Mind Control Attacks (MC), Neurological Weapons Attacks, Electronic Attacks, Electronic Harassment (EH), Electronic Implants (EI) and Brain State Control / Brain State Monitoring, Electronic Patches (Patch Implants), Brain Entrainment, Brainwashing, Brainwave Signatures, Mind Reading, Remote Neural Monitoring (RNM), Mind Probes, Behavioral Modification, Body Control, Brain Entrainment, Brain Stimulation, Subliminal Mind Control Programming Technologies, Directed Energy Weapons Technologies, Microwave Attacks, Microwave Harassment, Microwave Mind Control, EMF attacks, EMF Mind Control, Circular Polarized Light Attacks, Carrier Current Attacks, Fluorescent Lighting Attacks, Voice-to-Skull Technology (V2K, V2S), ELF Attacks, Artificial Intelligence, StingRay Devices, Remote Monitoring, Implanted Thoughts, Implanted Fake Memories, Manchurian Candidates, Electronic Gang Stalking, Manifestations, Electronic Countermeasures Customized Device Types!
LONE STAR CONSULTING, INC.
of EL PASO, TEXAS

=>
Customized Devices Application Form (CDAF)
All Customized Device (CD) Types Links by Topics

2024 Catalog now on 1G Flash Drive (only $39 (includes USA S/H))

Lone Star Consulting, Inc.: Click CDAF Link above for Our Address

VOICE (9-5 MST, M-F): [1-915-474-0334] (Prefer Email)


No Payment Clearance Period: U.S. Postal Money Order or Cash
Payment Clearance Period: Any Other Valid M.O., Check or Trade
Welcome to Lone Star Consulting, Inc. Products & Services Guide Website: www.lonestarconsultinginc.com/specproj.htm

Email => Tekmaster
[email protected]

Who We Are + Privacy Policies
+ HTTPS Fallacies


Sitemap - Other Policies


Print, save, bookmark: www.lonestarconsultinginc.com/coaching.htm
USA Site - No cookies - No adware - No spyware - No trojans - No viruses - No worms - No spam - No popups
We Respect Your Privacy - We do NOT Monitor nor Track Your Activities Online, nor Share Your Data

MF MIND CONTROL, ELECTRONIC ATTACK, DETECTION, COUNTERMEASURES DEVICE-TYPES
LINK LIST: ALL EMF COUNTERMEASURE & DETECTION DEVICES

WARNING ALERT!
We are here to serve electronically Targeted Individual (TI) victims to help save them from their perps. The perps hate us for that! Just as TI perps are usually experts at harassing and persecuting TIs, they use those same intentions against us. To discredit us, entrap us, force us out of business, harass us, and get us into legal trouble. Without us, perps can 'feast on your brains' with impunity. The perps have their agents working social media, TI groups, complaint systems, etc. Do NOT let perps scam you into not obtaining protective devices from us, thereby leading you to their slaughter. Do NOT let perps trap you, set you up or isolate you. Whatever insulting they say about you and us, the opposite is true. If you have any questions or concerns relevant to us or anything on our website, or are aware of suspicious activity against us, please email us right away. We are custom device designers and makers for decades - with many repeat Clients - all of our devices are unique and handmade to our Clients' orders - so those who claim or imply that any (or all) of our devices are this or that, they are lying - DO NOT FALL FOR PERP SCAMS!

REWARD - Please Tell Everyone You Know About Us
Perps are Trying to Prevent TIs from Finding Us Online
We Can't Help TIs Stop Perp Attacks if TIs Don't Know We Are Here to Help Them
Tell Friends, Family, Social Media, Word-of-Mouth, Publications
We Will Pay You 5% Finder's Fee of TI's Paid-Up CD Project if TI is Referred by You
(Only One Finder's Fee Will Be Applied fob Each TI Customized Devices (CD) Project: Referral Must be Made on CDAF Form)

OUR POPULAR MIND CONTROL INFO WEBPAGES:
Mind Control Info Relevant to EMF and Sound Attacks + Countermeasure Devices Links
Mind Control Info on EMF Attacks + Countermeasure Devices Links (This Webpage)
Mind Control Info on Sound Attacks + Countermeasure Devices Links

OUR POPULAR EMF DEVICES DESCRIPTIONS WEBPAGES:
EMF, MICROWAVE, RF SHIELDING WEBPAGE
          EMF, MICROWAVE, RF DETECTION, TRIANGULATING, LOCATING WEBPAGE
          EMF, MICROWAVE, RF JAMMING, MASKING, GENERATING & TRANSMITTING WEBPAGE

BUYING FROM US IS SIMPLE: (1) Select the Unique Customized Device(s) You Want on This or Any Other Page, (2) Click on the green CDAF Link above, (3) Print and Complete the CDAF Form (one CDAF for each Device), (4) Scan your completed CDAF on a scanner. (4) Mail or Email as scanned-in (not photographed) JPG or GIF image Files to Us Your CDAF(s). We Respond to You Within 3 Days About Your Proposed CD Project.

The ULTIMO INFRASONIC, AUDIO & ULTRASONIC JAMMER WITH SWEEP-1 (EMFs Version): See UUJ/IJ-EMF for description of our UUJ/IJ-EMF, then BACK to here. New and unused successfully completed and tested CD project - NOT a return, reject, repaired, refurbished nor prior technology - just unclaimed by Client (cannot or will not respond). Much reduced price! Buy TODAY - once this UUJ/IJ-EMF is sold, it is gone forever!
        AVAILABLE TODAY: One Ultimo Ultrasonic Jammer / Infrasonic Jammer (EMF Version). Only $1795 +S/H ($19 Continental USA, else, email us for S/H). We ship within 3 work days upon receipt of full payment (pay by $US Postal Money Order or cash only) and your completed CDAF form (green link above, email or USPS mail to us). No waiting 2-3 working weeks for us to do your UUJ/IJ-EMF. Specify any customizations you want added to UUJ/IJ-EMF in your CDAF (additional cost likely). Need something else? Check out our webpages, then specify in your CDAF so we can consider making it for you.

For Sale! The ULTIMO EMF & ULTRASONIC HEAD SHIELD PROTECTOR (Shielded Helmet): See SH for description of our Shielded Helmet (SH) device-type, then BACK to here. New and unused successfully completed and tested CD project - NOT a return, reject, repaired, refurbished nor prior technology - just unclaimed by Client. Sizes we make: Small, Medium and Large, almost always from motorcycle helmet with shielding extending to the chin and neck areas. In this case, our Client contracted for her SH too late, and the mind control attacks escalated so vile that she and her family were forced to permanently flee the US to escape her perps to a country we could not ship to, preventing us from shipping her completed SH. Much reduced price! Buy TODAY - once this SH is sold, it is gone forever!
        AVAILABLE TODAY: One Shielded Helmet, Size Medium. Only $1195 +S/H ($75 Continental USA, else, email us for S/H). In addition, you save by not having to buy and ship to us the basic helmet we shield. We ship within 3 work days upon receipt of full payment (pay by $US Postal Money Order or cash only) and your completed CDAF form (green link above, email or USPS mail to us). No waiting 2-3 work weeks for us to do your SH. Specify any customizations you want added to SH in your CDAF (additional cost likely). Wrong size for you, or you need something else? Check out our webpages, then specify in your CDAF so we can consider making it for you (NOTE: Due to Covid-19, shipping chain chaos, inflation/gouging, etc., availability of enough shielding materials for us to make you a SH may not exist in enough quantity and/or be much higher priced).

For Sale! The ULTIMO MINI HEAD SHIELD CAPS (Shielded Caps/Hats): See SC/H for description of our Shielded Caps/Hats (SC/H) device-type, then BACK to here. New and unused successfully completed and tested CD project - NOT a returns, reject, refurbished, repaired nor prior technology - just unclaimed by Client. Sizes we make: Small, Medium and Large; almost always baseball cap types with no size-adjust cutouts in the back. Some have ear flaps, back flaps or large brims, which we usually also fill with shielding materials. Much reduced prices!
        AVAILABLE TODAY: One Caps/Hats, Size Medium. Only $695 +S/H ($75 Continental USA, else, email us for S/H). In addition, you save by not having to buy and ship to us the basic caps/hats we shield. We ship within 3 work days upon receipt of full payment (pay by $US Postal Money Order or cash only) and your completed CDAF form (green link above, email or USPS mail to us). No waiting 2-3 work weeks for us to do your SH. Specify any customizations you want added to SH in your CDAF (additional cost likely). Wrong size for you, or you need something else? Check out our webpages, then specify in your CDAF so we can consider making it for you (NOTE
: Due to Covid-19, shipping chain chaos, inflation/gouging, etc., availability of enough shielding materials for us to make you a SH may not exist in enough quantity and/or be much higher priced).

When the Government and law enforcement fail or refuse to protect you or treat you like a crackpot - which almost always happens - YOU must protect yourself! We are here to help you protect yourself.

DO NOT PANIC!
While mind control and electronic attacks seem now so out of control with the Government often complicit that some TIs have given up all hope of ever getting their lives back, we are here to help YOU! While there is a vast number of possible mind control, body control and other electonic attack technologies and devices, there are only 5 known common modalities that can deliver such attacks: (1) Electromagnetic attacks (60% estimated attack percentage, mostly microwave attacks), (2) Ultrasonic attacks (35%), (4) Electronic Implants / Electrical Body Contact (15%), and (5) Infrasonic attacks (10%). Particle beams, gated-ionic radiation (a new little-known mind control and electronic attack technology), ultraviolet, X-Ray, etc. modalities are likely less than 2% total. Note that the percentages add up to more than 100% because some attacks are believed to be caused by a combination of these major modalities (eg: ultrasonic and EM signals used to same-time attack the same TI, ultrasonic signals modulated by infrasonic signals, etc.). It makes little difference what attack technology or device is used against you - be it a programmed off-the-shelf transmitter, customized transmitter, an exotic transmitter (eg: AI, directed energy weapons, holography, gated radiation, etc.) - they all must use one of these modalities to attack you. Each of these mind control and body control electronic attack modalities can be detected, located, jammed and/or shielded against using the unique, specialized devices we make and can provide you for that modality. Once you eliminate the harmful signal(s), you stop the harm caused by the signal(s) - no matter which specific type of device is transmitting the signal(s) or even what your manifestations are. Many TIs get hung up trying to uncover the make & model, level of sophistication or how high-tech are the attack devices (many are homemade). High-energy mind control weapons are not required and almost never used*. Low- and moderate-powered devices are almost always enough, and some can fit into an enclosure smaller than a deck of cards. By shielding out or jamming the signal(s), or locating the transmitter(s) and thereby likely revealing who the perp is and/or eliminating the transmitter(s), you solved the problem! We have the unique device-types designed to help YOU.
         
*Very few perps use powerful transmitter systems for these major reasons: (1) Electronic mind control requires little power to be effective - the brain operates in microvolts and microamps, so only little power is required to electronically mind control. (2) Many perps try to inflict subtle damage to better gain control over you and/or to leave little physical evidence of their attacks and/or to torment/torture you over extended periods (ie: what we call, "sadistic electronic attacks") - burning your brain/body defeats those purposes. (3) Powerful transmitters spill over so much energy that many people, animals and legal transmitters are likely interfered with over a large area, thus the perp risks many complaints by many people alerted to the attacks and be likely discovered. (4) Powerful systems require large, conspicuous, power-hungry and very expensive transmitters. Unless you see a van parked nearby bristling with antennas, AND you are a major target because of your wealth or position, whatever device(s) is attacking you is likely average book size or less.

Introduction to this Page
Customized Devices Application Form (CDAF)

MIND CONTROL, ELECTRONIC HARASSMENT, ELECTRONIC ATTACK
REPORTS AND ANALYSES:
We make no device intended for medical use and we make no medical, supernatural, paranormal, psychic or legal claims, advice or opinion

PERP EVALUATION SERVICES: We are not licensed investigators, so we cannot investigate any perp-related activities. However, we can compare YOUR perp experiences with the reported perp experiences from our many past Clients over decades (Note: We never reveal or infer Client identities). What we do is to compare info that we have about your perps (whether or not you suspect or know their identities) and their modus operandi with those of other suspected perps reported to or discovered by us; and if we find reasonable connections, report them to you. Just as there are serial killers, serial rapists and serial burglars, there are clearly also serial mind control and electronic attack perps and repeat offenders, many of whom develop rituals, habits and patterns. If we can link any of them to you, we will reveal to you in our confidential report who we think they are and what additional links we made, to help you fight or avoid these attacks. And in all such cases, we will also, if you wish (another FREE service), contact our other known Clients (those we still have contact info on) linked to your perps to contact you, if they wish to. And provide you whatever added clues we have that may help you narrow your perps down and develop stronger cases. Serial perps, some of whom we suspect are "guns for hire" (similar to professional hit men), may operate in the same area, use the same/similar type of devices, signals, attack scheduling, and/or have other behaviors. If you contract with us for any mind control or attack-related customized countermeasure (shielding or jamming) or transmitter detection/location device from us, we will provide you this invaluable service for FREE for all of our Good Clients, in which case, complete the last questions of our Customized Devices Application Form (CDAF). Should you want us to do this service for you without contracting with us for any of our devices, then you still need to complete and provide us the CDAF for this service (be sure to provide us your CDAF's last questions info), in which case our rough Estimated Cost (EC) is $295 (Note: If within 30 days of contracting us for this service, you then contract with us for any device of $200+ EC, we will subtract 25% from your device's EC (up to $295 max)). If you suspect more than 10 perps, then provide us your info on each of the top 10 only. If we need more info relevant to your CDAF last questions answers to help us to make better correlations to provide you and possibly other TIs better service, we will ask you to provide it.

MIND CONTROL & ELECTRONIC ATTACK ANALYSIS REPORT: Are you a Targeted Individual (TI) being attacked by perpetrators using mind control and electronic attack devices? There are so many signals out there being absorbed by your brain and body, while most are not malicious, how can you tell for sure which signals are harmful or malicious to you? Due to popular demand, we are now offering our MC&EAAR service. How this works is that you provide us your data points on the signals you receive using either a detection device we provided you as an earlier separate unique CD Project (see below for detailed descriptions of our popular mind control and electronic attack detection device types) or from your own signal detection equipment. We then objectively analyze your data points, and provide you a written report on our analysis of your data points. Your "data points" consists of the detected signal details and the resulting manifestations which you believe were caused by the detected signals. "Detected signal details" consists of the signal frequency, signal strength or signal power (eg: LED bar readouts, volts/meter, dbm, gauss), direction (if you used a directional antenna) and duration, and the date and time of signal detection. "Resulting manifestations" consists of the physical, electronic, electrical and/or equipment manifestations you experienced shortly after or during a signal exposure, the duration of the manifestations, and date and time of manifestations. One "data point" consists of one line of detected signal details for each detected signal followed by one line of your observed resulting manifestations. Please also include the make and model of your detection device, a sketch(es) of the layout of the place where you experience these signals showing your equipment setup, and any other relevant information which you believe would assist our mind control and electronic attack analysis for you.
             Last made $995 [1-5 lb] for up to 100 data points (if your data points exceed 100, add $75 for each additional 10 data points) you need analyzed. (NOTE: We provide a 10% discount for our MC&EAAR services if your detection device is one which we provided you earlier as a separate CD Project (detailed descriptions of our popular mind control and electronic attack detection device-types below); the estimated costs by us is for the analysis and report only, it is not a retainer of any kind and does not include any mind control or electronic attack expert witness services or any other services (if you require additional services from us, you must provide us a new CDAF form for each additional service for us to consider), it does not include any hardware of any kind, and it does not include any onsite visits (we do not personally meet with Clients) or travel by anyone; our analysis is solely based on the information provided to us by the Client with his/her CDAF and assumes that the Client's information is 100% accurate and complete; Client assumes full responsibility for the accuracy and completeness of all of his/her information; our analysis shall be objective, unbiased and with an open mind even if it differs with the Clients own opinions or analysis; we will not identify any alleged perpetrator(s) or their motives or intentions as that is beyond the scope of our direct knowledge; and Client's costs are totally non-refunable once we have completed our analysis).

Introduction to this Page
Customized Devices Application Form (CDAF)

Related Links below are to Our EMF MIND CONTROL Device-Types
Mind Control Info Relevant to EMF and Sound Attacks - mindcontrol.htm (Read This Page First - before mindcontrol1.htm and mindcontrol2.htm pages linked below: Developments relevant to BOTH EMF Mind Control and Sound Mind Control)
Mind Control, Electronic Attack Device Types - mindcontrol1.htm (EMF Mind Control: Developments in Electronic, Electrical, Magnetic, Microwaves, RF, Light, Implants, etc. Mind Control and Electronic Attack Technologies, includes Links to our Mind Control Device-Types Descriptions)
Mind Control, Electronic Attack Device Types - mindcontrol2.htm (Sound Mind Control: Developments in Ultrasonic, Infrasonic, Audio, Sonar, etc. Mind Control and Electronic Attack Technologies, includes Links to our Mind Control Device-Types Descriptions)
Medical, Radionics, Biomedical Device Types - radionics.htm

EMF MIND CONTROL, ELECTRONIC ATTACK, DETECTION, COUNTERMEASURES DEVICE-TYPES:
          EMF, MICROWAVE, RF SHIELDING WEBPAGE
          EMF, MICROWAVE, RF DETECTION, TRIANGULATING, LOCATING WEBPAGE
          EMF, MICROWAVE, RF JAMMING, MASKING, GENERATING & TRANSMITTING WEBPAGE
The Ultimo Infrasonic, Audio & Ultrasonic Jammer with Sweep-1 (EMFs) - Most Popular with Clients!
Perp Evaluation Services
Mind Control & Electronic Attack Analysis Report
The Ultimo EMF & Ultrasonic Head Shield Protector (Shielded Helmet)
The Ultimo Mini Head Shield Cap (Shielded Cap/Hat)
The Ultimo Shielded Face Mask
The Ultimo Sleep Head Shielded Hood
The Ultimo EMF Shielded Bag/Box
The Ultimo Shielded Pet Sanctuary
The Ultimo Earmuffs Shield (Shielded Earmuffs)
The Ultimo Powered/Non-Powered Mobius Coils
The Ultimo Doug Coil Rife Machine (PEMF Device)
The Ultimo Brainwave Shuffler (Brainwave Frequency Shuffler)
The Ultimo Solfeggio Harmonizer
The Ultimo 7 Chakras Harmonizer
The Ultimo Shielded Wrap (Protects Against Implants and Remote Transmitters)
The Ultimo Full-Body Shielded Raincoat
The Ultimo Velostat Electrostatic Shield
Anti-Aging Cosmic Rays Deflector - Protect Yourself from Cosmic Rays to Slow Down the Aging Process!
The Ultimo Magnetic Body Signal Blocker
The Ultimo Electrical Body Signal Blocker
The Ultimo Pulsed Neurophone Body Signal Blocker
The Stealth Paint "Elixer"
Wiring Hitchhiking Harasser Eliminators (Phone Lines/Power Lines)
The Ultimo Mechanical EM Transmitter Locator
The Ultimo EM Transmitter Direction Finder
The Ultimo EM Transmitting Electronic Implant Locator
The Ultimo EM Transmitter Triangulator
The Personal EMF Jammer
The Ultra Infrasonic Jammer / ELF Jammer
The Ultimo Proximity Detector & Alarm
The Programmable Ultrasonic/Audio/Infrasonic Precision Frequency Generator
The Programmable Narrowband Frequency Generator
The Ultimo LED Mind Control Detector
The Ultimo Modulated LED Controller
The Ultimo Magnetic Body Resonant Frequency Detector
The Brain Signature Waveform Detector
The Ultimo Brainwave Analysis & Biofeedback/Biocontrol Device
The Automatic Writing Machine
The Ultrasonic Galvanic Skin Response Correlator
The Omnimax TENS System
The Unknown & Unseen Entity Detector
Scanners - The Device
The Ultimate Weapons & Lab Development System
The Programmable Light & Sound Detector
The Long-Range Infrared Detector
The Ultimo "Montauk Chair"
The 6th Sense Communicator
The Telepathic Amplifier
The Alien Buster Blaster
Super-Sensitive, Super-Directional Antennas
The Very Flat & Thin Spiral Antennas
The Super Soft-Pinch Electrodes
The Velostat Electrodes (with Meter)

Like what we offer and have a website? Then please put free hotlink to our home page => Lonestarconsultinginc.com
Customized Devices Application Form (CDAF)
High-Tech Mind Control Attacks, Electronic Attacks, Countermeasures Customized Device Types
Mind Control (Mindcon, MC), Neurological Weapons, Subliminal Mind Control, Body Control (Bodycon), Behavior Modification, Brain Entrainment, Brainwashing, Brainwave Signatures, Brain Entrainment, Remote Neural Monitoring (RNM), Mind Reading (Mindread), Mind Probing, Remote Influencing, Voice-to-Skull Technology (V2K, V2S), ELF Attacks, Electronic Attacks, Electronic Harassment (EH), Directed Energy Weapons Systems, Electronic Implants (EI) and Brain State Control / Brain State Monitoring, Microwave Attacks, Microwave Harassment, Microwave Mind Control, EMF Attacks (Electromagnetic Attacks), EMF Mind Control (Electromagnetic Mind Control), Circular Polarized Light Attacks, Carrier Current Attacks, Fluorescent Lighting Attacks, Brain Stimulations, Implanted Fake Memories, Implanted Thoughts, Manchurian Candidates, Electronic Gang Stalking, Manifestations, Electronic Countermeasures Products and Services.

