Sent: Thursday, August 13, 2009 8:14 PM
Subject: shielding
Sorry for the multiple post.
Look up the materials that the stealth bomber uses to deflect and absorb RADAR energy. Has anyone tried combinations of Teflon, cellophane, etc? High di-electric constant material should help reduce some of the effects usingpassive shielding techniques. Since the military’s system uses adaptivebeamforming technologies, passive shielding will have its limitations. It willadapt to find the maximum entry overtime. More sophisticated methods of activejamming with alterations in the magnetic flux and the expected spectralabsorption lines for the ions of interest would be far more effective.
My book is getting close to completion. Would anyone care to proof read it before it goes to the editor and publisher?
An Introduction to Information Warfare Theory, Technologies, and Practice.
Engineering Intelligence and Designing Gods
Book Contents
Preface.......................................................................................................................................... 13
Introduction by Noam Chomsky and Ray Kurzweil................................................................... 14
Chapter 1 Enemy of theState...............................................................................................14
Chapter 2 Advanced Sensors and Systems forBio-Communications................................. 15
RADAR..................................................................................................................................... 16
Doppler RADAR.................................................................................................................................................................. 17
Signal to Noise Ratio, Gain, and Sensitivity at a Distance Parameters.................................................................. 23
Full Spectrum Radar and Multiresolution Wavelets................................................................................................. 24
Adaptive filtering........................................................................................................................................................... 26
Phased Locked Loops................................................................................................................................................... 27
Phased Arrays and Multi-dynamic RADAR.............................................................................................................. 28
Heterodyning High Frequencies into Low Frequency Sidebands......................................................................... 29
Reflection, Absorption, and Scatter............................................................................................................................ 30
Passive and Active Sensing......................................................................................................................................... 30
Adaptive Beam Forming and Electronic Scanning.................................................................................................... 31
Holography and Interferometry.................................................................................................................................. 32
Electronic Warfare and Radio Frequency Interference........................................................... 34
Directed Energy Weapons........................................................................................................ 34
Communication Warfare........................................................................................................... 36
NSA Encoding and Decoding Techniques..................................................................................................................... 36
Imaging...................................................................................................................................... 40
Spectrograms........................................................................................................................................................................ 41
Magnetic Nuclear Resonance............................................................................................................................................ 41
Electron Spin Resonance.................................................................................................................................................... 41
Scintillation of Organic Molecules Using Free Radicals and Spin Probes................................................................. 41
Viewable Scintillation of Ion Density............................................................................................................................... 42
Ion and Electron Cyclotron Resonance........................................................................................................................... 42
Using Doppler to Scan Ion Current Density with Frequency Spread......................................................................... 42
Filtering, Identification of Signatures, and Tracking Algorithms............................................ 43
Chapter 3 Modes of NeuronInfluence.................................................................................44
Directed Energy........................................................................................................................ 44
Energy Wave Shaping........................................................................................................................................................ 46
Thermal Elastic Expansion.................................................................................................................................................. 47
Thermal Catalytic Reaction Speeds.................................................................................................................................. 48
Heating...................................................................................................................................... 48
Stored Waveform Inverse Fourier Transform (SWIFT).......................................................... 48
The Diode Effect....................................................................................................................... 49
Neurotransmitter Release........................................................................................................ 49
Electron Cyclotron Current Driving......................................................................................... 51
Ion Cyclotron Resonance, Ion Heating.................................................................................... 51
Magnetic Induction................................................................................................................... 52
Quasi-Static High Voltage Electric Fields................................................................................ 52
Ultrasonic energy...................................................................................................................... 53
Colloidal Vibration Potential.............................................................................................................................................. 53
Kinetic Elastic Expansion................................................................................................................................................... 53
Direct under skull electrical probes......................................................................................... 53
Genetic Engineering and TSS Chemical Division Research for the “psi” Gene.................... 53
Chapter 4 Wet and Dry NeuralNetworks............................................................................54
Information Theory................................................................................................................... 54
Data → Information → Knowledge → Wisdom → Enlightenment............................................................................. 54
Memetics and the Mating of Minds......................................................................................... 55
Super Intelligence..................................................................................................................... 55
The Global Brain Project.......................................................................................................... 55
Hive Minds and Swarm Theory of Information........................................................................ 55
Integrated Intelligent Systems................................................................................................. 55
Centralized and Distributed Intelligence................................................................................. 56
The Global Brain Project..................................................................................................................................................... 56
Cybernetic Hive Minds....................................................................................................................................................... 56
Human Networks................................................................................................................................................................. 56
Super-Intelligence................................................................................................................................................................ 57
