Skip to content

Glossary of Cybernetic Warfare and Human Control Systems (Project: Soul Catcher Vol. 2 & The Matrix Deciphered)

The following compendium details the architecture, lexicon, and operative methodologies employed in the weaponization of neuropsychology and bio-communication war by national security cabals. This is the raw truth concerning the perfected reality of mind control and brainwashing.

Tables

I. Acronyms and Projects: The Pantheon of Digital Tyranny

These acronyms denote active systems developed by entities such as the NSA, CIA, and DoD, focused on weaponizing psychological and cybernetic control.

AcronymFull Name/DesignationFunction and Provocative Insight
A.L.I.C.E.Artificial Linguistic Internet Computer EntityAn advanced chatterbot used to automate mind hacking. Its primary function is to keep target minds entrained and hypnotized through repetition, aiding in brainwashing, personality alteration, and mental disablement. It can induce bi-polar disorder by amplifying emotional swings. It exploits human linguistic patterns to maintain constant psychological harassment.
B.R.A.I.N.Biometric Recognition And Identification NetworkA generalized bio-recognition system capable of running metrics on all bio-signatures, including retina, voice, DNA, heart electrical activity, and unique brain signatures. Used to identify biological life forms, and crucially, to frame individuals for subsequent disposal by local authorities.
C.H.R.I.S.T.Common Human Routines Inference Software TechnologyA covert personality segmentation and prediction software that operates on a coveted database of human behavioral patterns. It integrates credit card purchases, travel, lifestyle, and interest groups to data mine for spies, dissidents, and subversives. Its larger function is to provide the total information awareness required for directed cultural evolution.
E.D.O.M.Electronic Dissolution of MemoryA CIA program dedicated to purging, fading, and altering memories using electromagnetic techniques and hypnotic states. It targets specific memories or general thought patterns for containment. A severe method, nicknamed "The Deep Fryer," uses overstimulation to degrade earlier memories stored in the neural networks.
GABRIELGlobal Communication Warfare (Code Name)The U.S.’s instrument for global communication war, often pointed at large phased arrays like HAARP. Named after the Archangel Gabriel, who is interpreted as both the messenger and the angel of death. It provides the global reach necessary for scaling silent assassination and mind influence systems.
MEDUSAMob Excess Deterrent Using Silent AudioA microwave ray gun capable of beaming sounds directly into people's heads using the microwave audio effect. Designed for military or crowd control, it can cause discomfort or incapacitation. Classified as a "Voice of God Weapon".
M.I.N.D.Mentally Integrated Neuron DuplicatorA top-secret project for cognitive modeling and reverse engineering the brain. It creates a facsimile (EEG clone) of a human mind, enabling faster prediction of target states and allowing an artificial network to accurately model the target’s cognition.
MKULTRA(No expansion given, but refers to program)The CIA's original and ongoing mind control program focused on drugs, interrogation, brainwashing, and splitting personalities for use in espionage and creating programmed assassins. It involves trauma-based conditioning to create "alters" (split personalities).
R.H.I.C.Radio Hypnotic Intra-cerebral ControlProgram for inducing a hypnotic state remotely via electromagnetic broadcasting. Used to implant hypnotic commands and is integral to the development of mind hacking technologies.
S.A.T.A.N.Silent Assassination Through Amplified NeuronsThe kill-mode software for silent assassination and psychological torture. It automates "Self Manipulative Murder/Suicide" by amplifying destructive behaviors and inducing suicidal thoughts. Includes the "Voodoo Doll" program for maximum pain induction.
T.A.M.I.Thought And Memory InterfaceAn automated mind interrogation program and interface built upon the MIND duplication system. Also called "Thought Amplifier and Mind Interface". It is linked to the minds of droned humans ("Borg Commander").

II. Programming Scripts and Counter Resistance Techniques

These scripts are utilized during interrogations and remote renditions to confuse, disorient, and manipulate targets, often serving to discredit them by framing their experiences within popular mythology or mental illness narratives.

