of EL PASO, TEXAS => Customized Devices Application Form (CDAF) All Customized Device (CD) Types Links by Topics 2024 Catalog now on 1G Flash Drive (only $39 (includes USA S/H)) Lone Star Consulting, Inc.: Click CDAF Link above for Our Address VOICE (9-5 MST, M-F): [1-915-474-0334] (Prefer Email) No Payment Clearance Period: U.S. Postal Money Order or Cash Payment Clearance Period: Any Other Valid M.O., Check or Trade |
Email => Tekmaster [email protected] Who We Are + Privacy Policies + HTTPS Fallacies Sitemap - Other Policies | |
USA
Site - No cookies - No adware - No spyware - No trojans - No viruses -
No worms - No spam - No popups We Respect Your Privacy - We do NOT Monitor nor Track Your Activities Online, nor Share Your Data |
MF MIND CONTROL, ELECTRONIC
ATTACK, DETECTION, COUNTERMEASURES DEVICE-TYPES
LINK LIST: ALL EMF COUNTERMEASURE & DETECTION DEVICES
WARNING ALERT!
We are here to serve electronically Targeted
Individual (TI) victims to help save them from their perps. The perps hate
us for that! Just as TI perps are usually experts at harassing and persecuting
TIs, they use those same intentions against us. To discredit us, entrap
us, force us out of business, harass us, and get us into legal trouble.
Without us, perps can 'feast on your brains' with impunity. The perps have
their agents working social media, TI groups, complaint systems, etc. Do
NOT let perps scam you into not obtaining protective devices from us, thereby
leading you to their slaughter. Do NOT let perps trap you, set you up or
isolate you. Whatever insulting they say about you and us, the opposite
is true. If you have any questions or concerns relevant to us or anything
on our website, or are aware of suspicious activity against us, please email
us right away. We are custom device designers and makers for decades - with
many repeat Clients - all of our devices are unique and handmade to our
Clients' orders - so those who claim or imply that any (or all) of our devices
are this or that, they are lying - DO NOT FALL FOR PERP SCAMS!
REWARD - Please Tell Everyone
You Know About Us
Perps are Trying to Prevent TIs from Finding Us Online
We Can't Help TIs Stop Perp Attacks if TIs Don't Know We Are Here to Help
Them
Tell Friends, Family, Social Media, Word-of-Mouth, Publications
We Will Pay You 5% Finder's Fee of TI's Paid-Up CD Project if TI is Referred
by You
(Only One Finder's Fee Will Be Applied fob Each TI Customized Devices (CD)
Project: Referral Must be Made on CDAF Form)
OUR POPULAR MIND CONTROL INFO WEBPAGES:
Mind
Control Info Relevant to EMF and Sound Attacks + Countermeasure Devices
Links
Mind
Control Info on EMF Attacks + Countermeasure Devices Links (This
Webpage)
Mind Control
Info on Sound Attacks + Countermeasure Devices Links
OUR POPULAR EMF DEVICES DESCRIPTIONS WEBPAGES:
EMF, MICROWAVE,
RF SHIELDING WEBPAGE
EMF,
MICROWAVE, RF DETECTION, TRIANGULATING, LOCATING WEBPAGE
EMF,
MICROWAVE, RF JAMMING, MASKING, GENERATING & TRANSMITTING WEBPAGE
BUYING FROM US IS SIMPLE: (1) Select the Unique Customized Device(s) You Want on This or Any Other Page, (2) Click on the green CDAF Link above, (3) Print and Complete the CDAF Form (one CDAF for each Device), (4) Scan your completed CDAF on a scanner. (4) Mail or Email as scanned-in (not photographed) JPG or GIF image Files to Us Your CDAF(s). We Respond to You Within 3 Days About Your Proposed CD Project.
The ULTIMO INFRASONIC, AUDIO & ULTRASONIC JAMMER WITH SWEEP-1
(EMFs Version): See UUJ/IJ-EMF
for description of our UUJ/IJ-EMF, then BACK to here. New and unused successfully
completed and tested CD project - NOT a return, reject, repaired, refurbished
nor prior technology - just unclaimed by Client (cannot or will not respond).
Much reduced price! Buy TODAY - once this UUJ/IJ-EMF is sold, it
is gone forever!
AVAILABLE TODAY: One Ultimo Ultrasonic Jammer / Infrasonic Jammer (EMF
Version). Only $1795 +S/H ($19 Continental USA, else, email us for S/H). We ship within 3 work days upon receipt of full payment (pay by $US Postal Money Order
or cash only) and your completed CDAF form (green link above, email or USPS
mail to us). No waiting 2-3 working weeks for us to do your UUJ/IJ-EMF. Specify any
customizations you want added to UUJ/IJ-EMF in your CDAF (additional cost likely).
Need something else? Check out our webpages, then specify in your CDAF so we
can consider making it for you.
For Sale!
The ULTIMO EMF & ULTRASONIC HEAD SHIELD PROTECTOR (Shielded Helmet):
See SH for description of
our Shielded Helmet (SH) device-type, then BACK to here. New and unused successfully
completed and tested CD project - NOT a return, reject, repaired, refurbished
nor prior technology - just unclaimed by Client. Sizes we make: Small, Medium
and Large, almost always from motorcycle helmet with shielding extending to
the chin and neck areas. In this case, our Client contracted for her SH too
late, and the mind control attacks escalated so vile that she and her family
were forced to permanently flee the US to escape her perps to a country we could
not ship to, preventing us from shipping her completed SH.
Much reduced price! Buy TODAY - once this SH is sold, it is gone
forever!
AVAILABLE TODAY: One Shielded Helmet, Size Medium. Only $1195 +S/H ($75
Continental USA, else, email us for S/H). In addition, you save by not having
to buy and ship to us the basic helmet we shield. We ship within 3 work days
upon receipt of full payment (pay by $US Postal Money Order or cash only) and
your completed CDAF form (green link above, email or USPS mail to us). No waiting
2-3 work weeks for us to do your SH. Specify any customizations you want added
to SH in your CDAF (additional cost likely). Wrong size for you, or you need
something else? Check out our webpages, then specify in your CDAF so we can
consider making it for you (NOTE: Due to Covid-19, shipping chain chaos,
inflation/gouging, etc., availability of enough shielding materials for us to
make you a SH may not exist in enough quantity and/or be much higher priced).
For Sale!
The ULTIMO MINI HEAD SHIELD CAPS (Shielded Caps/Hats):
See SC/H for description
of our Shielded Caps/Hats (SC/H) device-type, then BACK to here. New and unused
successfully completed and tested CD project - NOT a returns, reject, refurbished,
repaired nor prior technology - just unclaimed by Client. Sizes we make: Small,
Medium and Large; almost always baseball cap types with no size-adjust cutouts
in the back. Some have ear flaps, back flaps or large brims, which we usually
also fill with shielding materials. Much reduced
prices!
AVAILABLE
TODAY: One Caps/Hats, Size Medium. Only $695 +S/H ($75 Continental USA,
else, email us for S/H). In addition, you save by not having to buy and ship
to us the basic caps/hats we shield. We ship within 3 work days upon receipt
of full payment (pay by $US Postal Money Order or cash only) and your completed
CDAF form (green link above, email or USPS mail to us). No waiting 2-3 work
weeks for us to do your SH. Specify any customizations you want added to SH
in your CDAF (additional cost likely). Wrong size for you, or you need something
else? Check out our webpages, then specify in your CDAF so we can consider making
it for you (NOTE: Due to Covid-19, shipping chain chaos, inflation/gouging,
etc., availability of enough shielding materials for us to make you a SH may
not exist in enough quantity and/or be much higher priced).
When the Government and law enforcement fail or refuse to protect you or treat you like a crackpot - which almost always happens - YOU must protect yourself! We are here to help you protect yourself.
Introduction to this Page
Customized Devices Application Form (CDAF)
PERP EVALUATION SERVICES: We are not licensed investigators, so we cannot investigate any perp-related activities. However, we can compare YOUR perp experiences with the reported perp experiences from our many past Clients over decades (Note: We never reveal or infer Client identities). What we do is to compare info that we have about your perps (whether or not you suspect or know their identities) and their modus operandi with those of other suspected perps reported to or discovered by us; and if we find reasonable connections, report them to you. Just as there are serial killers, serial rapists and serial burglars, there are clearly also serial mind control and electronic attack perps and repeat offenders, many of whom develop rituals, habits and patterns. If we can link any of them to you, we will reveal to you in our confidential report who we think they are and what additional links we made, to help you fight or avoid these attacks. And in all such cases, we will also, if you wish (another FREE service), contact our other known Clients (those we still have contact info on) linked to your perps to contact you, if they wish to. And provide you whatever added clues we have that may help you narrow your perps down and develop stronger cases. Serial perps, some of whom we suspect are "guns for hire" (similar to professional hit men), may operate in the same area, use the same/similar type of devices, signals, attack scheduling, and/or have other behaviors. If you contract with us for any mind control or attack-related customized countermeasure (shielding or jamming) or transmitter detection/location device from us, we will provide you this invaluable service for FREE for all of our Good Clients, in which case, complete the last questions of our Customized Devices Application Form (CDAF). Should you want us to do this service for you without contracting with us for any of our devices, then you still need to complete and provide us the CDAF for this service (be sure to provide us your CDAF's last questions info), in which case our rough Estimated Cost (EC) is $295 (Note: If within 30 days of contracting us for this service, you then contract with us for any device of $200+ EC, we will subtract 25% from your device's EC (up to $295 max)). If you suspect more than 10 perps, then provide us your info on each of the top 10 only. If we need more info relevant to your CDAF last questions answers to help us to make better correlations to provide you and possibly other TIs better service, we will ask you to provide it.
MIND CONTROL & ELECTRONIC ATTACK ANALYSIS
REPORT: Are you a Targeted Individual
(TI) being attacked by perpetrators using mind control and electronic attack
devices? There are so many signals out there being absorbed by your brain and
body, while most are not malicious, how can you tell for sure which signals
are harmful or malicious to you? Due to popular demand, we are now offering
our MC&EAAR service. How this works is that you provide us your data points
on the signals you receive using either a detection device we provided you as
an earlier separate unique CD Project (see below for detailed
descriptions of our popular mind control and electronic attack detection device
types) or from your own signal detection equipment. We then objectively
analyze your data points, and provide you a written report on our analysis of
your data points. Your "data points" consists of the detected signal
details and the resulting manifestations which you believe were caused by the
detected signals. "Detected signal details" consists of the signal
frequency, signal strength or signal power (eg: LED bar readouts,
volts/meter, dbm, gauss), direction (if you used
a directional antenna) and duration, and the date and time of signal
detection. "Resulting manifestations" consists of the physical, electronic,
electrical and/or equipment manifestations you experienced shortly after or
during a signal exposure, the duration of the manifestations, and date and time
of manifestations. One "data point" consists of one line of detected
signal details for each detected signal followed by one line of your observed
resulting manifestations. Please also include the make and model of your detection
device, a sketch(es) of the layout of the place where you experience these signals
showing your equipment setup, and any other relevant information which you believe
would assist our mind control and electronic attack analysis for you.
Last made $995 [1-5
lb] for up to 100 data points (if your data points exceed
100, add $75 for each additional 10 data points) you need analyzed.
(NOTE: We provide a 10% discount for our MC&EAAR services
if your detection device is one which we provided you earlier as a separate
CD Project (detailed descriptions of our popular mind control and electronic
attack detection device-types below); the estimated costs by us is for the analysis
and report only, it is not a retainer of any kind and does not include any mind
control or electronic attack expert witness services or any other services (if
you require additional services from us, you must provide us a new CDAF form
for each additional service for us to consider), it does not include any hardware
of any kind, and it does not include any onsite visits (we do not personally
meet with Clients) or travel by anyone; our analysis is solely based on the
information provided to us by the Client with his/her CDAF and assumes that
the Client's information is 100% accurate and complete; Client assumes full
responsibility for the accuracy and completeness of all of his/her information;
our analysis shall be objective, unbiased and with an open mind even if it differs
with the Clients own opinions or analysis; we will not identify any alleged
perpetrator(s) or their motives or intentions as that is beyond the scope of
our direct knowledge; and Client's costs are totally non-refunable once we have
completed our analysis).
Introduction to this Page
Customized Devices Application Form (CDAF)
EMF MIND CONTROL, ELECTRONIC ATTACK, DETECTION,
COUNTERMEASURES DEVICE-TYPES:
EMF,
MICROWAVE, RF SHIELDING WEBPAGE
EMF,
MICROWAVE, RF DETECTION, TRIANGULATING, LOCATING WEBPAGE
EMF,
MICROWAVE, RF JAMMING, MASKING, GENERATING & TRANSMITTING WEBPAGE
The Ultimo Infrasonic, Audio &
Ultrasonic Jammer with Sweep-1 (EMFs) - Most Popular with Clients!
Perp Evaluation Services
Mind Control & Electronic
Attack Analysis Report
The Ultimo EMF & Ultrasonic Head Shield
Protector (Shielded Helmet)
The Ultimo Mini Head Shield Cap
(Shielded Cap/Hat)
The Ultimo Shielded Face Mask
The Ultimo Sleep Head Shielded
Hood
The Ultimo EMF Shielded Bag/Box
The Ultimo Shielded Pet Sanctuary
The Ultimo Earmuffs Shield (Shielded
Earmuffs)
The Ultimo Powered/Non-Powered
Mobius Coils
The Ultimo Doug Coil Rife Machine
(PEMF Device)
The Ultimo Brainwave Shuffler
(Brainwave Frequency Shuffler)
The Ultimo Solfeggio
Harmonizer
The Ultimo 7 Chakras Harmonizer
The Ultimo Shielded Wrap (Protects Against
Implants and Remote Transmitters)
The Ultimo Full-Body Shielded
Raincoat
The Ultimo Velostat Electrostatic
Shield
Anti-Aging Cosmic Rays Deflector - Protect Yourself from Cosmic Rays to Slow Down the Aging Process!
The Ultimo Magnetic Body
Signal Blocker
The Ultimo Electrical
Body Signal Blocker
The Ultimo Pulsed
Neurophone Body Signal Blocker
The Stealth Paint "Elixer"
Wiring Hitchhiking Harasser Eliminators
(Phone Lines/Power Lines)
The Ultimo Mechanical EM
Transmitter Locator
The Ultimo EM Transmitter Direction
Finder
The Ultimo EM Transmitting
Electronic Implant Locator
The Ultimo EM Transmitter Triangulator
The Personal EMF Jammer
The Ultra Infrasonic Jammer / ELF
Jammer
The Ultimo Proximity Detector
& Alarm
The Programmable Ultrasonic/Audio/Infrasonic
Precision Frequency Generator
The Programmable Narrowband Frequency
Generator
The Ultimo LED Mind Control
Detector
The Ultimo Modulated LED Controller
The Ultimo Magnetic
Body Resonant Frequency Detector
The Brain Signature Waveform Detector
The Ultimo Brainwave Analysis &
Biofeedback/Biocontrol Device
The Automatic Writing Machine
The Ultrasonic Galvanic Skin
Response Correlator
The Omnimax TENS System
The Unknown & Unseen Entity
Detector
Scanners - The Device
The Ultimate Weapons & Lab Development
System
The Programmable Light &
Sound Detector
The Long-Range Infrared Detector
The Ultimo "Montauk Chair"
The 6th Sense Communicator
The Telepathic Amplifier
The Alien Buster Blaster
Super-Sensitive, Super-Directional
Antennas
The Very Flat & Thin Spiral
Antennas
The Super Soft-Pinch Electrodes
The Velostat Electrodes (with Meter)
High-Tech
Mind Control Attacks, Electronic Attacks, Countermeasures Customized
Device Types
Mind Control (Mindcon, MC), Neurological Weapons, Subliminal Mind Control, Body Control (Bodycon), Behavior Modification, Brain Entrainment, Brainwashing, Brainwave Signatures, Brain Entrainment, Remote Neural Monitoring (RNM), Mind Reading (Mindread), Mind Probing, Remote Influencing, Voice-to-Skull Technology (V2K, V2S), ELF Attacks, Electronic Attacks, Electronic Harassment (EH), Directed Energy Weapons Systems, Electronic Implants (EI) and Brain State Control / Brain State Monitoring, Microwave Attacks, Microwave Harassment, Microwave Mind Control, EMF Attacks (Electromagnetic Attacks), EMF Mind Control (Electromagnetic Mind Control), Circular Polarized Light Attacks, Carrier Current Attacks, Fluorescent Lighting Attacks, Brain Stimulations, Implanted Fake Memories, Implanted Thoughts, Manchurian Candidates, Electronic Gang Stalking, Manifestations, Electronic Countermeasures Products and Services. Unique, Original, Made-to-Order, Special Needs, Unusual, Strange, Weird Customized Device Types We Can Do For YOU! Backed by decades of Professional Design Experience! |
... and tell your friends! |
ARE YOU A TARGETED INDIVIDUAL (TI)?: John Williams's (MSEE) and his people's extensive electronic weaponry, electronic harassment devices, and Radionics devices researches and many projects - including on-site investigations of cases - have resulted in high levels of understanding and insights into electronic mind control and harassment techniques, technologies and manifestations, and especially their countermeasures and transmitter location devices. The technologies for powerful and invisible electronic attacks are proven to exist and are widespread (Online search: "Havana Syndrome", etc.) - attacks aimed at seriously injuring, harassing, controlling, crippling, and "electronic poisoning" people. While you are under electronic attack, you may or may not be aware you are being attacked; however, you will likely experience these manifestations while being attacked or later. Attacks can be by sounds (ultrasonic, audio, and/or infrasonic) or by electromagnetic that may cause sound sensations (Microwave Auditory Effect - MAE).
Manifestations: Do You:
Many of these manifestations may also be caused
by non-electronic attack reasons (eg: medical, normal mechanical/electronic
problems, etc.), of which you should thoroughly check out (eg: thru your
trusted, licensed medical personnel) and rule out if possible. But even
if these other often non-electronic manifestations are occurring, electronic
attacks aggravate most of these manifestations, so curing a medical problem
caused/not caused by an electronic attack may provide only limited and/or
temporary relief if electronic attacks were and still are aggravating them.
No matter what is causing your medical problems, you need your trusted licensed
medical doctors to address them. If due to electronic attacks, come to us
to try to stop them from worsening or reoccurring. Many voice, sound and
visual phenomena may not be experienced by others near you, or told by them
as normal or different sounds and/or sights. Having medical or normal electronic
device problems are not mutually exclusive conditions to being electronically
attacked - all can occur at same time. Perp attacks may be varied or unvaried
in signal type/intensity/timing/direction, and may target the brain, body,
and/or electronic devices. Some TIs experience multiple attacks and attack
technologies at the same time. If you are not certain that these manifestations
are being caused or aggravated ONLY by a medical condition(s), by a normal
mechanical/electronic malfunction(s) (eg: from wear and tear), or by some
other non-electronic or sound reason, they may be caused by or aggravated
by harmful electromagnetic signals or sounds. Note that not all injurious
EMF signals and sounds are intended to be malicious; and people differ in
sensitivities to EMF signals and sounds.
