Internet Murder of Boy Scout Sam Hengel

Post date: Mar 25, 2020 8:57:16 PM

Rd-blog-1518 by Herb Zinser

The bio-computer interNET

. . . .the North Pole magNETic field .... Benjamin NETanyahu -

- - -> NET WAR

to control MariNETte, Wisconsin

- - > Boy Scout messenger

Sam Hengel warns world of

the NET wars … the

Underground ancient

COMPUTER EARTH

secret

atomic computer…...

Egyptian

BOOK of the DEAD software

attack that surfaced at

Marinette

Science war evolution --> Neutron Neuroscience wars --> math integer Internet wars --> biology Blog wars

Herb Zinser's detailed description of the Science wars and now the symbolic brain INTELLECT WARS with Nature's atomic English language as a brain DEFENSE military tool.

Modern BLOG gene wars USING BL = Base Locators and Benjamin Lewin

BLOG is a 4/7 algebra subset word of BIOLOGY leaving 3/7 at 370 degrees Celsius for the system 370 thermodynamics defense bio-computer.

RD-blog-1518

Boy scout Sam Hengel sacrificed his life to help save the world. His obvious SIGNAL is very important .....and has been deliberately ignored by citizens, governments, and universities.

Even his own group, the BOY SCOUTS of America have betrayed their pledge to the United States of America.

Sam Hengel and his subliminal mind intercepted various CARL JUNG collective unconsciousness signals and correctly interpreted the signals .... that there something very wrong ....... that major subconscious wars are going on ..... the deep down atomic brain ... social psychology SCIENCE WARS.

The brave intellectual spirit of Sam Hengel stepped up and defended Nature and the Central Nervous System 370 abstract brain symbolic computer from attack. His bravery .....and his tragedy sent an important cryptographic SIGNAL ....... that eventually was figured out by a serious thinker. But who else cares? Citizens could care less about anything ...they will not help understand the many facets of the social SCIENCE wars and the neuroscience secret language wars of society.

Sam Hengel, Marinette High School student who held classroom ...Nov 30, 2010 – Sam Hengel, Marinette High School student who held classroom hostage, ...

A Wisconsin teen

who held 23 students and a teacher hostage at ...

who held 23 students

who held 23 students

who held 23 students

who held 23 students

Adult BOY SCOUTS and former Boy Scouts are to intellectually lazy to even try to understand the situation. Instead they diminish

the 23 chromosome HERO

of the genetic wars --> Sam Hengel.

Cryptography - Wikipedia, the free encyclopedia

Cryptography - Dec 16, 2011 – the study of transforming information in order to make it secure from unintended recipients or use.

A review of cryptography protocols, algorithms, and design.

Cryptography www.crypto-class.org/Cached

Cryptography www.crypto-class.org/Cached

Cryptography www.crypto-class.org/Cached

Cryptography

www.crypto-class.org/Cached

crypto-class.org/Cached

crypto-class.org/Cached

cry + pto + class --> Cry point circle class

cry pto-class --> point at Steven K. at NIU, Cole Hall

cry pto-class --> point at Mr.CHO, Virginia Tech

cry pto-class --> point at Major NH - Fort Hood amino acids

cry pto-class --> point at Sam Hengel genetics warrior

Cryptography is an indispensable tool for protecting information in bio-computer chromosome/ brain systems. This course explains the inner workings of cryptographic primitives and

23 Chromosomes --> Base 2 math power 3 = 8 data bits ....

secrets of chromosome life ..picture below

Bio-computer -->cryptography protocols, algorithms, and design.

UPDATE:

EARTH LAB Police release

new details in disappearance of ...

www.nbc15.com › home › headlines › sheriff-15-year-old-waukesha...

Nov 14, 2013 - TOWN OF GENESEE (WITI) — The Waukesha County Sheriff's ... Kathryn Stalbaum, a freshman at Kettle Moraine High School, was last seen …

Cryptography - Wikipedia, the free encyclopedia

Cryptography - Dec 16, 2011 – the study of transforming information in order to make it secure from unintended recipients or use.

A review of cryptography protocols, algorithms, and design.

Thus Sam Hengel was protecting his biology system from the Internet BLOG war that is in process. The English language word BIOLOGY describes our mathematical-life ...specifically our high school algebra logarithms .....the mantissa and characteristic.

In the modern world, Darwinian evolutions of symbolic life involves our human data processing system. We are symbolic machines. These math components of bio-computer life are very important. The interNET communications systems has many good features and many abused features ..especially the usage of the interNET for excessive nonsense.

The copper wire INTERNET systems is an external system …

and

is a partial mirror/ a reflection of our internal bio-computer systems .....

collective unconsciousness, data stream of consciousness, schools of thought, States of MIND, etc. Dozens of different formats have been described in the last 400 years in literature ...... and in the last 100 years with social psychology theories and books.

