Google "Blue List of Death" President Ronald Reagan was on this list.. carrying out the destruction of the "Red List of Death" and then he himself being tortured and murdered via Electronic Dissolution of MemoryFrom Dr. Robert Duncan-Project Soul Catcher-An Introduction to Information Warfare Theory, Technologies, and Practice.From: R. Duncan
Sent: Thursday, August 13, 2009 8:14 PM
Subject: shielding

Sorry for the multiple post.

Look up the materials that the stealth bomber uses to deflect and absorb RADAR energy. Has anyone tried combinations of Teflon, cellophane, etc? High di-electric constant material should help reduce some of the effects usingpassive shielding techniques. Since the military’s system uses adaptivebeamforming technologies, passive shielding will have its limitations. It willadapt to find the maximum entry overtime. More sophisticated methods of activejamming with alterations in the magnetic flux and the expected spectralabsorption lines for the ions of interest would be far more effective.

My book is getting close to completion. Would anyone care to proof read it before it goes to the editor and publisher?

download?mid=1%5f8992304%5fADPFtEQAAVeISoa%2fXAQbGWN0oAI&pid=2.2&fid=Inbox&inline=1

An Introduction to Information Warfare Theory, Technologies, and Practice.

Engineering Intelligence and Designing Gods

Book Contents

Preface.......................................................................................................................................... 13

Introduction by Noam Chomsky and Ray Kurzweil................................................................... 14

Chapter 1 Enemy of theState...............................................................................................14

Chapter 2 Advanced Sensors and Systems forBio-Communications................................. 15

RADAR..................................................................................................................................... 16

Doppler RADAR.................................................................................................................................................................. 17

Signal to Noise Ratio, Gain, and Sensitivity at a Distance Parameters.................................................................. 23

Full Spectrum Radar and Multiresolution Wavelets................................................................................................. 24

Adaptive filtering........................................................................................................................................................... 26

Phased Locked Loops................................................................................................................................................... 27

Phased Arrays and Multi-dynamic RADAR.............................................................................................................. 28

Heterodyning High Frequencies into Low Frequency Sidebands......................................................................... 29

Reflection, Absorption, and Scatter............................................................................................................................ 30

Passive and Active Sensing......................................................................................................................................... 30

Adaptive Beam Forming and Electronic Scanning.................................................................................................... 31

Holography and Interferometry.................................................................................................................................. 32

Electronic Warfare and Radio Frequency Interference........................................................... 34

Directed Energy Weapons........................................................................................................ 34

Communication Warfare........................................................................................................... 36

NSA Encoding and Decoding Techniques..................................................................................................................... 36

Imaging...................................................................................................................................... 40

Spectrograms........................................................................................................................................................................ 41

Magnetic Nuclear Resonance............................................................................................................................................ 41

Electron Spin Resonance.................................................................................................................................................... 41

Scintillation of Organic Molecules Using Free Radicals and Spin Probes................................................................. 41

Viewable Scintillation of Ion Density............................................................................................................................... 42

Ion and Electron Cyclotron Resonance........................................................................................................................... 42

Using Doppler to Scan Ion Current Density with Frequency Spread......................................................................... 42

Filtering, Identification of Signatures, and Tracking Algorithms............................................ 43

Chapter 3 Modes of NeuronInfluence.................................................................................44

Directed Energy........................................................................................................................ 44

Energy Wave Shaping........................................................................................................................................................ 46

Thermal Elastic Expansion.................................................................................................................................................. 47

Thermal Catalytic Reaction Speeds.................................................................................................................................. 48

Heating...................................................................................................................................... 48

Stored Waveform Inverse Fourier Transform (SWIFT).......................................................... 48

The Diode Effect....................................................................................................................... 49

Neurotransmitter Release........................................................................................................ 49

Electron Cyclotron Current Driving......................................................................................... 51

Ion Cyclotron Resonance, Ion Heating.................................................................................... 51

Magnetic Induction................................................................................................................... 52

Quasi-Static High Voltage Electric Fields................................................................................ 52

Ultrasonic energy...................................................................................................................... 53

Colloidal Vibration Potential.............................................................................................................................................. 53

Kinetic Elastic Expansion................................................................................................................................................... 53

Direct under skull electrical probes......................................................................................... 53

