuxembourgI. “Fools rush in…”“Fools rush in where wise men never go.”The line is about recklessness mistaken for strength. It is about leaders who confuse escalation with resolve and impulse with strategy. It is difficult to find a clearer illustration than Benjamin Netanyahu and Donald Trump pushing the United States toward a needless war with Iran.This is not a routine political dispute. It is a structural rupture. When sitting leaders entertain regime change in a nuclear adjacent region, when military strikes are framed as opportunity rather than last resort, and when escalation is marketed as decisiveness, the stakes move beyond headlines. They enter the realm of generational consequence.A war with Iran would not be a contained tactical event. It would carry regional spillover, global economic shockwaves, and the ever present risk of miscalculation in an environment already saturated with weapons and proxies. Once those dynamics are unleashed, they are not easily managed. History is unequivocal on this point.The real danger is not simply that fools rush in. It is that they do so believing the aftermath can be choreographed. War does not respect branding. It does not follow campaign logic. And once it begins, the control leaders believe they possess becomes an illusion.II. This crossed into warInitial briefings described the strikes as strategic and surgical, designed to degrade specific capabilities. But classification does not rest on branding. It rests on structure.Three conditions determine whether an operation remains a discrete deterrent action or becomes war in a meaningful sense. First, sustained military engagement rather than a single isolated strike. Second, reciprocal retaliation by the targeted state. Third, political objectives that move beyond deterrence toward coercion or regime transformation.As of today, all three conditions are present.The operation is ongoing, not episodic. Iran has responded directly with missile strikes across the region, transforming unilateral action into active state on state combat. And public statements from leadership have signaled ambitions that extend beyond degrading facilities to reshaping the political future of Tehran itself.At that point, the “surgical strike” language no longer defines the reality. The tool may have been precise. The trajectory is not. Sustained engagement plus retaliation plus transformative aims equals war dynamics.Iran is not a peripheral actor with limited reach. It possesses layered military capabilities, regional networks, and asymmetric tools. Any expectation that escalation could remain contained misunderstands both capacity and history. Once reciprocal force is normalized, the ladder of escalation becomes the governing logic.The question is no longer whether the first strike was narrow. The question is whether leaders have opened a conflict cycle whose consequences extend far beyond the initial target set.III. The Bet: Containment Rhetoric, Transformative AmbitionEvery war begins with a theory.The theory being advanced here is that force can be applied in a controlled manner to degrade Iran’s capabilities, signal strength, and potentially catalyze political change inside Tehran without triggering uncontrollable escalation. It assumes that precision strikes, even if sustained, can remain bounded. It assumes that retaliation can be absorbed or deterred. It assumes that internal fractures within Iran can be widened under external pressure.That is a high stakes wager.Prime Minister Netanyahu has long argued that Iran represents an existential threat that must be confronted directly rather than managed indefinitely. President Trump has moved beyond deterrence language and spoken openly about regime change as a desirable outcome. When leaders signal that the objective is not merely to blunt military capacity but to reshape a government, the scope of the operation expands. Regime change is not a tactical goal. It is a structural one.The contradiction is obvious. You cannot simultaneously present an operation as narrowly surgical while articulating ambitions that require deep political destabilization. Degrading a facility is one thing. Transforming a state is another. The tools required for the latter inevitably generate broader confrontation.Iran is not a minor power with limited capacity for response. It possesses conventional forces, missile capabilities, entrenched regional partnerships, and asymmetric tools that can be activated across multiple theaters. Any assumption that pressure will produce rapid internal collapse rather than layered retaliation rests on a reading of history that is, at best, selective.This is the core gamble: that escalation can be choreographed. That retaliation can be contained. That regime transformation can be nudged from the outside without igniting a wider regional war. Leaders often believe they can calibrate violence precisely enough to achieve political objectives without triggering systemic blowback.History suggests otherwise.When political ambition exceeds operational restraint, escalation becomes self reinforcing. Once reciprocal force is underway and transformative objectives are declared, the conflict acquires momentum independent of its architects. At that point, events begin to shape leaders rather than the reverse.IV. Consequences That Were Flagged, Not UnforeseenWar does not unfold in a vacuum. It radiates outward.Once reciprocal force is normalized, escalation becomes interactive rather than unilateral. Each side responds not only to what has happened, but to what it anticipates may come next. In that environment, miscalculation is not an anomaly. It is a structural risk.The regional exposure is immediate. Iran’s military posture is not confined to its borders. It is layered through partnerships, proxies, and influence networks stretching into Lebanon, Syria, Iraq, and beyond. Gulf states host U.S. bases. Shipping lanes in the Strait of Hormuz remain critical arteries for global energy supply. When missiles move across that geography, containment becomes a hope rather than a guarantee.Economic shock is not a secondary concern. Energy markets respond to instability quickly. Insurance rates for shipping rise. Supply chains adjust defensively. Even limited disruptions in the Gulf can ripple into fuel prices, inflationary pressure, and financial volatility far beyond the Middle East. Those costs are rarely included in the rhetoric of decisive action.Civilian exposure is also predictable. Precision munitions reduce indiscriminate destruction, but they do not eliminate risk. Retaliatory strikes, infrastructure damage, cyber operations against utilities, and proxy engagements all increase the probability of civilian harm. Displacement follows instability. Regional humanitarian systems, already strained, absorb the impact.None of this is novel analysis. Regional experts, military planners, and diplomatic officials have warned for years that direct confrontation with Iran would likely trigger multi theater consequences. The risks were catalogued. The escalation ladders were studied. The economic vulnerabilities were mapped.The language of surprise often follows escalation, as if events exceeded imagination. But the likely pathways were not hidden. They were acknowledged and then discounted in favor of optimism about control.The core error is not ignorance. It is overconfidence. Leaders convince themselves that force can be calibrated precisely enough to achieve political aims without triggering systemic reaction. Yet once multiple actors are engaged across multiple theaters, control becomes distributed. Decisions made in one capital produce consequences in another.War’s most dangerous feature is not its opening strike. It is its momentum.V. War Powers and Democratic LegitimacyIn the United States, the power to declare war does not belong to a single individual. It belongs to Congress.That allocation was not accidental. The framers understood that decisions to initiate sustained armed conflict carry generational consequences. They placed the authority to declare war in the legislative branch precisely to slow the process down. Deliberation was a safeguard, not an inconvenience.When military action expands beyond a discrete defensive response and moves into sustained engagement with retaliatory exchange, the constitutional threshold is crossed. At that point, continued escalation without explicit congressional authorization raises serious legitimacy concerns.This is not a technicality. It is a structural check on executive power.Modern presidents have steadily expanded their interpretation of commander in chief authority. Authorizations passed for one conflict are stretched to justify another. Emergency powers become normalized. Precedent accumulates. Each instance may be defended as exceptional. Collectively, they erode the boundary between defensive action and undeclared war.The danger is not only legal. It is democratic.When a nation moves into sustained armed conflict without formal debate and authorization, citizens are effectively repositioned as spectators rather than participants in the most consequential decision a state can make. The costs in blood, treasury, and stability are socialized. The decision making is centralized.War powers drift is one of the clearest markers of modern executive overreach. It does not announce itself dramatically. It advances incrementally, justified by urgency, necessity, and national security. But once normalized, it reshapes the constitutional balance in ways that outlast the conflict that triggered it.If this conflict continues along its current trajectory, Congress must either formally authorize it or confront the reality that war making authority has effectively migrated to the executive branch.That migration would not simply be a process failure. It would be a democratic one.VI. How War Supercharges Modern RepressionExternal war has internal consequences. It always has.When a state enters sustained armed conflict, the vocabulary of emergency expands. National security becomes the dominant frame. Threat perception intensifies. In that environment, authorities that might otherwise face resistance are justified as temporary necessities.History shows that they rarely remain temporary.Surveillance authorities broaden first. Intelligence sharing accelerates. Watchlists expand. Data collection programs justified as counterterrorism or force protection are widened to capture domestic dissent that is framed as destabilizing or disloyal. The threshold for scrutiny lowers when the nation is told it is under threat.Public dissent also becomes more vulnerable. Anti war voices can be labeled naïve, irresponsible, or sympathetic to the adversary. Journalists questioning strategy can be portrayed as undermining morale. Whistleblowers can be characterized as security risks rather than accountability actors. The shift is subtle at first. Criticism becomes suspect rather than civic.Emergency powers provide additional cover. Executive discretion grows under the logic of urgency. Temporary measures are renewed. Sunset clauses are extended. Programs launched for battlefield intelligence bleed into domestic monitoring under the banner of prevention. What begins as foreign threat mitigation becomes internal risk management.The expansion is not always dramatic. It is incremental and bureaucratic. A new data sharing agreement here. A broadened definition of material support there. An expanded interpretation of what constitutes foreign influence or coordination. Each step can be defended in isolation. Collectively, they alter the relationship between citizen and state.War also creates a political climate in which oversight weakens. Legislators are reluctant to appear obstructive during active conflict. Courts defer more readily to executive claims of necessity. Media narratives concentrate on operational updates rather than structural critique. The ecosystem of accountability narrows.The result is predictable. External confrontation strengthens internal security architecture. The tools built or expanded during wartime rarely disappear when hostilities cool. They are institutionalized. They are budgeted. They become part of the permanent apparatus.Every missile launched abroad expands more than a strike radius. It expands the discretionary space of the security state at home.VII. The Contractor Surge: War as Market ExpansionModern war is not fought by states alone. It is administered through contracts.Private military and security contractors now occupy roles once reserved for uniformed personnel. They handle logistics, base security, intelligence analysis, cyber operations, drone maintenance, data processing, infrastructure protection, and information operations. They are embedded in the operational bloodstream of contemporary conflict.A sustained campaign against Iran would not simply mobilize troops. It would mobilize procurement.As theaters expand, so do contracts. Forward operating bases require perimeter security. Intelligence flows require analysis. Cyber operations require private technical capacity. Missile defense systems require maintenance. Surveillance platforms require data management. Each escalation stage generates additional task orders, new scopes of work, and expanded budgets.War is not only a geopolitical event. It is a revenue event.The accountability gap widens accordingly. Contractors operate in layered jurisdictions, often shielded by contractual complexity, classification barriers, and diffuse chains of command. When abuses occur, responsibility can be blurred between state direction and private execution. Victims struggle to identify the proper defendant. States can distance themselves from operational conduct by pointing to outsourced actors.The expansion is not limited to kinetic operations. Information operations and digital surveillance scale rapidly during conflict. Monitoring of diaspora communities intensifies. Online platforms become battlegrounds for narrative control. Data analytics firms feed threat assessments. Private cyber firms engage in offensive and defensive campaigns under government contract. The boundary between public authority and private capacity becomes porous.War accelerates this integration.Budgets that might face scrutiny in peacetime pass under the banner of urgency. Oversight mechanisms lag behind rapid procurement. Emergency contracting procedures reduce transparency. The result is a larger, more entrenched private security ecosystem embedded within state power.Once established, these networks rarely contract back to their prewar footprint. Contracts are renewed. Capabilities are repurposed. Infrastructure remains. What began as contingency becomes permanence.In this sense, war does more than shift borders or degrade facilities. It deepens reliance on private military and security contractors, who are structurally harder to supervise, litigate, and restrain.Every escalation abroad expands not only the reach of the state, but the reach of the firms that operate alongside it.VIII. From Battlefield to Diaspora: How War Narratives Enable Transnational RepressionWar does not stop at borders. Neither does repression.When a state frames a conflict as existential and transformational, that framing travels. It shapes how diaspora communities are perceived. It alters how foreign nationals, dual citizens, journalists, and human rights advocates are categorized. Suspicion expands outward from the battlefield into civilian life.Wartime narratives create convenient labels. “Foreign influence.” “Security risk.” “Proxy activity.” These terms, once activated in a climate of fear, can be applied broadly. Diaspora communities become objects of heightened monitoring not because of individual conduct, but because of proximity to a geopolitical adversary.This is where contractor expansion intersects directly with cross border repression.Private intelligence firms, cybersecurity contractors, data analytics companies, and security consultants are often engaged to monitor online activity, map networks, assess diaspora sentiment, and identify perceived influence pathways. The justification is force protection, counterintelligence, or narrative stability. The practical effect is expanded surveillance of civilian communities far removed from active combat zones.Victims are rarely combatants. They are students, business owners, journalists, academics, refugees, or activists whose only “proximity” to conflict is heritage, language, or political speech. Yet in a wartime environment, that proximity can become grounds for scrutiny.Accountability becomes even more difficult in this cross border space. When monitoring, intimidation, or coordinated pressure occurs, responsibility can be diffused across governments, contractors, and informal intermediaries. Victims attempting to seek redress confront jurisdictional complexity, classification barriers, and the challenge of proving coordination between public authority and private execution.War rhetoric amplifies this dynamic. Dissent can be reframed as alignment with the adversary. Advocacy can be recast as influence activity. Reporting can be characterized as destabilization. The line between protected political expression and perceived foreign threat narrows.Transnational repression thrives in this ambiguity.What begins as external confrontation creates a justificatory environment for expanded monitoring beyond national territory. Contractors provide the technical capacity. Governments provide the narrative frame. Diaspora communities absorb the pressure.The danger is not only that war expands violence abroad. It is that it widens the category of who can be treated as adjacent to that violence at home and abroad. Once foreign threat framing becomes elastic, civilians with cross border ties can find themselves mapped, flagged, or targeted under the logic of security.This is not a hypothetical risk. It is a pattern observed repeatedly in periods of sustained conflict. Wartime narratives make extraordinary measures appear ordinary. They lower the political cost of surveillance. They raise the social cost of dissent.For victims of transnational repression, war is not an abstraction. It is an accelerant.X. Refusing to Rush In“Fools rush in where wise men never go.”The line is not about cowardice. It is about impatience masquerading as strength. It is about leaders who mistake speed for clarity and escalation for resolve.What has unfolded is not simply a military episode. It is a convergence. Sustained armed conflict. Expansive political ambition. Constitutional shortcuts. Emergency logic. Contractor surge. Transnational repression. Each layer reinforces the next.War abroad expands power at home. It widens surveillance authorities. It deepens the integration of private military and security contractors into core state functions. It lowers the political cost of treating dissent as risk. It stretches the boundary between public authority and private military and security contractors until the line is difficult to see.None of this was unknowable. The escalation ladders were studied. The institutional risks were documented. The constitutional guardrails were written down centuries ago. The tools of restraint were available.The question now is not whether the opening strikes were described as surgical. The question is whether a society will allow the logic of escalation to harden into permanence.Citizens are not required to cheer. Nor are they required to fall silent. They are entitled to demand authorization before war, limits during war, and accountability after war. They are entitled to insist that private military and security contractors remain subordinate to public law and democratic oversight. They are entitled to resist the quiet normalization of emergency as governance.Every missile launched at Iran carries more than explosive force. It carries contracts, expanded authorities, and narratives that travel far beyond the battlefield.Fools may rush in. The rest of us do not have to follow. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
53
Moving Toward Strasbourg: A Possible Path to the European Court of Human Rights
Luxembourg, LuxembourgAn updated audio version of this piece will be added here in a future update for listeners who prefer to follow by podcast.Moving Toward Strasbourg: A Possible Path to the European Court of Human RightsFor the first time since this began, I am close to securing counsel who may be willing to represent my case before the European Court of Human Rights (ECtHR). The case would be brought against Luxembourg under Articles 2, 8, and 13 of the European Convention on Human Rights, with Article 3 potentially engaged at a later stage if the evidentiary bar can be met.Why Articles 2, 8, and 13?Article 2 protects the right to life. In my situation, the combination of toxic exposures, ongoing risks to my health and survival, and the authorities’ refusal to investigate or to put basic safeguards in place engages the State’s positive obligation to protect life. The issue is not only what has already happened, but the continuing risk that remains unaddressed.Article 8 protects the right to respect for private life, which the Court has consistently interpreted to include bodily integrity, health, and aspects of personal security and privacy. The pattern of intrusions, surveillance‑related concerns, and chemically‑mediated harm goes directly to my physical and psychological integrity and to my ability to live a minimally private and autonomous life.Article 13 guarantees the right to an effective remedy. This is where the structural problem is most visible: despite approaching all the authorities that should, on paper, be able to act (police, ministries, asylum authorities, data‑protection bodies, the medical system), no complaint has been registered, no investigation opened, and no decision taken. There is nothing to appeal because the harm is not even recognized as something the system can process. The “illegibility” of the harm is exactly why Article 13 is engaged: in practice, no effective remedy exists.Why Article 3 is harder (for now)Article 3 prohibits torture and inhuman or degrading treatment. On a human level, that is the language that comes closest to what this has been. Legally, however, the threshold is extremely high: the Court looks for clear, corroborated, and usually quite detailed evidence about severity, intention, and pattern. It is possible that Article 3 could be argued later, especially if the evidence base around chemical exposures and deliberate targeting becomes stronger, but for now the safer and more realistic core is Articles 2, 8, and 13.Exhaustion of remedies when the harm is “illegible”To reach Strasbourg, you normally have to exhaust “effective” domestic remedies and then apply within four months of the final national decision. My problem is that there is no final decision because there is no decision at all. The authorities have effectively said: we don’t have the tools, protocols, or competence to deal with this.That leaves me in a legally paradoxical space: I am told I must exhaust remedies that do not exist in practice. There are no formal refusals or judgments to challenge; there is only systemic inaction. The very absence of a mechanism capable of producing a decision becomes the core of the Article 13 claim and the exhaustion of remedies argument: when a State cannot even recognize a category of harm, it cannot credibly insist that the victim keep climbing a ladder that isn’t there.Why Strasbourg before the UN?There are UN treaty body complaint procedures that could, in theory, address some aspects of this situation. But there are two key constraints:* You generally cannot litigate the same matter simultaneously in Strasbourg and before a UN body.* ECtHR judgments are binding on the State and carry a different kind of legal and political weight inside Europe than UN views, which rely heavily on voluntary compliance.If a case were accepted and decided by the ECtHR, Luxembourg would be under a binding obligation to comply with the judgment, including any findings about its duty to protect someone who has sought international protection on its territory. Beyond Luxembourg, other Council of Europe and EU states watch Strasbourg closely and often adjust their own laws and policies when the Court clarifies positive obligations especially on issues like protection, investigation, and regulation of private military and security actors.By contrast, UN procedures can be powerful as advocacy tools, but any “decision” they issue is formally non‑binding. That does not make them irrelevant, but if you have to choose where to go first with a single, precedent setting case, Strasbourg is the forum that can most directly force change in a European state’s behavior and create leverage within EU structures.Why this matters beyond my own safetyA successful ECtHR case here would not be just about one person. It would test, in a concrete way, what European states owe to people on their territory when harm is mediated through private military and security contractors or other deniable actors, using methods that current systems struggle to see.A judgment would not bind the United States or any non‑European state directly. But it would:* Bind Luxembourg to protect, investigate, and provide an effective remedy.* Increase pressure on EU institutions and member states to regulate private military and security contractors more seriously and to stop hiding behind the “we don’t see it, so it doesn’t exist” defense.* Provide a legal tool and reference point for others facing similar forms of outsourced, chemically‑mediated, or technologically‑mediated harm.One shot, long timelines, and the politics of embarrassmentAn ECtHR application is not quick. Realistically, a case can take anywhere from one to five years, sometimes more. There is no appeal from a final judgment. You get one serious shot, which is why it is so important to frame the facts and the law correctly the first time.But the mere act of filing can have effects well before judgment. Once a case is on the Court’s docket, the State knows that its conduct is being documented and examined. The prospect of eventual public scrutiny and the risk of being shamed as a state that failed to protect a human rights defender or asylum seeker can sometimes push authorities to move faster: to open investigations that they had been avoiding, to mitigate the most obvious risks, to quietly adjust practices. Even the potential for embarrassment can become a form of protection.The gap between rhetoric and reality on human rights defendersLuxembourg and EU institutions regularly affirm, in their laws and policy documents, that human rights defenders are “vulnerable” and should receive special consideration and protection. On paper, my profile fits that category exactly. In practice, none of these safeguards have been triggered. The mechanisms that supposedly exist to protect people like me are rhetorical, conceptual, and procedural but they are not practically accessible when the harm falls outside familiar categories.That gap between what is promised and what is actually available is precisely what an ECtHR case under Articles 2, 8, and 13 would force into view.Right now, nothing is guaranteed. I am still in the stage of testing whether specialized counsel is willing to take on a case built on these legal theories and this kind of evidentiary pattern. But this is the closest I have come to a real path toward a binding decision, and to transforming an “illegible” pattern of harm into something that European law is obliged to see.None of this is a free choice. The public and private actors involved have already escalated to toxic exposure, coordinated harassment, and what amounts to slow, extrajudicial elimination. They have not stopped when I stayed quiet, when I tried domestic channels, or when I limited myself to “lesser” remedies. At that point, using the only binding regional mechanism available is not bravado; it is the minimal act of self‑preservation still open to me. Even if a European Court case takes years and I do not live to see the judgment, the fact that it was initiated and that reprisals continued in its shadow will itself become part of the evidentiary and political record they cannot fully erase. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
52
The Hotel - Part 1 of My Testimony Series
This is Tamara Dixon from Luxembourg.The hotel.I’m recording this from a hotel.I’m here because I cannot stay in the housing that was assigned to me as part of my asylum process.While I was in the assigned housing, I experienced repeated coordinated harassment and physical symptoms consistent with toxic exposure.Before leaving I asked for assistance through available channels.I reached out to the agency responsible for the facility, Ona.to Passarelle, the legal NGO, that assists asylum seekers and to the Red Cross, among others.Um, and you can find those letters on my substack in their entirety.I reported that I did not feel safe and explained what I was experiencing.The response I received was consistent.I was told that I was safe and that I should remain where I was.I was also told explicitly that all asylum seekers are required to stay in housing, and that no non communal housing exists.I requested non communal housing for my safety and security, and I was told that no such option was available.In EU law and in Luxembourg’s public commitments, there is formal recognition that human rights defenders exist and face specific risks.Agencies like Ona, the Red Cross, and Pasorel are aware of this language.But inside the asylum accommodation center, none of that translated into protection.In practice, there was no mechanism I could trigger as a human rights defender, to make the harassment stop, or to access safer non-communal housing.The protection framework existed in theory and in policy documents, but not in any concrete usable form in my case.The conditions did not change.At that point, staying was no longer tenable.I made the decision to leave, knowing there may be consequences, including the possibility that I might not be allowed to return.For me, returning to a place I could not safely remain in, did not meaningly change my situation.I did not know what would happen next, and I still do not know.I’m addressing that as it comes.Being in a hotel does not mean there is no harm.I’m still experiencing physical symptoms consistent with toxic exposure.I’m not discussing mechanisms or tactics in this episode.What has changed is that I have more control over certain variables, including not being in an overcrowded space, where exposure cannot be managed at all.I will discuss the role of hotels as a tactic in a separate episode.I will also discuss the um, conditions of the accommodation facility in a separate episode.This episode is about why I left assigned housing and why I am here now. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
51
Authoritarianism Didn’t Arrive. It Was Outsourced. How Democracies Quietly Built a Shadow Repression System
Luxembourg, LuxembourgPublic unease over increasingly militarized responses to dissent in city streets, viral footage of protesters injured or killed, and international condemnation of the United States have converged into a single, unsettled moment. The country that once sold itself as a template of liberal democracy now appears, even to many of its own citizens, as a cautionary example. The dominant explanation is familiar: this is what happens when the wrong leaders win, when norms erode, when emergency powers are abused. If the right people return to office and the courts hold the line, the story suggests, the system can still correct itself.That story misidentifies the problem and the timeline.What people are reacting to now is not the arrival of authoritarianism, but its sudden legibility. The system producing these outcomes has been operating for two to three decades, largely outside public attention, through privatization, contracting, and the steady erosion of democratic oversight. Coercive functions that once sat squarely inside public institutions have been distributed across private security firms, data brokers, cyber‑intelligence vendors, and weapons manufacturers that enjoy the powers of the state without its obligations. By the time militarized police and ICE agents rolled into protest zones, the legal and commercial architecture that made those deployments possible was already mature.The question is no longer whether authoritarianism might arrive, or which election might tip the balance. The question is why a system of outsourced coercion was allowed to entrench itself so deeply, with so little scrutiny, that most people only recognized it once it started spilling into plain view.Outsourcing Coercion as GovernanceOnce you stop looking only at elections and speeches and start looking at contracts, a different picture of power comes into view. Private military and security contractors, intelligence consultancies, mercenary spyware vendors, data brokers, and weapons manufacturers now operate as extensions of state power. They design and run surveillance systems, provide intelligence analysis, operate and secure detention facilities, move people in custody, maintain data platforms, and supply the tools that make coercive force possible. Yet they sit outside the core constitutional and administrative frameworks that were built to govern policing, prosecution, and punishment.What has been delegated is no longer just execution, but governance itself. This includes the authority to shape how threats are defined, how risk is scored, how populations are sorted, and when coercive measures are triggered.The appeal of this arrangement is not a mystery. Outsourcing allows governments to access capacities that are controversial, legally constrained, or politically costly to build internally. A contractor can ingest and correlate data that a public agency would struggle to collect under existing privacy law. An intelligence or cyber surveillance firm can offer intrusion tools and monitoring services that would be difficult to justify if they were openly branded as government hacking. Private prison and security companies, operating as part of the broader private military and security industry, can staff and run immigration detention centers and provide armed transport of detainees under contract. In doing so, they perform core custodial functions while remaining formally outside the state’s uniformed services.The regulatory gray zone surrounding these actors is not incidental. It has been cultivated over time because it delivers three advantages: plausible deniability, fragmented accountability, and distance. When a state contracts out surveillance, detention, or intelligence work, it can claim that it is merely purchasing a service in the market. When abuse occurs, officials can point to compliance with procurement rules and contractual terms while insisting that any excesses reflect vendor misconduct. The vendor, in turn, can point back to the contract, the tasking authority, or classified instructions that cannot be publicly discussed. Responsibility becomes a moving target rather than a fixed point.In practice, this means that some of the most sensitive coercive functions are now mediated through legal instruments such as framework agreements, task orders, and service level guarantees that are shielded from public view. Non disclosure clauses prevent staff from speaking openly. Trade secret claims and security classifications block access to technical documentation. Even basic questions, including who designed this system, who controls the data, and who decides when it is activated, are answered, if at all, inside procurement offices and contract management units rather than in legislatures or open court.Crucially, this is not just about hardware or isolated projects. It is about the gradual transfer of expertise and decision making authority. Intelligence agencies that once relied on internal analysts now lean on private consultancies for targeting, risk scoring, and strategic assessments. Law enforcement bodies that once built their own databases now license access to commercial platforms run by data brokers who aggregate location, financial, and communications data across jurisdictions. Governments that might once have hesitated to run certain operations directly now rely on intelligence vendors and commercial spyware firms to reach opponents, dissidents, or perceived threats at home and abroad.Outsourcing does not reduce state responsibility in any meaningful moral sense. It obscures it in a legal and political sense. The state still commissions, funds, and benefits from the work. What changes is the visibility of the chain between decision and effect. When coercive power is exercised through private intermediaries that operate across borders and legal regimes, constitutional constraints weaken, not because the law has formally disappeared, but because it no longer has a clear object to grasp.This is why accountability fractures and victims struggle to find recourse. When decisions, data, and force are distributed across agencies and vendors, no single institution can be compelled to answer for harm. Those subjected to coercive measures are left without a clear path to investigation, remedy, or redress.Because this system is embedded in long term contracts, procurement pipelines, and transnational markets, it does not reset with elections or leadership changes. Administrations come and go, but the infrastructure of outsourced coercion persists, ready to be activated by whoever inherits it.The Accountability VacuumAbuses that arise from privatized and militarized enforcement rarely result in consequences, not because they are rare or ambiguous, but because the system that produces them is structured to defeat accountability at every stage. Responsibility is dispersed across agencies, contractors, subcontractors, and classified authorities in ways that make it difficult to identify a single decision maker, a single legal forum, or even a complete factual record.Several structural mechanisms sustain this vacuum. Indemnification clauses routinely shift financial and legal risk away from contractors and back onto the state, insulating private firms from liability while preserving their incentives. Non disclosure agreements and mandatory arbitration provisions restrict what harmed parties, employees, and even public agencies can reveal, preventing the creation of public records or binding precedent. Operational rules, deployment criteria, and technical capabilities are often classified or treated as trade secrets, placing the most relevant evidence beyond the reach of courts, journalists, and oversight bodies.Jurisdictional fragmentation compounds the problem. It is frequently unclear whether alleged abuses fall under federal, state, administrative, or international law, or whether any forum has clear authority to compel disclosure. Agencies defer to vendors. Vendors defer to contracts and tasking authorities. Oversight bodies cite limits on jurisdiction or access. Each deferral delays scrutiny, allowing evidence to decay and public attention to move on.Even when civil rights investigations are opened, they tend to be narrow in scope and slow in execution. They rely heavily on agency cooperation and rarely penetrate the contractual and technical layers where key decisions are made. Procurement processes, contract management offices, and classified guidance remain largely insulated from adversarial review, even though they shape outcomes as decisively as on the ground actions.The result is a system in which harm can occur without producing an accountable event. There is no mandatory incident reporting comparable to other high risk domains. There is no independent investigative body empowered to examine contractor mediated coercion across agencies. Patterns that would trigger systemic reform in other sectors are instead treated as isolated incidents or unfortunate byproducts of complexity.This is not an accidental failure of oversight. It is the functional outcome of a governance model that diffuses power while concentrating its effects. When coercive authority is exercised through layered contracts and