Unique, Original, Made-to-Order, Special Needs, Unusual, Strange, Weird Customized Device Types We Can Do For YOU! Backed by decades of Professional Design Experience!
Lone Star Consulting, Inc. consulting services


Print, save, bookmark: www.lonestarconsultinginc.com
... and tell your friends!

ARE YOU A TARGETED INDIVIDUAL (TI)?: John Williams's (MSEE) and his people's extensive electronic weaponry, electronic harassment devices, and Radionics devices researches and many projects - including on-site investigations of cases - have resulted in high levels of understanding and insights into electronic mind control and harassment techniques, technologies and manifestations, and especially their countermeasures and transmitter location devices. The technologies for powerful and invisible electronic attacks are proven to exist and are widespread (Online search: "Havana Syndrome", etc.) - attacks aimed at seriously injuring, harassing, controlling, crippling, and "electronic poisoning" people. While you are under electronic attack, you may or may not be aware you are being attacked; however, you will likely experience these manifestations while being attacked or later. Attacks can be by sounds (ultrasonic, audio, and/or infrasonic) or by electromagnetic that may cause sound sensations (Microwave Auditory Effect - MAE).

Manifestations: Do You:

Many of these manifestations may also be caused by non-electronic attack reasons (eg: medical, normal mechanical/electronic problems, etc.), of which you should thoroughly check out (eg: thru your trusted, licensed medical personnel) and rule out if possible. But even if these other often non-electronic manifestations are occurring, electronic attacks aggravate most of these manifestations, so curing a medical problem caused/not caused by an electronic attack may provide only limited and/or temporary relief if electronic attacks were and still are aggravating them. No matter what is causing your medical problems, you need your trusted licensed medical doctors to address them. If due to electronic attacks, come to us to try to stop them from worsening or reoccurring. Many voice, sound and visual phenomena may not be experienced by others near you, or told by them as normal or different sounds and/or sights. Having medical or normal electronic device problems are not mutually exclusive conditions to being electronically attacked - all can occur at same time. Perp attacks may be varied or unvaried in signal type/intensity/timing/direction, and may target the brain, body, and/or electronic devices. Some TIs experience multiple attacks and attack technologies at the same time. If you are not certain that these manifestations are being caused or aggravated ONLY by a medical condition(s), by a normal mechanical/electronic malfunction(s) (eg: from wear and tear), or by some other non-electronic or sound reason, they may be caused by or aggravated by harmful electromagnetic signals or sounds. Note that not all injurious EMF signals and sounds are intended to be malicious; and people differ in sensitivities to EMF signals and sounds.
         
EXPERIENCING LITTLE OR NO MANIFESTATIONS OF ANYTHING?
: You still may be in grave danger of electronics attack. Consider: (1) Electronic attack signals are often not observeable by any of your senses (but can be detected using specialized electronic devices of the types we make). (2) Electronic attacks can cause serious damage over a short or long time, and you may not experience anything until a certain threshhold of damages occurs, then suddenly all comes crashing down. An analogy is cancer: You can have a cancer growing inside of you for years and feel nothing bad, but then one day you suddenly become sick, and are told you are Stage 3 or 4. (3) Even if you are not being currently attacked, if a perp(s) starts attacking you, if you are unprepared, it may be weeks before you can mobilize effective defenses, which then may be too late. An anology is you might carry bear spray with you even though you have never been attacked and have no belief you will be attacked; but once attacked you can quickly defend yourself. Without the bear spray, you may be killed or injured. You keep locks on your doors to end the risks of being murdered, raped or robbed. Same with seatbelts. The way mind control attacks are clearly accelerating today, most people will be attacked within a few years to come, and many attacked multiple times.
         
In today's world, you must assume that your perp(s) has personal files on you (a dossier), describing realtime in detail you, your family members, friends, associates, locations, schedules, facial and gait recognition, habits, vulnerabilities, medical problems, financial situations, etc., and perps know exactly which buttons-to-push to maximize your injuries, pain and suffering. Dossiers were notoriously associated with Nazis, East German Stasi, and communists - today, there are several-to-many dossiers on almost everyone, and some are sold on the dark web. Since 2001, based on reports we get, mind control attacks have been and are skyrocketing. You may be the victim of injurious electromagnetic, ultrasonic, audio, and/or infrasonic signals and sounds, which come in almost countless variations. No matter what attack devices are used, it is critical to block or jam their signals reaching you and your devices. We here to try to help you with our very effective countermeasures (shielding, jamming) to stop the bad signals from damaging you, and transmitter locators. Please let us try to help you.

THE VERY HARMFUL EFFECTS OF MICROWAVES, ULTRASOUNDS AND INFRASOUNDS: The types and frequencies of mental disorders, including various forms of mental illness and dementia (Alzheimers is the most common form of dementia these days) we often see today virtually did not exist 150+ years ago. In some age groups, 50% of the people now have Alzheimers disease. If that happened 100 years ago, it would be all over the scientific and general literature. Most of the Biblical Prophets where very old men, yet they were widely sought after and greatly valued for their wisdom and insights. Some scientists have linked mental disorders to genes. You got your genes from your ancestors, so how come your ancestors didn't get dementia and very few of them were mentally ill? So what has changed? Now, we have many chemicals in our environment than ever before, so some chemicals are a factor (eg: mercury). What else has also greatly changed? 150+ years ago, there was no human-generated electromagnetic signals, ultrasonic signals and infrasonic signals in our environment. Today, our air is full of these signals, most of which are there for communications and entertainment purposes. Now, we have cellphones with powerful antennas blasting out electromagnetic signals just 2-3 inches from our brains. Now, ultrasounds perform many functions ranging from communications to medical to industrial to security. Now, we have infrasounds either modulating audio or ultrasonic signals or from large speakers or mechanical devices. We believe that these constant exposures all of our lives to intense electromagnetic, ultrasonic and infrasonic signals are progressively destroying the most sensitive, vulnerable and valuable part of our bodies - our brains - and are major causes of these clearly huge increases of devastating mental disorders (especially dementia and schizophrenia, and also likely brain cancers and childhood behavioral disorders). So, even if you do not believe that perps are using electronic weapons to attack you, it is clearly very wise to protect your brain and the brains of your loved ones from these brain-damaging assaults. So, please seriously consider our shielding countermeasures described on our mindcontrol webpages. You would not run out into a blizzard without a very good coat to protect your body, so stop running out into microwave, ultrasonic and infrasonic blizzards without protecting your brain!

HEALTHY BIOELECTRICITY IS CRITICAL FOR HEALTHY IMMUNE SYSTEM: Bioelectric signals come in two forms: Neural (ie: nervous system) and cellular. Either is in microvolts and microamps, and thereby easily disturbed by external EMFs. Cellular biolelectricity (or innate bioelectricity) is generated inside the cells themselves, with no connection to the nervous system. Bioelectricity is critical to immune system function, and innate bioelectricity is also critical to tissue repair and regeneration (Note: without excellent innate bioelectricity, you age faster). Bioelectric signals are even critical to cancer. Today, contagious bacteria, viruses and molds abound everywhere, and many are dying. Perps know how to expose your brain and body to dangerous signals that disrupt your normally protective bioelectric signals. And even non-malicious EMFs can be injurious to your immune system. You may feel constantly sick, listless, tired, or with many aches, pains and vague sensations, because your body is constantly fighting off infections with its EMF-caused weakened and disrupted immune system. If your trusted licensed doctor cannot identify an actual medical cause, then we believe it is likely caused by EMF fields plaguing you. Our EMF shielding devices should help you greatly. Please let us try to help you.

THE FICTION OF EMF "SCALAR WAVES": When you run into a website or blog which claims that EMF scalar waves in air exist, that website is very likely being operated by scammers, government agents, and/or ignorant incompetents. Regardless of how popular that website or blog is - CLOSE IT OUT. That website or blog clearly has zero credibility for all its claims. The simple truth is: EMF Scalar Waves do NOT exist as a form of EMF air transmission (scalar waves possibly can exist in some very limited basis, for example, inside crystals, in quantum mechanics). Electrical scalar fields and magnetic scalar fields do exist, but fields are not waves. "Scalar waves" are also called “electromagnetic longitudinal waves,” “Maxwellian waves,” or “Teslawellen waves”, and are usually defined as longitudinally oscillating waves. A simple example of the scalar wave concept is if you grab a slinky toy by its ends and you move your hands like an accordion, the resulting oscillations are scalar-wave like. EMF signals that might fit the common nebulous scalar wave definition are ordinary repetitive frequency modulated (FM) and pulse rate modulated (PRM) waves. From what we know, the scalar wave hoax originated as Russian disinformation as a diversion to steer their electronic mind control victims (of which there are many) into buying worthless scalar wave countermeasure devices, so their victims would not attempt to countermeasure the actual forms of attacks their agents were using. Scammers quickly latched onto the scalar wave bunk, because they could then sell you very costly worthless devices to produce or countermeasure a fictional threat - laughing at you all the way to their bank with your money.
          NOTE: Simply because the term, "scalar waves" appears in the same paper or article with the name of a respected university and/or researcher means nothing - 100s of such papers and articles are said to exist - unless the university or researcher also clearly states that it/he/she has proven that EMF scalar waves exist (none have that we know of). Many people associated with a university use its domain name ".EDU" suffix. For example, just because "Einstein" appears in 100s of articles about "luminiferous ether" (like EMF scalar waves, this ether does not exist in nature), does not mean that Einstein ever believed that luminiferous ether exists. Whenever someone insists that EMF scalar waves exist, we ask them, "What term(s) in Maxwell's Equations proves that EMF scalar waves exist?" We may also ask them, "Provide us quotes from IEEE webpages which clearly state that EMF scalar waves exist as a form of RF transmissions." And/or, "Provide us the makes and model numbers of EMF scalar wave receivers." (No EMF scalar wave receivers equals no EMF scalar wave transmitters, as you need a receiver to prove that a transmitter works). And/or, "Which reputable engineering schools teach classes in EMF scalar waves?" (None that we can find). After dozens of such contacts over many years, we have never received even one answer to our statements.
          Why in the world would anyone use some exotic form of RF mind control attack - even if it existed, which it does not - when just ordinary RF does such a great job?
          NOTE: Simply because the person running a pro-scalar wave website or blog claims to be an "engineer", "scientist" or "doctor" is meaningless, unless you can verify that his/her engineering/science/medical degree and he/she has decades of experience directly related to mind control and electronic attack technologies, and that the person is not lying to you. Most of these "scalar wave" hoax sites are up for short times - many fly-by-nights. Do not listen to anyone who can't prove he/she has the relevant education, decades of experience and wherewithal we have to do these very complex technologies. One recent scalar wave fraudster told us that he had a "masters of engineering degree from Stanford University" We repeatedly asked him, 'What engineering field is your degree in?' He repeatedly refused to tell us. We were unable to verify that this person ever received any kind of engineering degree from Stanford University. But apparently he is making a great living swindling people with his pseudo-science BS.

FARADAY CAGES (ie: FERMI CAGES) vs ELECTRONIC IMPLANTS: This may come as a shock to you, but Faraday cages (Fermi cages) attenuate much less EMF signals generated from inside the cage (including from transmitting electronic implants) passing thru the cage than they attenuate the same kinds of EMF signals transmitting into them. What this means to the TI with a transmitting-type electronic implant(s) is that most Faraday cages provide them little actual protection from perps who track them, monitor them, and/or harvest their brain and body data - possible fatal case of false sense of security. However, our shielding devices (eg: Shielded Helmet, Shielded Cap/Hat, etc.) are not constructed as Faraday cages, so they also protect you from damages caused by transmitting-type electronic implants. Also, unless constructed of thick ferromagnetic metals with little or no holes and openings and heavily grounded to an earth ground, Faraday cages do only a poor-to-moderate job shielding the occupant even from incoming EMF signals.
          NEED TO DEFEAT ELECTRONIC IMPLANTS (INCLUDING RFID CHIPS)?: Based on what is most popular with our Clients and potential Clients who have expressed electronic implant concerns (including RFID chips inside the body) (shielding does not help because shielding only helps if the offending signal transmitter is located outside the body):         
          (1) To jam or block electronic implant signals, most popular is our Ultimo Magnetic Body Signal Blocker.
          (2) To locate a transmitting electronic implant, most popular is our Ultimo EM Transmitting Electronic Implant Locator.

TYPES OF ELECTRONIC IMPLANTS THAT CAUSE MUCH HIGHER SENSITIVITIES TO EMF ATTACKS: Clearly, people with medical implants (or had a implant that no longer works, or was removed, leaving embedded wires or conductive tubes) are clearly more sensitive to EMF attacks than those who have never had an implant. Electronic implants include likely 100s of variations of perp-planted electronic implants, including RFID chips, as well as the many different types of medical implants. These people must stay away from strong electromagnetic fields and electronic currents. Our shielding devices may be the best form of protection. As for medical implants, this is a list of some of them: Cardiac pacemaker, implanted cardoverter defribrillator, magnetically/activated/powered implant, neurostimular/spinal cord stimulator system, bone growth/bone fusion stimulator, cochlear/otologic/other ear implant, insulin/other infusion pump/implanted drug device, eyelid spring/wire, prosthetic appendage, metallic sten/coil/filter, spinal/intraventicular shunt, vascular access port/catheter, radiation seeds/implants, Swan-Ganz themodilution catheter, wire mesh implant, tissue expander (ie: breast enlarger), internal shrapnel, accidentally embedded metal, sugrical screw/nail/wire/plate/staple/clips, IUD/diaphragm/pessary, tattoo/permanent makeup, body piercing jewelry, implanted hearing aid. Medical and non-medical implants can also be used to both track and target certain TIs.

AVOIDANCE, SHIELDING, JAMMING, TRANSMITTER/PERP LOCATING: To protect yourself from mind control and electronic attacks, we have always advised TIs to avoid, shield against, jam against, or locate the transmitter and/or perp to take action against. However, more and more, TIs are telling us, 'I got rid of all of my electronic devices, and everything that is known to carry a GPS device, including my car, and I have travelled all over the world, even to remote places, but still, everywhere I go I am being relentlessly and continuously tracked and electronically surveilled and tortured by my perp!'. Up to about 20 years ago, the biggest problem by far was satellites. Satellites were great if the TI was outdoors, but if the TI was inside a large building, especially with a metal roof or iron rebar in its walls, satellites were avoidable. Today, we live in a far different world. Our world now is full of small electronic devices, there are Electronic Implants and Electronic Patches, cameras and mikes everywhere, AI with facial recognition, spy drones, helicopters, planes, social media, routine and continuous surveillance of your computer activities, etc. Many (and increasingly more) of these devices are made with built-in GPS - which location data is accessible to virtually anyone. Even some car tires are made with built-in GPS units. And there are now huge selections of small (many about the size of a wafer, and some with built-in mikes) GPS spy tracking devices sold by Walmart, many other stores, and Online, such as eBay and Amazon (legally sold ostensibly for people to track their wayward kids, pets, elders, personal property, equipment, vehicles, etc., but also widely used for stalking, and for setting up murders, rapes, robberies, burglaries and electronic attacks) - any of which can be easily attached to or slipped into a piece of furniture, equipment, vehicle, luggage, clothing, books, and almost anything else that is not already made with a GPS unit. We can no longer recommend AVOIDANCE as a practical means to protect yourself and loved ones against mind control and electronic attack perps. Shielding, jamming and transmitter-locating / perp-locating are your only effective options. Since government agencies are virtually worthless to protect you and your loved ones from mind control and electronic attacks, YOU MUST PROTECT YOURSELF.

STINGRAY TARGETING DEVICES (STDs): One of several major examples is the Government's widespread abuse of StingRay technology. StingRay devices mimic cellphone towers by capturing and controlling all cellphone uses in its long reach, and capable of targeting any number of those cellphone users it captures for, "special treatment". At least 13 major Federal law enforcement and surveillance agencies routinely deploy StingRay devices in their "toolkit", including but not limited to, the military branches, FBI, CIA and IRS, plus 100s of state, local and other non-Federal entities, clearly also including private entities. Government agency internal regulations regarding StingRay uses, if any, are secret and vary from none to little. StingRay devices are smaller than a small shoe box, and can be placed almost anywhere, including buildings, vehicles, drones, helicopters, airplanes, telephone posts, and even hidden behind non-metallic surfaces, including walls, curtains, pictures, signs and inside valises, backpacks and packages. The purchaser of a StingRay device signs a contract that states that he/she/it will never disclose nor admit to having a StingRay device, so do not expect Government officials and others to even admit generally to mind control or electronic attack - much less do anything about it. StingRay devices are used in secret to track and eavesdrop onto targeted cellphone conversations. More advanced devices using this technology can lock onto brainwave signatures to electronically verify who the cellphone user is, and track that TI, even if he/she switches phones, and even deliver mind control and electronic attack signals to the cellphone user.

"TIN BEANIES" DO NOT PROTECT YOUR BRAIN FROM EMF ASSAULTS! While "Tin Beanies" (ie: Tin Foil Beanies, Tin Caps, Tin Hats, Aluminum Beanies, Aluminum Foil Beanies, Aluminum Caps, Aluminum Hats) may provide minor protection from EMFs, they are also clearly a great danger by acting like parabolic dishes to reflect and focus microwaves that have passed thru your unshielded face and head and then thru your brain back onto parts of your brain, thereby much amplifying their power on targeted brain tissues. The Tin Beanie does a very good job at blocking the electrical field components of EMFs thru most of the EMF spectrum from reaching the brain, but only if placed between the transmitter and your skull; however, MIT research shows that the Tin Beanie amplifies signals at freqs near 1.2GHz and 2.6GHz. The Tin Beanie works poorly to block the magnetic components. Freqs around 1.2GHz and 2.6GHz are very popular with perps (and microwave ovens; around 2.6GHz for maximum absorption into meat), and the magnetic components are clearly by far most dangerous for mind control and electronic attack. EMFs propagate best thru non-metallic materials (eg: skull bone, and living flesh). No matter how well you block one part of your head, EMFs will easily penetrate thru other unshielded parts of your head and face from any and all directions and easily reach your brain. The more intense the EMFs are, the more that gets into your brain, and the more permanent brain damage can result. Since you cannot consciously detect EMFs without special equipment (which we can provide you), you have no way of knowing how intense and damaging EMFs are. Your brain can be horrifically injured, your emotions exploding, hallucinations and uncontrolled thoughts racing thru your head, and yet you may not have a sensory clue as to why. EMF signals too strong may result in permanent dementia, coma or death. Clearly, the only way you can fully protect yourself from both EMF and ultrasound signals is with our popular SHIELDED HELMET (link above) and our Ultimo Sleep Head Shielded Hood (Note: We can also include infrasound shielding if you specify that). To shield the rest of your body (including your head), click on our ULTIMO SHIELDED WRAP link.