Genetic Engineering and TSS Chemical Division Research for the “psi” Gene.................... 53

Chapter 4 Wet and Dry NeuralNetworks............................................................................54

Information Theory................................................................................................................... 54

Data → Information → Knowledge → Wisdom → Enlightenment............................................................................. 54

Memetics and the Mating of Minds......................................................................................... 55

Super Intelligence..................................................................................................................... 55

The Global Brain Project.......................................................................................................... 55

Hive Minds and Swarm Theory of Information........................................................................ 55

Integrated Intelligent Systems................................................................................................. 55

Centralized and Distributed Intelligence................................................................................. 56

The Global Brain Project..................................................................................................................................................... 56

Cybernetic Hive Minds....................................................................................................................................................... 56

Human Networks................................................................................................................................................................. 56

Super-Intelligence................................................................................................................................................................ 57

Cognitive Entities, Networks, and Society of Minds................................................................................................ 57

Harvesting Human Minds and Other Wet Nets........................................................................................................ 58

Think Tanks (Brainstorming)........................................................................................................................................ 58

Organizational Behaviors.............................................................................................................................................. 60

Network Structures........................................................................................................................................................ 60

Hierarchies and Classism.................................................................................................................................................... 60

Structure, Importance, Relevance, and Meaning............................................................................................................ 61

Defining Human Cognition and the Sense of Self..................................................................... 61

Computational Equivalence and the Conscious Universe....................................................... 62

Chapter 5 NeuralProgramming...........................................................................................63

AutoCorrelograms.................................................................................................................... 64

Mapping.................................................................................................................................... 64

Self-organizing unsupervised learning / reinforcement learning / neurodynamic programming............................. 65

Classification and Brain Printing Identification.............................................................................................................. 65

Port Scanning.................................................................................................................................................................. 66

Brute force hacking........................................................................................................................................................ 67

Compression................................................................................................................................................................... 67

Cataloguing............................................................................................................................... 69

Personality Segmentation................................................................................................................................................... 69

Loyalty Affinities and Belief System Classification.................................................................................................. 69

Personality Simulations................................................................................................................................................. 69

Creating Cogs in the Machine...................................................................................................................................... 69

Data-mining Anomalies...................................................................................................................................................... 70

Counter Terrorism.......................................................................................................................................................... 70

Counter Intelligence....................................................................................................................................................... 70

Censorship and Information Flow Controls............................................................................................................... 70

Cognitive Configurations.......................................................................................................... 71

Virtual Neurons......................................................................................................................... 71

Transformations between Machine and Human Knowledge Storage...................................... 72

Integrating the Internet with Wet and Dry Neural Networks.................................................. 72

Adding Non-biological Sensors to Human Perception............................................................. 72

Chapter 6 Applications..........................................................................................................73

Self Directed Evolution............................................................................................................. 73

Autonomous Modification, “Free Will”, Deterministic Reprogramming, and ‘Bit Twiddling’................................ 73

Diagnostics and Monitoring...................................................................................................... 74

Efficient Communications......................................................................................................... 75

Universal Translators.......................................................................................................................................................... 75

Telepathy and Psychophony............................................................................................................................................ 75

Distributed Knowledge Management...................................................................................... 75

Self Organizing Adaptable Reconfiguration and Swarm Theory................................................................................. 75

Dream Harvesting – Utilizing Down Cycles.................................................................................................................... 76

Beaming and ‘Transporter’ Technology.......................................................................................................................... 76

Enhanced Human Performance................................................................................................ 77

Over-clocking the common fundamental Human Algorithms....................................................................................... 77

Forced Sleep and Adrenaline Boosts............................................................................................................................... 77

Memory Enhancement........................................................................................................................................................ 77

Intelligence and knowledge enhancements..................................................................................................................... 78

Extra Senses and Psi-borgs(Cybernetic biological computer entities)........................................................................ 80

Mood Management............................................................................................................................................................. 81

Enhancing Biological Sensors........................................................................................................................................... 81

Silicon Immortality............................................................................................................................................................... 81

Virtual Heaven and Hell................................................................................................................................................. 81

Crime and Punishment.............................................................................................................. 82

Automating Justice and Preventing Crimes.................................................................................................................... 82

Correctional Alternatives................................................................................................................................................... 83

“Behavioral Training”, Brainwashing, psychic driving and programming............................................................ 83