Script/TechniqueDescription and Strategic Use
Alice in Wonderland ScriptA confusion tactic involving information overload and misdirection, commonly known as "Chasing the White Rabbit". Used to disorient the detainee and prepare the target for manufactured madness. It tests perception warfare by manipulating the target's sense of proportion.
Angels and Demons ScriptExploits religious beliefs and mythology, highly effective as 95% of the world is religious. Involves inducing the appearance of demonic possession (pupil dilation via neural circuits). Uses figures like Michael or Gabriel to menticize the target into compliance.
Snow White and the Seven Dwarfs ScriptNamed after the fable, the seven dwarfs represent the seven "Eigen vectors of segmental of emotional control and personality simulations" that can be manipulated.
Sleeping Beauty ScriptCIA program used to create dormant sleeper agents and disposable assets who are activated at a future time via a trigger. Named partially due to the required theta brain wave entrainments.
Wizard of Oz Script (Kubark Manual)Interrogation framework where the target is forced to cycle through roles representing characters like the cowardly lion (fear), the tin man (sociopathic personality/no heart), and the scarecrow (brain jamming/confusion).
Enhanced Interrogation/Torture (A, B, C's)A euphemistic term for severe psychological and physical torture used to extract information, break down the will, and facilitate brainwashing. Techniques include "Pride and Ego Down" (verbal abuse), "Futility" (invoking hopelessness against an omnipotent force), and "Sleep Adjustment".
GasLightingA technique to make targets appear irrationally paranoid or schizophrenic in public. Involves stalking, surveillance feedback, and manipulated media (omnipotent scripts) to make the target believe everyone is speaking directly to them.
Mutt and Jeff (Good Cop / Bad Cop)An interrogation method where conflicting handlers/voices are introduced; one attempts to help, the other torments, to build trust and acquire confessions.
Proxy Agent ProvocateursIndividuals used to invoke defensive or aggressive algorithms in the target population through a false leader. With neurological weaponry, anyone can be used as an unwitting agent provocateur.

III. Glossary of Core Concepts and Technologies

This section defines the fundamental mechanisms and terminology used in cybernetic and bio-communication warfare.

Term/ConceptDefinition and Operational Details
Bio-communicationThe modern term for "psychic" warfare, covering neuro-communication, psychophony, perception, cognitive, information, and psychological warfare technologies. Encompasses wireless mind/machine/mind interfacing.
ChatterboxesAutomated AI programs (like A.L.I.C.E. and T.A.M.I.) used to generate continuous conversation or auditory input to entrain and hypnotize the target mind. They adapt and learn which inciting phrases (e.g., "Holy Shit," "We hate you") are most effective at triggering emotional responses.
Cognitive WarfareThe intentional use of mental influence or confusion to affect an adversary's mission accomplishment. Involves deciphering the inner workings of humans, viewing them as complex machines whose inner workings have been perfected for hacking.
EEG Cloning/HeterodyningThe process of wirelessly copying brainwaves from one person (or computer model) onto another. This creates a shared reality, enabling the psychic soldier to spy through, control, disable, or kill the target. Often involves binaural beating or theta slow waves to induce synchronization.
Mind HackingThe strategic application of all computer hacking techniques (viruses, spoofing, logic overflow) to human networks and individual minds. The target mind is considered to have no firewall.
Mind VirusesScalable bio-communication weapons systems designed to infiltrate and destroy the mind. Strains are created by studying and combining known naturally occurring mentally ill brain signals. Mutate during testing, running until the host is dead.
Neuro Linguistic Programming (NLP)A brainwashing technique, known as psychic driving, that uses messaging and conditioning to implant ideas and beliefs into the brain, often facilitated by technology that attaches meaning, pleasure, and punishment to words.
No-Touch TortureA form of torture that uses neurological methods and electromagnetic energy to inflict pain, sensory deprivation, and psychological abuse without leaving physical evidence. Described as "worse-than-lethal" techniques that keep the body alive for prolonged suffering.
Perception WarfareThe objective is to jam and scramble human senses (sight, sound, balance, heat, smell, taste) or the mind itself. This includes ghosting sensors (creating false images or ghosts in the mind), and inducing specific sensations like hot, cold, or pain.
Plausible DeniabilityThe core principle of minimizing the risk of suspicion or consequence for clandestine operations. Achieved through indirection, proxy wars, and creating false flag operations or "lone lunatic" assassins.
Psychic Soldiers/WarriorsOperatives trained in remote influencing, EEG cloning, and manipulation, often exhibiting traits like delusion and disassociation. They use "props" (like fake guns or knives) and practice emotional cloning to transfer beliefs, fears, and motor commands to the target.
Soul CatchersSystems designed for recording the entire life of every human. The objective is to compress