EXPERIENCING LITTLE OR NO MANIFESTATIONS OF ANYTHING?:
You still may be in grave danger of electronics attack. Consider: (1) Electronic
attack signals are often not observeable by any of your senses (but can
be detected using specialized electronic devices of the types we make).
(2) Electronic attacks can cause serious damage over a short or long time,
and you may not experience anything until a certain threshhold of damages
occurs, then suddenly all comes crashing down. An analogy is cancer: You
can have a cancer growing inside of you for years and feel nothing bad,
but then one day you suddenly become sick, and are told you are Stage 3
or 4. (3) Even if you are not being currently attacked, if a perp(s) starts
attacking you, if you are unprepared, it may be weeks before you can mobilize
effective defenses, which then may be too late. An anology is you might
carry bear spray with you even though you have never been attacked and have
no belief you will be attacked; but once attacked you can quickly defend
yourself. Without the bear spray, you may be killed or injured. You keep
locks on your doors to end the risks of being murdered, raped or robbed.
Same with seatbelts. The way mind control attacks are clearly accelerating
today, most people will be attacked within a few years to come, and many
attacked multiple times.
In today's world, you must assume that your perp(s) has
personal files on you (a dossier), describing realtime in detail you, your
family members, friends, associates, locations, schedules, facial and gait
recognition, habits, vulnerabilities, medical problems, financial situations,
etc., and perps know exactly which buttons-to-push to maximize your injuries,
pain and suffering. Dossiers were notoriously associated with Nazis, East
German Stasi, and communists - today, there are several-to-many dossiers
on almost everyone, and some are sold on the dark web. Since 2001, based
on reports we get, mind control attacks have been and are skyrocketing.
You may be the victim of injurious electromagnetic, ultrasonic, audio, and/or
infrasonic signals and sounds, which come in almost countless variations.
No matter what attack devices are used, it is critical to block or jam their
signals reaching you and your devices. We here to try to help you with
our very effective countermeasures (shielding, jamming) to stop the bad
signals from damaging you, and transmitter locators. Please let us try to
help you.
THE VERY HARMFUL EFFECTS OF MICROWAVES, ULTRASOUNDS AND INFRASOUNDS: The types and frequencies of mental disorders, including various forms of mental illness and dementia (Alzheimers is the most common form of dementia these days) we often see today virtually did not exist 150+ years ago. In some age groups, 50% of the people now have Alzheimers disease. If that happened 100 years ago, it would be all over the scientific and general literature. Most of the Biblical Prophets where very old men, yet they were widely sought after and greatly valued for their wisdom and insights. Some scientists have linked mental disorders to genes. You got your genes from your ancestors, so how come your ancestors didn't get dementia and very few of them were mentally ill? So what has changed? Now, we have many chemicals in our environment than ever before, so some chemicals are a factor (eg: mercury). What else has also greatly changed? 150+ years ago, there was no human-generated electromagnetic signals, ultrasonic signals and infrasonic signals in our environment. Today, our air is full of these signals, most of which are there for communications and entertainment purposes. Now, we have cellphones with powerful antennas blasting out electromagnetic signals just 2-3 inches from our brains. Now, ultrasounds perform many functions ranging from communications to medical to industrial to security. Now, we have infrasounds either modulating audio or ultrasonic signals or from large speakers or mechanical devices. We believe that these constant exposures all of our lives to intense electromagnetic, ultrasonic and infrasonic signals are progressively destroying the most sensitive, vulnerable and valuable part of our bodies - our brains - and are major causes of these clearly huge increases of devastating mental disorders (especially dementia and schizophrenia, and also likely brain cancers and childhood behavioral disorders). So, even if you do not believe that perps are using electronic weapons to attack you, it is clearly very wise to protect your brain and the brains of your loved ones from these brain-damaging assaults. So, please seriously consider our shielding countermeasures described on our mindcontrol webpages. You would not run out into a blizzard without a very good coat to protect your body, so stop running out into microwave, ultrasonic and infrasonic blizzards without protecting your brain!
HEALTHY BIOELECTRICITY IS CRITICAL FOR HEALTHY IMMUNE SYSTEM: Bioelectric signals come in two forms: Neural (ie: nervous system) and cellular. Either is in microvolts and microamps, and thereby easily disturbed by external EMFs. Cellular biolelectricity (or innate bioelectricity) is generated inside the cells themselves, with no connection to the nervous system. Bioelectricity is critical to immune system function, and innate bioelectricity is also critical to tissue repair and regeneration (Note: without excellent innate bioelectricity, you age faster). Bioelectric signals are even critical to cancer. Today, contagious bacteria, viruses and molds abound everywhere, and many are dying. Perps know how to expose your brain and body to dangerous signals that disrupt your normally protective bioelectric signals. And even non-malicious EMFs can be injurious to your immune system. You may feel constantly sick, listless, tired, or with many aches, pains and vague sensations, because your body is constantly fighting off infections with its EMF-caused weakened and disrupted immune system. If your trusted licensed doctor cannot identify an actual medical cause, then we believe it is likely caused by EMF fields plaguing you. Our EMF shielding devices should help you greatly. Please let us try to help you.
THE FICTION OF
EMF "SCALAR WAVES": When you run into a website or blog which
claims that EMF scalar waves in air exist, that website is very likely being
operated by scammers, government agents, and/or ignorant incompetents. Regardless
of how popular that website or blog is - CLOSE IT OUT. That website or blog
clearly has zero credibility for all its claims. The simple truth is: EMF Scalar
Waves do NOT exist as a form of EMF air transmission (scalar waves possibly
can exist in some very limited basis, for example, inside crystals, in quantum
mechanics). Electrical scalar fields and magnetic scalar fields do exist, but
fields are not waves. "Scalar waves" are also called electromagnetic
longitudinal waves, Maxwellian waves, or Teslawellen
waves, and are usually defined as longitudinally oscillating waves. A
simple example of the scalar wave concept is if you grab a slinky toy by its
ends and you move your hands like an accordion, the resulting oscillations are
scalar-wave like. EMF signals that might fit the common nebulous scalar wave
definition are ordinary repetitive frequency modulated (FM) and pulse rate modulated
(PRM) waves. From what we know, the scalar wave hoax originated as Russian disinformation
as a diversion to steer their electronic mind control victims (of which there
are many) into buying worthless scalar wave countermeasure devices, so their
victims would not attempt to countermeasure the actual forms of attacks their
agents were using. Scammers quickly latched onto the scalar wave bunk, because
they could then sell you very costly worthless devices to produce or countermeasure
a fictional threat - laughing at you all the way to their bank with your money.
NOTE: Simply because
the term, "scalar waves" appears in the same paper or article with
the name of a respected university and/or researcher means nothing - 100s of
such papers and articles are said to exist - unless the university or researcher
also clearly states that it/he/she has proven that EMF scalar waves exist (none
have that we know of). Many people associated with a university use its domain
name ".EDU" suffix. For example, just because "Einstein"
appears in 100s of articles about "luminiferous ether" (like EMF scalar
waves, this ether does not exist in nature), does not mean that Einstein ever
believed that luminiferous ether exists. Whenever someone insists that EMF scalar
waves exist, we ask them, "What term(s) in Maxwell's Equations proves
that EMF scalar waves exist?" We may also ask them, "Provide
us quotes from IEEE webpages which clearly state that EMF scalar waves exist
as a form of RF transmissions." And/or, "Provide us the makes
and model numbers of EMF scalar wave receivers." (No EMF scalar wave
receivers equals no EMF scalar wave transmitters, as you need a receiver to
prove that a transmitter works). And/or, "Which reputable engineering
schools teach classes in EMF scalar waves?" (None that we can find).
After dozens of such contacts over many years, we have never received even one
answer to our statements.
Why in the world would
anyone use some exotic form of RF mind control attack - even if it existed,
which it does not - when just ordinary RF does such a great job?
NOTE: Simply because
the person running a pro-scalar wave website or blog claims to be an "engineer",
"scientist" or "doctor" is meaningless, unless you can verify
that his/her engineering/science/medical degree and he/she has decades of experience
directly related to mind control and electronic attack technologies, and that
the person is not lying to you. Most of these "scalar wave" hoax sites
are up for short times - many fly-by-nights. Do not listen to anyone who can't
prove he/she has the relevant education, decades of experience and wherewithal
we have to do these very complex technologies. One recent scalar wave fraudster
told us that he had a "masters of engineering degree from Stanford University"
We repeatedly asked him, 'What engineering field is your degree in?'
He repeatedly refused to tell us. We were unable to verify that this person
ever received any kind of engineering degree from Stanford University. But apparently
he is making a great living swindling people with his pseudo-science BS.
FARADAY CAGES
(ie: FERMI CAGES) vs ELECTRONIC IMPLANTS: This may come as a shock to
you, but Faraday cages (Fermi cages) attenuate much less EMF signals generated
from inside the cage (including from transmitting electronic implants) passing
thru the cage than they attenuate the same kinds of EMF signals transmitting
into them. What this means to the TI with a transmitting-type electronic implant(s)
is that most Faraday cages provide them little actual protection from perps
who track them, monitor them, and/or harvest their brain and body data - possible
fatal case of false sense of security. However, our shielding devices (eg: Shielded
Helmet, Shielded Cap/Hat, etc.) are not constructed as Faraday cages, so they
also protect you from damages caused by transmitting-type electronic implants.
Also, unless constructed of thick ferromagnetic metals with little or no holes
and openings and heavily grounded to an earth ground, Faraday cages do only
a poor-to-moderate job shielding the occupant even from incoming EMF signals.
NEED
TO DEFEAT ELECTRONIC IMPLANTS (INCLUDING RFID CHIPS)?: Based on what
is most popular with our Clients and potential Clients who have expressed electronic
implant concerns (including RFID chips inside the body) (shielding does not
help because shielding only helps if the offending signal transmitter is located
outside the body):
(1) To jam or block electronic
implant signals, most popular is our
Ultimo Magnetic Body Signal Blocker.
(2) To locate a transmitting
electronic implant, most popular is our Ultimo EM Transmitting
Electronic Implant Locator.
TYPES OF ELECTRONIC IMPLANTS THAT CAUSE MUCH HIGHER SENSITIVITIES TO EMF ATTACKS: Clearly, people with medical implants (or had a implant that no longer works, or was removed, leaving embedded wires or conductive tubes) are clearly more sensitive to EMF attacks than those who have never had an implant. Electronic implants include likely 100s of variations of perp-planted electronic implants, including RFID chips, as well as the many different types of medical implants. These people must stay away from strong electromagnetic fields and electronic currents. Our shielding devices may be the best form of protection. As for medical implants, this is a list of some of them: Cardiac pacemaker, implanted cardoverter defribrillator, magnetically/activated/powered implant, neurostimular/spinal cord stimulator system, bone growth/bone fusion stimulator, cochlear/otologic/other ear implant, insulin/other infusion pump/implanted drug device, eyelid spring/wire, prosthetic appendage, metallic sten/coil/filter, spinal/intraventicular shunt, vascular access port/catheter, radiation seeds/implants, Swan-Ganz themodilution catheter, wire mesh implant, tissue expander (ie: breast enlarger), internal shrapnel, accidentally embedded metal, sugrical screw/nail/wire/plate/staple/clips, IUD/diaphragm/pessary, tattoo/permanent makeup, body piercing jewelry, implanted hearing aid. Medical and non-medical implants can also be used to both track and target certain TIs.
AVOIDANCE, SHIELDING, JAMMING, TRANSMITTER/PERP LOCATING: To protect yourself from mind control and electronic attacks, we have always advised TIs to avoid, shield against, jam against, or locate the transmitter and/or perp to take action against. However, more and more, TIs are telling us, 'I got rid of all of my electronic devices, and everything that is known to carry a GPS device, including my car, and I have travelled all over the world, even to remote places, but still, everywhere I go I am being relentlessly and continuously tracked and electronically surveilled and tortured by my perp!'. Up to about 20 years ago, the biggest problem by far was satellites. Satellites were great if the TI was outdoors, but if the TI was inside a large building, especially with a metal roof or iron rebar in its walls, satellites were avoidable. Today, we live in a far different world. Our world now is full of small electronic devices, there are Electronic Implants and Electronic Patches, cameras and mikes everywhere, AI with facial recognition, spy drones, helicopters, planes, social media, routine and continuous surveillance of your computer activities, etc. Many (and increasingly more) of these devices are made with built-in GPS - which location data is accessible to virtually anyone. Even some car tires are made with built-in GPS units. And there are now huge selections of small (many about the size of a wafer, and some with built-in mikes) GPS spy tracking devices sold by Walmart, many other stores, and Online, such as eBay and Amazon (legally sold ostensibly for people to track their wayward kids, pets, elders, personal property, equipment, vehicles, etc., but also widely used for stalking, and for setting up murders, rapes, robberies, burglaries and electronic attacks) - any of which can be easily attached to or slipped into a piece of furniture, equipment, vehicle, luggage, clothing, books, and almost anything else that is not already made with a GPS unit. We can no longer recommend AVOIDANCE as a practical means to protect yourself and loved ones against mind control and electronic attack perps. Shielding, jamming and transmitter-locating / perp-locating are your only effective options. Since government agencies are virtually worthless to protect you and your loved ones from mind control and electronic attacks, YOU MUST PROTECT YOURSELF.
STINGRAY TARGETING
DEVICES (STDs): One of several major examples is the Government's widespread
abuse of StingRay technology. StingRay devices mimic cellphone towers by capturing
and controlling all cellphone uses in its long reach, and capable of targeting
any number of those cellphone users it captures for, "special treatment".
At least 13 major Federal law enforcement and surveillance agencies routinely
deploy StingRay devices in their "toolkit", including but not limited
to, the military branches, FBI, CIA and IRS, plus 100s of state, local and other
non-Federal entities, clearly also including private entities. Government agency
internal regulations regarding StingRay uses, if any, are secret and vary from
none to little. StingRay devices are smaller than a small shoe box, and can
be placed almost anywhere, including buildings, vehicles, drones, helicopters,
airplanes, telephone posts, and even hidden behind non-metallic surfaces, including
walls, curtains, pictures, signs and inside valises, backpacks and packages.
The purchaser of a StingRay device signs a contract that states that he/she/it
will never disclose nor admit to having a StingRay device, so do not expect
Government officials and others to even admit generally to mind control or electronic
attack - much less do anything about it. StingRay devices are used in secret
to track and eavesdrop onto targeted cellphone conversations. More advanced
devices using this technology can lock onto brainwave signatures to electronically
verify who the cellphone user is, and track that TI, even if he/she switches
phones, and even deliver mind control and electronic attack signals to the cellphone
user.
"TIN BEANIES"
DO NOT PROTECT YOUR BRAIN FROM EMF ASSAULTS! While "Tin Beanies"
(ie: Tin Foil Beanies, Tin Caps, Tin Hats, Aluminum Beanies, Aluminum Foil Beanies,
Aluminum Caps, Aluminum Hats) may provide minor protection from EMFs, they are
also clearly a great danger by acting like parabolic dishes to reflect and focus
microwaves that have passed thru your unshielded face and head and then thru
your brain back onto parts of your brain, thereby much amplifying their power
on targeted brain tissues. The Tin Beanie does a very good job at blocking the
electrical field components of EMFs thru most of the EMF spectrum from reaching
the brain, but only if placed between the transmitter and your skull; however,
MIT research shows that the Tin Beanie amplifies signals at freqs near 1.2GHz
and 2.6GHz. The Tin Beanie works poorly to block the magnetic components. Freqs
around 1.2GHz and 2.6GHz are very popular with perps (and microwave ovens; around
2.6GHz for maximum absorption into meat), and the magnetic components are clearly
by far most dangerous for mind control and electronic attack. EMFs propagate
best thru non-metallic materials (eg: skull bone, and living
flesh). No matter how well you block one part of your head, EMFs will
easily penetrate thru other unshielded parts of your head and face from any
and all directions and easily reach your brain. The more intense the EMFs are,
the more that gets into your brain, and the more permanent brain damage can
result. Since you cannot consciously detect EMFs without special equipment (which
we can provide you), you have no way of knowing how intense and damaging EMFs
are. Your brain can be horrifically injured, your emotions exploding, hallucinations
and uncontrolled thoughts racing thru your head, and yet you may not have a
sensory clue as to why. EMF signals too strong may result in permanent dementia,
coma or death. Clearly, the only way you can fully protect yourself from both
EMF and ultrasound signals is with our popular SHIELDED
HELMET (link above) and our Ultimo Sleep Head Shielded Hood (Note:
We can also include infrasound shielding if you specify that). To shield
the rest of your body (including your head), click on our ULTIMO
SHIELDED WRAP link.
ARE YOUR CELLPHONES
AND OTHER ELECTRONIC DEVICES ATTACKING YOU?: We were informed by several
very reliable sources that built into some cellphones and other electronic devices
is a microwave coil or ultrasonic speaker and related circuitry which transmits
microwaves or ultrasounds into your brain when you use your cellphone or electronic
device. And that these added circuits are being used to identify brainwave signatures
(and thus user identities and locations of electronic devices with built-in
GPS units), and also for V2K, RNM, mind reading, implanting thoughts and inducing
mental illness type behaviors. We then randomly purchased several used cellphones
of various types, disassembled them, but was unable to find any known extra
circuitry. However, some of the cellphones have enough space inside of them,
clearly intentionally left, to allow retrofitting with small additional circuits.
Their signals may or may not work in conjunction with the normal signals of
the cellphone or device; there are a huge number of possible variations. We
suspect that when a TI is selected, somehow the perp obtains the TI's cellphone
or other electronic device and retrofits it with various mind control and surveillance
circuits. It is clearly not being factory-built into all cellphones (as is GPS)
and other electronic devices - at least not yet - to do so would much increase
likelihood of discovery followed by public outrage. Cellphones are perfect mind
control and surveillance devices because they are regularly placed a few inches
from your brain, so even weak and highly directional signals can be used. As
a unique Customized Devices (CD) project we can provide you special shielding
for your particular cellphone or electronic device to greatly attenuate unwanted
microwave and/or ultrasonic signals enterring your brain.
HOLOGRAPHIC MIND
CONTROL ATTACKS?: Back in the day, mind control and electronic attacks
were performed in a bludgeoning way - most or all of the brain was flooded by
the attack signals because pinpointing under normal non-laboratory access conditions
was virtually impossible to do. Sometimes, this led to unpredictable effects.
Mind control perps much prefer predictable effects. Now, brain pinpointing using
holographic techniques have been achieved. University of California at Berkeley
neuroscientists are refining methods on pinpointing precise locations in the
brain to activate or deactivate brain activity thru specific sets of neurons
there. These locations are pinpointed electromagnetically by using holographic
techniques. This means that remote external complete and precise control over
one's memories, thoughts, physical sensations and reactions have already or
will shortly be achieved. These all can now be erased or substituted with false
ones. Pain can be remotely induced or removed at precise areas of the body at
the flick of a switch. No longer will physical contact between the perp and
TI be required because electronic implants are no longer required to achieve
this level of precision. And this holographic mind control technology can also
be used to read the current settings of these neurons to read one's memories
and thoughts (ie: mind reading). And it can also be used to identify one's brain
signature as accurately as fingerprints.
