Luxembourg City, Luxembourg
Today, during a conversation in which the asylum process was explained to me, something unexpected happened: I was told that an investigation would be opened into my case and, specifically, into why the United States failed to protect me. This is not a routine bureaucratic step; it is a damning and structurally important question. It signals that the claims I have raised are serious enough to warrant not only an assessment of my need for protection, but an inquiry into the failures of protection themselves.
What makes this moment significant is not just that an investigation may occur, but what is being investigated: the failure to protect me from private military and security contractors, their unlawful surveillance and intrusive monitoring (including Pegasus-like capabilities), and toxic exposures used as a tool of coercion and elimination. These are not abstract harms. They are techniques of control and punishment that have been allowed to operate for the better part of 20 to 30 years with almost no meaningful oversight.
Private Contractors, Torture, and a 30 Year Run of Impunity
For decades, private military and security contractors have lived in the gray zones of law and accountability. They operate across borders, blend with intelligence and security services, and enjoy layers of contractual secrecy and plausible deniability. Their methods range from classic surveillance and harassment to psychological torture, targeted digital intrusions, and the weaponization of toxic substances as a form of low-level, chronic assault.
These practices do not reflect democratic principles. They do not operate within a genuine legal framework. They are, in substance, war crimes and crimes against humanity, repackaged under the rhetoric of “security,” “risk management,” or “protective services.” For nearly three decades, these actors have had an extraordinary run: shaping environments, undermining lives, and inflicting harm without facing anything resembling the accountability imposed on formal state institutions.
The question now on the table, “Why did the U.S. fail to protect?”, is not just personally devastating; it is structurally revealing. It forces into view a reality that has long been disavowed: that democratic states have outsourced elements of repression to private actors and then looked away when those actors abused their power.
Transnational Repression Without a Victim Infrastructure
One of the central problems of transnational and global repression is that there is no victim infrastructure. This is not because the harm is hypothetical or rare, but because the harm is illegible to the systems that would normally recognize, document, and respond to it.
Every waking moment I spend under coordinated harassment, unlawful surveillance, invasive monitoring of my devices, psychological torture, and chemical assaults or toxic exposures, I am forced to grapple with the same question: how do I make this harm legible? How do I translate it into categories that institutions can recognize, so that a victim infrastructure can exist at all?
Existing human rights and legal frameworks were built around discrete, recognizable abuses: detention, physical torture, trafficking, exile. What is emerging now is a networked form of repression that fuses digital warfare, private contracting, psychological operations, and environmental manipulation. It is distributed across jurisdictions and hidden behind layers of technology, subcontracting, and legal fictions. It falls between categories, and so the victims fall between systems.
The investigation in my asylum case may be one of the first institutional acknowledgments that this gap is real. But acknowledgment is only the first step. The real work lies in building a framework that recognizes these victims as victims and not as “confused,” “unstable,” or “paranoid” individuals to be dismissed and pathologized.
The Perfect Crime in Medicine and Law
Nowhere is this illegibility more obvious than in medicine. At present, there is no toxicology protocol in emergency rooms or standard general practice designed to detect low-level, chronic, multi-compound exposure in a context of stalking, coercive control, or transnational repression. Toxicology in acute care is focused on overdoses, single agents, and clear poisoning scenarios, not on slow, cumulative exposures intended to injure, destabilize, or quietly eliminate a person over time.
When patients or victims present and try to explain that they are being subjected to coordinated harassment, unlawful surveillance, and toxic exposure, they are frequently met not with forensic curiosity but with a mental health smear. The narrative is quickly reframed as paranoia, delusion, or severe anxiety, rather than a potential crime involving sophisticated methods of control. This reflex pathologization effectively shuts down inquiry. It protects perpetrators. It breaks the chain of documentation at the very first point of contact.
The same invisibility exists in law enforcement. Police, in most jurisdictions, simply do not have routine detection tools or protocols for investigating low-dose toxic exposure in a harassment context. Victims themselves have no accessible tools for environmental sampling that would be recognized as evidentiary. Without measurable evidence and without officers trained to interpret patterns of harassment, surveillance, and health complaints as a single continuum, the case never becomes a “case” at all. It becomes a personal problem.
Legally, this creates the perfect crime. Without a credible police report or recognized medical findings, it is almost impossible to seek a remedy. Each facet of the abuse is forced into a separate silo. Stalking, bullying, and coordinated harassment might be pursued under one legal track. Toxic exposure, if ever acknowledged, might require a toxic tort route, with all the cost and complexity that entails. Psychological torture, economic interference, social isolation, and digital intrusion might each be treated as separate problems or not treated at all. The totality of the harm, the “invisible prison” and coercive control that defines the victim’s daily reality, never appears in any one file.
Why International Law Terms Are Being Used Here
A predictable objection to this kind of testimony is semantic: “Why invoke the Geneva Conventions, torture frameworks, or UN classifications in a domestic context?” The answer is simple. These terms are being used as a diagnostic vocabulary for methods and severity, not as a claim that a tribunal has already adjudicated specific charges. When a harm is structurally illegible inside ordinary systems, victims are forced to borrow the only mature frameworks that were built to describe systematic, organized abuse.