ARE YOUR CELLPHONES AND OTHER ELECTRONIC DEVICES ATTACKING YOU?: We were informed by several very reliable sources that built into some cellphones and other electronic devices is a microwave coil or ultrasonic speaker and related circuitry which transmits microwaves or ultrasounds into your brain when you use your cellphone or electronic device. And that these added circuits are being used to identify brainwave signatures (and thus user identities and locations of electronic devices with built-in GPS units), and also for V2K, RNM, mind reading, implanting thoughts and inducing mental illness type behaviors. We then randomly purchased several used cellphones of various types, disassembled them, but was unable to find any known extra circuitry. However, some of the cellphones have enough space inside of them, clearly intentionally left, to allow retrofitting with small additional circuits. Their signals may or may not work in conjunction with the normal signals of the cellphone or device; there are a huge number of possible variations. We suspect that when a TI is selected, somehow the perp obtains the TI's cellphone or other electronic device and retrofits it with various mind control and surveillance circuits. It is clearly not being factory-built into all cellphones (as is GPS) and other electronic devices - at least not yet - to do so would much increase likelihood of discovery followed by public outrage. Cellphones are perfect mind control and surveillance devices because they are regularly placed a few inches from your brain, so even weak and highly directional signals can be used. As a unique Customized Devices (CD) project we can provide you special shielding for your particular cellphone or electronic device to greatly attenuate unwanted microwave and/or ultrasonic signals enterring your brain.

HOLOGRAPHIC MIND CONTROL ATTACKS?: Back in the day, mind control and electronic attacks were performed in a bludgeoning way - most or all of the brain was flooded by the attack signals because pinpointing under normal non-laboratory access conditions was virtually impossible to do. Sometimes, this led to unpredictable effects. Mind control perps much prefer predictable effects. Now, brain pinpointing using holographic techniques have been achieved. University of California at Berkeley neuroscientists are refining methods on pinpointing precise locations in the brain to activate or deactivate brain activity thru specific sets of neurons there. These locations are pinpointed electromagnetically by using holographic techniques. This means that remote external complete and precise control over one's memories, thoughts, physical sensations and reactions have already or will shortly be achieved. These all can now be erased or substituted with false ones. Pain can be remotely induced or removed at precise areas of the body at the flick of a switch. No longer will physical contact between the perp and TI be required because electronic implants are no longer required to achieve this level of precision. And this holographic mind control technology can also be used to read the current settings of these neurons to read one's memories and thoughts (ie: mind reading). And it can also be used to identify one's brain signature as accurately as fingerprints.

LASERS ARE POWERFUL SURVEILLANCE AND MIND CONTROL WEAPONS: The Amazon Alexa, Google Voice and Apple Siri can be hacked by lasers at upto 100 yards - even thru window glass! By doing so, a hacker can cause your electronic device to open and close doors (including garage doors), deactivate or activate security systems, turn lights On and Off, unlock and start some vehicles, make Online purchases and financial transactions, etc. (Forbes Magazine, 11/05/2019).
     Lasers are powerful weapons used for surveillance and hacking in several different ways:
          (1) To hack electronic devices that have a microphone, including, but not limited to: Amazon Echo, Google Home, Apple iPhones, Facebook Portal Mini, Amazon's Fire Cube TV, Samsung Galaxy S9, and Google Pixel 2. All proven to be laser-hacked by DOD's Defense Advanced Research Projects Agency (DARPA) research. A silent and invisible 1mm-wide voice amplitude modulated laser beam, when it impacts a diaphragm of any modern microphone, will modulate the diaphragm's movements just like a voice or sound. Note: As we have stated, modulated ultrasonic waves that also cannot be heard can also secretly control some of these electronic devices.
          (2) To surveil conversations by bouncing off the windows in the room where someone is speaking. Audio sounds cause microvibrations in glass, which then phase-modulate a laser signal bounced off of it. Then a laser receiver receives, amplifies and processes this bounced signal to reproduce the actual conversation. Another technique that can also be done using ultrasounds.
          (3) To surveil sounds coming out of speakers, using the same techniques as (2).
          (4) When pointed at the eyes can induce V2K voices in the head, some mistaken as being heard by the ears. This technology is now being researched for V2K-type "Voice-of-God" weapon systems. The best way but not a foolproof way to prevent your electronic device from being laser-hacked and ultrasonic-hacked is to point the device's microphone close to and towards an opaque wall.


NEUROPHONES, MICROWAVE AUDITORY EFFECT (MAE), VOICE-TO-SKULL (V2K): We have decades of experience with Neurophones. When it comes to Neurophones, we can certainly help you. Here is some of the info we have on Neurophones you will find interesting:
          NEUROPHONES: The Neurophone is a highly-specialized sound device invented by Dr. Patrick Flanagan in 1958. The Neurophone is a device that converts normal speech and music to a modulated pulsed sound form that can be transmitted thru solid materials and recovered and converted back into sounds that closely resembled the original speech and music with little loss and little distortion. It was found that if you amplified normal speech and music and transmitted that sound thru a solid material, the output would be much attenuated and highly distorted because human-made sound normally ranges among humans from about 50 Hz to about 15,000 Hz (unless you are another Whitney Houston, your individual band will be much more narrow), and virtually all solid materials have great variations in sound attenuations based on the frequencies in the sound components - therefore much attenuation and distortion results (to a much lesser extent, this phenomena also occurs in air-transmitted sounds; while air attenuations and distortions do occur over distances, they are usually not bad enough to affect understanding of the sound). The solid material may be concrete, mud brick, earth, metal rod/tubes (eg: fencing), wood, plastic, skin and bone, etc. The Neurophone converts the sound all into one frequency of pulses; all pulses of one frequency in a range of intensities attenuate to closely the same percentages. For optimum transmissions, the pulse frequency selected and its modulation scheme mostly depends upon the solid material used.
          Microwave Hearing (or Microwave Auditory Effect or Frey Effect) can be based on Neurophonic technology. Neurophone MAE typically not only results in some very unpleasant conscious buzzing, hissing, clicking, knocking, humming (Taos hum?), and/tapping sounds, as well as pins and needles (depending on pulse frequency and pulse modulation scheme used), but can also cause permanent brain damage and even death (depending on intensity of the pulse signal). Many scientists believe that the strange sounds and feelings are the result of the pulsed microwave signal heating the ear's cochlea. While we believe that this is likely one effect, we also believe that it causes other biologic effects. Recent scandals on Neurophone MAE attacks, allegedly perpetrated by Cuba (ie: Russia) and China, have recently been widely reported.
          The big problem with the traditional Neurophone was that you needed a deconverter at the other end to restore the original signal. That's a huge problem if the Neurophone device is to transmit into (or out of) the human body for any reason, a deconverter is very difficult if not impossible to deploy. But research have found that while on the CONSCIOUS level you may be annoyed by all of its perceived buzzing, hissing, clicking, knocking, humming, and/tapping sounds, as well as pins and needles, on the SUBCONSCIOUS level the message is being understood and acted upon by your brain. That's because your brain is one very versatile tool always trying to make sense of stimulations it receives, while your brain cannot usually determine the validity of a stimulation so it treats all stimulations as valid. This is often referred to as a V2K (voice-to-skull) or "Voice of God" attack that can really mess up a TI, if and when it occurs, by forcing him/her into thinking certain thoughts, hearing certain sounds, seeing certain things, speaking certain words, having false memories / distorted memories, confusion, vertigo, feelings of illness, feeling all stressed out, unjustified panic attacks, feelings of guilt, feeling certain sensations/emotions/moods, disturbing sleep, multiple personalities, temporary mental malfunctions or physical malfunctions, and/or even taking certain actions (check with your doctor before considering MAE or Neurophone attacks).
          Most people are constantly exposed to microwaves - whether or not Neurophone MAE microwaves - primarily thru cellphones, wifi, televisions, radios, microwave ovens and radars. Other sources can include satellites, lightning, industrial (especially arc welding), vehicles, and poorly shielded other electronic devices. Microwaves are virtually impossible to escape from these days. Most people at any moment have several 100 strong microwave signals impinging on your skull. However, there is only one frequency band of microwaves of which a substantial amount of the microwave energy is absorbed by the brain. Lower microwave frequency signals are absorbed by the skin, while higher frequency signals cleanly pass thru the skull virtually unaffected. But even if the microwave frequency is in the brain-absorbent band, it must be of the right type (pulsed) and one of the right modulations to cause mind control. For the microwave frequency, type and modulation to all be optimum for electronic mind control, assuming malicious intent is very reasonable. Microwaves are also highly directional in the brain-absorbent band. This means Person A and Person B standing, sitting or lying next to each other, either A or B can be precisely targeted with very little signal hitting the other person, therefore, only the TI experiences the manifestations. Therefore, the other person may wrongly consider the TI to be crazy, faking it, pranking or malingering.

Our Mind Control and Electronic Attack Countermeasure Devices Now Come With Advanced Transient Suppression!
Many people these days, especially Online, claim to sell mind control and electronic attack countermeasures and detection devices. Clearly none of whom can match the relevant highly-specialized knowledge, experience, equipment, parts, specialized materials, tools and facilities of Lone Star Consulting, Inc. to actually be able to help mind control and electronic attack victims, and most of whom are clearly outright frauds. Further, we are the only ones we know of who now provide Advanced Transient Suppression Technology (ATST) in our mind control and electronic attack countermeasure devices. All electronic devices can be damaged or destroyed by common high-voltage transients from lightning and defective high-voltage equipment and power lines, electrical arcs and coronas, inductive kicks from high-voltage power interruptions, and static electric discharges. Also, based on what we know, mind control and electronic attack predators are increasingly resorting to directional high-pulse burst transmitters (pulse-type directed energy transmitters), possibly even EMP, to wipeout costly countermeasure devices deployed by mind control and electronic attack victims to protect themselves. Our unique countermeasure devices now come with our ATST protection against up to 1,500 watts of burst energy attack power (at no extra cost) to foil even the most highly dedicated wipeout attack tactics, as well as to help protect you from common forms of high-voltage transients.

CRITICAL IMPORTANCE OF RESEARCH DONATIONS: Mind control and electronic attacks are the scourge of this century! An horrific scourge that very few in law enforcement will even consider addressing, forcing TIs to go on their own. However, we at Lone Star Consulting, Inc., constantly do research in mind control and electronic attack technologies - for decades now. Clearly, new attack methods are constantly being developed by the perps. Our sophisticated scientific research is very costly to do (try buying a new spectrum analyzer lately?), and is paid for by both Clients who purchase devices from us and those who are smart enough to know that our research findings can translate into detection and countermeasure devices which can be applied to their specific problems and the problems of so many other TIs like them. These donors help support our research with their generous donations. In short, both paid projects and donations are highly welcomed and needed. So please contract for a Customized Devices (CD) project with us. And please donate as much as you can and as soon as you can. For those who provide us substantial donations, we will often steer our research in directions that may specifically help them. Furthermore, if we can find a way to legally provide valued donors the devices of interest to them that we do not normally provide to the general public, even if it requires a special development on our part, we will do our reasonable best to accommodate their specific needs. How much we are able to bend over backwards for a donor depends on the type of research, the device types the donor is interested in, and the relative magnitude of his/her donations compared to other donors also seeking our help relevant to the same research. We very strongly appreciate our valuable supporters, so please donate.

We Are Becoming Super Busy - Please Send Us Your CDAF Today!
Due to an apparent serious upsurge of mind control and electronic attacks and more people learning about us, we are becoming loaded up with new projects. Please do not delay with your project(s). Upon deciding what you want us to do for you, please click on green CDAF link at top of page and send us your CDAF(s). Note: Mostly due to ever-increasing parts costs and decreasing availabilities, we expect to raise our prices on some of our device-types in the coming weeks and months. Also, we may have to discontinue some device-types - later availabilities not guaranteed. Please send us your CD Project CDAF (green link at top of our webpages) today.

We Are Now on Social Media - Please Join With Us!
FACEBOOK and LINKEDIN
JOIN US ON FACEBOOK AS OUR SOCIAL MEDIA FRIEND AND/OR ON LINKEDIN AS OUR SOCIAL MEDIA CONNECTION! As you likely know, we recently joined FACEBOOK and LINKEDIN social media. To join us, you must first email us directly to LONE STAR CONSULTING, INC., and explain to us why you want to be social media-connected to us. NOTE: We never accept such requests when they solely come through our social media sites - we regularly receive 100s of such requests mostly from totally unknown people. We are very selective - your acceptance is much increased if you are a prior or current Client, or a relevant serious researcher, expert, scientist or engineer. We are constantly engaged in much exciting work that we would like to share with our social media friends and connections. Most of our discussions on Facebook and LinkedIn will relate to mind control, electronic attack, radionics, physical survival and energy through increasingly worsening times. One big benefit is that LONE STAR CONSULTING, INC. will provide free information found nowhere else (eg: research results), which may be very helpful to you. Another big benefit is that you will be able to share your experiences and needs with others who may be or were in similar situations (eg: you are experiencing certain types of mind control attacks, which may also be afflicting others in your area). We do not accept just anyone as our social media friend or connection - we seek a smaller but more focused and intense group. Interested in us friending you? Then email us here, and in your Subject Line, put: "Please Friend Me". In your email body, please explain in 100-500 words the benefits to both of us in becoming social media friends (Facebook) or social media connections (LinkedIn). Then tell your friends and connections about us! NOTE: With few exceptions, we are not going to post up our friends on Facebook and connections on LinkedIn until we have selected at least 500 Facebook friends or LinkedIn connections. We are not yet on Twitter or MySpace. - Thanks. John Williams, M.S.E.E.

Electronic implants,electronic attack,subliminal mind control,ultrasonic attack,infrasonic attack,brainwashing,brainwave entrainment,mind-body,body-mind,devices services,custom made devices,special projects services,high-tech,security,survival,hardware,circuits,hi-tech,designs,electronics,electrodes,magnetic fields,emf,spy agencies,plans,professional consultants,consulting services

Hello! We support many technologies. For introduction into how to obtain hardware and our design philosophy, please click on our Home Page (includes hotlinks to all of our Device Types, listed by Topics and Titles): Home. Hotlinks by Topics and Titles also at: Site Map. When you are done, please use your Browser's Back Button to return here.


Can you spot electronic implants, and the wire?
This is the actual CT-Scan of the chin, neck and upper back area of one Gary D. Simmons of Australia, a former Navy diver who had been assigned to several clandestine operations, reprinted with permission from Simmons and Consumertronics.net. According to Mr. Simmons, one 'object' is in the spine at the jaw level; the hole in the back of the neck shows a 'wire' running down towards a second 'object' located between the trachea and the spine; there is yet a third 'object' below the jaw. I see other strange 'objects.' Do you? Furthermore, he states these were the results of a surgical operation and an official program in which he and about 100 other elite Navy divers were subjected to as part of, 'medical and mind drug experiments,' which he claims caused many premature deaths among them!
For more info on this image and amazing story => www.harold-holt.net (click on Page 2 hotlink on its bottom), then return HERE!.
DO NOT LET THIS KIND OF TRAVESTY HAPPEN TO YOU!

Recently, the Lone Star Consulting, Inc. organization has received frantic calls involving great fears and concerns about an apparent recent alarming, shocking and frightening upsurge in mind control (mindcon), body control (bodycon) and other electronic attack and electronic harassment incidents (often also referred to as "directed energy weapons attacks" or "psionic attacks"). Clearly, these forms of electronic harassment attacks greatly increased since 9/11, and especially recently due to political and economic chaos. With chaos, electronic attacks are more likely ignored by the authorities, and victims become more hassled with other issues and more cautious about spending money even to protect themselves. Clearly, some electronic attackers are now electronically attacking their victims with impunity - more open electronic harassment attacks, accelerated electronic attacks, and more severe electronic attacks than ever before! If you do not believe that mind control and electronic attack devices are real and effective weapons - research these topics Online. Even so, what you will find is just a small bit of what is actually being done in these frightening and devastating technologies - no longer science fiction, even some now beyond science fiction. Most of the R&D is being done on top secret bases (eg: black projects) by our Government, various other governments, corporations, universities, criminal and terrorist organizations and individuals for numerous reasons. Today, virtually anyone who is a competent electrical engineer or electronic technician can design and make at least a crude mind control electronic attack weapon. One of many examples: We know that there were widespread uses of mind control devices in close states on election day in 2016 near polling places mostly by foreign perpetrators, which clearly dictated the final election results. Are you such a TI victim? It is more important than ever before for YOU to address these issues NOW! Our Government will likely never admit to these technologies, nor recent advancements in them, so it will do little or nothing to help you. As a TI, you are on your own! We believe we can help you. Lone Star Consulting, Inc. provides as a public service by providing our mind control / electronic attack tutorial to our Good Clients for those interested in electronic mind control (including RFID), electronic attacks, directed energy attacks (using directed energy weapons), electronic harassment, brainwashing, brain entrainment (eg: binaural beats), brain signatures, mind reading, voices in the head (eg: voice-to-skull or V2K/V2S technology (Frey Effect / Microwave Hearing Effect), and voice-of-God technology), Tempest brain monitoring, electronic body control, electronic implants and brain state control / brain state monitoring, Manchurian Candidates, and similar technologies and their countermeasures.