Our Mind Control and Electronic Attack Countermeasure
Devices Now Come With Advanced Transient Suppression!
Many people these days, especially Online, claim
to sell mind control and electronic attack countermeasures and detection devices.
Clearly none of whom can match the relevant highly-specialized knowledge, experience,
equipment, parts, specialized materials, tools and facilities of Lone Star Consulting,
Inc. to actually be able to help mind control and electronic attack victims,
and most of whom are clearly outright frauds. Further, we are the only ones
we know of who now provide Advanced Transient Suppression Technology (ATST)
in our mind control and electronic attack countermeasure devices. All electronic
devices can be damaged or destroyed by common high-voltage transients from lightning
and defective high-voltage equipment and power lines, electrical arcs and coronas,
inductive kicks from high-voltage power interruptions, and static electric discharges.
Also, based on what we know, mind control and electronic attack predators are
increasingly resorting to directional high-pulse burst transmitters (pulse-type
directed energy transmitters), possibly even EMP, to wipeout costly countermeasure
devices deployed by mind control and electronic attack victims to protect themselves.
Our unique countermeasure devices now come with our ATST protection against
up to 1,500 watts of burst energy attack power (at no extra cost)
to foil even the most highly dedicated wipeout attack tactics, as well as to
help protect you from common forms of high-voltage transients.
CRITICAL IMPORTANCE OF RESEARCH DONATIONS: Mind control and electronic attacks are the scourge of this century! An horrific scourge that very few in law enforcement will even consider addressing, forcing TIs to go on their own. However, we at Lone Star Consulting, Inc., constantly do research in mind control and electronic attack technologies - for decades now. Clearly, new attack methods are constantly being developed by the perps. Our sophisticated scientific research is very costly to do (try buying a new spectrum analyzer lately?), and is paid for by both Clients who purchase devices from us and those who are smart enough to know that our research findings can translate into detection and countermeasure devices which can be applied to their specific problems and the problems of so many other TIs like them. These donors help support our research with their generous donations. In short, both paid projects and donations are highly welcomed and needed. So please contract for a Customized Devices (CD) project with us. And please donate as much as you can and as soon as you can. For those who provide us substantial donations, we will often steer our research in directions that may specifically help them. Furthermore, if we can find a way to legally provide valued donors the devices of interest to them that we do not normally provide to the general public, even if it requires a special development on our part, we will do our reasonable best to accommodate their specific needs. How much we are able to bend over backwards for a donor depends on the type of research, the device types the donor is interested in, and the relative magnitude of his/her donations compared to other donors also seeking our help relevant to the same research. We very strongly appreciate our valuable supporters, so please donate.
We Are Becoming Super Busy
- Please Send Us Your CDAF Today!
Due to an apparent serious upsurge of mind control
and electronic attacks and more people learning about us, we are becoming
loaded up with new projects. Please do not delay with your project(s). Upon
deciding what you want us to do for you, please click on green CDAF link at
top of page and send us your CDAF(s). Note: Mostly due to ever-increasing
parts costs and decreasing availabilities, we expect to raise our prices on
some of our device-types in the coming weeks and months. Also, we may have
to discontinue some device-types - later availabilities not guaranteed. Please
send us your CD Project CDAF (green link at top of our webpages) today.
We Are Now on Social Media
- Please Join With Us!
FACEBOOK and LINKEDIN
JOIN US ON FACEBOOK AS OUR SOCIAL MEDIA FRIEND
AND/OR ON LINKEDIN AS OUR SOCIAL MEDIA CONNECTION! As you likely know, we
recently joined FACEBOOK and LINKEDIN social media. To join us, you must first
email us directly to LONE STAR CONSULTING, INC., and explain to us why you
want to be social media-connected to us. NOTE: We never accept such requests
when they solely come through our social media sites - we regularly receive
100s of such requests mostly from totally unknown people. We are very selective
- your acceptance is much increased if you are a prior or current Client,
or a relevant serious researcher, expert, scientist or engineer. We are constantly
engaged in much exciting work that we would like to share with our social
media friends and connections. Most of our discussions on Facebook and LinkedIn
will relate to mind control, electronic attack, radionics, physical survival
and energy through increasingly worsening times. One big benefit is that LONE
STAR CONSULTING, INC. will provide free information found nowhere else (eg:
research results), which may be very helpful to you. Another big benefit is
that you will be able to share your experiences and needs with others who
may be or were in similar situations (eg: you are experiencing certain types
of mind control attacks, which may also be afflicting others in your area).
We do not accept just anyone as our social media friend or connection - we
seek a smaller but more focused and intense group. Interested in us friending
you? Then email us here, and in your Subject Line, put: "Please Friend
Me". In your email body, please explain in 100-500 words the benefits
to both of us in becoming social media friends (Facebook) or social media
connections (LinkedIn). Then tell your friends and connections about us! NOTE:
With few exceptions, we are not going to post up our friends on Facebook and
connections on LinkedIn until we have selected at least 500 Facebook friends
or LinkedIn connections. We are not yet on Twitter or MySpace. - Thanks. John Williams, M.S.E.E.
Hello! We support many technologies. For introduction into how to obtain hardware and our design philosophy, please click on our Home Page (includes hotlinks to all of our Device Types, listed by Topics and Titles): Home. Hotlinks by Topics and Titles also at: Site Map. When you are done, please use your Browser's Back Button to return here.
Can you spot electronic implants, and the
wire?
This is the actual CT-Scan of the chin, neck and upper back area of one Gary
D. Simmons of Australia, a former Navy diver who had been assigned to several
clandestine operations, reprinted with permission from Simmons and Consumertronics.net.
According to Mr. Simmons, one 'object' is in the spine at the jaw level; the
hole in the back of the neck shows a 'wire' running down towards a second 'object'
located between the trachea and the spine; there is yet a third 'object' below
the jaw. I see other strange 'objects.' Do you? Furthermore, he states these
were the results of a surgical operation and an official program in which he
and about 100 other elite Navy divers were subjected to as part of, 'medical
and mind drug experiments,' which he claims caused many premature deaths among
them!
For more info on this image and amazing story => www.harold-holt.net (click on Page 2 hotlink
on its bottom), then return HERE!.
DO NOT LET THIS KIND OF TRAVESTY HAPPEN
TO YOU!
Recently, the Lone Star Consulting, Inc. organization has received frantic calls involving great fears and concerns about an apparent recent alarming, shocking and frightening upsurge in mind control (mindcon), body control (bodycon) and other electronic attack and electronic harassment incidents (often also referred to as "directed energy weapons attacks" or "psionic attacks"). Clearly, these forms of electronic harassment attacks greatly increased since 9/11, and especially recently due to political and economic chaos. With chaos, electronic attacks are more likely ignored by the authorities, and victims become more hassled with other issues and more cautious about spending money even to protect themselves. Clearly, some electronic attackers are now electronically attacking their victims with impunity - more open electronic harassment attacks, accelerated electronic attacks, and more severe electronic attacks than ever before! If you do not believe that mind control and electronic attack devices are real and effective weapons - research these topics Online. Even so, what you will find is just a small bit of what is actually being done in these frightening and devastating technologies - no longer science fiction, even some now beyond science fiction. Most of the R&D is being done on top secret bases (eg: black projects) by our Government, various other governments, corporations, universities, criminal and terrorist organizations and individuals for numerous reasons. Today, virtually anyone who is a competent electrical engineer or electronic technician can design and make at least a crude mind control electronic attack weapon. One of many examples: We know that there were widespread uses of mind control devices in close states on election day in 2016 near polling places mostly by foreign perpetrators, which clearly dictated the final election results. Are you such a TI victim? It is more important than ever before for YOU to address these issues NOW! Our Government will likely never admit to these technologies, nor recent advancements in them, so it will do little or nothing to help you. As a TI, you are on your own! We believe we can help you. Lone Star Consulting, Inc. provides as a public service by providing our mind control / electronic attack tutorial to our Good Clients for those interested in electronic mind control (including RFID), electronic attacks, directed energy attacks (using directed energy weapons), electronic harassment, brainwashing, brain entrainment (eg: binaural beats), brain signatures, mind reading, voices in the head (eg: voice-to-skull or V2K/V2S technology (Frey Effect / Microwave Hearing Effect), and voice-of-God technology), Tempest brain monitoring, electronic body control, electronic implants and brain state control / brain state monitoring, Manchurian Candidates, and similar technologies and their countermeasures.
Microwaves (and ultrasonic sounds
and infrasonic sounds) require the specialized device-types we provide
(described below) to detect and countermeasure them because
they can't be sensed by normal human senses and their directions (many
are highly directional), bandwidths and ON times must be first determined
before they can be documented or countermeasured (note that infrasonic
sounds appear to be omnidirectional, thus location-finding can be very difficult,
and infrasounds are thus also very hard to countermeasure, especially if source
is distant). You may need to prove the existence and specific timing
and location of the mind control and electronic attacks (within
the applicable statutes of limitation), and then correlate your manifestations
with these attacks against you. Even then, to obtain substantial results you
would have to show that you mitigated the mind control and electronic attacks
to minimize your injuries, such as by jamming it
(which requires specialized electronic attack and mind control
countermeasures equipment of the types we also provide), and/or shielding
against it. And if you do all of this yourself as soon as you can, you stand
a much better chance of getting law enforcement to take a serious look at your
case as well. In virtually all cases, YOU, AND YOU ALONE, must obtain justice
in these types of cases (see our Mind
Control webpage for specialized equipment). You might fairly ask,
"How can I document mind control and electronic attacks using your specialized
equipment?" Permanent directional-recording and time-stamped recording circuitry
are very expensive because they add complications to any device made by anyone.
However, there is a cheap, easy and very credible way to do this. Use a video
camera and make a videotape or video disk of your experiences, which will document
your equipment set-ups, and its responses. Most modern cellphones have videotaping
capabilities. Leave a visible TV ON in the background and an accurate clock
so that you can also time- and date-stamp your videos. And/or have a reliable
and credible witness(es) with you.
TIs often ask us (after
reeling off several major bad manifestations they suffer from), 'What type of
EMF causes these things?' We tell them, there are so many different popular
modern wireless technologies today for possible mind control and electronic
attack exploitation, that it boggles the mind. Just to name some: 1G/2G/3G/4G/5G
(Cellular Bands), 802.15.4 (2.4GHz), Bluetooth (2.4GHz), LoRa (<1GHz), LTE
Cat 0/1 (Cellular Bands), NB-IoT (Cellular Bands), SIGFOX (<1GHz), Weightless
(<1GHz), WIFI (2.4GHz and 5GHz, <1GHz), WirelessHART (2.4GHz), ZigBee
(2.4GHz), Z-Wave (908.42MHz), plus others and more to come. The Cellular Bands
are the 824 - 896MHz, and 1850 - 1990MHz bands. NO NEED TO THROW YOUR ARMS UP
IN DESPAIR! We offer excellent solutions. For example, a major reason why so
many of our TI Clients contract for our Shielded Helmet and Shielded Cap/Hat
(described below) is that it makes little difference which wireless technology
is afflicting them, what frequency it is on, where the external transmitter
is located at, how the signals are modulated, what the perp's transmission schedule
is, or even if the signals are or are not intentionally malicious, our Shielded
Helmet and Shielded Cap/Hat will do excellent jobs to protect your brain because
very little, if any, of these harmful signals will reach your brain. Nor does
the type of wireless technology used against you much impact the functions of
our EM Direction Finder and EM Triangulator (described below).
QUESTIONS
ABOUT EMF SHIELDING MATERIALS: The EMF or electromagnetic field is composed
of both an electrical component and a magnetic component. Regarding mind control
and electronic attack, clearly, the magnetic component is by far the most dangerous
(while some selling non-ferromagnetic shielding disagree, they are WRONG!).
To substantially attenuate the magnetic component requires ferromagnetic metals.
Copper, brass, bronze, aluminum, titanium, tin, silver, gold, platinum, lead,
beryllium, graphite, carbon composites, carbon-coated plastic (eg: Velostat),
etc. are NOT ferromagnetic materials. Cost effective ferromagnetic metals are
limited to iron and most (but not all) steels (mu-metal, of which there are
several varieties, works best but it is very expensive). While conductive non-ferromagnetic
materials are pretty good at stopping the electrical component of the EMF (carbon
materials protect the least by far), they only have minimal effects on the magnetic
component (unless the frequency is above about 100KHz and the materials are
very thick and have no or tiny holes in them). Our special EMF shielding materials
include both ferromagnetic and non-ferromagnetic metals (but no carbon materials,
unless specifically contracted for on the CDAF in writing). For ionizing radiation
(eg: from uranium, radon, X-Rays, etc.), because of its very high density and
reasonable cost, lead is a very good shielding material, altho very heavy. However,
lead shields worse than copper and aluminum from electrical fields (non-ionizing
radiation).
MU-METALS: Mu-metals
are ultra absorptive of magnetic fields - so absorptive in fact that, if not
properly applied, saturates in even moderate magnetic fields. Once saturated,
mu-metal no longer protects. Therefore, mu-metals must be intelligently applied
to be optimally effective. Please just don't buy a piece of mu-metal, tuck it
inside your hat, and expect it to do a good job. If you need a mu-metal shielding
device-type - come to us - never do this on your own or rely upon some pseudo-scientist
Online scammer to provide you mu-metal shielding (or for any other reason).
Over the years, many
TIs have asked us about EMF shielding. Many of them made grossly erroneous statements
about EMF shielding, based on misinformation and disinformation they heard elsewhere.
The biggest error is about aluminum foil shielding - which we call the "aluminum
foil beanie myth" (decades ago, it was called the "tin foil hat"
myth). Many falsely believe that aluminum foils and copper foils greatly shield
against BOTH the electric and the magnetic components of EMF fields. The second
biggest mistake is to believe that some plastics impregnated with carbon (several
types, Velostat most well-known) also shield against mind control and electronic
attacks; these carbon-impregnated materials did much worse in our tests than
even aluminum and copper to shield against EMFs (if you still
believe that aluminum foil, copper foil or Velostat works, shield two caps/hats
with the material, then place them together with your cellphone in between,
then call your cellphone; when your cellphone rings, that's the proof they do
not work; you can even contract with us using a CDAF for us to shield these
caps/hats for you if you wish). Costly carbon impregnated materials (eg:
carbon composities) do work well in shielding against static electricity (but
not as good as aluminum foil or copper foil) and due to being very cheap, are
commonly used in antistatic packaging, but do very poorly against EMFs (their
resistances are far too high and vary wildly based on formulation and condition):
(A) No shielding material,
no matter what type, arrangement or thickness shields against 100% of an EMF
signal; but 99.9+% shielding is possible). We know of no cases where a weak
malicious signal caused mind control or electronic attack - all effective mind
control and electronic attack EMF signals are of at least moderate intensity
- therefore, even if you are being attacked by an intense EMF signal, with excellent
shielding you may be able to reduce it to a pipsqueak, thereby protecting yourself
from being attacked. You need shielding much more effective than just aluminum
foil.
(B) How well a metal
shields against any EMF signal depends on whether the signal is electric or
magnetic, the intensity of the EMF signal, the frequency and waveform of the
EMF signal (especially above 10MHz), the EMF shielding metals, the arrangements
of the EMF shielding metals, the thicknesses of the EMF shielding, the distance
the EMF shield is to the transmitter (to a smaller degree), and holes, tears
and defects in the shielding.
(C) The goal of the
EMF shielding is to MINIMIZE SIGNAL STRENGTH of the EMF signal passing thru
it, so that the offending external transmitter's signal is attenuated (ie: reduced)
as much as possible by your EMF metal shielding to protect YOUR brain and/or
body. Attenuating a mind control signal by just a little clearly does not help
you, and an aluminum foil beanie acts like a parabolic dish reflector (possibly
injuring you even much more by focusing EMF signal reflections onto critical
parts of your brain, see below).
(D) EMF shielding
is a very complex technology, but we try to make it simpler here:
(1) From our research, about 99% of all EMF mind control and electronic attack
signals are at frequencies between 50MHz and 2.4GHz.
(2) In most situations, reflection losses are less than 10% of absorption losses
in metal sheeting (but are much greater than 10% in the special non-sheeting
shielding metals we use).
(3) The losses stated below are the absorption losses only of aluminum and iron
metal sheeting to comparatively show you how far greater iron (a ferromagnetic
metal) shields against EMF when compared to aluminum (a non-ferromagnetic metal;
copper is a slightly better shield than aluminum).
(4) METAL TYPE/THICKNESS/SIGNAL FREQUENCY vs EMF ABSORPTION LOSSES (DB):
(A) ALUMINUM:
Thickness: 0.1mm (about 4 mils, the thickness of some aluminum foils): Signal
of 100MHz: 192db; 1GHz: 412db. --- Thickness: 1mm (about 40 mils): 100MHz: 1,149db;
1GHz: 3,361db.
(B) IRON: Thickness:
0.1mm: Signal of 100MHz: 1,247db; 1GHz: 3,986db (NOTE: Nearly 10 times more
protection in decibels than aluminum!) --- Thickness: 1mm: 100MHz: 12,4651db;
1GHz: 39,419db (NOTE: Nearly 12 times more protection in decibels than aluminum!).
(5) This clearly shows that iron provides far greater EMF shielding than does
aluminum (non-ferromagnetic metal). It is not even close!
(6) Mu-metal shields much better than even iron but is very expensive. Mu-metal
saturates at lower magnetic field levels than iron, thereby making mu-metal
less protective in very intense magnetic fields (eg: powerful perp transmitters,
electric power stations, high-voltage power lines, large electric transformers).
For mind control attacks using magnetic field signals, the magnetic field intensity
is almost always below the metal saturation point because mind control does
not require very high-powered signals - just moderately powered signals of the
right frequency and waveform (however, some perps may use EMF signals so intense
that they can cause dangerous heating of the skin and/or internal tissues, possibly
even burning them).
(7) Some of our device-types (below) employ shielding, and all of our EMF shielding
device-types include mostly ferromagnetic metals, optimally arranged for maximum
EMF shielding effectiveness.
