dr. robert duncan -- soul catcher 2 (toc -table of content)

Download Dr. Robert Duncan --  Soul Catcher 2 (TOC -Table of Content)

If you can't read please download the document

Upload: cruchot777

Post on 12-Apr-2018

471 views

Category:

Documents


22 download

TRANSCRIPT

  • 7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)

    1/15

    VCLUMIE TWOSecr et s of Cyber and Cyber net i c War f ar e Reveal ed

    ROBERT DUNCANand The Mi nd Hacki ng St r a t egy Gr oup

  • 7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)

    2/15

    Volume 2 details the CIAs practices of interrogation and cybernetic mind control in

    their pursuit to weaponize neuropsychology. It covers the art of bio-communication war.

    Human beings are complex machines but their inner workings have been deciphered.

    Mind control and brainwashing have been perfected in the last 60 years. Hacking

    computers and hacking into individual minds are similar. The 21st Century will be known

    as the age of spiritual machines and soulless men.

    PROJECT: SOUL CATCHIER

    VCI.UMIE TWO

    A s p y g l a s s i n t o t h e f u t u r e , t h e p a s t , a n d t h e d a r k p r e s e n t . - Former CIA spy and Harvard graduate

    Th i s b o o k c h a s e s t h e w h i t e r ab b i t al l t h e w a y t o hel l . W h a t a m a z e ! "- Former psychic spy

    Th i s is t h e h o l y g r a i l o f w e a p o n r y t h a t t h e n a t i o n a l s e c u r i t y c a b al s h a ve b ee n h i d i n g .

    - Ted Gunderson,former head of the Los Angeles FBI

    F o r t ho s e w h o a r e r e l i g i o u s , t h e y w i l l f i n d v a l i d a t i o n t h a t j u d g e m e n t d a y i s u p o n u s. M y g o d , w h a t h a v e w e d o n e ?

    - Christian Pastor

    F i n a l l y en o u g h b r a v e i n s i d e r s a r e t e l l i n g u s w h a t t h e h el l is g o i n g o n a n d w h a t is p l a n n e d .

    M KU LTRA project

    Th e n e x t g e n e r a t i o n n e e d s t o a n s w e r s o m e d i f f i c u l t q u e s t i o n s o n w h a t t he h u m a n r a c e a n d t h ei r c o u n t r y s h o u l d b e c o m e .

    - A current politician

    A n i m p r e s s i v e i n t eg r a t i o n o f c y b e r n e t i c a n d p s y c h o l o g i c a l w a r f a r e . - Former Colonel in the Air Force

    The Mind Hacking Strategy Group is a consortium of

    conscientious scientists who report the abuses of science.

    ROBERT DUNCAN holds multiple degrees from Harvard University

    and Dartmouth College in Applied Sciences and Business. He has

    worked on projects for the Department of Defense, CIA and Justice

    Department in his career

    HIGH ORDER THINKERS PUBLISHING 2010

  • 7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)

    3/15

    Project: Soul Catcher

    Secrets of Cyber and Cybernetic W arfare Revealed Vol. 2

    n Introduction to Cvhernefiv Warfare Theory, Teehmlt&gies. a

    Practice Vol f

    By Robert Duncan, B.A., M.S., M.B.A., Ph.D.

    andThe Mind Hacking Strategy Group

    A w atcher over the h um an race,a recorder of m an s deeds,

    an d keeper of his conscience.

    Diagrams and artwork done by Chet Slater - ChelS1aterDesian(w.amai 1.com

    Higher Order Thinkers Publishing

  • 7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)

    4/15

    C op yright 2010 H igher O rder Thinkers Publishing

    Boise, Idaho

    HigherOrderThinkers@gmai l .com

    I SBN is 1452804087EAN- 13is 9781452804088

    mailto:[email protected]:[email protected]
  • 7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)

    5/15

    A c k n o w l e d g e m e n t s

    Sisyphus, in Greek lore, was punished because he revealed the designs of

    the Gods to mortals. Hermes was the Greek gods messenger and Apollo was thegod o f truth. In Ch ristian, Islam, and Jew ish bibles, the Archan gel Gabriel is the

    messenger of God.

