VCLUMIE TWO

Secrets of Cyber and Cybernetic Warfare Revealed

ROBERT DUNCAN

and The Mind Hacking Strategy Group

Volume 2 details the CIA’s practices of interrogation and cybernetic mind control in
their pursuit to weaponize neuropsychology. It covers the art of bio-communication war.
Human beings are complex machines but their inner workings have been deciphered.
Mind control and brainwashing have been perfected in the last 60 years. Hacking
computers and hacking into individual minds are similar. The 21st Century will be known
as the age of spiritual machines and soulless men.

PROJECT: SOUL CATCHIER
VCI.UMIE TWO
“A s p y g l a s s i n t o t h e f u t u r e , t h e p a s t , a n d t h e d a r k p r e s e n t . ”

- Form er C IA sp y and H arvard graduate

“ This b o o k c h a s e s t h e w h i t e r a b b i t a l l t h e w a y t o h el l.
-

Form er p sy ch ic spy

What a maze!"

“ This is t he h o l y g r a i l o f w e a p o n r y t h a t t he n a t i o n a l s e c u r i t y c a b a l s
have been h id in g .”

- Ted G underson,
form er head of the Lo s A n g e le s FB I

“F o r t h o s e w h o a r e r e l i g i o u s , t h e y w i l l f i n d v a l i d a t i o n t h a t j u d g e m e n t
d a y is u p o n us. M y g od , w h a t h a v e w e d o n e ? ”
-

C h ristian Pastor

“F i n a l l y e n o u g h b r a v e i n s i d e r s a r e t e l l i n g us w h a t t h e h e l l is g o i n g on
a n d w h a t is p l a n n e d . ”

M K U L T R A project

“ The n e x t g e n e r a t i o n n e e d s to a n s w e r s o m e d i f f i c u l t q u e s t i o n s o n w h a t
t he h u m a n r a c e a n d t h e i r c o u n t r y s h o u l d b e c o m e . ”

- A current politician

“A n i m p r e s s i v e i n t e g r a t i o n o f c y b e r n e t i c a n d p s y c h o l o g i c a l w a r f a r e . ”
-

Form er Colon el in the Air Force

The Mind Hacking Strategy Group is a consortium of
conscientious scientists who report the abuses of science.
ROBERT DUNCAN holds multiple degrees from Harvard University
and Dartmouth College in Applied Sciences and Business. He has
worked on projects for the Department of Defense, CIA and Justice
Department in his career

HIGH ORDER THINKERS PUBLISHING 2010

Project: Soul Catcher
Secrets of C yber and Cybernetic W arfare Revealed Vol. 2

n Introduction to Cvhernefiv Warfare Theory, Teehmlt&gies. a
Practice Vol f

By Robert Duncan, B.A., M.S., M.B.A., Ph.D.
and The Mind Hacking Strategy Group
A w atcher over the h u m a n race,
a recorder of m a n ’s deeds,
a n d keeper of his conscience.

Diagrams and artwork done by Chet Slater - ChelS1aterDesian (w.amai 1.com

Higher Order Thinkers Publishing

C o p yrig h t © 2010 H ig h er O rder T h in k ers Publishing
Boise, Idaho
H ig h e rO rd e rT h in k ers@ g m a il.c o m

ISBN is 1452804087
EAN-13is 9781452804088

A c k n o w l e d g e m e n ts

Sisyph us, in G reek lore, w as punished because he revealed the designs o f
the G ods to m ortals. H erm es w as the G reek gods’ m essenger and A p o llo w as the
god o f truth. In C h ristian , Islam , and Je w is h bibles, the A rch an gel Gabriel is the
m essenger o f G od.
T h is book is dedicated to all the people w ho stood by me during the
d ifficult tim es w hile researching and w ritin g it. It was a tim e w here true friends
showed their character. W ith ou t the love and support o f m y perfect m other and
father, it would not have been w ritten and the story told after the abuse and
physical torture that I had to endure. But there was a light at the end o f the
tunnel; the shadow agencies showed me everyth in g that they w ere w o rkin g on
and said if I could su rvive, I could write about an yth in g that they told me and
showed me. I carried the w eight o f the w orld in silence on m y shoulders like
A tlas. Finally I shrugged to divulge the truth despite threats to k ill m y fam ily or
torture me again from m y governm ent handlers.
A d d ition ally, m any thanks to the non-consensual hum an governm ent
experim ents that allow ed me to in terview them, the w h istleblow ers who b ravely
have come forw ard, and other individuals w ho gave their lives figh tin g hard for
truth and justice about these topics, especially D arin Sm ith , a C oast G u ard rescue
sw im m er who killed h im self after being tortured for a year by the system s
described in this book, and three form er F B I agents who w ere attem pted to be
assassinated but have come forw ard w ith valuable inform ation despite the
intim idation practices o f unnam ed governm ent agencies.
So much blood, sweat, and any tears w ere put into this book. Special
recognition goes to Je n n ife r N olden, a constant sh ining beacon o f hope and
purity, the muse o f serendipity w ho came into m y life just w hen she w as needed.
She rem inded me what is w orth saving in this world. W ith ou t her b elief in me, I
would have been enveloped b y the darkness forever.

