A covert operation or undercover operation is a military or police operation involving a covert agent or troops acting under an assumed cover to conceal the identity of the party responsible.[1] Some of the covert operations are also clandestine operations which are performed in secret and meant to stay secret, though many are not.
https://en.wikipedia.org/wiki/Covert_operation
https://en.wikipedia.org/wiki/Abduction
https://en.wikipedia.org/w/index.php?title=Break_and_enter&redirect=no
https://en.wikipedia.org/wiki/DCAT
https://en.wikipedia.org/w/index.php?search=amnestic+drug&title=Special%3ASearch&ns0=1
https://en.wikipedia.org/wiki/Implant
https://en.wikipedia.org/w/index.php?search=brain+tranpslant&title=Special%3ASearch&ns0=1
https://en.wikipedia.org/wiki/Brain_transplant?wprov=srpw1_0
https://en.wikipedia.org/w/index.php?fulltext=1&search=tresspassation&title=Special%3ASearch&ns0=1
https://en.wikipedia.org/wiki/Organ_transplantation
https://en.wikipedia.org/w/index.php?search=virtual+reality+signal&title=Special%3ASearch&ns0=1
https://en.wikipedia.org/wiki/Virtual_reality_applications
https://en.wikipedia.org/w/index.php?search=double+connect+state+match+drive&title=Special%3ASearch&ns0=1
https://en.wikipedia.org/wiki/Psychoacoustics
https://en.wikipedia.org/wiki/Human_trafficking_in_the_United_States
https://en.wikipedia.org/w/index.php?search=distance+incapacitation+weapon&title=Special%3ASearch&ns0=1
https://en.wikipedia.org/wiki/Non-lethal_weapon
https://en.wikipedia.org/wiki/Mobile_phone_jammer
https://en.wikipedia.org/wiki/Jammer
https://en.wikipedia.org/wiki/Radio_jamming
https://en.wikipedia.org/w/index.php?search=cognitive+incapacitation&title=Special%3ASearch&ns0=1
https://en.wikipedia.org/wiki/Assault
https://en.wikipedia.org/wiki/Incapacitating_agent
https://en.wikipedia.org/w/index.php?search=disinhibition+agent&title=Special%3ASearch&ns0=1
https://en.wikipedia.org/wiki/Psychoactive_drug
https://en.wikipedia.org/wiki/A_Midsummer_Night%27s_Dream
https://en.wikipedia.org/wiki/Oneirogen
https://en.wikipedia.org/wiki/Category:Psychedelics,_dissociatives_and_deliriants
https://en.wikipedia.org/wiki/Category:Crimes
https://en.wikipedia.org/w/index.php?search=drug+facilitated+assault&title=Special:Search&ns0=1&searchToken=34is5zo8afh203qvlvxe5eq20
https://en.wikipedia.org/wiki/Drug_Enforcement_Administration
https://en.wikipedia.org/wiki/Psychochemical_warfare
https://en.wikipedia.org/wiki/Unconsciousness
https://en.wikipedia.org/wiki/Demoralization_(warfare)
https://en.wikipedia.org/w/index.php?title=Psychochemical_weapon&redirect=no
Mass psychogenic illness (MPI), also called mass sociogenic illness, mass psychogenic disorder, epidemic hysteria, involves the spread of illness symptoms through a population where there is no infectious agent responsible for contagion.[1] It is the rapid spread of illness signs and symptoms affecting members of a cohesive group, originating from a nervous system disturbance involving excitation, loss, or alteration of function, whereby physical complaints that are exhibited unconsciously have no corresponding organic causes that are known.[2]
https://en.wikipedia.org/wiki/Mass_psychogenic_illness
Conversion disorder (CD), or functional neurologic symptom disorder, is a diagnostic category used in some psychiatric classification systems. It is sometimes applied to patients who present with neurological symptoms, such as numbness, blindness, paralysis, or fits, which are not consistent with a well-established organic cause, which cause significant distress, and can be traced back to a psychological trigger. It is thought that these symptoms arise in response to stressful situations affecting a patient's mental health or an ongoing mental health condition such as depression. Conversion disorder was retained in DSM-5, but given the subtitle functional neurological symptom disorder. The new criteria cover the same range of symptoms, but remove the requirements for a psychological stressor to be present and for feigning to be disproved. The ICD-10 classifies conversion disorder as a dissociative disorder,[1] and the ICD-11 as a dissociative disorder with unspecified neurological symptoms.[2][3] However, the DSM-IV classifies conversion disorder as a somatoform disorder.[citation needed]
https://en.wikipedia.org/wiki/Conversion_disorder