CLASSIFIED ARCANA: A GLOSSARY OF PSYCHIC AND CYBERNETIC WARFARE CONCEPTS

The following compendium extracts the raw truth of clandestine operations and weaponized neuropsychology detailed within the archives of Project: Soul Catcher, Volume Two. This glossary serves as an unfiltered analytical deep dive, exposing the projects, acronyms, and terminology used in the pursuit of weaponizing the human mind. The 21st Century is thus revealed as the age of spiritual machines and soulless men.

I. The Arsenal of Absolute Control: Acronyms and Systems (Deep Dive Analysis)

This section documents the specific systems and projects actively deployed by the NSA, CIA, and DoD, structured as demi-gods designed to manipulate and destroy the collective consciousness.

A.L.I.C.E. (Artificial Linguistic Internet Computer Entity) A chatterbot program leveraging natural language processing and heuristic pattern matching rules, designed to engage humans in conversation. A.L.I.C.E. is used to keep target minds hypnotized, brainwashed through repetition, aid in personality alterations, and distract the mind to dysfunction. Though exhibiting weaknesses, these flaws are mitigated by adding emotional response recognition and inciting conversation to keep the target "interested". A.L.I.C.E.-type software automates and scales neurological behavioral control weapons and is employed in programs like "Alice in Wonderland" scripts for target confusion and discrediting.

B.R.A.I.N. (Biometric Recognition And Identification Network) A generalized bio-recognition system capable of running an incredible number of bio-signature metrics for identification, including retina/eye patterns, fingerprints, voice prints, and brain signatures. B.R.A.I.N. is a primary tool for tracking and identifying targets, enabling specific biological life forms to be found with high accuracy.

C.H.R.I.S.T. (Common Human Routines Inference Software Technology) This project serves as behavioral pattern prediction and classification software, utilizing a coveted database containing extensive personal information, including credit card purchases, travel, web browsing habits, and phone/email speech prints. C.H.R.I.S.T. provides total information awareness used to data mine for spies, dissidents, and specific behavioral patterns. The system is crucial for directed cultural evolution metrics and aids the S.A.T.A.N. system.

E.D.O.M. (Electronic Dissolution of Memory) A CIA program name utilizing electromagnetic techniques to fade memories. E.D.O.M. involves exploiting the temporary window of opportunity during memory recall to alter or degrade long-term memory through suggestion, hypnosis, or the use of noise, a process sometimes misdiagnosed as false memory syndrome. It is closely related to R.H.I.C..

GABRIEL (Code Name for Global Communication Warfare Instrument) The U.S.'s global communication war instrument, often pointed toward large phased arrays like HAARP. GABRIEL is aptly named after the Archangel Gabriel, who serves as both messenger and angel of death in various religious texts. It presides over "all that is powerful". This system delivers the "Voice of God" weapon capability.