opaque authorities, accountability becomes optional rather than obligatory. The absence of findings is then misread as the absence of abuse, reinforcing a cycle in which violations persist without consequence.Victims Without InfrastructureWhen coercive power is exercised through privatized and opaque systems, harm does not disappear. What disappears is the pathway for recognizing it. Victims exist, but there is no stable infrastructure to identify them, document what happened to them, or provide remedy. Instead of a system designed to surface violations, there is a system designed to absorb them.Targets of contractor mediated surveillance, harassment, detention, or force encounter a landscape with no clear entry point. There is no standardized reporting mechanism for individuals who suspect they have been subjected to covert surveillance, coordinated harassment, or data driven targeting. There is no independent forensic body tasked with examining civilian claims involving commercial spyware, data brokerage, or contractor run systems. Individuals are left to infer what has happened to them from fragments, disruptions, and consequences, without access to the underlying systems that produced those effects.This absence of infrastructure creates a reversal of burden. Rather than institutions being required to justify the use of intrusive power, individuals are forced to prove harm without access to evidence. They are asked to identify perpetrators who operate through layered contracts and classified authorities. They are expected to demonstrate causation in environments where data, logs, and decision criteria are proprietary or secret. The result is not due process, but exhaustion.For journalists, lawyers, activists, migrants, whistleblowers, and organizers, this produces a familiar pattern. When they seek help, they are redirected between agencies that disclaim responsibility. Civil remedies require naming a defendant and producing evidence that is inaccessible by design. Administrative complaints are filtered through offices that lack jurisdiction over contractors. Criminal thresholds are rarely met, not because harm is absent, but because intent and attribution are structurally obscured.Families of those harmed or killed face a similar inversion. Instead of automatic, independent investigation into the use of force or coercive measures, scrutiny is often redirected toward the victim. Backgrounds are examined. Associations are questioned. Narratives are reframed around threat, noncompliance, or complexity. In the absence of transparent records, official accounts dominate by default, even when evidence is partial or contested.The lack of victim infrastructure also prevents pattern recognition. Each incident is treated as isolated. Data is not pooled across agencies or contractors. Lessons are not learned because they are not formally recorded. In other sectors involving high risk and potential harm, recurring incidents would trigger mandatory reviews and systemic reform. Here, recurrence is normalized as noise.This vacuum has predictable effects. Harm escalates because it is not interrupted. Targets self censor, withdraw, or leave their professions. Communities learn that visibility carries risk without protection. The absence of remedy functions as a signal, reinforcing the power of the system even when force is not actively applied.Victims without infrastructure are not an unintended byproduct of this model. They are its logical outcome. A system that disperses responsibility while concentrating coercive capacity cannot simultaneously offer meaningful protection to those it harms. The absence of pathways for recognition and relief is not a gap to be filled later. It is a condition that allows the system to continue operating without confrontation.Leaders as Products of the SystemPublic debate often treats authoritarian outcomes as the result of individual leaders. Attention focuses on personalities, rhetoric, and alleged crimes, with the implicit assumption that removing a particular figure restores democratic equilibrium. This framing is inadequate. It misidentifies the source of durability and misunderstands how power now operates.Leaders who deploy or benefit from coercive systems do not invent those systems. They inherit them. By the time a head of state or senior official enters office, the architecture of surveillance, privatized enforcement, detention, and intelligence contracting is already in place. Legal authorities have been interpreted. Contracts have been signed. Capabilities have been built and normalized. What appears as exceptional conduct is often the routine activation of existing tools.This is why allegations of serious abuse or illegality do not reliably produce accountability at the leadership level. The same diffusion that shields contractors also shields decision makers. Responsibility is distributed across agencies, legal opinions, classified directives, and private intermediaries. Each layer provides insulation. Actions can be justified as reliance on expert advice, inherited policy, or national security necessity. The system produces plausible deniability at the top as effectively as it does at the operational level.Privatization plays a central role in this insulation. When coercive capacity is mediated through vendors, leaders can authorize outcomes without authoring methods. They can approve objectives while remaining formally distant from implementation. This distance is not merely political. It is legal. Decisions are filtered through procurement processes and delegated authorities that fragment causation and complicate attribution.The persistence of leadership impunity across administrations reflects this structure. Changes in party control or electoral outcomes rarely dismantle the underlying machinery. New leaders inherit the same intelligence relationships, the same detention contracts, the same surveillance platforms, and the same legal interpretations. Even when rhetoric shifts, capabilities remain. The system is designed to survive political turnover.This continuity also explains why focusing on individual prosecutions or removals feels unsatisfying. Even when leaders are sanctioned, censured, or voted out, the architecture that enabled abuse remains available to their successors. The problem is not a shortage of norms or ethics at the personal level. It is a governance model that converts exceptional power into standard operating procedure.Understanding leaders as products of the system does not absolve them of responsibility. It clarifies the scale of the problem. Accountability that stops at individuals without dismantling the structures they command will always be partial. The question is not only who authorized harm, but what kind of system makes authorization routine, survivable, and repeatable.Until that system is confronted directly, leadership change will function as rotation, not reform. Faces will change. The machinery will not.Naming the FailureWhat this essay describes is not a temporary deviation from democratic governance, nor the excesses of particular leaders, nor a crisis that can be resolved through electoral correction alone. It is a sustained governance failure that unfolded gradually, through outsourcing, secrecy, and market logic, and was normalized long before it became visible to the broader public.Authoritarianism did not arrive suddenly. It was operationalized. Coercive power was disaggregated into contracts, platforms, and services. Surveillance, detention, targeting, and force were treated as capabilities to be purchased and managed rather than as extraordinary authorities requiring constant democratic justification. Legal ambiguity was not an oversight. It was a feature that allowed power to be exercised without clear ownership or consequence.Three assumptions made this possible. The first was that privatization reduces state responsibility. In practice, it redistributed responsibility in ways that made it harder to trace and enforce. The second was that secrecy enhances security. In practice, secrecy shielded routine governance decisions from scrutiny and insulated abuse. The third was that individual bad actors are the primary risk. In practice, systems built to survive leadership change ensured continuity regardless of who occupied office.The result is a security state that can harm without recognition, operate without accountability, and persist without reform. Victims are rendered administratively invisible. Sanctions and scandals absorb pressure without altering structure. Leadership change rotates personnel without dismantling machinery. Each component reinforces the others.Naming this failure matters because it clarifies what meaningful response would require. It would require treating contractor mediated surveillance, detention, and harassment as civil rights issues with standing, discovery, and enforceable remedies. It would require regulating private military and security companies, intelligence vendors, and spyware firms as hazardous industries, subject to licensing, mandatory incident reporting, independent audits, and strict liability for misuse. It would require creating independent investigative bodies with authority that crosses agencies and contractors, and establishing real infrastructure for victims to be heard, protected, and compensated.None of this is radical. Comparable regimes exist for aviation, nuclear energy, pharmaceuticals, and other domains where harm is foreseeable and unacceptable. What is exceptional is the continued exemption of coercive power from comparable governance simply because it is labeled security.International efforts to regulate private military and security companies and commercial surveillance remain partial and delayed. That delay itself confirms the argument of this essay. Normalization preceded regulation. The system was allowed to embed before democratic controls were seriously contemplated.The question, then, is not whether authoritarianism threatens the future. The question is whether democratic societies are willing to confront the architecture that has already taken hold. Without that reckoning, outrage will recur, scandals will cycle, and victims will remain without infrastructure. With it, the line between security and coercion can be redrawn where it belongs, inside law, accountability, and public control.This is the failure to be named. And it is the failure that must be addressed if democracy is to mean more than rhetoric after the fact. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
50
Why Did the U.S. Fail to Protect? Ending the Era of Illegible Crimes
Luxembourg City, Luxembourg Today, during a conversation in which the asylum process was explained to me, something unexpected happened: I was told that an investigation would be opened into my case and, specifically, into why the United States failed to protect me. This is not a routine bureaucratic step; it is a damning and structurally important question. It signals that the claims I have raised are serious enough to warrant not only an assessment of my need for protection, but an inquiry into the failures of protection themselves.What makes this moment significant is not just that an investigation may occur, but what is being investigated: the failure to protect me from private military and security contractors, their unlawful surveillance and intrusive monitoring (including Pegasus-like capabilities), and toxic exposures used as a tool of coercion and elimination. These are not abstract harms. They are techniques of control and punishment that have been allowed to operate for the better part of 20 to 30 years with almost no meaningful oversight.Private Contractors, Torture, and a 30 Year Run of ImpunityFor decades, private military and security contractors have lived in the gray zones of law and accountability. They operate across borders, blend with intelligence and security services, and enjoy layers of contractual secrecy and plausible deniability. Their methods range from classic surveillance and harassment to psychological torture, targeted digital intrusions, and the weaponization of toxic substances as a form of low-level, chronic assault.These practices do not reflect democratic principles. They do not operate within a genuine legal framework. They are, in substance, war crimes and crimes against humanity, repackaged under the rhetoric of “security,” “risk management,” or “protective services.” For nearly three decades, these actors have had an extraordinary run: shaping environments, undermining lives, and inflicting harm without facing anything resembling the accountability imposed on formal state institutions.The question now on the table, “Why did the U.S. fail to protect?”, is not just personally devastating; it is structurally revealing. It forces into view a reality that has long been disavowed: that democratic states have outsourced elements of repression to private actors and then looked away when those actors abused their power.Transnational Repression Without a Victim InfrastructureOne of the central problems of transnational and global repression is that there is no victim infrastructure. This is not because the harm is hypothetical or rare, but because the harm is illegible to the systems that would normally recognize, document, and respond to it.Every waking moment I spend under coordinated harassment, unlawful surveillance, invasive monitoring of my devices, psychological torture, and chemical assaults or toxic exposures, I am forced to grapple with the same question: how do I make this harm legible? How do I translate it into categories that institutions can recognize, so that a victim infrastructure can exist at all?Existing human rights and legal frameworks were built around discrete, recognizable abuses: detention, physical torture, trafficking, exile. What is emerging now is a networked form of repression that fuses digital warfare, private contracting, psychological operations, and environmental manipulation. It is distributed across jurisdictions and hidden behind layers of technology, subcontracting, and legal fictions. It falls between categories, and so the victims fall between systems.The investigation in my asylum case may be one of the first institutional acknowledgments that this gap is real. But acknowledgment is only the first step. The real work lies in building a framework that recognizes these victims as victims and not as “confused,” “unstable,” or “paranoid” individuals to be dismissed and pathologized.The Perfect Crime in Medicine and LawNowhere is this illegibility more obvious than in medicine. At present, there is no toxicology protocol in emergency rooms or standard general practice designed to detect low-level, chronic, multi-compound exposure in a context of stalking, coercive control, or transnational repression. Toxicology in acute care is focused on overdoses, single agents, and clear poisoning scenarios, not on slow, cumulative exposures intended to injure, destabilize, or quietly eliminate a person over time.When patients or victims present and try to explain that they are being subjected to coordinated harassment, unlawful surveillance, and toxic exposure, they are frequently met not with forensic curiosity but with a mental health smear. The narrative is quickly reframed as paranoia, delusion, or severe anxiety, rather than a potential crime involving sophisticated methods of control. This reflex pathologization effectively shuts down inquiry. It protects perpetrators. It breaks the chain of documentation at the very first point of contact.The same invisibility exists in law enforcement. Police, in most jurisdictions, simply do not have routine detection tools or protocols for investigating low-dose toxic exposure in a harassment context. Victims themselves have no accessible tools for environmental sampling that would be recognized as evidentiary. Without measurable evidence and without officers trained to interpret patterns of harassment, surveillance, and health complaints as a single continuum, the case never becomes a “case” at all. It becomes a personal problem.Legally, this creates the perfect crime. Without a credible police report or recognized medical findings, it is almost impossible to seek a remedy. Each facet of the abuse is forced into a separate silo. Stalking, bullying, and coordinated harassment might be pursued under one legal track. Toxic exposure, if ever acknowledged, might require a toxic tort route, with all the cost and complexity that entails. Psychological torture, economic interference, social isolation, and digital intrusion might each be treated as separate problems or not treated at all. The totality of the harm, the “invisible prison” and coercive control that defines the victim’s daily reality, never appears in any one file.Why International Law Terms Are Being Used HereA predictable objection to this kind of testimony is semantic: “Why invoke the Geneva Conventions, torture frameworks, or UN classifications in a domestic context?” The answer is simple. These terms are being used as a diagnostic vocabulary for methods and severity, not as a claim that a tribunal has already adjudicated specific charges. When a harm is structurally illegible inside ordinary systems, victims are forced to borrow the only mature frameworks that were built to describe systematic, organized abuse.Domestic penal codes and civil remedies can often name fragments of what is happening. Stalking. Harassment. Unlawful surveillance. Computer intrusion. Assault. Poisoning. Coercive control. But the defining feature of networked repression is that it is not one discrete event with one clear perpetrator, one jurisdiction, and one clean evidence chain. It is a coordinated pattern distributed across time, technology, space, and intermediaries. When institutions treat each incident as separate, the integrated reality disappears. That fragmentation is not neutral. It is the mechanism that produces impunity.International human rights and humanitarian law frameworks exist precisely to name patterns that domestic systems routinely fail to see, especially when proxy actors, subcontracting, secrecy, and cross border operations are involved. UN terminology and related standards provide language for prohibited conduct such as torture and cruel, inhuman, or degrading treatment, arbitrary interference with privacy, persecution, intimidation, and other forms of systematic coercion. These terms help identify what the methods are doing to a human body, mind, and life over time, even when the delivery mechanism is modern: spyware, coordinated harassment, psychological operations, and suspected low dose toxic exposure.So the point is not to force every fact into a courtroom ready label. The point is to make the harm legible. International law provides a shared classification system when domestic categories are too narrow, too siloed, or too easily neutralized through dismissal and pathologization. If we cannot name the pattern, we cannot investigate it. If we cannot investigate it, we cannot document it. If we cannot document it, there can be no victim infrastructure, and the failures of protection will repeat.How Attribution Works When the Crime Is Designed to Be “Unprovable”A second objection often follows the first: “If this is real, why is it so hard to prove who is doing it?” That question is part of the design. Networked repression is built to defeat ordinary attribution. It fragments methods across time and space, uses intermediaries and subcontractors, and relies on the fact that institutions investigate incidents one at a time rather than patterns.Attribution in this context does not usually come from a single smoking gun. It comes from convergence: multiple independent streams of evidence that, when aligned, narrow the set of plausible actors and reveal coordination. That convergence can include digital forensics (signs of persistent device compromise, account access anomalies, or intrusion patterns), environmental and medical documentation (symptom chronology aligned with exposure windows, chain-of-custody sampling when possible), witness corroboration (third-party observations of interference or harassment), and administrative records (reports made, responses received, unexplained closures, and patterns of dismissal that suggest institutional routing rather than neutral error).This is also why the question “Why did the U.S. fail to protect?” matters. Protection fails when no one is tasked with integrating these streams. If agencies and frontline institutions treat each strand as separate, the pattern never becomes legible enough to investigate, and attribution never becomes possible. A credible investigative approach must be pattern based, cross domain, and designed to preserve evidence early rather than pathologize the person reporting harm.When the crime is engineered to look like a series of unrelated problems, the investigative task is to rebuild it as one coordinated continuum and then follow the points of access, capability, and coordination that continuum reveals.The Need for Guardrails and a Coordinated PlanPrivate military and security contractors, and the broader ecosystem of actors around them, have had a 20 to 30 year run of operating in these gaps: between war and peace, between public and private, between medicine and law, between criminal and civil frameworks. It is time to put guardrails in place and stop normalizing this architecture of impunity.To move from an individual case to a meaningful response, we need a coordinated plan that addresses the harm across sectors rather than fragmenting it. At minimum, that plan should include:1. Medical toxicology protocols for low-level, coercive exposure Frontline medical settings, especially emergency rooms and urgent care, need protocols for screening and documenting possible low level, chronic toxic exposures in contexts where there is also evidence of harassment, stalking, or coercive control. This means updated training, new diagnostic pathways, and accessible environmental sampling, so that victims are not reflexively reclassified as psychiatric cases.2. Law enforcement tools and pattern based investigation Police and investigative bodies must develop and deploy tools to detect and document environmental toxins and digital intrusions, and to analyze harassment, surveillance, and health complaints as a combined pattern, not isolated incidents. This requires not only technical capacity, but legal frameworks that recognize this pattern as a distinct, prosecutable form of organized abuse.3. Integrated legal frameworks and victim status recognition Legal systems need mechanisms to treat these harms as a single continuum of repression rather than forcing victims into separate, disconnected proceedings: one for stalking, one for toxic exposure, one for financial interference, another for psychological torture. This may mean new statutory categories, specialized courts or tribunals, and the formal recognition of victims of transnational repression and coercive control as a protected class entitled to specific remedies and protections.4. Accountability and regulation of private military and security contractors Finally, there must be clear, enforceable regulation and oversight of private military and security contractors, including transparency obligations, human rights due diligence, and meaningful sanctions when they engage in surveillance, toxic exposure, psychological torture, or other abuses. Their era of operating in legal shadows, with states benefiting from their services while disowning their methods, has to end.The investigation opened in my asylum case is only one case, one file, one life. But it also represents something larger: the possibility that institutions can finally be compelled to ask the right questions about why they failed to protect, and what kinds of harms they have systematically refused to see. If we can make this harm legible, we can begin the work of building the victim infrastructure that the twenty-first century actually requires. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
49
Anomaly in the Light: Why They Cannot Stop Coming for Me
LuxembourgEven under sustained low level toxic exposure intended to impair perception and disorient cognition, I am still identifying patterns, mapping institutional mandates, sequencing escalations, and reverse engineering an architecture that many people would not perceive under normal conditions. Any serious observer would note the gap between what this suppression is designed to do and what I am actually doing. That gap alone suggests that without interference, my capacity to analyze, document, and dismantle this system would be significantly greater.The harm I am describing is not abstract. It includes repeated low level toxic exposure directed at degrading perception and function. What makes this devastating is that these methods target the very capacities that constitute my work: perceptual acuity, analytic rigor, and pattern recognition. These are not incidental traits; they are the mechanisms by which I map opaque systems and render them legible. Attempts to blunt them are strategic.Even under these conditions, I have documented the architecture, engaged multiple competent authorities, and built an evidentiary record that many people would struggle to assemble without impairment. That record matters. It shows not only what has already been accomplished under constraint, but what would be possible without it. If I were operating at full capacity, the structures enabling this harm would already be facing exposure and accountability beyond what their architects anticipated.It is also worth noting that the interference has recently escalated in form. The exposure profile appears to have shifted, with indications of different agents and increasingly odorless delivery. As my outreach gains momentum and the work reaches a broader audience, this change suggests urgency rather than maintenance. The pattern implies a narrowing window in which long term suppression is no longer sufficient and rapid neutralization becomes the objective.The persistence of these attacks is itself informative. If I were ineffective, there would be no need to keep targeting me. They cannot stop because two things cannot coexist: their system cannot survive sustained illumination, and my work produces exactly that. What is happening to me is not random. I am an outlier, and the people operating this architecture understand that.They have not been able to eliminate my capacities or prevent them from functioning. Having failed at that, the strategy appears to shift toward destroying the host rather than the capacities themselves. This is the logic of extrajudicial elimination carried out through deniable means, when overt methods are unavailable and silence is required.The last six months alone show what I have been able to map, document, and set in motion despite interference. These same capacities are part of why I have survived this long under conditions designed to break most people long before they ever reach a consulate, a court or a public platform. Those running this system know what that trajectory implies if interference fails.I am an anomaly. My perceptual and pattern recognition capacities allow me to see and describe architectures of harm that most people never notice. What my work exposes is not spectacle or conjecture, but something far more dangerous to closed systems: sustained, accurate description in the light. That is why suppression has been attempted. That is why the pressure does not stop. And that is why, when the capacities cannot be destroyed, the effort turns toward destroying the person who carries them. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
48
Called to Confront a Structural Evil
LuxembourgIn a strange and deeply perverse way, my life was built for this fight. The experiences, skills, and sensitivities I carry were shaped, piece by piece, to confront and disrupt a global repression network that most people never see and would never believe if they did. This is not just work; it is a calling. Some people hear a call like this and turn away. By the time I heard it, I already knew there was no path to a real life except straight through this obstacle. It is the road that was given to me.It is not easy, and it does take a toll. The reality is demanding and at times brutal, but what it draws out in me is not weakness; it is clarity, discipline, refusal, and purpose more resolve, not less. My place in all of this is not only to resist, but to disrupt and, just as importantly, to help others wake up and recognize the architecture around them. Some will feel called to stand at the front lines. Others will participate quietly, by refusing to cooperate, by believing victims, by asking hard questions, or by documenting what they see. There is no single “right” way to stand against repression, but there is a deep wrongness in pretending it is not there.What we are facing is not just a collection of bad actors; it is a structural evil. It operates on at least two levels. In the physical realm, it is built into systems, policies, technologies, and everyday practices that confine, poison, and silence. In the spiritual realm, it is a corruption of heart, mind, and soul that trains people to see cruelty as normal and the suffering of others as acceptable collateral. Any honest response has to live on both of these levels too: changing structures in the world we can touch, and refusing, in our own spirits, to be reshaped in the image of what we are fighting.I am not claiming total knowledge or a single hidden command center, but naming recurring architectures, incentives, and patterns of harm that reproduce themselves across systems, borders, and institutions.Justice is sometimes long delayed. Whole systems are built to stretch accountability past the horizon of most people’s attention spans. But “delayed” is not the same as “canceled,” and part of our task is to shorten that delay to speed up justice by telling the truth, building records, creating alliances, and insisting that what is done to victims in the shadows will one day be named in the light.This is written for those who sense something is deeply wrong but cannot yet fully name it, for those already harmed and fighting to stay whole, and for those deciding, often quietly, whether they will cooperate with repression or refuse it. At the core of this calling is a spiritual test: can you remain moral, with your integrity intact, in the face of their moral corruption and bankruptcy? Can you keep your own soul from being shaped by the logic of the people who are trying to put you in an invisible prison? That is the daily question. Some days, protection will be your act of integrity. Other days, open defiance will be. Both can be forms of courage.As for those who design and operate these architectures of harm: their choices are not free. They are purchasing a future for themselves, and the price is higher than they can see right now. Anyone who chooses to harm the vulnerable or obstruct this mission is not just committing a crime or a moral failure; they are buying their passage to a hell they have never known, storing up a reckoning that no lawyer, no regime, and no propaganda machine will be able to cancel. My work is not to deliver that reckoning. My work is to stand in faith, to face the enemy without becoming its mirror, and to make sure their actions cannot stay hidden forever. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
47
Faith in a World That Has Forgotten Its Teachings
We are now so far removed from the teachings of this world’s great traditions: Buddhist, Hindu, Muslim, Christian. The problem can no longer be blamed on faith itself. It is not religion that is immoral. It is men and women who have failed to embody what these traditions teach. The scandal is not belief. It is the failure of the human spirit to live what it professes.I am writing this from a place where I am under ongoing toxic exposure and targeted persecution. Low level chemical assaults over many months have already pushed my body further than most could endure. I do not know whether I have months, weeks, or only days left.I sat in a church, in what is called a holy place, and I did not move. Around me, some priests and some individuals in the congregation turned that sanctuary into a site of chemical assault and spiritual desecration. I could have fled. Instead, I remained seated, fully aware that what was unfolding around me was not only a crime against humanity but also a crime against the Lamb of God they claim to worship. If hell exists, they have done more than risk it. They have written their own names at its gates.As I sat in the church contemplating my own situation and that of other victims in this world, a question formed that would not leave me. How do we dismantle a system of repression that has evolved in the shadows of structural treaty gaps, a system that now seeks to exert coercive control even in sacred space so that victims have no refuge anywhere? The same system that has stalked me for months deployed low level exposure to volatile organic compounds, substances capable of causing permanent, caustic damage, to remind me that my life can be chemically extinguished at any time. I have survived six months or more of this, fully aware that the machinery around me is intent on erasing me from this earth. I am forced, again and again, to confront my own mortality.If I must die for this cause, it is entirely possible that my death will be in vain in the short term. People may not understand the courage or determination it took to resist, against all odds, until twenty, thirty, or forty years after I am gone, if they ever understand it at all. I have to make peace with that possibility. As I sat in the church and listened to the priests sing psalms, I was not comforted. I was deeply saddened. Those who should know better, those who are supposed to be emissaries of light, stood there filled with darkness.What I witnessed is not an isolated incident. It is the visible symptom of something deeper. Evil has become structurally embedded in institutions, in our societies, and in the broken hearts of men and women who perpetuate repression while cloaking it in ritual and respectability. The mechanisms that should defend the vulnerable are, in many cases, designed to preserve appearances, not truth. Laws, oversight bodies, and compliance frameworks exist, but they struggle to confront a violence that presents itself as normal, pious, or necessary.I did not arrive at that church by choice or by chance. I fled and left everything I owned in the United States with the clothes on my back, a laptop bag, and a purse. I had nothing more. I crossed borders into five different countries before finally seeking asylum, hoping that somewhere on this earth there would be a place of safety. Instead, I now live in a state that is, in practical terms, homelessness. There is no secure home, no guarantee of refuge, and a constant awareness that I am facing a slow, extrajudicial elimination with no relief in sight, despite my best efforts to seek lawful protection.I want to be clear. It was not every priest and not every member of the congregation. It was some priests and some individuals present who chose to participate in or enable what happened in that church. Yet even when only some take part, the violence becomes institutional the moment the rest look away.I have not suffered in silence. I have asked for help again and again. I have written to attorneys, to officials, to people in government, and to others who hold positions of responsibility and power. No meaningful help has been forthcoming. People are indifferent, or they are afraid to take a stand, or they have been bought off, whether materially, politically, or psychologically, by the very system that is repressing us. The bottom line is that I have sought help. Many victims have sought help. Help has not come. It is a very real possibility that I will not survive this.So this is the world we live in. Under these conditions, it becomes hard to believe that hell is some distant, metaphysical realm. It feels far more accurate to say that hell is here and now, in the place where I am standing and in the systems that make this kind of persecution possible and then look away. There are moments when I truly do not know if continuing to speak about this is even helpful anymore. I do not know whether my words are changing anything or whether they are simply echoes in a world that has decided not to hear.Yet this is precisely the moment when faith becomes necessary, whether or not you believe in God. It is faith that cruelty has not spoken the final word about who we are. It is faith that the story of humanity is not exhausted by the cruelty of our institutions. In a church where the air itself became weaponized, I chose to stay seated. I did not stay because I accepted what was being done. I stayed because leaving would have meant surrendering that space to those who profane it. My presence was a refusal, a quiet and stubborn insistence that even here, and especially here, humanity must be restored.Regardless of what you believe, this is the time for faith. It is faith that truth still matters. It is faith that solidarity among the wounded can become a force that outlives the regimes and hierarchies that try to crush it. It is faith that, in ways we cannot yet see, the courage to stay present in the face of evil will plant seeds for a different future. Now is the time for faith in humanity and for the work of restoring it, even in the heart of the institutions that betray it.When you are facing your own mortality, questions of spirituality stop being optional. You begin to ask, in direct and unpolished language, whether Buddha, God, or anyone at all can or will stop what is happening. All my life I have said, “If God exists, he is busy,” because from the moment I stepped onto this earth, the world has been on fire.Now, in what may be my last days, that fire is no longer a metaphor. It is literal. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
46
There Is No Victim Infrastructure: What Happens When You Try to Seek Protection