A somatic symptom disorder, formerly known as a somatoform disorder,[1][2][3] is any mental disorder that manifests as physical symptoms that suggest illness or injury, but cannot be explained fully by a general medical condition or by the direct effect of a substance, and are not attributable to another mental disorder (e.g., panic disorder).[4] Somatic symptom disorders, as a group, are included in a number of diagnostic schemes of mental illness, including the Diagnostic and Statistical Manual of Mental Disorders. (Before DSM-5[clarification needed] this disorder was split into somatization disorder and undifferentiated somatoform disorder.)
In people who have been diagnosed with a somatic symptom disorder, medical test results are either normal or do not explain the person's symptoms (medically unexplained physical symptoms), and history and physical examination do not indicate the presence of a known medical condition that could cause them, though the DSM-5 cautions that this alone is not sufficient for diagnosis.[1] The patient must also be excessively worried about their symptoms, and this worry must be judged to be out of proportion to the severity of the physical complaints themselves.[5] A diagnosis of somatic symptom disorder requires that the subject have recurring somatic complaints for at least six months.[6]
Symptoms are sometimes similar to those of other illnesses and may last for years. Usually, the symptoms begin appearing during adolescence, and patients are diagnosed before the age of 30 years.[7] Symptoms may occur across cultures and gender.[6] Other common symptoms include anxiety and depression.[6] However, since anxiety and depression are also very common in persons with confirmed medical illnesses,[8] it remains unproven whether such symptoms are a consequence of the physical impairment or a cause. Somatic symptom disorders are not the result of conscious malingering (fabricating or exaggerating symptoms for secondary motives) or factitious disorders (deliberately producing, feigning, or exaggerating symptoms).[9] Somatic symptom disorder is difficult to diagnose and treat. Some advocates of the diagnosis believe this is because proper diagnosis and treatment requires psychiatrists to work with neurologists on patients with this disorder.[6]
https://en.wikipedia.org/wiki/Somatic_symptom_disorder
Medically unexplained physical symptoms (MUPS or MUS) are symptoms for which a treating physician or other healthcare providers have found no medical cause, or whose cause remains contested.[1] In its strictest sense, the term simply means that the cause for the symptoms is unknown or disputed—there is no scientific consensus. Not all medically unexplained symptoms are influenced by identifiable psychological factors.[2] However, in practice, most physicians and authors who use the term consider that the symptoms most likely arise from psychological causes. Typically, the possibility that MUPS are caused by prescription drugs or other drugs is ignored.[3] It is estimated that between 15% and 30% of all primary care consultations are for medically unexplained symptoms.[4] A large Canadian community survey revealed that the most common medically unexplained symptoms are musculoskeletal pain, ear, nose, and throat symptoms, abdominal pain and gastrointestinal symptoms, fatigue, and dizziness.[4] The term MUPS can also be used to refer to syndromes whose etiology remains contested, including chronic fatigue syndrome, fibromyalgia, multiple chemical sensitivity and Gulf War illness.[5]
https://en.wikipedia.org/wiki/Medically_unexplained_physical_symptoms
https://en.wikipedia.org/w/index.php?title=Hysterical_blindness_(disambiguation)&redirect=no
https://en.wikipedia.org/wiki/Mass_psychogenic_illness
https://en.wikipedia.org/wiki/Folie_%C3%A0_deux
https://en.wikipedia.org/wiki/Herd_mentality
https://en.wikipedia.org/wiki/Hysterical_contagion
Damnatio memoriae is a modern Latin phrase meaning "condemnation of memory", indicating that a person is to be excluded from official accounts. Depending on the extent, it can be a case of historical negationism. There are and have been many routes to damnatio memoriae, including the destruction of depictions, the removal of names from inscriptions and documents, and even large-scale rewritings of history. The term can be applied to other instances of official scrubbing; in history the practice is seen as long ago as the aftermath of the reign of the Egyptian Pharaohs Akhenaten in the 14th century BC.