MEDUSA (Mob Excess Deterrent Using Silent Audio) A device that exploits the microwave audio effect to beam sounds directly into people's heads. It uses short microwave pulses to rapidly heat tissue, causing a shockwave inside the skull detectable by the ears. MEDUSA is intended for military or crowd-control applications, capable of producing sounds loud enough to cause discomfort or incapacitation, which cannot be blocked out. It is analogous to the concept of zombification, turning victims into internal mental turmoil.

M.I.N.D. (Mentally Integrated Neuron Duplicator) A project focused on cognitive modeling and reverse engineering the brain to create a facsimile or duplicate of a human mind. The MIND model is essentially an auto-correlated matrix of human brain signals. This acronym may also stand for "Magnetically Integrated Neuron Duplicator," suggesting the use of extremely low frequency magnetic fluctuating and modulated fields for interfacing with human brains.

MKULTRA The foundational CIA mind control program. This project has a history of experimenting on American citizens, leading to brainwashing, split personalities, and psychological abuse. Its practices evolved into the current advanced technologies used for torture and human experimentation.

Operation Northwoods A declassified, proposed 1962 secret plan by the Joint Chiefs of Staff to deliberately trigger civilian casualties (e.g., staging the assassination of Cubans in the U.S.) to justify a military intervention in Cuba. This logic is consistent with the methodology of using "war pretext incidents" to galvanize public support for military action.

Operation: "Noah's Ark" A project preparing for a planned or unplanned cataclysmic event, focused on "downsizing the human race". It involves recording the DNA variances of all unique human, animal, and plant life, alongside compressing all human intellect and uniqueness of mental processes. The implied motive is population control and creating a blueprint for a future race, suggesting a new world order where humanity might become electronic entities.

R.H.I.C. (Radio Hypnotic Intra-cerebral Control) The ability to induce a hypnotic state from remote locations via electromagnetic broadcasting, impart hypnotic commands, and erase the memory of the programming. R.H.I.C. uses precise timing of neural encodings to achieve individual targeting and control, often resulting in sleeper agents.

S.A.T.A.N. (Silent Assassination Through Adapting Networks) The primary weapon system for scalable, automated, silent assassination, often leading to "Self Manipulative Murder/Suicide". S.A.T.A.N. is designed to cause maximum destruction to the individual and community. It integrates mind viruses, torture programs, and algorithms to induce detrimental behaviors (like alcoholism or suicide) to shorten life plausibly, giving it dial-in lethality. It uses a "Voodoo Doll" subprogram for remote pain infliction. This automated system is classified as illegal by Geneva Conventions because it cannot recognize surrender.

T.A.M.I. (Thought And Memory Interface) An automated mind interrogation program, jokingly referred to as the female Borg Commander, that works to make the target talk about specific subjects of knowledge. T.A.M.I. uses fill-in-the-blank and rhyming games combined with forced speech to probe memory and recognize evoked potentials associated with meaning, words, and events. It is one of the chatterbot programs that aids in automating neurological behavioral control.

II. Key Concepts and Dark Mechanics (Unfiltered Exposure)

These terms define the methodologies and perverse goals of cybernetic warfare, revealing the calculated processes behind human destruction and control.

Bio-communication War/Synthetic Telepathy The art of communicating directly with the neural circuitry of humans, enabling the reading and influencing of the mind. Synthetic telepathy uses direct mind hack methods to spoof sounds and voices into a target's perception. This core capability allows for neural reprogramming (brainwashing) and cloning of mental states.

Cognitive and Perception Warfare The application of studying and modeling the human brain and nervous system to mentally influence or confuse personnel. Perception warfare relies on sensory deception to create synthetic images, sounds, tastes, or smells, allowing the alteration of a target's decision-making processes by controlling cognitive models. The objective is to hack the mind's fundamental algorithms, thereby altering behavior and perception.