PROOF
THAT ALUMINUM FOIL ALONE IS POOR SHIELDING: Cellphone GPS tracking is
a tool widely used today by perps to track and target TIs (10+
years ago, it was direct satellite). Cellphone and other handheld electronic
device users are rightly very upset and worried about their cellphones and other
handheld devices with embedded GPS being abused to track and target them on
a constant real time basis - even to be remotely secretly activated as room
mikes, video recorders, and even mind control devices. Jeffrey Epstein's sidekick,
Ghislaine Maxwell, was tracked by the FBI thru her cellphone GPS. This is in
spite of the fact that her cellphone was turned Off and wrapped in "tin
foil" layers (these days, aluminum foil is often called
tin foil or tinfoil; since actual tin foil is rare since about the 1940s, it
was very likely aluminum foil). Even if tin foil, tin's EMF signal blocking
properties are about the same as aluminum foil of the same thickness. This proves
that while multiple layers of aluminum foil or actual tin foil will reflect
some EMF signals, it is not enough to stop perps from cellphone-GPS tracking
you. Our tests show that it requires at least 50 layers of aluminum foil to
reliably work. Law enforcement, foreign governments, and major criminal and
terrorist organizations can defeat tracking avoidance tactics such as turning
Off your cellphone or switching to flight mode (if available
and activated on your phone). Without the right shielding, the only ways
to stop perps from tracking you thru your embedded GPS is to remove the batteries
(which are very difficult in cellphones because they are usually
inside the case), or to drain your battery down to the point that your
cellphone powers off, either of which makes the electronic device unuseable
by you on a practical basis. The only practical and effective method is to use
the right shielding materials, such as proprietary shielding materials we developed
and offer and provide in our great shielded devices. Jeffrey Epstein and Ghislaine
Maxwell may have been geniuses in certain areas, but when it comes to this mind
control technology, were DIY incompetents. This also underscores how worthless
are those commonly sold aluminum and silver blankets and RF shielded bags, falsely
touted as being protective against mind control and electronic attacks. Our
many and varied shielded devices are effective.
Our Mind Control and Electronic Attack Countermeasure Devices Now Come With Advanced Transient Suppression! Many people these days, especially Online, claim to sell mind control and electronic attack countermeasures and detection devices. Clearly none of whom can match the relevant highly-specialized knowledge, experience, equipment, parts, specialized materials, tools and facilities of Lone Star Consulting, Inc. to actually be able to help mind control and electronic attack victims, and most of whom are clearly outright frauds. Further, we are the only ones we know of who now provide Advanced Transient Suppression Technology (ATST) in our mind control and electronic attack countermeasure devices. All electronic devices can be damaged or destroyed by common high-voltage transients from lightning and defective high-voltage equipment and power lines, electrical arcs and coronas, inductive kicks from high-voltage power interruptions, and static electric discharges. Also, based on what we know, mind control and electronic attack predators are increasingly resorting to directional high-pulse burst transmitters (pulse-type directed energy transmitters), possibly even EMP, to wipeout costly countermeasure devices deployed by mind control and electronic attack victims to protect themselves. Our unique countermeasure devices now come with our ATST protection against up to 1,500 watts of burst energy attack power (at no extra cost) to foil even the most highly dedicated wipeout attack tactics, as well as to help protect you from common forms of high-voltage transients.
CRITICAL IMPORTANCE OF RESEARCH DONATIONS: Mind control and electronic attacks are the scourge of this century! An horrific scourge that very few in law enforcement will even consider addressing, forcing TIs to go on their own. However, we at Lone Star Consulting, Inc., constantly do research in mind control and electronic attack technologies - for decades now. Clearly, new attack methods are constantly being developed by the perps. Our sophisticated scientific research is very costly to do (try buying a new spectrum analyzer lately?), and is paid for by both Clients who purchase devices from us and those who are smart enough to know that our research findings can translate into detection and countermeasure devices which can be applied to their specific problems and the problems of so many other TIs like them. These donors help support our research with their generous donations. In short, both paid projects and donations are highly welcomed and needed. So please contract for a Customized Devices (CD) project with us. And please donate as much as you can and as soon as you can. For those who provide us substantial donations, we will often steer our research in directions that may specifically help them. Furthermore, if we can find a way to legally provide valued donors the devices of interest to them that we do not normally provide to the general public, even if it requires a special development on our part, we will do our reasonable best to accommodate their specific needs. How much we are able to bend over backwards for a donor depends on the type of research, the device types the donor is interested in, and the relative magnitude of his/her donations compared to other donors also seeking our help relevant to the same research. We very strongly appreciate our valuable supporters, so please donate.
HOW TO PICK
THE RIGHT DEVICE TYPE FOR YOU: If not a medical condition, your manifestations
may be caused by several different electronic attack / mind control scenarios.
You must analyze your situation, by asking yourself and answering these questions:
(1) When do these manifestations occur? (2) Where do they occur? (3) Do the
manifestations follow you all over? (4) Do they occur all together, or do you
get one or some sometimes and another or others other times? (5) Is there anything
you are doing which changes their intensity and/or frequency of occurrence either
up or down? (6) What is your body position when they occur? (7) What activities
are you engaged in at the time? (8) Do you have any idea where the offending
transmitter may be located and/or who operates it? (9) Who are with when they
occur? (10) When they occur, no matter where they occur, do you see any pattern
(eg: similar modus operandi, certain person or vehicle in the area, or certain
activity or situation that is almost alway present, a certain weather pattern,
or some other type of pattern)? (11) If you place a heavy wool blanket or sweater
over your head, do they still occur?* (12) If you place a large and deep steel
pot over your head, do they still occur? (13) Have you observed any unusual
or strange behavior by those suspected? (14) Is their behavior a predictor of
a current, past or an upcoming attack? (15) Is your behavior a predictor of
a current, past or an upcoming attack? (16) Is there anyone else around you
or in a similar situation who you know of also experiencing similar manifestations?
(17) Do other people, pets or other animals around you act differently just
before or while you are experiencing your manifestations? (18) Are you receiving
electrical shocks when you touch metal surfaces or run water? (19) What have
the police, FBI, FCC, your doctor, etc. tell you about your manifestations?
Please note that as policy we cannot recommend any device type as a device type
which will stop your manifestations - this decision is left totally up to you.
While we do guarantee that any device we provide you will electronically function
as specified, since we have no way of being able to ascertain your situation
ourselves, we cannot guarantee that the device will lessen or stop your manifestations.
*There is another simple way to test to see
if you are being attacked by ultrasounds or infrasounds: Today,
ultrasonic and infrasonic attacks are about as common as EMF electronic attacks
and are believed to occur combined with each other or with EMF attacks. And
clearly many people under electronic attack do not even know that their manifestations
are caused by electronic attacks. And many TIs who come to us for help know
or believe they are being attacked but don't know whether it is ultrasound,
infrasound or both and/or by EMF attacks in those same frequency bands. In
fact the test method below and the wool blanket method above should be periodically
done to find out exactly why you may be having manifestations - especially manifestations
with no known medical cause; and these methods should help you buy countermeasure
devices from us that you need and not to buy devices that don't address the
actual attacks you may be getting.
For ultrasounds and infrasounds,
hard walls act as vibrating sound boards and can be used to detect sounds you
cannot hear. The hard indoor walls which are at least your height, and when
you are completely still you can hear no sounds and feel no vibrations. There
must be an object (eg: shelf, rack, etc.) solidly attached to the wall for best
results. You fill a glass with water and set it on the attached object. You
then step away and be very quiet; make sure all vibration makers (eg: fans,
TVs, etc.) are off. Look at the water. Is it rippling (if you are feeling manifestations
but there is little or no rippling, then you may be attacked by EMFs only)?
If so, how intensely (ripple intensity indicates sound intensity)? If so, are
the ripples fine (indicates ultrasonics), or choppy or wave-like (indicates
infrasonic)? The wall amplifies the vibrations it is being subjected to, which
vibrations are transmitted to the water causing rippling. Audio sounds can also
cause similar ripples (but they are usually heard). So can nearby traffic, trains,
street work, industrial activities, construction activities, airports and airplanes,
mining/drilling activities (especially if they are injection wells), earthquakes,
ocean waves, and even people walking or chatting. Now, move the glass to a similarly
attached object to a second wall of the same type and roughly the same dimensions
that is perpendicular to the wall you just tested. Then answer the same questions
as above. If the rippling is now of a different type, that indicates a second
attack from a different direction. If there is much less or no rippling, then
the vibrations are coming perpendicular to the first wall. If the rippling is
the same type and about the same intensity, the vibrations are coming from about
45 degrees to both walls. If the rippling is mostly the same type but significantly
more or less on one wall than the other, then the direction of the vibration
is more perpendicular to the direction of the wall with the most intense ripples.
Most perp attacks, whether
using sounds or EMFs, come from a mostly horizontal direction to the TI. Doing
these tests on a horizontal surface (eg: a bare table top) won't give you significant
ripples from an horizontal transmitter as those produced by a hard wall, but
should much better indicate sounds transmitted from above or below because the
table top acts as the sounding board. If you use an horizontal surface, make
sure that the surface's wood or metal feet rests directly on solid floor. If
the wall or table is outside, the wind (no matter how light) will cause rippling.
And keep in mind that sound and EMF signals reflect well off of hard surfaces,
so to determine transmitter direction, you must consider nearby reflecting surfaces.
This method is also a powerful
tool to prove to others that you are indeed being attacked. If the sounds are
not audio (ie: infrasonic or ultrasonic), provide us a CDAF for a device which
will down-convert ultrasonic signals or up-convert infrasonic signals of the
attacking frequency to the audio band where the signal or noise level and fluctuations
thereof can then be easily video recorded in your home or workplace, along with
recording the ripples in the water the sounds or noises are causing. You make
this recording with a credible witness who will produce an affidavit. If the
intensity of the sounds correspond to the intensity of the ripples, then it
is reasonable to believe that the sounds caused the ripples. You then send copies
of it to authorities, your attorney, the newsmedia, etc. You then should be
in a stronger position to take whatever actions you need to stop the attack
and compensate you for attacks against you.
Can't spare the bucks to pay for your order? Want some of the items listed above but have some of your own that you would like to use as trade? Don't fret - you can still get what you want for little or no out-of-pocket-$ if you have an item(s) of trade we are interested in! If you don't want to trade, we may consider buying what you offer. Either way, let us know. Most of the specific items we are interested in are described on (email us first as there are some differences): www.consumertronics.net/items4trade.htm (Consumertronics Publisher of High-Tech Survival and Security Books, Manuals and Software, and Consultants).
The magnetometers. The maintenance. The medical. The meditation. The merchandise. The mind-body. The modify. The modification. The modifications. The neurophone. The neurophones. The neurophonic. The offers. The pemf. The phenomena. The phenomenon. The phobias. The pitch. The plans. The presence. The privacy. The products. The professional. The program. The prototyping. The psychokineses. The psychokinetic. The psionics. The radionics. The repair. The repairs. The reports. The reporting. The RFID. The robotic. The robots. The schematics. The security. The Sedona. The services. The shrieker. The specialized. The stimulations. The stimulators. The spying. The surveillance. The survival. The technical. The telepathic. The telepathy. The tens. The testing. The therapy. The theremin. The transponders. The troubleshoot. The troubleshooting. The tutorials. The UFOs. The unexplained. The updated. The upgraded. The uv. The zappers.
A: The "abducted by aliens." The "abducted by ETs." The "abducted by space aliens." The "abducted by UFOs." The "active electrodes." The "advanced brainwaves." The "advanced brainwave control techniques." The "advanced brainwave signature." The "advanced electronic attack techniques." The "advanced mind control techniques." The "alien abductions electromagnetic manifestations." The AI technology,The "alien artifacts." The "alien busters." The "alien capabilities." The "alien contacts." The "alien countermeasures." The "alien defenses." The "alien detection." The "alien detectors." The "alien detecting." The "alien electronic attacks." The "alien electronic implants." The "alien encounters." The "alien implant control." The "alien implant programming." The "alien implants." The "alien mind control powers." The "alien mysteries." The "alien phenomena." The "alien phenomenon." The "alien sightings." The "alien spies." The "alien transponders." The "alien weapons research." The "alien weapons systems research." The "alien weapons technologies." The "alpha brain waves." The "alpha brain wave control." The "alpha brainwaves." The "alpha brainwave control." The "alpha brainwave monitoring." The "alpha brainwave signals." The "alpha frequencies." The "alpha waves." The "altered states." The "aluminum foil shielding." The "analog circuits." The "animal attacks." The "animal behavior modification." The "animal control." The "animal mind control attacks." The "animal obedience training." The "animal subliminal mind control attacks." The "animal training."
The "artificial intelligence computers." The "artificial intelligence devices." The "artificial intelligence electronic attacks." The "artificial intelligence methods." The "artificial intelligence methods."The "artificial intelligence mind control attacks." The "artificial intelligence techniques." The "artificial intelligence technologies." The "artificial intelligence weapons." The "astral projections." The "attack signals." The "auditory cortex." The "auditory hallucinations caused by electronic attacks." The "auditory hallucinations caused by mind control attacks." The "aura detecting." The "aura detectors." The "aura phenomenon." The "automatic learning."
The "avoid electronic attacks." The "avoid electronic brain entrainment." The "avoid electronic entrainment." The "avoid electronic harassment." The "avoid electronic implant control." The "avoid electronic implant programming." The "avoid electronic implants." The "avoid directed energy weapons." The "avoid electronic mind control attacks." The "avoid electronic spying." The "avoid electronic subliminal mind control attacks." The "avoid electronic surveillance." The "avoid electronic torture." The "avoid mind control attacks." The "avoid pyschological control." The "avoid psychological entrainment." The "avoid subliminal mind control attacks." The "awesome circuit designs." The "awesome circuits." The "awesome devices." The "awesome electronic devices." The "awesome electronic gadgets." The "awesome electronics." The "awesome equipment." The "awesome gadgets." The "awesome hardware." The "awesome products." The "awesome projects." The "awesome science projects." The "awesome special projects."
B: The "BCI." The "beam death rays." The "beam torture weapons research." The "beam weapons systems research." The "beam weapons technologies." The "behavior control devices." The "behavior control technologies." The "behavior manipulation weapons systems research." The "behavior weapons systems research." The "behavioral control." The "behavioral modification." The "behavioral modifications countermeasures." The "behavioral programming." The "behavioral weapons systems research." The "beta brain waves." The "beta brain wave control." The "beta brainwaves." The "beta brainwave control." The "beta brainwave monitoring." The "beta brainwave signals." The "beta frequencies." The "beta waves." The "biocontrol devices." The "biocontrol experimentation." The "bioelectric signals." The "bioelectromagnetic signals." The "biofeedback devices." The "biofeedback experimentation." The "bioluminescence phenomenon."
The "body controls." The "body control conspiracies." The "body control countermeasure services." The "body control countermeasures." The "body control customized devices." The "body control detectors." The "body control devices." The "body control electrodes." The "body control electronic attacks." The "body control electronic implant control." The "body control electronic implant programming." The "body control electronic implants." The "body control electronics." The "body control experiments." The "body control methods." The "body control protection." The "body control satellites." The "body control shielding." The "body control slaves." The "body control stories." The "body control tactics." The "body control techniques." The "body control technology." The "body control technologies." The "body control consultants." The "body control consulting services." The "body control customized device services." The "body control customized devices." The "body control development services." The "body control designs." The "body control design services." The "body control devices." The "body control equipment." The "body control electronics." The "body control frequencies." The "body control hardware." The "body control implant control." The "body control implant programming." The "body control implants." The "body control countermeasure invention services." The "body control invention laboratory services." The "body control invention prototyping services." The "body control invention services." The "body control inventions." The "body control inventors." The "body control jamming issues." The "body control medical causations." The "body control medical manifestations." The "body control methods." The "body control products." The "body control prototype services." The "body control prototypes." The "body control prototyping services." The "body control R&D services." The "body control research, design and development services." The "body control research laboratories." The "body control research services." The "body control researchers." The "body control secrets." The "body control services." The "body control special projects services." The "body control shielding issues." The "body control special services." The "body control systems." The "body control tactics." The "body control techniques." The "body control testers." The "body control testing laboratories." The "body control testing services." The "body control troubleshooters." The "body control troubleshooting services." The "body control victims." The "body control weapons systems research." The "body/mind connection." The "body resonant frequency."
The "brain abnormalities caused by electronic attacks." The "brain abnormalities caused by mind control attacks." The "brain blasters." The "brain blaster technology." The "brain burn weapons systems research." The "brain burn weapons." The "brain circuits." The "brain control technologies." The "brain electrical circuits." The "brain electronic implants." The "brain entrainments." The "brain entrainment conspiracies." The "brain entrainment countermeasures." The "brain entrainment electronic implants." The "brain entrainment experiments." The "brain entrainment implant technologies." The "brain entrainment implant programming." The "brain entrainment implants." The "brain entrainment mind control attacks." The "brain entrainment processes." The "brain entrainment programming." The "brain entrainment secrets." The "brain entrainment systems." The "brain entrainment technologies." The "brain entrainment weapons." The "brain implant control." The "brain implant technologies." The "brain implants." The "brain inhibition experiments." The "brain inhibition techniques." The "brain inhibition technologies." The "brain inhibition technology." The "brain inhibitions." The "brain inhibitors." The "brain link." The "brain manipulation weapons systems." The "brain mapping." The "brain monitoring." The "brain network disorder." The "brain network dysfunction." The "brain scanners." The "brain scanning technology." The "brain signature scanning technology." The "brain state attacks." The "brain state control." The "brain state controllers." The "brain state electronic attacks." The "brain state entrainment." The "brain state methods." The "brain state mind control attacks." The "brain state monitoring." The "brain state programmers." The "brain state programming." The "brain state surveillance." The "brain state techniques." The "brain state technology." The "brain state weapons systems research." The "brain states." The "brain stimulation conspiracies." The "brain stimulation electronic implants." The "brain stimulation experiments." The "brain stimulation implant control." The "brain stimulation implant programming." The "brain stimulation implants." The "brain stimulation mind control attacks." The "brain stimulation processes." The "brain stimulation programming." The "brain stimulation secrets." The "brain stimulation systems." The "brain stimulation technologies." The "brain stimulation weapons." The "brain stimulations." The "brain stimulators." The "brain-to-computer interfaces (BCI)." The "brain trauma." The "brain wave signatures." The "brain wave signature detection technology." The "brain's circuits." The "brain's electrical circuits."
The "brainwave bandwidth." The "brainwave emotional clusters." The "brainwave entrainment conspiracies." The "brainwave entrainment electronic implants." The "brainwave entrainments." The "brainwave entrainment experiments." The "brainwave entrainment implant control." The "brainwave entrainment implant programming." The "brainwave entrainment implants." The "brainwave entrainment mind control attacks." The "brainwave entrainment processes." The "brainwave entrainment programming." The "brainwave entrainment secrets." The "brainwave entrainment systems." The "brainwave entrainment technologies." The "brainwave entrainment weapons." The "brainwave frequencies." The "brainwave signatures." The "brainwave signature detection technology." The "brainwashing countermeasures." The "brainwashing devices." The "brainwashing electronics." The "brainwashing experiments." The "brainwashing methods." The "brainwashing secrets." The "brainwashing systems." The "brainwashing technology." The "brainwashing torture." The "brainwashing weapons." The "brainwave analysis techniques." The "brainwave control." The "brainwave controlling." The "brainwave entrainment." The "brainwave modulation." The "brainwave monitoring." The "brainwave scanning." The "brainwave signature analysis." The "brainwave signature scanning." The "brainwave signatures." The "brain wave scanning." The "brain wave signature scanning." The "brain wave signatures." The "burn weapons systems research." The "burn weapons technology."