LuxembourgFor journalists and researchersThis article is not an allegation against specific embassies or individuals, nor does it claim access to internal documents or intent. It is a contemporaneous record of what happened when a human rights defender attempted to access protection through institutions that publicly claim to provide it. The significance lies not in any single interaction, but in the repeated, patterned obstruction across settings. Read as a structural warning: when gatekeeping behavior consistently blocks access to listening, documentation, or referral, the absence of victim infrastructure becomes visible in practice, regardless of formal mandates on paper.Reader note: This piece is written for victims, journalists, and lawyers. For victims, it is meant to confirm that repeated institutional failure is real and that being turned away, dismissed, or blocked is not a personal failure or a sign that you are imagining things. For journalists and lawyers, it is meant to show what “no victim infrastructure” looks like in practice when a person actually attempts to access protection. This is not a set of allegations or a legal filing. It is a contemporaneous record of what occurred and an analysis of its structural implications.Today in Luxembourg, as a human rights defender and victim of transnational and global repression, I tried the move that people are consistently told still exists when everything else fails: walk into an embassy and ask for help. Embassies are mandated and expected, under their own policies and international practice, to offer at least some form of assistance to people in distress abroad, whether directly or by referral.The promise: “You can always go to an embassy”In public narratives and legal commentary, embassies are described as last-resort spaces. People are told they can walk in to seek protection, humanitarian assistance, or at least a channel to authorities who can act. States and the European Union have adopted guidelines, including the EU Guidelines on Human Rights Defenders, that state they support human rights defenders at risk and assist nationals in distress abroad.In this sense, I am not only an asylum seeker and a human rights defender abroad. On any reasonable reading of current definitions of transnational repression, I qualify as a victim. The same methods and patterns I have encountered in other settings appeared again when I attempted to access diplomatic protection.The reality today: three embassies, no protectionFrench EmbassyAt the French embassy, access to assistance was blocked at the gatekeeping level. The security guard at the entrance, the individual he went to retrieve, and another individual entering the space as I was leaving all behaved in ways consistent with coordinated harassment and active dispersal. I was unable to speak to any consular official, provide information, or leave a statement.This is not presented as an allegation of intent or instruction. It is a description of observable conduct and its effect: access was blocked by gatekeepers.Dutch EmbassyAt the Dutch embassy, at least two to three individuals behaved in ways consistent with coordinated harassment and active dispersal, again at the gatekeeping level. Despite this, one woman did take my name and phone number and stated that someone might contact me, while also making clear that she was unsure what, if anything, could be done.That interaction matters. It shows that even within a compromised or obstructive environment, assistance depends entirely on whether one individual is willing or able to act, without institutional backing or protection.Belgian EmbassyAt the Belgian embassy, entry required an appointment. Individuals without appointments were turned away. This means that the people present inside the waiting area were not walk-ins; they had legitimate, pre-approved access.Individuals inside the waiting area behaved in ways consistent with active dispersal while I attempted to seek assistance. When I eventually reached the service windows, the first staff member refused to give his name and stated that I could not be seen and that no information would be taken. A second staff member said she would see me between appointments. When I explained that I wanted to leave information related to a national security concern, she refused to take a statement and handed me a piece of paper instead.I cannot prove whether this behavior resulted from coordination, informal cooperation, opportunism, or structural design. What I can describe is the effect from a victim’s vantage point: when individuals with legitimate access participate in dispersal and obstruction, the experience is indistinguishable from an embedded network operating inside the institution.Why this is not just “bad service”Embassies publicly state that they can assist nationals in difficulty, provide information on lawyers and doctors, and support human rights defenders in serious situations. Many legal frameworks stop short of granting a justiciable right to consular assistance, but states nonetheless present these services as real and available.What occurred here was not a misunderstanding of mandate. No statement was taken. No record was created. No referral was offered. Access was blocked at the level of individual gatekeepers.By “no victim infrastructure,” I mean this: there is no reliable place where a victim can go, report harm, be heard, have that harm documented, and receive assistance or referral without being deflected, obstructed, or exposed to further harm. What exists on paper does not function in practice.Transnational repression, global repression, and hollowed-out civil societyTransnational repression is generally described as states or their proxies reaching across borders to surveil, intimidate, silence, or harm dissidents and human rights defenders abroad. Recent UN, Council of Europe, and EU analyses converge on this definition. I do not have access to internal documents or contracts; my assessment is based on the consistency between what I am experiencing across jurisdictions and what these analyses describe.What I am experiencing appears to go further. It resembles global repression: a standing network of public and private actors already embedded across societies, operating through discretion, deniability, and individual cooperation rather than overt command.From a victim’s vantage point, I cannot see internal tasking or formal structures. What I can see is that the scale, persistence, and cross-border continuity of the obstruction exceed what unaffiliated private actors could sustain without access to state systems. Where discretion exists, corruption and pay-to-play dynamics become possible. A well-funded network does not need everyone; it only needs enough individuals willing to cooperate, whether for money, power, protection, or indifference.This is what it means to say civil society has been hollowed out. Institutions still exist, but many of the individuals within them can no longer be relied upon as neutral or protective gatekeepers.Why victims still go anywayGiven this reality, why do victims still go to embassies and other institutions?They go to document.They go to establish pattern.They go to show that they attempted to access every available lever and were blocked.This is how systemic gaps are demonstrated. Not by assuming access will work, but by recording when it does not.Victims should expect obstruction. They should anticipate gaslighting, dispersal, and denial. They should still go, because documenting that failure is itself evidence that the infrastructure does not exist.StalemateThis is a stalemate, not an ending. Every obvious move is guarded. That does not mean the game is over. It means the next move is not obvious and will not come from the same levers that have already failed.You do not dismantle a system like this by giving up. You dismantle it by identifying weak points, regulators, oversight bodies, journalists, and individuals within institutions who still believe in doing the right thing. They exist, even if they are harder to find, because not everyone knows this system exists.The purpose of this piece is to say: you are not going crazy. The resistance you are encountering is real. The absence of protection is structural. Knowing that does not end the fight, but it allows people to stop blaming themselves and to start looking for the cracks.Methodological noteThis account should be read as documentation of institutional access attempts rather than as proof of motive or coordination. Victims of transnational and global repression rarely have access to internal records, contracts, or tasking; what they can document are outcomes. Recording where access was sought, how it was blocked, and by whom is one of the only ways to demonstrate systemic gaps. Repeated failure across institutions is not anecdotal noise; it is evidence that the protection pathway itself does not function for people in situations like mine.Why this matters beyond my caseIf a human rights defender in circumstances like mine cannot obtain even basic listening, documentation, or referral by physically entering multiple embassies, then “go to an embassy” is no longer a reliable protection pathway. It is a story we tell victims while the real system has already hollowed out the institutions meant to catch people when everything else fails. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
45
Documenting Requests for Protection and Housing in the Absence of Victim Infrastructure
LuxembourgThe document below is shared as both a contemporaneous record and a reference for others.The text is a letter I am currently using to request protection, safe housing, and referrals from humanitarian and support organizations. It is published here without addressees or correspondence details so that others can see how a pattern of harm can be described when no established victim infrastructure exists.Transnational repression is increasingly referenced in policy, academic, and advocacy spaces, but it was not developed in collaboration with victims and did not emerge from victim needs. As a result, it functions primarily as an analytical and advocacy concept rather than as a pathway to relief. There is no dedicated victim infrastructure attached to it: no intake routes, no housing protocols, no specialized legal pathways, and no coordinated psychosocial or medical support. If such infrastructure existed, victims of both transnational and global repression would already have access to safe housing, informed legal assistance, and appropriate support long before questions of detection tools or specialized medical testing arose.Global repression, understood as a pre-positioned, distributed system that reproduces similar patterns across locations and sectors, is even less recognized. Most people have no conceptual framework for it at all, and there is no infrastructure within which it can currently be addressed. As a result, victims are repeatedly forced to explain their experiences from first principles, often without shared language or institutional recognition.What It Means When Victims Are Forced to Explain “From First PrinciplesWhen we say victims are forced to explain “from first principles,” we mean this:They have to explain everything from the ground up, as if no shared framework, category, or prior knowledge exists.In practical terms, it means the victim cannot rely on any accepted baseline such as:“This type of harm is recognized.”“There is a known pathway for this.”“There are standard indicators for this situation.”Instead, they must start at zero every time.Concretely, explaining from first principles looks like this:The victim must explain what the harm even is, not just that it happened.They must explain why separate incidents are connected rather than random.They must explain why standard explanations do not fit.They must explain why existing systems fail to capture what is happening.They must explain why their request is reasonable in the absence of precedent.All of that happens before they can even ask for help.By contrast, when infrastructure exists, none of this is required. For example:A victim of domestic violence does not have to explain why repeated intimidation is a pattern.A torture survivor does not have to explain why symptoms persist after release.A refugee fleeing a recognized conflict does not have to explain why return is unsafe.Those victims can rely on shared concepts, intake categories, and institutional memory. That is what infrastructure provides.When victims of transnational or global repression are forced to explain from first principles, it is because:There is no shared vocabulary.There is no agreed framing.There is no intake pathway that says “this kind of harm belongs here.”So every interaction becomes an educational exercise instead of a protection process.That is why this matters so much. Explaining from first principles is exhausting, destabilizing, and risky. It increases misclassification, dismissal, and delay. It also shifts the burden of system design onto the victim.Many people experiencing surveillance, coercive control, cross-border pressure, environmental harm, or retaliation fail to obtain help not because nothing is happening, but because they cannot explain what is happening in a way that preserves the pattern. Their experiences are fragmented into isolated incidents, misread as incoherent, or dismissed because the harm does not fit existing categories.The purpose of sharing these documents is to demonstrate a method of explanation: how to describe recurrence rather than isolated events, how to justify why explanation is necessary in the absence of infrastructure, how to distinguish contextual explanation from concrete requests, and how to ask for protection or assistance without asking the reader to adjudicate ultimate truth or causation. This is a transferable skill. While some of these letters arise in the context of asylum, the structure applies equally to whistleblowers, labor retaliation cases, activist harassment, journalism, and other contexts where harm is cumulative and nonstandard.These documents are also shared as a contemporaneous record of escalation: who was notified, what assistance was requested, and whether assistance was provided. The intent of each letter is to obtain help. When assistance is not provided, that outcome itself further documents the gap that currently exists for victims of transnational and global repression.This post is part of an ongoing series. I will be sharing additional letters as I continue to seek assistance and escalate requests to humanitarian, regulatory, oversight, and human rights bodies. Together, these documents show how escalation occurs in practice: how requests move across institutions, how regulatory and oversight bodies are engaged, and how self-advocacy unfolds when no dedicated victim pathway exists. Read collectively, the letters also function as an escalatory map that others can use to understand where to write, how to escalate, and how to document engagement when responses are limited or absent.Contemporaneous letter and Reusable languageThe letter below was sent today to multiple humanitarian and support organizations. Addressee names and identifying correspondence details have been removed so the document can be shared as a reference while protecting the confidentiality of ongoing requests.My name is Tamara Dixon and I am an asylum seeker currently in Luxembourg. I am also a human rights defender and the founder of Global Repression Studies, both as a discipline and as an institute for victim testimony, L’Institut d’études de la répression mondiale. The purpose of this institute is to collect and archive the testimony of victims of global repression, and to produce documentation and publications that describe the architecture of the emerging global repression system and the harms it is inflicting on victims, at a time when no dedicated victim infrastructure exists to recognise or address these harms.Since spring 2025, I have been a targeted individual subjected to a pattern of repression that forced me to leave the United States and later to seek asylum in Europe. This repression has followed me across at least ten U.S. states and five countries in Europe. I arrived in Europe on 10 November 2025 in Geneva, Switzerland, and in Luxembourg on 31 December 2025; in less than seven days in Luxembourg, I have been forced through seven hotels, and in one hotel I had to change rooms six times within two to three days because the same pattern of harassment and toxic exposure followed me not only on the property but into each room, where the perpetrators appear to exploit architectural ingress points (such as HVAC systems, vents and other building conduits) to force toxic substances into the room.In my work on Global Repression Studies, global repression is distinguished from national or transnational repression. Transnational repression usually describes agents or private contractors following a victim across borders, whereas global repression refers to a pre‑positioned system embedded across multiple societies and sectors (such as hospitality, housing, policing, and corporate security) that is already in place before the victim arrives. When a targeted person like myself appears in a new country or city, this embedded system activates around the target and reproduces the same patterns of surveillance, harassment, and toxic exposure in each new location; similar to transnational repression, there may also be actors who physically travel with and follow the victim from place to place, operating alongside those embedded actors who activate once the victim arrives in a given location.The actors involved in my case appear to be private military and security companies (PMSCs) and related private security contractors using dual‑use cyber and surveillance technologies that exploit gaps in export control regimes such as the Wassenaar Arrangement. Their methods combine unlawful digital surveillance and intrusive monitoring of my devices with repeated low level exposure to volatile organic compounds or other toxic substances in my environment. This exposure can occur in accommodation and also in public and semi‑public places (for example in streets, hotels, restaurants, and transport), and appears to have adverse effects on my cognition, neurology, and overall physiology, and has made it impossible for me to live safely in communal or camp‑style accommodation. Because volatile organic compounds are short‑lived in the body and require specific testing within a short time window, and because police and hospitals typically lack appropriate detection tools and protocols, victims are generally unable to obtain positive toxicology results or standard medical and police reports that prove the harm, which creates a structural, systemic gap in protection and access to legal remedies.From what I have observed, this architecture is being used to target human rights defenders, whistleblowers, dissidents, and others in the form of extrajudicial elimination without due process. On 8 September 2025, I initiated a human rights complaint in Geneva and am now seeking counsel to help advance that complaint, but my most urgent need is safe housing. I have already reached out to ProtectDefenders.eu, the European mechanism for at risk human rights defenders, to request urgent support. However, because I am now an asylum seeker in Luxembourg and am not allowed to leave the country while my procedure is pending, I am not sure they will be able to assist me with relocation or safe housing outside Luxembourg, which makes it even more urgent for me to find a safe, non‑communal housing solution within Luxembourg territory.Without safe accommodation and effective protection, there is a real risk that I will simply become another statistic of this repression network, and that a rare opportunity to map its architecture and create safeguards will be lost. As both an academic researcher and a person who has lived this experience directly, I am in a unique position to document how this global repression system operates, to help design victim infrastructure, and to contribute to future policy and legislation that could protect others from what may be one of the most serious emerging threats to democracy in the post‑Cold War era. Unfortunately, export control frameworks such as the Wassenaar Arrangement were never designed to address intangible, cloud based surveillance tools and other dual‑use capabilities developed for war zones and now deployed against civilians; these technologies have outpaced legislation, oversight and accountability, enabling private contractors and associated actors to operate with near impunity.I require non‑communal, secure accommodation in Luxembourg where I will not be subjected to further toxic exposure by private contractors and associated networks, and I am asking for your assistance to obtain safe, private accommodation and guidance on any mechanisms that can protect me from this ongoing global repression system.In light of the above, I would be very grateful for your help with the following:* Information on what non‑communal accommodation options exist in Luxembourg for vulnerable asylum seekers who cannot safely live in camps or shared housing (for example small independent rooms or flats in supervised housing projects or similar), and how I can apply for them as an asylum seeker.* Support to obtain appropriate referrals to medical and psychological services, including where possible a toxicologist and a neurologist, so that I can document and treat the effects of toxic exposure and prolonged persecution.* Assistance to document my current unsafe housing situation in your files and, if possible, to provide a brief letter or note that I can use with other services (such as legal aid, hospitals, and the National Reception Office – ONA) confirming my vulnerability and my need for non‑communal accommodation.* Advice on any additional services or support (social, medical, legal or financial) for which I might be eligible as a vulnerable asylum seeker in Luxembourg.* If no suitable non‑communal accommodation is currently available in the state or NGO system, guidance and support to help me obtain independent housing that is compatible with my asylum status.Respectfully,Tamara Dixon This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
44
Language for Requesting Help When No Victim Infrastructure Exists
January 5, 2026. LuxembourgAt this point in time, there is no functioning victim infrastructure and no clear pathway to help for those of us being subjected to technologically driven persecution by private contractors. The tone of distress in this letter reflects the reality that there are no police tools, no legal pathway without a report, and no accessible toxicology for continuous exposure. Without law enforcement recognition and a criminal report, there is no access to legal remedy, and plausible deniability makes most events illegible until a pattern can be proven. Detection tools for low‑dose toxic exposure are scarce, which means that by the time anyone can verify what has been happening, people have already been harmed or killed. In the meantime, this system continues operating inside ordinary communities while the general public, and even most advocates and researchers, only see fragments of what is going on.I am sharing this letter to show how what is happening is being described and how assistance is being requested when no victim infrastructure exists. You may not be in the same position I am. You may be at a different phase, earlier or later, or experiencing different methods or impacts. Adapt the language to reflect what is happening to you, remove what does not apply, and add details that are specific to your situation.This letter is provided as a practical example of how to write to attorneys, elected officials, medical professionals, oversight bodies, or others when you are trying to explain what is happening and ask for help. Its purpose is to give people language they can use.I am also posting this letter as a contemporaneous record in case anything should happen to me. My Substack and my website are intended to function as an archive of what has been reported, when, and to whom, and as a resource for journalists, advocates, and investigators.Contemporaneous letter and sample languageThis is a letter sent today to a Washington, D.C. based civil and human rights attorney; the addressee’s name and identifying details have been removed to protect his confidentiality and privacy.I am writing to follow up on my earlier correspondence. Since those messages, I have been able to articulate with greater precision both the nature and the gravity of what is occurring, not only to me but to others similarly situated.In addition to unlawful, technology based surveillance and intrusive monitoring of my devices, I am being subjected to a coordinated campaign of harassment, psychological torture, and chemical suppression through repeated low level exposure to volatile organic compounds. These exposures appear calibrated to degrade neurological, cognitive, and physiological functioning over time, and they carry clear risks of organ damage, genetic injury, and death. The pattern suggests a form of extrajudicial elimination: destabilizing and incapacitating targets so that they cannot organize, seek counsel, or access remedies, while causing fatal harm without visible or easily attributable evidence. Because these chemicals are difficult to detect and require immediate testing, there is effectively no access to police reports, courts, or reliable medical documentation, and no functioning victim infrastructure at all.Over the past six months, I have fled across ten U.S. states and then to multiple European countries, only to encounter the same pattern replicated with remarkable consistency in each jurisdiction. This strongly indicates a transnational repression network in which private contractors appear to have supplied both technological systems for surveillance and coordination and the personnel to operate them, while also deputizing civilians. These operations appear to exploit legal and regulatory gaps, including those within the Wassenaar Arrangement and related export control regimes, allowing private actors to engage in conduct that would be unconstitutional or unlawful if carried out directly by state actors, and to do so without meaningful oversight or accountability.Because it became clear that I could not escape what appears to be a global network of repression, I was forced to seek asylum in Luxembourg. The targeting has not stopped. The same patterns of surveillance, harassment, and chemical exposure are continuing within the asylum process itself. I am genuinely afraid that I may not survive long enough to secure protection, obtain competent medical evaluation, or pursue any legal remedy, either for myself or for others. Continuous toxic exposure combined with psychological torture and the absence of any victim facing mechanisms makes time a critical factor.I recognize the complexity of these claims and the difficulty of conveying them. It has taken months of continuous exposure, flight, and research to find language that accurately reflects what is occurring. I am renewing my request for assistance because the situation is now life threatening, and because your experience with complex, precedent setting civil rights and national security matters uniquely positions you to help shape an appropriate legal and institutional response. Even if direct representation is not possible, guidance on immediate protective steps or referral to colleagues with relevant expertise would be invaluable.Thank you for your time and consideration.Respectfully,Tamara This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
43
Not Just a US Problem: Europe Inside the Global Repression Network
Geneva, SwitzerlandSummary: This essay argues that recent European concern about US democratic backsliding and surveillance (from Freedom House scores to the CJEU’s Schrems II ruling) points to something larger than a “US problem.” It shows how formal democracies on both sides of the Atlantic are entangled in a partly privatized global repression network built from surveillance laws, private contractors, and dual‑use technologies. The piece introduces Global Repression Studies as a framework for naming and mapping this system and concludes that the goal cannot be minor reform but, ultimately, dismantling that network.A recent Substack post put it starkly:“Some Europeans, even previously staunch Atlanticists, are openly acknowledging that the USA is now not even to be seen as a neutral but instead to be understood as an enemy of liberal democracy in Europe.”That may sound exaggerated, but if you look at the institutional record and then at what is happening around surveillance and dual‑use technologies, you can see why this framing is starting to appear.And the crucial point is this: the problem is not just the United States. It is a transnational, partly privatized “global repression network” that liberal democracies themselves helped build and are now entangled in.The baseline: formal warnings about US democracy and surveillanceBefore we even get to private contractors and dual‑use technologies, there is already a thick layer of formal concern on the record:- Freedom House’s *Freedom in the World* reports show a multi‑year decline in the United States’ democratic scores and explicitly describe the US as a democracy in decline.- V‑Dem’s indices categorize the US as undergoing democratic erosion, not a stable high‑performing liberal democracy.- The European Parliament has passed resolutions warning about democratic backsliding and about the implications of January 6 for the rule of law and electoral integrity.- Most concretely, the Court of Justice of the European Union, in its “Schrems II” judgment, invalidated the EU–US Privacy Shield because US surveillance law does not give people whose data is transferred from the EU to the US protections equivalent to those guaranteed by EU fundamental rights law.Already at this “official” level, Europe is not just mildly disappointed in the US. Its legislature and highest court are saying, in careful legal language, that US practices are incompatible with the level of rights protection that a liberal democratic constitutional order is supposed to ensure.Schrems II is only the floor, not the ceilingBut Schrems II is still about the “minimum”. It deals with:- national‑security surveillance frameworks like FISA 702 and Executive Order 12333,- bulk access to data held by major service providers,- and the lack of effective remedies for EU data subjects.It does “not” address what happens when you layer on:- private intelligence and cybersecurity contractors,- covert or semi‑covert procurement channels,- “dual‑use” technologies marketed as security tools but usable for political repression,- and modern spyware‑style capabilities.If the official, on‑paper legal framework already fails to provide equivalent protection, then adding private contractors and dual‑use tools on top of it does not just marginally worsen the situation. It “changes its nature”. It turns a flawed surveillance regime into a distributed, hard to see infrastructure of control.The missing conversation: privatized and dual‑use repressionThis is where the public conversation badly lags behind the reality.For roughly two to three decades, we have seen:- The outsourcing of key surveillance, data‑analytics, and offensive cyber capabilities to private firms.- The development of dual‑use platforms that can be deployed for legitimate security purposes but just as easily turned inward against journalists, activists, opposition figures, migrants, and minorities.- Procurement systems that are opaque by design: security exemptions, national‑security classification, and fragmented contracting that hides who is actually doing what.This is “not” just a US phenomenon. European states also buy from, cooperate with, and in some cases rely on the same or parallel contractor ecosystems. Some of them deploy these tools domestically; others share data and capabilities with partners abroad. Authoritarian regimes plug into similar networks, often purchasing from companies based in democracies.The result is what I call a “global repression network”: a transnational infrastructure that:- is partly public and partly private,- spans formal democracies and authoritarian regimes,- and allows states to outsource or distance themselves from the most controversial forms of monitoring and control.Why Europe is not simply “the victim”This is why it is too simple to say “the US is now an enemy of liberal democracy in Europe” and leave it there.From one angle, European institutions are right to be alarmed by US democratic backsliding, extra‑territorial surveillance, and the strategic pivot away from NATO and Ukraine. Those trends objectively weaken Europe’s liberal democratic security order and objectively benefit authoritarian powers.From another angle, however, Europe is “part of the system” it is criticizing:- European governments and agencies contract with private surveillance and cyber‑intelligence firms.- European companies develop and export dual‑use technologies that end up in repression chains abroad.- European legal systems also struggle to regulate modern spyware, AI‑driven analytics, and data‑broker ecosystems that enable continuous monitoring.So the right frame is not “the US versus Europe” but “democratic institutions versus a global repression network” that crosses borders and legal systems.Why I am insisting on “global repression”This emerging pattern is what led me to found and develop Global Repression Studies as a field. The core claim is simple but uncomfortable:- If we keep treating each scandal as a national aberration, we will never see the structure that connects them.- The surveillance, data‑extraction, and control infrastructures that underwrite modern repression are transnational by design, with democracies deeply involved in building and maintaining them.- We therefore need analytical tools, public narratives, and legal frameworks that operate at the same scale as the technologies and contractor networks themselves.Yes, many of the underlying technologies and outsourcing practices have been evolving for 20–30 years. What is relatively new is the recognition that:1. They now form a coherent “global system”, and2. That this system directly shapes the future of democracy, not only in authoritarian states but inside nominally liberal democracies as well.The layer most people still do not want to seeWhat I have sketched here is still the most “respectable,” documentable layer of the story: institutions, laws, procurement, and technologies. Behind it lies a much harsher reality that many targeted individuals already know too well: unlawful surveillance blending into harassment, psychological operations, and, in some cases, forms of chemical or physical suppression that look less like policing and more like counterinsurgency.For many readers, that will feel like too big a leap. I understand that. But if we can at least agree that a global repression network now exists in infrastructure and law, then the next step is to listen seriously to those of us who are living at its sharpest edges.This piece is not a full policy blueprint. The first steps are these: name the system, map its actors, expose its legal and technical foundations, and make it politically costly for democracies to pretend that “national security” justifies everything. Global Repression Studies exists to do exactly that work, precisely because most people still do not yet see the system they are living inside. Over time, this network has hollowed out large parts of civil society, drawing in a vast number of institutions, companies, and individuals until participation in repression or its enabling structures becomes almost routine. In that sense, it is the greatest threat to democracy in the post‑Cold War era, and the goal cannot be to simply reform it at the margins but ultimately to dismantle it.Further readingFreedom House, Freedom in the World (United States country reports and global scores)https://freedomhouse.org/report/freedom-worldVarieties of Democracy (V‑Dem), Liberal Democracy Index and country profileshttps://www.v-dem.netEuropean Parliament resolution on the situation of the US in the context of democracy and human rights (January 2021)https://www.europarl.europa.eu/doceo/document/TA-9-2021-01-20_EN.htmlCourt of Justice of the European Union, Schrems II judgment (C‑311/18) and press releasehttps://curia.europa.eu/jcms/upload/docs/application/pdf/2020-07/cp200091en.pdfEuropean Parliament / EP Think Tank briefings on Schrems II and EU–US data transfershttps://www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2020)652073European Data Protection Board and European Data Protection Supervisor materials on modern spyware and Pegasus‑type toolshttps://www.edps.europa.euhttps://www.europarl.europa.eu/committees/en/pega/homeCarnegie Endowment – analyses of US democratic backsliding and its impact on allianceshttps://carnegieendowment.orgEuropean Parliament Research Service – “Democracy in America” and related studies on US decline and transatlantic valueshttps://www.europarl.europa.eu/thinktank This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
42
Global Repression Studies: Life Inside the Kill Box
Geneva, SwitzerlandLiving inside a kill boxImagine having ex‑military professionals and people from military intelligence and national security, grown men who have navigated war zones, targeting you as an individual. Imagine them studying you for weak points and sending in people to harm you every day, 24/7. Every day you stay in one place, they adapt around you and build what, in military terms, is called a kill box: a space you cannot escape, where you are subject to chemical suppression at will.Chemical suppression is not an abstract phrase. It means that your emotions, your physiology, your cognition are being pushed and pulled by forces outside your control. It means trying to carry out your life under constant pressure, knowing that someone else is trying to control your mind and your body while also attempting to assassinate you without leaving a conventional mark.That is the weight of what I and other victims are living with on a daily basis. I honestly do not know how I have managed to speak about this and stay clear‑eyed and coherent for the last months. I am writing and recording from inside the blast radius, not from a safe distance.Reporting from the blast radiusPicture sitting in a room, detecting chemicals, feeling sensations in your body, while you try to send emails, draft posts, contact law firms, and reach out to potential allies. You know you cannot go “home,” because they have followed you through state after state in the United States and subjected you to the same treatment everywhere.You leave the country, thinking you are going into exile for safety, and arrive in a foreign place where you have no allies, no friends, no community. Instead of a reprieve, you discover that what looked like domestic repression is actually part of a global repression network. The tactics, the profiles, the patterns are there too.So now you are in multiple EU countries, again without allies and on your own, dealing with an invisible, chemical, asymmetric form of warfare. You are fighting a war against an army of people trained to kill, who are attempting to eliminate you without ever laying a hand on you.In the middle of this, you write to senators, governors, law enforcement, former officials. You map the architecture as best you can. You identify layers and roles and flows of money. You do this while being attacked by that same architecture in real time.I know I am not Wonder Woman. I am not superhuman. I know I cannot outrun chemicals forever. They keep coming precisely because they know there is no mechanism I can pull, no lever I can activate, no cavalry that is going to arrive. The plan is simple: grind you down, suppress you chemically, and kill you quietly.I am fully aware that I may be murdered or disappear before anyone in power moves. I am fully aware that it might be only after I am in the ground that some journalist or investigator starts piecing this together. That awareness sits in my body every hour.Moving through choke pointsAs I try to move to yet another place, Dublin of all places and more expensive than where I am now, I have to calculate basic survival against logistics. How do you get there?If you take the train, you pass through major hubs like Paris. Bigger cities and longer routes mean more opportunities, more time, more choke points: along the metro, along the train, on the ferry. Every added minute in transit is an added window for assault in public space.Because Dublin is a technology city, I already expect that the infrastructure will be there, as it has been everywhere else. I assume there are already people in place, already planning how to block, sabotage and contain me: contacting potential landlords, offering cash, leveraging a system that is rich with money from the sale and use of these technologies.This is the situation I find myself in as I publish this.The system does not want this workThe system I am describing has every incentive to prevent serious academic work on it from ever seeing daylight. A dissertation that maps this architecture is, by definition, a threat to it. My expectation is that there will be efforts, subtle and not so subtle, to discourage, derail, or block this research at the institutional level, including through people who are already positioned to interfere.I cannot see inside every institution, but based on what I have already experienced, I assume that there are or will be individuals embedded around the places where I try to work whose role is to make sure this dissertation is never completed or never accepted. That is part of what it means to try to study a repression system that is global, networked, and operating in the shadows.My only hope is that there are still a few people who understand that this is work that has to get out if there is ever going to be legislation, policy and guardrails strong enough to dismantle this system. I also fully realise that I may never be able to reach my formal goals, and that this Substack may, in effect, end up being my dissertation: the place where the analysis lives because the institutions around me cannot or will not hold it.These operations run on money and reach. They make it impossible to live as a normal human being, to move through the world openly and trust others. I have posted pleas, asked for people to step forward, asked for this to be stopped, and the truth is that many people are profiting from this architecture and have been for decades. It appears to have been in place for twenty or thirty years, with large amounts of money changing hands, and it is very likely to continue, because those of us who are trying to expose it are not expected to survive long enough to make a difference.Why say this nowI am writing this today because I cannot guarantee that there will be a tomorrow for me to write it. There is no safety margin, no buffer. Global Repression Studies is not an abstract field for me; it is the name for the system that is trying to erase me while I am still trying to describe it.If you have never lived anything like this, it may sound impossible. If you have, you will recognise the patterns immediately. Either way, this is my testimony from inside the kill box. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