Microwaves (and ultrasonic sounds and infrasonic sounds) require the specialized device-types we provide (described below) to detect and countermeasure them because they can't be sensed by normal human senses and their directions (many are highly directional), bandwidths and ON times must be first determined before they can be documented or countermeasured (note that infrasonic sounds appear to be omnidirectional, thus location-finding can be very difficult, and infrasounds are thus also very hard to countermeasure, especially if source is distant). You may need to prove the existence and specific timing and location of the mind control and electronic attacks (within the applicable statutes of limitation), and then correlate your manifestations with these attacks against you. Even then, to obtain substantial results you would have to show that you mitigated the mind control and electronic attacks to minimize your injuries, such as by jamming it (which requires specialized electronic attack and mind control countermeasures equipment of the types we also provide), and/or shielding against it. And if you do all of this yourself as soon as you can, you stand a much better chance of getting law enforcement to take a serious look at your case as well. In virtually all cases, YOU, AND YOU ALONE, must obtain justice in these types of cases (see our Mind Control webpage for specialized equipment). You might fairly ask, "How can I document mind control and electronic attacks using your specialized equipment?" Permanent directional-recording and time-stamped recording circuitry are very expensive because they add complications to any device made by anyone. However, there is a cheap, easy and very credible way to do this. Use a video camera and make a videotape or video disk of your experiences, which will document your equipment set-ups, and its responses. Most modern cellphones have videotaping capabilities. Leave a visible TV ON in the background and an accurate clock so that you can also time- and date-stamp your videos. And/or have a reliable and credible witness(es) with you.
             TIs often ask us (after reeling off several major bad manifestations they suffer from), 'What type of EMF causes these things?' We tell them, there are so many different popular modern wireless technologies today for possible mind control and electronic attack exploitation, that it boggles the mind. Just to name some: 1G/2G/3G/4G/5G (Cellular Bands), 802.15.4 (2.4GHz), Bluetooth (2.4GHz), LoRa (<1GHz), LTE Cat 0/1 (Cellular Bands), NB-IoT (Cellular Bands), SIGFOX (<1GHz), Weightless (<1GHz), WIFI (2.4GHz and 5GHz, <1GHz), WirelessHART (2.4GHz), ZigBee (2.4GHz), Z-Wave (908.42MHz), plus others and more to come. The Cellular Bands are the 824 - 896MHz, and 1850 - 1990MHz bands. NO NEED TO THROW YOUR ARMS UP IN DESPAIR! We offer excellent solutions. For example, a major reason why so many of our TI Clients contract for our Shielded Helmet and Shielded Cap/Hat (described below) is that it makes little difference which wireless technology is afflicting them, what frequency it is on, where the external transmitter is located at, how the signals are modulated, what the perp's transmission schedule is, or even if the signals are or are not intentionally malicious, our Shielded Helmet and Shielded Cap/Hat will do excellent jobs to protect your brain because very little, if any, of these harmful signals will reach your brain. Nor does the type of wireless technology used against you much impact the functions of our EM Direction Finder and EM Triangulator (described below).
             QUESTIONS ABOUT EMF SHIELDING MATERIALS: The EMF or electromagnetic field is composed of both an electrical component and a magnetic component. Regarding mind control and electronic attack, clearly, the magnetic component is by far the most dangerous (while some selling non-ferromagnetic shielding disagree, they are WRONG!). To substantially attenuate the magnetic component requires ferromagnetic metals. Copper, brass, bronze, aluminum, titanium, tin, silver, gold, platinum, lead, beryllium, graphite, carbon composites, carbon-coated plastic (eg: Velostat), etc. are NOT ferromagnetic materials. Cost effective ferromagnetic metals are limited to iron and most (but not all) steels (mu-metal, of which there are several varieties, works best but it is very expensive). While conductive non-ferromagnetic materials are pretty good at stopping the electrical component of the EMF (carbon materials protect the least by far), they only have minimal effects on the magnetic component (unless the frequency is above about 100KHz and the materials are very thick and have no or tiny holes in them). Our special EMF shielding materials include both ferromagnetic and non-ferromagnetic metals (but no carbon materials, unless specifically contracted for on the CDAF in writing). For ionizing radiation (eg: from uranium, radon, X-Rays, etc.), because of its very high density and reasonable cost, lead is a very good shielding material, altho very heavy. However, lead shields worse than copper and aluminum from electrical fields (non-ionizing radiation).
          MU-METALS: Mu-metals are ultra absorptive of magnetic fields - so absorptive in fact that, if not properly applied, saturates in even moderate magnetic fields. Once saturated, mu-metal no longer protects. Therefore, mu-metals must be intelligently applied to be optimally effective. Please just don't buy a piece of mu-metal, tuck it inside your hat, and expect it to do a good job. If you need a mu-metal shielding device-type - come to us - never do this on your own or rely upon some pseudo-scientist Online scammer to provide you mu-metal shielding (or for any other reason).
          Over the years, many TIs have asked us about EMF shielding. Many of them made grossly erroneous statements about EMF shielding, based on misinformation and disinformation they heard elsewhere. The biggest error is about aluminum foil shielding - which we call the "aluminum foil beanie myth" (decades ago, it was called the "tin foil hat" myth). Many falsely believe that aluminum foils and copper foils greatly shield against BOTH the electric and the magnetic components of EMF fields. The second biggest mistake is to believe that some plastics impregnated with carbon (several types, Velostat most well-known) also shield against mind control and electronic attacks; these carbon-impregnated materials did much worse in our tests than even aluminum and copper to shield against EMFs (if you still believe that aluminum foil, copper foil or Velostat works, shield two caps/hats with the material, then place them together with your cellphone in between, then call your cellphone; when your cellphone rings, that's the proof they do not work; you can even contract with us using a CDAF for us to shield these caps/hats for you if you wish). Costly carbon impregnated materials (eg: carbon composities) do work well in shielding against static electricity (but not as good as aluminum foil or copper foil) and due to being very cheap, are commonly used in antistatic packaging, but do very poorly against EMFs (their resistances are far too high and vary wildly based on formulation and condition):
             (A) No shielding material, no matter what type, arrangement or thickness shields against 100% of an EMF signal; but 99.9+% shielding is possible). We know of no cases where a weak malicious signal caused mind control or electronic attack - all effective mind control and electronic attack EMF signals are of at least moderate intensity - therefore, even if you are being attacked by an intense EMF signal, with excellent shielding you may be able to reduce it to a pipsqueak, thereby protecting yourself from being attacked. You need shielding much more effective than just aluminum foil.
             (B) How well a metal shields against any EMF signal depends on whether the signal is electric or magnetic, the intensity of the EMF signal, the frequency and waveform of the EMF signal (especially above 10MHz), the EMF shielding metals, the arrangements of the EMF shielding metals, the thicknesses of the EMF shielding, the distance the EMF shield is to the transmitter (to a smaller degree), and holes, tears and defects in the shielding.
             (C) The goal of the EMF shielding is to MINIMIZE SIGNAL STRENGTH of the EMF signal passing thru it, so that the offending external transmitter's signal is attenuated (ie: reduced) as much as possible by your EMF metal shielding to protect YOUR brain and/or body. Attenuating a mind control signal by just a little clearly does not help you, and an aluminum foil beanie acts like a parabolic dish reflector (possibly injuring you even much more by focusing EMF signal reflections onto critical parts of your brain, see below).
             (D) EMF shielding is a very complex technology, but we try to make it simpler here:
                 (1) From our research, about 99% of all EMF mind control and electronic attack signals are at frequencies between 50MHz and 2.4GHz.
                 (2) In most situations, reflection losses are less than 10% of absorption losses in metal sheeting (but are much greater than 10% in the special non-sheeting shielding metals we use).
                 (3) The losses stated below are the absorption losses only of aluminum and iron metal sheeting to comparatively show you how far greater iron (a ferromagnetic metal) shields against EMF when compared to aluminum (a non-ferromagnetic metal; copper is a slightly better shield than aluminum).
                 (4) METAL TYPE/THICKNESS/SIGNAL FREQUENCY vs EMF ABSORPTION LOSSES (DB):
                               (A) ALUMINUM: Thickness: 0.1mm (about 4 mils, the thickness of some aluminum foils): Signal of 100MHz: 192db; 1GHz: 412db. --- Thickness: 1mm (about 40 mils): 100MHz: 1,149db; 1GHz: 3,361db.
                               (B) IRON: Thickness: 0.1mm: Signal of 100MHz: 1,247db; 1GHz: 3,986db (NOTE: Nearly 10 times more protection in decibels than aluminum!) --- Thickness: 1mm: 100MHz: 12,4651db; 1GHz: 39,419db (NOTE: Nearly 12 times more protection in decibels than aluminum!).
                 (5) This clearly shows that iron provides far greater EMF shielding than does aluminum (non-ferromagnetic metal). It is not even close!
                 (6) Mu-metal shields much better than even iron but is very expensive. Mu-metal saturates at lower magnetic field levels than iron, thereby making mu-metal less protective in very intense magnetic fields (eg: powerful perp transmitters, electric power stations, high-voltage power lines, large electric transformers). For mind control attacks using magnetic field signals, the magnetic field intensity is almost always below the metal saturation point because mind control does not require very high-powered signals - just moderately powered signals of the right frequency and waveform (however, some perps may use EMF signals so intense that they can cause dangerous heating of the skin and/or internal tissues, possibly even burning them).
                 (7) Some of our device-types (below) employ shielding, and all of our EMF shielding device-types include mostly ferromagnetic metals, optimally arranged for maximum EMF shielding effectiveness.
             PROOF THAT ALUMINUM FOIL ALONE IS POOR SHIELDING: Cellphone GPS tracking is a tool widely used today by perps to track and target TIs (10+ years ago, it was direct satellite). Cellphone and other handheld electronic device users are rightly very upset and worried about their cellphones and other handheld devices with embedded GPS being abused to track and target them on a constant real time basis - even to be remotely secretly activated as room mikes, video recorders, and even mind control devices. Jeffrey Epstein's sidekick, Ghislaine Maxwell, was tracked by the FBI thru her cellphone GPS. This is in spite of the fact that her cellphone was turned Off and wrapped in "tin foil" layers (these days, aluminum foil is often called tin foil or tinfoil; since actual tin foil is rare since about the 1940s, it was very likely aluminum foil). Even if tin foil, tin's EMF signal blocking properties are about the same as aluminum foil of the same thickness. This proves that while multiple layers of aluminum foil or actual tin foil will reflect some EMF signals, it is not enough to stop perps from cellphone-GPS tracking you. Our tests show that it requires at least 50 layers of aluminum foil to reliably work. Law enforcement, foreign governments, and major criminal and terrorist organizations can defeat tracking avoidance tactics such as turning Off your cellphone or switching to flight mode (if available and activated on your phone). Without the right shielding, the only ways to stop perps from tracking you thru your embedded GPS is to remove the batteries (which are very difficult in cellphones because they are usually inside the case), or to drain your battery down to the point that your cellphone powers off, either of which makes the electronic device unuseable by you on a practical basis. The only practical and effective method is to use the right shielding materials, such as proprietary shielding materials we developed and offer and provide in our great shielded devices. Jeffrey Epstein and Ghislaine Maxwell may have been geniuses in certain areas, but when it comes to this mind control technology, were DIY incompetents. This also underscores how worthless are those commonly sold aluminum and silver blankets and RF shielded bags, falsely touted as being protective against mind control and electronic attacks. Our many and varied shielded devices are effective.

Our Mind Control and Electronic Attack Countermeasure Devices Now Come With Advanced Transient Suppression! Many people these days, especially Online, claim to sell mind control and electronic attack countermeasures and detection devices. Clearly none of whom can match the relevant highly-specialized knowledge, experience, equipment, parts, specialized materials, tools and facilities of Lone Star Consulting, Inc. to actually be able to help mind control and electronic attack victims, and most of whom are clearly outright frauds. Further, we are the only ones we know of who now provide Advanced Transient Suppression Technology (ATST) in our mind control and electronic attack countermeasure devices. All electronic devices can be damaged or destroyed by common high-voltage transients from lightning and defective high-voltage equipment and power lines, electrical arcs and coronas, inductive kicks from high-voltage power interruptions, and static electric discharges. Also, based on what we know, mind control and electronic attack predators are increasingly resorting to directional high-pulse burst transmitters (pulse-type directed energy transmitters), possibly even EMP, to wipeout costly countermeasure devices deployed by mind control and electronic attack victims to protect themselves. Our unique countermeasure devices now come with our ATST protection against up to 1,500 watts of burst energy attack power (at no extra cost) to foil even the most highly dedicated wipeout attack tactics, as well as to help protect you from common forms of high-voltage transients.

CRITICAL IMPORTANCE OF RESEARCH DONATIONS: Mind control and electronic attacks are the scourge of this century! An horrific scourge that very few in law enforcement will even consider addressing, forcing TIs to go on their own. However, we at Lone Star Consulting, Inc., constantly do research in mind control and electronic attack technologies - for decades now. Clearly, new attack methods are constantly being developed by the perps. Our sophisticated scientific research is very costly to do (try buying a new spectrum analyzer lately?), and is paid for by both Clients who purchase devices from us and those who are smart enough to know that our research findings can translate into detection and countermeasure devices which can be applied to their specific problems and the problems of so many other TIs like them. These donors help support our research with their generous donations. In short, both paid projects and donations are highly welcomed and needed. So please contract for a Customized Devices (CD) project with us. And please donate as much as you can and as soon as you can. For those who provide us substantial donations, we will often steer our research in directions that may specifically help them. Furthermore, if we can find a way to legally provide valued donors the devices of interest to them that we do not normally provide to the general public, even if it requires a special development on our part, we will do our reasonable best to accommodate their specific needs. How much we are able to bend over backwards for a donor depends on the type of research, the device types the donor is interested in, and the relative magnitude of his/her donations compared to other donors also seeking our help relevant to the same research. We very strongly appreciate our valuable supporters, so please donate.

NOTE: Some still believe that claims of mind control are false. But consider: Recently, MIT developed the technology of remotely and electronically implanting fake memories (implanted false memories) and implanting thoughts into brains. And this is just their mind control research they allowed to be published! And consider the very advanced work China is doing in AI mind control and electronic attack! For much more, we provide our "Mind Control and Electronic Attack Tutorial" to our Good Clients. It has much more real and helpful mind control and electronic attack information than any other website we know of. The mind control and electronic attack books and manuals of Consumertronics (www.consumertronics.net/mindcontrol2.htm) also contain important mind control and electronic attack information, including many circuit diagrams and other figures not found in our Tutorial. Dedicated to Defeating Mind Control Tactics / Mind Control Strategies and Electronic Attack Tactics / Electronic Attack Strategies of all Types

HOW TO PICK THE RIGHT DEVICE TYPE FOR YOU: If not a medical condition, your manifestations may be caused by several different electronic attack / mind control scenarios. You must analyze your situation, by asking yourself and answering these questions: (1) When do these manifestations occur? (2) Where do they occur? (3) Do the manifestations follow you all over? (4) Do they occur all together, or do you get one or some sometimes and another or others other times? (5) Is there anything you are doing which changes their intensity and/or frequency of occurrence either up or down? (6) What is your body position when they occur? (7) What activities are you engaged in at the time? (8) Do you have any idea where the offending transmitter may be located and/or who operates it? (9) Who are with when they occur? (10) When they occur, no matter where they occur, do you see any pattern (eg: similar modus operandi, certain person or vehicle in the area, or certain activity or situation that is almost alway present, a certain weather pattern, or some other type of pattern)? (11) If you place a heavy wool blanket or sweater over your head, do they still occur?* (12) If you place a large and deep steel pot over your head, do they still occur? (13) Have you observed any unusual or strange behavior by those suspected? (14) Is their behavior a predictor of a current, past or an upcoming attack? (15) Is your behavior a predictor of a current, past or an upcoming attack? (16) Is there anyone else around you or in a similar situation who you know of also experiencing similar manifestations? (17) Do other people, pets or other animals around you act differently just before or while you are experiencing your manifestations? (18) Are you receiving electrical shocks when you touch metal surfaces or run water? (19) What have the police, FBI, FCC, your doctor, etc. tell you about your manifestations? Please note that as policy we cannot recommend any device type as a device type which will stop your manifestations - this decision is left totally up to you. While we do guarantee that any device we provide you will electronically function as specified, since we have no way of being able to ascertain your situation ourselves, we cannot guarantee that the device will lessen or stop your manifestations.
          *There is another simple way to test to see if you are being attacked by ultrasounds or infrasounds: Today, ultrasonic and infrasonic attacks are about as common as EMF electronic attacks and are believed to occur combined with each other or with EMF attacks. And clearly many people under electronic attack do not even know that their manifestations are caused by electronic attacks. And many TIs who come to us for help know or believe they are being attacked but don't know whether it is ultrasound, infrasound or both and/or by EMF attacks in those same frequency bands. In fact the test method below and the wool blanket method above should be periodically done to find out exactly why you may be having manifestations - especially manifestations with no known medical cause; and these methods should help you buy countermeasure devices from us that you need and not to buy devices that don't address the actual attacks you may be getting.
          For ultrasounds and infrasounds, hard walls act as vibrating sound boards and can be used to detect sounds you cannot hear. The hard indoor walls which are at least your height, and when you are completely still you can hear no sounds and feel no vibrations. There must be an object (eg: shelf, rack, etc.) solidly attached to the wall for best results. You fill a glass with water and set it on the attached object. You then step away and be very quiet; make sure all vibration makers (eg: fans, TVs, etc.) are off. Look at the water. Is it rippling (if you are feeling manifestations but there is little or no rippling, then you may be attacked by EMFs only)? If so, how intensely (ripple intensity indicates sound intensity)? If so, are the ripples fine (indicates ultrasonics), or choppy or wave-like (indicates infrasonic)? The wall amplifies the vibrations it is being subjected to, which vibrations are transmitted to the water causing rippling. Audio sounds can also cause similar ripples (but they are usually heard). So can nearby traffic, trains, street work, industrial activities, construction activities, airports and airplanes, mining/drilling activities (especially if they are injection wells), earthquakes, ocean waves, and even people walking or chatting. Now, move the glass to a similarly attached object to a second wall of the same type and roughly the same dimensions that is perpendicular to the wall you just tested. Then answer the same questions as above. If the rippling is now of a different type, that indicates a second attack from a different direction. If there is much less or no rippling, then the vibrations are coming perpendicular to the first wall. If the rippling is the same type and about the same intensity, the vibrations are coming from about 45 degrees to both walls. If the rippling is mostly the same type but significantly more or less on one wall than the other, then the direction of the vibration is more perpendicular to the direction of the wall with the most intense ripples.
          Most perp attacks, whether using sounds or EMFs, come from a mostly horizontal direction to the TI. Doing these tests on a horizontal surface (eg: a bare table top) won't give you significant ripples from an horizontal transmitter as those produced by a hard wall, but should much better indicate sounds transmitted from above or below because the table top acts as the sounding board. If you use an horizontal surface, make sure that the surface's wood or metal feet rests directly on solid floor. If the wall or table is outside, the wind (no matter how light) will cause rippling. And keep in mind that sound and EMF signals reflect well off of hard surfaces, so to determine transmitter direction, you must consider nearby reflecting surfaces.
          This method is also a powerful tool to prove to others that you are indeed being attacked. If the sounds are not audio (ie: infrasonic or ultrasonic), provide us a CDAF for a device which will down-convert ultrasonic signals or up-convert infrasonic signals of the attacking frequency to the audio band where the signal or noise level and fluctuations thereof can then be easily video recorded in your home or workplace, along with recording the ripples in the water the sounds or noises are causing. You make this recording with a credible witness who will produce an affidavit. If the intensity of the sounds correspond to the intensity of the ripples, then it is reasonable to believe that the sounds caused the ripples. You then send copies of it to authorities, your attorney, the newsmedia, etc. You then should be in a stronger position to take whatever actions you need to stop the attack and compensate you for attacks against you.

Short on Money to Get What YOU MUST HAVE?
Hard Economic Times makes it difficult for many good people to defend themselves against all kinds of dangers, including Mind Control Attacks and Electronic Harassment. WE CAN HELP YOU!
All of our devices are unique and professionally handmade in the USA. That is why they cost more than the mass-produced foreign-made electronic devices common to discount stores. Our resulting higher prices means that many good people may find our CD projects hard to afford. To make it much easier for stretched people to obtain our unique Customized Devices, we now offer our special Lay-Away and Barter and Collateral Plans (use them individually or in conjunction with each other) as added means to obtain our products and services. For more details, click on: Our Easy Payment Plans, then click on your browser's backbutton to return here.

HIGH-TECH SECURITY AND SURVIVAL BOOKS, MANUALS, SOFTWARE, CONSULTING SERVICES: PLEASE NOTE, we are NOT CONSUMERTRONICS.NET (P.O. Box 23097, Albuquerque, NM 87192) (www.consumertronics.net) - famous for their many frank and controversial high-tech survival books, manuals and software. The two businesses are totally separate entities. Neither one owns the other nor is a subsidiary of the other. If you wish to do business with CONSUMERTRONICS.NET, please contact them DIRECTLY.

OFF-THE-SHELF AND OVER-THE-COUNTER HARDWARE OF ALL TYPES: PLEASE NOTE, we are NOT TECHZONICS.COM (a subsidiary of Consumertronics) - famous for their huge variety of hardware offerings, especially electronic parts. The two businesses are totally separate entities. Neither one owns the other nor is a subsidiary of the other. If you wish to do business with TECHZONICS.COM, please contact them DIRECTLY.

(More on these privacy and other policies on our www.lonestarconsultinginc.com/policies.htm) webpage.

ITEMS WANTED TO BUY/TRADE

Can't spare the bucks to pay for your order? Want some of the items listed above but have some of your own that you would like to use as trade? Don't fret - you can still get what you want for little or no out-of-pocket-$ if you have an item(s) of trade we are interested in! If you don't want to trade, we may consider buying what you offer. Either way, let us know. Most of the specific items we are interested in are described on (email us first as there are some differences): www.consumertronics.net/items4trade.htm (Consumertronics Publisher of High-Tech Survival and Security Books, Manuals and Software, and Consultants).


Customers, Clients, Contributors:
Relevant Topics, Titles to the Many Device Types We Do

SINGLE WORDS: The abductees. The abductions. The abductors. The advice. The advise. The aliens. The analysis. The analyze. The attacks. The aura. The auras. The automatons. The biofeedback. The biocontrol. The blasters. The body-mind. The brainwash. The brainwashed. The brainwashing. The brainwaves. The breadboarding. The build. The calibrated. The calibrations. The circuits. The coaching. The consultants. The consulting. The control. The controllers. The countermeasures. The create. The customized. The customizing. The debug. The debugging. The designs. The develop. The development. The devices. The diathermy. The document. The documenting. The EEG. The electrical. The electricity. The electroencephalograph. The electroencephalogram. The electronics. The energy. The engineer. The engineering. The enigmas. The entities. The entrainment. The equipment. The evaluate. The evaluation. The extrasensory. The extraterrestrials. The fakery. The faking. The flashers. The formats. The fortean. The frauds. The gangstalking. The ghosts. The ghostbusters. The ghostbusting. The harassments. The hardware. The healing. The hypnosis. The hypnotic. The implants. The infrared. The instructions. The instruments. The integrate. The inventions. The ir. The jammers. The jamming. The lasers. The levitator. The lonestarconsultinginc.com.

The magnetometers. The maintenance. The medical. The meditation. The merchandise. The mind-body. The modify. The modification. The modifications. The neurophone. The neurophones. The neurophonic. The offers. The pemf. The phenomena. The phenomenon. The phobias. The pitch. The plans. The presence. The privacy. The products. The professional. The program. The prototyping. The psychokineses. The psychokinetic. The psionics. The radionics. The repair. The repairs. The reports. The reporting. The RFID. The robotic. The robots. The schematics. The security. The Sedona. The services. The shrieker. The specialized. The stimulations. The stimulators. The spying. The surveillance. The survival. The technical. The telepathic. The telepathy. The tens. The testing. The therapy. The theremin. The transponders. The troubleshoot. The troubleshooting. The tutorials. The UFOs. The unexplained. The updated. The upgraded. The uv. The zappers.