C: The "carbon impregnated Velostat." The "carrier current attacks." The "carrier current countermeasures." The "carrier currents." The "carrier current mind control attacks." The "carrier current transmitters." The "carrier current receivers." The "cellphone electronic attacks." The "cellphone mind control attacks." The "cellphone subliminal mind control attacks." The "cellular bioelectricity." The "cellular phone electronic attacks." The "cellular phone mind control attacks." The "cellular phone subliminal mind control attacks." The "cell phone electronic attacks." The "cell phone mind control attacks." The "cell phone subliminal mind control attacks." The "chronic pain syndrome." The "circuit customizing." The "circuit designs." The "circuit designing." The "circuit integration." The "circuit inventions." The "circuit inventing." The "circuit modifying." The "circuit modifications." The "circuit prototyping." The "circuit repairs." The "circuit repairing." The "circuit testing." The "circuit troubleshooting." The "circuit upgrades." The "circuit upgrading." The "circular polarized light attacks." The "Cointelpro operations." The "collateral damage from brainwashing experiments." The "collateral damage from electronic attack experiments." The "collateral damage from mind control experiments."
The "commercial satellite control of mind control devices." The "commercial satellite control signals." The "commercial satellite electronic attacks." The "commercial satellite mind control attacks." The "commercial satellite mind control systems." The "commercial satellite signals." The "commercial satellite spies." The "commercial satellite spying systems." The "commercial satellite subliminal mind control attacks." The "commercial satellite surveillance systems." The "commercial satellite tracking systems."
The "communicating telepathically." The "complex waveforms." The "constellation of manifestations." The "constellations of symptoms." The "constellation of manifestations." The "constellations of symptoms." The "cordless phone electronic attacks." The "cordless phone mind control attacks." The "cordless phone subliminal mind control attacks." The "control of the mind." The "control minds." The "controlled offensive behavior." The "cool circuit designs." The "cool circuits." The "cool devices." The "cool electronic devices." The "cool electronic gadgets." The "cool electronics." The "cool equipment." The "cool gadgets." The "cool hardware." The "cool products." The "cool projects." The "cool science projects." The "cool special projects." The "countermeasures against behavioral modification attacks." The "countermeasures against brain entrainment attacks." The "countermeasures against brainwashing attacks." The "countermeasures against body control attacks." The "countermeasures against directed energy weapons attacks." The "countermeasures against electronic attacks." The "countermeasures against electronic gang stalking attacks." The "countermeasures against electronic harassment." The "countermeasures against mind control attacks." The "countermeasures against mind reading attacks." The "countermeasures against subliminal mind control attacks." The "countermeasures technology." The "counter measures technology." The "CPL mind control attacks." The "creative dreaming - creative genius." The "creative genius creative dreaming."
Customized: The "custom-made circuits." The "custom-made consulting." The "custom-made designs." The "custom-made devices." The "custom-made equipment." The "custom-made hardware." The "custom-made inventions." The "custom-made merchandise." The "custom-made modifications." The "custom-made offers." The "custom-made products." The "custom-made product offers." The "custom-made repairs." The "custom-made services." The "custom-made solutions." The "custom-made upgrades." The "custom make circuits." The "custom make consulting." The "custom make designs." The "custom make devices." The "custom make equipment." The "custom make hardware." The "custom make inventions." The "custom make merchandise." The "custom make modifications." The "custom make offers." The "custom make products." The "custom make product offers." The "custom make repairs." The "custom make services." The "custom make solutions." The "custom make upgrades."
The "custom makes of circuits." The "custom makes of consulting." The "custom makes of designs." The "custom makes of devices." The "custom makes of equipment." The "custom makes of hardware." The "custom makes of inventions." The "custom makes of modifications." The "custom makes of merchandise." The "custom makes of offers." The "custom makes of products." The "custom makes of product offers." The "custom makes of repairs." The "custom makes of services." The "custom makes of solutions." The "custom makes of upgrades." The "customize circuits." The "customize consulting." The "customize designs." The "customize devices." The "customize equipment." The "customize hardware." The "customize inventions." The "customize merchandise." The "customize modifications."The "customize offers." The "customize products." The "customize product offers." The "customize repairs." The "customize services." The "customize solutions." The "customize upgrades."
The "customized circuits." The "customized consulting." The "customized designs." The "customized devices." The "customized equipment." The "customized hardware." The "customized inventions." The "customized merchandise." The "customized modifications."The "customized offers." The "customized products." The "customized product offers." The "customized repairs." The "customized services." The "customized solutions." The "customized upgrades." The "customizing circuits." The "customizing designs." The "customizing devices." The "customizing equipment." The "customizing hardware." The "customizing inventions." The "customizing merchandise." The "customizing offers." The "customizing modifications." The "customizing products." The "customizing product offers." The "customizing repairs." The "customizing services." The "customizing solutions." The "customizing upgrades."
D: The "DARPA programs." The "death ray beams." The "death rays." The "Defense Advanced Research Projects Agency (DARPA) programs." The "defense against aliens." The "defense against ghosts." The "defense against unknown entities." The "defense against unknown presences." The "delta brain waves." The "delta brain wave control." The "delta brainwaves." The "delta brainwave control." The "delta brainwave monitoring." The "delta brainwave signals." The "delta frequencies." The "delta waves." The "demodulate brainwaves." The "demodulated brainwaves." The "demodulation of brainwaves." The "demodulate modulated brainwaves." The "demodulated modulated brainwaves." The "demon governments." The "demons controlling your mind." The "demons inside your head." The "designing circuits." The "designing devices." The "designing equipment." The "designing hardware." The "designing products." The "designing services."
The "detect aliens." The "detect attacks." The "detect electronic attacks." The "detect EMF attacks." The "detect electromagnetic attacks." The "detect microwave attacks." The "detect brain entrainment attacks." The "detect brainwashing attacks." The "detect electronic attacks." The "detect electronic brain entrainment attacks." The "detect electronic entrainment attacks." The "detect electronic harassment." The "detect electronic implant control." The "detect electronic implant programming." The "detect electronic implants." The "detect electronic mind control attacks." The "detect electronic spying." The "detect electronic subliminal mind control attacks." The "detect electronic surveillance." The "detect electronic torture." The "detect ghosts." The "detect implant control." The "detect implant programming." The "detect implants." The "detect lightning conditions." The "detect mind control attacks." The "detect pain field generator attacks." The "detect subliminal mind control attacks." The "detect unknown entities." The "detect unknown presences."
The "device customizing." The "device designs." The "device designing." The "device inventions." The "device integration." The "device inventing." The "device modifying." The "device modifications." The "device prototyping." The "device repairs." The "device repairing." The "device testing." The "device troubleshooting." The "device upgrades ." The "device upgrading." The "digital circuits." The "directed energy weapons research, design and development." The "directed energy weapons technologies."
The "directed energy attack devices." The "directed energy attacks." The "directed energy behavioral modification techniques." The "directed energy body control techniques." The "directed energy brain entrainment techniques." The "directed energy brainwashing techniques." The "directed energy brainwave entrainment techniques." The "directed energy countermeasures." The "directed energy devices." The "directed energy harassment." The "directed energy mind control techniques." The "directed energy subliminal mind control attacks." The "directed energy techniques." The "directed energy technologies." The "directed energy weapon attacks." The "directed energy weapon harassment." The "directed energy weapons systems research." The "directed energy weaponry technologies." The "directed energy weapons countermeasures." The "directed energy technologies." The "directed energy torture weapons systems research." The "directed energy weapon." The "directed energy weapons conspiracies." The "directed energy weapons electronic implants." The "directed energy weapons experiments." The "directed energy weapons implant control." The "directed energy weapons implant programming." The "directed energy weapons implants." The "directed energy weapons mind control attacks." The "directed energy weapons processes." The "directed energy weapons programming." The "directed energy weapons secrets." The "directed energy weapons systems research." The "directed energy weapons technologies." The "directed energy weapons." The "directed energy weapons design and development." The "directed energy weapons development." The "directed energy weapons research, design and development." The "directed energy weapons systems technologies." The "directed energy weapons techniques." The "directed energy weapons technologies."
The "Discovery Channel's MythBusters program." The "Discovery Channel's MythBusters TV program." The "Doug Coil RIFE devices." The "Doug Coil PEMF devices." The "dsm iv."
EA-EL: The "emf attacks." The "emf brain stimulations." The "emf mind control attacks." The "electrical brain inhibitions." The "electrical brain stimulations." The "electrical electrodes." The "electrical experiments." The "electrical inhibition of the brain." The "electrical stimulation of the brain." The "electrode implanted." The "electrode implanting." The "electrode implant control." The "electrode implant programming." The "electrode implants." The "electrode recordings." The "electrode stimulations." The "electromagnetic attacks." The "electromagnetic blockers." The "electromagnetic countermeasures." The "electromagnetic defenses." The "electromagnetic detection." The "electromagnetic detectors." The "electromagnetic electrodes." The "electromagnetic eliminators." The "electromagnetic jammers." The "electromagnetic protectors." The "electromagnetic protection." The "electromagnetic repellents." The "electromagnetic repellers." The "electromagnetic repulsers." The "electromagnetic weapons.
The "electromagnetic attack blockers." The "electromagnetic attack countermeasures." The "electromagnetic attack defenses." The "electromagnetic attack detection." The "electromagnetic attack devices." The "electromagnetic attack electrodes." The "electromagnetic attack equipment." The "electromagnetic brain stimulations." The "electromagnetic attack hardware." The "electromagnetic attack detectors." The "electromagnetic attack eliminators." The "electromagnetic attack experiments." The "electromagnetic attack jammers." The "electromagnetic attack methods." The "electromagnetic attack protectors." The "electromagnetic attack protection." The "electromagnetic attack repellents." The "electromagnetic attack repellers." The "electromagnetic attack repulsers." The "electromagnetic attack secrets." The "electromagnetic attack techniques." The "electromagnetic attack technologies." The "electromagnetic attack weapons."
The "electromagnetic experiments." The "electromagnetic harassment blockers." The "electromagnetic harassment countermeasures." The "electromagnetic harassment defenses." The "electromagnetic harassment detection." The "electromagnetic harassment detectors." The "electromagnetic harassment eliminators." The "electromagnetic harassment jammers." The "electromagnetic harassment protectors." The "electromagnetic harassment protection." The "electromagnetic harassment repellents." The "electromagnetic harassment repellers." The "electromagnetic harassment repulsers." The "electromagnetic harassment weapons."
The "electromagnetic mind control blockers." The "electromagnetic mind control countermeasures." The "electromagnetic mind control defenses." The "electromagnetic mind control detection." The "electromagnetic mind control detectors." The "electromagnetic mind control eliminators." The "electromagnetic mind control jammers." The "electromagnetic mind control protectors." The "electromagnetic mind control protection." The "electromagnetic mind control repellents." The "electromagnetic mind control repellers." The "electromagnetic mind control repulsers." The "electromagnetic mind control weapons."
The "electromagnetic anti-terrorism." The "electromagnetic attacking." The "electromagnetic attack tutorial." The "electromagnetic attacks." The "electromagnetic circuits." The "electromagnetic design and development." The "electromagnetic detectors." The "electromagnetic devices." The "electromagnetic dowsing." The "electromagnetic entrainment." The "electromagnetic hardware." The "electromagnetic harassing devices." The "electromagnetic harassment." The "electromagnetic implant control." The "electromagnetic implant programming." The "electromagnetic implants." The "electromagnetic jammers." The "electromagnetic jamming issues." The "electromagnetic mind control attacks." The "electromagnetic pulse weapons of mass destruction." The "electromagnetic pulsed weapons of mass destruction." The "electromagnetic research." The "electromagnetic shielding issues." The "electromagnetic spying." The "electromagnetic stimulation of the brain." The "electromagnetic stimulations." The "electromagnetic stimulators." The "electromagnetic subliminal mind control attacks." The "electromagnetic surveillance." The "electromagnetic techniques." The "electromagnetic technologies." The "electromagnetic torment." The "electromagnetic torture weapons." The "electromagnetic victims." The "electromagnetic weapons devices." The "electromagnetic weapons programs." The "electromagnetic weapons research." The "electromagnetic weapons systems research." The "electromagnetic weapons systems technologies." The "electromagnetic weapons of mass destruction." The "electromagnetic zappers."
The "electronic attack
bands." The "electronic attack bandwidth." The "electronic
attack blockers." The "electronic attack countermeasure services."
The "electronic attack countermeasures." The "electronic attack
data." The "electronic attack defenses." The "electronic
attack detection." The "electronic attack detectors." The "electronic
attack eliminators." The "electronic attack exotic weapons."
The "electronic attack information." The "electronic attack jammers."
The "electronic attack lessons." The "electronic attack protectors."
The "electronic attack protection." The "electronic attack repellents."
The "electronic attack repellers." The "electronic attack repulsers."
The "electronic attack weapons." The "electronic attack consultants."
The "electronic attack consulting services." The "electronic
attack customized device services." The "electronic attack customized
devices." The "electronic attack development services." The "electronic
attack designs." The "electronic brain inhibitions." The "electronic
brain stimulations." The "electronic attack control design services."
The "electronic attack devices." The "electronic attack equipment."
The "electronic attack frequencies in ghz." The "electronic attack
frequencies in mhz." The "electronic attack hardware." The "electronic
attack countermeasure invention services." The "electronic attack
invention laboratory services." The "electronic attack invention prototyping
services." The "electronic attack invention services." The "electronic
attack inventions." The "electronic attack inventors." The "electronic
attack laboratory services." The "electronic attack laboratories."
The "electronic attack medical causations." The "electronic attack
medical manifestations." The "electronic attack merchandise."
The "electronic attack methods." The "electronic attack paranoia."
The "electronic attack psychosis." The "electronic attack product
creation services." The "electronic attack product development services."
The "electronic attack product services." The "electronic attack
product researchers." The "electronic attack products." The "electronic
attack prototype services." The "electronic attack prototypes."
The "electronic attack prototyping services." The "electronic
attack repair services." The "electronic attack R&D services."
The "electronic attack research, design and development services."
The "electronic attack research laboratories." The "electronic
attack secrets." The "electronic attack research services." The
"electronic attack researchers." The "electronic attack services."
The "electronic attack sexual abuse." The "electronic attack
skin lesions." The "electronic attack skin rashes." The "electronic
attack special projects services." The "electronic attack special
services." The "electronic attack spectrum." The "electronic
attack strategies." The "electronic attack tactics." The "electronic
attack techniques." The "electronic attack technologies." The
"electronic attack testers." The "electronic attack testing laboratories."
The "electronic attack tactics." The "electronic attack testing
services." The "electronic attack tips." The "electronic
attack troubleshooters." The "electronic attack troubleshooting services."
The "electronic attack tutorial." The "electronic attacks using
artificial intelligence."
The "electronic blockers." The "electronic body control attacks." The "electronic brain stimulation devices." The "electronic brain stimulations." The "electronic countermeasure services." The "electronic countermeasure invention services." The "electronic countermeasures against behavioral modification attacks." The "electronic countermeasures against brain entrainment attacks." The "electronic countermeasures against brainwashing attacks." The "electronic countermeasures against body control attacks." The "electronic countermeasures against directed energy weapons attacks." The "electronic countermeasures against electronic attacks." The "electronic countermeasures against electronic gang stalking attacks." The "electronic countermeasures against electronic harassment." The "electronic countermeasures against mind control attacks." The "electronic countermeasures against mind reading attacks." The "electronic countermeasures against subliminal mind control attacks." The "electronic countermeasures technology." The "electronic defenses." The "electronic demodulation of signals." The "electronic demodulation of brainwaves." The "electronic detection." The "electronic detectors." The "electronic eliminators." The "electronic experiments." The "electronic gang mobbing." The "electronic gang stalking countermeasures." The "electronic gang stalking." The "electronic gangstalking." The "electronic harass." The "electronic harassment blockers." The "electronic harassment countermeasures." The "electronic harassment countermeasures." The "electronic harassment defenses." The "electronic harassment detection." The "electronic harassment detection." The "electronic harassment detectors." The "electronic harassment eliminators." The "electronic harassment jammers." The "electronic harassment protectors." The "electronic harassment protection." The "electronic harassment repellents." The "electronic harassment repellers." The "electronic harassment repulsers." The "electronic harassment systems." The "electronic harassment techniques." The "electronic harassment technologies." The "electronic harassment weapons." The "electronic inhibition of the brain." The "electronic jammers."
The "electronic mind control blockers." The "electronic mind control countermeasures." The "electronic mind control defenses." The "electronic mind control detection." The "electronic mind control detectors." The "electronic mind control eliminators." The "electronic mind control jammers." The "electronic mind control protectors." The "electronic mind control protection." The "electronic mind control repellents." The "electronic mind control repellers." The "electronic mind control repulsers." The "electronic mind control weapons." The "electronic modulation with brainwaves."
The "electronic anti-terrorism." The "electronic attack devices." The "electronic attack electrodes." The "electronic attack equipment." The "electronic attack hardware." The "electronic attack experiments." The "electronic attack expose." The "electronic attacking." The "electronic attacks." The "electronic circuits." The "electronic circuit designs." The "electronic design and development." The "electronic designs." The "electronic detectors." The "electronic devices." The "electronic dowsers." The "electronic dowsing." The "electronic drugstore." The "electronic electrodes." The "electronic brain entrainment." The "electronic entrainment." The "electronic genital attacks." The "electronic genital stimulations." The "electronic hardware." The "electronic harassing." The "electronic harassment experiments."The "electronic human surveillance devices." The "electronic human tracking devices." The "electronic implant attacks." The "electronic implant brain entrainment." The "electronic implant control." The "electronic implant controllers." The "electronic implant electronic attack." The "electronic implant injection." The "electronic implant mind control attacks." The "electronic implant monitoring." The "electronic implant programmers." The "electronic implant programming." The "electronic implant surveillance." The "electronic implanted Manchurian Candidate." The "electronic implants."
The "electronic jammers." The "electronic jamming issues." The "electronic mind control attacks." The "electronic mind control devices." The "electronic mind reading devices." The "electronic protectors." The "electronic protection." The "electronic repellents." The "electronic repellers." The "electronic repulsers." The "electronic research." The "electronic sexual abuse." The "electronic sexual attacks." The "electronic shielding issues." The "electronic spying." The "electronic stimulation of the genitals." The "electronic stimulation devices." The "electronic stimulations." The "electronic stimulators." The "electronic subliminal mind control attacks." The "electronic surveillance." The "electronic techniques." The "electronics technologies." The "electronic terrorism." The "electronic torture weapons." The "electronic tracking." The "electronic torment." The "electronic torture." The "electronic tracking." The "electronic victims." The "electronic voice phenomena." The "electronic weapons countermeasures." The "electronic weapons devices." The "electronic weapons of torture." The "electronic weapons programs." The "electronic stimulation of the brain." The "electronic weapons research." The "electronic weapons systems research." The "electronic weapon system devices." The "electronic weapons systems technologies." The "electronic ventriloquism." The "electronic weapons of mass destruction."