Cognitive Entities, Networks, and Society of Minds................................................................................................ 57
Harvesting Human Minds and Other Wet Nets........................................................................................................ 58
Think Tanks (Brainstorming)........................................................................................................................................ 58
Organizational Behaviors.............................................................................................................................................. 60
Network Structures........................................................................................................................................................ 60
Hierarchies and Classism.................................................................................................................................................... 60
Structure, Importance, Relevance, and Meaning............................................................................................................ 61
Defining Human Cognition and the Sense of Self..................................................................... 61
Computational Equivalence and the Conscious Universe....................................................... 62
Chapter 5 NeuralProgramming...........................................................................................63
AutoCorrelograms.................................................................................................................... 64
Mapping.................................................................................................................................... 64
Self-organizing unsupervised learning / reinforcement learning / neurodynamic programming............................. 65
Classification and Brain Printing Identification.............................................................................................................. 65
Port Scanning.................................................................................................................................................................. 66
Brute force hacking........................................................................................................................................................ 67
Compression................................................................................................................................................................... 67
Cataloguing............................................................................................................................... 69
Personality Segmentation................................................................................................................................................... 69
Loyalty Affinities and Belief System Classification.................................................................................................. 69
Personality Simulations................................................................................................................................................. 69
Creating Cogs in the Machine...................................................................................................................................... 69
Data-mining Anomalies...................................................................................................................................................... 70
Counter Terrorism.......................................................................................................................................................... 70
Counter Intelligence....................................................................................................................................................... 70
Censorship and Information Flow Controls............................................................................................................... 70
Cognitive Configurations.......................................................................................................... 71
Virtual Neurons......................................................................................................................... 71
Transformations between Machine and Human Knowledge Storage...................................... 72
Integrating the Internet with Wet and Dry Neural Networks.................................................. 72
Adding Non-biological Sensors to Human Perception............................................................. 72
Chapter 6 Applications..........................................................................................................73
Self Directed Evolution............................................................................................................. 73
Autonomous Modification, “Free Will”, Deterministic Reprogramming, and ‘Bit Twiddling’................................ 73
Diagnostics and Monitoring...................................................................................................... 74
Efficient Communications......................................................................................................... 75
Universal Translators.......................................................................................................................................................... 75
Telepathy and Psychophony............................................................................................................................................ 75
Distributed Knowledge Management...................................................................................... 75
Self Organizing Adaptable Reconfiguration and Swarm Theory................................................................................. 75
Dream Harvesting – Utilizing Down Cycles.................................................................................................................... 76
Beaming and ‘Transporter’ Technology.......................................................................................................................... 76
Enhanced Human Performance................................................................................................ 77
Over-clocking the common fundamental Human Algorithms....................................................................................... 77
Forced Sleep and Adrenaline Boosts............................................................................................................................... 77
Memory Enhancement........................................................................................................................................................ 77
Intelligence and knowledge enhancements..................................................................................................................... 78
Extra Senses and Psi-borgs(Cybernetic biological computer entities)........................................................................ 80
Mood Management............................................................................................................................................................. 81
Enhancing Biological Sensors........................................................................................................................................... 81
Silicon Immortality............................................................................................................................................................... 81
Virtual Heaven and Hell................................................................................................................................................. 81
Crime and Punishment.............................................................................................................. 82
Automating Justice and Preventing Crimes.................................................................................................................... 82
Correctional Alternatives................................................................................................................................................... 83
“Behavioral Training”, Brainwashing, psychic driving and programming............................................................ 83
Secret Prisons................................................................................................................................................................. 83
Big Brother, Aliens, and the Voice of God................................................................................................................. 85
Cultural Engineering and Cultural Normalization.................................................................... 85
Accelerated Education........................................................................................................................................................ 87
Directed Evolution............................................................................................................................................................... 88
Productivity of Society....................................................................................................................................................... 89
Entertainment Applications...................................................................................................... 89