https://en.wikipedia.org/wiki/Damnatio_memoriae
https://en.wikipedia.org/wiki/Dementia
https://en.wikipedia.org/wiki/3-Quinuclidinyl_benzilate
https://en.wikipedia.org/wiki/Quinuclidine
https://en.wikipedia.org/wiki/Artificial_consciousness
https://en.wikipedia.org/wiki/Radiation-induced_cognitive_decline
https://en.wikipedia.org/wiki/Cognitive_deficit
https://en.wikipedia.org/wiki/brain_damage
https://en.wikipedia.org/wiki/BTR
https://en.wikipedia.org/wiki/TBI
Double consciousness is the dual self-perception[1] experienced by subordinated or colonized groups in an oppressive society. The term and the idea were first published in W. E. B. Du Bois's autoethnographic work, The Souls of Black Folk in 1903, in which he described the African American experience of double consciousness, including his own.[2]
Originally, double consciousness was specifically the psychological challenge African Americans experienced of "always looking at one's self through the eyes" of a racist white society and "measuring oneself by the means of a nation that looked back in contempt".[2] The term also referred to Du Bois's experiences of reconciling his African heritage with an upbringing in a European-dominated society.[3]
The idea of double consciousness is important because it illuminates the experiences of black people living in post-slavery America, and also because it sets a framework for understanding the position of oppressed people in an oppressive world. As a result, it became used to explain the dynamics of gender, colonialism, xenophobia and more alongside race. This theory laid a strong foundation for other critical theorists to expand upon.
https://en.wikipedia.org/wiki/Double_consciousness
Dual consciousness is a theoretical concept in neuroscience. It is proposed that it is possible that a person may develop two separate conscious entities within their one brain after undergoing a corpus callosotomy. The idea first began circulating in the neuroscience community after some split-brain patients exhibited the alien hand syndrome, which led some scientists to believe that there must be two separate consciousnesses within the brain's left and right hemispheres in competition with one another once the corpus callosum is severed.[1]
The idea of dual consciousness has caused controversy in the neuroscience community. No conclusive evidence of the proposed phenomenon has been discovered.
https://en.wikipedia.org/wiki/Dual_consciousness
In the mathematical field of category theory, an amnestic functor F : A → B is a functor for which an A-isomorphism ƒ is an identity whenever Fƒ is an identity.
An example of a functor which is not amnestic is the forgetful functor Metc→Top from the category of metric spaces with continuous functions for morphisms to the category of topological spaces. If and are equivalent metrics on a space then is an isomorphism that covers the identity, but is not an identity morphism (its domain and codomain are not equal).
References
- "Abstract and Concrete Categories. The Joy of Cats". Jiri Adámek, Horst Herrlich, George E. Strecker.
https://en.wikipedia.org/wiki/Amnestic_functor
Invisibility Cloak may refer to:
- Cloak of invisibility, a theme that has occurred in fiction
- Invisibility cloak (Harry Potter), a specific instance in the Harry Potter series
- Cloaking device, technology for partial or full invisibility to parts of the electromagnetic or acoustic spectrums
- Metamaterial cloaking, a type of cloaking using metamaterials
- Cap of invisibility (aidos kyneê in Greek), a mysterious helmet or cap that possesses the ability to turn the wearer invisible
- The Invisibility Cloak, a short novel by Chinese author Ge Fei.
