dr. robert duncan -- soul catcher 2 (toc -table of content)
TRANSCRIPT
-
7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)
1/15
VCLUMIE TWOSecr et s of Cyber and Cyber net i c War f ar e Reveal ed
ROBERT DUNCANand The Mi nd Hacki ng St r a t egy Gr oup
-
7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)
2/15
Volume 2 details the CIAs practices of interrogation and cybernetic mind control in
their pursuit to weaponize neuropsychology. It covers the art of bio-communication war.
Human beings are complex machines but their inner workings have been deciphered.
Mind control and brainwashing have been perfected in the last 60 years. Hacking
computers and hacking into individual minds are similar. The 21st Century will be known
as the age of spiritual machines and soulless men.
PROJECT: SOUL CATCHIER
VCI.UMIE TWO
A s p y g l a s s i n t o t h e f u t u r e , t h e p a s t , a n d t h e d a r k p r e s e n t . - Former CIA spy and Harvard graduate
Th i s b o o k c h a s e s t h e w h i t e r ab b i t al l t h e w a y t o hel l . W h a t a m a z e ! "- Former psychic spy
Th i s is t h e h o l y g r a i l o f w e a p o n r y t h a t t h e n a t i o n a l s e c u r i t y c a b al s h a ve b ee n h i d i n g .
- Ted Gunderson,former head of the Los Angeles FBI
F o r t ho s e w h o a r e r e l i g i o u s , t h e y w i l l f i n d v a l i d a t i o n t h a t j u d g e m e n t d a y i s u p o n u s. M y g o d , w h a t h a v e w e d o n e ?
- Christian Pastor
F i n a l l y en o u g h b r a v e i n s i d e r s a r e t e l l i n g u s w h a t t h e h el l is g o i n g o n a n d w h a t is p l a n n e d .
M KU LTRA project
Th e n e x t g e n e r a t i o n n e e d s t o a n s w e r s o m e d i f f i c u l t q u e s t i o n s o n w h a t t he h u m a n r a c e a n d t h ei r c o u n t r y s h o u l d b e c o m e .
- A current politician
A n i m p r e s s i v e i n t eg r a t i o n o f c y b e r n e t i c a n d p s y c h o l o g i c a l w a r f a r e . - Former Colonel in the Air Force
The Mind Hacking Strategy Group is a consortium of
conscientious scientists who report the abuses of science.
ROBERT DUNCAN holds multiple degrees from Harvard University
and Dartmouth College in Applied Sciences and Business. He has
worked on projects for the Department of Defense, CIA and Justice
Department in his career
HIGH ORDER THINKERS PUBLISHING 2010
-
7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)
3/15
Project: Soul Catcher
Secrets of Cyber and Cybernetic W arfare Revealed Vol. 2
n Introduction to Cvhernefiv Warfare Theory, Teehmlt&gies. a
Practice Vol f
By Robert Duncan, B.A., M.S., M.B.A., Ph.D.
andThe Mind Hacking Strategy Group
A w atcher over the h um an race,a recorder of m an s deeds,
an d keeper of his conscience.
Diagrams and artwork done by Chet Slater - ChelS1aterDesian(w.amai 1.com
Higher Order Thinkers Publishing
-
7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)
4/15
C op yright 2010 H igher O rder Thinkers Publishing
Boise, Idaho
HigherOrderThinkers@gmai l .com
I SBN is 1452804087EAN- 13is 9781452804088
mailto:[email protected]:[email protected] -
7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)
5/15
A c k n o w l e d g e m e n t s
Sisyphus, in Greek lore, was punished because he revealed the designs of
the Gods to mortals. Hermes was the Greek gods messenger and Apollo was thegod o f truth. In Ch ristian, Islam, and Jew ish bibles, the Archan gel Gabriel is the
messenger of God.
This book is dedicated to all the people who stood by me during the
difficult times while researching and writing it. It was a time where true friends
showed their character. Without the love and support of my perfect mother and
father, it would not have been written and the story told after the abuse and
physical torture that I had to endure. But there was a light at the end of the
tunnel; the shadow agencies showed me everything that they were working on
and said if I could survive, I could write about anything that they told me and
showed me. I carried the weight of the world in silence on my shoulders like
Atlas. Fin ally I shrugged to divulge the truth despite th reats to kil l my fa m ily or
torture me again from my government handlers.