A: The "abducted by aliens." The "abducted by ETs." The "abducted by space aliens." The "abducted by UFOs." The "active electrodes." The "advanced brainwaves." The "advanced brainwave control techniques." The "advanced brainwave signature." The "advanced electronic attack techniques." The "advanced mind control techniques." The "alien abductions electromagnetic manifestations." The AI technology,The "alien artifacts." The "alien busters." The "alien capabilities." The "alien contacts." The "alien countermeasures." The "alien defenses." The "alien detection." The "alien detectors." The "alien detecting." The "alien electronic attacks." The "alien electronic implants." The "alien encounters." The "alien implant control." The "alien implant programming." The "alien implants." The "alien mind control powers." The "alien mysteries." The "alien phenomena." The "alien phenomenon." The "alien sightings." The "alien spies." The "alien transponders." The "alien weapons research." The "alien weapons systems research." The "alien weapons technologies." The "alpha brain waves." The "alpha brain wave control." The "alpha brainwaves." The "alpha brainwave control." The "alpha brainwave monitoring." The "alpha brainwave signals." The "alpha frequencies." The "alpha waves." The "altered states." The "aluminum foil shielding." The "analog circuits." The "animal attacks." The "animal behavior modification." The "animal control." The "animal mind control attacks." The "animal obedience training." The "animal subliminal mind control attacks." The "animal training."

The "artificial intelligence computers." The "artificial intelligence devices." The "artificial intelligence electronic attacks." The "artificial intelligence methods." The "artificial intelligence methods."The "artificial intelligence mind control attacks." The "artificial intelligence techniques." The "artificial intelligence technologies." The "artificial intelligence weapons." The "astral projections." The "attack signals." The "auditory cortex." The "auditory hallucinations caused by electronic attacks." The "auditory hallucinations caused by mind control attacks." The "aura detecting." The "aura detectors." The "aura phenomenon." The "automatic learning."

The "avoid electronic attacks." The "avoid electronic brain entrainment." The "avoid electronic entrainment." The "avoid electronic harassment." The "avoid electronic implant control." The "avoid electronic implant programming." The "avoid electronic implants." The "avoid directed energy weapons." The "avoid electronic mind control attacks." The "avoid electronic spying." The "avoid electronic subliminal mind control attacks." The "avoid electronic surveillance." The "avoid electronic torture." The "avoid mind control attacks." The "avoid pyschological control." The "avoid psychological entrainment." The "avoid subliminal mind control attacks." The "awesome circuit designs." The "awesome circuits." The "awesome devices." The "awesome electronic devices." The "awesome electronic gadgets." The "awesome electronics." The "awesome equipment." The "awesome gadgets." The "awesome hardware." The "awesome products." The "awesome projects." The "awesome science projects." The "awesome special projects."

B: The "BCI." The "beam death rays." The "beam torture weapons research." The "beam weapons systems research." The "beam weapons technologies." The "behavior control devices." The "behavior control technologies." The "behavior manipulation weapons systems research." The "behavior weapons systems research." The "behavioral control." The "behavioral modification." The "behavioral modifications countermeasures." The "behavioral programming." The "behavioral weapons systems research." The "beta brain waves." The "beta brain wave control." The "beta brainwaves." The "beta brainwave control." The "beta brainwave monitoring." The "beta brainwave signals." The "beta frequencies." The "beta waves." The "biocontrol devices." The "biocontrol experimentation." The "bioelectric signals." The "bioelectromagnetic signals." The "biofeedback devices." The "biofeedback experimentation." The "bioluminescence phenomenon."

The "body controls." The "body control conspiracies." The "body control countermeasure services." The "body control countermeasures." The "body control customized devices." The "body control detectors." The "body control devices." The "body control electrodes." The "body control electronic attacks." The "body control electronic implant control." The "body control electronic implant programming." The "body control electronic implants." The "body control electronics." The "body control experiments." The "body control methods." The "body control protection." The "body control satellites." The "body control shielding." The "body control slaves." The "body control stories." The "body control tactics." The "body control techniques." The "body control technology." The "body control technologies." The "body control consultants." The "body control consulting services." The "body control customized device services." The "body control customized devices." The "body control development services." The "body control designs." The "body control design services." The "body control devices." The "body control equipment." The "body control electronics." The "body control frequencies." The "body control hardware." The "body control implant control." The "body control implant programming." The "body control implants." The "body control countermeasure invention services." The "body control invention laboratory services." The "body control invention prototyping services." The "body control invention services." The "body control inventions." The "body control inventors." The "body control jamming issues." The "body control medical causations." The "body control medical manifestations." The "body control methods." The "body control products." The "body control prototype services." The "body control prototypes." The "body control prototyping services." The "body control R&D services." The "body control research, design and development services." The "body control research laboratories." The "body control research services." The "body control researchers." The "body control secrets." The "body control services." The "body control special projects services." The "body control shielding issues." The "body control special services." The "body control systems." The "body control tactics." The "body control techniques." The "body control testers." The "body control testing laboratories." The "body control testing services." The "body control troubleshooters." The "body control troubleshooting services." The "body control victims." The "body control weapons systems research." The "body/mind connection." The "body resonant frequency."

The "brain abnormalities caused by electronic attacks." The "brain abnormalities caused by mind control attacks." The "brain blasters." The "brain blaster technology." The "brain burn weapons systems research." The "brain burn weapons." The "brain circuits." The "brain control technologies." The "brain electrical circuits." The "brain electronic implants." The "brain entrainments." The "brain entrainment conspiracies." The "brain entrainment countermeasures." The "brain entrainment electronic implants." The "brain entrainment experiments." The "brain entrainment implant technologies." The "brain entrainment implant programming." The "brain entrainment implants." The "brain entrainment mind control attacks." The "brain entrainment processes." The "brain entrainment programming." The "brain entrainment secrets." The "brain entrainment systems." The "brain entrainment technologies." The "brain entrainment weapons." The "brain implant control." The "brain implant technologies." The "brain implants." The "brain inhibition experiments." The "brain inhibition techniques." The "brain inhibition technologies." The "brain inhibition technology." The "brain inhibitions." The "brain inhibitors." The "brain link." The "brain manipulation weapons systems." The "brain mapping." The "brain monitoring." The "brain network disorder." The "brain network dysfunction." The "brain scanners." The "brain scanning technology." The "brain signature scanning technology." The "brain state attacks." The "brain state control." The "brain state controllers." The "brain state electronic attacks." The "brain state entrainment." The "brain state methods." The "brain state mind control attacks." The "brain state monitoring." The "brain state programmers." The "brain state programming." The "brain state surveillance." The "brain state techniques." The "brain state technology." The "brain state weapons systems research." The "brain states." The "brain stimulation conspiracies." The "brain stimulation electronic implants." The "brain stimulation experiments." The "brain stimulation implant control." The "brain stimulation implant programming." The "brain stimulation implants." The "brain stimulation mind control attacks." The "brain stimulation processes." The "brain stimulation programming." The "brain stimulation secrets." The "brain stimulation systems." The "brain stimulation technologies." The "brain stimulation weapons." The "brain stimulations." The "brain stimulators." The "brain-to-computer interfaces (BCI)." The "brain trauma." The "brain wave signatures." The "brain wave signature detection technology." The "brain's circuits." The "brain's electrical circuits."

The "brainwave bandwidth." The "brainwave emotional clusters." The "brainwave entrainment conspiracies." The "brainwave entrainment electronic implants." The "brainwave entrainments." The "brainwave entrainment experiments." The "brainwave entrainment implant control." The "brainwave entrainment implant programming." The "brainwave entrainment implants." The "brainwave entrainment mind control attacks." The "brainwave entrainment processes." The "brainwave entrainment programming." The "brainwave entrainment secrets." The "brainwave entrainment systems." The "brainwave entrainment technologies." The "brainwave entrainment weapons." The "brainwave frequencies." The "brainwave signatures." The "brainwave signature detection technology." The "brainwashing countermeasures." The "brainwashing devices." The "brainwashing electronics." The "brainwashing experiments." The "brainwashing methods." The "brainwashing secrets." The "brainwashing systems." The "brainwashing technology." The "brainwashing torture." The "brainwashing weapons." The "brainwave analysis techniques." The "brainwave control." The "brainwave controlling." The "brainwave entrainment." The "brainwave modulation." The "brainwave monitoring." The "brainwave scanning." The "brainwave signature analysis." The "brainwave signature scanning." The "brainwave signatures." The "brain wave scanning." The "brain wave signature scanning." The "brain wave signatures." The "burn weapons systems research." The "burn weapons technology."

C: The "carbon impregnated Velostat." The "carrier current attacks." The "carrier current countermeasures." The "carrier currents." The "carrier current mind control attacks." The "carrier current transmitters." The "carrier current receivers." The "cellphone electronic attacks." The "cellphone mind control attacks." The "cellphone subliminal mind control attacks." The "cellular bioelectricity." The "cellular phone electronic attacks." The "cellular phone mind control attacks." The "cellular phone subliminal mind control attacks." The "cell phone electronic attacks." The "cell phone mind control attacks." The "cell phone subliminal mind control attacks." The "chronic pain syndrome." The "circuit customizing." The "circuit designs." The "circuit designing." The "circuit integration." The "circuit inventions." The "circuit inventing." The "circuit modifying." The "circuit modifications." The "circuit prototyping." The "circuit repairs." The "circuit repairing." The "circuit testing." The "circuit troubleshooting." The "circuit upgrades." The "circuit upgrading." The "circular polarized light attacks." The "Cointelpro operations." The "collateral damage from brainwashing experiments." The "collateral damage from electronic attack experiments." The "collateral damage from mind control experiments."

The "commercial satellite control of mind control devices." The "commercial satellite control signals." The "commercial satellite electronic attacks." The "commercial satellite mind control attacks." The "commercial satellite mind control systems." The "commercial satellite signals." The "commercial satellite spies." The "commercial satellite spying systems." The "commercial satellite subliminal mind control attacks." The "commercial satellite surveillance systems." The "commercial satellite tracking systems."

The "communicating telepathically." The "complex waveforms." The "constellation of manifestations." The "constellations of symptoms." The "constellation of manifestations." The "constellations of symptoms." The "cordless phone electronic attacks." The "cordless phone mind control attacks." The "cordless phone subliminal mind control attacks." The "control of the mind." The "control minds." The "controlled offensive behavior." The "cool circuit designs." The "cool circuits." The "cool devices." The "cool electronic devices." The "cool electronic gadgets." The "cool electronics." The "cool equipment." The "cool gadgets." The "cool hardware." The "cool products." The "cool projects." The "cool science projects." The "cool special projects." The "countermeasures against behavioral modification attacks." The "countermeasures against brain entrainment attacks." The "countermeasures against brainwashing attacks." The "countermeasures against body control attacks." The "countermeasures against directed energy weapons attacks." The "countermeasures against electronic attacks." The "countermeasures against electronic gang stalking attacks." The "countermeasures against electronic harassment." The "countermeasures against mind control attacks." The "countermeasures against mind reading attacks." The "countermeasures against subliminal mind control attacks." The "countermeasures technology." The "counter measures technology." The "CPL mind control attacks." The "creative dreaming - creative genius." The "creative genius creative dreaming."

Customized: The "custom-made circuits." The "custom-made consulting." The "custom-made designs." The "custom-made devices." The "custom-made equipment." The "custom-made hardware." The "custom-made inventions." The "custom-made merchandise." The "custom-made modifications." The "custom-made offers." The "custom-made products." The "custom-made product offers." The "custom-made repairs." The "custom-made services." The "custom-made solutions." The "custom-made upgrades." The "custom make circuits." The "custom make consulting." The "custom make designs." The "custom make devices." The "custom make equipment." The "custom make hardware." The "custom make inventions." The "custom make merchandise." The "custom make modifications." The "custom make offers." The "custom make products." The "custom make product offers." The "custom make repairs." The "custom make services." The "custom make solutions." The "custom make upgrades."

The "custom makes of circuits." The "custom makes of consulting." The "custom makes of designs." The "custom makes of devices." The "custom makes of equipment." The "custom makes of hardware." The "custom makes of inventions." The "custom makes of modifications." The "custom makes of merchandise." The "custom makes of offers." The "custom makes of products." The "custom makes of product offers." The "custom makes of repairs." The "custom makes of services." The "custom makes of solutions." The "custom makes of upgrades." The "customize circuits." The "customize consulting." The "customize designs." The "customize devices." The "customize equipment." The "customize hardware." The "customize inventions." The "customize merchandise." The "customize modifications."The "customize offers." The "customize products." The "customize product offers." The "customize repairs." The "customize services." The "customize solutions." The "customize upgrades."

The "customized circuits." The "customized consulting." The "customized designs." The "customized devices." The "customized equipment." The "customized hardware." The "customized inventions." The "customized merchandise." The "customized modifications."The "customized offers." The "customized products." The "customized product offers." The "customized repairs." The "customized services." The "customized solutions." The "customized upgrades." The "customizing circuits." The "customizing designs." The "customizing devices." The "customizing equipment." The "customizing hardware." The "customizing inventions." The "customizing merchandise." The "customizing offers." The "customizing modifications." The "customizing products." The "customizing product offers." The "customizing repairs." The "customizing services." The "customizing solutions." The "customizing upgrades."

D: The "DARPA programs." The "death ray beams." The "death rays." The "Defense Advanced Research Projects Agency (DARPA) programs." The "defense against aliens." The "defense against ghosts." The "defense against unknown entities." The "defense against unknown presences." The "delta brain waves." The "delta brain wave control." The "delta brainwaves." The "delta brainwave control." The "delta brainwave monitoring." The "delta brainwave signals." The "delta frequencies." The "delta waves." The "demodulate brainwaves." The "demodulated brainwaves." The "demodulation of brainwaves." The "demodulate modulated brainwaves." The "demodulated modulated brainwaves." The "demon governments." The "demons controlling your mind." The "demons inside your head." The "designing circuits." The "designing devices." The "designing equipment." The "designing hardware." The "designing products." The "designing services."

The "detect aliens." The "detect attacks." The "detect electronic attacks." The "detect EMF attacks." The "detect electromagnetic attacks." The "detect microwave attacks." The "detect brain entrainment attacks." The "detect brainwashing attacks." The "detect electronic attacks." The "detect electronic brain entrainment attacks." The "detect electronic entrainment attacks." The "detect electronic harassment." The "detect electronic implant control." The "detect electronic implant programming." The "detect electronic implants." The "detect electronic mind control attacks." The "detect electronic spying." The "detect electronic subliminal mind control attacks." The "detect electronic surveillance." The "detect electronic torture." The "detect ghosts." The "detect implant control." The "detect implant programming." The "detect implants." The "detect lightning conditions." The "detect mind control attacks." The "detect pain field generator attacks." The "detect subliminal mind control attacks." The "detect unknown entities." The "detect unknown presences."

The "device customizing." The "device designs." The "device designing." The "device inventions." The "device integration." The "device inventing." The "device modifying." The "device modifications." The "device prototyping." The "device repairs." The "device repairing." The "device testing." The "device troubleshooting." The "device upgrades ." The "device upgrading." The "digital circuits." The "directed energy weapons research, design and development." The "directed energy weapons technologies."

The "directed energy attack devices." The "directed energy attacks." The "directed energy behavioral modification techniques." The "directed energy body control techniques." The "directed energy brain entrainment techniques." The "directed energy brainwashing techniques." The "directed energy brainwave entrainment techniques." The "directed energy countermeasures." The "directed energy devices." The "directed energy harassment." The "directed energy mind control techniques." The "directed energy subliminal mind control attacks." The "directed energy techniques." The "directed energy technologies." The "directed energy weapon attacks." The "directed energy weapon harassment." The "directed energy weapons systems research." The "directed energy weaponry technologies." The "directed energy weapons countermeasures." The "directed energy technologies." The "directed energy torture weapons systems research." The "directed energy weapon." The "directed energy weapons conspiracies." The "directed energy weapons electronic implants." The "directed energy weapons experiments." The "directed energy weapons implant control." The "directed energy weapons implant programming." The "directed energy weapons implants." The "directed energy weapons mind control attacks." The "directed energy weapons processes." The "directed energy weapons programming." The "directed energy weapons secrets." The "directed energy weapons systems research." The "directed energy weapons technologies." The "directed energy weapons." The "directed energy weapons design and development." The "directed energy weapons development." The "directed energy weapons research, design and development." The "directed energy weapons systems technologies." The "directed energy weapons techniques." The "directed energy weapons technologies."

The "Discovery Channel's MythBusters program." The "Discovery Channel's MythBusters TV program." The "Doug Coil RIFE devices." The "Doug Coil PEMF devices." The "dsm iv."

EA-EL: The "emf attacks." The "emf brain stimulations." The "emf mind control attacks." The "electrical brain inhibitions." The "electrical brain stimulations." The "electrical electrodes." The "electrical experiments." The "electrical inhibition of the brain." The "electrical stimulation of the brain." The "electrode implanted." The "electrode implanting." The "electrode implant control." The "electrode implant programming." The "electrode implants." The "electrode recordings." The "electrode stimulations." The "electromagnetic attacks." The "electromagnetic blockers." The "electromagnetic countermeasures." The "electromagnetic defenses." The "electromagnetic detection." The "electromagnetic detectors." The "electromagnetic electrodes." The "electromagnetic eliminators." The "electromagnetic jammers." The "electromagnetic protectors." The "electromagnetic protection." The "electromagnetic repellents." The "electromagnetic repellers." The "electromagnetic repulsers." The "electromagnetic weapons.

The "electromagnetic attack blockers." The "electromagnetic attack countermeasures." The "electromagnetic attack defenses." The "electromagnetic attack detection." The "electromagnetic attack devices." The "electromagnetic attack electrodes." The "electromagnetic attack equipment." The "electromagnetic brain stimulations." The "electromagnetic attack hardware." The "electromagnetic attack detectors." The "electromagnetic attack eliminators." The "electromagnetic attack experiments." The "electromagnetic attack jammers." The "electromagnetic attack methods." The "electromagnetic attack protectors." The "electromagnetic attack protection." The "electromagnetic attack repellents." The "electromagnetic attack repellers." The "electromagnetic attack repulsers." The "electromagnetic attack secrets." The "electromagnetic attack techniques." The "electromagnetic attack technologies." The "electromagnetic attack weapons."

The "electromagnetic experiments." The "electromagnetic harassment blockers." The "electromagnetic harassment countermeasures." The "electromagnetic harassment defenses." The "electromagnetic harassment detection." The "electromagnetic harassment detectors." The "electromagnetic harassment eliminators." The "electromagnetic harassment jammers." The "electromagnetic harassment protectors." The "electromagnetic harassment protection." The "electromagnetic harassment repellents." The "electromagnetic harassment repellers." The "electromagnetic harassment repulsers." The "electromagnetic harassment weapons."

The "electromagnetic mind control blockers." The "electromagnetic mind control countermeasures." The "electromagnetic mind control defenses." The "electromagnetic mind control detection." The "electromagnetic mind control detectors." The "electromagnetic mind control eliminators." The "electromagnetic mind control jammers." The "electromagnetic mind control protectors." The "electromagnetic mind control protection." The "electromagnetic mind control repellents." The "electromagnetic mind control repellers." The "electromagnetic mind control repulsers." The "electromagnetic mind control weapons."

The "electromagnetic anti-terrorism." The "electromagnetic attacking." The "electromagnetic attack tutorial." The "electromagnetic attacks." The "electromagnetic circuits." The "electromagnetic design and development." The "electromagnetic detectors." The "electromagnetic devices." The "electromagnetic dowsing." The "electromagnetic entrainment." The "electromagnetic hardware." The "electromagnetic harassing devices." The "electromagnetic harassment." The "electromagnetic implant control." The "electromagnetic implant programming." The "electromagnetic implants." The "electromagnetic jammers." The "electromagnetic jamming issues." The "electromagnetic mind control attacks." The "electromagnetic pulse weapons of mass destruction." The "electromagnetic pulsed weapons of mass destruction." The "electromagnetic research." The "electromagnetic shielding issues." The "electromagnetic spying." The "electromagnetic stimulation of the brain." The "electromagnetic stimulations." The "electromagnetic stimulators." The "electromagnetic subliminal mind control attacks." The "electromagnetic surveillance." The "electromagnetic techniques." The "electromagnetic technologies." The "electromagnetic torment." The "electromagnetic torture weapons." The "electromagnetic victims." The "electromagnetic weapons devices." The "electromagnetic weapons programs." The "electromagnetic weapons research." The "electromagnetic weapons systems research." The "electromagnetic weapons systems technologies." The "electromagnetic weapons of mass destruction." The "electromagnetic zappers."