Ego trip.................................................................................................................................................................................. 89
Memory implants................................................................................................................................................................. 90
Virtual vacations.................................................................................................................................................................. 90
Shared interactive movie and music creation.................................................................................................................. 90
Virtual sex.............................................................................................................................................................................. 90
Electromagnetic Psychoactive Drugs and Altered Conscious States......................................................................... 91
War Gaming.......................................................................................................................................................................... 91
Sensing of desires and fulfilling them.............................................................................................................................. 92
Medical Applications................................................................................................................ 92
A New Medical Instrument that Spin Tags and Monitors Free Radicals................................................................... 92
Accelerated Healing............................................................................................................................................................ 92
Anit-Depression medication, Cure for Post Traumatic Stress Syndrome................................................................... 92
Cure for Loneliness and Broken Hearts........................................................................................................................... 92
Behavioral Modification to Quit Smoking, Lose Weight, Exercise Motivation......................................................... 93
Analgesics and Sensitization............................................................................................................................................. 93
Monitoring of seizures, heart activity.............................................................................................................................. 93
Diagnostics through Pain Sharing.................................................................................................................................... 93
Empathy Creation................................................................................................................................................................ 93
Universal Translator...................................................................................................................................................... 94
Replace Ritalin and many psychoactive pharmaceuticals............................................................................................. 95
Drug Rehabilitation............................................................................................................................................................. 95
Sobriety signal..................................................................................................................................................................... 95
Replace dying brain cells with virtual ones..................................................................................................................... 95
Cures for Blindness and Deafness.................................................................................................................................... 95
Muscular sclerosis (MS), Seizures, Bi-polar, Schizophrenia Cures............................................................................. 96
Bionics and spinal injuries................................................................................................................................................. 96
Biological Cloning and Mental Cloning........................................................................................................................... 97
Immortality............................................................................................................................................................................ 97
Military applications.................................................................................................................. 97
Spying/ESPionage/Remote Viewing................................................................................................................................. 97
Control of enemy................................................................................................................................................................. 98
Control of politics................................................................................................................................................................ 98
Control of civilians opinions.............................................................................................................................................. 99
Remote control soldiers...................................................................................................................................................... 99
Reading of vitals................................................................................................................................................................ 100
Enhanced human performance........................................................................................................................................ 100
Faster reaction times......................................................................................................................................................... 100
Psi-borg extra senses........................................................................................................................................................ 100
EEG control of robotic machines..................................................................................................................................... 101
Current Uses........................................................................................................................... 101
Silencing Dissenters and Government Whistle Blowers............................................................................................. 101
Brain print assassinations........................................................................................................................................... 101
Remote Lobotomies and Remotely Induced Schizophrenia.................................................................................. 102
Finding the outlying thinkers..................................................................................................................................... 105
Controlling Mass Media................................................................................................................................................... 105
Controlling Religions........................................................................................................................................................ 105
Acquiring Black Mail on Politicians............................................................................................................................... 105
Assassinating with plausible denial targets in the US and abroad........................................................................... 105
Controlling World Politics................................................................................................................................................ 106
Controlling Financial Markets......................................................................................................................................... 106
Collapsing Economies like the Former Soviet Union or the United States.......................................................... 106
Cheating at Gambling Games...................................................................................................................................... 106
Brain bugs - Spying, Espionage, and Sabotage............................................................................................................ 106
Human Robots and Psi-Borg Slaves............................................................................................................................... 106
Creating Alter Personalities – Dr. Jekyll and Mr. Hyde.......................................................................................... 106
Passing/failing Polygraphs and Brain Printing fMRI Truth Detectors................................................................ 107
Stress Conditioning..................................................................................................................................................... 107
Remote Interrogations – No-Touch Torture and Mind Probing................................................................................ 108