Addit ionally, many th anks to the non-consensu al human govern m en t
experiments that allowed me to interview them, the whistleblowers who bravely
have come forward, and other individuals who gave their lives fighting hard for
truth and justice about these topics, especially Darin Smith, a Coast Guard rescue
swimmer who killed himself after being tortured for a year by the systemsdescribed in this book, and three former FBI agents who were attempted to be
assassinated but have come forward with valuable information despite the
intimidation practices of unnamed go vernm ent agencies.
So much blood, sweat, and any tears were put into this book. Special
recognition goes to Jen nife r Nolden , a constant shining beacon o f hope and
purity, the muse of serendipity who came into my life just when she was needed.
She reminded me what is worth saving in this world. Without her belief in me, I
would have been enveloped by the darkness fore ver.
I have walked through the valley o f the shadow o f death.
- 23rd Psalm
I am Lazarus. Com e from the dead. Co m e back to tell you all. I shall tell you
all.
- T.S. Elliott
V ivat V erita s - Let Truth Prevail
-
7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)
6/15
Prerequisites for understanding this text:
Basic college level computer science, advanced graduate levelartificial intelligence, linguistics, advanced college level physics,
psychology, evolutionary biology, neuroscience, and offensive
information warfare strategies or some devious street smarts
The 21st century will be known as the age of spiritual machines
and soulless men.
-
7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)
7/15
Contents
PREFACE I
IN TRO D UCTIO N........................................................................................................................... II
CHAP TER 1 HACKING COM PUTER AND BIOLOGICAL SYSTE M S ................................1
H ist o r yo f M in d Ha c k in g .......................................................................................................2
M in d Ha c k in g - T h e En e m y W it h in ........................................................................................3
Co g n it iv ea n d Per c ept io n W a r f a r e ......................................................................................5
Co g n it iv e Mo d el in g a n d Rever se En g ineer ing t h e Br a in ................................................. 7
Ga i n i n g Ac c es s ...................................................................................................................... 14
Mind Viruses.......................................................................................................14Trojan Horses......................................................................................................18
Weapons Grade Hypnosis
Worms, Memetic Viruses, and Psychotronic Viruses......................................19
Zombification and Remote Control Attacks......................................................20
Scalable Enslavement and Zombification Strategies
Spiders
Bots
Intelligent Agents
Brute Force Hacking - Master/Slave Roles...................................................... 24Queuing Executables - Subliminal and Hypnosis.............................................. 25
Logic and Memory Buffer Overflow..................................................................26
Genetic Algorithms and Directed Evolution ..................................................... 27
Human Experimentation, Brain-napping, Medical Manchurians, and Food for
Thought
Spo o f in g .................................................................................................................................32
Social Engineering, Identity Theft, and Doppelgngers...................................33
Authority, Privilege, Access, and Role Level Hacking.......................................35
No ise Gen er at o r s , Ja m m e r s , a n d Sc r a m bl er s ..................................................................35Phr eak in g a n d Mo bil e Ph o n e C l o n in g ...............................................................................39
Ph i s h i n g a n d Br ain Sc a n n i n g - Fi n d i n g Ho s t s .................................................................39
Co -P r o c ess o r Us u r pa t io n .................................................................................................. 40
In s er t i n g Secr et Ho o k s in Device Dr iv er s .........................................................................40
Mal ic io u s Pa yl o a d s ..............................................................................................................40
Replacing Personalities and Memories.............................................................41
Pr o t ect ed Mem o r y, Pa r t it io n in g , a n d Co g n it iv e Co n t a in m en t ..................................42
Infinite Looping.................................................................................................. 43
Demons...............................................................................................................44Crashing the Operating System through Error Amplification.........................44
Denial of Service Attacks....................................................................................45
T r ig g er s a n d T r ig g er ed Pa yl o a d s ......................................................................................49
Personality Overlays and Simulation.................................................................49
Psycho-Bombs.....................................................................................................51
Programmed Assassins and Other CIA Human Assets..................................... 54
Terrorists.............................................................................................................56
-
7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)
8/15
Proxy Agent Provocateurs..................................................................................57
Handles, Handlers, and Proxies.........................................................................57
Pl easu r e/Pa in pr in c ipl e s ..................................................................................................... 57
Ha c k i n g t h e Va r ia bl es o f Bel ief Sys t em s .......................................................................... 61
Ghosting the Sensor Systems.............................................................................61