The "electronic attack bands." The "electronic attack bandwidth." The "electronic attack blockers." The "electronic attack countermeasure services." The "electronic attack countermeasures." The "electronic attack data." The "electronic attack defenses." The "electronic attack detection." The "electronic attack detectors." The "electronic attack eliminators." The "electronic attack exotic weapons." The "electronic attack information." The "electronic attack jammers." The "electronic attack lessons." The "electronic attack protectors." The "electronic attack protection." The "electronic attack repellents." The "electronic attack repellers." The "electronic attack repulsers." The "electronic attack weapons." The "electronic attack consultants." The "electronic attack consulting services." The "electronic attack customized device services." The "electronic attack customized devices." The "electronic attack development services." The "electronic attack designs." The "electronic brain inhibitions." The "electronic brain stimulations." The "electronic attack control design services." The "electronic attack devices." The "electronic attack equipment." The "electronic attack frequencies in ghz." The "electronic attack frequencies in mhz." The "electronic attack hardware." The "electronic attack countermeasure invention services." The "electronic attack invention laboratory services." The "electronic attack invention prototyping services." The "electronic attack invention services." The "electronic attack inventions." The "electronic attack inventors." The "electronic attack laboratory services." The "electronic attack laboratories." The "electronic attack medical causations." The "electronic attack medical manifestations." The "electronic attack merchandise." The "electronic attack methods." The "electronic attack paranoia." The "electronic attack psychosis." The "electronic attack product creation services." The "electronic attack product development services." The "electronic attack product services." The "electronic attack product researchers." The "electronic attack products." The "electronic attack prototype services." The "electronic attack prototypes." The "electronic attack prototyping services." The "electronic attack repair services." The "electronic attack R&D services." The "electronic attack research, design and development services." The "electronic attack research laboratories." The "electronic attack secrets." The "electronic attack research services." The "electronic attack researchers." The "electronic attack services." The "electronic attack sexual abuse." The "electronic attack skin lesions." The "electronic attack skin rashes." The "electronic attack special projects services." The "electronic attack special services." The "electronic attack spectrum." The "electronic attack strategies." The "electronic attack tactics." The "electronic attack techniques." The "electronic attack technologies." The "electronic attack testers." The "electronic attack testing laboratories." The "electronic attack tactics." The "electronic attack testing services." The "electronic attack tips." The "electronic attack troubleshooters." The "electronic attack troubleshooting services." The "electronic attack tutorial." The "electronic attacks using artificial intelligence."

The "electronic blockers." The "electronic body control attacks." The "electronic brain stimulation devices." The "electronic brain stimulations." The "electronic countermeasure services." The "electronic countermeasure invention services." The "electronic countermeasures against behavioral modification attacks." The "electronic countermeasures against brain entrainment attacks." The "electronic countermeasures against brainwashing attacks." The "electronic countermeasures against body control attacks." The "electronic countermeasures against directed energy weapons attacks." The "electronic countermeasures against electronic attacks." The "electronic countermeasures against electronic gang stalking attacks." The "electronic countermeasures against electronic harassment." The "electronic countermeasures against mind control attacks." The "electronic countermeasures against mind reading attacks." The "electronic countermeasures against subliminal mind control attacks." The "electronic countermeasures technology." The "electronic defenses." The "electronic demodulation of signals." The "electronic demodulation of brainwaves." The "electronic detection." The "electronic detectors." The "electronic eliminators." The "electronic experiments." The "electronic gang mobbing." The "electronic gang stalking countermeasures." The "electronic gang stalking." The "electronic gangstalking." The "electronic harass." The "electronic harassment blockers." The "electronic harassment countermeasures." The "electronic harassment countermeasures." The "electronic harassment defenses." The "electronic harassment detection." The "electronic harassment detection." The "electronic harassment detectors." The "electronic harassment eliminators." The "electronic harassment jammers." The "electronic harassment protectors." The "electronic harassment protection." The "electronic harassment repellents." The "electronic harassment repellers." The "electronic harassment repulsers." The "electronic harassment systems." The "electronic harassment techniques." The "electronic harassment technologies." The "electronic harassment weapons." The "electronic inhibition of the brain." The "electronic jammers."

The "electronic mind control blockers." The "electronic mind control countermeasures." The "electronic mind control defenses." The "electronic mind control detection." The "electronic mind control detectors." The "electronic mind control eliminators." The "electronic mind control jammers." The "electronic mind control protectors." The "electronic mind control protection." The "electronic mind control repellents." The "electronic mind control repellers." The "electronic mind control repulsers." The "electronic mind control weapons." The "electronic modulation with brainwaves."

The "electronic anti-terrorism." The "electronic attack devices." The "electronic attack electrodes." The "electronic attack equipment." The "electronic attack hardware." The "electronic attack experiments." The "electronic attack expose." The "electronic attacking." The "electronic attacks." The "electronic circuits." The "electronic circuit designs." The "electronic design and development." The "electronic designs." The "electronic detectors." The "electronic devices." The "electronic dowsers." The "electronic dowsing." The "electronic drugstore." The "electronic electrodes." The "electronic brain entrainment." The "electronic entrainment." The "electronic genital attacks." The "electronic genital stimulations." The "electronic hardware." The "electronic harassing." The "electronic harassment experiments."The "electronic human surveillance devices." The "electronic human tracking devices." The "electronic implant attacks." The "electronic implant brain entrainment." The "electronic implant control." The "electronic implant controllers." The "electronic implant electronic attack." The "electronic implant injection." The "electronic implant mind control attacks." The "electronic implant monitoring." The "electronic implant programmers." The "electronic implant programming." The "electronic implant surveillance." The "electronic implanted Manchurian Candidate." The "electronic implants."

The "electronic jammers." The "electronic jamming issues." The "electronic mind control attacks." The "electronic mind control devices." The "electronic mind reading devices." The "electronic protectors." The "electronic protection." The "electronic repellents." The "electronic repellers." The "electronic repulsers." The "electronic research." The "electronic sexual abuse." The "electronic sexual attacks." The "electronic shielding issues." The "electronic spying." The "electronic stimulation of the genitals." The "electronic stimulation devices." The "electronic stimulations." The "electronic stimulators." The "electronic subliminal mind control attacks." The "electronic surveillance." The "electronic techniques." The "electronics technologies." The "electronic terrorism." The "electronic torture weapons." The "electronic tracking." The "electronic torment." The "electronic torture." The "electronic tracking." The "electronic victims." The "electronic voice phenomena." The "electronic weapons countermeasures." The "electronic weapons devices." The "electronic weapons of torture." The "electronic weapons programs." The "electronic stimulation of the brain." The "electronic weapons research." The "electronic weapons systems research." The "electronic weapon system devices." The "electronic weapons systems technologies." The "electronic ventriloquism." The "electronic weapons of mass destruction."

The "electronically attack. " The "electronically attacked. " The "electronically control. " The "electronically controlled. " The "electronically harass. " The "electronically harassed." The "electronically-induced mind control devices." The "electronically surveil. " The "electronically surveilled. " The "electronically track. " The "electronically tracked." The "electrophonic hearing." The "electrophonic sounds." The "electrotelepathic attacks." The "electrotelepathic harassment."

EM-EZ: The "EM harassing devices." The "em jammers." The "em weaponry." The "em zappers." The "emf harassing devices." The "emf jammers." The "emf weaponry." The "emf weapons systems research." The "emf zappers." The "emotional brainwave clusters." The "emotional clusters of brainwaves." The "emotional trauma."

The "end aliens." The "end brain entrainment attacks." The "end brainwashing attacks." The "end electronic attacks." The "end electronic brain entrainment attacks." The "end electronic entrainment attacks." The "end electronic harassment." The "end electronic implant control." The "end electronic implant programming." The "end electronic implants." The "end electronic mind control attacks." The "end electronic spying." The "end electronic subliminal mind control attacks." The "end electronic surveillance." The "end electronic torture." The "end ghosts." The "end implant control." The "end implant programming." The "end implants." The "end lightning attacks." The "end mind control attacks." The "end pain field generator attacks." The "end subliminal mind control attacks." The "end brain entrainment attacks." The "end mind control harassment." The "end brain spying." The "end brainwave spying." The "end brainwave signature spying." The "end subliminal mind control attacks." The "end brain surveillance." The "end brainwave surveillance." The "end brainwave signature surveillance." The "end brain torture." The "end mind torture." The "end unknown entities." The "end unknown presences."

The "entrainment countermeasures." The "entrainment devices." The "entrainment electronics." The "entrainment experiments." The "entrainment methods." The "entrainment systems." The "entrainment technology." The "entrainment torture." The "environmental manifestations of body control attacks." The "environmental manifestations of directed energy attacks." The "medical manifestations of electronic attacks." The "environmental manifestations of electronic gang stalking." The "environmental manifestations of electronic harassment." The "environmental manifestations of mind control attacks." The "physiological effects of electronic attack." The "physiological manifestations of electronic attack." The "equipment customizing." The "equipment designs." The "equipment designing." The "equipment integration." The "equipment inventions." The "equipment inventing." The "equipment modifying." The "equipment modifications." The "equipment prototyping." The "equipment repairs." The "equipment repairing." The "equipment testing." The "equipment troubleshooting." The "equipment upgrades ." The "equipment upgrading." The "ET abductions." The "ET attacks." The "ET electronic attacks." The "ET implants." The "ET mind control powers." The "evoked potentials." The "experts in electronic attacks." The "experts in electronic mind control attacks." The "experts in mind control attacks." The "extra sensory pain fields." The "extra sensory perception." The "extra sensory persecution." The "extra sensory persuasion." The "extra sensory pleasure." The "extra sensory projection." The "extrasensory pain fields." The "extrasensory perception." The "extrasensory persecution." The "extrasensory persuasion." The "extrasensory pleasure." The "extrasensory projection." The "extra sensual pain fields." The "extra sensual perception." The "extra sensual persecution." The "extra sensual persuasion." The "extra sensual pleasure." The "extra sensual projection." The "extrasensual pain fields." The "extrasensual perception." The "extrasensual persecution." The "extrasensual persuasion." The "extrasensual pleasure." The "extrasensual projection." The "extra sexual pain fields." The "extra sexual perception." The "extra sexual persecution." The "extra sexual persuasion." The "extra sexual pleasure." The "extra sexual projection." The "extrasexual pain fields." The "extrasexual perception." The "extrasexual persecution." The "extrasexual persuasion." The "extrasexual pleasure." The "extrasexual projection."

F: The "fake alien abductions." The "federal electronic attack research programs." The "federal mind control human research programs." The "fight electronic terrorism." The "fighting electronic terrorism." The "fight terrorism." The "fighting terrorism." The "flash blasters." The "flashing LED mind controllers." The "flashing LED mind control devices." The "flashing LED mind control technologies." The "FMRI non-consensual lie detection." The "FMRI non-consensual lie detectors." The "free catalog." The "free estimates." The "free support." The "free technical information." The "free technical support." The "frequency following response." The "frequency instrument therapy." The "Frey Effect devices." The "Frey Effects technology." The "Functional Magnetic Resonance Imaging technology (FMRI)."

G: The "galvanic skin response devices." The "gamma brain waves." The "gamma brain wave control." The "gamma brainwaves." The "gamma brainwave control." The "gamma brainwave monitoring." The "gamma brainwave signals." The "gamma frequencies." The "gamma waves." The "gang stalking." The "gangstalking." The "gas lighting attacks." The "gaslighting attacks." The "ghost buster." The "ghost busters." The "ghost busting." The "ghostbuster devices." The "ghostbuster equipment." The "ghostbuster hardware." The "ghostbuster merchandise." The "ghostbuster offers." The "ghostbuster products." The "ghostbuster devices." The "ghostbuster equipment." The "ghostbuster hardware." The "ghostbuster merchandise." The "ghostbuster offers." The "ghostbuster products." The "ghost buster devices." The "ghost buster equipment." The "ghost buster hardware." The "ghost buster merchandise." The "ghost buster offers." The "ghost buster products." The "ghostbusting devices." The "ghostbusting equipment." The "ghostbusting hardware." The "ghostbusting merchandise." The "ghostbusting offers." The "ghostbusting products." The "ghost busting devices." The "ghost busting equipment." The "ghost busting hardware." The "ghost busting merchandise." The "ghost busting offers." The "ghost busting products." The "ghost countermeasures." The "ghost defenses." The "ghost detection." The "ghost detectors." The "ghost detecting."

The "government beams voices into your head." The "government controls your mind." The "government implant control." The "government implant programming." The "government electronic attacks." The "government electronic implants." The "government implants." The "government spies." The "government transponders." The "government brain entrainment experiments." The "government conspiracies." The "government mind control attacks." The "government mind control experiments." The "government sends voices into your head." The "government subliminal mind control experiments."

H: The "hall effect devices." The "happiness." The "happy state." The "hardware customizing." The "hardware designs." The "hardware designing." The "hardware integration." The "hardware inventions." The "hardware inventing." The "hardware modifying." The "hardware modifications." The "hardware prototyping." The "hardware repairs." The "hardware repairing." The "hardware research." The "hardware testing." The "hardware troubleshooting." The "hardware upgrades ." The "hardware upgrading." The "harassing signals." The "hearing aid telecoils and magnetic induction loop systems." The "hearing aid telecoils and magnetic loop systems." The "hearing voices in your head." The "hearing voices in your mind." The "hearing your own thoughts." The "harassment signals." The "Havana Syndrome attacks." The "head injuries." The "head trauma." The "heightened state of paranoia." The "hidden trauma."

The "high frequency brain stimulation." The "high-frequency hum detection." The "high-frequency hum detecting." The "high-frequency hum detectors." The "high frequency stimulation of the brain." The "high tech consultants." The "hi-tech consultants." The "high tech consulting." The "hi-tech consulting." The "high tech devices." The "hi-tech devices." The "high tech equipment." The "hi-tech equipment." The "high tech hardware." The "hi-tech hardware." The "high tech offers." The "hi-tech offers." The "high tech products." The "hi-tech products." The "high tech services." The "hi-tech services." The "high tech security consultants." The "hi-tech security consultants." The "high tech security consulting." The "hi-tech security consulting." The "high tech security devices." The "hi-tech security devices." The "high tech security equipment." The "hi-tech security equipment." The "high tech security hardware." The "hi-tech security hardware." The "high tech security offers." The "hi-tech security offers." The "high tech security products." The "hi-tech security products." The "high tech security services." The "hi-tech security services." The "high tech survival consultants." The "hi-tech survival consultants." The "high tech survival consulting." The "hi-tech survival consulting." The "high tech survival devices." The "hi-tech survival devices." The "high tech survival equipment." The "hi-tech survival equipment." The "high tech survival hardware." The "hi-tech survival hardware." The "high tech survival offers." The "hi-tech survival offers." The "high tech survival products." The "hi-tech survival products." The "high tech survival services." The "hi-tech survival services." The "high voltage brain stimulations." The "high voltage stimulation of the brain." The "holophone." The "holophonic sounds." The "holophone device." The "holophonic electronic device." The "holophone technology." The "holophonic mind control." The "holophonic attack." The "Holodeck mind control techniques."

The "how to detect alien abductions." The "how to detect body control attacks." The "how to detect brain entrainment attacks." The "how to detect brainwashing attacks." The "how to detect directed energy attacks." The "how to detect directed energy weapons." The "how to detect directed energy weapons attacks." The "how to detect entrainment attacks." The "how to detect electrode implants." The "how to detect electromagnetic attacks." The "how to detect electromagnetic entrainment attacks." The "how to detect electromagnetic harassment." The "how to detect electromagnetic mind control attacks." The "how to detect electromagnetic subliminal mind control attacks." The "how to detect electromagnetic torture." The "how to detect electromagnetic weapons attacks." The "how to detect electronic attacks." The "how to detect electronic entrainment attacks." The "how to detect electronic harassment." The "how to detect electronic mind control attacks." The "how to detect electronic spying." The "how to detect electronic subliminal mind control attacks." The "how to detect electronic surveillance." The "how to detect electronic torture." The "how to detect electronic weapons attacks." The "how to detect implanted devices." The "how to detect implanted electrodes." The "how to detect implants." The "how to detect improvised weapons attacks." The "how to detect mind control attacks." The "how to detect subliminal mind control attacks." The "how to detect brain attacks." The "how to detect brain entrainment attacks." The "how to detect brain harassment." The "how to detect brain control attacks." The "how to detect brain spying." The "how to detect brainwave spying." The "how to detect brain surveillance." The "how to detect brainwave surveillance." The "how to detect brainwave signature surveillance." The "how to detect subliminal brain control attacks." The "how to detect brain torture." The "how to detect brain weapons attacks."

The "how to prevent alien abductions." The "how to prevent body control attacks." The "how to prevent brain entrainment attacks." The "how to prevent brainwashing attacks." The "how to prevent directed energy attacks." The "how to prevent directed energy weapons attacks." The "how to prevent entrainment attacks." The "how to prevent electrode implants." The "how to prevent electromagnetic attacks." The "how to prevent electromagnetic entrainment attacks." The "how to prevent electromagnetic harassment." The "how to prevent electromagnetic mind control attacks." The "how to prevent electromagnetic subliminal mind control attacks." The "how to prevent electromagnetic torture." The "how to prevent electromagnetic weapons attacks." The "how to prevent electronic attacks." The "how to prevent electronic entrainment attacks." The "how to prevent electronic harassment." The "how to prevent electronic mind control attacks." The "how to prevent electronic spying." The "how to prevent electronic subliminal mind control attacks." The "how to prevent electronic surveillance." The "how to prevent electronic torture." The "how to prevent electronic weapons attacks." The "how to prevent implanted devices." The "how to prevent implanted electrodes." The "how to prevent implants." The "how to prevent improvised weapons attacks." The "how to prevent mind control attacks." The "how to prevent subliminal mind control attacks." The "how to prevent brain attacks." The "how to prevent brain entrainment attacks." The "how to prevent brain harassment." The "how to prevent brain control attacks." The "how to prevent brain spying." The "how to prevent brainwave spying." The "how to prevent brainwave signature spying." The "how to prevent subliminal brain control attacks." The "how to prevent brain torture." The "how to prevent brain weapons attacks." The "how to prevent brain surveillance." The "how to prevent brainwave surveillance." The "how to prevent brainwave signature surveillance."

The "how to stop alien abductions." The "how to stop body control attacks." The "how to stop brain entrainment attacks." The "how to stop brainwashing attacks." The "how to stop directed energy attacks." The "how to stop directed energy weapons attacks." The "how to stop entrainment attacks." The "how to stop electrode implants." The "how to stop electromagnetic attacks." The "how to stop electromagnetic entrainment attacks." The "how to stop electromagnetic harassment." The "how to stop electromagnetic mind control attacks." The "how to stop electromagnetic subliminal mind control attacks." The "how to stop electromagnetic torture." The "how to stop electromagnetic weapons attacks." The "how to stop electronic attacks." The "how to stop electronic entrainment attacks." The "how to stop electronic harassment." The "how to stop electronic mind control attacks." The "how to stop electronic spying." The "how to stop electronic subliminal mind control attacks." The "how to stop electronic surveillance." The "how to stop electronic torture." The "how to stop electronic weapons attacks." The "how to stop implanted devices." The "how to stop implanted electrodes." The "how to stop implants." The "how to stop improvised weapons attacks." The "how to stop mind control attacks." The "how to stop subliminal mind control attacks." The "how to stop brain attacks." The "how to stop brain entrainment attacks." The "how to stop brain harassment." The "how to stop brain control attacks." The "how to stop brain spying." The "how to stop brainwave spying." The "how to stop brainwave signature spying." The "how to stop subliminal brain control attacks." The "how to stop brain torture." The "how to stop brain weapons attacks."