The "electronically attack. " The "electronically attacked. " The "electronically control. " The "electronically controlled. " The "electronically harass. " The "electronically harassed." The "electronically-induced mind control devices." The "electronically surveil. " The "electronically surveilled. " The "electronically track. " The "electronically tracked." The "electrophonic hearing." The "electrophonic sounds." The "electrotelepathic attacks." The "electrotelepathic harassment."
EM-EZ: The "EM harassing devices." The "em jammers." The "em weaponry." The "em zappers." The "emf harassing devices." The "emf jammers." The "emf weaponry." The "emf weapons systems research." The "emf zappers." The "emotional brainwave clusters." The "emotional clusters of brainwaves." The "emotional trauma."
The "end aliens." The "end brain entrainment attacks." The "end brainwashing attacks." The "end electronic attacks." The "end electronic brain entrainment attacks." The "end electronic entrainment attacks." The "end electronic harassment." The "end electronic implant control." The "end electronic implant programming." The "end electronic implants." The "end electronic mind control attacks." The "end electronic spying." The "end electronic subliminal mind control attacks." The "end electronic surveillance." The "end electronic torture." The "end ghosts." The "end implant control." The "end implant programming." The "end implants." The "end lightning attacks." The "end mind control attacks." The "end pain field generator attacks." The "end subliminal mind control attacks." The "end brain entrainment attacks." The "end mind control harassment." The "end brain spying." The "end brainwave spying." The "end brainwave signature spying." The "end subliminal mind control attacks." The "end brain surveillance." The "end brainwave surveillance." The "end brainwave signature surveillance." The "end brain torture." The "end mind torture." The "end unknown entities." The "end unknown presences."
The "entrainment countermeasures." The "entrainment devices." The "entrainment electronics." The "entrainment experiments." The "entrainment methods." The "entrainment systems." The "entrainment technology." The "entrainment torture." The "environmental manifestations of body control attacks." The "environmental manifestations of directed energy attacks." The "medical manifestations of electronic attacks." The "environmental manifestations of electronic gang stalking." The "environmental manifestations of electronic harassment." The "environmental manifestations of mind control attacks." The "physiological effects of electronic attack." The "physiological manifestations of electronic attack." The "equipment customizing." The "equipment designs." The "equipment designing." The "equipment integration." The "equipment inventions." The "equipment inventing." The "equipment modifying." The "equipment modifications." The "equipment prototyping." The "equipment repairs." The "equipment repairing." The "equipment testing." The "equipment troubleshooting." The "equipment upgrades ." The "equipment upgrading." The "ET abductions." The "ET attacks." The "ET electronic attacks." The "ET implants." The "ET mind control powers." The "evoked potentials." The "experts in electronic attacks." The "experts in electronic mind control attacks." The "experts in mind control attacks." The "extra sensory pain fields." The "extra sensory perception." The "extra sensory persecution." The "extra sensory persuasion." The "extra sensory pleasure." The "extra sensory projection." The "extrasensory pain fields." The "extrasensory perception." The "extrasensory persecution." The "extrasensory persuasion." The "extrasensory pleasure." The "extrasensory projection." The "extra sensual pain fields." The "extra sensual perception." The "extra sensual persecution." The "extra sensual persuasion." The "extra sensual pleasure." The "extra sensual projection." The "extrasensual pain fields." The "extrasensual perception." The "extrasensual persecution." The "extrasensual persuasion." The "extrasensual pleasure." The "extrasensual projection." The "extra sexual pain fields." The "extra sexual perception." The "extra sexual persecution." The "extra sexual persuasion." The "extra sexual pleasure." The "extra sexual projection." The "extrasexual pain fields." The "extrasexual perception." The "extrasexual persecution." The "extrasexual persuasion." The "extrasexual pleasure." The "extrasexual projection."
F: The "fake alien abductions." The "federal electronic attack research programs." The "federal mind control human research programs." The "fight electronic terrorism." The "fighting electronic terrorism." The "fight terrorism." The "fighting terrorism." The "flash blasters." The "flashing LED mind controllers." The "flashing LED mind control devices." The "flashing LED mind control technologies." The "FMRI non-consensual lie detection." The "FMRI non-consensual lie detectors." The "free catalog." The "free estimates." The "free support." The "free technical information." The "free technical support." The "frequency following response." The "frequency instrument therapy." The "Frey Effect devices." The "Frey Effects technology." The "Functional Magnetic Resonance Imaging technology (FMRI)."
G: The "galvanic skin response devices." The "gamma brain waves." The "gamma brain wave control." The "gamma brainwaves." The "gamma brainwave control." The "gamma brainwave monitoring." The "gamma brainwave signals." The "gamma frequencies." The "gamma waves." The "gang stalking." The "gangstalking." The "gas lighting attacks." The "gaslighting attacks." The "ghost buster." The "ghost busters." The "ghost busting." The "ghostbuster devices." The "ghostbuster equipment." The "ghostbuster hardware." The "ghostbuster merchandise." The "ghostbuster offers." The "ghostbuster products." The "ghostbuster devices." The "ghostbuster equipment." The "ghostbuster hardware." The "ghostbuster merchandise." The "ghostbuster offers." The "ghostbuster products." The "ghost buster devices." The "ghost buster equipment." The "ghost buster hardware." The "ghost buster merchandise." The "ghost buster offers." The "ghost buster products." The "ghostbusting devices." The "ghostbusting equipment." The "ghostbusting hardware." The "ghostbusting merchandise." The "ghostbusting offers." The "ghostbusting products." The "ghost busting devices." The "ghost busting equipment." The "ghost busting hardware." The "ghost busting merchandise." The "ghost busting offers." The "ghost busting products." The "ghost countermeasures." The "ghost defenses." The "ghost detection." The "ghost detectors." The "ghost detecting."
The "government beams voices into your head." The "government controls your mind." The "government implant control." The "government implant programming." The "government electronic attacks." The "government electronic implants." The "government implants." The "government spies." The "government transponders." The "government brain entrainment experiments." The "government conspiracies." The "government mind control attacks." The "government mind control experiments." The "government sends voices into your head." The "government subliminal mind control experiments."
H: The "hall effect devices." The "happiness." The "happy state." The "hardware customizing." The "hardware designs." The "hardware designing." The "hardware integration." The "hardware inventions." The "hardware inventing." The "hardware modifying." The "hardware modifications." The "hardware prototyping." The "hardware repairs." The "hardware repairing." The "hardware research." The "hardware testing." The "hardware troubleshooting." The "hardware upgrades ." The "hardware upgrading." The "harassing signals." The "hearing aid telecoils and magnetic induction loop systems." The "hearing aid telecoils and magnetic loop systems." The "hearing voices in your head." The "hearing voices in your mind." The "hearing your own thoughts." The "harassment signals." The "Havana Syndrome attacks." The "head injuries." The "head trauma." The "heightened state of paranoia." The "hidden trauma."
The "high frequency brain stimulation." The "high-frequency hum detection." The "high-frequency hum detecting." The "high-frequency hum detectors." The "high frequency stimulation of the brain." The "high tech consultants." The "hi-tech consultants." The "high tech consulting." The "hi-tech consulting." The "high tech devices." The "hi-tech devices." The "high tech equipment." The "hi-tech equipment." The "high tech hardware." The "hi-tech hardware." The "high tech offers." The "hi-tech offers." The "high tech products." The "hi-tech products." The "high tech services." The "hi-tech services." The "high tech security consultants." The "hi-tech security consultants." The "high tech security consulting." The "hi-tech security consulting." The "high tech security devices." The "hi-tech security devices." The "high tech security equipment." The "hi-tech security equipment." The "high tech security hardware." The "hi-tech security hardware." The "high tech security offers." The "hi-tech security offers." The "high tech security products." The "hi-tech security products." The "high tech security services." The "hi-tech security services." The "high tech survival consultants." The "hi-tech survival consultants." The "high tech survival consulting." The "hi-tech survival consulting." The "high tech survival devices." The "hi-tech survival devices." The "high tech survival equipment." The "hi-tech survival equipment." The "high tech survival hardware." The "hi-tech survival hardware." The "high tech survival offers." The "hi-tech survival offers." The "high tech survival products." The "hi-tech survival products." The "high tech survival services." The "hi-tech survival services." The "high voltage brain stimulations." The "high voltage stimulation of the brain." The "holophone." The "holophonic sounds." The "holophone device." The "holophonic electronic device." The "holophone technology." The "holophonic mind control." The "holophonic attack." The "Holodeck mind control techniques."
The "how to detect alien abductions." The "how to detect body control attacks." The "how to detect brain entrainment attacks." The "how to detect brainwashing attacks." The "how to detect directed energy attacks." The "how to detect directed energy weapons." The "how to detect directed energy weapons attacks." The "how to detect entrainment attacks." The "how to detect electrode implants." The "how to detect electromagnetic attacks." The "how to detect electromagnetic entrainment attacks." The "how to detect electromagnetic harassment." The "how to detect electromagnetic mind control attacks." The "how to detect electromagnetic subliminal mind control attacks." The "how to detect electromagnetic torture." The "how to detect electromagnetic weapons attacks." The "how to detect electronic attacks." The "how to detect electronic entrainment attacks." The "how to detect electronic harassment." The "how to detect electronic mind control attacks." The "how to detect electronic spying." The "how to detect electronic subliminal mind control attacks." The "how to detect electronic surveillance." The "how to detect electronic torture." The "how to detect electronic weapons attacks." The "how to detect implanted devices." The "how to detect implanted electrodes." The "how to detect implants." The "how to detect improvised weapons attacks." The "how to detect mind control attacks." The "how to detect subliminal mind control attacks." The "how to detect brain attacks." The "how to detect brain entrainment attacks." The "how to detect brain harassment." The "how to detect brain control attacks." The "how to detect brain spying." The "how to detect brainwave spying." The "how to detect brain surveillance." The "how to detect brainwave surveillance." The "how to detect brainwave signature surveillance." The "how to detect subliminal brain control attacks." The "how to detect brain torture." The "how to detect brain weapons attacks."
The "how to prevent alien abductions." The "how to prevent body control attacks." The "how to prevent brain entrainment attacks." The "how to prevent brainwashing attacks." The "how to prevent directed energy attacks." The "how to prevent directed energy weapons attacks." The "how to prevent entrainment attacks." The "how to prevent electrode implants." The "how to prevent electromagnetic attacks." The "how to prevent electromagnetic entrainment attacks." The "how to prevent electromagnetic harassment." The "how to prevent electromagnetic mind control attacks." The "how to prevent electromagnetic subliminal mind control attacks." The "how to prevent electromagnetic torture." The "how to prevent electromagnetic weapons attacks." The "how to prevent electronic attacks." The "how to prevent electronic entrainment attacks." The "how to prevent electronic harassment." The "how to prevent electronic mind control attacks." The "how to prevent electronic spying." The "how to prevent electronic subliminal mind control attacks." The "how to prevent electronic surveillance." The "how to prevent electronic torture." The "how to prevent electronic weapons attacks." The "how to prevent implanted devices." The "how to prevent implanted electrodes." The "how to prevent implants." The "how to prevent improvised weapons attacks." The "how to prevent mind control attacks." The "how to prevent subliminal mind control attacks." The "how to prevent brain attacks." The "how to prevent brain entrainment attacks." The "how to prevent brain harassment." The "how to prevent brain control attacks." The "how to prevent brain spying." The "how to prevent brainwave spying." The "how to prevent brainwave signature spying." The "how to prevent subliminal brain control attacks." The "how to prevent brain torture." The "how to prevent brain weapons attacks." The "how to prevent brain surveillance." The "how to prevent brainwave surveillance." The "how to prevent brainwave signature surveillance."
The "how to stop alien abductions." The "how to stop body control attacks." The "how to stop brain entrainment attacks." The "how to stop brainwashing attacks." The "how to stop directed energy attacks." The "how to stop directed energy weapons attacks." The "how to stop entrainment attacks." The "how to stop electrode implants." The "how to stop electromagnetic attacks." The "how to stop electromagnetic entrainment attacks." The "how to stop electromagnetic harassment." The "how to stop electromagnetic mind control attacks." The "how to stop electromagnetic subliminal mind control attacks." The "how to stop electromagnetic torture." The "how to stop electromagnetic weapons attacks." The "how to stop electronic attacks." The "how to stop electronic entrainment attacks." The "how to stop electronic harassment." The "how to stop electronic mind control attacks." The "how to stop electronic spying." The "how to stop electronic subliminal mind control attacks." The "how to stop electronic surveillance." The "how to stop electronic torture." The "how to stop electronic weapons attacks." The "how to stop implanted devices." The "how to stop implanted electrodes." The "how to stop implants." The "how to stop improvised weapons attacks." The "how to stop mind control attacks." The "how to stop subliminal mind control attacks." The "how to stop brain attacks." The "how to stop brain entrainment attacks." The "how to stop brain harassment." The "how to stop brain control attacks." The "how to stop brain spying." The "how to stop brainwave spying." The "how to stop brainwave signature spying." The "how to stop subliminal brain control attacks." The "how to stop brain torture." The "how to stop brain weapons attacks."
The "human auditory response to modulated electrical energy." The "human auditory response to modulated electromagnetic energy." The "human auditory response to modulated microwave energy." The "human auditory response to modulated microwaves." The "human auditory response to modulated pulsed energy." The "human auditory response to modulated pulsed RF energy." The "human auditory response to modulated RF energy." The "human auditory system response to modulated electrical energy." The "human auditory system response to modulated electromagnetic energy." The "human auditory system response to modulated microwave energy." The "human auditory system response to modulated microwaves." The "human auditory system response to modulated pulsed energy." The "human auditory system response to modulated pulsed RF energy." The "human auditory system response to modulated RF energy." The "human auditory response to electrical energy." The "human auditory response to electromagnetic energy." The "human auditory response to microwave energy." The "human auditory response to microwaves." The "human auditory response to pulsed energy." The "human auditory response to pulsed RF energy." The "human auditory response to RF energy." The "human auditory system response to electrical energy." The "human auditory system response to electromagnetic energy." The "human auditory system response to microwave energy." The "human auditory system response to microwaves." The "human auditory system response to pulsed energy." The "human auditory system response to pulsed RF energy." The "human auditory system response to RF energy."
I: The "implant controls." The "implant injections." The "implant programming." The "implanted brain controllers." The "implanted controllers." The "implanted devices." The "implanted electrodes." The "implanting electrodes." The "implanted electronic devices." The "implanted electronics." The "implanted fake memories." The "implanted false memories." The "implanted implants testing." The "implanted mind controllers." The "implanted receivers." The "implanted stimoceivers." The "implanted stimulation receivers." The "implanted thoughts." The "implanted transceivers." The "implanted transmitters." The "implanted weapons." The "induced altered states." The "induced mind control attacks."
The "inhibition of the brain." The "inhibitory responses." The "innate bioelectricity." The "invasive electrodes." The "investigate aliens." The "investigate electronic attack." The "investigate electronic harassment." The "investigate electronic weapons." The "investigate fortean phenomena." The "investigate ghosts." The "investigate spirits." The "investigate mind control attacks." The "investigate brain harassment." The "investigate brain weapons." The "investigate unknown entities." The "investigate unknown presences."
J-K: The "jam behavioral modification attacks." The "jam brain entrainment attack." The "jam brainwashing attacks." The "jam body control attacks." The "jam directed energy weapons attacks." The "jam electronic attacks." The "jam electronic gang stalking attacks." The "jam electronic harassment." The "jam mind control attacks." The "jam mind reading attacks." The "jam subliminal mind control attacks." The "jam brain entrainment." The "jam electromagnetic attacks." The "jam electromagnetic entrainment." The "jam electromagnetic harassment." The "jam electromagnetic implant control." The "jam electromagnetic implant programming." The "jam electromagnetic implants." The "jam electromagnetic mind control attacks." The "jam electromagnetic spying." The "jam electromagnetic subliminal mind control attacks." The "jam electromagnetic surveillance." The "jam electromagnetic torture." The "jam electromagnetic weapons." The "jam electronic attacks." The "jam electronic brain entrainment." The "jam electronic entrainment." The "jam electronic harassment." The "jam electronic implant control." The "jam electronic implant programming." The "jam electronic implants." The "jam electronic mind control attacks." The "jam electronic spying." The "jam electronic subliminal mind control attacks." The "jam electronic surveillance." The "jam electronic torture." The "jam electronic weapons." The "jam emf." The "jam brain attacks." The "jam brain entrainment." The "jam brain harassment." The "jam brain control attacks." The "jam psychological control." The "jam psychological entrainment." The "jam satellite control." The "jam subliminal brain control attacks." The "jam mind control attacks." The "jam subliminal mind control attacks." The "jam brain spying." The "jam brainwave spying." The "jam brainwave signature spying." The "jam subliminal brain control attacks." The "jam brain surveillance." The "jam brainwave surveillance." The "jam brainwave signature surveillance." The "jam brain torture." The "jam brain weapons." The "jam signals." The "jamming signals." The "Jose Delgado experiments."
L: The "laser torture weapons systems research." The "laser weapons systems research." The "laser weapons technologies." The "LED mind controllers." The "LED mind control devices." The "LED mind control technologies." The "life coaching." The "life coaching services." The "lightning detectors." The "light therapy." The "Lilly wave bipolar stimulation." The "Lilly wave brain stimulation techniques." The "Lilly wave devices." The "Lilly wave nerve stimulation techniques." The "Lilly wave phenomena." The "Lilly wave stimulation techniques." The "Lilly waves." The "Lilly waveform brain stimulation techniques." The "Lilly waveforms." The "living dead mind capture devices." The "living dead mind control devices." The "Lone Star Consulting, Inc." The "low-frequency hum detection." The "low-frequency hum detecting." The "low-frequency hum detectors."
M: The "made-to-order." The "made-to-order consulting." The "made-to-order devices." The "made-to-order equipment." The "made-to-order hardware." The "made-to-order merchandise." The "made-to-order offers." The "magnetic induction loop systems and telecoils for hearing aids." The "magnetic induction loop systems and hearing aid telecoils." The "magnetic loop systems and telecoils for hearing aids." The "magnetic loop systems and hearing aid telecoils." The "magnetic resonance imagery eavesdropping." The "magnetic resonance imagery mind control attacks." The "magnetic resonance imagery surveillance." The "magnetic resonance imagery technology." The "magnetic resonance imaging eavesdropping." The "magnetic resonance imaging mind control attacks." The "magnetic resonance imaging surveillance." The "magnetic resonance imaging technology." The "magnetic resonant frequency of the body." The "manchurian candidate." The "massive electronic attack dysfunction." The "massive electronic attack syndrome." The "massive electronic attack perpetrators." The "massive electronic attack victims." The "massive electronic attack nightmare dysfunction." The "massive electronic attack nightmare syndrome." The "massive electronic attack nightmare perpetrators." The "massive electronic attack nightmare victims." The "medical causations of body control attacks." The "medical causations of electronic attacks." The "medical causations of mind control attacks." The "medical diagnosis of mind control attacks." The "medical diagnosis of psychological diseases." The "MEAN perpetrators." The "MEAN Syndrome." The "MEAN victims." The "medical manifestations of brain entrainment." The "medical manifestations of brainwashing." The "medical manifestations of behavioral modification." The "medical manifestations of body control attacks." The "medical manifestations of brainwashing." The "medical manifestations of directed energy attacks." The "medical manifestations of electronic attacks." The "medical manifestations of electronic gang stalking." The "medical manifestations of electronic harassment." The "medical manifestations of mind control attacks." The "medical manifestations of mind reading attacks." The "medical manifestations of subliminal mind control attacks."