    This book is dedicated to all the people who stood by me during the

    difficult times while researching and writing it. It was a time where true friends

    showed their character. Without the love and support of my perfect mother and

    father, it would not have been written and the story told after the abuse and

    physical torture that I had to endure. But there was a light at the end of the

    tunnel; the shadow agencies showed me everything that they were working on

    and said if I could survive, I could write about anything that they told me and

    showed me. I carried the weight of the world in silence on my shoulders like

    Atlas. Fin ally I shrugged to divulge the truth despite th reats to kil l my fa m ily or

    torture me again from my government handlers.

    Addit ionally, many th anks to the non-consensu al human govern m en t

    experiments that allowed me to interview them, the whistleblowers who bravely

    have come forward, and other individuals who gave their lives fighting hard for

    truth and justice about these topics, especially Darin Smith, a Coast Guard rescue

    swimmer who killed himself after being tortured for a year by the systemsdescribed in this book, and three former FBI agents who were attempted to be

    assassinated but have come forward with valuable information despite the

    intimidation practices of unnamed go vernm ent agencies.

    So much blood, sweat, and any tears were put into this book. Special

    recognition goes to Jen nife r Nolden , a constant shining beacon o f hope and

    purity, the muse of serendipity who came into my life just when she was needed.

    She reminded me what is worth saving in this world. Without her belief in me, I

    would have been enveloped by the darkness fore ver.

    I have walked through the valley o f the shadow o f death.

    - 23rd Psalm

    I am Lazarus. Com e from the dead. Co m e back to tell you all. I shall tell you

    all.

    - T.S. Elliott

    V ivat V erita s - Let Truth Prevail

  • 7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)

    6/15

    Prerequisites for understanding this text:

    Basic college level computer science, advanced graduate levelartificial intelligence, linguistics, advanced college level physics,

    psychology, evolutionary biology, neuroscience, and offensive

    information warfare strategies or some devious street smarts

    The 21st century will be known as the age of spiritual machines

    and soulless men.

  • 7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)

    7/15

    Contents

    PREFACE I

    IN TRO D UCTIO N........................................................................................................................... II

    CHAP TER 1 HACKING COM PUTER AND BIOLOGICAL SYSTE M S ................................1

    H ist o r yo f M in d Ha c k in g .......................................................................................................2

    M in d Ha c k in g - T h e En e m y W it h in ........................................................................................3

    Co g n it iv ea n d Per c ept io n W a r f a r e ......................................................................................5

    Co g n it iv e Mo d el in g a n d Rever se En g ineer ing t h e Br a in ................................................. 7

    Ga i n i n g Ac c es s ...................................................................................................................... 14

    Mind Viruses.......................................................................................................14Trojan Horses......................................................................................................18

    Weapons Grade Hypnosis

    Worms, Memetic Viruses, and Psychotronic Viruses......................................19

    Zombification and Remote Control Attacks......................................................20

    Scalable Enslavement and Zombification Strategies

    Spiders

    Bots

    Intelligent Agents

    Brute Force Hacking - Master/Slave Roles...................................................... 24Queuing Executables - Subliminal and Hypnosis.............................................. 25

    Logic and Memory Buffer Overflow..................................................................26

    Genetic Algorithms and Directed Evolution ..................................................... 27

    Human Experimentation, Brain-napping, Medical Manchurians, and Food for

    Thought

    Spo o f in g .................................................................................................................................32

    Social Engineering, Identity Theft, and Doppelgngers...................................33

    Authority, Privilege, Access, and Role Level Hacking.......................................35

    No ise Gen er at o r s , Ja m m e r s , a n d Sc r a m bl er s ..................................................................35Phr eak in g a n d Mo bil e Ph o n e C l o n in g ...............................................................................39