Cloaking and Stealth Technologies....................................................................62
Cognitive Behavioral Mapping..........................................................................64Faulty Logic......................................................................................................... 68
Dictionary Attack................................................................................................71
Purging and Altering Memory...........................................................................71
Thought Stream Filtering and Suppression.......................................................73
Hacking Decision Trees.......................................................................................76
Psychographic Mapping....................................................................................76
Game Theory...................................................................................................... 77
Context Switching...............................................................................................79
Su bs t it ut io n o f Oper a t in g Sys t em Fil es a n d Ro o t Ki t s ..................................................80
Ha c k i n g In p u t Out pu t Po r t s - T h e 5 Sensesa n d Mo t o r Co r t ex ..................................81
Spyw a r e...................................................................................................................................89
St ea l in g Pa ss w o r d s ..............................................................................................................91
Key Stroke Loggers.............................................................................................92
Soul Catchers and Recording the Entire Life of Every Human..........................93
Memory Probing.................................................................................................95
Bi-directional Associative Memory (BAM) Probing......................................... 95
Sel f
Dest r uc t
Al g o r it h m s
................................................................................................... 96Suicide bombers / Psycho-bombs/ Staged Indirections.................................. 97
Suicide Through Torture and Depression Signals.............................................99
Amplification of Destructive Behaviors and Addiction Pathways..................100
Shutting Down and Stressing the Subsystems................................................100
Heart Failure, Blood Clots, and Strokes..........................................................101
Moscow's Remote-Controlled Heart Attacks
Secondary and Tertiary Diseases Caused by Prolonged Stress
Spooking to Death............................................................................................107
Disrupting Human Networks...........................................................................I l lRacial Hatred Experiments By the CIA
Co un t er Espio n a g ea n d Co un t er Mea su r es .................................................................. 117
Trip Wires and Detection Algorithms.............................................................117
Van Eck Hacking and TEMPEST Standards.....................................................118
Network Analyzers and Packet Sniffers..........................................................120
Echelon for the Mind........................................................................................120
Anti-Virus Software..........................................................................................121
Firewalls............................................................................................................122
Thought Stream Filtering.................................................................................125Trace Route and Multi Levels of Indirection...................................................127
Baiting Hackers.................................................................................................127
Ha c k i n g t h e Ha c k er s .......................................................................................................... 128
Scarecrow Effect and Decoys...........................................................................128
Usurping the Eye Tracking Virtual Interface Controls and Audio Commandsl30
-
7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)
9/15
CHA PTER 2 RESISTANCE IS FUTILE - COUNTER RESISTANCE TEC HN IQU ES ...... 133
A l ic ein W o n d er l a n d Sc r ip t ..............................................................................................135
W izar d o f Oz Sc r ipt ............................................................................................................136
A n g el s a n d Demo n s Sc r ip t ................................................................................................137
Watchers (fallen angels), Illegal Surveillance and Manipulation..................141S l eepin g Beau t y Sc r ipt - S l eeper Ag ent s a n d Dispo sa bl e CIA Ass et s ..........................146
Sn o w W h i tea n d t h e Seven Dw a r f s Sc r ipt ..................................................................... 148
Ot her Sc r ipt s ...................................................................................................................... 148
The A, B, C's o f En h a n c e d In t er r o g a t io n a n d To r t u r e................................................ 150
Exper iment a l In t er r o g a t io n a n d Behav io r Mo dif ica t io n T ec h n iq u es ...................... 150
No -To u c h To r t u r e .............................................................................................................165
False Confessions fo r Staged Courts and Media Even ts..............................174
Brainwashing................................................................................................... 175
Neural Linguistic Programming and Psychic Driving ...................................177Pl au sibl e Den iabil it y a n d t h e Wa r o n T r u t h ..................................................................178
Lack of "Physical" Proof...................................................................................179
GasLighting......................................................................................................182
Framing............................................................................................................182
Dirty Tricks and Tricky Dicks.............................................................................183