The "human auditory response to modulated electrical energy." The "human auditory response to modulated electromagnetic energy." The "human auditory response to modulated microwave energy." The "human auditory response to modulated microwaves." The "human auditory response to modulated pulsed energy." The "human auditory response to modulated pulsed RF energy." The "human auditory response to modulated RF energy." The "human auditory system response to modulated electrical energy." The "human auditory system response to modulated electromagnetic energy." The "human auditory system response to modulated microwave energy." The "human auditory system response to modulated microwaves." The "human auditory system response to modulated pulsed energy." The "human auditory system response to modulated pulsed RF energy." The "human auditory system response to modulated RF energy." The "human auditory response to electrical energy." The "human auditory response to electromagnetic energy." The "human auditory response to microwave energy." The "human auditory response to microwaves." The "human auditory response to pulsed energy." The "human auditory response to pulsed RF energy." The "human auditory response to RF energy." The "human auditory system response to electrical energy." The "human auditory system response to electromagnetic energy." The "human auditory system response to microwave energy." The "human auditory system response to microwaves." The "human auditory system response to pulsed energy." The "human auditory system response to pulsed RF energy." The "human auditory system response to RF energy."

I: The "implant controls." The "implant injections." The "implant programming." The "implanted brain controllers." The "implanted controllers." The "implanted devices." The "implanted electrodes." The "implanting electrodes." The "implanted electronic devices." The "implanted electronics." The "implanted fake memories." The "implanted false memories." The "implanted implants testing." The "implanted mind controllers." The "implanted receivers." The "implanted stimoceivers." The "implanted stimulation receivers." The "implanted thoughts." The "implanted transceivers." The "implanted transmitters." The "implanted weapons." The "induced altered states." The "induced mind control attacks."

The "inhibition of the brain." The "inhibitory responses." The "innate bioelectricity." The "invasive electrodes." The "investigate aliens." The "investigate electronic attack." The "investigate electronic harassment." The "investigate electronic weapons." The "investigate fortean phenomena." The "investigate ghosts." The "investigate spirits." The "investigate mind control attacks." The "investigate brain harassment." The "investigate brain weapons." The "investigate unknown entities." The "investigate unknown presences."

J-K: The "jam behavioral modification attacks." The "jam brain entrainment attack." The "jam brainwashing attacks." The "jam body control attacks." The "jam directed energy weapons attacks." The "jam electronic attacks." The "jam electronic gang stalking attacks." The "jam electronic harassment." The "jam mind control attacks." The "jam mind reading attacks." The "jam subliminal mind control attacks." The "jam brain entrainment." The "jam electromagnetic attacks." The "jam electromagnetic entrainment." The "jam electromagnetic harassment." The "jam electromagnetic implant control." The "jam electromagnetic implant programming." The "jam electromagnetic implants." The "jam electromagnetic mind control attacks." The "jam electromagnetic spying." The "jam electromagnetic subliminal mind control attacks." The "jam electromagnetic surveillance." The "jam electromagnetic torture." The "jam electromagnetic weapons." The "jam electronic attacks." The "jam electronic brain entrainment." The "jam electronic entrainment." The "jam electronic harassment." The "jam electronic implant control." The "jam electronic implant programming." The "jam electronic implants." The "jam electronic mind control attacks." The "jam electronic spying." The "jam electronic subliminal mind control attacks." The "jam electronic surveillance." The "jam electronic torture." The "jam electronic weapons." The "jam emf." The "jam brain attacks." The "jam brain entrainment." The "jam brain harassment." The "jam brain control attacks." The "jam psychological control." The "jam psychological entrainment." The "jam satellite control." The "jam subliminal brain control attacks." The "jam mind control attacks." The "jam subliminal mind control attacks." The "jam brain spying." The "jam brainwave spying." The "jam brainwave signature spying." The "jam subliminal brain control attacks." The "jam brain surveillance." The "jam brainwave surveillance." The "jam brainwave signature surveillance." The "jam brain torture." The "jam brain weapons." The "jam signals." The "jamming signals." The "Jose Delgado experiments."

L: The "laser torture weapons systems research." The "laser weapons systems research." The "laser weapons technologies." The "LED mind controllers." The "LED mind control devices." The "LED mind control technologies." The "life coaching." The "life coaching services." The "lightning detectors." The "light therapy." The "Lilly wave bipolar stimulation." The "Lilly wave brain stimulation techniques." The "Lilly wave devices." The "Lilly wave nerve stimulation techniques." The "Lilly wave phenomena." The "Lilly wave stimulation techniques." The "Lilly waves." The "Lilly waveform brain stimulation techniques." The "Lilly waveforms." The "living dead mind capture devices." The "living dead mind control devices." The "Lone Star Consulting, Inc." The "low-frequency hum detection." The "low-frequency hum detecting." The "low-frequency hum detectors."

M: The "made-to-order." The "made-to-order consulting." The "made-to-order devices." The "made-to-order equipment." The "made-to-order hardware." The "made-to-order merchandise." The "made-to-order offers." The "magnetic induction loop systems and telecoils for hearing aids." The "magnetic induction loop systems and hearing aid telecoils." The "magnetic loop systems and telecoils for hearing aids." The "magnetic loop systems and hearing aid telecoils." The "magnetic resonance imagery eavesdropping." The "magnetic resonance imagery mind control attacks." The "magnetic resonance imagery surveillance." The "magnetic resonance imagery technology." The "magnetic resonance imaging eavesdropping." The "magnetic resonance imaging mind control attacks." The "magnetic resonance imaging surveillance." The "magnetic resonance imaging technology." The "magnetic resonant frequency of the body." The "manchurian candidate." The "massive electronic attack dysfunction." The "massive electronic attack syndrome." The "massive electronic attack perpetrators." The "massive electronic attack victims." The "massive electronic attack nightmare dysfunction." The "massive electronic attack nightmare syndrome." The "massive electronic attack nightmare perpetrators." The "massive electronic attack nightmare victims." The "medical causations of body control attacks." The "medical causations of electronic attacks." The "medical causations of mind control attacks." The "medical diagnosis of mind control attacks." The "medical diagnosis of psychological diseases." The "MEAN perpetrators." The "MEAN Syndrome." The "MEAN victims." The "medical manifestations of brain entrainment." The "medical manifestations of brainwashing." The "medical manifestations of behavioral modification." The "medical manifestations of body control attacks." The "medical manifestations of brainwashing." The "medical manifestations of directed energy attacks." The "medical manifestations of electronic attacks." The "medical manifestations of electronic gang stalking." The "medical manifestations of electronic harassment." The "medical manifestations of mind control attacks." The "medical manifestations of mind reading attacks." The "medical manifestations of subliminal mind control attacks."

The "mental breakdowns." The "mental depression." The "mental illness." The "mental illnesses." The "mentally ill." The "mental powers." The "mental telepathy." The "mental terrorism." The "mental therapy." The "mental trauma." The "mental victims." The "mental weapons." The "mental zombies." The "mental control of animals." The "mental control of computers." The "mental control of people." The "mentally control animals." The "mentally control computers." The "mentally control people."

The "merely by thinking." The "metal detectors." The "metal electrodes." The "microwave brain stimulations." The "microwave attack devices." The "microwave attacks." The "microwave countermeasures." The "Microwave Hearing Effect devices." The "Microwave Hearing Effect technology." The "microwave magnetic resonance imagery techniques." The "microwave magnetic resonance imaging techniques." The "microwave mind control devices." The "microwave MRI techniques." The "microwave stimulation of the brain." The "microwave torture weapons systems research." The "microwave weapons systems research." The "microwave technologies."

The "military satellite control of mind control devices." The "military satellite control signals." The "military satellite directed energy attacks." The "military satellite electronic attacks." The "military satellite mind control attacks." The "military satellite mind control systems." The "military satellite signals." The "military satellite spies." The "military satellite spying systems." The "military satellite subliminal mind control attacks." The "military satellite surveillance systems." The "military satellite terrorism." The "military satellite terrorists." The "military satellite tracking systems."

The "mind-body connection." The "mind capture electronic attacks." The "mind capture devices." The "mind capture systems." The "mind capture techniques." The "mind capture technologies." The "mind capture weapons." The "mind connection." The "mind controls." The "mind control attacks using artificial intelligence." The "mind control bands." The "mind control bandwidth." The "mind control conspiracies." The "mind control conspiracy." The "mind control countermeasure services." The "mind control countermeasures." The "mind control data." The "mind control customized devices." The "mind control detectors." The "mind control devices." The "mind control electrodes." The "mind control electronic attacks." The "mind control electronic implant control." The "mind control electronic implant programming." The "mind control electronic implants." The "mind control electronics." The "mind control experiments." The "mind control consultants." The "mind control consulting services." The "mind control countermeasure invention services." The "mind control customized device services." The "mind control customized devices." The "mind control data." The "mind control development services." The "mind control designs." The "mind control design services." The "mind control devices." The "mind control equipment." The "mind control exotic weapons." The "mind control expose." The "mind control frequencies in ghz." The "mind control frequencies in mhz." The "mind control hardware." The "mind control implant control." The "mind control implant programming." The "mind control implants." The "mind control invention laboratory services." The "mind control invention prototyping services." The "mind control invention services." The "mind control inventions." The "mind control inventors." The "mind control jamming issues." The "mind control lab." The "mind control laboratories." The "mind control laboratory services." The "mind control lessons." The "mind control medical causations." The "mind control medical manifestations." The "mind control methods." The "mind control merchandise." The "mind control microwave attacks."

The "mind control paranoia." The "mind control plots." The "mind control psychosis." The "mind control product creation services." The "mind control product development services." The "mind control product services." The "mind control product researchers." The "mind control products." The "mind control prototype services." The "mind control prototypes." The "mind control prototyping services." The "mind control powers." The "mind control programming." The "mind control protection." The "mind control pulsed microwave attacks." The "mind control repair services." The "mind control R&D services." The "mind control research, design and development services." The "mind control research laboratories." The "mind control research services." The "mind control researchers." The "mind control satellites." The "mind control secrets." The "mind control services." The "mind control shielding issues." The "mind control special projects services." The "mind control special services." The "mind control spectrum." The "mind control systems." The "mind control slaves." The "mind control stories." The "mind control strategies." The "mind control tactics." The "mind control techniques." The "mind control technology." The "mind control technologies." The "mind control tips." The "mind control tutorial." The "mind control testers." The "mind control testing laboratories." The "mind control testing services." The "mind control troubleshooters." The "mind control troubleshooting services." The "mind control using artificial intelligence." The "mind control victims." The "mind control weapons systems research." The "mind control weapons technologies." The "mind control zombies."

The "mind games." The "mind probe attacks." The "mind probes." The "mind probing." The "mind processes." The "mind inhibitors." The "mind reading attacks." The "mind reading countermeasures." The "mind reading mind control attacks." The "mind reading devices." The "mind stimulators." The "mobius coil." The "mobius strip." The "modify behavior." The "modifying circuits." The "modifying devices." The "modifying equipment." The "modifying hardware." The "modifying products." The "modifying services." The "modulate brainwaves." The "modulated brainwaves." The "modulation of brainwaves." The "monitoring electrodes." The "Montauk Chair." The "motor control cortex." The "MRI eavesdropping." The "MRI mind control techniques." The "MRI surveillance." The "MRI technology." The "murder by electronic attack." The "murder by mind control attack." The "myth busters programs." The "myth busters researchers." The "MythBusters program." The "MythBusters television program." The "MythBusters TV program."

N-O: The "nanobot brain implants." The "nanobot conspiracy." The "nanobot devices." The "nanobot electronic attacks." The "nanobot electronic implants." The "nanobot implants." The "nanobot mind control techniques." The "nanobot techniques." The "nanobot technologies." The "neural processes." The "neural prosthesis." The "neural signals."

The "neurological attack bands." The "neurological attack bandwidth." The "neurological attack blockers." The "neurological attack countermeasure services." The "neurological attack countermeasures." The "neurological attack data." The "neurological attack defenses." The "neurological attack detection." The "neurological attack detectors." The "neurological attack eliminators." The "neurological attack exotic weapons." The "neurological attack information." The "neurological attack jammers." The "neurological attack lessons." The "neurological attack protectors." The "neurological attack protection." The "neurological attack repellents." The "neurological attack repellers." The "neurological attack repulsers." The "neurological attack weapons." The "neurological attack consultants." The "neurological attack consulting services." The "neurological attack customized device services." The "neurological attack customized devices." The "neurological attack development services." The "neurological attack designs." The "neurological attack control design services." The "neurological attack devices." The "neurological attack equipment." The "neurological attack frequencies in ghz." The "neurological attack frequencies in mhz." The "neurological attack hardware." The "neurological attack countermeasure invention services." The "neurological attack laboratory services." The "neurological attack laboratories." The "neurological attack medical causations." The "neurological attack medical manifestations." The "neurological attack merchandise." The "neurological attack methods." The "neurological attack paranoia." The "neurological attack psychosis." The "neurological attack product services." The "neurological attack product researchers." The "neurological attack products." The "neurological attack prototype services." The "neurological attack prototypes." The "neurological attack prototyping services." The "neurological attack repair services." The "neurological attack R&D services." The "neurological attack research, design and development services." The "neurological attack research laboratories." The "neurological attack secrets." The "neurological attack research services." The "neurological attack researchers." The "neurological attack services." The "neurological attack special projects services." The "neurological attack special services." The "neurological attack spectrum." The "neurological attack strategies." The "neurological attack tactics." The "neurological attack techniques." The "neurological attack technologies." The "neurological attack testers." The "neurological torture weapons." The "neurological attack testing laboratories." The "neurological attack tactics." The "neurological attack testing services." The "neurological attack tips." The "neurological attack troubleshooters." The "neurological attack troubleshooting services." The "neurological attack tutorial." The "neurological attacks using artificial intelligence." The "neurological attacks."

The "neurological interference." The "neurological weapons attack bands." The "neurological weapons attack bandwidth." The "neurological weapons attack blockers." The "neurological weapons attack countermeasure services." The "neurological weapons attack countermeasures." The "neurological weapons attack data." The "neurological weapons attack defenses." The "neurological weapons attack detection." The "neurological weapons attack detectors." The "neurological weapons attack eliminators." The "neurological weapons attack exotic weapons." The "neurological weapons attack information." The "neurological weapons attack jammers." The "neurological weapons attack lessons." The "neurological weapons attack protectors." The "neurological weapons attack protection." The "neurological weapons attack repellents." The "neurological weapons attack repellers." The "neurological weapons attack repulsers." The "neurological weapons attack weapons." The "neurological weapons attack consultants." The "neurological weapons attack consulting services." The "neurological weapons attack customized device services." The "neurological weapons attack customized devices." The "neurological weapons attack development services." The "neurological weapons attack designs." The "neurological weapons attack control design services." The "neurological weapons attack devices." The "neurological weapons attack equipment." The "neurological weapons attack frequencies in ghz." The "neurological weapons attack frequencies in mhz." The "neurological weapons attack hardware." The "neurological weapons attack countermeasure invention services." The "neurological weapons attack laboratory services." The "neurological weapons attack laboratories." The "neurological weapons attack medical causations." The "neurological weapons attack medical manifestations." The "neurological weapons attack merchandise." The "neurological weapons attack methods." The "neurological weapons attack paranoia." The "neurological weapons attack psychosis." The "neurological weapons attack product services." The "neurological weapons attack product researchers." The "neurological weapons attack products." The "neurological weapons attack prototype services." The "neurological weapons attack prototypes." The "neurological weapons attack prototyping services." The "neurological weapons attack repair services." The "neurological weapons attack R&D services." The "neurological weapons attack research, design and development services." The "neurological weapons attack research laboratories." The "neurological weapons attack secrets." The "neurological weapons attack research services." The "neurological weapons attack researchers." The "neurological weapons attack services." The "neurological weapons attack special projects services." The "neurological weapons attack special services." The "neurological weapons attack spectrum." The "neurological weapons attack strategies." The "neurological weapons attack tactics." The "neurological weapons attack techniques." The "neurological weapons attack technologies." The "neurological weapons attack testers." The "neurological weapons attack testing laboratories." The "neurological weapons attack tactics." The "neurological weapons attack testing services." The "neurological weapons attack tips." The "neurological weapons attack troubleshooters." The "neurological weapons attack troubleshooting services." The "neurological weapons attack tutorial." The "neurological weapons attacks using artificial intelligence." The "neurological weapons attacks."

The "neuromancing technology." The "neuromarketing technology." The "new world order mind control (mindcon)." The "new world order mind reading (mindread)." The "Nexus Magazine." The "non-invasive electrodes."

The "off the shelf devices." The "off the shelf hardware." The "outer limits." The "outer space alien abductions." The "outer space alien attacks." The "outer space alien blasters." The "outer space alien busters." The "outer space alien electronic attacks." The "outer space alien electronic implants." The "outer space alien implants." The "outer space alien mind control powers." The "outer space alien weapons systems research." The "outer space alien weapons." The "outer space aliens." The "outrageous circuit designs." The "outrageous circuits." The "outrageous devices." The "outrageous electronic devices." The "outrageous electronic gadgets." The "outrageous electronics." The "outrageous equipment." The "outrageous gadgets." The "outrageous hardware." The "outrageous products." The "outrageous projects." The "outrageous science projects." The "outrageous special projects." The "over the counter devices." The "over the counter hardware."

PA-PO: The "pain field generator attacks." The "pain field generators." The "pain manipulation devices." The "pain manipulation technologies." The "pain manipulation weapons." The "panic attack." The "panic attacks." The "panic room." The "parametric applications." The "parametric transducers." The "paranormal activities." The "paranormal activity." The "paranormal investigators." The "paranormal phenomena." The "paranormal phenomenon." The "paranormal researchers." The "paranormal science." The "paranormal sightings." The "paranormal sounds." The "paranormal studies." The "paranormal stuff." The "paranormal things." The "personal electronic attack jammers." The "personal electronic jammers." The "personal jammers." The "personality disorder manifestations." The "personality profiling technology." The "phantom experiences." The "phantom manifestations." The "phantom pains." The "phantom sights." The "phantom sounds." The "phantom symptoms." The "phantom voices."

The "physical manifestations of body control attacks." The "physical manifestations of directed energy attacks." The "physical manifestations of electronic attacks." The "physical manifestations of electronic gang stalking." The "physical manifestations of electronic harassment." The "physical manifestations of mind control attacks." The "physiological effects of electronic attack." The "physiological manifestations of electronic attack." The "physiological problems." The "plasma torture weapons systems research." The "plasma weapons systems research." The "plasma weapons technologies." The "Psychotronic Influence System technology (PIS technology)." The "positive reinforcement." The "post traumatic stress disorder manifestations." The "power of suggestion." The "power of suggesting." The "psychological trauma." The "PTSD manifestations."

PR: The "precious metal electrodes." The "prevent aliens." The "prevent brain entrainment attacks." The "prevent brainwashing attacks." The "prevent electronic attacks." The "prevent electronic brain entrainment attacks." The "prevent electronic entrainment attacks." The "prevent electronic harassment." The "prevent electronic implant control." The "prevent electronic implant programming." The "prevent electronic implants." The "prevent electronic mind control attacks." The "prevent electronic spying." The "prevent electronic subliminal mind control attacks." The "prevent electronic surveillance." The "prevent electronic torture." The "prevent ghosts." The "prevent implant control." The "prevent implant programming." The "prevent implants." The "prevent lightning attacks." The "prevent mind control attacks." The "prevent pain field generator attacks." The "prevent subliminal mind control attacks." The "prevent brain attacks." The "prevent brain entrainment attacks." The "prevent brain harassment." The "prevent brain control attacks." The "prevent brain spying." The "prevent brainwave spying." The "prevent brainwave signature spying." The "prevent subliminal brain control attacks." The "prevent brain surveillance." The "prevent brainwave surveillance." The "prevent brainwave signature surveillance." The "prevent brain torture." The "prevent unknown entities." The "prevent unknown presences."

The "products and services." The "professional products." The "professional services." The "program behavior." The "prototyping circuits." The "prototyping devices." The "prototyping equipment." The "prototyping hardware." The "prototyping inventions." The "prototyping products." The "prototyping services." The "psi attacks." The "psi mind control attacks." The "psi technology." The "psi weapons systems research." The "psionic attacks." The "psionic mind control attacks." The "psionic technology." The "psionic torture weapons systems research." The "psionic weapons technology." The "psychiatric experiences." The "psychiatric manifestations of mind control attacks." The "psychiatric symptoms of mind control attacks."