41
Beyond Transnational Repression: Why We Need Global Repression Studies
Geneva, SwitzerlandMost people have heard, at least vaguely, about “transnational repression”: states or powerful actors reaching across borders to harass, threaten, or silence their critics abroad. That framework assumes a clear sender, a clear target, and a chain of actions that crosses nation‑state lines. What I and others are living is something different.Current work on transnational repression focuses on states targeting dissidents abroad; Global Repression Studies asks what happens when a repressive architecture is already present wherever the target goes.What I am calling Global Repression Studies starts from a darker, more unsettling premise: there is already a repression network in place almost everywhere a target can go. It is not just one country exporting fear. It is a distributed infrastructure comprised of ex‑military and private security people with military backgrounds, local “helpers” and deputized civilians, and additional operatives deployed into a region when needed that can be activated wherever a person shows up.In many large cities, it feels less like someone is reaching in from abroad and more like the machinery is already there, waiting. In smaller cities or towns, it feels like there are people who have signed up to participate formally or informally alongside teams sent in from elsewhere. The message to the target is simple: there is no escape. Movement is reduced to choosing which version of the same architecture you will face.This is not just about surveillance. It is about being hunted: followed from place to place, surrounded by coordinated actors who can blend into the civilian population but behave like a roaming, modular security apparatus. Ex‑military operators and private security contractors provide the skill set, while civilians from various social and professional backgrounds are brought into the outer rings of the operation. Together, they create a constantly shifting pressure field around a person’s life.The cruelty of this is doubled by the fact that there is essentially no victim infrastructure for it. There is no standard category for “hunted across jurisdictions by a distributed, semi‑covert network,” no box to tick on a police form, no established protocol that says, “This is how we respond when the harm is everywhere and the actors are layered and deniable.” The result is that the victim carries two impossible loads at once:• The harm itself: the fear, exhaustion, forced moves, loss of safety and stability.• The burden of proof: having to somehow “prove” to institutions and professionals that what is happening is real, systemic, and deliberate.Most people, including many working in related fields, simply cannot grasp what is being described. Their mental models are built on single jurisdictions, individual bad actors, or clearly defined criminal groups. They are not built for a world where a person can travel thousands of miles and meet the same tactics, the same patterns, the same types of actors, over and over again. So when a target tries to explain, they are often met with disbelief, minimisation, or pathologisation.From the inside, it feels like living in a war zone that only you can see: a war zone where the uniforms have been swapped for street clothes, the bases replaced by rented apartments or ordinary vehicles, and the front line is wherever you happen to be standing. The people around you may look like ordinary neighbours, tourists, commuters. Some of them are. Some of them are not.Global Repression Studies, as I use the term here, is not an academic luxury. It is a survival need. It is an attempt to name a reality that currently falls between all our existing concepts: between transnational repression, organised crime, private security, counter‑terror paradigms, and crowd‑sourced harassment. Without a name, there is no field. Without a field, there are no standards, no data, no safeguards, and no guardrails.What is needed is:• A vocabulary that recognises global repression networks as a phenomenon in their own right.• Research that maps how these networks are structured, funded, and activated across jurisdictions.• Legal and policy frameworks that stop placing the entire evidentiary burden on isolated individuals and start recognising patterns of coordinated, cross‑context harm.• Victim‑centred infrastructure that assumes the harm can be both real and hard to prove, and that offers support without demanding impossible levels of documentation.This is not just about my case. It is about the others known and unknown who are being pushed from place to place, written off as unstable, or crushed silently under a system that has not yet learned how to see them. If anything happens to me, my hope is that the documents I leave behind will help others investigate this, name it, and build the guardrails that should have been there all along.Until then, this is my contribution: to say, clearly and publicly, that what is happening is not just transnational repression as we currently understand it. It is something broader, more embedded, and more disturbing. And it demands a field and a response of its own.For me as well as other victims, this is not hypothetical; it is our daily reality.Beyond surveillance: extrajudicial eliminationThe most damning part of what I am describing is not the unlawful surveillance or device monitoring. Those are serious, but they are not the core. The core is chemical suppression that functions as extrajudicial elimination: an attempt to disable or destroy a person without charges, trial, or acknowledgement.Within this global repression infrastructure, surveillance is the targeting system. The end point is harm to the body and mind. The methods I am pointing to are not metaphorical “attacks” but the use of military‑grade technologies and delivery methods in open, civilian spaces, in ways that are designed to be deniable and technically hard to prove. The goal is to remove someone as an effective human being, cognitively, physically, socially, while leaving no conventional record of an assassination.This is why the absence of a victim infrastructure is so catastrophic. There is no clear category for “slow, technologically enabled, chemically mediated elimination by distributed actors.” There is no standard protocol that says, if someone reports these patterns, here is how we test, document, and protect. Instead, the target is left to carry the damage and the burden of proof at the same time, while the operations continue in plain sight.If this description is even partially accurate for more than one person, then the problem is not just surveillance abuse. It is the existence of an architecture for extrajudicial elimination embedded inside everyday civilian life, and our current legal, medical, and human‑rights frameworks are not built to see it, let alone stop it. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
40
Staying Operational, Section 2: Cognitive Resistance: A Civilian Doctrine Under Psychological Warfare
Geneva, SwitzerlandIf you are reading this while overwhelmedIf you are encountering this text while confused, exhausted, hypervigilant, numb, or struggling to concentrate, that is not a personal failure. Those reactions are common under sustained psychological pressure and uncertainty. You do not need to understand everything here, or read it in order, for it to be useful.You can move slowly. You can skip sections. You can come back later.If nothing else, do this once or twice today: place both feet on the ground, say your name and where you are, and name one solid thing you can see or touch. Then take one slow breath out that is longer than your breath in. That is enough for now.This document is written for duration.I. Stockdale and the Cognitive Problem of SurvivalIn September 1965, U.S. Navy pilot James Stockdale was shot down over North Vietnam. He would spend more than seven years as a prisoner of war, much of it in isolation, subjected to repeated interrogation, physical torture, psychological manipulation, and prolonged uncertainty. There was no release date. There were no reliable communications. There was no way to know whether the war would end in months or decades, or whether he would leave alive.What made Stockdale’s captivity uniquely destructive was not only the physical abuse. It was the sustained attack on cognition and identity. Prisoners were deliberately isolated, disoriented, and deprived of reliable information. Time itself became unstable. Days blurred. Promises were made and withdrawn. Hope was manipulated as a tool of compliance. Prisoners were pressured to trade internal coherence for short term relief, conditional privileges, or the appearance of safety.Accounts from the period describe shifting narratives presented to prisoners: cooperation might lead to improved treatment, isolation might end soon, external negotiations might change conditions. None of these claims were reliable. Their function was not truth, but destabilization. Each broken expectation weakened internal orientation and increased dependency on the captor’s version of reality.Isolation compounded this effect. Without consistent social reference points, prisoners lost ordinary markers of time and self. Memory became harder to anchor. The internal narrative that allows a person to say “this is who I am and what is happening to me” came under direct threat. Under these conditions, psychological collapse did not require dramatic events. It emerged from erosion.Stockdale later described that survival depended less on physical endurance than on maintaining a stable internal position under relentless uncertainty. Prisoners who oriented themselves around fixed release dates, imagined rescue timelines, or clung to optimistic milestones often broke when those expectations failed. Others collapsed into passivity when the duration of captivity appeared endless.What Stockdale and a small number of others recognized was that survival required a different stance entirely. Not denial of reality, and not surrender to it, but a disciplined capacity to hold brutal facts and long term faith at the same time.This cognitive stance became known as the Stockdale Paradox.II. The Stockdale Paradox as an Operating StanceThe Stockdale Paradox is often mischaracterized as optimism. It is not. It is a refusal to trade truth for comfort or comfort for despair.Stockdale described it this way: never lose faith that you will prevail in the end, while simultaneously confronting the most brutal facts of your current reality, whatever they may be.The paradox matters because it prevents two common failure modes under prolonged constraint.The first is fantasy optimism. This is the belief that conditions will improve by a specific date, event, or intervention. When that moment fails to arrive, the psychological crash is severe. Hope becomes a liability rather than a resource.The second is total despair. This is the conclusion that nothing will change, nothing matters, and agency is gone. This state often leads to withdrawal, passivity, and cognitive shutdown.The Stockdale Paradox rejects both. It requires honesty about present conditions without allowing those conditions to define the end state. Faith is not placed in timelines, authorities, or rescue scenarios. It is placed in internal continuity and eventual meaning.This stance allowed Stockdale to survive years of uncertainty without surrendering identity, memory, or moral position.What matters for civilians is not the historical context of the Vietnam War, but the cognitive structure of survival under sustained psychological pressure.III. The Civilian Cognitive ThreatAt the civilian level, psychological pressure operates differently, but targets the same cognitive functions.Civilians subjected to sustained harassment, surveillance, coercion, or psychological pressure face a different environment than prisoners of war, but a similar cognitive threat. The objective is not always physical removal. It is often erosion of internal coherence.Patterns may include isolation, disruption of routines, persistent uncertainty, denial of experience, manipulation of social perception, and pressure to abandon stable self reference. Individual incidents are often deniable in isolation. Their cumulative effect is not.Ambiguity is a central weapon. Authority is unclear. Intent is unclear. Duration is unclear. Civilians are rarely told what is happening, why it is happening, or when it will stop. This ambiguity forces constant self monitoring and second guessing, which degrades cognitive bandwidth over time.In practice, this can look mundane rather than dramatic. Repeated schedule disruptions that have no clear source. Persistent administrative “errors” that always resolve against the same person. Social misrepresentation that cannot be cleanly confronted because it is informal, indirect, or plausibly accidental. None of these alone constitute captivity. Together, they can function as psychological enclosure.Unlike prisoners of war, civilians are often expected to continue functioning publicly while under pressure. This increases cognitive load and self doubt. The absence of a named enemy or defined boundary makes internal orientation harder to maintain, not easier.Under these conditions, the primary risk is not distress itself. It is loss of agency, memory, and narrative continuity. The mind becomes the contested terrain.This section defines cognitive resistance as the disciplined practice of maintaining internal position, decision making capacity, and continuity of self under psychological pressure.IV. Cognitive Resistance DoctrineCognitive resistance begins with a clear premise: hostile conditions do not entitle themselves to the mind.The doctrine rests on several principles.First, resistance is behavioral before it is emotional. One does not wait to feel strong. One acts in accordance with values and continuity despite distress.Second, resistance is procedural. Small, repeatable actions matter more than insight or motivation.Third, resistance is paced for duration. This is not assumed to be a short crisis. Planning assumes a long horizon.Fourth, resistance prioritizes cognition. The objective is not to eliminate fear or discomfort, but to keep the mind sufficiently online to choose, observe, remember, and document.This doctrine is not reckless. It acknowledges risk. It emphasizes preparation, red lines, and deliberate engagement rather than blind exposure.V. Training for Cognitive ResistanceTraining under psychological pressure must be simple, portable, and executable under stress. The following drills are designed to interrupt cognitive collapse and preserve agency in constrained or hostile environments.A. Grounding Drill: Three Point Ground LockWHEN: Disorientation, dissociation, or cognitive drift begins.PURPOSE: Re anchor attention in physical reality and restore internal position.Procedure:* Feet Place both feet on the ground if possible. Press down and notice pressure in heels and toes.* Name and place State silently or aloud: name, location, and date if known. If the date is unknown, state that.* One solid fact Identify one concrete object in the environment. A wall, a door, a chair.If nothing else is available, remember: feet, name, one fact.B. Sensory Check: Three Two OneWHEN: Cognitive overload or spiraling thoughts emerge.PURPOSE: Restore present moment orientation.Procedure:Identify three things you can see.Identify two things you can feel.Identify one thing you can hear.This drill can be run silently during movement or while stationary.C. Tactical BreathingWHEN: Physiological escalation interferes with thinking.PURPOSE: Reduce arousal to preserve decision making.Two simple patterns are recommended.Box breathing: inhale four counts, hold four, exhale four, hold four.Extended exhale: inhale two to three counts, exhale four to six counts.Priority is given to a longer exhale than inhale.These drills are maintenance tools, not cures. They work through repetition. Under pressure, failure to interrupt spirals early leads to cumulative cognitive depletion. Running drills early and often preserves bandwidth over time.VI. Behavioral Continuity Under ConstraintPsychological pressure often aims to restrict movement, shrink routines, and induce avoidance. Cognitive resistance counters this through deliberate behavioral continuity.This does not mean doing everything as before. It means identifying what remains non negotiable.Movement anchors agency in the body. Mental engagement preserves narrative coherence. Meaning anchors orientation beyond immediate conditions.Activities are selected deliberately. A mission is defined in advance. Red lines are established. Engagement is strategic, not impulsive.Completion matters more than intensity.VII. Micro Routines as DefianceAt the level of daily life, doctrine becomes routine.When larger structures are disrupted, resistance shifts to micro routines. A morning marker may include stating one’s name, the day if known, and a single intention. Daytime anchors may include one action for the body, one for the mind, and one for meaning. A night marker may include a hygiene act and recording one detail worth remembering.Even minimal routines preserve internal structure.Routine under constraint is not comfort. It is defiance.VIII. Documentation as Cognitive DefenseIn environments where experience is denied or distorted, documentation serves both practical and cognitive functions.Keeping a simple incident log reinforces reality testing and memory. Entries should be factual and brief: date, time, location, description, witnesses, physical symptoms.The act of recording communicates to the nervous system that experience is real and observed.Documentation is not obsession. It is containment.IX. Training the Stockdale ParadoxAt the level of internal stance, the Stockdale Paradox must be practiced.A daily check in may include acknowledging current facts, reaffirming a non negotiable end state, and selecting one action aligned with continuity.A weekly review may involve listing constraints alongside evidence of maintained agency.Deadline thinking is corrected immediately. Planning assumes duration.This stance prevents both hope crashes and collapse into despair.X. Operational ContinuityCognitive resistance does not require feeling strong, calm, or confident. Those states fluctuate under sustained pressure.What matters is continuity of action, continuity of memory, and continuity of agency.Each day the mind remains sufficiently online to choose, observe, and remember is a day the objective of psychological collapse is not achieved. Staying operational is not about eliminating distress. It is about preventing erosion of internal position over time.This doctrine does not promise comfort. It offers durability.Survival under psychological pressure is procedural. It is repetitive. It is often quiet.That is what makes it effective.ClosingStockdale survived captivity by refusing to let uncertainty take possession of his mind. He did not predict an end date, and he did not surrender his internal position while waiting for one. That stance, not optimism or denial, allowed him to endure conditions designed to erase agency and identity.The same cognitive problem appears wherever psychological pressure is used to destabilize civilians through ambiguity, disruption, and denial. The environment may be civilian rather than carceral, but the objective is familiar: erosion of continuity until compliance or collapse becomes easier than resistance.Cognitive resistance is not dramatic. It does not announce itself. It is the daily, disciplined act of holding an internal line when external conditions are unstable. Staying operational means preserving memory, choice, and coherence long enough for meaning and testimony to endure.This doctrine is written for duration. It assumes constraint. It assumes repetition. It assumes that clarity must be actively maintained rather than passively expected.That is how the mind remains intact.That is how a witness is preserved. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
39
Why I Can’t Go Home
Before Newark: How I Was Prevented From Leaving SafelyWhat happened in Newark did not begin in Newark. By the time I reached that airport, multiple attempts to contain my movement had already failed.The first break in containment was renewing my expired passport.I anticipated interference. Same day passport issuance is a known choke point. Instead, the process went smoothly. Once issued, my legal right to leave the United States hardened in a way that removed many administrative options for stopping me.To obtain the passport the same day, I was required to show proof of imminent international travel. The cheapest available ticket was to Vancouver, British Columbia. I purchased it for that purpose. When the ticket turned out to be nonrefundable, I decided to use it. I had never been to Canada. It was three hours from Seattle and six from Portland, and I was considering spending time there anyway, possibly splitting my time between the two. The decision was practical, documented, and lawful.That is when containment reappeared.At the Canadian border, I was singled out. No other passengers were pulled aside. My bags were searched. I was told I could not enter Canada because of a dispute with my landlord. I was told I could return when my financial affairs were “in order.” They attempted to contact my landlord.None of this has a legitimate relationship to Canadian admissibility as it was presented to me. What mattered was not the explanation but the result. I was blocked.While I was isolated at the border, one of the officers assaulted me with a hazardous substance. I told her directly that I was a whistleblower, that I had filed a human rights complaint in Geneva, Switzerland, and that I was on my way there. I photographed her and said I would be adding her to the record. She attempted to grab my phone. Another officer restrained her.I was then walked back across the border into Washington State.It was after midnight. I was told I could not sit in the border lobby and wait for the next bus, which would not arrive until morning. I was told I could not remain on the property at all. I was forced to leave.I spent the night in Bellingham. I was chemically assaulted in the room through the HVAC system and through architectural ingress. I slept on the floor. The next morning, the assaults continued in the lobby and at breakfast.From Bellingham, I went to the airport and eventually took a shuttle back to Seattle. Assaults continued in the terminals as well as on the shuttle bus to SeaTac Airport. There are no direct international flights from Seattle to Geneva. I did not know that at the time. My routing took me through Newark.Because of TSA disruptions and repeated flight delays, I missed my original connection. I accepted an eight hour layover deliberately. Flights were being pushed back repeatedly, and I chose a longer layover to ensure I would not miss the international leg entirely.By the time I arrived in Newark, I had already demonstrated that I could not be quietly rerouted or deterred. Blocking Canada did not work. Passport issuance did not work. Domestic travel did not work. I was still moving toward Geneva.That is the context in which Newark unfolded.Newark: Escalation After I Preserved EvidenceI was flying out of Seattle during a federal government shutdown. TSA staffing was disrupted. Flights were delayed and reshuffled across the board. I missed my original connection but was eventually rebooked through Newark. Because of that rebooking, I ended up with an approximately eight hour layover. I was in the terminal for hours, in public, on camera, doing nothing more than waiting.During that layover, I was chemically assaulted multiple times by people passing me in the terminal, individuals with luggage who brushed close enough for exposure and then moved on. This is not speculative. Newark is a heavily surveilled airport. The movement of those people, their proximity to me, and my reactions should all be visible on airport cameras.Two of those incidents stood out because they followed a pattern I had already experienced repeatedly in hotels and airports. Janitorial staff were used as delivery mechanisms.The first janitor was a woman with a traditional mop and bucket. I was seated in a public area. She approached and began mopping directly next to me, despite there being nothing to clean. She did not mop anywhere else. I smelled the chemical before she reached me. I told her clearly, “please wait, I’m allergic.” She ignored me, continued mopping only beside me, then left.I went to ask for help and requested security. I flagged down a woman who turned out to be United staff. When I told her I had just been assaulted with a hazardous substance, she called a United supervisor.When the supervisor arrived, she took a report. While she was writing, I asked her if she knew what a volatile organic compound was. She said she did. She had studied chemistry or physics at Rutgers. I explained that the substance used against me contained a volatile organic compound and that I had been repeatedly assaulted with similar solutions. I showed her my Substack. I told her I had filed a human rights complaint in Geneva and that I was traveling to Switzerland to follow up on it.She then called the janitorial supervisor. He came, wrote his own report, and told me he believed it was an innocent mistake. His posture made it clear he was trying not to get the worker fired. At that point, I had done what I was supposed to do. I reported the assault. I documented it. I made myself visible.Then it happened again.The second janitor was a young Black man operating a mechanized mop cart. He likely spoke Spanish. He drove the cart into the restaurant bar area where I was sitting and began dispersing the substance via the mopping solution. I left the area to avoid exposure. He left as well.As I walked past his unattended cart, I noticed a clear bottle sitting on top. Inside was a blue liquid. I picked it up and opened it. The smell was unmistakable. It matched the substance that had been used on me for six months in hotel and restaurant water solutions. My throat, nose, and eyes burned immediately.I asked him if this was what he was using in the water. He responded in another language. We could not communicate clearly.At that point, I understood that for the first time I had the substance itself. Not a description. Not a symptom. The actual liquid. I did not include them here, but I have photos and/or video of both incidents, including janitorial staff involved, security camera placement and the water bottle containing the blue liquid on the cart and in my possession after the assault.I tried to find the janitorial supervisor again. No one would identify him or bring him. I then saw the same United staffer from the first incident as she was about to leave and asked her to call the United supervisor again. I told her the same thing had happened and that I now had the substance.When the supervisor returned, I showed her the bottle. I explained that it came from the cart and that the smell matched what had been used on me. I told her it needed to be tested. This was finally a chance to identify what was being used.She made several calls from the podium. Then she told me I could not take the substance on the plane.That matters. If the liquid were harmless, there would be no reason to forbid me from flying with it. In practice, it was treated as hazardous material.When she said I could not fly with it, I said the substance still needed to be tested and asked about calling the police. She told me that at the airport, the police are Port Authority. So I called them myself.I asked Port Authority to take custody of the bottle as evidence, send it for testing, and take a report for assault with a hazardous substance.On the phone, they acted as if they did not understand what “assault with a hazardous substance” meant. They resisted sending anyone. After repeated back and forth, they agreed to send officers.When the officers arrived, I explained everything again. I told them the bottle came from the cart. I told them the smell matched what had been used on me. I told them this was evidence.They told me they did not see that any crime had been committed. They told me they would not take the bottle into evidence. They told me they would not send it for testing or take a report.Then they pivoted.They accused me of stealing the bottle.This was a small bottle, approximately eight to twelve ounces, containing a blue liquid that I had taken specifically so it could be preserved and reported as evidence. The accusation was absurd. It was also useful.When they said they would not take a report or the bottle, I said “okay,” put the bottle into a paper bag, and turned to leave with it so it could be preserved elsewhere.That is when they ran after me, grabbed me, and put me in handcuffs. I had never been handcuffed before in my life. They said I was under arrest for stealing a water bottle.They were wearing body cameras. This should exist on video.Once I was handcuffed, they took my phone, purse, and laptop bag. I do not know what they did with them while I was restrained. As I asked what they were doing and people watched, they pulled me into a secluded corridor out of view of other passengers.EMS was called. I had already reported burning in my nose, throat, and airways. I declined on site treatment and said I would see a doctor of my choice in Geneva.Instead of treating chemical exposure, EMS attempted to conduct a psychiatric evaluation in the hallway without my consent. They asked if I had a diagnosis. If I was on medication. If I had medication I should be taking. What year and day it was.I answered no to diagnosis and medication questions. I said I did not consent. I overheard the female EMS worker telling Port Authority that if they wanted me removed from the premises, they would take me.Later, a sergeant arrived. I asked why I was under arrest after reporting an assault and asking them to take custody of evidence. He said, “They didn’t tell you? One or more unidentified individuals reported you were acting erratic, and that’s why we have you here in custody.”This explanation appeared out of nowhere. It conflicted directly with the earlier claim that I was being arrested for stealing a water bottle. It emerged only after I insisted the substance be treated as evidence.While I was still in handcuffs waiting for EMS, I saw one of the officers speaking with United staff. Shortly after, the United supervisor told me I could not fly. My ticket would be refunded. I would need a doctor’s note or mental health evaluation to be cleared to travel.This is how it works. Refuse to document the assault. Refuse to test the substance. Create a narrative of erratic behavior. Use public handcuffing to justify denial of travel. Shift the problem from chemical exposure to mental health, despite regulations designed to prevent exactly that kind of discrimination.Eventually, EMS did not remove me. Port Authority, without explanation, walked me to the door and released me. They returned my belongings.I took a bus and the subway to JFK. I bought a new ticket. I passed TSA screening. I boarded a flight to Switzerland without incident.The assaults did not stop. They continued in terminals, on planes, and after my arrival in Geneva, indicating that the mechanism involved is not limited to a single airport, agency, or jurisdiction.What Newark MeantBy the time Newark escalated, the issue was no longer travel. It was evidence.Up to that point, every attempt to stop me had relied on friction, delay, or discretionary obstruction. Canada was blocked. Routes were disrupted. I was rerouted, delayed, and exposed. But I kept moving. Obtaining my passport removed one layer of control. Continuing to travel removed another.Newark is where a different boundary was crossed.When I identified and preserved the substance used against me, I broke informational containment. The harm was no longer deniable, abstract, or purely testimonial. I had the material itself. That changed the calculus completely.At that point, there were only a few options left. Testing the substance would have created a record. Taking a report would have created a record. Allowing me to retain custody of the bottle would have created the possibility of independent verification. All of those outcomes threatened narrative control.So those options were refused.Instead, the response escalated. Evidence was reframed as theft. Reporting was reframed as disruption. Persistence was reframed as erratic behavior. Once that reframing was in place, the next step became available: psychiatric framing.That is not incidental. Psychiatric framing is the only mechanism that simultaneously accomplishes several things at once. It justifies restraint. It justifies removal from flights. It justifies confiscation of property. It discredits testimony retroactively. And it does all of that without ever addressing the underlying facts.That is why it appeared exactly where it did.The key point is this. None of it worked.After being handcuffed, publicly humiliated, and removed from my flight, I booked another ticket. I flew out of JFK without incident. I passed TSA. I boarded an international flight. I arrived in Geneva. I cleared biometric processing. I spoke briefly with an officer. He stamped my passport and let me enter.No escalation. No concern. No psychiatric framing. No problem.That outcome matters more than any narrative imposed in Newark.It demonstrates that when I am not subjected to coordinated obstruction, there is no issue with my behavior, my mental state, or my fitness to travel. The problems appear only where interference is being actively applied, and they disappear the moment that interference is absent.Newark did not reveal something about me. It revealed something about the system I was confronting.It showed what happens when physical containment fails and informational containment fails next. It showed that escalation and psychiatric framing were not responses to danger or instability, but countermeasures deployed to stop movement and suppress evidence.That is why I cannot go home.Returning would not mean resolution. It would mean renewed exposure to the same tools. Administrative obstruction. Manufactured concern. Pathologization in place of protection. Loss of credibility instead of investigation.Newark was the point at which that reality became undeniable. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
38
Update: Victim Testimony, ProtectDefenders.eu, and Relocation to Ireland
Geneva, SwitzerlandTo everyone who has written to me, shared testimony, or followed this work on global repression: thank you. Your trust and courage are the reason this project exists.Over the past weeks, the situation around me has continued to deteriorate, and it has become clear that I need to move in order to continue this work in a safer and more stable environment. I am therefore preparing to relocate from the Geneva region to Ireland, where I will be seeking to formally anchor the project in a security related doctoral program and a stronger human‑rights ecosystem.Earlier today, I heard back from ProtectDefenders.eu, the European Union’s protection mechanism for human rights defenders, and my request for support is now under review. I am also in contact with Front Line Defenders, based in Dublin, and with other organisations in Ireland that specialise in supporting defenders at risk. My hope is that they and their partners will be able to assist with this transition so that I can keep documenting this global repression architecture and supporting those targeted by it.Because of this relocation, my ability to respond individually to emails and testimony will be limited for the next several weeks. This does not mean your messages have been forgotten or set aside; it means I need this window to move, stabilize, and re‑establish secure working conditions. Once I am settled in Ireland, I will begin going through the backlog of testimony and inquiries and will resume replying as I am able.I do not expect interference to stop when I cross a border; transnational repression does not end at a customs line. What is becoming visible instead is a pattern: similar tactics have surfaced around me in Switzerland and France, and if they now reappear in Ireland, that will further confirm that we are dealing with a coordinated global repression network rather than isolated incidents. Ireland’s legal framework, human‑rights community, and role in wider European debates make it a place where these patterns can be documented and challenged more effectively, and where the emerging field of Global Repression Studies can take root.Because I am relocating and my capacity is limited, I cannot safely act as an emergency contact. If you are in immediate danger, you may need to prioritize getting yourself out of the exposure or surveillance environment as best you can, using whatever safe options are realistically available to you. In some contexts, the usual channels (including law enforcement or formal complaints) may not feel safe or accessible; only you can judge what is possible in your situation and what will genuinely reduce your risk. While I travel to Ireland over the holiday period, I will only be able to check messages intermittently and may not always have internet access. As soon as I am settled and back online, I will post an update on Substack and begin responding to pending messages as I am able.Thank you again for your patience, your strength, and your willingness to speak. This move is about protecting the work we are building together so that it can continue louder, clearer, and better supported in the next phase.In solidarity,Tamara This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
37
Update on ProtectDefenders.eu