https://en.wikipedia.org/wiki/Invisibility_Cloak
In classical mythology, the Cap of Invisibility (Ἅϊδος κυνέη (H)aïdos kyneē in Greek, lit. dog-skin of Hades) is a helmet or cap that can turn the wearer invisible,[1] also known as the Cap of Hades or Helm of Hades.[2] Wearers of the cap in Greek myths include Athena, the goddess of wisdom, the messenger god Hermes, and the hero Perseus. Those wearing the Cap become invisible to other supernatural entities, akin to a cloud of mist sometimes used to remain undetectable.[3]
https://en.wikipedia.org/wiki/Cap_of_invisibility
A cloaking device is a hypothetical or fictional stealth technology that can cause objects, such as spaceships or individuals, to be partially or wholly invisible to parts of the electromagnetic (EM) spectrum. Fictional cloaking devices have been used as plot devices in various media for many years.
Developments in scientific research[1] show that real-world cloaking devices can obscure objects from at least one wavelength of EM emissions. Scientists already use artificial materials called metamaterials to bend light around an object.[2] However, over the entire spectrum, a cloaked object scatters more than an uncloaked object.[3]
https://en.wikipedia.org/wiki/Cloaking_device
CLOAKING
In 1993, Helix Software Company's memory manager NETROOM 3 introduced a feature very similar to Novell's DPMS: CLOAKING was used to relocate Helix's and third-party drivers into extended memory[2] and run them at ring 0.[27] Providing its functions as an extension to the real-mode EMS and XMS interface, its protected mode services are available under INT 2Ch.[10][28] A CLOAKING developer's kit was available which included a NuMega SoftICE debugger.[29][30] Cloaked driver or TSR software hooking interrupts had to leave a small 11-byte stub in conventional memory which would invoke the CLOAKING server to pass execution to the protected mode portion of the driver software.[27]
CLOAKING includes support for operation under Windows 3.x and Windows 95, providing compatible INT 2Ch services to protected mode drivers via a Windows VxD, as well as debugging through Windows start-up using SoftICE. This ability to transition between protected mode host environments is also the subject of a patent.[31]
CLOAKING integrates into and works with existing virtual memory control programs, without switching descriptor tables or resetting the control registers. This allows for faster interrupt processing, according to Helix's documentation.[30][31]
In contrast to Novell's DPMS, Helix's CLOAKING driver can be loaded high,[7][nb 2] but it does not run on 286 machines,[7][nb 2] though it does support 16-bit services and program structure on a 386. Also, CLOAKING 2.01 has been found to be incompatible with the DR-DOS multitasker (EMM386 /MULTI[=ON] + TASKMGR).[7]
If no DPMS server is present when CLOAKING.EXE loads, CLOAKING will, by default, also provide a cloaked DPMS server at a mere 100 bytes increase of its DOS memory footprint.[14][7] However, it can also coexist with a DPMS server loaded before CLOAKING. The loading of its built-in DPMS server can be suppressed using the CLOAKING /NODPMS parameter.[7] DPMS-enabled drivers will work with both DPMS or CLOAKING, but not vice versa.[7]
In NETROOM v3.04, the Supplemental Disk distribution dated 10 February 1995 included the password-protected resource file NR.ZIP (679,271 KB) as an undocumented file; DPMSCLK.EXE (13,904 KB), "Cloaked DPMS Server v3.03". The file does not reveal support for any options or parameters when queried using the standard help option, DPMSCLK /? . This file is not unzipped by the NETROOM 3 SETUP.EXE program and does not install. There is no hint of the file's existence in the NETROOM 3 software manual[32] or any of the on-disk program documentation and human-readable files.[33] This final version of NETROOM as released basically ignored DPMS.