Humans are biological computers.....have been for thousands of years. Now, we are biological symbolic processors. We receive input data into our eyes and ears ..... and other sources of data ..touch, smell, etc. The brain computer has to look at this input data ..... make decisions, etc.

.

BIOLOGY --> Bio + Log y (see math book of life)

BIOLOGY algebraic subset letters are

B..LOG --> Base Logarithms .......

Thus the copper wire/wireless INTERNET system

uses the WEB and BLOG format to allow humans

and their subconscious MIND to engage in REAL symbolic battles with other humans and their subconscious MINDS ......VIA the system.

Before the Internet, some television talk shows and radio talk shows engaged in Central Nervous System debates at the surface level ....... the data received by the listening audience was routed to their subliminal minds ...... and such a mind could mis-interpret the data.

Today, we have really had a battle of Central Nervous Systems using data streams composed of nouns, verbs, concepts, math equations, some pictures/graphics, etc. Thus the increase in university and high shootings in the last ten years; because the school systems are on such an ego trip ...they refuse to look at the ERRORS that independent researchers notice.

Northern Illinois University, Virginia Tech, and other universities have reached the epitome of arrogance ..... ignoring the empirical data of their tragedies. Irresponsible snobs that refuse to communicate properly and in a diplomatic fashion .... ought not be in charge of knowledge. Those school will not to help understand the deeper CAUSE behind the tragic EFFECT.

Some networks and data signals that exist in the modern world are listed below.

They are concepts .....that you have to think about. You have to complete the picture with a more explainable answer. Thus challenged ..... will you be an intellectual chicken?

The situation is more involved, but this is a good starting point.

All these symbolic components directly or indirectly can be inside the human brain.

C.P. Snow clearly stated that " Two Cultures" existed.

The book " Tale of Two Cities" reflected the same observation.

What are the 23 chromosome... biochemistry WAR secrets of Marinette?

DNA nucleotide ZIP code location 54143

zip code with 43 --> 4 exponent 3 = 64 codons.

Nucleic Acids to Amino Acids: DNA Specifies Protein |

Learn ...www.nature.com/.../

by A Smith - 2008 - Related articles

How can the four bases that make up DNA specify the 20 amino acids that ... It was also known that there are only four nucleotides in mRNA: adenine (A), ... However, a triplet code produces 64 (43 = 64) possible combinations, or codons. Thus ...

The Information in DNA Determines Cellular Function via

The three-letter nature of codons means that the four nucleotides found in mRNA — A, U, G, and C — can produce a total of 64 different combinations. Of these ...

Piercing the corporate veil Piercing the corporate veil

Piercing the corporate NET

At

Pierce Avenue in Marinette - Wikipedia,

Jump to Criminal lawý: In English criminal law there have been cases in which the courts ... received by a company have been regarded as having been 'obtained' by ... A court can " pierce" the carapace of the corporate entity and look at …

Basis for limited liability - Germany - United Kingdom - United States

Piercing the Corporate Veil legal definition of Piercing the Corporate

What does Piercing the Corporate Veil mean in law? ... The corporation today remains the most common form of business organization because, theoretically, …

Business Law - What does it mean to pierce the corporate veil?

In doing so, the creditor is asking the court to pierce the corporate veil and make the business owners personally liable for the debts, liabilities and obligations of ...

Piercing the Corporate Veil

QuickMBA / Business Law / Corporate Veil ... A court may pierce through the veil of liability protection if the corporation does not follow proper corporate ...

Piercing the Corporate Veil | Citizen Media Law Project

Jul 6, 2010 – Piercing the Corporate Veil. A properly formed and operated corporation or LLC offers its owners limited liability for the debts of the business, ...

Piercing the corporate veil Piercing the corporate veil

Piercing the corporate NET

At

Pierce Avenue at

Columbine High School

Secret education NET

Columbine High School piercing - Wikipedia

en.wikipedia.org › wiki › columbine_high_school_massacre

The Columbine High School massacre was a school shooting and attempted bombing that occurred on April 20, 1999, at Columbine High School in Columbine, ...

Thus we have a biology communications war ...with many facets. It needs to be understood.

Maybe, someday, cities will face REALITY and help understand how EARTH LAB works and affects our daily LIFE or DEATH.

NATURE decides who will represent the atomic social anthropology component of the Hierarchy Problem of physics. FermiLAB can't communicate, University of Chicago and other universities can't handle the simple process of communications; thus Darwinian atomic selection will decide whose human brain electron circuits has the electron node .... capable of working as a communications node.

The reader may just glance at the concepts below ..to be aware that they exist.