Geneva, SwitzerlandYesterday I wrote about contacting ProtectDefenders.eu while under active threat. This is a brief update on what happened next, and what it does and does not change.I received an automatic reply. It states that ProtectDefenders.eu does not handle evacuations, does not arrange visas, and does not provide permanent relocation. Instead, they point human rights defenders to the forms of support that fall within their mandate: time-limited emergency grants, short-term relocation, security measures, legal and medical assistance, and organisational support.That distinction matters. It reframes what can realistically be asked of them. In some cases, they may help someone remain in place a little longer or mitigate specific risks. They cannot remove a person from a hostile environment.My original post was written in real time, from inside fear, anger, and disappointment. I am not taking it down. The emotional reality of reaching for help and discovering that no one is positioned to get you out is part of the truth of this situation.The larger problem is not unique to one organisation. Existing protection mechanisms were not designed for systemic psychological and cognitive warfare, including counterinsurgency tactics developed for war zones and redirected into civilian space. They do not match the reality of being chemically suppressed, cognitively targeted, and kept in harm’s way within a civilian setting.For people in this position, that leaves a difficult truth: there is no quick fix, no cavalry coming, and no external actor who can unilaterally remove us from danger. The support that exists is partial, conditional, and inadequate to address the actual harm and risk involved.That gap is why a victim infrastructure will have to be built. At present, many of us are effectively on our own.In response, I am publishing the next section of the ongoing manual I have been writing: Staying Operational, Section 2: Cognitive Resistance – Civilian Doctrine Under Psychological Warfare. It does not offer rescue. It offers doctrine for maintaining cognition, agency, and testimony when external systems cannot or will not remove you from danger.You can read it here:Staying Operational, Section 2: Cognitive Resistance This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
36
There Is No Lever To Pull: What Victims Meet When They Ask For Help
Geneva, SwitzerlandI am publishing this to document a gap that is putting people’s lives at risk and to make it impossible for anyone in a position of power to say they did not know it exists.There is no lever to pullI am a human rights defender currently trapped in what can only be described as a chemical kill box in an EU member state. I have done everything I can to seal the space I am living in, and yet I am being subjected to continuous chemical suppression via the architecture and systems of the building itself.If I open the window, the person next door disperses chemicals from their window and the dosing comes straight into my room. If I open the front door to get air, the hallway is saturated with a fragrant volatile organic compound that burns my throat, nose, and airways. If I go downstairs to the shared areas, staff, residents, and guests are sent to chemically assault me in public; if I leave the building to go to a restaurant, to the pool, to any public space, they do the same there.This is not only a personal attack; it is a public safety risk. When they target me in pools, restaurants, and shared spaces, seniors, children, and the general public are exposed to the same toxic, chemically contaminated air.A kill box built out of air and devicesEvery basic survival tool I have tried to bring in has been turned into a weapon. I ordered an Instant Pot, an air fryer, and a HEPA air filter; chemicals were inserted so that when I plug them in, they disperse into the room. I cannot use the refrigerator because it releases some kind of gas; the bathroom has architectural ingress, and the HVAC system is being used as another channel.This is what a modern kill box looks like in a “normal” apartment building in a democratic country:- Walls, vents, fixtures, and shared infrastructure converted into delivery systems.- Public and semi‑public spaces seeded with people whose job is to dose you as you move.- Devices and appliances you bought for protection turned into new vectors of exposure.It is an isolating, degrading, and deeply dehumanizing experience to live like this. Chemical suppression affects you emotionally, physically, and physiologically in ways that are hard to put into words, and yet victims are still expected to describe it calmly and prove it while it is happening to them. Under normal circumstances, you would go to your doctor, talk to law enforcement, or seek support from a mental health professional. In this context, every one of those routes can be weaponized against you, used to discredit you, to pathologize you, to question your credibility, or to turn your attempt to seek help into “evidence” that you are unstable.Victims have every right to be kicking, screaming, and crying at the top of their lungs; the fact that we have to exercise emotional restraint just to be heard is itself part of the abuse.Reaching for help and finding a voidIn this situation, I did what any rational person would do: I reached for the European human rights defender protection mechanism that advertises 24/7 emergency support. I called, followed instructions, sent the urgent emails they requested, and was told that verification and reaction could take up to two months.Two months. I am not even properly “in the process” yet. I could be dead in two months.In the past days:- I have called the emergency line, left messages, and sent follow‑up emails. I have received no response except for a single automated reply on one email.- When I tried to call again, it appeared that I might be blocked or limited. I do not know if it is my compromised device or a system that stops people from calling too often, but I now cannot reach anyone to even ask.- No one has told me whether my case has been opened, what the next steps are, or when I can expect a substantive reply. There is no clear window, no “we will call you back within 24 hours,” no temporary safe address, no basic human contact.I understand that people inside these mechanisms are overloaded and often working with limited resources. The problem is not individual goodwill; it is an architecture that allows a defender in a kill box to wait days, weeks, or months without a clear response, while perpetrators continue to escalate.When your life expectancy under targeting is measured in weeks, and the protection system moves on a two month clock with no guaranteed contact, what you have is not a protection mechanism; you have a permission structure for extrajudicial elimination in so called democratic societies.If someone had simply picked up the phone and told me where to go, I could have bought a ticket and been in safer housing that same day. I was not asking for the world; I was asking for one human on the line and one address. That did not happen.Why this is happening, and why they are escalatingWhat hostile actors have learned is simple: there is no real victim infrastructure. There is a mature operational infrastructure for surveillance, harassment, and chemical repression, but almost nothing equivalent for rapid protection, relocation, medical and psychosocial care, legal support, or independent documentation.They escalate because they know that by the time any mechanism opens a file, verifies a case, and decides what to do, they may already have killed the target without ever laying a hand on them. They are using threshold style chemical exposure, the kind that sits below obvious acute incidents but above safe levels to push people toward slow, deniable elimination, inside the blind spots of voluntary, list based export‑control frameworks that were never designed for this kind of abuse.The “dark side,” as I call them, have a legitimate fear of what I am capable of documenting and building. Systems do not invest this level of sustained, high cost repression in people they consider irrelevant; they escalate because they know that if I survive long enough to map this architecture, design guardrails, and help build real victim infrastructure, their ability to operate in the shadows will not survive. In a perverse way, the fact that they have invested this much effort in trying to break, discredit, and eliminate me only reinforces my credibility: systems do not expend this level of resources on people they do not perceive as a real threat.Why I am uniquely positioned and why I need to live long enough to helpI am not writing this to be a passive victim. I am a human rights defender and the founder of a research institute on global repression, mapping how these systems work and where the legal and policy gaps are. I am uniquely positioned to do this work precisely because I am living it: an unwilling experimental variable inside a threshold based chemical suppression regime that sits in the blind spots of our current export‑control and human‑rights frameworks.I want to be part of the solution, not another name lost to the problem. That is why I have reached out to a leading law firm in Washington, D.C. There are only a handful of people in the world who truly understand how the Wassenaar Arrangement, export‑control gaps, private contractor abuse, and dual use surveillance technologies fit together to form a global repression network; the person I contacted is one of them. This is squarely in their wheelhouse, and I am hoping they will see what I see: that this is one of the greatest threats to democracy in the post‑Cold War era, and that now is the time to step into this fight with me. The goal is to dismantle and constrain this architecture, obtain real relief for victims, and build oversight and accountability mechanisms that will hold for the next 30 or 40 years, so that no one has to live through what I and others are living through now.But I have to live long enough to do any of that.As I invite UN Special Rapporteurs, lawyers, and other allies to join this fight, I am also asking them to recognize something simple: if you want victims to be protected, you must protect the people doing the work to protect them. The person mapping this architecture, building the field, and creating victim infrastructure is herself under attack. If you want others to be safe, you have to ensure that the person holding the line for them is not left alone in a kill box.A direct call to lawyers, advocates, journalists, and academicsI know who reads my work: lawyers, advocates, journalists, professors, and researchers. I am publishing this to identify the gap that nearly killed me and to make it impossible for you to say you do not know it exists.I am asking you, in your respective roles, to do what you can to help bridge it:- If you are a lawyer, explore strategic litigation and emergency measures that can force real‑time protections for people being chemically suppressed and stalked, not just remedies years later.- If you work in NGOs or international mechanisms, push for protocols that guarantee same‑day human contact, clear callback windows, and access to temporary safe housing for defenders reporting life‑threatening attacks.- If you are a journalist, investigate the protection gap itself: cases where people were killed, disabled, or disappeared while waiting for “verification” or basic acknowledgment.- If you are a professor or researcher, treat “no victim infrastructure” as a field problem and start designing architectures, legal, medical, social, and technical, that can respond as quickly and adaptively as the systems that are killing people now.This is a dark period in our history: sophisticated suppression architectures have outpaced our laws, our protections, and our imaginations. The measure of whether it stays dark will be whether we build legislation, policies, and oversight now, while people like me are still alive to testify and to help design what comes next.They picked the wrong person to come for. Short of death, I will map the architecture of this system, identify the guardrails needed to constrain and dismantle it, and work to ensure it can never again function in the shadows to harm civilians. I will create and advocate for the policies required to build the victim infrastructure that has nearly killed me and is killing others today, so that no one ever has to live or die inside this kind of vacuum again. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
35
Toxic Substances Are Already a Human Rights Issue. The United States Is the Outlier
Geneva, SwitzerlandI. Recognition already existsThere is a persistent misconception in public debate that toxic exposure occupies a legal gray zone, or that it has not yet been recognized as a human rights concern. That premise is incorrect. Within the United Nations system, toxic substances and hazardous exposures have been treated as a human rights issue for decades. The mandate of the Special Rapporteur on toxics and human rights is a standing part of the UN Special Procedures. It is not experimental. It is not provisional. It is not speculative.Under this mandate, States have obligations derived from core human rights, including the rights to life, health, bodily integrity, information, and a clean, healthy, and sustainable environment. These obligations include duties to prevent and minimize exposure to hazardous substances, to regulate and oversee non State actors, and to ensure access to justice and effective remedies when harm occurs. These are not policy preferences. They are framed as legal duties grounded in existing human rights law.This matters for one central reason. As a member of the United Nations, the United States is not conceptually outside this framework. It is bound by the same body of norms that it often invokes in other contexts. This framework is equally binding on European Union member states, where UN standards on hazardous substances and the right to a clean, healthy, and sustainable environment are increasingly reflected in European Union law and the jurisprudence of the European Court of Human Rights, even as implementation remains uneven. The question, then, is not whether toxic exposure qualifies as a human rights issue. That question has already been answered. The real question is whether victims can realistically invoke this framework in practice, particularly when exposure is invisible, intermittent, or deniable.II. What the toxics mandate actually coversThe UN mandate on toxics and human rights is broad by design. It covers the full life cycle of hazardous substances and wastes, from extraction and production to use, disposal, and long term environmental persistence. It addresses exposure through air, water, soil, food, workplaces, homes, and shared infrastructure. It applies to industrial chemicals, pesticides, waste streams, consumer products, and military or security related uses.Crucially, the mandate does not limit itself to acute poisoning or catastrophic events. It explicitly recognizes cumulative harm, low dose exposure, and chronic risk. The Special Rapporteur has repeatedly emphasized that harm does not require immediate injury or dramatic incidents. Long term exposure to low concentrations can violate human rights when it undermines health, shortens life expectancy, or interferes with bodily integrity over time. This framing is essential because it aligns human rights protection with how toxic harm actually operates in real environments, rather than with how harm is easiest to prove after the fact.The scope of responsibility is also explicit. States have a duty to protect people within their jurisdiction from toxic exposure, including exposure caused by private actors. Businesses have responsibilities to prevent harm. These duties extend beyond borders. The mandate recognizes that hazardous substances move across jurisdictions through trade, waste exports, environmental pathways, and supply chains. Protection does not end at national boundaries, and responsibility does not dissolve when harm is mediated through complex economic or infrastructural systems.A central concept within the mandate is the duty to prevent and minimize exposure. This duty operates ex ante. It is triggered by foreseeable risk, not by confirmed injury. Prevention in this context means identifying hazardous substances, regulating their use, controlling emissions, ensuring safe alternatives where possible, and intervening before exposure reaches levels that cause harm. Minimization requires continuous oversight and adjustment, particularly where exposure cannot be eliminated entirely. The mandate therefore places emphasis on precaution and due diligence rather than reactive enforcement.This preventive logic matters because it reframes how accountability is assessed. If prevention is a duty, then the absence of conclusive proof of harm does not excuse inaction. Instead, the failure to take reasonable steps to prevent foreseeable exposure can itself constitute a violation of human rights obligations. This approach is particularly important for substances whose effects are delayed, cumulative, or difficult to detect, where waiting for definitive evidence would guarantee harm before intervention.One of the most important features of the mandate appears in the principles on the protection of workers from exposure to toxic substances. These principles make clear that workers, representatives, whistleblowers, and human rights defenders must be protected from intimidation, threats, or reprisals linked to toxic exposure. They also state that workers and affected communities should not bear the full burden of proving causation in order to access remedies. This reflects a recognition that information asymmetry and evidentiary imbalance are structural features of toxics cases, not anomalies.Taken together, these elements show that the mandate is not merely descriptive. It is operational. It anticipates invisibility, cumulative harm, cross border exposure, and power asymmetries. It builds those realities into the allocation of duties and the design of remedies. The gap, therefore, is not in the scope or ambition of the law. It lies in how rarely these principles are translated into domestic procedures that victims can actually use.III. Why this recognition mattersThe existence of a recognized mandate has concrete consequences. It changes how harm is assessed, how responsibility is allocated, and how justice should function.First, it shifts the burden of proof. Because prevention and minimization of exposure are framed as duties, the question is not whether a victim can conclusively prove harm after the fact. The question is whether States and regulated actors took reasonable steps to prevent foreseeable risk. Failure to prevent exposure can itself constitute a violation, even before individual injury is established. When proof is treated as a precondition for protection rather than the outcome of precautionary response, invisibility functions as a gatekeeping mechanism that denies victims entry into the legal system altogether.Second, it means protection frameworks already exist. The UN system has developed guidance on protecting environmental and human rights defenders, including those exposed to toxic risks. These frameworks emphasize early intervention, access to information, and protection before harm becomes irreversible. They recognize that waiting for conclusive proof can itself entrench harm.Third, it reframes denial as a policy choice rather than a conceptual gap. Recent UN work, including the Guidelines on access to justice and effective remedies in the context of toxics, states plainly that there is already a strong basis in human rights law. The problem lies in the barriers that prevent victims from using it. These barriers include unreasonable or insurmountable burdens of proof, lack of specialized mechanisms, high costs, and weak enforcement. Together, they entrench impunity even where obligations are clear.IV. How this framework emergedThe recognition of toxic exposure as a human rights issue did not arise overnight. It emerged through decades of work on industrial pollution, occupational health, pesticide exposure, waste dumping, and environmental injustice. Communities living near industrial sites, workers exposed to hazardous substances, and populations affected by contaminated water or food supplies pushed these issues into the human rights domain long before they were formally codified.International attention to transboundary pollution, export of hazardous chemicals, and waste trafficking reinforced the need for a rights based approach. Environmental justice movements highlighted how toxic exposure disproportionately affects marginalized groups. Over time, these strands converged into a coherent framework linking hazardous substances to fundamental rights.What matters for present purposes is continuity. The concepts of cumulative harm, vulnerable populations, transboundary responsibility, and precaution have been part of this framework for years. The tools were built to address industrial and environmental harms that were often invisible to the public eye. That same logic applies to other contexts of exposure today.V. Invisibility, proof, and the justice gapUN human rights bodies explicitly recognize that many hazardous substances are invisible to human senses and that smell or immediate perception is not a reliable indicator of exposure or safety. Hazardous substances from human activity are present in air, water, food, and homes, and they can cause serious harm even where exposure cannot be readily perceived without scientific instruments. Ordinary sensory cues therefore cannot serve as the basis for protection or proof.It is important to distinguish between perceptibility, detectability, and legal recognizability. A substance may be imperceptible to human senses, detectable only through specialized monitoring, and still fail to register as legally actionable harm within existing procedures. This gap between physical reality and legal recognition is where many toxics cases collapse. The mandate acknowledges this gap and treats it as a structural problem rather than an evidentiary accident.The Special Rapporteur has further acknowledged that invisibility creates a structural barrier to justice. Scientific information on exposure, risks, and hazards may be non existent, preliminary, delayed, or inaccessible. Monitoring data may not exist at the relevant scale or time. Where it does exist, it is often controlled by States or corporations rather than affected individuals. In these conditions, proving exposure or causation becomes exceptionally difficult, even where health effects are real and ongoing.Cumulative and intermittent exposure compounds this problem. Harm accrues over time through repeated low level contact rather than through a single identifiable event. Traditional evidentiary models, which assume discrete incidents and linear causation, are poorly suited to this reality. As a result, victims are often asked to meet proof thresholds that were never designed for the kinds of harm they experience.The Guidelines on access to justice and effective remedies in the context of toxics describe this problem in stark terms. They identify the need for complex technical evidence, lack of specialized judges, financial barriers, and weak enforcement as factors that make the burden of proof unreasonable or insurmountable for victims. In practice, invisibility converts exposure into administrative non events, where routine checks produce no actionable finding and the absence of data is treated as the absence of harm.This dynamic is not accidental. It reflects a structural mismatch between the nature of toxic harm and the design of evidentiary systems. When harm is cumulative, intermittent, or invisible, traditional proof models fail by design. The UN has acknowledged this failure and proposed remedies, including dynamic allocation of burden of proof, precautionary approaches, expanded standing, and specialized mechanisms capable of addressing technical complexity.What remains underdeveloped is the victim facing infrastructure that would allow these remedies to operate in real time. This includes accessible monitoring, timely data, procedural rules adapted to invisibility, and early protection pathways that do not depend on definitive proof at the outset. Without this infrastructure, norms remain formally binding but practically unreachable for those most affected.VI. Jurisdictional asymmetry as governance failureThe gap between recognition and enforcement produces a form of jurisdictional asymmetry. At the UN level, toxic exposure is treated as a human rights issue with clear obligations and acknowledged barriers to justice. In the United States and, in different ways, in parts of the European Union, the same exposure patterns are fragmented across environmental permitting regimes focused on thresholds, tort systems demanding individualized causation, benefits frameworks that substitute compensation for accountability, or security based exclusions that remove certain exposures from ordinary scrutiny altogether.This fragmentation means that exposure travels very differently through governance systems. At the UN level, it is framed in terms of prevention, due diligence, and access to remedy. In European human rights jurisprudence, it may be recognized under rights to life or private and family life, particularly in pollution cases. Domestically, however, the same exposure is often treated as a technical compliance issue, a private injury claim, or a matter outside ordinary regulatory reach.The result is that the same exposure pattern that would trigger precaution, due diligence, and defender protection discussions in Geneva is domestically routed into tort claims, benefits determinations, or silence, leaving no human rights protection pathway at all. European systems face a parallel tension. There is strong recognition of the right to a non toxic environment at the UN and Council of Europe level, alongside delayed enforcement, weakened chemicals regulation, and persistent gaps in addressing cumulative and low dose exposure, with PFAS restrictions and uneven enforcement offering a visible example.This is not a legal vacuum. It is a governance failure produced by institutional design. Systems built around thresholds, individualized causation, or post hoc compensation are structurally incapable of responding to invisible, cumulative harm. The UN approach, by contrast, integrates prevention, protection, and remedy, and treats invisibility as a reason for precaution rather than denial.Without corresponding domestic infrastructure, commitments remain declaratory rather than operational. Victims are left navigating systems that cannot see their harm. Defenders face retaliation without adequate safeguards. Exposure persists not because the law is unclear, but because the pathways that would activate it have not been built.VII. Contribution of this workThis analysis does not argue for new rights. It takes existing UN norms at face value and examines where they fail to operate in practice. It brings together the toxics and hazardous substances mandate with environmental justice analysis and human rights defender protection, which are often treated separately, and does so in a way that is directly relevant to both United States and European Union governance debates on human rights and environmental due diligence.The contribution lies in showing how acknowledged barriers to justice in toxics cases intersect with contexts of invisible or deniable exposure. It demonstrates how invisibility functions as the mechanism through which legally recognized harms become practically unverifiable. By focusing on infrastructure rather than doctrine, the analysis shifts attention from recognition to implementation.VIII. Not lack of norms, but lack of infrastructureThe problem, then, is not whether toxic exposure qualifies as a human rights issue. It is whether victims can realistically invoke that framework when exposure is invisible, evidence is controlled by others, and the infrastructure needed to bridge that gap has not been built.UN documents are clear. States have duties to prevent and minimize exposure, ensure access to justice and effective remedies, and protect workers, communities, and defenders. Until the procedural, evidentiary, and protective infrastructure required to operationalize those duties is constructed, these commitments remain formally intact but operationally hollow. The gap between recognition and protection will continue to shield inaction, not because the law is unclear, but because its implementation has been deferred.Mandate and Geneva ecosystem* OHCHR. “Special Rapporteur on toxics and human rights – About the mandate.” Office of the High Commissioner for Human Rights.* OHCHR. “Special Rapporteur on toxics and human rights – Annual thematic reports.” Office of the High Commissioner for Human Rights.* Geneva Environment Network. “Human Rights, Hazardous Substances, and the Role of Geneva.” Geneva Environment Network, updated 3 December 2025.* Geneva Environment Network. “Geneva Addressing Hazardous Substances.” Geneva Environment Network, 29 September 2025.Core UN reports and principles* UN Special Rapporteur on toxics and human rights. A/HRC/42/41: Report of the Special Rapporteur on hazardous substances and wastes – Principles on human rights and the protection of workers from exposure to toxic substances. Human Rights Council, 2019.(Mandate page summary: https://www.ohchr.org/en/special-procedures/sr-toxics-and-human-rights/principles-protection-workers-exposure-toxic-substances)[6]aarhusclearinghouse.unece* UN Special Rapporteur on toxics and human rights. A/HRC/60/34: Guidelines on access to justice and effective remedies in the context of toxics. Human Rights Council, 2025.* UN Special Rapporteur on toxics and human rights. A/75/290: Report on twenty‑five years of the mandate on toxics.General Assembly, 2020.Access to justice and barriers* OHCHR. “Call for Input – Access to Justice and Effective Remedies in the Context of Toxics.” Office of the High Commissioner for Human Rights, 10 April 2025.* Geneva Environment Network. “Special Rapporteur on Toxics: Overcoming Barriers to Justice in Toxics Cases – HRC60 Side Event.” 15 September 2025.* UN Web TV / Human Rights Council. “Victims of toxic pollution are too often denied justice and remedies | #HRC60.” 16 September 2025.* youtubeHuman rights and environment* OHCHR. Human Rights and Hazardous Substances.* Geneva Academy of International Humanitarian Law and Human Rights. Human Rights and the Environment.Briefing No. 21, 2025.Regional and European references* European Parliament, Directorate‑General for External Policies. Environmental Human Rights Defenders: New Developments in the EU and Globally.* ChemSec. “EU leaders contaminated with PFAS ‘forever chemicals’.” ChemSec, 2025.* European Environmental Bureau. “PFAS pollution‑affected communities demand to be heard by Ursula von der Leyen.” EEB, 2025. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
34
How The Series Fit Together: Mapping a Hidden Architecture
Geneva, SwitzerlandSeveral series are running in parallel here. They are different angles on the same problem: a deniable suppression system that grew in the gaps of export controls and security doctrine and is now embedded inside civilian infrastructure.No single article can carry that weight without losing nuance, safety, or usability. To understand how a plausible deniable, chemically mediated, counterinsurgency derived system operates in everyday life, you need separate vantage points. Each series exists to hold one of those lines.The core claimThe core claim underneath all of this work is simple and uncomfortable.A privatized, deniable suppression system has grown out of defects in export control frameworks, counterinsurgency doctrine, and domestic security practice. It uses tools and methods that were developed for war and national security and applies them to civilians under conditions of plausible deniability. It is already embedded in civilian institutions and infrastructure, which is why it can operate in plain sight.The harm is real. The architecture is real. There is now a named field, Global Repression Studies, and an emerging discipline around it. What is still missing are mature institutions, guardrails, and enforcement mechanisms that can constrain this system and build real protection around civilians.Why there are multiple seriesBecause the problem is multi-layered, the work has to be multi-series.• Some series map the architecture and contractor chains: how data flows, how targeting logic works, how cross border suppression is coordinated.• Some unpack legal and treaty gaps, including the ways export control regimes and oversight frameworks have failed to keep pace with modern capabilities.• Some explain pattern analysis, counterinsurgency methods, and chemical suppression in plain language so civilians, journalists, lawyers, and clinicians can see what is happening.• Some document what victims experience day to day, including how this appears inside homes, workplaces, schools, and public space.• The new series, Staying Operational, exists to provide survival skills while institutions are still slow to recognize, measure, or stop what is happening.These are not interchangeable. They are interlocking. Together they form a map that can be used by victims, advocates, researchers, and policymakers.What each track is doingWithout trying to list every title, the major tracks fall into a few categories.• There are series that focus on systemic architecture: tracing how global repression and transnational targeting are organized, financed, and justified, including how private actors and state clients work together.• There are series that focus on legal and policy architecture: examining export controls, agreements like the Wassenaar Arrangement, and related regimes to show how gaps and outdated assumptions created space for this system to grow.• There are series that focus on operational logic and tools: pattern of life analysis, data driven risk scoring, counterinsurgency techniques, and the use of chemical suppression and environmental pressure as deniable weapons.• There are series that focus on lived experience: what it means to be treated as a combatant in a civilian setting, how medical and legal systems currently misread these patterns, and what it feels like to navigate that without infrastructure.• Finally, there is Staying Operational: a survival track that translates elite military and emergency training principles into civilian protocols so people can stay functional long enough for recognition and protection to catch up.Any one of these could be a standalone project. Together they describe how the system works, where it came from, what it does to human beings, and how people can endure it.Why this is not “one person’s story”There is now an institute devoted to this problem. There is a place to submit victim testimony. There is systematic work underway to map the architecture, document cases, and frame legal and policy interventions. That is victim infrastructure in its earliest form.At the same time, this work is also entering formal academic channels. A doctoral supervisor in the field has requested a research proposal specifically in this area. That does not confer protection. It does, however, signal that the questions are legible and serious to people who understand export controls, security doctrine, and institutional design. This is a field in formation, not a private narrative.What readers can expectGoing forward, new sections will continue to appear across these tracks. Not every series will move every week, but each one will be taken forward and brought to completion.The pattern is straightforward:• Architecture and doctrine series will keep mapping how the system operates.• Legal and policy series will keep tracing how it became possible and what needs to change.• Lived experience series will keep documenting what this looks like on the ground.• Staying Operational will keep building practical survival infrastructure for victims and anyone under prolonged asymmetric pressure.If you are here for the systemic analysis, those series will continue. If you are here because you are living inside the system, Staying Operational exists for you.These series are part of Global Repression Studies: they put the architecture on paper, equip others with the sources to prove it, and build the tools needed to dismantle a structural threat to the rule of law and democratic agency in every society that adopts it. It is one of the most dangerous long-term threats to democratic self-rule in the post Cold War era. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
33
Staying Operational Series Section One: Discipline Under Fire