“ I have w alked through the valley o f the shadow o f death.”
- 23rd Psalm

“ I am Lazarus. C om e from the dead. C om e back to tell you all. I shall tell you
all.”
- T .S . Elliott

V iv a t V eritas - Let T ru th Prevail

Prerequisites fo r understanding this text:
Basic college level computer science, advanced graduate level
artificial intelligence, linguistics, advanced college level physics,
psychology, evolutionary biology, neuroscience, and offensive
information warfare strategies or some devious street smarts

The 21st century will be known as the age of spiritual machines
and soulless men.

Contents
PREFACE

I

IN TR O D U C TIO N ........................................................................................................................... II
C H A PTER 1

HACKING CO M PUTER AN D BIO LO GICAL SY S T E M S ................................ 1

H istory of M ind Ha c k in g ....................................................................................................... 2
M ind Ha c k in g - T he E nemy W ithin ........................................................................................3
C ognitive and P erception W a r fa r e ......................................................................................5
C ognitive M odeling and R everse E ngineering the Br a in ................................................. 7
Gaining A c c e s s ...................................................................................................................... 14

Mind Viruses.......................................................................................................14
Trojan Horses......................................................................................................18
Weapons Grade Hypnosis

Worms, Memetic Viruses, and Psychotronic Viruses......................................19
Zombification and Remote Control Attacks......................................................20
Scalable Enslavement and Zombification Strategies
Spiders
Bots
Intelligent Agents

Brute Force Hacking - Master/Slave Roles...................................................... 24
Queuing Executables - Subliminal and Hypnosis.............................................. 25
Logic and Memory Buffer Overflow.................................................................. 26
Genetic Algorithms and Directed Evolution..................................................... 27
Human Experimentation, Brain-napping, Medical Manchurians, and Food for
Thought
S po o fin g .................................................................................................................................32

Social Engineering, Identity Theft, and Doppelgängers...................................33
Authority, Privilege, Access, and Role Level Hacking.......................................35
Noise G enerators , J am m ers , and S c ra m blers ..................................................................35
P hreaking and M obile P hone C loning ...............................................................................39
Phishing and B rain S canning - Finding Ho s t s .................................................................39
C o -P rocessor Usu r p a t io n .................................................................................................. 40
Inserting S ecret H ooks in D evice D r iv e r s .........................................................................40
Malicious Pa ylo ad s .............................................................................................................. 40

Replacing Personalities and Memories.............................................................41
P rotected M em ory , Partitioning ,

and

C ognitive C o n tain m ent ..................................42

Infinite Looping.................................................................................................. 43
Demons...............................................................................................................44
Crashing the Operating System through Error Amplification......................... 44
Denial of Service Attacks....................................................................................45
T riggers and T riggered Pa y l o a d s ......................................................................................49

Personality Overlays and Simulation................................................................. 49
Psycho-Bombs.....................................................................................................51
Programmed Assassins and Other CIA Human Assets.....................................54
Terrorists.............................................................................................................56

Proxy Agent Provocateurs..................................................................................57
Handles, Handlers, and Proxies......................................................................... 57
Pleasure /P ain p r in c ip le s ..................................................................................................... 57
Hacking the V ariables of B elief S y s t e m s .......................................................................... 61