    Ph i s h i n g a n d Br ain Sc a n n i n g - Fi n d i n g Ho s t s .................................................................39

    Co -P r o c ess o r Us u r pa t io n .................................................................................................. 40

    In s er t i n g Secr et Ho o k s in Device Dr iv er s .........................................................................40

    Mal ic io u s Pa yl o a d s ..............................................................................................................40

    Replacing Personalities and Memories.............................................................41

    Pr o t ect ed Mem o r y, Pa r t it io n in g , a n d Co g n it iv e Co n t a in m en t ..................................42

    Infinite Looping.................................................................................................. 43

    Demons...............................................................................................................44Crashing the Operating System through Error Amplification.........................44

    Denial of Service Attacks....................................................................................45

    T r ig g er s a n d T r ig g er ed Pa yl o a d s ......................................................................................49

    Personality Overlays and Simulation.................................................................49

    Psycho-Bombs.....................................................................................................51

    Programmed Assassins and Other CIA Human Assets..................................... 54

    Terrorists.............................................................................................................56

  • 7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)

    8/15

    Proxy Agent Provocateurs..................................................................................57

    Handles, Handlers, and Proxies.........................................................................57

    Pl easu r e/Pa in pr in c ipl e s ..................................................................................................... 57

    Ha c k i n g t h e Va r ia bl es o f Bel ief Sys t em s .......................................................................... 61

    Ghosting the Sensor Systems.............................................................................61

    Cloaking and Stealth Technologies....................................................................62

    Cognitive Behavioral Mapping..........................................................................64Faulty Logic......................................................................................................... 68

    Dictionary Attack................................................................................................71

    Purging and Altering Memory...........................................................................71

    Thought Stream Filtering and Suppression.......................................................73

    Hacking Decision Trees.......................................................................................76

    Psychographic Mapping....................................................................................76

    Game Theory...................................................................................................... 77

    Context Switching...............................................................................................79

    Su bs t it ut io n o f Oper a t in g Sys t em Fil es a n d Ro o t Ki t s ..................................................80

    Ha c k i n g In p u t Out pu t Po r t s - T h e 5 Sensesa n d Mo t o r Co r t ex ..................................81

    Spyw a r e...................................................................................................................................89

    St ea l in g Pa ss w o r d s ..............................................................................................................91

    Key Stroke Loggers.............................................................................................92

    Soul Catchers and Recording the Entire Life of Every Human..........................93

    Memory Probing.................................................................................................95

    Bi-directional Associative Memory (BAM) Probing......................................... 95

    Sel f

    Dest r uc t

    Al g o r it h m s

    ................................................................................................... 96Suicide bombers / Psycho-bombs/ Staged Indirections.................................. 97

    Suicide Through Torture and Depression Signals.............................................99

    Amplification of Destructive Behaviors and Addiction Pathways..................100

    Shutting Down and Stressing the Subsystems................................................100

    Heart Failure, Blood Clots, and Strokes..........................................................101

    Moscow's Remote-Controlled Heart Attacks

    Secondary and Tertiary Diseases Caused by Prolonged Stress

    Spooking to Death............................................................................................107

    Disrupting Human Networks...........................................................................I l lRacial Hatred Experiments By the CIA

    Co un t er Espio n a g ea n d Co un t er Mea su r es .................................................................. 117

    Trip Wires and Detection Algorithms.............................................................117

    Van Eck Hacking and TEMPEST Standards.....................................................118

    Network Analyzers and Packet Sniffers..........................................................120

    Echelon for the Mind........................................................................................120

    Anti-Virus Software..........................................................................................121

    Firewalls............................................................................................................122

    Thought Stream Filtering.................................................................................125Trace Route and Multi Levels of Indirection...................................................127

    Baiting Hackers.................................................................................................127

    Ha c k i n g t h e Ha c k er s .......................................................................................................... 128

    Scarecrow Effect and Decoys...........................................................................128

    Usurping the Eye Tracking Virtual Interface Controls and Audio Commandsl30

  • 7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)