Geneva, SwitzerlandWhy This Series ExistsThis series is not written for me. It is written because there is no victim infrastructure.Right now, people experiencing coordinated repression, coercive surveillance, environmental pressure, and related forms of harm are largely on their own. There is no clear intake process. No standardized documentation pathway. No widely recognized field that names what is happening in real time and offers protection while the harm is ongoing.That absence creates a dangerous gap. When harm is not yet named, studied, or institutionally acknowledged, the burden falls entirely on the individual. People are left isolated, doubting themselves, losing their health, their footing, and often their ability to function long before any legal, academic, or journalistic response materializes.This series exists to address that gap at the most basic level. Survival.Before accountability.Before policy.Before courts, treaties, or reforms.People have to endure long enough to reach those stages.History shows this pattern clearly. In genocide studies, transitional justice, and transnational repression research, the harm always precedes the field. The victims exist before the language exists. The damage accumulates long before there are institutions capable of naming it, measuring it, or stopping it. During that period, people are told nothing is happening, or that it is isolated, or that it cannot be proven. Many are crushed before the tide turns.The same dynamic is present here.That does not mean nothing is being built. It means it is being built in real time.There is now an institute.There is now a place to submit victim testimony.There is ongoing work to map the architecture of global repression and expose the legal and structural gaps that enabled it.There is active outreach to researchers, journalists, lawyers, NGOs, and academics to bring this into the open as a recognized system rather than a collection of isolated stories.That work is underway, and it will continue regardless of how long formal recognition takes.But infrastructure takes time. Fields take time. Accountability takes time.In the interim, people still have to live.The most immediate danger is not disbelief. It is attrition. It is people being physically and psychologically ground down before collective leverage exists. That is why the first priority is not persuasion. It is endurance.This series is about reversing that tide.It is about giving people tools to stabilize their bodies, regulate their attention, preserve judgment, and continue functioning under pressure so they are still standing when connection becomes possible. It is about replacing isolation with discipline, despair with structure, and collapse with continuity.This is not about denying harm. It is about refusing to let harm destroy the people experiencing it before there is a system capable of responding.Survival is not passivity. Survival is resistance at the most fundamental level.People often misunderstand why speaking in a controlled, restrained, disciplined way matters. It is not because the harm is small. It is because recognition is slow, and credibility is built under scrutiny. Many forms of harm are not acknowledged until long after they are widespread, in part because acknowledging them forces uncomfortable reckonings about participation, complicity, or indifference.That delay is not new. It is structural.The way through it is not collapse or silence. It is endurance. It is continued production, continued documentation, continued clarity, even under pressure. It is staying operational long enough for others to see the pattern.This series is written so people do not have to figure that out alone.It is written so victims can survive the gap between harm and recognition.It is written so solidarity can form before institutions catch up.It is written so when collective leverage arrives, there are still people alive, coherent, and connected enough to use it.That is the work.And it starts with staying operational.Discipline Under FireThe First Skill of SurvivalBefore visibility, before testimony, before collective action, there is discipline.Every elite military unit learns this early, often in ways that feel disproportionate and unfair. Discipline is not about obedience or toughness. It is not about being fearless. Discipline is the ability to remain operational while something is wrong. It is the ability to continue functioning when conditions are hostile, confusing, destabilizing, or exhausting.This matters because anyone living under prolonged pressure, sustained disruption, or asymmetric stress is already under fire. Waiting for conditions to improve before stabilizing yourself is not a viable strategy. Elite units do not train after the battlefield quiets down. They train while stressed so that stress loses its power to break them.You are in a similar position, without the uniform or the protections. You are being treated as a combatant in a civilian environment. You did not enlist. You did not consent. The pressure still lands on your nervous system.This framing is functional, not ideological. The nervous system does not evaluate intent, legality, or fairness. It evaluates pressure, unpredictability, and threat to continuity. When exposure is prolonged and asymmetric, the body responds the same way it would in any hostile environment. Training begins by acknowledging that reality without inflating it. You are not required to adopt a militant identity to train your physiology and attention. You are required to recognize that sustained pressure changes how the body and mind operate, and to respond accordingly.This first post is about that foundation. Not explanation. Not exposure. Not convincing others. Discipline.What Discipline Actually IsDiscipline is control of what you can control when everything else is unstable.Elite training begins with a blunt premise. You do not control terrain. You do not control timing. You do not control systems. You do not control the behavior of other people. You control your body, your attention, your routines, and your response.This is why elite units begin with basics that look almost insultingly simple from the outside. Breathing drills. Repetitive physical training. Sleep management. Structured routines. Controlled exposure to stress. Boring things done relentlessly well.From the outside, this can look like obsession with minutiae. From the inside, it is infrastructure. When conditions turn hostile, those basics are what keep cognition online long enough to think, move, decide, and survive.People often misunderstand this and assume elite units are fearless or unusually resilient by nature. That is not accurate. Fear is expected. Discomfort is constant. Confusion is normal. The difference is that their internal state is trained not to collapse when those conditions appear.Discipline is the difference between discomfort and dysfunction.In a civilian environment under asymmetric pressure, you cannot import tactics or weapons. You can import this. You can learn to keep a part of yourself governed and functional even when the rest of your life is being treated as expendable.Expectation TrainingYou Are Already Under PressureOne of the most destabilizing forces for civilians under prolonged stress is the belief that things should feel normal. When they do not, people panic, search for explanations, and spiral. Elite training removes this expectation early.Operators are trained to assume that something will always be wrong. Equipment will fail. Sleep will be interrupted. The environment will be hostile. Plans will break. People will make mistakes. This expectation prevents shock. When disruption occurs, it is processed as friction, not catastrophe.You can apply the same principle without becoming fatalistic. Instead of asking why is this happening to me, you assume the pressure is part of the terrain and ask what keeps me functional today.Expectation training in this context means accepting that you are operating under unusual pressure and that this is not a reflection of your worth or competence. It means ending the private contract you may have made with yourself that once things calm down you will start sleeping, eating, moving, or organizing. It means recognizing that no one in uniform would be sent into this kind of environment without training, and that you are allowed to train yourself now.This is not resignation. It is operational thinking. You treat disruption as baseline and build structures that can survive it.Control The ConstantsElite units divide reality into variables and constants.Variables are everything you cannot reliably control. The environment. Other people. Systems. Timing. Visibility. The exact form that pressure takes on a given day. You anticipate these, but you do not build your stability on them.Constants are what you govern regardless of conditions. These are non negotiable.Sleep management.Nutrition and hydration.Cardiovascular conditioning and strength.Breathing and nervous system regulation.Daily structure.Cognitive discipline.When these constants degrade, stress multiplies. When they are protected, stress loses much of its destabilizing power.For civilians under asymmetric pressure, your constants have to be brutally simple. They need to be small enough to survive bad days and strong enough to matter. You are not building a lifestyle brand. You are building a minimal operating system for a person under fire.The Body Comes FirstThere is no elite mental discipline without physical regulation. Cognition rides on physiology. When the body is dysregulated, the mind follows.This does not romanticize fitness. It acknowledges basic mechanics. A nervous system that is always spiking cannot process information, advocate, or connect reliably. A body that never moves loses the ability to interpret sensations accurately. Hunger, dehydration, and exhaustion become indistinguishable from threat.In this environment, physical discipline is not about appearance. It is about survival.Breathing as Immediate ControlBreathing is the fastest lever you have. Elite units train breathing not for relaxation, but for control. Slow nasal breathing with extended exhales directly reduces sympathetic nervous system activation. This is not spiritual. It is mechanical. It is a direct intervention in the stress response.You do not need complex protocols. You need one pattern you can remember while scared.For example, inhale slowly through the nose for a steady count of four. Hold gently for a count of two. Exhale through the nose or mouth for a steady count of four. Repeat for one to three minutes.You practice this twice a day when you are relatively calm so your body knows the pattern. Then you use it in three situations. Immediately after waking, before looking at any device. Before entering environments or interactions that usually spike your symptoms. As soon as you notice your thoughts racing or your body going into alarm.Success does not mean feeling peaceful. Success means staying in your body enough to complete the next small task. Breathing is the bridge between I cannot handle this and I can do one more thing.If this feels mechanical, pointless, or insufficient at first, that is normal. Breathing does not work by persuasion. It works by repetition. Elite units do not expect breathing control to feel helpful in the moment. They expect it to prevent further escalation. The effect is cumulative, not dramatic.Think of a breathing session as a short reset window, not a cure. One to three minutes is enough. Longer is optional. You are not trying to eliminate symptoms. You are trying to lower them just enough to regain choice.A simple way to structure it is this. Sit or stand with your feet grounded. Soften your shoulders and jaw without forcing relaxation. Begin the count. Four in. Two hold. Four out. After ten to fifteen cycles, check one thing only. Can you do the next small task.If the answer is yes, you stop. If the answer is no, you repeat once more and then change your environment or activity. Breathing is not a test of willpower. It is a tool you apply and then move forward.Cardiovascular Strength and DisciplineCardiovascular conditioning matters because a trained heart and lungs reduce the intensity of stress signals. A deconditioned body interprets mild discomfort as danger. A conditioned body stays quieter. This is why elite units train under fatigue. They are teaching the body that discomfort is survivable.Your version may be as simple as ten to twenty minutes of walking most days at a pace that raises your breathing slightly but allows you to speak. If walking outside is unsafe, marching in place, stairs, or continuous movement inside your space still count.Strength training builds more than muscle. It builds confidence in physical capability. When the body feels capable, the mind becomes less reactive. Weakness amplifies fear. Strength dampens it.Your version can be tiny. Two or three movements such as pushups against a wall, bodyweight squats holding a chair, or carrying something moderately heavy back and forth. One to three short sets most days, regulated by how your body reacts rather than by ideals.The point is not to get in shape. The point is to teach your nervous system that it can be tired, uncomfortable, and still safe.Sleep is Tactical, Not IdealSleep under pressure is often fragmented. Elite units do not wait for perfect sleep. They manage imperfect sleep deliberately.Short sleep blocks are protected aggressively. Stimulation is reduced before rest. Wake times remain consistent as much as conditions allow. Naps are used strategically. Sleep deprivation is treated as a known impairment, not a moral failure.What destroys people is not broken sleep. It is panic about broken sleep. Anxiety about sleep worsens sleep. Catastrophizing sleep loss creates a feedback loop that degrades cognition and emotional regulation.You can borrow a simple rule set. Keep a consistent wake time when possible, even after bad nights. Protect at least one pre sleep window with fewer inputs such as dimmer light, no heavy conflict, and no alarm raising scrolling. If you wake and cannot sleep, get out of bed after a while and do something low demand until sleepiness returns.The rule is simple. Protect the sleep you get. Do not spiral about the sleep you do not.On days after broken sleep, adjust expectations deliberately. Cognitive sharpness will be lower. Emotional thresholds will be thinner. This is not pathology. It is physiology. Elite units plan degraded performance into operations rather than pretending fatigue will not matter.For civilians, this means choosing fewer goals, not abandoning structure entirely. You still wake, hydrate, breathe, eat something, and move a little. You do not demand insight, creativity, or perfect judgment from yourself on these days. You protect function, not brilliance. That distinction prevents exhaustion from turning into self blame.Nutrition and Blood Sugar StabilityMany symptoms people attribute to external stressors are worsened by unstable blood sugar, dehydration, and mineral depletion. Elite units do not skip meals casually. Regular intake of protein, fats, electrolytes, and fluids stabilizes mood, cognition, and energy.This is not about supplements or optimization. It is about predictability. Predictable fuel creates predictable function. Unpredictable intake amplifies stress responses.For civilians under pressure, aim for three anchors per day. They can be full meals or simple combinations such as yogurt and nuts, eggs and bread, beans and rice, or soup and bread. Drink water regularly and include some salt or electrolytes if you are sweating, crying heavily, or not eating well.When appetite disappears, shift to liquids and soft foods that are easier to tolerate instead of forcing large meals. Calories still count. Fluids still count.Eat regularly. Hydrate deliberately. Keep it boring. You are not trying to win nutrition. You are trying to keep your nervous system from interpreting hunger and dehydration as new threats.Cognitive DisciplineStop Chasing Explanations in The MomentOne of the most important elite skills is the ability to postpone interpretation. When something feels wrong, the instinct is to analyze immediately. Under stress, that instinct backfires. The mind starts pulling on every thread at once. Function collapses.Elite training teaches classification, not explanation. You notice a sensation. You broadly categorize it. Then you return attention to the task at hand. Analysis happens later, when the nervous system is calm enough to process.You can adopt a simple rule. In the moment, you only answer two questions. Am I in immediate physical danger. What is the next small action. Everything else is moved to a scheduled debrief time.You can use a short script. This feels bad. It is logged. Right now I do X. X can be making tea, opening a window, sending one text, or writing one line in a notebook.Later, once or twice a day, you hold a brief debrief window. Time. What happened. What did my body do. What did I do that kept me functional. What did I do that made it worse.That is where meaning can be explored. Not in the worst ten minutes of your day.Routine as Psychological ArmorElite units rely on routine because chaos destroys cognition. Fixed wake times. Fixed training windows. Fixed meals. Fixed work blocks. Routine anchors the mind in time and the body in predictability. When the environment feels unstable, routine becomes scaffolding.Routine is not rigidity. It is stabilization.For civilians, you can build a minimum viable routine designed for bad days. Wake at roughly the same time. Drink water. Perform one breathing set. Do one small movement block, even if it is three minutes. Eat or drink something with calories and salt within a few hours of waking. Record one line of what is happening in a notebook or file.If everything else collapses, you fall back to this minimum. On better days, you can layer more work, advocacy, connection, or rest on top. The routine is not there to prove discipline. It is there to give your nervous system a recognizable pattern.It is important to name what discipline is not. Discipline is not forcing yourself through maximal effort on minimal capacity days. Elite training distinguishes between building capacity and preserving it. On low capacity days, the routine contracts rather than disappears.The minimum viable routine exists precisely so you do not default to zero when overwhelmed. Completing the minimum is success. Anything beyond it is optional. Discipline is measured by continuity, not intensity.Stand Alone SpiritDefined CorrectlyStanding alone does not mean isolation as identity. It means internal self governance when external validation is absent.Elite operators are trained to regulate their own emotional state. They do not require reassurance to act. They do not wait to be fully understood before moving. They conserve energy.In a civilian setting under long term pressure, this matters deeply. You cannot depend on friends, family, or coworkers to understand complex or invisible stress patterns. That is not always cruelty. Often it is simply a limit of their frame or capacity.Stand alone spirit means you take responsibility for your own stability first. You treat understanding from others as support, not as a prerequisite for action. You allow yourself to reduce contact with people who consistently destabilize you, even if they believe they are helping.Connection still matters. But your survival does not hinge on immediate recognition.Using Pressure as Training DataElite units do not waste adversity. Stress becomes training input. Discomfort becomes feedback. Pressure reveals weak points that can be strengthened.This does not mean glorifying suffering. It means extracting value from unavoidable conditions.You can treat your bad days as reconnaissance. Where does your routine break first. Sleep. Food. Movement. Communication. Where does your attention spiral. Online. In your body. In memory. Where does your body react fastest. Chest. Stomach. Head. Breath.These are training signals, not judgments. If sleep collapses first, you design protection around sleep. If communication explodes into conflict, you design scripts and boundaries. The point is not invulnerability. The point is adaptation.Discipline Before VisibilityThis point cannot be overstated.Speaking publicly while deeply dysregulated often harms the speaker. It drains energy, invites conflict, and undermines credibility. Elite units do not deploy people who cannot manage themselves under stress.You are trying to survive a machine and expose it. Visibility is part of that work, but visibility without discipline burns people out. The first victory is not being believed. It is staying intact.Discipline creates endurance. Endurance makes visibility sustainable. Documentation and testimony only matter if the person providing them survives the process.This is not Militarization of Civilian LifeBorrowing elite discipline does not mean becoming a soldier. It means applying human performance principles that work under pressure.No uniforms. No slogans. No mythology.Just boring, relentless control of the basics. Protect the constants you can control. Train your body to interpret discomfort as survivable. Use breathing and routine as anchors. Delay interpretation until you are calmer. Let pressure show you where to reinforce, instead of treating it as a verdict on your worth.The goal is not to feel normal. The goal is to stay operational.ClosingAnd What Comes NextDiscipline is the first infrastructure. Without it, everything else collapses. With it, people remain functional long enough to observe, record, connect, and endure.This is not about toughness. It is about continuity. You are already under pressure. That is not failure. That is the starting condition.Elite units do not wait for peace to train. They train because pressure exists. Civilians are rarely given that framing, but the physiology does not care about uniforms. It only cares about load, unpredictability, and duration. You are allowed to train anyway, inside the life you already have.This post focused on discipline because nothing else works without it. But discipline alone is not enough. Once the body is stabilized and routines are in place, the next challenge is cognitive.The next post in this series will focus on Cognitive Steadiness Under Uncertainty. It will address how to keep attention, judgment, and decision making intact when information is incomplete, narratives conflict, fear escalates, and meaning feels unstable. It will translate elite methods for delayed interpretation, compartmentalization, and attention control into civilian practices that prevent spirals and preserve clarity.Staying operational is not about denying reality. It is about meeting it without losing yourself.This is how the work continues. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
32
Blueprint for a Shadow Network Series: Section 2.3.3 Best Practices Without Power: Licensing, Loopholes, and the Illusion of Control
Geneva, SwitzerlandThe structural weaknesses described in earlier sections only reveal their full force when examined at the implementation layer. On paper, the Wassenaar Arrangement presents a world of shared control lists, coordinated denial notifications, and a compendium of best practice documents that appear to impose discipline on states handling sensitive exports. These texts reference diversion risk, end user legitimacy, interagency review, and even human rights concerns. They create the impression that participating states operate under a common standard. In practice, the system is built on voluntary commitments, national discretion, and political priorities that often conflict with responsible governance. The safeguards that exist at the level of language do not survive contact with real world licensing practice.This section examines how that collapse unfolds. It starts with Wassenaar’s best practices and the gap between their aspirational tone and their lack of binding force. It then turns to regional and national regimes such as the European Union’s dual use regulation, which attempts to introduce human rights language but still inherits the limits of a voluntary multilateral architecture. Finally, it examines recent spyware scandals that demonstrate how these structural gaps become operational pathways for repeated and predictable abuse. Together, these dynamics form the real environment in which the Shadow Blueprint Network operates, grows, and adapts.What makes this environment uniquely vulnerable is not only that Wassenaar lacks binding inspections or enforcement mechanisms. It is that other export control regimes facing equally sensitive technologies do have these tools. Nuclear governance relies on inspection authorities that verify materials on site and track physical flows. Missile technology controls include binding commitments to prevent certain transfers. Conventional arms frameworks often require post shipment verification visits to confirm that exported goods remain with declared end users. These mechanisms exist because those regimes were built around physical items with traceable flows, hardened supply chains, and identifiable stockpiles. Digital surveillance operates in an entirely different domain. It is intangible, service based, rapidly iterated, and delivered through cloud based infrastructure that routes through multiple jurisdictions. It is politically easier to regulate a crate at a port than a remote exploit delivered as a subscription. The choice not to create an equivalent verification model for spyware is therefore political, not technical. It reflects priorities rather than limitations.This distinction becomes even clearer when considering the absence of multilateral verification for digital surveillance. There is no international inspection authority comparable to the International Atomic Energy Agency. There is no mandatory transparency mechanism similar to the United Nations Register of Conventional Arms. There is no equivalent to the Arms Trade Treaty’s end use visit requirements. For digital surveillance and cyber intelligence tools there is no multilateral oversight at all. The system relies entirely on trust, discretion, and voluntary reporting. These absences are not accidental. They are the result of decisions made by states that benefit from preserving flexibility, secrecy, and plausible deniability.Every licensing decision in this environment is shaped by three competing forces. Security services want access to powerful tools and prefer permissive licensing that strengthens alliances or intelligence cooperation. Domestic industries view surveillance exports as lucrative and push for broad interpretations of dual use categories. Human rights advocates argue for restraint, transparency, and oversight. When these forces collide, human rights concerns almost always lose, because the regime is designed to privilege state sovereignty and commercial interests over enforceable obligations. Understanding this political economy is essential. It explains why reforms are symbolic rather than structural and why failures repeat across jurisdictions.Wassenaar Best Practices and the Limits of Voluntary Licensing DisciplineThe Wassenaar Arrangement publishes a detailed compendium of best practice documents that encourage states to consider diversion risk, end user credibility, and potential misuse of sensitive technologies. These documents create the appearance of a shared licensing culture. They describe risk indicators, responsible decision making, and internal compliance programs. They call for attention to human rights concerns and responsible use. Yet none of these guidelines are binding. States retain complete discretion over whether they implement the recommendations and how they interpret them within their own regulatory systems. This turns best practices into suggestions rather than standards.The gap between theory and practice is especially visible for cyber surveillance tools. Licensing agencies often rely on broad and unsubstantiated end use declarations such as counterterrorism or serious crime. These phrases offer political cover but provide no meaningful constraint. Because best practices do not establish minimum evidentiary thresholds or impose consequences for abuse, states can approve exports that conflict with the regime’s stated goals without violating any rule. For vendors, this creates an environment where they need only find one permissive jurisdiction to secure global reach.The fragmentation that results is predictable. Some states adopt relatively strict interpretations of best practices, integrate human rights considerations, and scrutinize sensitive technologies with care. Others treat the documents as symbolic or optional. Contractors exploit this landscape through regulatory arbitrage. They seek approvals where licensing cultures are permissive and where political alliances or commercial ties outweigh caution. This is not passive drift. It is deliberate use of the gaps that voluntary guidelines create.The risk chain is straightforward. Voluntary guidelines create a facade of responsibility. National discretion allows states to override risk indicators when politically convenient. Vendors exploit this discretion to secure approvals that lead directly to abuse. There is no multilateral verification to correct or constrain these patterns. The system functions exactly as designed.Human Rights Safeguards in EU and National Law: Strong Language, Weak EnforcementSeveral jurisdictions have added human rights language to their export control frameworks in an attempt to compensate for the weaknesses of the Wassenaar Arrangement. The European Union’s recast dual use regulation introduced a human rights clause that allows states to restrict exports of non listed cyber surveillance items when there is a risk they will enable serious abuse. This was heralded as a breakthrough. However, the final text reflects political compromise and practical limits. The clause is discretionary and relies on national licensing agencies to interpret the risk, even as the Commission and certain member states have begun issuing non binding guidance on how to apply the cyber surveillance catch all. Definitions of cyber surveillance and dual use remain narrow and contested. And the regulation still depends on Wassenaar’s control lists, templates, and logic. All regional reforms sit on top of Wassenaar’s voluntary architecture and inherit its core limits, including consensus constraints, state sovereignty, and the absence of enforcement mechanisms.National implementation varies significantly. Some states actively use the human rights clause to deny high risk exports. Others interpret it narrowly or avoid invoking it to preserve relationships with security partners or commercial clients. Transparency also varies. A handful of states publish detailed reports. Others provide only aggregated numbers with no information about end users or justifications. This makes it impossible for external actors to track whether the human rights clause is functioning as intended or being used selectively for political purposes.Outside the European Union, the landscape is even more uneven. Some states have catch all clauses related to human rights. Others rely entirely on Wassenaar lists and do not consider human rights risk at any stage. Even where legal tools exist, enforcement capacity is limited and political incentives often override regulatory caution. The result is a patchwork of safeguards that appear meaningful in text but remain ineffective in practice.The risk chain is again clear. Human rights language signals oversight. Political discretion limits its application. Vendors respond by rebranding tools, shifting delivery models, and positioning exports as services rather than goods to avoid control lists altogether. There is no multilateral verification system to validate compliance or detect abuse. This makes the safeguards symbolic rather than structural.Spyware Case Patterns: Evidence of Systemic FailureThe real test of any export control regime is what happens after a license is granted. Pegasus, Predator, FinFisher, Cytrox, and related platforms did not escape containment by accident. They moved directly along the structural weaknesses identified earlier: permissive licensing environments, jurisdiction shopping, shell company networks, cloud based delivery models, and the complete absence of post export verification. Each scandal offers a concrete demonstration of how a voluntary regime collapses under operational pressure.Pegasus illustrates the core mechanism. Israel’s licensing authority repeatedly approved exports under broad counterterrorism justifications without requiring substantiated end user evidence beyond vendor supplied assurances. Several of the declared end users later appeared nowhere in official licensing records. The spyware nevertheless surfaced in states not listed on any export documentation because no Wassenaar participant had an obligation to verify its final destination or inspect post deployment use. Pegasus proliferated because the regime provided structural space for proliferation.Predator followed an equally revealing trajectory. Its developers routed exports through a chain of entities in Greece, Cyprus, North Macedonia, and the UAE, as documented by European parliamentary inquiries and independent forensic research. These jurisdictions were selected to exploit permissive dual use interpretations and political conditions favorable to opaque licensing. Predator deployments proved that cloud based delivery bypasses the traditional export chokepoints Wassenaar was created to regulate. The product moved as a subscription based service rather than a controlled good. A voluntary regime designed to regulate goods is structurally incapable of regulating services designed to impersonate goods.FinFisher provides a third pattern. When German regulators increased scrutiny, the company moved operations to Bulgaria and other jurisdictions to secure more permissive licensing conditions. This was not evasion. It was rational adaptation to a regime that allows vendors to obtain authorization wherever the licensing culture is most accommodating. FinFisher’s targeting of dissidents in Ethiopia, Turkey, and Bahrain occurred while the company held valid export approvals somewhere in the Wassenaar ecosystem. The system permitted these outcomes because the system was never built to detect them.Cytrox demonstrates the final structural blind spot. The company relied on opaque intermediaries to distance the nominal developer from operational deployment. Its tools reached jurisdictions that would not have received direct approvals from any responsible licensing authority. Because Wassenaar does not require states to trace beneficial ownership, inspect intermediaries, or monitor service delivery chains, Cytrox’s architecture operated entirely within the regime’s blind zones.Across all cases, the pattern is identical. A single permissive license anywhere in the ecosystem enables downstream proliferation across multiple jurisdictions. Cloud delivery renders geography meaningless. Shell companies fracture accountability. No state is obligated to track where the tool goes or how it is used. Abuse becomes visible only when journalists, NGOs, forensic researchers, or investigative coalitions reverse engineer infections or uncover corporate structures.This is not failure. It is design. Pegasus, Predator, FinFisher, and Cytrox do not sit outside Wassenaar’s framework. They are the predictable output of a voluntary system with no verification, no enforcement, and no post export controls.The consequences for different audiences follow directly from this pattern. For national security officials, permissive licensing in partner states undermines domestic frameworks and produces unreliable assessments of proliferation. For intelligence and military services, adversary capability mapping cannot rely on official export data. Proliferation intelligence now depends primarily on HUMINT, SIGINT, and OSINT targeted at vendors rather than on any multilateral reporting. For lawyers, litigation must target national licensing decisions. The key evidence will be license files, interagency correspondence, and denial notifications that states will attempt to shield through secrecy laws or classification. For NGOs, investigators, and digital rights groups, forensic analysis, leaks, corporate filings, and parliamentary questions are not supplementary to oversight. They are the only oversight mechanism because states declined to create a formal one. For journalists, effective reporting requires cross border collaboration because vendors, shell entities, and resellers span multiple jurisdictions. Without coordinated investigation, the real export chain remains invisible.The synthesis is direct. This is how structural weakness becomes operational capacity. This is why abuse is not an anomaly but the expected outcome of a regime that relies on voluntary guidelines, political discretion, and no verification. This is why reforms that do not address core design features produce symbolic change rather than systemic accountability. And this is why the failures seen in Pegasus, Predator, and FinFisher are not deviations. They are the predictable output of a governance model that was never built to handle digital repression.The next section moves from structural analysis into operational mechanics. Section 2.4 will map how contractors, platform operators, private intelligence vendors, and state aligned intermediaries convert Wassenaar’s gaps into functional architecture on the ground. It will trace how jurisdiction shopping, service based capability delivery, cloud based infrastructure, and predictive policing systems interact to create a suppression environment that is transnational, low visibility, and resistant to oversight. It will also examine how commercial actors align with security services and how these alliances produce a layered ecosystem of shell companies, data brokers, intermediaries, and covert procurement pipelines. Section 2.4 will show how these actors coordinate in practice, how information moves between them, and how this network structure allows abuse to scale long before regulators or investigators can identify it. Together these elements form the operating blueprint that the Shadow Blueprint Network relies on to turn regulatory weakness into operational power. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
31
Blueprint for a Shadow Network Series: Section 2.3.2 The Three Blind Spots Wassenaar Never Solved