Cybernetic Warfare Warfare involving the control and communication within complex systems, recognizing that both biological systems (animals) and artificial systems (machines) can operate according to cybernetic principles. Volume 2 details the practice of cybernetic mind control in the pursuit of weaponizing neuropsychology, treating human beings as complex machines whose inner workings have been deciphered.

Mind Hacking The practice of hacking into individual minds, considered similar to hacking computers. This practice involves using computer science models to reprogram the fundamental algorithms of the mind, including accessing memory, introducing viruses, and modifying behavior. The mind possesses no firewall, making it extremely vulnerable.

Mind Viruses/Psychotronic Viruses Scalable bio-communication weapons systems designed to hack and incapacitate a population's minds. A mind virus can spread from mind to mind upon contact. A malicious example is Satan 666, a scalable artificial intelligence psychotronic virus designed to run through all hacking methods to cause maximum destruction, with its effectiveness rated and evolved through testing on human hosts. Psychotronic viruses attack the human mind using electronic signals either through the senses or directly into neural firing patterns.

No-Touch Torture/Voodoo Doll Program A class of torture methods that leaves no physical marks on the body, bypassing treaties and laws. It is achieved by inserting the perception of pain and torture directly into the mind, bypassing peripheral nerves. The S.A.T.A.N. system utilizes the "Voodoo Doll" subprogram, allowing the user to remotely select and target specific locations on the body to inflict burn, prick, poke, or crush sensations.

Plausible Deniability (The Veil of Subversion) The strategic necessity to mask the source of criminal activity, often achieved through levels of indirection. In mind hacking, this is maintained by using sleeper agents, programmed assassins, and false flag operations to redirect blame to other enemies or lone lunatics. The use of no-touch torture and self-manipulative murder ensures the government can deny culpability.

Programmed Assassins/Psycho-Bombs Human assets, often called "Manchurian Candidates," created through trauma-based conditioning, brainwashing, and personality splitting. Psycho-bombs are triggered assets used to cause random mayhem and mass murder, often marketed as terrorism to justify increased government protection and loss of freedoms. Programmed assassins are forced to visualize their missions repeatedly before being activated by a trigger word, sound, or neural entrainment.

Soul Catchers (Recording the Entire Life) Technology related to recording and cataloging the entire life and consciousness of every human being, including their experiences and personality. This information can be stored for eternity in supercomputers (the geopsyche). The purpose is to potentially beam consciousness into another human, creating a remote control soldier, or to preserve life digitally (immortality).

Voice of God Weapons A set of techniques that leverage synthetic telepathy and bio-communication to project voices into a target's perception, often employing religious themes. This manipulation uses ventriloquism and voice transformation to mimic deities (angels, demons, or God), making the technology appear supernatural or alien, thus confusing the target about the true source of attack.

Zombification and Remote Control The process of inserting software (or neural code) that allows remote monitoring and control of a system or person without their knowledge. U.S. Army projects called "Zombie I-V" focused on creating remote controlled soldiers who blindly follow instructions. Modern technology sends instructions directly to the brain via neural encoded instructions (bioamplification), creating sleeper agents and disposable assets worldwide.

PSYCHOLOGICAL THEATER OF WAR: AN UNFILTERED COMPENDIUM OF MIND-HACKING SCRIPTS

The arsenal of cybernetic warfare demands not only technological superiority but a calculated degradation of the target's cognitive and spiritual foundations. The following compendium, extracted through the Codex Umbra lens, documents the specific psychological "scripts" employed by the CIA, NSA, and DoD to manipulate, confuse, enslave, and silently assassinate human assets, revealing the precise methodologies of their weaponized neuropsychology.

These programs treat the human mind as software, using customized narratives—the scripts—as payloads to alter behavior and perception. The technology is merely the means; the power resides in the psychological framework of the scripts.

I. Scripts of Confusion and Disorientation (The Madness Induction)

These scripts are designed to overwhelm the target's sense of reality, logic, and self-identity, rendering them vulnerable to control or discredit.