The "mental breakdowns." The "mental depression." The "mental illness." The "mental illnesses." The "mentally ill." The "mental powers." The "mental telepathy." The "mental terrorism." The "mental therapy." The "mental trauma." The "mental victims." The "mental weapons." The "mental zombies." The "mental control of animals." The "mental control of computers." The "mental control of people." The "mentally control animals." The "mentally control computers." The "mentally control people."
The "merely by thinking." The "metal detectors." The "metal electrodes." The "microwave brain stimulations." The "microwave attack devices." The "microwave attacks." The "microwave countermeasures." The "Microwave Hearing Effect devices." The "Microwave Hearing Effect technology." The "microwave magnetic resonance imagery techniques." The "microwave magnetic resonance imaging techniques." The "microwave mind control devices." The "microwave MRI techniques." The "microwave stimulation of the brain." The "microwave torture weapons systems research." The "microwave weapons systems research." The "microwave technologies."
The "military satellite control of mind control devices." The "military satellite control signals." The "military satellite directed energy attacks." The "military satellite electronic attacks." The "military satellite mind control attacks." The "military satellite mind control systems." The "military satellite signals." The "military satellite spies." The "military satellite spying systems." The "military satellite subliminal mind control attacks." The "military satellite surveillance systems." The "military satellite terrorism." The "military satellite terrorists." The "military satellite tracking systems."
The "mind-body connection." The "mind capture electronic attacks." The "mind capture devices." The "mind capture systems." The "mind capture techniques." The "mind capture technologies." The "mind capture weapons." The "mind connection." The "mind controls." The "mind control attacks using artificial intelligence." The "mind control bands." The "mind control bandwidth." The "mind control conspiracies." The "mind control conspiracy." The "mind control countermeasure services." The "mind control countermeasures." The "mind control data." The "mind control customized devices." The "mind control detectors." The "mind control devices." The "mind control electrodes." The "mind control electronic attacks." The "mind control electronic implant control." The "mind control electronic implant programming." The "mind control electronic implants." The "mind control electronics." The "mind control experiments." The "mind control consultants." The "mind control consulting services." The "mind control countermeasure invention services." The "mind control customized device services." The "mind control customized devices." The "mind control data." The "mind control development services." The "mind control designs." The "mind control design services." The "mind control devices." The "mind control equipment." The "mind control exotic weapons." The "mind control expose." The "mind control frequencies in ghz." The "mind control frequencies in mhz." The "mind control hardware." The "mind control implant control." The "mind control implant programming." The "mind control implants." The "mind control invention laboratory services." The "mind control invention prototyping services." The "mind control invention services." The "mind control inventions." The "mind control inventors." The "mind control jamming issues." The "mind control lab." The "mind control laboratories." The "mind control laboratory services." The "mind control lessons." The "mind control medical causations." The "mind control medical manifestations." The "mind control methods." The "mind control merchandise." The "mind control microwave attacks."
The "mind control paranoia." The "mind control plots." The "mind control psychosis." The "mind control product creation services." The "mind control product development services." The "mind control product services." The "mind control product researchers." The "mind control products." The "mind control prototype services." The "mind control prototypes." The "mind control prototyping services." The "mind control powers." The "mind control programming." The "mind control protection." The "mind control pulsed microwave attacks." The "mind control repair services." The "mind control R&D services." The "mind control research, design and development services." The "mind control research laboratories." The "mind control research services." The "mind control researchers." The "mind control satellites." The "mind control secrets." The "mind control services." The "mind control shielding issues." The "mind control special projects services." The "mind control special services." The "mind control spectrum." The "mind control systems." The "mind control slaves." The "mind control stories." The "mind control strategies." The "mind control tactics." The "mind control techniques." The "mind control technology." The "mind control technologies." The "mind control tips." The "mind control tutorial." The "mind control testers." The "mind control testing laboratories." The "mind control testing services." The "mind control troubleshooters." The "mind control troubleshooting services." The "mind control using artificial intelligence." The "mind control victims." The "mind control weapons systems research." The "mind control weapons technologies." The "mind control zombies."
The "mind games." The "mind probe attacks." The "mind probes." The "mind probing." The "mind processes." The "mind inhibitors." The "mind reading attacks." The "mind reading countermeasures." The "mind reading mind control attacks." The "mind reading devices." The "mind stimulators." The "mobius coil." The "mobius strip." The "modify behavior." The "modifying circuits." The "modifying devices." The "modifying equipment." The "modifying hardware." The "modifying products." The "modifying services." The "modulate brainwaves." The "modulated brainwaves." The "modulation of brainwaves." The "monitoring electrodes." The "Montauk Chair." The "motor control cortex." The "MRI eavesdropping." The "MRI mind control techniques." The "MRI surveillance." The "MRI technology." The "murder by electronic attack." The "murder by mind control attack." The "myth busters programs." The "myth busters researchers." The "MythBusters program." The "MythBusters television program." The "MythBusters TV program."
N-O: The "nanobot brain implants." The "nanobot conspiracy." The "nanobot devices." The "nanobot electronic attacks." The "nanobot electronic implants." The "nanobot implants." The "nanobot mind control techniques." The "nanobot techniques." The "nanobot technologies." The "neural processes." The "neural prosthesis." The "neural signals."
The "neurological attack bands." The "neurological attack bandwidth." The "neurological attack blockers." The "neurological attack countermeasure services." The "neurological attack countermeasures." The "neurological attack data." The "neurological attack defenses." The "neurological attack detection." The "neurological attack detectors." The "neurological attack eliminators." The "neurological attack exotic weapons." The "neurological attack information." The "neurological attack jammers." The "neurological attack lessons." The "neurological attack protectors." The "neurological attack protection." The "neurological attack repellents." The "neurological attack repellers." The "neurological attack repulsers." The "neurological attack weapons." The "neurological attack consultants." The "neurological attack consulting services." The "neurological attack customized device services." The "neurological attack customized devices." The "neurological attack development services." The "neurological attack designs." The "neurological attack control design services." The "neurological attack devices." The "neurological attack equipment." The "neurological attack frequencies in ghz." The "neurological attack frequencies in mhz." The "neurological attack hardware." The "neurological attack countermeasure invention services." The "neurological attack laboratory services." The "neurological attack laboratories." The "neurological attack medical causations." The "neurological attack medical manifestations." The "neurological attack merchandise." The "neurological attack methods." The "neurological attack paranoia." The "neurological attack psychosis." The "neurological attack product services." The "neurological attack product researchers." The "neurological attack products." The "neurological attack prototype services." The "neurological attack prototypes." The "neurological attack prototyping services." The "neurological attack repair services." The "neurological attack R&D services." The "neurological attack research, design and development services." The "neurological attack research laboratories." The "neurological attack secrets." The "neurological attack research services." The "neurological attack researchers." The "neurological attack services." The "neurological attack special projects services." The "neurological attack special services." The "neurological attack spectrum." The "neurological attack strategies." The "neurological attack tactics." The "neurological attack techniques." The "neurological attack technologies." The "neurological attack testers." The "neurological torture weapons." The "neurological attack testing laboratories." The "neurological attack tactics." The "neurological attack testing services." The "neurological attack tips." The "neurological attack troubleshooters." The "neurological attack troubleshooting services." The "neurological attack tutorial." The "neurological attacks using artificial intelligence." The "neurological attacks."
The "neurological interference." The "neurological weapons attack bands." The "neurological weapons attack bandwidth." The "neurological weapons attack blockers." The "neurological weapons attack countermeasure services." The "neurological weapons attack countermeasures." The "neurological weapons attack data." The "neurological weapons attack defenses." The "neurological weapons attack detection." The "neurological weapons attack detectors." The "neurological weapons attack eliminators." The "neurological weapons attack exotic weapons." The "neurological weapons attack information." The "neurological weapons attack jammers." The "neurological weapons attack lessons." The "neurological weapons attack protectors." The "neurological weapons attack protection." The "neurological weapons attack repellents." The "neurological weapons attack repellers." The "neurological weapons attack repulsers." The "neurological weapons attack weapons." The "neurological weapons attack consultants." The "neurological weapons attack consulting services." The "neurological weapons attack customized device services." The "neurological weapons attack customized devices." The "neurological weapons attack development services." The "neurological weapons attack designs." The "neurological weapons attack control design services." The "neurological weapons attack devices." The "neurological weapons attack equipment." The "neurological weapons attack frequencies in ghz." The "neurological weapons attack frequencies in mhz." The "neurological weapons attack hardware." The "neurological weapons attack countermeasure invention services." The "neurological weapons attack laboratory services." The "neurological weapons attack laboratories." The "neurological weapons attack medical causations." The "neurological weapons attack medical manifestations." The "neurological weapons attack merchandise." The "neurological weapons attack methods." The "neurological weapons attack paranoia." The "neurological weapons attack psychosis." The "neurological weapons attack product services." The "neurological weapons attack product researchers." The "neurological weapons attack products." The "neurological weapons attack prototype services." The "neurological weapons attack prototypes." The "neurological weapons attack prototyping services." The "neurological weapons attack repair services." The "neurological weapons attack R&D services." The "neurological weapons attack research, design and development services." The "neurological weapons attack research laboratories." The "neurological weapons attack secrets." The "neurological weapons attack research services." The "neurological weapons attack researchers." The "neurological weapons attack services." The "neurological weapons attack special projects services." The "neurological weapons attack special services." The "neurological weapons attack spectrum." The "neurological weapons attack strategies." The "neurological weapons attack tactics." The "neurological weapons attack techniques." The "neurological weapons attack technologies." The "neurological weapons attack testers." The "neurological weapons attack testing laboratories." The "neurological weapons attack tactics." The "neurological weapons attack testing services." The "neurological weapons attack tips." The "neurological weapons attack troubleshooters." The "neurological weapons attack troubleshooting services." The "neurological weapons attack tutorial." The "neurological weapons attacks using artificial intelligence." The "neurological weapons attacks."
The "neuromancing technology." The "neuromarketing technology." The "new world order mind control (mindcon)." The "new world order mind reading (mindread)." The "Nexus Magazine." The "non-invasive electrodes."
The "off the shelf devices." The "off the shelf hardware." The "outer limits." The "outer space alien abductions." The "outer space alien attacks." The "outer space alien blasters." The "outer space alien busters." The "outer space alien electronic attacks." The "outer space alien electronic implants." The "outer space alien implants." The "outer space alien mind control powers." The "outer space alien weapons systems research." The "outer space alien weapons." The "outer space aliens." The "outrageous circuit designs." The "outrageous circuits." The "outrageous devices." The "outrageous electronic devices." The "outrageous electronic gadgets." The "outrageous electronics." The "outrageous equipment." The "outrageous gadgets." The "outrageous hardware." The "outrageous products." The "outrageous projects." The "outrageous science projects." The "outrageous special projects." The "over the counter devices." The "over the counter hardware."
PA-PO: The "pain field generator attacks." The "pain field generators." The "pain manipulation devices." The "pain manipulation technologies." The "pain manipulation weapons." The "panic attack." The "panic attacks." The "panic room." The "parametric applications." The "parametric transducers." The "paranormal activities." The "paranormal activity." The "paranormal investigators." The "paranormal phenomena." The "paranormal phenomenon." The "paranormal researchers." The "paranormal science." The "paranormal sightings." The "paranormal sounds." The "paranormal studies." The "paranormal stuff." The "paranormal things." The "personal electronic attack jammers." The "personal electronic jammers." The "personal jammers." The "personality disorder manifestations." The "personality profiling technology." The "phantom experiences." The "phantom manifestations." The "phantom pains." The "phantom sights." The "phantom sounds." The "phantom symptoms." The "phantom voices."
The "physical manifestations of body control attacks." The "physical manifestations of directed energy attacks." The "physical manifestations of electronic attacks." The "physical manifestations of electronic gang stalking." The "physical manifestations of electronic harassment." The "physical manifestations of mind control attacks." The "physiological effects of electronic attack." The "physiological manifestations of electronic attack." The "physiological problems." The "plasma torture weapons systems research." The "plasma weapons systems research." The "plasma weapons technologies." The "Psychotronic Influence System technology (PIS technology)." The "positive reinforcement." The "post traumatic stress disorder manifestations." The "power of suggestion." The "power of suggesting." The "psychological trauma." The "PTSD manifestations."
PR: The "precious metal electrodes." The "prevent aliens." The "prevent brain entrainment attacks." The "prevent brainwashing attacks." The "prevent electronic attacks." The "prevent electronic brain entrainment attacks." The "prevent electronic entrainment attacks." The "prevent electronic harassment." The "prevent electronic implant control." The "prevent electronic implant programming." The "prevent electronic implants." The "prevent electronic mind control attacks." The "prevent electronic spying." The "prevent electronic subliminal mind control attacks." The "prevent electronic surveillance." The "prevent electronic torture." The "prevent ghosts." The "prevent implant control." The "prevent implant programming." The "prevent implants." The "prevent lightning attacks." The "prevent mind control attacks." The "prevent pain field generator attacks." The "prevent subliminal mind control attacks." The "prevent brain attacks." The "prevent brain entrainment attacks." The "prevent brain harassment." The "prevent brain control attacks." The "prevent brain spying." The "prevent brainwave spying." The "prevent brainwave signature spying." The "prevent subliminal brain control attacks." The "prevent brain surveillance." The "prevent brainwave surveillance." The "prevent brainwave signature surveillance." The "prevent brain torture." The "prevent unknown entities." The "prevent unknown presences."
The "products and services." The "professional products." The "professional services." The "program behavior." The "prototyping circuits." The "prototyping devices." The "prototyping equipment." The "prototyping hardware." The "prototyping inventions." The "prototyping products." The "prototyping services." The "psi attacks." The "psi mind control attacks." The "psi technology." The "psi weapons systems research." The "psionic attacks." The "psionic mind control attacks." The "psionic technology." The "psionic torture weapons systems research." The "psionic weapons technology." The "psychiatric experiences." The "psychiatric manifestations of mind control attacks." The "psychiatric symptoms of mind control attacks."
Psychic: The "psychic activities." The "psychic activity." The "psychic advances." The "psychic amplifiers." The "psychic attacks." The "psychic behavioral modifications." The "psychic body control attacks." The "psychic brain entrainment." The "psychic brainwashing." The "psychic communications." The "psychic control." The "psychic controllers." The "psychic counterattacks." The "psychic countermeasures." The "psychic crisis." The "psychic cure." The "psychic cures." The "psychic delivery systems." The "psychic destruction." The "psychic detection." The "psychic detectors." The "psychic devices." The "psychic discoveries." The "psych dowsing." The "psychic emergency." The "psychic equipment." The "psychic entrainment." The "psychic experiments." The "psychic harassment." The "psychic hardware." The "psychic healing." The "psychic jamming issues." The "psychic jammers." The "psychic medical." The "psychic merchandise." The "psychic mind control attacks." The "psychic offers." The "psychic powers." The "psychic products." The "psychic radionics." The "psychic receptions." The "psychic remote control." The "psychic research." The "psychic researchers." The "psychic science projects." The "psychic services." The "psychic shielding issues." The "psychic signals. The "psychic subliminal mind control attacks." The "psychic survival." The "psychic survivalism." The "psychic systems." The "psychic therapies." The "psychic therapy." The "psychic transmissions." The "psychic treatments." The "psychic victim." The "psychic victims." The "psychic weapons systems research." The "psychic weapons technologies." The "psychic weaponry."
Psychological: The "psychological battlefields." The "psychological disorder." The "psychological disorders." The "psychological effects of mind control attacks." The "psychological entraining." The "psychological entrainment technology." The "psychological experiences." The "psychological manifestations of mind control attacks." The "psyops operations technology." The "psyops programs technology." The "psychological problems." The "psychological research." The "psychological researchers." The "psychological symptoms of mind control attacks." The "psychological torment." The "psychological torture." The "psychological victims." The "psychological war." The "psychological warfare operations (psyops operations)." The "psychological warfare programs (psyops programs)." The "psychological weapons."
Psychotronic: The "psychotronic activities." The "psychotronic activity." The "psychotronic advances." The "psychotronic amplifiers." The "psychotronic attacks." The "psychotronic behavioral modifications." The "psychotronic body control attacks." The "psychotronic brain entrainment." The "psychotronic brainwashing." The "psychotronic communications." The "psychotronic control." The "psychotronic controllers." The "psychotronic counterattacks." The "psychotronic countermeasures." The "psychotronic cure." The "psychotronic cures." The "psychotronic delivery systems." The "psychotronic destruction." The "psychotronic detection." The "psychotronic detectors." The "psychotronic devices." The "psychotronic discoveries." The "psychic dowsing." The "psychotronic equipment." The "psychotronic entrainment." The "psychotronic experiments." The "psychotronic harassment." The "psychotronic hardware." The "psychotronic healing." The "psychotronic jamming issues." The "psychotronic jammers." The "psychotronic medical." The "psychotronic merchandise." The "psychotronic mind control attacks." The "psychotronic offers." The "psychotronic powers." The "psychotronic products." The "psychotronic radionics." The "psychotronic receptions." The "psychotronic remote control." The "psychotronic research." The "psychotronic researchers." The "psychotronic science projects." The "psychotronic services." The "psychotronic shielding issues." The "psychotronic signals. The "psychotronic subliminal mind control attacks." The "psychotronic survival." The "psychotronic survivalism." The "psychotronic systems." The "psychotronic therapies." The "psychotronic therapy." The "psychotronic torture weapons systems research." The "psychotronic transmissions." The "psychotronic treatments." The "psychotronic victim." The "psychotronic victims." The "psychotronic weapons systems research." The "psychotronic weapons technologies." The "psychotronic weaponry." The "pulse electrodes." The "pulsed brain stimulations." The "pulsed electromagnetic weapons." The "pulsed electronic attack techniques." The "pulsed microwave attacks." The "pulsed microwave radiation attacks." The "pulsed mind control techniques." The "pulsed stimulation of the brain."
Q-R: The "racial profiling brainwave analysis." The "racial profiling brainwave signatures." The "racial profiling brainwave technology." The "radar countermeasures." The "radionics devices." The "radionics equipment." The "radionics hardware." The "radionics technology." The "radionics rife devices." The "radionics therapy." The "radio surveillance." The "recording electrodes." The "regrowth stimulations." The "regrowth stimulators."