Please be aware that bio-computer systems have existed..... such as the ancient Roman empire ...was really built by bio-computers using the human processor.

Below, we see --> keys, one to lock or encrypt the

Thus you see that a few events, with incomplete explanation in newspapers.

--> Sam Hengel was involved in bio-computer battle .

--> The Penn State locker room

molestation issue ....

is a cover-up by Penn State administration to allow their computer science departments and biology departments to try to control the human bio-computer system ..... a major political power scheme ....to manipulate the human mind. Thus Penn State uses the decoy strategy of blaming Sandusky ...while the real lock error issue is ignored.

Penn State locker room

Penn State locker room

Penn State lock …..

A deadlock is a situation

in which

two computer programs sharing the same resource are effectively preventing each other from accessing the resource, resulting in both programs ceasing to function. The earliest computer operating systems ran only one program at a time.

What is deadlock? - Definition from WhatIs.com

two computer programs

two computer programs

two computer programs

Introduction of Deadlock

in Operating System

www.geeksforgeeks.org › introduction-of-deadlock-in-operating-syst…

Introduction of Deadlock

Introduction of Deadlock

Introduction of Dead …. Message 2

two computer programs

two computer programs

two computer programs

two computer programs

two computer programs

two computer programs

two computer programs

two computer programs

two computer programs

The September 11, 2001 Dialogue on

TWO = 2 = Dos = Double = Dual = two

It contains well written, well thought and well explained computer science and ... Deadlock is a situation where a set of processes are blocked because each ...

Washington, DC funds this type of project ...on the theory they will end up on top of the society pyramid. Nature has other ideas ...... and subset humans and their subset institutions are small potatoes compared to Nature's vast intellect and social VECTOR forces.

--> Virginia TECH secret voodoo tricks failed.

They tried to attack Nature's ENcrypt process .....hence

ENcrypt --> En + Cry + pt -->

English shooting + cry for dead students + point finger at Mr.CHO as solely responsible for the EVENT. The biggest line of BS ever invented in modern society ..... lies about the deeper CAUSES of the EVENT. Thus the LIES/schemes of Virginia ....... spread to Europe at the BATTLE of LIES at Liege, Belgium.

.

.

.

.

.

.

.

From the internet -->

Public-key cryptography refers to a cryptographic system requiring two separate keys, one to lock or encrypt the plaintext, and one to unlock or decrypt the cyphertext. Neither key will do both functions. One of these keys is published or public and the other is kept private. If the lock/encryption key is the one published then the system enables private communication from the public to the unlocking key's owner. If the unlock/decryption key is the one published then the system serves as a signature verifier of documents locked by the owner of the private key. Although in this latter case, since encrypting the entire message is relatively expensive computationally, in practice just a hash of the message is encrypted for signature verification purposes.

This cryptographic approach uses asymmetric key algorithms such as RSA, hence the more general name of "asymmetric key cryptography". Some of these algorithms have the public key/private key property; that is, neither key is derivable from knowledge of the other; not all asymmetric key algorithms do. Those with this property are particularly useful and have been widely deployed, and are the source of the commonly used name. The public key is used to transform a message into an unreadable form, decryptable only by using the (different but matching) private key. Participants in such a system must create a mathematically linked key pair (i.e., a public and a private key). By publishing the public key, the key producer empowers anyone who gets a copy of the public key to produce messages only s/he can read -- because only the key producer has a copy of the private key (required for decryption). When someone wants to send a secure message to the creator of those keys, the sender encrypts it (i.e., transforms it into an unreadable form) using the intended recipient's public key; to decrypt the message, the recipient uses the private key. No one else, including the sender, can do so.

How it worksThe distinguishing technique used in public key cryptography is the use of asymmetric key algorithms, where the key used to encrypt a message is not the same as the key used to decrypt it. Each user has a pair of cryptographic keys — a public encryption key and a private decryption key. The publicly available encrypting-key is widely distributed, while the private decrypting-key is known only to the recipient. Messages are encrypted with the recipient's public key and can be decrypted only with the corresponding private key. The keys are related mathematically, but parameters are chosen so that determining the private key from the public key is prohibitively expensive. The discovery of algorithms that could produce public/private key pairs revolutionized the practice of cryptography beginning in the mid-1970s.

In contrast, symmetric-key algorithms, variations of which having been used for thousands of years, use a single secret key — which must be shared and kept private by both sender and receiver — for both encryption and decryption. To use a symmetric encryption scheme, the sender and receiver must securely share a key in advance.

Because symmetric key algorithms are nearly always much less computationally intensive, it is common to exchange a key using a key-exchange algorithm and transmit data using that key and a symmetric key algorithm. PGP and the SSL/TLS family of schemes do this, for instance, and are thus called hybrid cryptosystems.