Ghosting the Sensor Systems............................................................................. 61
Cloaking and Stealth Technologies....................................................................62
Cognitive Behavioral Mapping..........................................................................64
Faulty Logic......................................................................................................... 68
Dictionary Attack................................................................................................71
Purging and Altering Memory...........................................................................71
Thought Stream Filtering and Suppression....................................................... 73
Hacking Decision Trees.......................................................................................76
Psychographic Mapping.................................................................................... 76
Game Theory...................................................................................................... 77
Context Switching...............................................................................................79
S ubstitution of O perating S ystem Files and Root K it s ..................................................80
Hacking Input O utput P o r t s - T he 5 S enses and M otor C o r t e x ..................................81
S pyw are ...................................................................................................................................89
Stealing Pa ssw o rd s ..............................................................................................................91

Key Stroke Loggers.............................................................................................92
Soul Catchers and Recording the Entire Life of Every Human..........................93
Memory Probing.................................................................................................95
Bi-directional Associative Memory (BAM) Probing......................................... 95
S elf D estruct A lg o rith m s ................................................................................................... 96

Suicide bombers / Psycho-bombs / Staged Indirections.................................. 97
Suicide Through Torture and Depression Signals.............................................99
Amplification of Destructive Behaviors and Addiction Pathways..................100
Shutting Down and Stressing the Subsystems................................................100
Heart Failure, Blood Clots, and Strokes.......................................................... 101
Moscow's Remote-Controlled Heart Attacks
Secondary and Tertiary Diseases Caused by Prolonged Stress

Spooking to Death............................................................................................107
Disrupting Human Networks........................................................................... I l l
Racial Hatred Experiments By the CIA
C ounter Espionage and C ounter M e a s u r es .................................................................. 117

Trip Wires and Detection Algorithms............................................................. 117
Van Eck Hacking and TEMPEST Standards..................................................... 118
Network Analyzers and Packet Sniffers.......................................................... 120
Echelon for the Mind........................................................................................120
Anti-Virus Software..........................................................................................121
Firewalls............................................................................................................122
Thought Stream Filtering................................................................................. 125
Trace Route and Multi Levels of Indirection...................................................127
Baiting Hackers................................................................................................. 127
Hacking

the

Ha c k e r s .......................................................................................................... 128

Scarecrow Effect and Decoys........................................................................... 128
Usurping the Eye Tracking Virtual Interface Controls and Audio Commandsl30

CH A PTER 2

RESISTANCE IS FUTILE - COUN TER RESISTANCE T E C H N IQ U E S...... 133

A lice in W onderland Sc r ip t ..............................................................................................135
W izard of Oz S cript ............................................................................................................136
A ngels and D em ons S c r ip t ................................................................................................ 137

Watchers (fallen angels), Illegal Surveillance and Manipulation..................141
S leeping Beauty S cript - S leeper A gents and D isposable CIA A ssets ..........................146
S now W hite and the S even D warfs S c r ip t ..................................................................... 148
O ther S c r ip t s ...................................................................................................................... 148
T he A, B, C ' s o f E nhanced Interrogation and T o rtu re ................................................ 150
Experim ental Interrogation and B ehavior M odification T echniques ...................... 150
N o -T ouch T o r t u r e .............................................................................................................165

False Confessions for Staged Courts and Media Events.............................. 174
Brainwashing................................................................................................... 175
Neural Linguistic Programming and Psychic Driving...................................177
P lausible Deniability and the W ar

on

T r u t h ..................................................................178

Lack of "Physical" Proof...................................................................................179
GasLighting......................................................................................................182
Fram ing............................................................................................................182
Dirty Tricks and Tricky Dicks.............................................................................183
The Art o f War and the Art o f Deception........................................................194
Tricks, Illusions, and the Psychology o f Magic............................................. 194
Operation Northwoods

Truth, the Only Weapon...................................................................................202
CH APTER

3

DESIGNING DEM I-GODS: ACTIVE NSA, CIA, DOD S Y S T E M S .......... 203

G lobal Communication W arfare - C o d e N a m e “G a b r i e l ”................................203

Voice of God Weapons..................................................................................... 204
B io m e t r ic R e c o g n it io n A n d I d e n t if ic a t io n N e t w o r k - B . R . A . I . N ........206

Defeating Biometrics........................................................................................ 207
R a d io H y p n o t i c I n t r a - c e r e b r a l C o n t r o l / E l e c t r o n i c D is s o l u t io n

of

M e m o r y — R . H . I . C . - E . D . O . M .......................................................................... 209
M e n t a lly In t e g r a t e d N e u r o n D u p lic a t o r — M .i. N .D ............................213
C hatter Bo x e s ..................................................................................................................... 214