Helix licensed a version of Award Software's BIOS and developed cloaked system and video BIOSes which executed entirely in protected mode, reducing their real-mode memory footprint down to 8 KB (instead of 96 KB[10]) and used these as run-time BIOS in conjunction with their NETROOM memory manager.[7][28]
As part of their Multimedia Cloaking product, Helix provided cloaked versions of Logitech's MOUSE 6.33 driver, Microsoft's MSCDEX, and a home-grown disk cache to replace Microsoft's SmartDrive drivers.
There was also a product named Multimedia Stacker consisting of Stac's DPMS-enabled Stacker 4.01 with Helix's above suite of cloaked DOS utilities.[14][34]
The Logitech DOS mouse driver since MouseWare 6.50 was enabled to take advantage of CLOAKING as well, thereby reducing the mouse driver's memory footprint visible to DOS applications from 27 KB to 1 KB.[7]
CLOAKING was also licensed to Symantec for their utility suite, to Corel for their CD Creator and Corel SCSI products, and to SMC Networks for their Ethernet drivers.
Novell's DPMS utility may not be used to temporarily disable DPMS with a DPMS [/]OFF command if those DPMS services are provided by CLOAKING instead of DPMS itself, because Helix's implementation will erroneously not only disallow new drivers to register with DPMS, but completely switch off DPMS services even for already loaded drivers, leading to a system crash.[7]
https://en.wikipedia.org/wiki/DOS_Protected_Mode_Services#CLOAKING
Stealth technology, also termed low observable technology (LO technology), is a sub-discipline of military tactics and passive and active electronic countermeasures,[1] which covers a range of methods used to make personnel, aircraft, ships, submarines, missiles, satellites, and ground vehicles less visible (ideally invisible) to radar, infrared,[2] sonar and other detection methods. It corresponds to military camouflage for these parts of the electromagnetic spectrum (i.e., multi-spectral camouflage).
https://en.wikipedia.org/wiki/Stealth_technology
The Ring of Gyges /ˈdʒaɪˌdʒiːz/ (Ancient Greek: Γύγου Δακτύλιος, Gúgou Daktúlios, Attic Greek pronunciation: [ˈɡyːˌɡoː dakˈtylios]) is a hypothetical magic ring mentioned by the philosopher Plato in Book 2 of his Republic (2:359a–2:360d).[1] It grants its owner the power to become invisible at will. Through the device of the ring, this section of the Republic considers whether a rational, intelligent person who has no need to fear negative consequences for committing an injustice would nevertheless act justly.
https://en.wikipedia.org/wiki/Ring_of_Gyges
The philosopher's stone, or more properly philosophers' stone (Arabic: حجر الفلاسفة, romanized: ḥajar al-falāsifa; Latin: lapis philosophorum), is a mythic alchemical substance capable of turning base metals such as mercury into gold (chrysopoeia, from the Greek χρυσός khrusos, "gold", and ποιεῖν poiēin, "to make") or silver. It is also called the elixir of life, useful for rejuvenation and for achieving immortality;[1] for many centuries, it was the most sought-after goal in alchemy. The philosopher's stone was the central symbol of the mystical terminology of alchemy, symbolizing perfection at its finest, enlightenment, and heavenly bliss. Efforts to discover the philosopher's stone were known as the Magnum Opus ("Great Work").[2]
https://en.wikipedia.org/wiki/Philosopher%27s_stone
https://en.wikipedia.org/wiki/Category:Supernatural_legends
https://en.wikipedia.org/wiki/Category:Immortality
https://en.wikipedia.org/wiki/Category:Hypothetical_technology
https://en.wikipedia.org/wiki/Category:Fictional_technology
https://en.wikipedia.org/wiki/Cloaking_device
https://en.wikipedia.org/wiki/Time_travel_in_fiction
https://en.wikipedia.org/wiki/Teleportation_in_fiction
https://en.wikipedia.org/wiki/Warp_drive
https://en.wikipedia.org/wiki/Mindwipe
https://en.wikipedia.org/wiki/Simulated_consciousness_in_fiction
https://en.wikipedia.org/wiki/Astronomical_engineering
https://en.wikipedia.org/wiki/Evil_corporation
No comments:
Post a Comment