Thus we see CLUES to a puzzle regarding the BOY SCOUTS, FFA (Matt Anderson), 4-H Club and many other organizations in the United States AND their failure to understand simple concepts ...regarding Margaret Mead atomic nuclear family laws ....that is atomic social anthropology and atomic social philosophy. While these organizations are very good ..for the most part; they assume that they are superior to the laws of Nature and the 23 chromosome laws of Nature.

Thus we Nature's Darwinian selection of special agent Sam Hengel....

address 2139 Pierce Avenue.......MISSION

penetrate--> Pierce the Corporate Veil ...message

for agent--> Pier director of FermiLAB physics

and

the IRON CURTAIN problem of the

Fe = Ferrous Oxide atom and iron Hemoglobin protein thought ERRORS

at the Department of Energy and

the Fe = Federal government intellectual violations of Fe = 26 protons of Ferrous oxide atomic rules for human li.FE --> Margaret Mead atomic nuclear family LIFE VIA the periodic atomic table elements and their extension to humanoid expression FORMAT.

.

Sam Hengel, Marinette High School student who held classroom ...Nov 30, 2010 – Sam Hengel, Marinette High School student who held classroom hostage, ...

A Wisconsin teen

who held 23 students and a teacher hostage at ...

who held 23 students

who held 23 students

who held 23 students

who held 23 students FermilAB physics science Wars

Brain Science WAR signal Na --> North america -->

phonetics SOUND equivalent ( Sodium --> So dumb )

Thus Nature send subset humans a SRP signal .....for the

molecular cell biology SRP = Signal Recognition Particle.

molecular cell biology SRP

molecular cell biology SRP

molecular cell biology SRP code

molecular cell biology SRP

molecular cell biology SRP ….. Bush SR, President

Apparently this brain particle is missing in hundreds of millions of students and parents.

As Nature says 'If you don't use it ...you lose it" ....symbolic knowledge is modern food for thought. That is serious knowledge.. basic algebra, genetics, basic biochemsitry, etc.

We not talking rocket science .....we are talking some simple concepts ..like number 23 .....sends a message about the Margaret Mead atomic social science war with the Office of Science and DARPA and

the secret BRAVE NEW WORLD projects.

.

.

Thus we see the Margaret Mead atomic nuclear family signal .....

.......23 students held hostage --> 238 decay of human atomic brain.

Special BOY SCOUT undercover agent Sam Hengel ....

grammar emmitter messages of the event .... agent for

gamma information emmitters (Project atomic navigation )

SAM Hengel ...age 15 .. Gama ....map of the elements of atomic society life.

Vasco da Gama - The Portuguese navigator Vasco da Gama led an expedition at the end of the 15th century that opened the sea route to India by way of the Cape of Good Hope ...

-- the Portuguese BOY Scout navigator ..... from .......

www.ehextra.com/main.asp?SectionID=16&SubSectionID=63...‎

Dec 3, 2010 - He has been raised in Porterfield, Wis. and attended Marinette High School as a Sophomore. Sam was a proud member of the Boy Scouts of ....

the Boy Scouts of ....

the Boy Scouts of ....

the Boy Scouts of ....

the Boy Scouts (BS) interceptors …

the Boy Scouts of ....

the Boy Sc outs of ....

the Boy School BS teacher output data stream ....

-- the end of the 15th --> end of life age 15

-- that opened the sea route --> open the see route

-- to India --> to find intellectual america

by way of the Cape of Good Hope ...

-- the Maragret Mead atomic nuclear family hostage code 238 VIA code 23 HOSTAGES in Marinette

Thus SAM Hengel --> Message to Uncle SAM ..... from SAMPLE space ...that is the

mathematical-physics dimensions of the United States.

Introduction to M-theory - Wikipedia, the free

In non-technical terms, M-theory presents an idea about the basic substance of ... This was later increased to 11 dimensions based on various interpretations of ...

Background - Status - See also - References

M-theory - Wikipedia,

In theoretical physics, M-theory is an extension of string theory in which 11 dimensions are identified. Because the dimensionality exceeds that of superstring ...

M-theory applications and 11 dimensions

- Marinette theory of SKU 11. Thus a typical city that doen't pay attention to knowledge except pizza and sports. Do chromosomes exist? Is a football field part of Einstein's data field theory?

Why is the English class sentence -->

Twenty - four hours = 24 hours a day .....

math says 20 - 4 hours = 16 hours per day

M-theory physics war report ignored by newspapers

- Manhattan theory and 11-dimensions battle of Sept 11, 2001

Maybe some people will like to help think about these puzzles.

Some CLUES are mentioned above... provide a partial outline.

CONTACT: Principle science researcher HERB ZINSER

E-Mail: Herb@Zinoproject.com

Website: www.zinoproject.com