    9/15

    CHA PTER 2 RESISTANCE IS FUTILE - COUNTER RESISTANCE TEC HN IQU ES ...... 133

    A l ic ein W o n d er l a n d Sc r ip t ..............................................................................................135

    W izar d o f Oz Sc r ipt ............................................................................................................136

    A n g el s a n d Demo n s Sc r ip t ................................................................................................137

    Watchers (fallen angels), Illegal Surveillance and Manipulation..................141S l eepin g Beau t y Sc r ipt - S l eeper Ag ent s a n d Dispo sa bl e CIA Ass et s ..........................146

    Sn o w W h i tea n d t h e Seven Dw a r f s Sc r ipt ..................................................................... 148

    Ot her Sc r ipt s ...................................................................................................................... 148

    The A, B, C's o f En h a n c e d In t er r o g a t io n a n d To r t u r e................................................ 150

    Exper iment a l In t er r o g a t io n a n d Behav io r Mo dif ica t io n T ec h n iq u es ...................... 150

    No -To u c h To r t u r e .............................................................................................................165

    False Confessions fo r Staged Courts and Media Even ts..............................174

    Brainwashing................................................................................................... 175

    Neural Linguistic Programming and Psychic Driving ...................................177Pl au sibl e Den iabil it y a n d t h e Wa r o n T r u t h ..................................................................178

    Lack of "Physical" Proof...................................................................................179

    GasLighting......................................................................................................182

    Framing............................................................................................................182

    Dirty Tricks and Tricky Dicks.............................................................................183

    The Art o f War and the Art of Deception........................................................194

    Tricks, Illusions, and the Psychology of Magic.............................................194Operation Northwoods

    Truth, the Only Weapon...................................................................................202

    CHAPTER 3 DESIGNING DEMI-GODS: ACTIVE NSA, CIA, DOD SY ST EM S ..........203

    Global Communication Warfare - C od e N am e G a b r i e l ................................203

    Voice of God Weapons.....................................................................................204

    B io m et r ic R ec o g n it io n A n d I d en t if ic a t io n N e t w o r k - B .R .A . I . N ........206

    Defeating Biometrics........................................................................................207

    R a d io H y p n o t i c In t r a -c e r e b r a l C o n t r o l / E l e c t r o n i c D is s o l u t io n o f

    Mem o r y R . H . I . C . - E .D .O .M .......................................................................... 209M e n t a l ly In t e g r a t e d N e u ro n D u p l ic a t o r M.i .N.D ............................213

    Ch a t t er Bo x es .....................................................................................................................214

    Artificial Linguistic Internet Computer Entity A .L .I.C .E ......................................215

    The Ghost in the Machine and Demons of Destruction

    Thought And Memory Interface - T.A.M.I...............................................223

    C o m m o n H u m a n R o u t in es In f e r e n c e S o f t w a r e T e c h n o l o g y -

    C . H . R . I . S . T ....................................................................................................................224

    S i l en t A s s a s s in a t i o n T h r o u g h A d a p t in g N e t w o r k s - S .A . T . A .N . 225Death Doctors, Angels of Death, Psychic Assassins.......................................226

    Voodoo Doll: No-touch torture........................................................................ 229

    Dawn of the Damned.......................................................................................229

    Min d Ga m e s , Ps yc h ic War fa r e T r a in in g , Ps y c h o -T er r o r is m ..................................... 248

    Oper a t io n : "N o a h 's A r k " - Do w n siz in g t h e Hu m a n Ra c e........................................... 280

  • 7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)

    10/15

    CHAPTER 4 THE POLITICS, LAWS, AND ETHICS OF NEUROLOGICAL WEAPONS285

    Leg a l Is s u e s ......................................................................................................................... 290

    Th e Co st s a n d Ben ef it s .......................................................................................................301

    APPENDIX OF FORMULAS, CALCULATIONS, AND SUGGESTED ANSWERS TO

    DISCUSSION QUESTIONS........................................................................................304

    WAR MATRIX 304

    OTHER METHODS OF SPYING AND SABOTAGE.................................................... 304

    SAMPLE FINAL TEST FOR INSTRU CTOR................................................................. 305

    INDEX A

  • 7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)

    11/15

    P r e f a c e

    From the previous book in this series, we investigated the variousadvanced sensor technologies which can read body electrical andchemical changes, modes of neuron influences, and the informationtheories of engineering intelligence. We postulated many applications forsuch technologies in current uses and future uses.