Secret Prisons................................................................................................................................................................. 83

Big Brother, Aliens, and the Voice of God................................................................................................................. 85

Cultural Engineering and Cultural Normalization.................................................................... 85

Accelerated Education........................................................................................................................................................ 87

Directed Evolution............................................................................................................................................................... 88

Productivity of Society....................................................................................................................................................... 89

Entertainment Applications...................................................................................................... 89

Ego trip.................................................................................................................................................................................. 89

Memory implants................................................................................................................................................................. 90

Virtual vacations.................................................................................................................................................................. 90

Shared interactive movie and music creation.................................................................................................................. 90

Virtual sex.............................................................................................................................................................................. 90

Electromagnetic Psychoactive Drugs and Altered Conscious States......................................................................... 91

War Gaming.......................................................................................................................................................................... 91

Sensing of desires and fulfilling them.............................................................................................................................. 92

Medical Applications................................................................................................................ 92

A New Medical Instrument that Spin Tags and Monitors Free Radicals................................................................... 92

Accelerated Healing............................................................................................................................................................ 92

Anit-Depression medication, Cure for Post Traumatic Stress Syndrome................................................................... 92

Cure for Loneliness and Broken Hearts........................................................................................................................... 92

Behavioral Modification to Quit Smoking, Lose Weight, Exercise Motivation......................................................... 93

Analgesics and Sensitization............................................................................................................................................. 93

Monitoring of seizures, heart activity.............................................................................................................................. 93

Diagnostics through Pain Sharing.................................................................................................................................... 93

Empathy Creation................................................................................................................................................................ 93

Universal Translator...................................................................................................................................................... 94

Replace Ritalin and many psychoactive pharmaceuticals............................................................................................. 95

Drug Rehabilitation............................................................................................................................................................. 95

Sobriety signal..................................................................................................................................................................... 95

Replace dying brain cells with virtual ones..................................................................................................................... 95

Cures for Blindness and Deafness.................................................................................................................................... 95

Muscular sclerosis (MS), Seizures, Bi-polar, Schizophrenia Cures............................................................................. 96

Bionics and spinal injuries................................................................................................................................................. 96

Biological Cloning and Mental Cloning........................................................................................................................... 97

Immortality............................................................................................................................................................................ 97

Military applications.................................................................................................................. 97

Spying/ESPionage/Remote Viewing................................................................................................................................. 97

Control of enemy................................................................................................................................................................. 98

Control of politics................................................................................................................................................................ 98

Control of civilians opinions.............................................................................................................................................. 99

Remote control soldiers...................................................................................................................................................... 99

Reading of vitals................................................................................................................................................................ 100

Enhanced human performance........................................................................................................................................ 100

Faster reaction times......................................................................................................................................................... 100

Psi-borg extra senses........................................................................................................................................................ 100

EEG control of robotic machines..................................................................................................................................... 101

Current Uses........................................................................................................................... 101

Silencing Dissenters and Government Whistle Blowers............................................................................................. 101

Brain print assassinations........................................................................................................................................... 101

Remote Lobotomies and Remotely Induced Schizophrenia.................................................................................. 102

Finding the outlying thinkers..................................................................................................................................... 105

Controlling Mass Media................................................................................................................................................... 105

Controlling Religions........................................................................................................................................................ 105

Acquiring Black Mail on Politicians............................................................................................................................... 105

Assassinating with plausible denial targets in the US and abroad........................................................................... 105

Controlling World Politics................................................................................................................................................ 106

Controlling Financial Markets......................................................................................................................................... 106

Collapsing Economies like the Former Soviet Union or the United States.......................................................... 106

Cheating at Gambling Games...................................................................................................................................... 106

Brain bugs - Spying, Espionage, and Sabotage............................................................................................................ 106

Human Robots and Psi-Borg Slaves............................................................................................................................... 106

Creating Alter Personalities – Dr. Jekyll and Mr. Hyde.......................................................................................... 106

Passing/failing Polygraphs and Brain Printing fMRI Truth Detectors................................................................ 107

Stress Conditioning..................................................................................................................................................... 107

Remote Interrogations – No-Touch Torture and Mind Probing................................................................................ 108

Dream Programming and Memory Probing.................................................................................................................... 109

Evolving Mind Virus Weapon Effectiveness................................................................................................................ 109