Dream Programming and Memory Probing.................................................................................................................... 109
Evolving Mind Virus Weapon Effectiveness................................................................................................................ 109
Directed Evolution............................................................................................................................................................. 110
Eugenics, Genocide, and the Silent Holocaust........................................................................................................ 110
Menticide and Silent Warfare..................................................................................................................................... 111
Intelligent Design......................................................................................................................................................... 111
Human animals and machines with souls................................................................................................................. 112
Chapter 7 Hacking Computer and BiologicalSystems..................................................... 113
History of Mind Hacking........................................................................................................ 113
Mind Hacking and The Enemy Within................................................................................... 114
Cognitive and Perception Warfare......................................................................................... 115
Cognitive Modeling and Reverse Engineering the Brain..................................................... 115
Mind Viruses........................................................................................................................... 120
Genetic Algorithms and Directed Evolution.................................................................................................................. 121
Human Experimentation, Brain Knapping, and Food for Thought....................................................................... 121
Malicious Payloads........................................................................................................................................................... 122
Replacing Personalities............................................................................................................................................... 123
Protected Memory, Partitioning, and Cognitive Containment......................................................... 123
Infinite Looping................................................................................................................................................................. 124
Demons............................................................................................................................................................................... 124
Crashing the Operating System Through Error Amplification.............................................. 124
Zombification and Remote Control Attacks........................................................................... 125
Scalable Enslavement and Zombification Strategies.................................................................................................... 126
Spiders................................................................................................................................................................................. 126
Bots...................................................................................................................................................................................... 127
Intelligent Agents.............................................................................................................................................................. 127
Brute Force Hacking – Master/Slave Roles.......................................................................... 127
Queuing Executables - Subliminal and Hypnosis................................................................... 128
Logic and Memory Buffer Overflow....................................................................................... 128
Denial of Service Attacks....................................................................................................... 129
Trojan Horses......................................................................................................................... 130
Triggers and Triggered Payloads...................................................................................................................................................... 131
Personality Overlays.................................................................................................................................................... 131
Psycho-bombs.............................................................................................................................................................. 132
Programmed Assassins............................................................................................................................................... 132
Terrorists....................................................................................................................................................................... 134
Pleasure/Pain principles.......................................................................................................... 134
Spoofing................................................................................................................................... 136
Social Engineering, Identity Theft, and Doppelgangers............................................................................................. 137
Authority, Privilege, Access, and Role Level Hacking................................................................................................ 138
White Noise Generators, Jammers, and scramblers............................................................. 138
Phreaking and mobile phone cloning...................................................................................... 139
Phishing and Brain Scanning – Finding hosts......................................................................... 139
Co-Processor Usurpation....................................................................................................... 139
Inserting Secret Hooks in Device Drivers............................................................................ 140
Worms , Memetic Viruses, and Psychotronic Viruses........................................................... 140
Ghosting the Sensor Systems................................................................................................. 140
Cloaking and Stealth Technologies........................................................................................ 140
Hacking the Variables of Belief Systems............................................................................... 141
Dictionary Attack.............................................................................................................................................................. 141
Purging and Altering Memory......................................................................................................................................... 141
Electronic Dissolution of Memory --- E.D.O.M....................................................................................................... 142
Thought filtering and suppression................................................................................................................................. 142
Hacking Decision Trees.................................................................................................................................................... 144
Psychographic Mapping............................................................................................................................................. 144
Game Theory................................................................................................................................................................. 144
John Nash Equilibriums............................................................................................................................................... 145
Reflashing the BIOS, Infecting Boot Sectors, Substitution of Operating System Files........ 146
Hacking Input Output Ports – The 5 Senses and Motor Cortex.......................................... 148
Spyware................................................................................................................................... 152
Stealing Passwords.................................................................................................................. 154
Key Stroke Loggers........................................................................................................................................................... 154
Soul Catchers and Recording the Entire Life of Every Human.............................................................................. 154
Memory Probing..................................................................................................................... 156
Bi-directional Associative Memory (BAM) Probing................................................................................................... 156
