
Sign up to save your podcasts
Or


Substack Link (+ Resources & Video Links): https://theofficialurban.substack.com/p/cybernetics-1b
Robert Duncan Matrix Control Systems Album: https://imgur.com/a/matrix-control-systems-gCpKo7X
Cybernetics Album: https://imgur.com/a/cybernetics-YIy3E3J
We continue from where we left off (Pg. 25) in Pt 1a reading Chapter 1 of Robert Duncan's book "Project Soul Catcher" drawing more parallels between Computer Hacking & Mind/Biohacking.
Welcome back to the Urban Odyssey deep-dive into Dr. Robert Duncan’s "Project Soul Catcher." In Part 1b, we continue reading Chapter 1: Hacking Computer and Biological Systems. This episode explores the chilling technical parallels between Unix system processes and the manipulation of human consciousness.
Key topics covered in this session:
Queuing Executables: How triggers are placed in the human mind to execute hypnotic programs at a future date.
Buffer Overflows: The use of information overload to bypass logic checks and force behavioral changes.
Digital Spoofing: Mimicking voices and religious "deities" through synthetic telepathy to gaslight targets.
Perception Warfare: Jamming the human senses beyond the traditional five to induce confusion or compliance.
Daemons & ALICE: Background services used to control emotions and the "Artificial Linguistic Internet Computer Entity".
By Urban (@officialurbanus)5
1010 ratings
Substack Link (+ Resources & Video Links): https://theofficialurban.substack.com/p/cybernetics-1b
Robert Duncan Matrix Control Systems Album: https://imgur.com/a/matrix-control-systems-gCpKo7X
Cybernetics Album: https://imgur.com/a/cybernetics-YIy3E3J
We continue from where we left off (Pg. 25) in Pt 1a reading Chapter 1 of Robert Duncan's book "Project Soul Catcher" drawing more parallels between Computer Hacking & Mind/Biohacking.
Welcome back to the Urban Odyssey deep-dive into Dr. Robert Duncan’s "Project Soul Catcher." In Part 1b, we continue reading Chapter 1: Hacking Computer and Biological Systems. This episode explores the chilling technical parallels between Unix system processes and the manipulation of human consciousness.
Key topics covered in this session:
Queuing Executables: How triggers are placed in the human mind to execute hypnotic programs at a future date.
Buffer Overflows: The use of information overload to bypass logic checks and force behavioral changes.
Digital Spoofing: Mimicking voices and religious "deities" through synthetic telepathy to gaslight targets.
Perception Warfare: Jamming the human senses beyond the traditional five to induce confusion or compliance.
Daemons & ALICE: Background services used to control emotions and the "Artificial Linguistic Internet Computer Entity".

3,993 Listeners

3,439 Listeners

431 Listeners

9,488 Listeners

1,146 Listeners

5,976 Listeners

1,093 Listeners

623 Listeners

6,355 Listeners

46,368 Listeners

1,834 Listeners

1,374 Listeners

706 Listeners

413 Listeners

192 Listeners

2 Listeners

2 Listeners