Directed Evolution............................................................................................................................................................. 110

Eugenics, Genocide, and the Silent Holocaust........................................................................................................ 110

Menticide and Silent Warfare..................................................................................................................................... 111

Intelligent Design......................................................................................................................................................... 111

Human animals and machines with souls................................................................................................................. 112

Chapter 7 Hacking Computer and BiologicalSystems..................................................... 113

History of Mind Hacking........................................................................................................ 113

Mind Hacking and The Enemy Within................................................................................... 114

Cognitive and Perception Warfare......................................................................................... 115

Cognitive Modeling and Reverse Engineering the Brain..................................................... 115

Mind Viruses........................................................................................................................... 120

Genetic Algorithms and Directed Evolution.................................................................................................................. 121

Human Experimentation, Brain Knapping, and Food for Thought....................................................................... 121

Malicious Payloads........................................................................................................................................................... 122

Replacing Personalities............................................................................................................................................... 123

Protected Memory, Partitioning, and Cognitive Containment......................................................... 123

Infinite Looping................................................................................................................................................................. 124

Demons............................................................................................................................................................................... 124

Crashing the Operating System Through Error Amplification.............................................. 124

Zombification and Remote Control Attacks........................................................................... 125

Scalable Enslavement and Zombification Strategies.................................................................................................... 126

Spiders................................................................................................................................................................................. 126

Bots...................................................................................................................................................................................... 127

Intelligent Agents.............................................................................................................................................................. 127

Brute Force Hacking – Master/Slave Roles.......................................................................... 127

Queuing Executables - Subliminal and Hypnosis................................................................... 128

Logic and Memory Buffer Overflow....................................................................................... 128

Denial of Service Attacks....................................................................................................... 129

Trojan Horses......................................................................................................................... 130

Triggers and Triggered Payloads...................................................................................................................................................... 131

Personality Overlays.................................................................................................................................................... 131

Psycho-bombs.............................................................................................................................................................. 132

Programmed Assassins............................................................................................................................................... 132

Terrorists....................................................................................................................................................................... 134

Pleasure/Pain principles.......................................................................................................... 134

Spoofing................................................................................................................................... 136

Social Engineering, Identity Theft, and Doppelgangers............................................................................................. 137

Authority, Privilege, Access, and Role Level Hacking................................................................................................ 138

White Noise Generators, Jammers, and scramblers............................................................. 138

Phreaking and mobile phone cloning...................................................................................... 139

Phishing and Brain Scanning – Finding hosts......................................................................... 139

Co-Processor Usurpation....................................................................................................... 139

Inserting Secret Hooks in Device Drivers............................................................................ 140

Worms , Memetic Viruses, and Psychotronic Viruses........................................................... 140

Ghosting the Sensor Systems................................................................................................. 140

Cloaking and Stealth Technologies........................................................................................ 140

Hacking the Variables of Belief Systems............................................................................... 141

Dictionary Attack.............................................................................................................................................................. 141

Purging and Altering Memory......................................................................................................................................... 141

Electronic Dissolution of Memory --- E.D.O.M....................................................................................................... 142

Thought filtering and suppression................................................................................................................................. 142

Hacking Decision Trees.................................................................................................................................................... 144

Psychographic Mapping............................................................................................................................................. 144

Game Theory................................................................................................................................................................. 144

John Nash Equilibriums............................................................................................................................................... 145

Reflashing the BIOS, Infecting Boot Sectors, Substitution of Operating System Files........ 146

Hacking Input Output Ports – The 5 Senses and Motor Cortex.......................................... 148

Spyware................................................................................................................................... 152

Stealing Passwords.................................................................................................................. 154

Key Stroke Loggers........................................................................................................................................................... 154

Soul Catchers and Recording the Entire Life of Every Human.............................................................................. 154

Memory Probing..................................................................................................................... 156

Bi-directional Associative Memory (BAM) Probing................................................................................................... 156

Self Destruct Algorithms........................................................................................................ 157

Suicide bombers / Psycho-bombs................................................................................................................................... 157

Suicide through torture and depression signals........................................................................................................... 158

Amplification of destructive behaviors and addiction pathways.............................................................................. 158

Shutting down and Stressing the Subsystems........................................................................ 158

Heart Failure, blood clots, and Strokes.......................................................................................................................... 159