Domestic penal codes and civil remedies can often name fragments of what is happening. Stalking. Harassment. Unlawful surveillance. Computer intrusion. Assault. Poisoning. Coercive control. But the defining feature of networked repression is that it is not one discrete event with one clear perpetrator, one jurisdiction, and one clean evidence chain. It is a coordinated pattern distributed across time, technology, space, and intermediaries. When institutions treat each incident as separate, the integrated reality disappears. That fragmentation is not neutral. It is the mechanism that produces impunity.
International human rights and humanitarian law frameworks exist precisely to name patterns that domestic systems routinely fail to see, especially when proxy actors, subcontracting, secrecy, and cross border operations are involved. UN terminology and related standards provide language for prohibited conduct such as torture and cruel, inhuman, or degrading treatment, arbitrary interference with privacy, persecution, intimidation, and other forms of systematic coercion. These terms help identify what the methods are doing to a human body, mind, and life over time, even when the delivery mechanism is modern: spyware, coordinated harassment, psychological operations, and suspected low dose toxic exposure.
So the point is not to force every fact into a courtroom ready label. The point is to make the harm legible. International law provides a shared classification system when domestic categories are too narrow, too siloed, or too easily neutralized through dismissal and pathologization. If we cannot name the pattern, we cannot investigate it. If we cannot investigate it, we cannot document it. If we cannot document it, there can be no victim infrastructure, and the failures of protection will repeat.
How Attribution Works When the Crime Is Designed to Be “Unprovable”
A second objection often follows the first: “If this is real, why is it so hard to prove who is doing it?” That question is part of the design. Networked repression is built to defeat ordinary attribution. It fragments methods across time and space, uses intermediaries and subcontractors, and relies on the fact that institutions investigate incidents one at a time rather than patterns.
Attribution in this context does not usually come from a single smoking gun. It comes from convergence: multiple independent streams of evidence that, when aligned, narrow the set of plausible actors and reveal coordination. That convergence can include digital forensics (signs of persistent device compromise, account access anomalies, or intrusion patterns), environmental and medical documentation (symptom chronology aligned with exposure windows, chain-of-custody sampling when possible), witness corroboration (third-party observations of interference or harassment), and administrative records (reports made, responses received, unexplained closures, and patterns of dismissal that suggest institutional routing rather than neutral error).
This is also why the question “Why did the U.S. fail to protect?” matters. Protection fails when no one is tasked with integrating these streams. If agencies and frontline institutions treat each strand as separate, the pattern never becomes legible enough to investigate, and attribution never becomes possible. A credible investigative approach must be pattern based, cross domain, and designed to preserve evidence early rather than pathologize the person reporting harm.
When the crime is engineered to look like a series of unrelated problems, the investigative task is to rebuild it as one coordinated continuum and then follow the points of access, capability, and coordination that continuum reveals.
The Need for Guardrails and a Coordinated Plan
Private military and security contractors, and the broader ecosystem of actors around them, have had a 20 to 30 year run of operating in these gaps: between war and peace, between public and private, between medicine and law, between criminal and civil frameworks. It is time to put guardrails in place and stop normalizing this architecture of impunity.
To move from an individual case to a meaningful response, we need a coordinated plan that addresses the harm across sectors rather than fragmenting it. At minimum, that plan should include:
1. Medical toxicology protocols for low-level, coercive exposure
Frontline medical settings, especially emergency rooms and urgent care, need protocols for screening and documenting possible low level, chronic toxic exposures in contexts where there is also evidence of harassment, stalking, or coercive control. This means updated training, new diagnostic pathways, and accessible environmental sampling, so that victims are not reflexively reclassified as psychiatric cases.
2. Law enforcement tools and pattern based investigation
Police and investigative bodies must develop and deploy tools to detect and document environmental toxins and digital intrusions, and to analyze harassment, surveillance, and health complaints as a combined pattern, not isolated incidents. This requires not only technical capacity, but legal frameworks that recognize this pattern as a distinct, prosecutable form of organized abuse.
3. Integrated legal frameworks and victim status recognition
Legal systems need mechanisms to treat these harms as a single continuum of repression rather than forcing victims into separate, disconnected proceedings: one for stalking, one for toxic exposure, one for financial interference, another for psychological torture. This may mean new statutory categories, specialized courts or tribunals, and the formal recognition of victims of transnational repression and coercive control as a protected class entitled to specific remedies and protections.
4. Accountability and regulation of private military and security contractors
Finally, there must be clear, enforceable regulation and oversight of private military and security contractors, including transparency obligations, human rights due diligence, and meaningful sanctions when they engage in surveillance, toxic exposure, psychological torture, or other abuses. Their era of operating in legal shadows, with states benefiting from their services while disowning their methods, has to end.
The investigation opened in my asylum case is only one case, one file, one life. But it also represents something larger: the possibility that institutions can finally be compelled to ask the right questions about why they failed to protect, and what kinds of harms they have systematically refused to see. If we can make this harm legible, we can begin the work of building the victim infrastructure that the twenty-first century actually requires.
This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit drtamaradixon.substack.com