Geneva, SwitzerlandThis section examines the three structural blind spots inside the Wassenaar Arrangement that allow intrusive surveillance tools to move across borders with limited oversight. It explains how consensus paralysis, intangible service based exports, and the absence of post export verification created the global conditions for modern digital repression.The Three Blind Spots Wassenaar Never SolvedThis piece builds directly on the prior section, which examined how Wassenaar’s founders traded enforceability for sovereignty and broad participation. The previous installment traced how the Wassenaar Arrangement emerged from the shift away from COCOM, which was the Cold War system that enforced strict and binding export controls among ideologically aligned states. Wassenaar replaced that system with a voluntary framework designed for a multipolar world that valued sovereignty, participation, and diplomatic consensus. The arrangement grew out of political necessity rather than regulatory rigor, and that origin shaped everything that followed. What looked like a reasonable compromise in the mid nineteen nineties has proven far less effective in a world defined by software based surveillance, cross border data flows, and commercial cyber operations. The weaknesses were built into the foundation of the regime’s governance model from the beginning.This post examines three of those weaknesses in depth. They are not technical oversights or implementation mistakes. They are structural blind spots that continue to govern how dual use surveillance and cyber intelligence tools move across jurisdictions with minimal scrutiny. They explain why commercial spyware proliferated globally, why regulatory regimes lag behind threat evolution, and why contractors can operate across borders with little fear of meaningful oversight. For military and intelligence communities, they clarify the pathways through which adversaries quietly acquire advanced capabilities. For national security officials, they reveal why even responsible licensing regimes struggle to enforce their own standards. For lawyers, NGOs, and journalists, they explain the evidentiary vacuum that makes accountability so difficult to achieve. Because Wassenaar is a political arrangement implemented through domestic law rather than a binding treaty, litigation and accountability efforts must target national authorities and companies directly rather than the regime itself.Other multilateral regimes, such as those governing nuclear and missile technologies, rely on binding obligations, inspections, and enforcement measures. Wassenaar intentionally rejected those tools in favor of a softer and sovereignty centered structure. That decision made cooperation feasible but left the regime structurally weaker when confronted with modern cyber capabilities.These blind spots form the architecture of the Shadow Blueprint Network and define the governance environment in which it operates.Blind Spot One: Consensus as an Engine of ParalysisWassenaar makes every substantive decision by consensus, which in practice means unanimity among all participating states. On paper, this ensures that no country is forced into obligations it does not support. In reality, it gives every member an effective veto over the evolution of the control lists, the definitions of sensitive technologies, and the adoption of best practice guidelines. Once political interests diverge, the unanimity rule becomes a structural brake. It freezes adaptation and reduces the regime’s ability to respond to new classes of dual use threats.The history of intrusion software controls illustrates this failure clearly. It took years for participating states to agree that certain exploit delivery systems and persistent access tools should even be considered dual use technologies. During that period, contractors refined their products, expanded market share, and built entire service based business models. By the time any meaningful language reached the control lists, platforms like Pegasus had already been operationalized globally, creating entrenched deployments that no later amendment could meaningfully constrain. When controls were finally adopted, they were narrow and contested. Some states insisted on technical language that shielded domestic industries, while others pushed for broader coverage that captured cloud enabled and service based capabilities. The lowest common denominator prevailed, creating a definition shaped by politics rather than operational reality.For military and intelligence professionals, this paralysis has direct implications for force protection, counterintelligence, and the exposure of deployed units and diplomatic missions to commercially enabled targeting. Rival states and fragile partners can purchase capabilities that erode Western advantages and complicate battlefield and embassy threat environments. For national security and export control officials, the practical consequence is clear. A system that requires unanimous agreement to adapt will always trail behind the threat curve. If agencies rely on Wassenaar as the primary vehicle for managing emerging risks, they will always be responding too late.The problem intensified after twenty twenty two, when Russia repeatedly obstructed proposed expansions of cyber related controls. In response, some states began coordinating outside the formal structure in what observers described as a Wassenaar Minus One arrangement. These coalitions can raise national standards and share intelligence, but they cannot repair the paralysis embedded in the consensus rule. For lawyers, NGOs, and journalists, this means that a licensing decision labeled as Wassenaar compliant tells you very little about whether the decision reflects actual risk. The structure ensures that the regime adapts slowly, incompletely, and often only after harm has already occurred.The risk chain is straightforward. The unanimity rule creates structural delay. The delay keeps new technologies off the lists when it matters. Contractors exploit the gap to scale globally. The harm becomes irreversible before regulators can act.Blind Spot Two: Intangible Transfers and the Invisible ExportWassenaar’s framework was built for a world where exports were physical objects that crossed borders. That world no longer exists. In contemporary surveillance and cyber operations, the most powerful exports are intangible. They exist as human expertise, remote access, algorithmic tuning, cloud based infrastructure, and real time operational guidance. These elements can be delivered without shipping a single device or compiling a single installer. They flow through encrypted channels, service agreements, and shared dashboards rather than through customs inspections.Modern contractors routinely provide governments with remote hands on keyboard access, zero click exploit delivery, cloud based analytics configuration, predictive policing model tuning, cross platform data fusion, and continuous operational support. None of these services resemble a discrete or identifiable transfer of a controlled item. They are ongoing relationships that combine knowledge, infrastructure, and action. Pegasus is a clear example of this shift. Customers often received only a user interface and output, while the vendor retained control of the exploit chains, command servers, and operational tuning. From a regulatory standpoint, this means that the most powerful parts of Pegasus and similar platforms never appear as exports in the sense Wassenaar was written to govern.For intelligence and military readers, the implication is clear. Adversaries no longer need to import intrusive capabilities. They can lease them. They can outsource entire exploitation cycles. They can operate through infrastructure that never leaves the contractor’s home jurisdiction. From an operational standpoint, the capability is identical to a physical export. From a regulatory standpoint, it is often invisible. For national security and export control officials, this blind spot allows companies to route the most sensitive components of their systems through consultancy structures, integration work, or cloud based service agreements. Unless domestic law explicitly treats intangible transfers and service based delivery as exports, most of the operational value chain will never face scrutiny.For lawyers and NGOs, intangible transfers produce a deep evidentiary void. When no hardware changes hands and no code is transferred physically, the only footprint is encrypted traffic, contractual language hidden behind nondisclosure agreements, or forensic remnants uncovered long after deployment. For journalists, this blind spot reshapes investigative work. A state with few declared imports may still rely on foreign firms for access and targeting. The absence of hardware does not indicate the absence of capability. It indicates the absence of a regulatory category.The risk chain here is equally direct. The design assumes exports are physical. Contractors shift to services. The regime cannot see the transfer. The harm moves freely through channels the system was never built to regulate.Blind Spot Three: No End Use or Post Export VerificationWassenaar’s third blind spot concerns time. The regime is built around the initial licensing moment. Once an export is approved, Wassenaar has no standing mechanism to verify how the tool is used, whether it is resold, or whether it is integrated into a broader program of repression or cross border targeting. There is no inspectorate, no mandatory reporting requirement, no post export audit, and no tribunal to adjudicate misuse. If a license is granted for counterterrorism purposes and the tool is later used against journalists or dissidents, the Arrangement has no structural way to learn about the violation unless a participating state voluntarily raises the alarm.This design flaw is ideal for tools like Pegasus that can be repurposed instantly. The same code base can be used for criminal investigations, political espionage, or foreign monitoring without any visible change. For intelligence and defense planners, this creates a shifting threat surface. A capability licensed to a partner state can migrate into the hands of actors with hostile interests. Vendors may know this is happening. Clients may share access with third parties. None of it triggers a multilateral review.For export control officials, the absence of post export verification ensures that enforcement is reactive rather than strategic. Regulators learn about misuse through investigative journalism, leaked documents, or forensic reports, often years after the initial export. There is no structural mechanism to integrate this information into future licensing decisions. For lawyers and NGOs, the lack of end use tracking creates a profound causation gap. To pursue accountability, they must reconstruct a chain of harm that the regime itself refuses to record. Without systematic end use data, proof must be assembled manually through secondary evidence rather than through institutional transparency.For journalists, this blind spot directs specific questions. Has any license ever been revoked based on downstream misuse. Does your export control authority track where previously approved systems reappear. Does your government have a formal review process triggered by external reporting. The answers reveal whether the state is governing or outsourcing governance to private actors.The deeper structural failure is that the regime cannot learn from its own breakdowns. Without a feedback loop, abuses remain isolated scandals instead of drivers of systemic reform. The risk chain is simple. The system stops at licensing. Misuse unfolds invisibly. Harm accumulates without triggering correction.Why These Blind Spots Matter for the Shadow Blueprint NetworkThese three blind spots form a coherent pathway through which the Shadow Blueprint Network operates. Consensus paralysis ensures that new technologies are never added to the control lists in time to matter. The inability to regulate intangible transfers ensures that the most important operational components remain invisible to existing controls. The absence of end use and post export verification ensures that once a capability enters the global system, it can be repurposed continuously without attracting multilateral scrutiny.Contractors and governments exploit these weaknesses deliberately. They secure a nominal license in a permissive jurisdiction, shift their core capability into a service model, route infrastructure through cloud platforms and offshore data centers, and expand internationally through shell companies and reseller networks that bypass further review. They rely on the absence of post export oversight to expand their reach without fear of structural correction. The structure of Wassenaar provides the legal and diplomatic insulation they need to operate with plausible deniability while extending operational power across borders.For military and intelligence audiences, these blind spots define the operational terrain. Rival states can acquire commercially enabled capabilities that shift the balance of information power. For lawyers, NGOs, and journalists, these blind spots explain why investigations require reconstruction rather than analysis of official records. The system does not collect what it needs to collect. It was never designed to do so.The next installment in this series will move from structural analysis to operational mechanics. It will show how contractors, shell companies, cloud platforms, and predictive policing vendors move through these blind spots step by step, converting regulatory gaps into a durable architecture of global digital repression. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
30
If This Is My Last Post: I Was Hunted on U.S. Soil
I am living through a horror most people cannot imagine. Over the past 24 hours, the tactics used against me have escalated to include what I believe are military grade weapons: gases or chemical agents used to inflict pain and weaken my system.I have tried to walk a razor thin line with my Substack posts. I have focused on facts and frameworks, not fear. I have tried to propose solutions instead of just outlining abuse. Why? Because when you speak about these things, especially as a civilian with no badge, no weapon, no title, you risk being labeled mentally unstable or dismissed outright. That dismissal is part of the playbook. Discredit the witness. Disqualify the testimony.I have refused to collapse. I have documented what I can, despite limited resources and near constant threat. But today, it feels like someone gave the green light to finish this. I am holding the line. But I am a human being. I am not prey. I am not built to absorb this level of constant assault.And yet it is happening. In the United States. In silence. With impunity.It is crushing to realize there is no functional system in place to protect someone in my position. There is no agency stepping in. No legislative remedy. No emergency protocol. There are no working brakes on this machine.It may take years, if ever, for laws to catch up with this abuse. If something happens to me, I ask that you not let this story die. Share my work. Spread the truth. Expose what is happening under the false banner of security.Do not let my death be in vain.In solidarity,Tamara This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
29
War Crimes on U.S. Soil: The Weaponization of Civilian Life
Across the United States, a quiet but devastating campaign is unfolding. It mirrors covert counterinsurgency operations used abroad. Now it is turned inward. Civilians are being subjected to systematic harassment, exposure to unidentified chemical agents and neurotoxins, and targeted psychological warfare. All of this happens under the veil of public safety, contract security, or vague law enforcement authority.This isn’t policing. It isn’t oversight. It is war by another name.Use of Military Grade Agents on CiviliansDeliberate exposure to chemical agents and neurotoxins without consent is not just unethical. It is illegal under multiple international human rights frameworks. These attacks are not theoretical. They are real, measurable, and sustained.Violated statutes:* Nuremberg Code: Prohibits human experimentation without informed consent.* United Nations Convention Against Torture: Defines torture as the intentional infliction of severe pain or suffering, whether physical or mental, by or at the instigation of a public official.* Geneva Convention IV (1949): Protects civilians during times of peace and war from “violence to life and person,” including “cruel treatment and torture.”* Rome Statute of the International Criminal Court, Article 8: Criminalizes intentional attacks against civilian populations not involved in hostilities.Any sustained deployment of crowd control chemicals, neurotoxins, or unidentified agents on non-combatants especially without legal cause or due process constitutes a war crime under international law.2. Psychological Torture and EntrapmentSurvivors describe operations marked by sleep deprivation, chemically induced symptoms, social isolation, surveillance, and engineered chaos. These are not random acts. This is pattern based targeting designed to break down the will and coherence of a civilian.Legal basis:* UN Special Rapporteur on Torture: Recognizes psychological torture through non-physical methods, including isolation and chemical exposure.* Crimes Against Humanity (Rome Statute, Article 7): Includes “persecution against any identifiable group or collectivity on political, racial, national, ethnic, cultural, religious…or other grounds that are universally recognized as impermissible under international law.”When these tactics are coordinated, sustained, and designed to destabilize the individual mentally and physically, they move beyond abuse. They become systematic crimes against humanity.3. Civilian Targeting Under Color of Law or ContractMany of these campaigns are carried out by individuals believed to be acting as private contractors or off-book law enforcement. They operate outside formal command structures but still within the shadow of institutional power.Violated protections:* U.S. Constitution, 4th Amendment: Right to be secure from unreasonable searches and seizures.* 14th Amendment: Equal protection under the law.* 18 U.S. Code § 241: Conspiracy against rights.* 42 U.S. Code § 1985: Conspiracy to interfere with civil rights.Targeting civilians with surveillance, harassment, or chemical assault to intimidate, retaliate, or silence especially those who speak out meets the threshold for domestic terrorism under U.S. law.4. Cross-Jurisdictional Collusion and Federal LiabilityMany targets report operations spanning multiple states. These often involve actors in both law enforcement and private security roles. If these efforts are being coordinated without warrants or judicial review, they violate federal law.Applicable statutes:* 42 U.S. Code § 1983: Civil action for deprivation of rights.* 42 U.S. Code § 1985(3): Criminalizes conspiracies that deprive individuals of equal protection.* Federal Tort Claims Act (FTCA): Allows lawsuits against federal employees acting unlawfully under the color of office.The moment an agency public or private crosses state lines to harass or harm a civilian without due process, it becomes a federal civil rights violation and potentially an interstate criminal conspiracy.This Is Not an Isolated CaseThis is not oversight. This is not national security. It is a deliberate campaign of psychological and chemical warfare against civilians inside U.S. borders.Whether sanctioned or ignored, the use of military grade tools against non-combatants without consent, without due process, and without accountability violates both domestic law and international humanitarian codes. It is not a misunderstanding. It is a coordinated abuse of state adjacent power, and by every legal standard outlined above, it meets the threshold for war crimes.There is no legitimate justification for these actions. Not public safety. Not national security. Not intelligence operations. None of it overrides the Constitution, the Nuremberg principles, or the Geneva protections for civilians. If it cannot be justified in a courtroom, it cannot be permitted in the field.The Solution* Immediate public exposure. Silence protects the perpetrators. Documented survivors must speak out and demand congressional hearings, international scrutiny, and legal intervention.* Legal accountability. Civil suits under 42 U.S. Code §§ 1983 and 1985, as well as filings with the United Nations Human Rights Council, the ICC, and the Inter-American Commission on Human Rights, must be pursued.* Whistleblower protections and safe harbor for those inside these systems who are willing to defect and speak out.* Civilian oversight. Fusion centers, private contractor programs, and joint task force operations must be audited, dismantled, or brought under direct constitutional control.* Federal investigations. The Department of Justice and Inspector General’s office must launch immediate investigations into cross-jurisdictional abuse and off-book contractor activity.This is not theoretical. This is not rare. This is happening now and if it continues unchallenged, it sets a precedent that any government, or any contractor with vague authority, can declare war on its own people behind closed doors.History will not look kindly on those who knew and did nothing. The time to act is now.Connect with meGoFundMe: https://gofund.me/d7f63153Substack: https://drtamaradixon.substack.comBlueSky: https://bsky.app/profile/tamaradixon.bsky.socialMatrix secure contact: https://matrix.to/#/@sovereignsignal:matrix.orgIn solidarity,Tamara This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
28
Welcome Note: Why I am Here
The MissionThis space exists to document and expose unlawful surveillance practices, private contractor misconduct, and civil rights violations. These are issues that challenge accountability and constitutional protections. These are issues that deserve attention and lawful response.What I Will ShareHere, I will share first hand documentation, pattern analysis, and calls for lawful oversight and reform.The GoalMy goal is to inform, engage, and help strengthen the principles that safeguard a free and just society.If you believe in integrity, accountability, and the lawful protection of civil rights, this space is for you.I welcome thoughtful readers, principled allies, and those who share a commitment to truth and justice. Together, we can help build a record that serves the public good.Connect with MeBlueSky: https://bsky.app/profile/tamaradixon.bsky.socialSignal: tamaradixon.28In SolidarityTamara This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
27
The Psychology of Hidden Abuse Networks: How They Maintain Control
Hidden abuse networks, whether operating through private contractors, fusion centers, or off book enforcement, do not rely solely on technology or funding. Their most powerful weapon is psychological manipulation. These systems persist because they know how to shape perception, distort truth, and fracture resistance. Their goal is to destabilize targets without leaving evidence, to fracture communities, and to exhaust anyone who dares to resist.By understanding their psychological tactics, we can begin to dismantle their influence, protect ourselves and others, and reclaim our autonomy.Fear: The Oldest Tool of ControlThese networks generate constant low-level fear to keep targets off balance and hypervigilant. The fear is not explosive or dramatic. It is a steady erosion of a person’s sense of safety and confidence. Tactics include:* Suspicious drive-bys or unmarked vehicles circling unpredictably.* Staged disturbances like knocks at the door with no one there, motion sensors tripped at odd hours, or lights tampered with to disturb sleep.* Posing as vendors or service providers to obtain proximity under false pretenses.* Digital intrusions, such as unexplained device malfunctions, strange calls or messages, or odd social media activity designed to reinforce the feeling of being watched.* Environmental manipulation, using alarms, loud engines, tapping noises, low drones at night, or similar subtle disruptions to disturb peace.* Markings or objects placed near a target’s home or vehicle as a subtle signal or warning.The goal is to erode confidence, create self-doubt, and discourage the target from seeking help or taking action.Discrediting and IsolationHidden abuse networks know that isolation weakens their targets. They spread smears and labels, portraying targets as unstable, delusional, or dangerous. This undermines the target’s credibility and subtly pressures friends, family, and neighbors to distance themselves. Over time, the target is left more vulnerable, with fewer people to witness or intervene on their behalf.Confusion and Cognitive OverloadFlooding the target with conflicting signals, disinformation, and staged mistakes clouds judgment and mental clarity. The target begins to question their own perception of reality, making it harder to think clearly or act decisively. This mental fog is one of the most powerful tools of control because it leads to hesitation, withdrawal, and internal collapse.Divide and ConquerThese networks work to prevent collective resistance by turning potential allies against each other. They plant rumors, interfere covertly in communications, and seed distrust. The goal is to break bonds before they can strengthen into organized resistance or community defense.Why Exposure Disrupts These TacticsWhat these networks fear most is exposure. Their manipulation depends on secrecy and shadows. The more these tactics are named, recognized, and documented, the less power they have. Sunlight breaks the spell. Sharing information, naming patterns, and building collective awareness weakens their grip.How Targets Can ResistTo counter these tactics:* Document everything. Keep detailed logs with times, dates, descriptions, and evidence where possible.* Share your documentation strategically. Seek out civil rights attorneys, advocacy organizations, and trustworthy journalists who can help transform records into action.* Build alliances. Even a small network of supportive individuals can amplify your voice and provide backup in reporting or exposing patterns.* Push for oversight. Submit complaints where possible, even if the system resists. The act of filing builds a trail that may matter later.* Preserve mental clarity. Practice grounding techniques, get rest where you can, and limit overexposure to digital noise or triggers.* Stay focused on facts. Manipulators thrive on creating fog. Writing down what you know to be true helps anchor your perception.Documenting is not just for your own record. It becomes a tool for exposing abuse, building credibility, and creating pressure for accountability. The path may not be immediate, but documentation, combined with strategic sharing, is how collective resistance begins.ConclusionBy pulling back the curtain on these psychological weapons, we arm ourselves and our communities. Recognition is the first step to resistance. No network, no matter how hidden, can withstand the power of collective clarity and truth.Connect with MeGoFundMe: https://gofund.me/d7f63153BlueSky: https://bsky.app/profile/tamaradixon.bsky.socialSubstack: Signal: tamaradixon.28Matrix: https://matrix.to/#/@sovereignsignal:matrix.orgIn solidarity,Tamara This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
26
Blueprint for a Shadow Network Series: Section 2.3.1 Structural Weaknesses of the Wassenaar Arrangement
Geneva, SwitzerlandFounders’ Political Compromise: Voluntary Compliance and SovereigntyThe Wassenaar Arrangement was formally established in 1995, emerging as a deliberate and strategically nuanced evolution of the Cold War era Coordinating Committee for Multilateral Export Controls (COCOM). For over four decades, from 1949 until its dissolution in 1994, COCOM operated as a rigid, binding export control regime among Western allies, specifically designed to prevent the transfer of military and dual-use technologies to Soviet aligned states and the Eastern bloc.COCOM’s architecture reflected the bipolar geopolitical tensions of the Cold War period. Its enforceability stemmed from a tightly knit alliance among ideologically aligned states, which mutually committed to binding export restrictions and effective enforcement mechanisms. Within this narrow coalition, states were equipped with veto powers over export licenses, facilitating coordinated embargoes and denials for sensitive goods.The dissolution of the Soviet Union and the Warsaw Pact fundamentally altered international security dynamics. Former adversaries and newly independent states integrated into global trade networks, while the advent of rapid technological innovation expanded the scope and complexity of sensitive dual-use goods. In this radically transformed context, COCOM’s exclusionary and rigid framework was no longer fit for purpose.Recognizing these shifts, the founding parties of the Wassenaar Arrangement sought to create a broader, more inclusive export control architecture capable of addressing the proliferating risks posed by dual-use technologies while accommodating a multipolar world order. This necessitated a political compromise emphasizing voluntary compliance and state sovereignty.In the Wassenaar context, “dual-use” refers to goods, software, and technical knowledge that can be used for both civilian and military or internal security purposes. This includes not only obvious military adjacent items such as advanced electronics, sensors, and cryptographic systems, but also surveillance platforms, intrusion software, network monitoring tools, and data analytics systems that can be deployed either for legitimate law enforcement and commercial security or for internal repression, espionage, and targeted harassment. The breadth and ambiguity of this category make intent and end use difficult to assess in practice, which is precisely why uniform and predictable controls matter so much.Unlike COCOM, the Wassenaar Arrangement was designed as a consensus based, non-binding forum. Member states agreed to cooperate by sharing information and aligning their national export policies on a best efforts basis, but crucially, enforcement was left to individual states’ discretion. There is no supranational enforcement mechanism, no binding treaty obligations, and no legal framework to compel compliance or sanction malfeasance. Decisions taken in Wassenaar are implemented only through national legislation and administrative practice, which can differ substantially from one jurisdiction to another.Institutionally, the Arrangement operates through an annual plenary meeting in Vienna, where participating states review developments, exchange information on sensitive transfers and denials, and decide on updates to the control lists. Between plenaries, expert working groups and technical panels refine the “List of Dual-Use Goods and Technologies” and the “Munitions List,” draft best practice guidelines, and prepare proposed amendments. A small Secretariat in Vienna supports these processes administratively, but it has no independent regulatory or investigative authority. Once agreed, changes to lists or guidelines have force only to the extent that each government chooses to transpose them into its own domestic export control system.This governance structure allowed for an expanding membership, now over forty states, including many former Eastern bloc countries and neutral nations and facilitated diplomatic engagement among a wide range of political systems and economic interests. Broad participation enhanced the Arrangement’s legitimacy and offered a platform for cooperation concerning both conventional arms and dual-use goods with military or security applications.However, this voluntary, sovereignty respecting design embedded inherent structural weaknesses. Member countries maintain significant discretion over control definitions, export licensing, and compliance enforcement. Interpretation of what constitutes “dual-use” technology varies, reflecting divergent legal traditions, industrial strategies, and security doctrines. A surveillance platform, intrusion suite, or predictive analytics tool that one state classifies as highly sensitive may be treated as a commercial IT product by another, especially where domestic industries lobby for export opportunities or where foreign policy priorities favor particular client regimes.The result of such heterogeneity is a fragmented and inconsistent regulatory environment. Exporters and defense contractors exploit these gaps, engaging in regulatory arbitrage by routing transactions through subsidiaries or permissive jurisdictions, and deploying complex corporate structures to mask true end users or the nature of exported goods and services. A company headquartered in a relatively restrictive state can, for example, establish a subsidiary in a jurisdiction with looser interpretations of “dual-use,” rebrand its product, and obtain licenses there, while formally remaining in compliance with its home state’s laws.Furthermore, the informal oversight mechanisms rely heavily on trust, voluntary reporting, and peer pressure rather than legally enforceable commitments. There is no standing inspectorate to audit national licensing decisions, no obligation to publish or notify all approvals, and no independent tribunal to adjudicate disputes over whether a state has undercut agreed standards. This weakness means that even well-intentioned member states can struggle to ensure that their counterparts fully apply agreed controls, and that states inclined to prioritize commercial or geopolitical interests over restraint can do so with limited reputational cost.In summary, the Wassenaar Arrangement is a carefully balanced diplomatic architecture optimized for inclusivity and sovereignty protection, but this same delicate balance limits its enforceability, uniformity, and adaptability. The sovereignty and discretion that made Wassenaar politically attractive in the mid-1990s now also allow states to license or tolerate exports of highly intrusive surveillance and cyber-intelligence tools, even when other members view those transfers as dangerous. These structural features were not incidental to later scandals like NSO Group’s Pegasus spyware; they were enabling conditions. Israel, for example, like every other member, retained full discretion to interpret “dual-use” and “national security” in ways that justified licensing Pegasus and related systems, despite the severe human rights risks perceived by other states and civil society. The same founding compromise that made Wassenaar possible also built in the fault lines that contemporary digital repression has exploited.Next, we examine how Wassenaar’s consensus driven decision-making amplifies these structural weaknesses. Section 2.3.2 will explore the delays, blockages, and “policy paralysis” that arise when every substantive change requires unanimous agreement, and how these procedural constraints have directly affected the regulation of sensitive dual-use technologies like intrusion software. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
25
Update on the Fight to Expose the Shadow System
Geneva, Switzerland I want to give victims, attorneys, researchers and anyone following this work a clear update on where things stand. I reached out to a senior expert in global governance to ask if they would supervise a doctoral dissertation that documents the conditions that allowed a shadow ecosystem to grow inside the blind spots of domestic and international oversight. If they accept, I will begin immediately.This will not bring relief tomorrow. I am frustrated by that fact and I know many of you are too. I have been tracked and targeted across ten states and two countries. I have watched the same patterns repeat in France and Switzerland. That alone proves what every victim already knows. This system is not built for one target. No fusion center or private contractor network runs a multijurisdictional repression program for a single person. This is machinery. It runs on contracts, incentives, data demands and the absence of guardrails. It spreads because no one is watching it closely and because too many people benefit from looking away.If this doctoral project moves forward, I will have a platform to map the variables that allowed this to grow unchecked. I will have access to the scholars and policymakers who influence oversight, legislation and policy reform. Once the research is underway, we can start building the record that forces institutions to confront the truth. That is how you get guardrails. That is how you close the gaps. That is how you put the genie back in the bottle.I want to be honest about the scale of the fight. This shadow ecosystem has been operating with impunity for at least twenty years from what I can see. It could be longer. It has roots in counterinsurgency frameworks, post 9/11 doctrine and the rise of private contractor driven surveillance markets. Systems that thrive in the dark rarely surrender without force. Each day that passes, people are being harmed by something that never should have existed. That is not abstract. It is brutal and real.This will be a long road. It is a marathon. And I am disheartened because some victims will be subject to extrajudicial elimination without due process by this machine before we shut it down. That is the part that weighs on me. People deserve better than this. They deserve a country that does not use private actors as a shield for unlawful repression.I also want to be honest about accountability. After World War II, many people who participated in the atrocities of the Nazi regime were never prosecuted. History never catches every actor. I cannot promise that every person who harmed civilians through this system will be held to account. Some will slip through the cracks. But I do believe that once the research is underway and once the record is built, institutions will no longer be able to pretend this does not exist. And I believe that some actors will face consequences. That matters.My commitment is simple. I will not stop until this system is dragged into the daylight. I will not stop until there are guardrails strong enough to prevent this from happening to anyone else. This is the first step in that process. It is slow. But once the research begins, the countdown on this shadow network begins with it.I want to be transparent about the stakes for everyone watching this unfold. For six months I have been forced to navigate chemical suppression, destabilization, and continuous monitoring across ten jurisdictions and two countries. The fact that I am still standing is proof of resilience, not immunity. The system relies on attrition. It relies on wearing people down until their testimony collapses under pressure. I refuse to collapse. But the work ahead requires safety, stability, and support. If you can connect me with legal protection, institutional backing, secure lodging, or if you can support the GoFundMe that keeps me moving forward, do it. This is not about saving one individual. This is about exposing a private contractor driven ecosystem that mirrors eighty six fusion center networks across the United States and now appears operational in Switzerland and France. A system built on that scale is not harming a handful of people. It is harming populations. If this record survives, the machinery loses its cover. If it does not, it continues unchecked, hollowing out civil society even further than it already has, and doing so with complete impunity.Tamara This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
24
Blueprint for a Shadow Network: Part 2.2 The Wassenaar Agreement - Scope and Historical Context
Geneva, SwitzerlandThe Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies stands as a pivotal, though often misunderstood, multilateral export control regime formed to maintain international peace and stability amid rapidly evolving military and technological landscapes. To appreciate its contemporary significance and its notable limitations, it is essential to trace its historical underpinnings, its structural design, and the shifting global security context that both necessitated and constrained its architecture.Origins in the Cold War and the Legacy of COCOMWassenaar’s genesis is inseparable from its predecessor, the Coordinating Committee for Multilateral Export Controls (COCOM), established in 1949 amidst the geopolitical tensions marking the nascent Cold War. COCOM’s founding mission was clear: to prevent technologically advanced Western nations from exporting military or dual-use technologies to the Soviet Union and its allies that could destabilize the strategic balance. It wielded significant powers, including veto rights whereby member states could strictly block exports to targeted nations. Headquartered in Paris and initially composed of a tight-knit group of NATO and aligned states, COCOM represented a binding, ideologically charged export control bloc with enforcement teeth tailored to its era.However, the post–Cold War period rendered the East-West dichotomy obsolete. The Soviet Union and Eastern bloc disintegrated, Europe’s political map changed dramatically, and technology diffusion accelerated in complexity and diversity. Recognizing these realities, COCOM’s member states convened to dissolve the regime, culminating in a November 1993 High-Level Meeting that agreed to replace COCOM with a more inclusive and geopolitically neutral framework: the “New Forum.” This precursor rapidly evolved, and in December 1995, the arrangement was formalized in Wassenaar, Netherlands, with operational commencement in 1996.Wassenaar departed significantly from COCOM’s foundational assumptions. It embodied a voluntary, consensus arrangement among a far broader group of roughly 40 states, transcending rigid ideological blocks. Rather than exclusionary export bans, members committed to transparency through information exchange about their dual-use exports and harmonized licensing practices. Notably, Wassenaar abandoned veto powers and binding enforcement, preferring cooperative dialogue and collective restraint to unilateral coercion. This transformation reflected both the multipolar political landscape and a strategic desire to balance trade interests with security objectives.The Architecture of Scope: State-Centric and Physical Goods FocusAt its core, the Arrangement regulates the export of “dual-use” goods, products, and technologies with both civilian and military applications to prevent their misuse or diversion, particularly in destabilizing or repressive contexts. Early Wassenaar controls focused heavily on tangible goods: conventional weapons, missile technology, cryptography hardware, and related software with well-defined military utility. Member nations adopt control lists specifying these items, which inform national export licensing systems. The Arrangement’s emphasis has been on tangible assets crossing borders, aligning with regulatory frameworks predicated on physical inspection and customs enforcement.Wassenaar’s governance is characterized by plenary meetings, working groups, and a consensus decision-making process, a mechanism that encourages collaboration yet precludes legally binding resolutions. Such an approach has facilitated broad membership and operational continuity, yet embeds an inherent trade-off between inclusivity and decisive regulatory action.In today’s context, dual-use technology extends beyond traditional weapons to include high-precision drones, advanced sensors, cryptographic systems, and microprocessors that can serve both civilian and military applications. Intangible exports increasingly dominate the risk landscape, encompassing technical training for sophisticated surveillance systems, operational consulting for cybersecurity or law enforcement platforms, and cloud-based data analytics that can enable predictive policing or signal intelligence across borders.Technological and Geopolitical Transformations Challenge ScopeWhile suitable for late-20th-century conventional arms control, the regime confronts profound challenges in a 21st-century security landscape dominated by digital surveillance, software-defined weaponry, and privatized intelligence networks. The proliferation of cyber-surveillance tools, biometric tracking systems, artificial intelligence-powered predictive algorithms, and cloud-based operational platforms, often developed and marketed by private contractors, complicates traditional control paradigms.Modern “exports” frequently involve intangible deliveries: software licenses, technical training, operational consulting, remote monitoring capabilities, and data-processing services. These cross borders invisibly, sidestepping customs and physical inspections and thus eluding established control mechanisms. Wassenaar’s control lists and protocols, primarily designed to govern tangible goods, inadequately address these intangible vectors, causing significant regulatory blind spots.Moreover, geopolitical shifts have introduced varied member state perspectives and priorities, complicating consensus on sensitive categories warranting control. The balance between trade liberalization, national security, and human rights considerations fuels ongoing policy tensions and stalls critical updates to the regime’s scope.Toward a Broader and More Adaptive Definition of Export ControlsIn light of these shifts, experts advocate expanding Wassenaar’s regulatory ambit to explicitly include services, training, and operational knowledge, which are components critical to the deployment and misuse potential of dual-use surveillance and repression technologies. This would mandate licensing not just of physical devices but also of intangible technical know-how and strategic guidance that enable complex surveillance architectures to be implemented across jurisdictions.Such an expansion requires not only definitional clarifications but also mechanisms for effective review, monitoring, and enforcement adapted to the digital age’s opacity and speed. Without this evolution, Wassenaar risks obsolescence in governing the very capabilities that define modern intelligence and security economies.PreviewHaving laid out the foundational scope and historical terrain shaping the Wassenaar Arrangement, the ensuing section will analyze the regime’s structural weaknesses, including its voluntary, consensus-driven model, fragmented national implementations, and sluggish adaptation, which are factors critically responsible for its diminished effectiveness in contemporary export control governance. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