The Art o f War and the Art of Deception........................................................194
Tricks, Illusions, and the Psychology of Magic.............................................194Operation Northwoods
Truth, the Only Weapon...................................................................................202
CHAPTER 3 DESIGNING DEMI-GODS: ACTIVE NSA, CIA, DOD SY ST EM S ..........203
Global Communication Warfare - C od e N am e G a b r i e l ................................203
Voice of God Weapons.....................................................................................204
B io m et r ic R ec o g n it io n A n d I d en t if ic a t io n N e t w o r k - B .R .A . I . N ........206
Defeating Biometrics........................................................................................207
R a d io H y p n o t i c In t r a -c e r e b r a l C o n t r o l / E l e c t r o n i c D is s o l u t io n o f
Mem o r y R . H . I . C . - E .D .O .M .......................................................................... 209M e n t a l ly In t e g r a t e d N e u ro n D u p l ic a t o r M.i .N.D ............................213
Ch a t t er Bo x es .....................................................................................................................214
Artificial Linguistic Internet Computer Entity A .L .I.C .E ......................................215
The Ghost in the Machine and Demons of Destruction
Thought And Memory Interface - T.A.M.I...............................................223
C o m m o n H u m a n R o u t in es In f e r e n c e S o f t w a r e T e c h n o l o g y -
C . H . R . I . S . T ....................................................................................................................224
S i l en t A s s a s s in a t i o n T h r o u g h A d a p t in g N e t w o r k s - S .A . T . A .N . 225Death Doctors, Angels of Death, Psychic Assassins.......................................226
Voodoo Doll: No-touch torture........................................................................ 229
Dawn of the Damned.......................................................................................229
Min d Ga m e s , Ps yc h ic War fa r e T r a in in g , Ps y c h o -T er r o r is m ..................................... 248
Oper a t io n : "N o a h 's A r k " - Do w n siz in g t h e Hu m a n Ra c e........................................... 280
-
7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)
10/15
CHAPTER 4 THE POLITICS, LAWS, AND ETHICS OF NEUROLOGICAL WEAPONS285
Leg a l Is s u e s ......................................................................................................................... 290
Th e Co st s a n d Ben ef it s .......................................................................................................301
APPENDIX OF FORMULAS, CALCULATIONS, AND SUGGESTED ANSWERS TO
DISCUSSION QUESTIONS........................................................................................304
WAR MATRIX 304
OTHER METHODS OF SPYING AND SABOTAGE.................................................... 304
SAMPLE FINAL TEST FOR INSTRU CTOR................................................................. 305
INDEX A
-
7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)
11/15
P r e f a c e
From the previous book in this series, we investigated the variousadvanced sensor technologies which can read body electrical andchemical changes, modes of neuron influences, and the informationtheories of engineering intelligence. We postulated many applications forsuch technologies in current uses and future uses.
In this volume, our investigation continues into the detailedmethods used to interrogate, control, and destroy minds using traditionaland modem practices.
While the background from the first volume is beneficial to havein understanding and believing this volume, it is not necessary. The bookscan be read in any order and the concepts and knowledge gleaned.
While this book tries to remain non-political and as neutral aspossible, it should be obvious to the reader what moral, ethical, and legal
issues arise from the use of such methods and technologies. We, as acountry, should remember that we should not forfeit our values andcharacter as a moral leader to justify short term advantages in intelligencegathering. If the great United States sets an example of not abiding bytreaties and international law, no other countries will. The long term soft
power of the United States will be mitigated forever.
This book tries to find the balance of the harsh, unbridled truth
with its interviews and sensitivity to readers who may get nightmaresfrom them. Anyone who buys this book to read generally is not afraid oftruth and values truth no matter what predetermined emotionalassociations they have.
-
7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)
12/15
I n t roduct ion
There have been several cataclysmic knowledge events in humanhistory that have changed the world view of the collective understanding:fire for cavemen, Earth is ellipsoidal, stars are suns, and DNA is thegenetic biological program for examples. Now we enter the boundary inhuman understanding of where the mind and neuroscience intersect, thesubjective and objective perceptions of realities overlap.
This field of study is often called psychophysics,neuropsychology, or cybernetics. "Cybernetics" comes from a Greekword meaning "the art of steering". Cybernetics is about having a goaland taking action to achieve that goal. Knowing whether you havereached your goal (or at least are getting closer to it) requires "feedback",a concept that comes from cybernetics. From the Greek, "cybernetics"evolved into Latin as "governor".
Cybernetics as a process operating in nature has been around for a
long time. Cybernetics as a concept in society has been around at leastsince Plato used it to refer to government. In modern times, the term
became widespread because Norbert Wiener wrote a book called"Cybernetics" in 1948, a year after the formation o f the CIA. His sub-titlewas "control and communication in the animal and machine". This wasimportant because it connects control (a.k.a., actions taken in hope ofachieving goals) with communication (a.k.a., connection and information
flow between the actor and the environment). So, Wiener is pointing outthat effective action requires communication.
Wiener's sub-title also states that both animals (biologicalsystems) and machines (non-biological or "artificial" systems) canoperate according to cybernetic principles. This was an explicitrecognition that both living and non-living systems can have purpose. Ascary idea in 1948.'