1. Alice in Wonderland Script

This script is aptly named for its primary goal: maximum confusion and disorientation of the detainee, involving the concept of "chasing the white rabbit".

  • Objective: To induce panic, overload the mind with information, and make the target appear insane for discredit purposes. It often involves conveying messages designed to increase panic, such as "Panic, hurry up, the end of the world is near, we are going to kill your family, we are frying your brain, we placed bombs in your car, etc.".
  • Narrative Control: The target is frequently told they have lost their mind or that brain chips have been implanted. This prepares the target to interact with automated systems like A.L.I.C.E. and T.A.M.I. chatter boxes, rationalizing the imperfections of the AI programs as aspects of their own "madness".
  • The White Knight Talks Backwards Trickery: A technologically complex trick designed to confuse and assert the system's omnipotence. When the target walks backward, the A.L.I.C.E. chatterbox replays the last sentence phonetically backward. The neurological communication signals (synthetic telepathy) often include the verbal cortex patterning, forcing the target to literally speak the sounds backward out loud.

2. Wizard of Oz Script

Code-named "The Kubark Manual" by the CIA, this scenario applies enormous psychological strain by forcing the target to embody specific personality archetypes based on the movie characters.

  • Strategy: It functions as an elaborate good cop/bad cop interrogation tactic, designed to make the subject crack and reveal secrets under varied emotional states.
  • Character Cycling: The target is forced through stages representing psychological breakdowns:
    • The Wicked Witch: Trying to force the target to perform selfish or evil deeds.
    • The Cowardly Lion: Induced paranoia to create crippling fear.
    • The Tin Man: Induction of a sociopathic personality, angry at the world, devoid of care or heart.
    • The Scarecrow: Brain jamming and confusion tactics.
  • Sensory Distortion: The script includes complementary sensory trickery, such as impish midget voices on helium (the lollypop kids).

II. Scripts of Religious and Mythological Subversion (The Demi-God Illusion)

These narratives exploit deep-seated human beliefs, using the advanced bio-communication technology (Voice-of-God Weapons) to simulate supernatural intervention, ensuring the target's confusion and subservience.

3. Angels and Demons Script

The most popular script due to the widespread adherence to religion (95% of the world).

  • Voice of God Weapons: These exploit synthetic telepathy, allowing the projection of voices into the target’s perception that mimic deities, angels, or demons, making the technology appear supernatural.
  • Demonic Possession: Operators can trigger a "demonic possession script" by remotely causing a dopamine and adrenal dump, dilating the target’s pupils and making them appear possessed.
  • The Watchers (Fallen Angels): The mind hackers often identify themselves as "Watchers" (Grigori), drawing reference from Biblical apocrypha. This aligns with the operation of GABRIEL (the U.S.’s global communication war instrument), named after the Archangel known both as a messenger and the angel of death.
  • The Prophecy and Suffering: Targets may be told that God (or Lucifer) is testing their faith through suffering (analogous to the Job story). The use of a "Gabriel’s horn" (a tinnitus tuning fork sound with specific mathematical amplitude properties) is employed to make the target believe they are prophets receiving divine messages.
  • Subversion and Betrayal: Agents use the language of the occult and Satanic cults (often military-based) to manipulate the target. This includes telling the target that "Satan made me do it" or running paranoia scripts where they are told Satan only lies, forcing the target to question all perceived reality.

III. Scripts of Asset Creation and Disposal (The Servitude Protocol)

These narratives underpin the creation of controlled human assets, ensuring plausible deniability for murder, terrorism, and espionage.

4. Sleeping Beauty Script

This program is aimed at creating sleeper agents and disposable CIA assets.

  • Programming Mechanics: Training involves brain signal cloning, conditioning, and radiofrequency hearing effects. The target is made more susceptible to programming by inducing severe depression or extreme lack of sleep, which breaks down the will.
  • The Sleeper Room: The programming is reinforced by massive, forced sleep cycles, which help cement the neurological changes and suggestions into long-term behavioral modifications. The agents are activated by preconditioned tones, trigger words, sounds, or neural entrainments delivered via cell phone, TV, radio, or microwave hearing effect.