Secondary and tertiary diseases caused by prolonged stress.............................................................................. 159

Spooking to death............................................................................................................................................................. 160

Context Switching................................................................................................................... 162

Emotional Control.............................................................................................................................................................. 162

Handles, Handlers, and Proxies............................................................................................. 162

Invoking Defensive Algorithms then Redirecting a Counter Attack.................................... 162

Terrorists and Proxy Agent Provocateurs..................................................................................................................... 162

Psycho-Bombs................................................................................................................................................................... 162

Trip Wires and Detection Algorithms.................................................................................... 162

Van Eck Hacking and TEMPEST standards.......................................................................... 163

Network Analyzers and Packet Sniffers................................................................................. 164

Echelon for the mind......................................................................................................................................................... 164

Wireless hacking – electronic warfare, signal and communication intelligence.................... 164

AntiVirus Software.................................................................................................................. 165

Encryption and Protocols........................................................................................................ 165

Firewalls.................................................................................................................................. 165

Thought Stream Filtering.................................................................................................................................................. 167

Trace route and multi levels of indirection............................................................................ 168

Disrupting Human Networks.................................................................................................. 168

Plants and Agent Provocateurs...................................................................................................................................... 169

Hacking the Hackers.............................................................................................................. 170

Scarecrow Effect and Decoys.......................................................................................................................................... 170

Usurping the Eye Tracking Virtual Interface Controls and Audio Commands........................................................ 171

Chapter 8 Resistance is Futile - Counter ResistanceTechniques.................................... 173

Alice in Wonderland................................................................................................................ 174

Wizard of Oz – ‘The Kubark Manual’.................................................................................... 175

Angels and Demons Script............................................................................................... 175

Sleeping Beauty – The Script for sleeper agents and disposable CIA assets....................... 181

Snow White and the Seven Dwarfs................................................................................................................................ 182

The A, B, C’s of Enhanced Interrogation and Torture.......................................................... 182

False Confessions for Staged Courts and Media Events............................................................................................ 190

Brainwashing...................................................................................................................................................................... 191

Neural Linguistic Programming and Psychic Driving.................................................................................................. 192

Plausible Deniability................................................................................................................ 192

GasLighting........................................................................................................................................................................ 193

Framing (Setting up a target to be disposed of)........................................................................................................... 193

Scripts and Dirty Tricks.................................................................................................................................................... 194

The Art of War and the Art of Deception..................................................................................................................... 196

Tricks, Illusions, and the Psychology of Magic........................................................................................................... 197

Chapter 9 Designing Gods - Active DoD, NSA, and CIASystems................................... 198

Global Communication Warfare – code name “Gabriel................................................. 199

Biometric Recognition And Identification Network – B.R.A.I.N................................................... 200

Remote Hypnotic Intra-cerebralControl ---- R.H.I.C.................................................................. 202

Mentally Integrated Neuron Duplicator ---- M.I.N.D.................................................................... 202

Artificial Linguistic Internet Computer Entity ---- A.L.I.C.E.......................................................... 203

The Ghost in the Machine and Demons of Destruction.............................................................................................. 206

Thought And Memory Interface ---- T.A.M.I.............................................................................. 207

Common Human Routines Inference Software TechnologyC.H.R.I.S.T................................... 208

Silent Assassination Through Adapting Networks ---- S.A.T.A.N.................................................. 208

Death Doctors and Angels of Death.............................................................................................................................. 209

Voodoo Doll: No-touch torture subprograms............................................................................................................... 210

Mind Games - Psychic Warfare Training................................................................................ 223

Project “Noah’s Ark”......................................................................................................... 229

Chapter 10 The Politics and Ethics of Controlling HumanBeings................................... 230

Legal Issues............................................................................................................................ 232

The Costs and Benefits.................................................................................................................................................... 233

Appendix of Formulas and Calculations.................................................................................. 234

Other Methods of Spying and Sabotage.................................................................................... 235

Index........................................................................................................................................... 237

CD packet containing viral code, port scanners, Back Orifice, and many other hacking utilities and codesamples........................................................................................................................................247

Chapter 11 About theauthor................................................................................................248

Chapter 12 Review Quotes:...................................................................................................249

E-mail me when people leave their comments –

You need to be a member of Peacepink3 to add comments!

Join Peacepink3