Brave New world
1"Getting Started" Guide to Cybernetics, Pangaro,
http: / /www.pangaro.com/published/cyber-macmillan.html
http://www.pangaro.com/published/cyber-macmillan.htmlhttp://www.pangaro.com/published/cyber-macmillan.html -
7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)
13/15
I h t r o d u c t i o n P a g e | iii
By Nathan CochraneJuly 23 2002
Next
A draft government report says we will alter human evolutionwithin 20 years by combining what we know of nanotechnology,
biotechnology, IT and cognitive sciences. The 405-page report sponsoredby the US National Science Foundation and Commerce Department,Converging Technologies for Improving Human Performance, calls for a
broad-based research program to improve human performance leading totelepathy, machine-to-human communication, amplified personal sensorydevices and enhanced intellectual capacity.
People may download their consciousnesses into computers orother bodies even on the other side of the solar system, or participate in agiant "hive mind", a network of intelligences connected through ultra-fastcommunications networks. "With knowledge no longer encapsulated inindividuals, the distinction between individuals and the entirety ofhumanity would blur," the report says. "Think Vulcan mind-meld. Wewould perhaps become more of a hive mind - an enormous, single,intelligent entity."
Armies may one day be fielded by machines that think forthemselves while devices will respond to soldiers' commands before theirthoughts are fully formed, it says. The report says the abilities are withinour grasp but will require an intense public-relations effort to "prepare
key organisations and societal activities for the changes made possible byconverging technologies", and to counter concern over "ethical, legal andmoral" issues. Education should be overhauled down to the primary-school level to bridge curriculum gaps between disparate subject areas.
Professional societies should be open to practitioners from otherfields, it says. "The success of this convergent-technologies priority areais crucial to the future of humanity," the report says.
wtec.org/ConvereingTechnologies/Report/NBIC-pre-publication.pdf
The brain has always been a battlefield. New weapons might beable to hack directly into your nervous system.
"Controlled Effects" is one of the Air Forces ambitious long-termchallenges. It starts with better and more accurate bombs, but moves on
-
7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)
14/15
to discuss devices that "make selected adversaries think or act accordingto our needs... By studying and modeling the human brain and nervous
system, the ability to mentally influence or confuse personnel is alsopossible."
The American military may want to attack the nervous system,with pain rays and laser plasma pulses. But they're not the only ones. TheRussians have long studied such systems, too - including one weaponthat could, in theory, remotely trigger heart attacks.
In 2003, at the 2nd European Symposium on Non-Lethal
Weapons, Anatoly Korolev and his colleagues from Moscow State Universitypresented a paper with the snappy title "Bioelectrodynamic Criterion ofthe NLW Effectiveness Estimation and the Interaction mechanisms of themultilayer Skin Tissues with electromagnetic Radiation." This is a studyof how radio-frequency weapons like the American Active DenialSystem affect the skin. After wading through a mass of technical datashowing how complex the interactions are we reach the punch line:
The sensations modality (pricking, touch, pressure, gooseflesh,
burning, pain etc) depends on the field parameters and individualconcrete human being factors. As a matter o ffact, we can really choose
the non-lethal bioeffect.
The effects include sensations similar to those discussedpreviously, and more besides. The paper discusses effects on cellmembranes and affecting the bodys normal function, including "informationtransfer to the organs of control."
At the same conference, V Makukhin of the Trymas EngineeringCenter in Moscow described "Electronic equipment for complexinfluence on biological objects." And when he says "biological objects,"
he means you and me.
His laboratory apparatus uses a modulated beam o fradio waves toproduce what he terms "disorder of autonomic nervous system," putforward as a possible non-lethal weapon. Makhunin notes that there is no
general agreement on how EM waves disrupt nerves - he mentions ionchannels similar to those in the plasma paper - but he certainly seems to beseeing the same effects as American researchers.
But it need not be a non-lethal weapon. Makukhin also mentionsthe effects of "change of electrocardiogram" and what he calls "function
i v | P a g c P r o i e c l : S o ul ( a 1 c h e r v o I . 2
-
7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)
15/15
I n t r o d n c t i o n
break ofheart muscle."
The vulnerability of the heart to electrical stimulation (includingthat produced by EM waves) is well documented. A lethal device wouldinterfere with the electrical potentials that keep the chambers of the heartsynchronized, producing fibrillation and rapid death. A death ray doesntneed to be a truck-sized laser that reduces the target to smoking heap; asmall device that stops the heart will do the job.
Little has been openly published in this area in the public domain,but this may be the tip of the iceberg. We are likely to be hearing more infuture - especially if the Russians manage to find funding.
I dont think we need tinfoil hats just yet. But a layer ofconducting mesh built into body armor might save a lot of heartache inyears to come.
David Hambling, Weapons Grade, Carroll & Graf, 2005.