    In this volume, our investigation continues into the detailedmethods used to interrogate, control, and destroy minds using traditionaland modem practices.

    While the background from the first volume is beneficial to havein understanding and believing this volume, it is not necessary. The bookscan be read in any order and the concepts and knowledge gleaned.

    While this book tries to remain non-political and as neutral aspossible, it should be obvious to the reader what moral, ethical, and legal

    issues arise from the use of such methods and technologies. We, as acountry, should remember that we should not forfeit our values andcharacter as a moral leader to justify short term advantages in intelligencegathering. If the great United States sets an example of not abiding bytreaties and international law, no other countries will. The long term soft

    power of the United States will be mitigated forever.

    This book tries to find the balance of the harsh, unbridled truth

    with its interviews and sensitivity to readers who may get nightmaresfrom them. Anyone who buys this book to read generally is not afraid oftruth and values truth no matter what predetermined emotionalassociations they have.

  • 7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)

    12/15

    I n t roduct ion

    There have been several cataclysmic knowledge events in humanhistory that have changed the world view of the collective understanding:fire for cavemen, Earth is ellipsoidal, stars are suns, and DNA is thegenetic biological program for examples. Now we enter the boundary inhuman understanding of where the mind and neuroscience intersect, thesubjective and objective perceptions of realities overlap.

    This field of study is often called psychophysics,neuropsychology, or cybernetics. "Cybernetics" comes from a Greekword meaning "the art of steering". Cybernetics is about having a goaland taking action to achieve that goal. Knowing whether you havereached your goal (or at least are getting closer to it) requires "feedback",a concept that comes from cybernetics. From the Greek, "cybernetics"evolved into Latin as "governor".

    Cybernetics as a process operating in nature has been around for a

    long time. Cybernetics as a concept in society has been around at leastsince Plato used it to refer to government. In modern times, the term

    became widespread because Norbert Wiener wrote a book called"Cybernetics" in 1948, a year after the formation o f the CIA. His sub-titlewas "control and communication in the animal and machine". This wasimportant because it connects control (a.k.a., actions taken in hope ofachieving goals) with communication (a.k.a., connection and information

    flow between the actor and the environment). So, Wiener is pointing outthat effective action requires communication.

    Wiener's sub-title also states that both animals (biologicalsystems) and machines (non-biological or "artificial" systems) canoperate according to cybernetic principles. This was an explicitrecognition that both living and non-living systems can have purpose. Ascary idea in 1948.'

    Brave New world

    1"Getting Started" Guide to Cybernetics, Pangaro,

    http: / /www.pangaro.com/published/cyber-macmillan.html

    http://www.pangaro.com/published/cyber-macmillan.htmlhttp://www.pangaro.com/published/cyber-macmillan.html
  • 7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)

    13/15

    I h t r o d u c t i o n P a g e | iii

    By Nathan CochraneJuly 23 2002

    Next

    A draft government report says we will alter human evolutionwithin 20 years by combining what we know of nanotechnology,

    biotechnology, IT and cognitive sciences. The 405-page report sponsoredby the US National Science Foundation and Commerce Department,Converging Technologies for Improving Human Performance, calls for a

    broad-based research program to improve human performance leading totelepathy, machine-to-human communication, amplified personal sensorydevices and enhanced intellectual capacity.

    People may download their consciousnesses into computers orother bodies even on the other side of the solar system, or participate in agiant "hive mind", a network of intelligences connected through ultra-fastcommunications networks. "With knowledge no longer encapsulated inindividuals, the distinction between individuals and the entirety ofhumanity would blur," the report says. "Think Vulcan mind-meld. Wewould perhaps become more of a hive mind - an enormous, single,intelligent entity."