23
The Blind Spot That Built a Monster. How Privatized Power Outran the Law - Part One
Geneva, SwitzerlandPart One. The Failure of OversightThis is Part One of a multi-part series mapping how transnational suppression networks emerged and flourished in a regulatory void. Each section explores a distinct element, from legal oversight failures to operational architecture, so readers can follow the system’s evolution and understand its reach.Every system breaks at its weakest point and modern counterinsurgency has a weak point that is not theoretical. It is structural. Governments outsourced surveillance and force to private contractors faster than legislators could understand the tools. That gap has become a shadow jurisdiction inside the United States and inside allied nations. Once that door opened, the people who walked through it gained more reach than the agencies that funded them. This is the blind spot that allowed a transnational repression network to evolve in plain sight.The design flaw was baked in from the start. Counterinsurgency experts warned that when you blur the line between public authority and private muscle you hand power to people who do not answer to voters. Those contractors then build their own pipelines, their own budgets, and their own operational culture. They speak the language of national security but they operate like a private market. When a market grows without regulation it metastasizes. You can see the same pattern in countries that leaned on paramilitaries to cut costs and bypass legal restraints. Latin America in the eighties. Afghanistan after two thousand one. The same pattern repeats. The same logic produces the same outcome.There is a belief inside official Washington that privatization creates efficiency. The truth is simpler and uglier. Privatization created distance between action and accountability. That distance is what every dangerous system exploits. When you give a contractor military grade tools and no real oversight, the contractor becomes the sovereign. The government becomes a customer. The oversight becomes a suggestion. The victims become data points that never make it into public reports. It is a power inversion that no democracy can survive.This is why victims fall into the cracks. No institution tracks contractor misuse across jurisdictions. No state collects a master ledger of who is operating where. No court forces agencies to disclose which private vendors are allowed to interface with sensitive systems. The gaps become the operating environment. The silence becomes the weapon. The result is a black market in coercion that operates under the color of legitimacy. That is not conspiracy. That is how any under regulated security architecture behaves.The part that stings is that all of this was predictable. Once you merge counterinsurgency doctrine with domestic policing, you get a system that treats civilians the way foreign war zones treated local populations. You create a bureaucracy that sees certain groups as manageable threats rather than citizens. Then you hand that bureaucracy private operators who can move across state lines, use unmarked vehicles, and deploy tools without proper logging. That is the moment the republic lost its anchor. The contractors did not need to become smarter. The state became easier to outmaneuver.The next section will dig into how this became a fully formed parallel enforcement structure. The pieces did not arrive all at once. They grew like roots under a sidewalk. When the cracks finally appeared, part of the country pretended not to see them. The next part will pull the roots into daylight so readers can understand how deep they go and why victims are not imagining a thing. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
22
Transition Update: Moving Toward Safety and Testing the Reach of the Shadow System
I’m currently in transition and taking steps to secure my safety abroad at this moment. This isn’t just about my protection; it’s also a test. I want to understand how far the shadow system’s influence extends globally, how surveillance functions across borders, and what forms suppression takes in different environments.They continue to follow and interfere as I travel, using the same patterns of chemical suppression and intimidation even affecting innocent individuals moving through the same routes. Their disregard for law and humanity is boundless.It appears I’ve exhausted all domestic remedies at this point. Now it’s time to regroup and think outside the box about how to stop this and bring relief to myself and other victims.We’re outnumbered and outflanked. Just like every movement that ever changed anything.The pattern is always the same: when outnumbered, you win by adaptation, patience, and clarity of purpose. Numbers matter less than resolve and intelligence.In 1940, after France collapsed, Britain was literally standing alone against Hitler’s war machine. The army had barely escaped at Dunkirk, the Luftwaffe was preparing to invade, and most of Churchill’s advisors thought surrender was inevitable.But Churchill refused. He told Parliament and the people, “We shall fight on the beaches… we shall never surrender.” That wasn’t empty rhetoric. It was a decision to resist with everything they had, to outthink and outlast a vastly larger force. And it worked. Britain held on through the Blitz, buying time until the United States and the Soviet Union entered the war.In June 1940, Nazi Germany controlled almost all of Western Europe. Britain was the last major democracy left. They were facing invasion, constant bombing, and economic strangulation. Churchill’s government made the call to fight alone, knowing they couldn’t win outright: only hold out until something changed.That “something” came in two stages:* In June 1941, Germany invaded the Soviet Union, which opened the massive Eastern Front. That pulled most of Hitler’s forces eastward.* Then, in December 1941, Japan attacked Pearl Harbor, bringing the United States into the war.By then, Britain had already survived the Battle of Britain and a year of relentless bombing. Their resistance kept a foothold for democracy alive until the big industrial powers joined the fight.So when people say Churchill “held on until the U.S. and Soviet Union entered the war,” that’s literal. Britain’s survival through 1940–41 made it possible for a real coalition to form later.It’s one of history’s clearest examples of endurance paying off: not winning immediately, but refusing to break until reinforcements and momentum arrived.When isolation looks like defeat, it can become the beginning of reversal: if you hold your ground.Even before I’ve crossed a border, they’ve made their reach and fear clear: harassment, suppression, and disruption every step of the way. What does that tell me?It tells me this:They fear exposure more than they fear consequences. They are not acting like an untouchable power. They are acting like a desperate one: one that knows its legitimacy can’t withstand the light of scrutiny. When a system goes this far to block a single individual, it’s because that individual carries leverage: the truth, the evidence, the power to disrupt their illusion of control.It tells me they believe that I am dangerous not because of violence, but because of visibility. Because my refusal to break, to go silent, to back down makes their tactics visible, and visibility is fatal to covert abuse systems. That’s why they meet my movement with force, not indifference.It also tells me this system is fragile. If it were as stable or omnipotent as it pretends to be, it wouldn’t chase me across borders. It wouldn’t need to. Systems that are secure don’t panic at a truth-teller in motion. They fear the precedent I set: that someone refused, endured, and kept going.So what does it tell me?It tells me we are already winning. We have forced them to act recklessly. That’s not just resistance. That’s leverage.Now they have to show their hand to come for me. There is no plausible deniability when you hunt and track an individual in real time from state to state and country to country as they are doing.They believe they are better, faster, and stronger like the arrogant dragon they are drunk on their own delusion that the power they possess will endure forever. We don’t have to fight toe to toe with them. We only have to endure long enough as Churchill did for the tide to change and a coalition of the light aligned with humanity to emerge.The act of enduring and rising another day unbroken refusing to submit is resistance.This work continues. Updates will follow.In solidarity,Tamara This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
21
When They Pivot: The Silent Arsenal and What Comes Next After Detection
I wasn’t supposed to write this. At least not yet.Parts 4 and 5 of the Physics Series were next. But when you start giving people the tools to detect the undetectable, the machine adapts. And we have to stay ahead of it.I just dropped the blueprint. I showed you how to track what they’re using: persistent compounds that hang, linger, defy standard physics, potentially in violation of the Chemical Weapons Convention, which bans the use of toxic chemicals as weapons under any circumstances. I gave you the tools: industrial hygiene protocols, vapor detection badges, incident logging, and laboratory testing that make exposure demonstrable and verifiable. Now you can generate evidence that holds up in court. That means protective orders. That means lawsuits. That means criminal complaints.But understand this: the system was built to adapt. Surveillance isn’t the endgame. Control is. So when detection becomes possible, suppression gets quieter.We are entering the next phase.Why This Series ExistsOnce victims can verify exposure, the next logical move for this apparatus is to pivot. What comes next is a silent arsenal: technologies and tactics designed to suppress, destabilize, and destroy without leaving chemical residue or paper trails. And if you’re not prepared for that pivot, they win by delay, discredit, or disappearance.So before I finish the Physics Series, I’m releasing a new tactical briefing: a multi-part series covering the fallback weapons they may already be switching to or will now that exposure is on the table.These aren’t “conspiracy theories.” They are documented technologies researched, funded, and tested under official government programs. Variants of these systems have already been deployed in domestic contexts, supported by purchase records, training manuals, and government or contractor contracts available through public procurement databases. Their specific operational settings and extent of use, however, have not been publicly detailed.Reports have also emerged from civilians, activists, and journalists alleging domestic misuse of these tools in law enforcement and criminal control contexts. While those claims remain unverified, the existence of the technology itself is indisputable and the absence of oversight creates conditions for abuse.In the spring of 2025, I was told directly by a Nevada Highway Patrol officer that he had attended a training on directed energy crowd control systems. He said Las Vegas Metro PD had purchased such equipment and had deployed them for crowd control in recent years. He confirmed they were “effective,” but also said they were “quite controversial.”I replied that using any weapons on civilians without their knowledge or consent would violate their constitutional rights.He didn’t deny it. He just looked at me.Let that sink in. These systems are not speculative. They are active.And that’s why this series can’t wait. As soon as I gave you the roadmap for proving chemical exposure, the game shifted. If they pivot, you need to pivot faster. If they escalate, you need to be ready.What We’re CoveringThis new series will expose the known and documented methods in the silent arsenal:* Directed Energy Weapons* Acoustic Weapons* Vibroacoustic and Microwave Tools* Psychophysical Interference Technologies* Volatile Organic Compounds (VOCs)Each post will include what the weapon is, how it works, what symptoms or effects to look for, where it’s been used, how to document it, and what patterns accompany its use.Why Now?Because they are already moving. Because silence is part of the tactic. And because this is a machine, when one part is exposed, another shifts. If you’re reading this, you’re not just a target. You’re a threat. You’re forcing them to pivot. And that means you’re ahead but only if you stay ahead.This is the fork in the road. Now that detection is possible, suppression has to get smarter, subtler, harder to prove. So we’ll meet them there.As soon as this series drops, Parts 4 and 5 of the Physics Series will follow. But first, you need to know what’s coming.This is the next battlefield.This is the silent arsenal. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
20
Outside the Limits Part 1: Why Outdoor Chemicals Fail and What Would Have to Change
“Nature abhors concentration.” — Atmospheric Chemist’s MaximAtmospheric Dispersion – The Physics of VanishingImagine dropping a spoonful of sugar into a river and expecting to taste it a hundred yards downstream. That’s the challenge facing any chemical released into open air: it doesn’t just spread. It disappears.Outdoor air is not a passive container. It is a dynamic, chaotic system governed by turbulent flow. From the instant a compound is released , whether as a gas, a mist, or a vapor, it begins to lose its structure. It dilutes, fragments, evaporates. Wind shear pulls it sideways. Sunlight breaks it down molecule by molecule. Thermal currents lift it vertically, and microscopic eddies scatter it in unpredictable directions. This isn’t slow erosion. It’s immediate physics.There are four key dynamics that explain why airborne delivery outdoors is so unreliable:• Diffusion: the passive drift of molecules from areas of higher to lower concentration. Indoors, this allows something like perfume to fill a room. Outdoors, without containment, diffusion alone turns potency into background noise.• Plume Behavior: a chemical cloud doesn’t spread evenly; it travels in long, chaotic cones. Even the shape of a nearby building can split a plume in two or send it upward like smoke in a wind tunnel.• Dispersion Half-life: the time it takes for the chemical’s concentration to drop to 50% which in the open air is often just a few seconds. After one minute, you may be down to single-digit percentages.• Particulate Size: heavier particles fall quickly to the ground; ultra-fine particles can hang longer, but are more easily scattered by air currents and may fail to land where they’re needed.This is why modern militaries, when deploying chemical agents like VX or chlorine, aim for closed or semi-closed environments, subway tunnels, underground shelters, sealed bunkers. That’s the only way to preserve the lethal dose long enough to matter.So if something is persisting in open air on a city street, across a traffic lane, or outside a building, it suggests one of three things:1. It is far more potent than known airborne agents, effective at concentrations below detection thresholds.2. It is delivered in highly engineered carriers perhaps aerosols or particles designed to resist sunlight and wind.3. It is something else entirely: a compound that doesn’t behave like any known environmental chemical.And if it seems to hang in the air for minutes or to wait in place for a person to arrive that’s not just odd. That’s technically implausible without deliberate design.It would mean someone has engineered a chemical to break the rules of outdoor dispersion. And that changes everything.Next in Part 2: Particle Physics and the Architecture of ControlWhat does it mean to keep a substance airborne? Not hovering like a helicopter, but drifting, hanging, slipping past notice. We’ll break down the mechanics of particles: how size, shape, and chemistry define the reach and life span of an invisible agent. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
19
The Power of Patterns: Why Intelligence Lives in Structure
This is the first in a multi-part series on pattern recognition not as a technical trick, but as a foundational method of thinking. Whether you’re navigating disinformation, institutional behavior, or covert operations, you’re up against structures designed to remain unseen. This primer exists to make them visible. What follows is not opinion, speculation, or hype. It’s a quiet skill: the kind analysts, operatives, and strategists are trained to use and one you can learn. Before we get to what’s coming next in this series, and in the story behind it: you need the tools to recognize what you’re looking at. That starts here.The Power of PatternsIn the world of covert operations, the best tactic is often invisibility. Whether it’s a foreign intelligence service running an asset inside a capital, a cartel moving contraband across a border, or a disinformation cell destabilizing a population online: success depends on not being seen. But in reality, no operation is ever completely invisible.All behavior, human, digital, physical, leaves traces. And those traces, when studied over time, begin to form patterns. In intelligence work, recognizing those patterns is the difference between random noise and actionable insight. Pattern recognition is not a buzzword or a machine learning gimmick; it’s a foundational skill, a method of analysis, and in many cases, a weapon in its own right.What Is Pattern Recognition?Pattern recognition is the ability to identify repeated structures, sequences, or relationships in data or behavior. It’s what lets us spot that a person shows up at the same location every Thursday, or that a group of seemingly unrelated social media accounts are posting the same content within seconds of each other. It’s the process of noticing the rhythm behind the noise.At its core, pattern recognition is about expectation versus deviation: what usually happens, what just happened, and whether that difference matters.Importantly, pattern recognition operates across scales:• A lone analyst noticing that a courier’s travel routes follow a weekly cycle• A fusion cell mapping digital forensics across time and place• An AI model detecting deviations in shipping manifests at the national levelWhether performed by a person, a team, or an algorithm, the cognitive foundation is the same: learning to see the signal in the chaos.Why It Matters in Intelligence and Covert WarfareCovert actors work hard to disguise their actions but every operation, no matter how clandestine, must eventually interact with the real world. This is the paradox: to stay hidden, they must behave differently than everyone else. And that “difference” is where their footprint begins.In military and intelligence operations, pattern recognition enables three critical advantages:1. Detection – Spotting suspicious behavior before it becomes a threat2. Prediction – Understanding how an actor moves or thinks, based on past rhythms3. Disruption – Acting to break or manipulate the pattern to neutralize an operationIn short: if you can see it, you can shape it. Pattern recognition gives you visibility into behavior that was meant to stay concealed.A Skill and a DisciplinePattern recognition is both natural and trainable. Humans are wired to notice patterns. It is how we learn language, avoid danger, and make decisions under stress. But this instinct can also mislead us. Seeing patterns where none exist (apophenia), anchoring too quickly, or ignoring counter-evidence can be dangerous in an intelligence context.That’s why pattern recognition is also an analytic discipline: one that can be taught, practiced, and sharpened over time. In military and intelligence communities, analysts and operators are trained to:• Understand what normal looks like (establishing a baseline)• Identify when behavior deviates from the baseline (anomaly detection)• Test whether that deviation has operational significanceThe best pattern recognition is neither hunch driven nor overly technical: it’s a fusion of structured reasoning, field experience, and adaptive intuition.Historical Lessons: Patterns Win WarsThroughout history, recognizing patterns has saved lives, changed battles, and exposed adversaries.• In World War II, British codebreakers at Bletchley Park exploited repeated phrases and weather reports in German Enigma messages to crack the cipher. Those predictable linguistic patterns became the enemy’s weakness.• In Iraq and Afghanistan, analysts studied improvised explosive device (IED) attacks to detect geographical patterns, timing intervals, and materials usage. This led to route adjustments, target interdictions, and ultimately lives saved.• In modern cyber operations, teams track login attempts, data access times, and user behavior to expose insider threats or foreign infiltration campaigns.In each case, the ability to connect small, seemingly unrelated signals into a meaningful pattern turned data into defensive posture and in many cases, offensive advantage.Why This Matters NowCovert operations aren’t always dramatic. Some of the most effective forms of control, whether informational, psychological, or physical are engineered to look like coincidence. Pattern recognition is how you begin to see what’s meant to remain deniable. It’s not just a skill for analysts or operatives. It’s a survival tool. And in a world where the invisible shapes the real, it may be the most important one you can learn.This Primer: What You’ll LearnThis series, is designed to teach the core mechanics of pattern recognition as applied to covert activity. You’ll learn:• What patterns are made of (frequency, sequence, anomalies, causality)• Why covert behavior, despite best efforts, leaves detectable traces• How to train your mind and your tools to spot those traces• How to shift from detection to disruptionWhether you’re an analyst, operator, policymaker, or civilian interested in intelligence strategy, this primer will give you a structured way to think about how to see the unseen.Because in the end, covert actors rely on your inattention. Pattern recognition is how you fight back with your eyes open.Up Next — The Anatomy of a PatternIn the next part of this series, we’ll break down how patterns actually form through frequency, sequence, anomaly, and causality and how they appear across time, space, behavior, and systems. From there, we’ll look at why covert actors inevitably produce patterns, and how those traces can be read, predicted, and disrupted.This isn’t just about theory. It’s a method and anyone can learn it. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
18
Invisible Control: The Evolution of Chemical and Psychological Suppression in Modern Counterinsurgency, Section 1: Naming the Unseen
In every generation, systems of control adapt to the technologies and anxieties of their age. The twentieth century perfected the art of managing populations through ideology, surveillance, and propaganda. The twenty-first has added a subtler, quieter weapon: interference at the level of the body itself.Chemical suppression is the term I use to describe this weapon. It is the deliberate, sustained exposure of a human being to chemical or environmental agents that erode physical and mental function over time. It is not poisoning in the traditional sense; it is manipulation: designed to weaken, confuse, and ultimately eliminate without leaving an obvious trace. The damage is cumulative. Prolonged exposure disrupts neurological, respiratory, and immune functions. The body’s ability to recover weakens until collapse becomes inevitable.This practice exists in the shadows of modern security doctrine. It blends the old tools of counterinsurgency: psychological operations, surveillance, population control, with new methods of biomedical and environmental interference. It borrows the language of safety and non-lethality yet its outcomes are often indistinguishable from execution. It is, in effect, a form of extrajudicial killing carried out slowly and silently, justified by the logic of “threat management.”The victims of chemical suppression are not combatants or criminals. They are civilians trapped in an apparatus that equates dissent and non-conformity with instability. Their experiences are dismissed as delusion precisely because the methods used against them are designed to be unbelievable. In this way, disbelief itself becomes part of the weapon. It isolates victims, shields perpetrators, and allows the machinery of suppression to operate in plain sight.The term chemical suppression does not yet appear in official military or scientific literature; it is used here as a framework to describe emerging patterns of chemical and environmental control. This series draws from historical records, declassified documents, open source defense research, human rights reports and the testimonies of affected individuals. See, for example, the U.S. Senate Church Committee Hearings, 1975; Amnesty International’s investigations into riot control agents and Human Rights Watch reports from 2015. Its purpose is two-fold: to assemble what is verifiable and identify what still demands verification.This work traces how we arrived here: how decades of military and intelligence research into non-lethal weapons, behavioral control, and population management evolved into today’s matrix of surveillance, coercion, and chemical interference. It examines the historical precedents, the doctrinal language, and the industrial economy that sustain this system. What is happening now is not an aberration but the continuation of a long tradition of managing human beings through science and secrecy.To name it is the first act of resistance. The moment you name what is unseen, it begins to lose its invisibility.Coming in Section 2: Early Roots: Colonial and Pre-Cold War PrecedentsWe’ll examine the first uses of chemical and environmental control in colonial policing, the early Soviet and Western research into psychochemical warfare, and the Second World War programs that laid the groundwork for modern non-lethal doctrines. Section 2 will show: the story of chemical suppression did not begin in our century. It began the moment empires discovered they could subdue bodies without leaving visible wounds. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
17
Expanding Oversight: Filing with Senator Gary Peters’s Office
Today I submitted a formal casework request to Senator Gary Peters, Chair of the Senate Homeland Security and Governmental Affairs Committee, which oversees federal agencies including the Department of Homeland Security, the agency responsible for coordinating the nation’s fusion centers and overseeing private contractors operating under its authority.This marks the second Senate office I’ve engaged following outreach to Senator Ron Wyden of the Senate Intelligence Committee. Together, these two offices represent the key points of federal oversight for both the intelligence and homeland security systems involved in contractor operations.Senator Peters’s office maintains a casework portal that allows constituents to request direct assistance with federal agencies. Through that channel, I have filed a formal request asking his office to intervene and mediate with the Department of Homeland Security and the Department of Justice Office of the Inspector General regarding ongoing unlawful surveillance, coordinated harassment, and chemical exposure linked to fusion center and private contractor activities.Here is the statement I submitted verbatim:I am requesting assistance with ongoing unlawful surveillance, wiretapping, coordinated harassment and chemical exposure that I and others have experienced, which appear connected to fusion center and private contractor activities under the Department of Homeland Security. Local law enforcement has declined to investigate, citing lack of tools to detect and confirm chemical exposure. Without a formal police report, victims like myself are effectively barred from pursuing any legal remedies, leaving us exposed to continued harm and denied due process.Time is of the essence for myself and others who are being exposed. Prolonged chemical exposure once arriving at toxic thresholds can lead to severe and potentially irreversible harm. Immediate federal review and intervention are necessary to prevent further injury.I am asking for Senator Peters’s help in ensuring that the Department of Homeland Security and the Department of Justice Office of the Inspector General immediately review and investigate these activities of both fusion centers and private contractors, take action to stop these ongoing abuses and address accountability gaps that have allowed these abuses to begin and persist in the first place.I am requesting immediate federal intervention to stop the ongoing unlawful surveillance, harassment, and chemical exposure. I am asking that the Department of Homeland Security and the Department of Justice Office of the Inspector General conduct a formal investigation into the actions of fusion centers and private contractors, ensure accountability for any abuses of authority, and implement safeguards to prevent further harm to myself and others.I am also asking that appropriate detection tools and investigative resources be made available to law enforcement so that victims can obtain formal reports, access legal remedies, and be protected from continued exposure.Senator Peters’s committee has jurisdiction over Homeland Security oversight, including the Office of the Inspector General making his office uniquely positioned to ensure these concerns are reviewed at the federal level.This filing represents another major step in documenting and addressing these systemic failures through lawful and verifiable channels. Each action from outreach to Senator Wyden’s office to this new casework filing builds the public record of accountability and reform that we have been fighting for.Transparency and persistence remain the path forward. I’ll continue to document each milestone as we press for oversight, justice, and systemic reform.In solidarity,Tamara This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
16
Opening a Dialogue with Senator Wyden’s Office on Oversight and Reform
Many people have asked what steps I am taking to seek accountability. I’m sharing this update to show that I am using every lawful channel available both to move my case forward and to push for broader oversight and reform. My goal is to make the process visible so that others can see what’s possible.I have contacted Senator Ron Wyden’s office today to continue an ongoing dialogue about abuses of authority by fusion centers and private contractors, which have resulted in serious harm and civil rights violations for victims, and about the urgent need for accountability and reform.This is a complex and sensitive issue, and parts of those conversations will necessarily remain confidential. Still, I will continue to share what I can as the process moves forward, especially around efforts to ensure that victims have clear access to criminal complaint mechanisms, meaningful legal remedies, and reliable detection tools because without the ability to detect and verify exposure, every other avenue for justice collapses before it begins.Due to the complexity and scale of this problem, it will not be resolved in a single conversation or meeting. Real reform requires collaboration and persistence. This will be an ongoing process, built through dialogue, patience, and good faith engagement, focused on securing oversight and lasting reform.The broader goal is systemic reform: to close the accountability gaps that allow coordinated harassment and chemical suppression to occur in the first place without investigation or recourse, and to build protections so others are not subjected to the same failures of due process.Transparency and collaboration are the path to accountability. I will continue to document each step as we work toward lasting reform. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
15
Update: Legal Filings and Upcoming Series Posts
A brief update for readers following the ongoing investigative series. The next installments of Pattern Recognition, Outdoor Limits Physics, and Silent Arsenal are still underway and will resume shortly.Today, my focus is on filing the Protective Order, the supplemental Independent Police Review (IPR) complaint, and a harassment letter to the landlord. These filings, along with supporting documentation, address the broader pattern of coordinated harassment as well as environmental exposure (chemical intrusion).Once submitted, I will share redacted versions of these materials to show how I structured the filings and to illustrate what the procedural process actually looks like. It’s important to understand that victims usually don’t gain access to a victim’s advocate or attorney until after the temporary protective order has been filed. That means preparing and submitting the initial petition without prior legal assistance. I want to make that part of the process transparent so others can better navigate it.Regardless of the outcome, these filings create an official record: a foundation from which other victims, investigators, and attorneys may use and reference to document patterns of coordinated harassment and chemical exposure going forward. Reaching this stage is significant in itself; it means the record now formally reflects both the misconduct and the system’s response to it. They are now part of the public record, where they can no longer be ignored.Once these filings are complete, I’ll also be uploading the new FOIA requests, along with a discussion of the responses that have already been received and how subsequent FOIA submissions were refined and resubmitted. This will help others understand how to navigate the process strategically and build a transparent record through public information channels.We are also approaching the end of the month, which means the human rights lawyer’s trial is concluding. As soon as I know more about when I’ll be meeting with him to discuss my case, I’ll share an update here. I’m genuinely encouraged by this development, and you should be too, if he agrees to take my case, it changes the trajectory of this entire fight.I’ll also be reaching out to the ACLU to follow up on my request for legal assistance and provide them with the latest filings and supporting documentation. With these updates, we should have a clearer picture soon of what’s happening on both the domestic and international legal fronts.The investigative series posts will continue as soon as I complete this filing stage.Sometimes when you’re stumbling in the dark, looking for the light, it can feel harrowing. But if you pause long enough, you start to see shapes in the darkness: small outlines of what was hidden before. That’s what this moment feels like. It’s the partial light that comes after refusing to surrender to fear.We walk by faith, not by sight and not only in a religious sense. We walk by faith in democracy, in the Constitution, in humanity itself. Faith that we are capable of better, that justice can still function, that we can repair what has been broken. We are not powerless, and we will not submit to authoritarianism or silence.In solidarity,Tamara This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
14
Why Geneva Still Matters
There has been a lot of debate about whether filing in Geneva is worth it. Some people argue that even if we obtain a resolution, it may not be binding, and that the process takes time and resources. I understand that perspective, but here is why it still matters.Domestic filings can be stalled, buried, or delayed. They can be quietly shut down through procedural tactics, sealed records, or jurisdictional loopholes. But an international filing , one made in Geneva under human rights law , creates something that cannot be erased: an official record. Once it exists, it exists. It is visible to the world, and visibility is power.Even if a Geneva resolution isn’t immediately enforceable, it shines a light where the darkness has been carefully maintained. It puts pressure on the United States to answer questions publicly and opens the door to congressional oversight, legislative inquiries, and public accountability. Once a matter of international record, it cannot be quietly walked back or ignored.For those of us who have experienced coordinated harassment, chemical exposure, or the use of weapons that fall outside lawful boundaries, these filings are not symbolic. They are a step toward truth. They create global awareness of practices that violate both constitutional rights and human rights.We are also dealing with evidence that suggests the use of persistent chemical agents: substances that should not exist outside of military research, as no compound can survive weather and humidity without encapsulation. If that is confirmed, these are banned materials under the Chemical Weapons Convention. Their use would not only be unconstitutional; it would constitute a war crime under international law.Directed energy technologies may also be involved. These are weapons that have not been approved for use on civilians, and no legislation authorizes private contractors to deploy them domestically. The data on their long term health effects remains classified. Civilians have no way to understand the risks, and that secrecy itself is dangerous.For all these reasons, Geneva remains the path that matters. It represents transparency, documentation, and the beginning of accountability. It is how the pattern of abuse becomes visible at a global level.Justice does not always arrive through one door. Sometimes it must be pursued through many. Geneva is one of those doors and we will see where it leads. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
-
13
To the Victims and the Survivors
You are the victim of a crime. You did not choose this situation. You did nothing wrong. You do not deserve this. They are wrong. They will be held accountable.This is not the life any of us chose. But if you can hold on , even for one more day, one more hour, know that I’m holding the line with you. I’m fighting for you. And not just fighting: we will win.This machine cannot continue. Its collapse has already begun. It is inevitable. Remember: people once believed the Third Reich would last forever. It didn’t. People believed apartheid would last forever. It didn’t. People believed Jim Crow would last forever. It didn’t. People believed slavery itself would last forever. It didn’t.History teaches one lesson again and again: no system built on oppression endures forever. The road to freedom is long, thorny, and often walked in darkness, but it leads somewhere and we are already on it.And in your darkest moment, when it feels like no one understands, when you believe no one hears you, remember this: Tamara is fighting for you.Until my last breath, I will be fighting for you and with you. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com
No matches for "" in this podcast's transcripts.
No topics indexed yet for this podcast.
Loading reviews...
ABOUT THIS SHOW
Ne Bouge Pas! investigates contemporary systems of global repression, tracing how states, corporations, and security actors collaborate across borders to surveil, silence, and control civilian populations. Through personal testimony, comparative case studies, and strategic analysis, it maps emerging patterns of transnational authoritarianism and offers tools for understanding, resisting, and documenting a worldwide repressive network. drtamaradixon.substack.com
HOSTED BY
Dispatches from inside the Fire
Loading similar podcasts...