Self Destruct Algorithms........................................................................................................ 157
Suicide bombers / Psycho-bombs................................................................................................................................... 157
Suicide through torture and depression signals........................................................................................................... 158
Amplification of destructive behaviors and addiction pathways.............................................................................. 158
Shutting down and Stressing the Subsystems........................................................................ 158
Heart Failure, blood clots, and Strokes.......................................................................................................................... 159
Secondary and tertiary diseases caused by prolonged stress.............................................................................. 159
Spooking to death............................................................................................................................................................. 160
Context Switching................................................................................................................... 162
Emotional Control.............................................................................................................................................................. 162
Handles, Handlers, and Proxies............................................................................................. 162
Invoking Defensive Algorithms then Redirecting a Counter Attack.................................... 162
Terrorists and Proxy Agent Provocateurs..................................................................................................................... 162
Psycho-Bombs................................................................................................................................................................... 162
Trip Wires and Detection Algorithms.................................................................................... 162
Van Eck Hacking and TEMPEST standards.......................................................................... 163
Network Analyzers and Packet Sniffers................................................................................. 164
Echelon for the mind......................................................................................................................................................... 164
Wireless hacking – electronic warfare, signal and communication intelligence.................... 164
AntiVirus Software.................................................................................................................. 165
Encryption and Protocols........................................................................................................ 165
Firewalls.................................................................................................................................. 165
Thought Stream Filtering.................................................................................................................................................. 167
Trace route and multi levels of indirection............................................................................ 168
Disrupting Human Networks.................................................................................................. 168
Plants and Agent Provocateurs...................................................................................................................................... 169
Hacking the Hackers.............................................................................................................. 170
Scarecrow Effect and Decoys.......................................................................................................................................... 170
Usurping the Eye Tracking Virtual Interface Controls and Audio Commands........................................................ 171
Chapter 8 Resistance is Futile - Counter ResistanceTechniques.................................... 173
Alice in Wonderland................................................................................................................ 174
Wizard of Oz – ‘The Kubark Manual’.................................................................................... 175
Angels and Demons Script............................................................................................... 175
Sleeping Beauty – The Script for sleeper agents and disposable CIA assets....................... 181
Snow White and the Seven Dwarfs................................................................................................................................ 182
The A, B, C’s of Enhanced Interrogation and Torture.......................................................... 182
False Confessions for Staged Courts and Media Events............................................................................................ 190
Brainwashing...................................................................................................................................................................... 191
Neural Linguistic Programming and Psychic Driving.................................................................................................. 192
Plausible Deniability................................................................................................................ 192
GasLighting........................................................................................................................................................................ 193
Framing (Setting up a target to be disposed of)........................................................................................................... 193
Scripts and Dirty Tricks.................................................................................................................................................... 194
The Art of War and the Art of Deception..................................................................................................................... 196
Tricks, Illusions, and the Psychology of Magic........................................................................................................... 197
Chapter 9 Designing Gods - Active DoD, NSA, and CIASystems................................... 198
Global Communication Warfare – code name “Gabriel”................................................. 199
Biometric Recognition And Identification Network – B.R.A.I.N................................................... 200
Remote Hypnotic Intra-cerebralControl ---- R.H.I.C.................................................................. 202
Mentally Integrated Neuron Duplicator ---- M.I.N.D.................................................................... 202
Artificial Linguistic Internet Computer Entity ---- A.L.I.C.E.......................................................... 203
The Ghost in the Machine and Demons of Destruction.............................................................................................. 206
Thought And Memory Interface ---- T.A.M.I.............................................................................. 207
Common Human Routines Inference Software Technology – C.H.R.I.S.T................................... 208
Silent Assassination Through Adapting Networks ---- S.A.T.A.N.................................................. 208
Death Doctors and Angels of Death.............................................................................................................................. 209
Voodoo Doll: No-touch torture subprograms............................................................................................................... 210
Mind Games - Psychic Warfare Training................................................................................ 223
Project “Noah’s Ark”......................................................................................................... 229
Chapter 10 The Politics and Ethics of Controlling HumanBeings................................... 230
Legal Issues............................................................................................................................ 232
The Costs and Benefits.................................................................................................................................................... 233
Appendix of Formulas and Calculations.................................................................................. 234
Other Methods of Spying and Sabotage.................................................................................... 235
Index........................................................................................................................................... 237
CD packet containing viral code, port scanners, Back Orifice, and many other hacking utilities and codesamples........................................................................................................................................247
Chapter 11 About theauthor................................................................................................248
Chapter 12 Review Quotes:...................................................................................................249
Comments