ArtificialLinguistic Internet ComputerEntity

A .L .I.C .E ......................................215

The Ghost in the Machine and Demons of Destruction

Thought And Memory Interface —

-

T.A.M .I............................................... 223

C o m m o n H u m a n R o u t in e s In f e r e n c e S o f t w a r e T e c h n o l o g y C . H . R . I . S . T .................................................................................................................... 224
S il e n t A s s a s s in a t io n T h r o u g h A d a p t in g N e t w

o rks—

- S . A . T . A . N . 225

Death Doctors, Angels of Death, Psychic Assassins.......................................226
Voodoo Doll: No-touch torture........................................................................ 229
Dawn of the Damned....................................................................................... 229
M ind G am es , Psychic W arfare T raining , Psycho -T er r o r is m ..................................... 248
O peration : "N o ah ' s A rk " - Dow nsizing the H um an Ra c e ........................................... 280

CHAPTER 4

THE POLITICS, LAWS, AND ETHICS OF NEUROLOGICAL WEAPONS285

Legal Is s u e s ......................................................................................................................... 290
T he C osts and B en efits .......................................................................................................301

APPENDIX OF FORMULAS, CALCULATIONS, AND SUGGESTED ANSWERS TO
DISCUSSION QUESTIONS........................................................................................304
WAR MATRIX 304
OTHER METHODS OF SPYING AND SABOTAGE.................................................... 304
SAMPLE FINAL TEST FOR INSTRUCTOR................................................................. 305
INDEX

A

Preface
From the previous book in this series, we investigated the various
advanced sensor technologies which can read body electrical and
chemical changes, modes of neuron influences, and the information
theories of engineering intelligence. We postulated many applications for
such technologies in current uses and future uses.
In this volume, our investigation continues into the detailed
methods used to interrogate, control, and destroy minds using traditional
and modem practices.
While the background from the first volume is beneficial to have
in understanding and believing this volume, it is not necessary. The books
can be read in any order and the concepts and knowledge gleaned.
While this book tries to remain non-political and as neutral as
possible, it should be obvious to the reader what moral, ethical, and legal
issues arise from the use of such methods and technologies. We, as a
country, should remember that we should not forfeit our values and
character as a moral leader to justify short term advantages in intelligence
gathering. If the great United States sets an example of not abiding by
treaties and international law, no other countries will. The long term soft
power o f the United States will be mitigated forever.
This book tries to find the balance of the harsh, unbridled truth
with its interviews and sensitivity to readers who may get nightmares
from them. Anyone who buys this book to read generally is not afraid of
truth and values truth no matter what predetermined emotional
associations they have.

Introduction
There have been several cataclysmic knowledge events in human
history that have changed the world view of the collective understanding:
fire for cavemen, Earth is ellipsoidal, stars are suns, and DNA is the
genetic biological program for examples. Now we enter the boundary in
human understanding of where the mind and neuroscience intersect, the
subjective and objective perceptions of realities overlap.
This field of study is often called psychophysics,
neuropsychology, or cybernetics. "Cybernetics" comes from a Greek
word meaning "the art of steering". Cybernetics is about having a goal
and taking action to achieve that goal. Knowing whether you have
reached your goal (or at least are getting closer to it) requires "feedback",
a concept that comes from cybernetics. From the Greek, "cybernetics"
evolved into Latin as "governor".
Cybernetics as a process operating in nature has been around for a
long time. Cybernetics as a concept in society has been around at least
since Plato used it to refer to government. In modern times, the term
became widespread because Norbert Wiener wrote a book called
"Cybernetics" in 1948, a year after the formation of the CIA. His sub-title
was "control and communication in the animal and machine". This was
important because it connects control (a.k.a., actions taken in hope of
achieving goals) with communication (a.k.a., connection and information
flow between the actor and the environment). So, Wiener is pointing out
that effective action requires communication.
Wiener's sub-title also states that both animals (biological
systems) and machines (non-biological or "artificial" systems) can
operate according to cybernetic principles. This was an explicit
recognition that both living and non-living systems can have purpose. A
scary idea in 1948.'