    Armies may one day be fielded by machines that think forthemselves while devices will respond to soldiers' commands before theirthoughts are fully formed, it says. The report says the abilities are withinour grasp but will require an intense public-relations effort to "prepare

    key organisations and societal activities for the changes made possible byconverging technologies", and to counter concern over "ethical, legal andmoral" issues. Education should be overhauled down to the primary-school level to bridge curriculum gaps between disparate subject areas.

    Professional societies should be open to practitioners from otherfields, it says. "The success of this convergent-technologies priority areais crucial to the future of humanity," the report says.

    wtec.org/ConvereingTechnologies/Report/NBIC-pre-publication.pdf

    The brain has always been a battlefield. New weapons might beable to hack directly into your nervous system.

    "Controlled Effects" is one of the Air Forces ambitious long-termchallenges. It starts with better and more accurate bombs, but moves on

  • 7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)

    14/15

    to discuss devices that "make selected adversaries think or act accordingto our needs... By studying and modeling the human brain and nervous

    system, the ability to mentally influence or confuse personnel is alsopossible."

    The American military may want to attack the nervous system,with pain rays and laser plasma pulses. But they're not the only ones. TheRussians have long studied such systems, too - including one weaponthat could, in theory, remotely trigger heart attacks.

    In 2003, at the 2nd European Symposium on Non-Lethal

    Weapons, Anatoly Korolev and his colleagues from Moscow State Universitypresented a paper with the snappy title "Bioelectrodynamic Criterion ofthe NLW Effectiveness Estimation and the Interaction mechanisms of themultilayer Skin Tissues with electromagnetic Radiation." This is a studyof how radio-frequency weapons like the American Active DenialSystem affect the skin. After wading through a mass of technical datashowing how complex the interactions are we reach the punch line:

    The sensations modality (pricking, touch, pressure, gooseflesh,

    burning, pain etc) depends on the field parameters and individualconcrete human being factors. As a matter o ffact, we can really choose

    the non-lethal bioeffect.

    The effects include sensations similar to those discussedpreviously, and more besides. The paper discusses effects on cellmembranes and affecting the bodys normal function, including "informationtransfer to the organs of control."

    At the same conference, V Makukhin of the Trymas EngineeringCenter in Moscow described "Electronic equipment for complexinfluence on biological objects." And when he says "biological objects,"

    he means you and me.

    His laboratory apparatus uses a modulated beam o fradio waves toproduce what he terms "disorder of autonomic nervous system," putforward as a possible non-lethal weapon. Makhunin notes that there is no

    general agreement on how EM waves disrupt nerves - he mentions ionchannels similar to those in the plasma paper - but he certainly seems to beseeing the same effects as American researchers.

    But it need not be a non-lethal weapon. Makukhin also mentionsthe effects of "change of electrocardiogram" and what he calls "function

    i v | P a g c P r o i e c l : S o ul ( a 1 c h e r v o I . 2

  • 7/21/2019 Dr. Robert Duncan -- Soul Catcher 2 (TOC -Table of Content)

    15/15

    I n t r o d n c t i o n

    break ofheart muscle."

    The vulnerability of the heart to electrical stimulation (includingthat produced by EM waves) is well documented. A lethal device wouldinterfere with the electrical potentials that keep the chambers of the heartsynchronized, producing fibrillation and rapid death. A death ray doesntneed to be a truck-sized laser that reduces the target to smoking heap; asmall device that stops the heart will do the job.

    Little has been openly published in this area in the public domain,but this may be the tip of the iceberg. We are likely to be hearing more infuture - especially if the Russians manage to find funding.

    I dont think we need tinfoil hats just yet. But a layer ofconducting mesh built into body armor might save a lot of heartache inyears to come.

    David Hambling, Weapons Grade, Carroll & Graf, 2005.