The "remote behavioral modification weapons." The "remote body control weapons." The "remote brain monitoring." The "remote brainwave entrainment weapons." The "remote brainwashing weapons." The "remote control attacks." The "remote control devices." The "remote control techniques." The "remote controllers." The "remote behavioral modification attacks." The "remote body control attacks." The "remote electronic attack weapons." The "remote brainwave entrainment attacks." The "remote brainwashing attacks." The "remote electronic attacks." The "remote mind control attacks." The "remote subliminal mind control attacks." The "remote behavioral modification devices." The "remote body control devices." The "remote brainwave entrainment devices." The "remote brainwashing devices." The "remote electronic attack devices." The "remote mind control devices." The "remote mind control weapons." The "remote neural devices." The "remote neural monitoring devices." The "remote neural monitoring technologies." The "remote neural monitoring weapons." The "RNM devices." The "RNM technologies." The "RNM weapons." The "remote sensing attacks." The "remote sensing detection." The "remote sensing detectors." The "remote sensing countermeasures." The "remote sensing devices." The "remote sensing equipment." The "remote sensing hardware." The "remote sensing systems." The "remote sensing tactics." The "remote sensing techniques." The "remote sensing technology." The "remote sensing weapons systems research." The "remote sensor systems." The "remote sensors." The "remote subliminal mind control devices." The "remote behavioral modification techniques." The "remote body control techniques." The "remote brainwave entrainment techniques." The "remote brainwashing techniques." The "remote electronic attack techniques." The "remote mind control techniques." The "remote subliminal mind control techniques." The "remote subliminal mind control weapons."
The "remote control behavioral modification attacks." The "remote control body control attacks." The "remote control brainwave entrainment attacks." The "remote control brainwashing attacks." The "remote control electronic attacks." The "remote control mind control attacks." The "remote control subliminal mind control attacks." The "remote control brain attacks." The "remote control behavioral modification devices." The "remote control body control devices." The "remote control brainwave entrainment devices." The "remote control brainwashing devices." The "remote control electronic attack devices." The "remote control mind control devices." The "remote control subliminal mind control devices." The "remote control brain attack devices." The "remote control brain devices." The "remote control behavioral modification techniques." The "remote control body control techniques." The "remote control brainwave entrainment techniques." The "remote control brainwashing techniques." The "remote control electronic attack techniques." The "remote control mind control techniques." The "remote control subliminal mind control techniques." The "remote control behavioral modification weapons." The "remote control body control weapons." The "remote control brainwave entrainment weapons." The "remote control brainwashing weapons." The "remote control electronic attack weapons." The "remote control mind control weapons." The "remote control subliminal mind control weapons." The "remote control brain attack weapons." The "remote control brain weapons." The "remote control viewing methods." The "remote control viewing technologies." The "remote influencing technologies."
The "radar torture weapons." The "radar weapons systems research." The "radar weapons technologies." The "radiation intelligence." The "radio frequency magnetic resonance imagery." The "radio frequency functional magnetic resonance imaging." The "remote functional magnetic resonance imagery." The "remote functional magnetic resonance imaging." The "remote magnetic resonance imagery." The "remote magnetic resonance imaging." The "remote MRI Black Projects." The "remote MRI electronic attacks." The "remote MRI methods." The "remote MRI mind control techniques." The "remote MRI research." The "remote MRI techniques." The "remote MRI technology." The "remote MRI weapons systems research." The "REM sleep stage." The "rapid eye movement sleep stage." The "repairing circuits." The "repairing devices." The "repairing equipment." The "repairing hardware." The "repairing products." The "repairing services." The "reprogram behavior." The "reprogramming behavior." The "research designs." The "research hardware." The "research inventions." The "research products." The "research science project." The "research services." The "reverse engineer." The "research aliens." The "research electronic attack." The "research electronic harassment." The "research electronic weapons." The "research fortean phenomena." The "research ghosts." The "research spirits." The "research brain harassment." The "research unknown entities." The "research unknown presences."The "reverse engineering." The "rf brain stimulations." The "rf stimulation of the brain." The "RFID attacks." The "RFID behavioral control devices."The "RFID behavioral modifications." The "RFID countermeasures." The "RFID detection." The "RFID control." The "RFID devices." The "RFID electronics devices." The "RFID embedded devices." The "RFID entrainment devices." The "RFID implant control." The "RFID implant programming." The "RFID implanted devices." The "RFID implants." The "RFID jammers." The "RFID jamming issues." The "RFID mind control devices." The "RFID programming." The "RFID proliferation." The "RFID shielding issues." The "RFID techniques." The "RFID technology." The "RFID technologies." The "RFID targeting." The "RFID tracking." The "RFID strategy." The "RFID strategies." The "rife devices." The "rife hardware." The "room bug transmitters." The "Russian controlled offensive behavior."
SA-SO: The "satellite electronic attacks." The "satellite mind control attacks." The "satellite subliminal mind control attacks." The "satellite tracking." The "scalar waves fear." The "science project." The "science projects." The "secret communications methods." The "secret communications technologies." The "secret electronic attack technologies." The "secret mind control technologies." The "secret society brain entrainment experiments." The "secret society conspiracies." The "secret society mind control experiments." The "secret society subliminal mind control experiments." The "secret societies." The "secret technologies." The "secrets of body control attacks." The "secrets of brain entrainment." The "secrets of brainwave entrainment." The "secrets of brainwashing." The "secrets of directed energy weapons." The "secrets of electronic attack." The "secrets of electronic harassment." The "secrets of mind control attacks." The "secrets of subliminal mind control attacks." The "self-healing." The "self-healing devices." The "self-healing equipment." The "self-healing hardware." The "self-healing merchandise." The "self-healing offers." The "self-healing products." The "Semantic Stimuli Response Measurements Technology." The "sensory centers of the brain." The "severe altered states."
The "shield against electronic attacks." The "shield against electronic brain." The "shield against electronic entrainment." The "shield against electronic harassment." The "shield against electronic implant control." The "shield against electronic implant programming." The "shield against electronic implants." The "shield against electronic mind control attacks." The "shield against electronic spying." The "shield against electronic subliminal mind control attacks." The "shield against electronic surveillance." The "shield against electronic torture." The "shield against electronic weapons." The "shield against mind control attacks." The "shield against subliminal mind control attacks." The "shield against brain attacks." The "shield against brain entrainment." The "shield against brainwave entrainment." The "shield against brain harassment." The "shield against brain attacks." The "shield against brainwave spying." The "shield against subliminal mind control attacks." The "shield against brainwave surveillance." The "shield against brain torture." The "shield against brain weapons." The "Silent Sound Spread Spectrum programs (SSSS programs)." The "Silent Sound Spread Spectrum systems (SSSS systems)." The "Silent Sound Spread Spectrum technologies (SSSS technologies)." The "Silent Subliminal Presentation System technology." The "signal jamming issues." The "signal jamming devices." The "signal jamming hardware." The "signal shielding issues." The "signals intelligence." The "sixth sense." The "skin lesions caused by electronic attacks." The "skin rashes caused by electronic attacks." The "sleep inducer." The "Solfeggio Frequencies." The "Solfeggio Scale." The "sonic torture weapons." The "sonic weapons systems research." The "sonic weapons technologies." The "Super Soft-Pinch Electrodes." The "sounds from the walls." The "Soviet controlled offensive behavior." The "Soviet KGB electronic attack programs." The "Soviet KGB electronic attack technologies." The "Soviet KGB mind control programs." The "Soviet KGB mind control technologies." The "Soviet KGB Psychotronic Influence System program (PIS program)."
SP: The "deep space aliens." The "deep space alien abductions." The "deep space alien attacks." The "deep space alien blasters." The "deep space alien busters." The "deep space alien electronic attacks." The "deep space alien electronic implants." The "deep space alien implants." The "deep space alien mind control powers." The "deep space alien weapons systems research." The "deep space alien weapons." The "deep space aliens." The "special orders." The "special order consulting." The "special order devices." The "special order equipment." The "special order hardware." The "special order merchandise." The "special order offers." The "special order products." The "special order product offers." The "special order services." The "special project." The "special project consulting." The "special project devices." The "special project equipment." The "special project hardware." The "special project merchandise." The "special project offers." The "special project products." The "special project product offers." The "special project services." The "special projects." The "special projects consulting." The "special projects devices." The "special projects equipment." The "special projects hardware." The "special projects merchandise." The "special projects offers." The "special projects products." The "special projects product offers." The "special projects services."The "specialized consulting." The "specialized devices." The "specialized equipment." The "specialized hardware." The "specialized merchandise." The "specialized offers." The "spirit world."
SQ-ST: The "Squad programs (S-Quad programs)." The "Squad systems (S-Quad systems)." The "Squad technologies (S-Quad technologies)." The "SSRM Tek." The "Stage 1 sleep." The "Stage 2 sleep." The "Stage 3 sleep." The "Stage 4 sleep." The "stealth paint." The "stealth paint mixture." The "stealth techniques." The "stealth technology." The "stim electrodes." The "stimulating electrodes." The "stimulations of the brain." The "stimulator electrodes." The "StingRay devices." The "StingRay technology."
The "stop aliens." The "stop brain entrainment attacks." The "stop brainwashing attacks." The "stop electronic attacks." The "stop electronic brain entrainment attacks." The "stop electronic entrainment attacks." The "stop electronic harassment." The "stop electronic implant control." The "stop electronic implant programming." The "stop electronic implants." The "stop electronic mind control attacks." The "stop electronic spying." The "stop electronic subliminal mind control attacks." The "stop electronic surveillance." The "stop electronic torture." The "stop ghosts." The "stop implant control." The "stop implant programming." The "stop implants." The "stop lightning attacks." The "stop mind control attacks." The "stop pain field generator attacks." The "stop subliminal mind control attacks." The "stop brain attacks." The "stop brain entrainment attacks." The "stop brainwave entrainment attacks." The "stop brain harassment." The "stop brain control attacks." The "stop brain spying." The "stop brainwave spying." The "stop brainwave signature spying." The "stop brain subliminal mind control attacks." The "stop brain surveillance." The "stop brainwave surveillance." The "stop brainwave signature surveillance." The "stop brain torture." The "stop unknown entities." The "stop unknown presences." The "strange phenomena." The "strange sights." The "strange voices."
SU-SZ: The "subliminal ads." The "subliminal advertisements." The "subliminal advertising." The "subliminal advertising." The "subliminal brain entrainment experiments." The "subliminal brainwashing devices." The "subliminal brainwashing experiments." The "subliminal control of the mind experiments." The "subliminal effects." The "subliminal images." The "subliminal learning." The "subliminal messages." The "subliminal messaging." The "subliminal mind control attacks." The "subliminal mind control conspiracies." The "subliminal mind control conspiracies." The "subliminal mind control countermeasures." The "subliminal mind control devices." The "subliminal mind control experiments." The "subliminal mind control methods." The "subliminal mind control powers." The "subliminal mind control protection." The "subliminal mind control secrets." The "subliminal mind control slaves." The "subliminal mind control stories." The "subliminal mind control strategies." The "subliminal mind control systems." The "subliminal mind control tactics." The "subliminal mind control techniques." The "subliminal mind control technologies." The "subliminal mind control torture." The "subliminal mind control tutorial." The "subliminal mind control victims." The "subliminal mind control weapons." The "subliminal mind control zombies." The "subliminal mind readers." The "subliminal mind reading methods." The "subliminal mind reading techniques." The "subliminal mind reading technologies." The "subliminal mixers." The "subliminal perceptions." The "subliminal persuasion." The "subliminal programming." The "subliminal stimuli." The "supernatural phenomena." The "supernatural phenomenon." The "surface electrodes." The "surveillance camera designs." The "surveillance camera technology." The "surveillance cameras." The "surveillance devices." The "surveillance hardware." The "surveillance metal detectors." The "surveillance technology." The "surveillance transmitters."
T: The "Targeted Individuals support groups." The "Targeted Individuals under attack." The "Targeted Individuals under electronic attack." The "Targeted Individuals under mind control attacks." The "targets of government electronic attacks." The "targets of government electronic mind control attacks." The "targets of government mind control attacks." The "technical coaching." The "technical coaching services." The "technical consulting." The "technical life coaching." The "technical surveillance counter measures technology."
The "telecoils and magnetic induction loop systems for hearing aids." The "telecoils and magnetic loop systems for hearing aids." The "telepathic amplifiers." The "telepathic attack." The "telepathic brain entrainment." The "telepathic body control attacks." The "telepathic communications." The "telepathic control." The "telepathic countermeasures." The "telepathic detection." The "telepathic devices." The "telepathic eavesdropping." The "telepathic equipment." The "telepathic hardware." The "telepathic harassment." The "telepathic identification." The "telepathic interference." The "telepathic location finding." The "telepathic mind control attacks." The "telepathic mind reading attacks." The "telepathic powers." The "telepathic security." The "telepathic services." The "telepathic spying." The "telepathic subliminal mind control attacks." The "telepathic surveillance." The "telepathic technology." The "telepathic theories." The "telepathic tracking." The "telepathic weapons."
The "Tempest brain monitoring." The "Tempest monitoring of the brain." The "terroristic electronic attacks." The "terroristic electronic mind control attacks." The "terroristic mind control attacks." The "test circuits." The "test devices." The "test equipment." The "test hardware." The "test instruments." The "test products." The "test services." The "testing services." The "therapeutic devices." The "therapeutic electromagnetism." The "therapeutic electronics." The "therapeutic lights." The "therapeutic magnetism." The "therapeutic pulses." The "therapeutic pulse trains." The "therapeutic signals." The "therapeutic waveforms." The "thermal imaging." The "theta brain waves." The "theta brain wave control." The "theta brainwaves." The "theta brainwave control." The "theta brainwave monitoring." The "theta brainwave signals." The "theta frequencies." The "theta waves." The "thought center." The "thought control attacks." The "thought control electronics." The "thought control methods." The "thought control mind control methods." The "thought control technologies." The "thought control research." The "thought control science." The "thought control systems." The "thought control tactics." The "thought control techniques." The "thought control technology." The "thought reading mind control attacks." The "tin foil hat shielding." The "tinfoil hat shielding." The "TDCS stimulation technology." The "TMS stimulation technology." The "trance-formation devices." The "trance-formation techniques." The "transcranial electromagnetic evoked potentials." The "transcranial electromagnetic stimulation responses." The "transcranial electronic evoked potentials." The "transcranial electronic stimulation responses." The "transcranial magnetic evoked potentials." The "transcranial magnetic stimulation devices." The "transcranial magnetic stimulation technology." The "transcranial magnetic stimulation responses." The "transcranial direct current stimulation technology." The "transcranial electromagnetic stimulators." The "transcranial electronic stimulators." The "transcranial magnetic stimulators." The "transcutaneous electrical nerve stimulation responses." The "transcutaneous electrical nerve stimulators."
The "triangulate aliens." The "triangulate electronic attacks." The "triangulate electronic harassment." The "triangulate electronic mind control attacks." The "triangulate electronic spying." The "triangulate electronic subliminal mind control attacks." The "triangulate electronic surveillance." The "triangulate ghosts." The "triangulate lightning strikes." The "triangulate mind control attacks." The "triangulate subliminal mind control attacks." The "triangulate pain field generator attacks." The "triangulate unknown entities." The "triangulate unknown presences."
The "troubleshoot circuits." The "troubleshoot devices." The "troubleshoot equipment." The "troubleshoot hardware." The "troubleshoot instruments." The "troubleshoot products." The "troubleshoot services." The "troubleshooting services." The "true happiness." The "tscm experts." The "tscm methods." The "tscm systems." The "tscm technology." The "tscm testing." The "twilight zone."
U: The "UFO abductions." The "UFO contacts." The "UFO Magazine." The "UFO visits." The "ultimate weapons."
The "ultraviolet therapy." The "under attack." The "unknown entity detection." The "unknown entity detecting." The "unknown entity detectors." The "unknown presence detection." The "unknown presence detecting." The "unknown presence detectors." The "upgrading circuits." The "upgrading devices." The "upgrading equipment." The "upgrading hardware." The "upgrading products." The "upgrading services." The "urgently needed." The "USSR controlled offensive behavior."
V-Z: The "V2K attacks." The "V2K electronic attacks." The "V2K harassment." The "V2K mind control attacks." The "V2K technology." The "vehicle tracking transmitters." The "Velostat materials." The "victim of electronic attack." The "victim of mind control attacks." The "victim of subliminal mind control attacks." The "victims of mind control attacks." The "victims of mind control support groups." The "victims of subliminal mind control attacks." The "virtual reality devices." The "virtual reality using artificial intelligence." The "visual cortex." The "visual hallucinations caused by electronic attacks." The "visual hallucinations caused by mind control attacks." The "voice-of-Allah mind control technology." The "voice-of-Allah weapons." The "voice-of-Allah weapon systems technology." The "voice-of-God mind control technology." The "voice-of-God weapons." The "voice-of-God weapon systems technology." The "voice to skull attacks." The "voice to skull electronic attacks." The "voice to skull harassment." The "voice to skull mind control attacks." The "voice to skull technology." The "voices from the walls." The "voices in the head." The "voices in your head." The "voices ordering you what to do." The "voices telling you what to do." The "weird phenomena." The "weird sights." The "weird sounds." The "weird voices." The "world is in a heightened state of paranoia." The "zero-evidence attacks." The "zero-evidence weapons." The "zero-evidence weaponry."
This webpage is filled with mind control information and electronic attack information relevant to mind control strategies, electronic attack strategies, mind control tactics, electronic attack tactics, mind control techniques, electronic attack techniques, mind control weapons, electronic attack weapons, mind control countermeasures, electronic attack countermeasures, and mind control detectors and electronic attack detectors.
IMAGE SPONSORED BY: Consumertronics Lone Star Consulting, Inc. ABQ-Techzonics REPRINT POW-MIA IMAGE=> ON YOUR WEBSITE |
NOTE 1: We make no medical, legal, scientific, engineering, supernatural or paranormal claims including but not limited to claims about the existence, extent, intentions, purposes and capabilities of space aliens, ghosts, spirits, psychic powers, psionics, mental telepathy, precognition, auras, clairvoyance, remote viewing and pschokinesis - all related CD projects we do are based on our proprietary theories SHOULD they actually exist AND if the customer does not clearly specify in his/her CDAF another theory he/she wants the CD device design to be based upon.
NOTE 2: By policy, we never recommend for or against, approve or disapprove, sponsor, endorse,
support, guarantee, or take any responsibility for any of the content of any
non-Lone Star Consulting, Inc. webpage, website, advertisement, publication
or other statement EVEN IF WE HAVE PROVIDED A HOTLINK TO IT. And by policy,
we never recommend for or against, approve or disapprove, sponsor, endorse,
support, guarantee, or take any responsibility for any company, person, product or service EVEN IF WE HAVE PROVIDED A HOTLINK TO IT. For
more information on our policies, please refer to our policies.htm
webpage.
Webmaster's Test Links only - not for visitor use: Source-A Source-D Source-E Source-F Source-G Source-H Source-I Source-J Source-K Source-L Source-M Source-N Source-P Source-Q Source-R