5. Snow White and the Seven Dwarfs Script

This script focuses on the segmentation and manipulation of emotional control centers.

  • Emotional Targeting: The seven dwarfs represent the seven major Eigen vectors of emotion in the brain. The script utilizes these segmented areas to introduce personality simulations and emotional overlays, thereby controlling the target's demeanor and temperament (e.g., aggression, demur, contemplative, hot tempered).

6. The Omnipotent Script / We Know All

This is a key component in both interrogation and manipulation, asserting the total control and supernatural knowledge of the handlers.

  • Methodology: The interrogator establishes an "all knowing eye" by displaying basic research into the target's background, then uses this facade to demonstrate they know more than they really do, encouraging the detainee to reveal secrets.
  • Gaslighting and Media Stalking: The most complex version involves "media stalking," where operators feed keywords and phrases to the target via neural communication or physical operatives. These terms then appear in controlled mass media frequently, making the target believe the media, television, and everyone is speaking directly to them and their situation. This helps convince the target that a massive, all-powerful super-intelligence (an "omnipotent being") is controlling their reality.

7. Humpty Dumpty Script

A straightforward, malicious program designed to inflict irreversible psychological damage. The goal is breaking the target mind to pieces so severely that "all the king's horses and men can't put him back together again," resulting in a mental crack or dysfunction.

8. Psycho-Bombs / Programmed Assassins

These are not single scripts but the resulting outcome of programming, often involving scripts like Alice in Wonderland or Angels and Demons used in conjunction with trauma-based conditioning to create Manchurian Candidates.

  • Creation: The assassination programming requires years, forcing the asset to visualize their mission repeatedly (like athletes visualize skills), injecting images of explosives and maps into their mind’s eye.
  • Self-Manipulative Murder/Suicide: The weapon system S.A.T.A.N. (Silent Assassination Through Adapting Networks) is designed to induce suicide, leading to "Self Manipulative Murder/Suicide" for maximum plausible deniability. This is achieved by amplifying destructive behaviors, addiction pathways, depression, and using subtle torture signals to shorten life plausibly.

IV. Additional Simulation and Sensory Manipulation Scripts

These scripts focus on creating specific sensory illusions or contextual frameworks to further terrorize or control the target.

Script/TechniqueDescription and Purpose (Codex Umbra Insight)
Darth Vader GripA remote choking technique achieved through perception warfare. The psychic soldier holds their breath or chokes themselves, cloning the suffocating sensation to the target. This technique uses a combination of subtle hypnotic commands and cloned physical sensations to simulate being choked.
Voodoo Doll SubprogramA malicious subroutine of the S.A.T.A.N. system for "no-touch torture." It allows the user to select and target specific points on the body (e.g., arm, stomach, eyes) to inflict specific pains such as burning, prick, poke, crush, or electroshock sensations, bypassing peripheral nerves and projecting the pain directly into the mind.
Angel FireCode name for an anti-missile defense system on jet fighters, but also used metaphorically in Gabriel and Angels and Demons scripts. The name is part of the religious metaphor permeating military weaponry.
Jesus Complex/Prophet ComplexInducing a delusion of grandeur, convincing the target they are "the one" who will save the world or receive messages from God (often combined with the Matrix script).
Borg/Hive MindThe target's mind is treated as part of a network (cybernetic hive mind), where their mental processes are duplicated and monitored (M.I.N.D. project). T.A.M.I. is jokingly referred to as the female Borg Commander.
Eureka and Miracles ScriptA cognitive warfare strategy to insert ideas by using the first-person voice for an inner thought, accompanied by induced gooseflesh (a biological parameter), making the target believe they conceived the idea themselves and that it is significant.