Brave New world

1 "G ettin g S tarted" G uide to C y b ern etics, P angaro,
h ttp ://w w w .p an g aro .co m /p u b lish ed /cy b er-m acm illan .h tm l

Ih tro d ucti o n

P a g e | iii

By Nathan Cochrane
July 23 2002
Next
A draft government report says we will alter human evolution
within 20 years by combining what we know of nanotechnology,
biotechnology, IT and cognitive sciences. The 405-page report sponsored
by the US National Science Foundation and Commerce Department,
Converging Technologies for Improving Human Performance, calls for a
broad-based research program to improve human performance leading to
telepathy, machine-to-human communication, amplified personal sensory
devices and enhanced intellectual capacity.
People may download their consciousnesses into computers or
other bodies even on the other side o f the solar system, or participate in a
giant "hive mind", a network of intelligences connected through ultra-fast
communications networks. "With knowledge no longer encapsulated in
individuals, the distinction between individuals and the entirety of
humanity would blur," the report says. "Think Vulcan mind-meld. We
would perhaps become more of a hive mind - an enormous, single,
intelligent entity."
Armies may one day be fielded by machines that think for
themselves while devices will respond to soldiers' commands before their
thoughts are fully formed, it says. The report says the abilities are within
our grasp but will require an intense public-relations effort to "prepare
key organisations and societal activities for the changes made possible by
converging technologies", and to counter concern over "ethical, legal and
moral" issues. Education should be overhauled down to the primaryschool level to bridge curriculum gaps between disparate subject areas.
Professional societies should be open to practitioners from other
fields, it says. "The success of this convergent-technologies priority area
is crucial to the future of humanity," the report says.
wtec.org/C onvereingT echnologies/R eport/NB IC -pre-publication.pd f

The brain has always been a battlefield. New weapons might be
able to hack directly into your nervous system.
"Controlled Effects" is one of the Air Force’s ambitious long-term
challenges. It starts with better and more accurate bombs, but moves on

iv

|P a g c

P r o ie c l : S o ul ( ’ a 1 c h e r

v

oI.2

to discuss devices that "make selected adversaries think or act according
to our needs... By studying and modeling the human brain and nervous
system, the ability to mentally influence or confuse personnel is also
possible."
The American military may want to attack the nervous system,
with pain rays and laser plasma pulses. But they're not the only ones. The
Russians have long studied such systems, too - including one weapon
that could, in theory, remotely trigger heart attacks.
In 2003, at the 2nd European Symposium on Non-Lethal
Weapons, Anatoly Korolev and his colleagues from Moscow State University
presented a paper with the snappy title "Bioelectrodynamic Criterion of
the NLW Effectiveness Estimation and the Interaction mechanisms of the
multilayer Skin Tissues with electromagnetic Radiation." This is a study
of how radio-frequency weapons —like the American Active Denial
System —affect the skin. After wading through a mass of technical data
showing how complex the interactions are we reach the punch line:
The sensations modality (pricking, touch, pressure, gooseflesh,
burning, pain etc) depends on the field parameters and individual
concrete human being factors. As a matter o f fact, we can really choose
the non-lethal bioeffect.
The effects include sensations similar to those discussed
previously, and more besides. The paper discusses effects on cell
membranes and affecting the body’s normal function, including "information
transfer to the organs o f control."
At the same conference, V Makukhin of the Trymas Engineering
Center in Moscow described "Electronic equipment for complex
influence on biological objects." And when he says "biological objects,"
he means you and me.
His laboratory apparatus uses a modulated beam of radio waves to
produce what he terms "disorder of autonomic nervous system," put
forward as a possible non-lethal weapon. Makhunin notes that there is no
general agreement on how EM waves disrupt nerves - he mentions ion
channels similar to those in the plasma paper - but he certainly seems to be
seeing the same effects as American researchers.
But it need not be a non-lethal weapon. Makukhin also mentions
the effects o f "change of electrocardiogram" and what he calls "function

In tro dn c t io n

break of heart muscle."
The vulnerability of the heart to electrical stimulation (including
that produced by EM waves) is well documented. A lethal device would
interfere with the electrical potentials that keep the chambers of the heart
synchronized, producing fibrillation and rapid death. A death ray doesn’t
need to be a truck-sized laser that reduces the target to smoking heap; a
small device that stops the heart will do the job.
Little has been openly published in this area in the public domain,
but this may be the tip of the iceberg. We are likely to be hearing more in
future - especially if the Russians manage to find funding.
I don’t think we need tinfoil hats just yet. But a layer of
conducting mesh built into body armor might save a lot o f heartache in
years to come.

—David Hambling, Weapons Grade, Carroll & Graf, 2005.

Sign up to vote on this title
UsefulNot useful