Psychic: The "psychic activities." The "psychic activity." The "psychic advances." The "psychic amplifiers." The "psychic attacks." The "psychic behavioral modifications." The "psychic body control attacks." The "psychic brain entrainment." The "psychic brainwashing." The "psychic communications." The "psychic control." The "psychic controllers." The "psychic counterattacks." The "psychic countermeasures." The "psychic crisis." The "psychic cure." The "psychic cures." The "psychic delivery systems." The "psychic destruction." The "psychic detection." The "psychic detectors." The "psychic devices." The "psychic discoveries." The "psych dowsing." The "psychic emergency." The "psychic equipment." The "psychic entrainment." The "psychic experiments." The "psychic harassment." The "psychic hardware." The "psychic healing." The "psychic jamming issues." The "psychic jammers." The "psychic medical." The "psychic merchandise." The "psychic mind control attacks." The "psychic offers." The "psychic powers." The "psychic products." The "psychic radionics." The "psychic receptions." The "psychic remote control." The "psychic research." The "psychic researchers." The "psychic science projects." The "psychic services." The "psychic shielding issues." The "psychic signals. The "psychic subliminal mind control attacks." The "psychic survival." The "psychic survivalism." The "psychic systems." The "psychic therapies." The "psychic therapy." The "psychic transmissions." The "psychic treatments." The "psychic victim." The "psychic victims." The "psychic weapons systems research." The "psychic weapons technologies." The "psychic weaponry."

Psychological: The "psychological battlefields." The "psychological disorder." The "psychological disorders." The "psychological effects of mind control attacks." The "psychological entraining." The "psychological entrainment technology." The "psychological experiences." The "psychological manifestations of mind control attacks." The "psyops operations technology." The "psyops programs technology." The "psychological problems." The "psychological research." The "psychological researchers." The "psychological symptoms of mind control attacks." The "psychological torment." The "psychological torture." The "psychological victims." The "psychological war." The "psychological warfare operations (psyops operations)." The "psychological warfare programs (psyops programs)." The "psychological weapons."

Psychotronic: The "psychotronic activities." The "psychotronic activity." The "psychotronic advances." The "psychotronic amplifiers." The "psychotronic attacks." The "psychotronic behavioral modifications." The "psychotronic body control attacks." The "psychotronic brain entrainment." The "psychotronic brainwashing." The "psychotronic communications." The "psychotronic control." The "psychotronic controllers." The "psychotronic counterattacks." The "psychotronic countermeasures." The "psychotronic cure." The "psychotronic cures." The "psychotronic delivery systems." The "psychotronic destruction." The "psychotronic detection." The "psychotronic detectors." The "psychotronic devices." The "psychotronic discoveries." The "psychic dowsing." The "psychotronic equipment." The "psychotronic entrainment." The "psychotronic experiments." The "psychotronic harassment." The "psychotronic hardware." The "psychotronic healing." The "psychotronic jamming issues." The "psychotronic jammers." The "psychotronic medical." The "psychotronic merchandise." The "psychotronic mind control attacks." The "psychotronic offers." The "psychotronic powers." The "psychotronic products." The "psychotronic radionics." The "psychotronic receptions." The "psychotronic remote control." The "psychotronic research." The "psychotronic researchers." The "psychotronic science projects." The "psychotronic services." The "psychotronic shielding issues." The "psychotronic signals. The "psychotronic subliminal mind control attacks." The "psychotronic survival." The "psychotronic survivalism." The "psychotronic systems." The "psychotronic therapies." The "psychotronic therapy." The "psychotronic torture weapons systems research." The "psychotronic transmissions." The "psychotronic treatments." The "psychotronic victim." The "psychotronic victims." The "psychotronic weapons systems research." The "psychotronic weapons technologies." The "psychotronic weaponry." The "pulse electrodes." The "pulsed brain stimulations." The "pulsed electromagnetic weapons." The "pulsed electronic attack techniques." The "pulsed microwave attacks." The "pulsed microwave radiation attacks." The "pulsed mind control techniques." The "pulsed stimulation of the brain."

Q-R: The "racial profiling brainwave analysis." The "racial profiling brainwave signatures." The "racial profiling brainwave technology." The "radar countermeasures." The "radionics devices." The "radionics equipment." The "radionics hardware." The "radionics technology." The "radionics rife devices." The "radionics therapy." The "radio surveillance." The "recording electrodes." The "regrowth stimulations." The "regrowth stimulators."

The "remote behavioral modification weapons." The "remote body control weapons." The "remote brain monitoring." The "remote brainwave entrainment weapons." The "remote brainwashing weapons." The "remote control attacks." The "remote control devices." The "remote control techniques." The "remote controllers." The "remote behavioral modification attacks." The "remote body control attacks." The "remote electronic attack weapons." The "remote brainwave entrainment attacks." The "remote brainwashing attacks." The "remote electronic attacks." The "remote mind control attacks." The "remote subliminal mind control attacks." The "remote behavioral modification devices." The "remote body control devices." The "remote brainwave entrainment devices." The "remote brainwashing devices." The "remote electronic attack devices." The "remote mind control devices." The "remote mind control weapons." The "remote neural devices." The "remote neural monitoring devices." The "remote neural monitoring technologies." The "remote neural monitoring weapons." The "RNM devices." The "RNM technologies." The "RNM weapons." The "remote sensing attacks." The "remote sensing detection." The "remote sensing detectors." The "remote sensing countermeasures." The "remote sensing devices." The "remote sensing equipment." The "remote sensing hardware." The "remote sensing systems." The "remote sensing tactics." The "remote sensing techniques." The "remote sensing technology." The "remote sensing weapons systems research." The "remote sensor systems." The "remote sensors." The "remote subliminal mind control devices." The "remote behavioral modification techniques." The "remote body control techniques." The "remote brainwave entrainment techniques." The "remote brainwashing techniques." The "remote electronic attack techniques." The "remote mind control techniques." The "remote subliminal mind control techniques." The "remote subliminal mind control weapons."

The "remote control behavioral modification attacks." The "remote control body control attacks." The "remote control brainwave entrainment attacks." The "remote control brainwashing attacks." The "remote control electronic attacks." The "remote control mind control attacks." The "remote control subliminal mind control attacks." The "remote control brain attacks." The "remote control behavioral modification devices." The "remote control body control devices." The "remote control brainwave entrainment devices." The "remote control brainwashing devices." The "remote control electronic attack devices." The "remote control mind control devices." The "remote control subliminal mind control devices." The "remote control brain attack devices." The "remote control brain devices." The "remote control behavioral modification techniques." The "remote control body control techniques." The "remote control brainwave entrainment techniques." The "remote control brainwashing techniques." The "remote control electronic attack techniques." The "remote control mind control techniques." The "remote control subliminal mind control techniques." The "remote control behavioral modification weapons." The "remote control body control weapons." The "remote control brainwave entrainment weapons." The "remote control brainwashing weapons." The "remote control electronic attack weapons." The "remote control mind control weapons." The "remote control subliminal mind control weapons." The "remote control brain attack weapons." The "remote control brain weapons." The "remote control viewing methods." The "remote control viewing technologies." The "remote influencing technologies."

The "radar torture weapons." The "radar weapons systems research." The "radar weapons technologies." The "radiation intelligence." The "radio frequency magnetic resonance imagery." The "radio frequency functional magnetic resonance imaging." The "remote functional magnetic resonance imagery." The "remote functional magnetic resonance imaging." The "remote magnetic resonance imagery." The "remote magnetic resonance imaging." The "remote MRI Black Projects." The "remote MRI electronic attacks." The "remote MRI methods." The "remote MRI mind control techniques." The "remote MRI research." The "remote MRI techniques." The "remote MRI technology." The "remote MRI weapons systems research." The "REM sleep stage." The "rapid eye movement sleep stage." The "repairing circuits." The "repairing devices." The "repairing equipment." The "repairing hardware." The "repairing products." The "repairing services." The "reprogram behavior." The "reprogramming behavior." The "research designs." The "research hardware." The "research inventions." The "research products." The "research science project." The "research services." The "reverse engineer." The "research aliens." The "research electronic attack." The "research electronic harassment." The "research electronic weapons." The "research fortean phenomena." The "research ghosts." The "research spirits." The "research brain harassment." The "research unknown entities." The "research unknown presences."The "reverse engineering." The "rf brain stimulations." The "rf stimulation of the brain." The "RFID attacks." The "RFID behavioral control devices."The "RFID behavioral modifications." The "RFID countermeasures." The "RFID detection." The "RFID control." The "RFID devices." The "RFID electronics devices." The "RFID embedded devices." The "RFID entrainment devices." The "RFID implant control." The "RFID implant programming." The "RFID implanted devices." The "RFID implants." The "RFID jammers." The "RFID jamming issues." The "RFID mind control devices." The "RFID programming." The "RFID proliferation." The "RFID shielding issues." The "RFID techniques." The "RFID technology." The "RFID technologies." The "RFID targeting." The "RFID tracking." The "RFID strategy." The "RFID strategies." The "rife devices." The "rife hardware." The "room bug transmitters." The "Russian controlled offensive behavior."

SA-SO: The "satellite electronic attacks." The "satellite mind control attacks." The "satellite subliminal mind control attacks." The "satellite tracking." The "scalar waves fear." The "science project." The "science projects." The "secret communications methods." The "secret communications technologies." The "secret electronic attack technologies." The "secret mind control technologies." The "secret society brain entrainment experiments." The "secret society conspiracies." The "secret society mind control experiments." The "secret society subliminal mind control experiments." The "secret societies." The "secret technologies." The "secrets of body control attacks." The "secrets of brain entrainment." The "secrets of brainwave entrainment." The "secrets of brainwashing." The "secrets of directed energy weapons." The "secrets of electronic attack." The "secrets of electronic harassment." The "secrets of mind control attacks." The "secrets of subliminal mind control attacks." The "self-healing." The "self-healing devices." The "self-healing equipment." The "self-healing hardware." The "self-healing merchandise." The "self-healing offers." The "self-healing products." The "Semantic Stimuli Response Measurements Technology." The "sensory centers of the brain." The "severe altered states."

The "shield against electronic attacks." The "shield against electronic brain." The "shield against electronic entrainment." The "shield against electronic harassment." The "shield against electronic implant control." The "shield against electronic implant programming." The "shield against electronic implants." The "shield against electronic mind control attacks." The "shield against electronic spying." The "shield against electronic subliminal mind control attacks." The "shield against electronic surveillance." The "shield against electronic torture." The "shield against electronic weapons." The "shield against mind control attacks." The "shield against subliminal mind control attacks." The "shield against brain attacks." The "shield against brain entrainment." The "shield against brainwave entrainment." The "shield against brain harassment." The "shield against brain attacks." The "shield against brainwave spying." The "shield against subliminal mind control attacks." The "shield against brainwave surveillance." The "shield against brain torture." The "shield against brain weapons." The "Silent Sound Spread Spectrum programs (SSSS programs)." The "Silent Sound Spread Spectrum systems (SSSS systems)." The "Silent Sound Spread Spectrum technologies (SSSS technologies)." The "Silent Subliminal Presentation System technology." The "signal jamming issues." The "signal jamming devices." The "signal jamming hardware." The "signal shielding issues." The "signals intelligence." The "sixth sense." The "skin lesions caused by electronic attacks." The "skin rashes caused by electronic attacks." The "sleep inducer." The "Solfeggio Frequencies." The "Solfeggio Scale." The "sonic torture weapons." The "sonic weapons systems research." The "sonic weapons technologies." The "Super Soft-Pinch Electrodes." The "sounds from the walls." The "Soviet controlled offensive behavior." The "Soviet KGB electronic attack programs." The "Soviet KGB electronic attack technologies." The "Soviet KGB mind control programs." The "Soviet KGB mind control technologies." The "Soviet KGB Psychotronic Influence System program (PIS program)."

SP: The "deep space aliens." The "deep space alien abductions." The "deep space alien attacks." The "deep space alien blasters." The "deep space alien busters." The "deep space alien electronic attacks." The "deep space alien electronic implants." The "deep space alien implants." The "deep space alien mind control powers." The "deep space alien weapons systems research." The "deep space alien weapons." The "deep space aliens." The "special orders." The "special order consulting." The "special order devices." The "special order equipment." The "special order hardware." The "special order merchandise." The "special order offers." The "special order products." The "special order product offers." The "special order services." The "special project." The "special project consulting." The "special project devices." The "special project equipment." The "special project hardware." The "special project merchandise." The "special project offers." The "special project products." The "special project product offers." The "special project services." The "special projects." The "special projects consulting." The "special projects devices." The "special projects equipment." The "special projects hardware." The "special projects merchandise." The "special projects offers." The "special projects products." The "special projects product offers." The "special projects services."The "specialized consulting." The "specialized devices." The "specialized equipment." The "specialized hardware." The "specialized merchandise." The "specialized offers." The "spirit world."

SQ-ST: The "Squad programs (S-Quad programs)." The "Squad systems (S-Quad systems)." The "Squad technologies (S-Quad technologies)." The "SSRM Tek." The "Stage 1 sleep." The "Stage 2 sleep." The "Stage 3 sleep." The "Stage 4 sleep." The "stealth paint." The "stealth paint mixture." The "stealth techniques." The "stealth technology." The "stim electrodes." The "stimulating electrodes." The "stimulations of the brain." The "stimulator electrodes." The "StingRay devices." The "StingRay technology."

The "stop aliens." The "stop brain entrainment attacks." The "stop brainwashing attacks." The "stop electronic attacks." The "stop electronic brain entrainment attacks." The "stop electronic entrainment attacks." The "stop electronic harassment." The "stop electronic implant control." The "stop electronic implant programming." The "stop electronic implants." The "stop electronic mind control attacks." The "stop electronic spying." The "stop electronic subliminal mind control attacks." The "stop electronic surveillance." The "stop electronic torture." The "stop ghosts." The "stop implant control." The "stop implant programming." The "stop implants." The "stop lightning attacks." The "stop mind control attacks." The "stop pain field generator attacks." The "stop subliminal mind control attacks." The "stop brain attacks." The "stop brain entrainment attacks." The "stop brainwave entrainment attacks." The "stop brain harassment." The "stop brain control attacks." The "stop brain spying." The "stop brainwave spying." The "stop brainwave signature spying." The "stop brain subliminal mind control attacks." The "stop brain surveillance." The "stop brainwave surveillance." The "stop brainwave signature surveillance." The "stop brain torture." The "stop unknown entities." The "stop unknown presences." The "strange phenomena." The "strange sights." The "strange voices."

SU-SZ: The "subliminal ads." The "subliminal advertisements." The "subliminal advertising." The "subliminal advertising." The "subliminal brain entrainment experiments." The "subliminal brainwashing devices." The "subliminal brainwashing experiments." The "subliminal control of the mind experiments." The "subliminal effects." The "subliminal images." The "subliminal learning." The "subliminal messages." The "subliminal messaging." The "subliminal mind control attacks." The "subliminal mind control conspiracies." The "subliminal mind control conspiracies." The "subliminal mind control countermeasures." The "subliminal mind control devices." The "subliminal mind control experiments." The "subliminal mind control methods." The "subliminal mind control powers." The "subliminal mind control protection." The "subliminal mind control secrets." The "subliminal mind control slaves." The "subliminal mind control stories." The "subliminal mind control strategies." The "subliminal mind control systems." The "subliminal mind control tactics." The "subliminal mind control techniques." The "subliminal mind control technologies." The "subliminal mind control torture." The "subliminal mind control tutorial." The "subliminal mind control victims." The "subliminal mind control weapons." The "subliminal mind control zombies." The "subliminal mind readers." The "subliminal mind reading methods." The "subliminal mind reading techniques." The "subliminal mind reading technologies." The "subliminal mixers." The "subliminal perceptions." The "subliminal persuasion." The "subliminal programming." The "subliminal stimuli." The "supernatural phenomena." The "supernatural phenomenon." The "surface electrodes." The "surveillance camera designs." The "surveillance camera technology." The "surveillance cameras." The "surveillance devices." The "surveillance hardware." The "surveillance metal detectors." The "surveillance technology." The "surveillance transmitters."

T: The "Targeted Individuals support groups." The "Targeted Individuals under attack." The "Targeted Individuals under electronic attack." The "Targeted Individuals under mind control attacks." The "targets of government electronic attacks." The "targets of government electronic mind control attacks." The "targets of government mind control attacks." The "technical coaching." The "technical coaching services." The "technical consulting." The "technical life coaching." The "technical surveillance counter measures technology."

The "telecoils and magnetic induction loop systems for hearing aids." The "telecoils and magnetic loop systems for hearing aids." The "telepathic amplifiers." The "telepathic attack." The "telepathic brain entrainment." The "telepathic body control attacks." The "telepathic communications." The "telepathic control." The "telepathic countermeasures." The "telepathic detection." The "telepathic devices." The "telepathic eavesdropping." The "telepathic equipment." The "telepathic hardware." The "telepathic harassment." The "telepathic identification." The "telepathic interference." The "telepathic location finding." The "telepathic mind control attacks." The "telepathic mind reading attacks." The "telepathic powers." The "telepathic security." The "telepathic services." The "telepathic spying." The "telepathic subliminal mind control attacks." The "telepathic surveillance." The "telepathic technology." The "telepathic theories." The "telepathic tracking." The "telepathic weapons."

The "Tempest brain monitoring." The "Tempest monitoring of the brain." The "terroristic electronic attacks." The "terroristic electronic mind control attacks." The "terroristic mind control attacks." The "test circuits." The "test devices." The "test equipment." The "test hardware." The "test instruments." The "test products." The "test services." The "testing services." The "therapeutic devices." The "therapeutic electromagnetism." The "therapeutic electronics." The "therapeutic lights." The "therapeutic magnetism." The "therapeutic pulses." The "therapeutic pulse trains." The "therapeutic signals." The "therapeutic waveforms." The "thermal imaging." The "theta brain waves." The "theta brain wave control." The "theta brainwaves." The "theta brainwave control." The "theta brainwave monitoring." The "theta brainwave signals." The "theta frequencies." The "theta waves." The "thought center." The "thought control attacks." The "thought control electronics." The "thought control methods." The "thought control mind control methods." The "thought control technologies." The "thought control research." The "thought control science." The "thought control systems." The "thought control tactics." The "thought control techniques." The "thought control technology." The "thought reading mind control attacks." The "tin foil hat shielding." The "tinfoil hat shielding." The "TDCS stimulation technology." The "TMS stimulation technology." The "trance-formation devices." The "trance-formation techniques." The "transcranial electromagnetic evoked potentials." The "transcranial electromagnetic stimulation responses." The "transcranial electronic evoked potentials." The "transcranial electronic stimulation responses." The "transcranial magnetic evoked potentials." The "transcranial magnetic stimulation devices." The "transcranial magnetic stimulation technology." The "transcranial magnetic stimulation responses." The "transcranial direct current stimulation technology." The "transcranial electromagnetic stimulators." The "transcranial electronic stimulators." The "transcranial magnetic stimulators." The "transcutaneous electrical nerve stimulation responses." The "transcutaneous electrical nerve stimulators."

The "triangulate aliens." The "triangulate electronic attacks." The "triangulate electronic harassment." The "triangulate electronic mind control attacks." The "triangulate electronic spying." The "triangulate electronic subliminal mind control attacks." The "triangulate electronic surveillance." The "triangulate ghosts." The "triangulate lightning strikes." The "triangulate mind control attacks." The "triangulate subliminal mind control attacks." The "triangulate pain field generator attacks." The "triangulate unknown entities." The "triangulate unknown presences."

The "troubleshoot circuits." The "troubleshoot devices." The "troubleshoot equipment." The "troubleshoot hardware." The "troubleshoot instruments." The "troubleshoot products." The "troubleshoot services." The "troubleshooting services." The "true happiness." The "tscm experts." The "tscm methods." The "tscm systems." The "tscm technology." The "tscm testing." The "twilight zone."

U: The "UFO abductions." The "UFO contacts." The "UFO Magazine." The "UFO visits." The "ultimate weapons."

The "ultraviolet therapy." The "under attack." The "unknown entity detection." The "unknown entity detecting." The "unknown entity detectors." The "unknown presence detection." The "unknown presence detecting." The "unknown presence detectors." The "upgrading circuits." The "upgrading devices." The "upgrading equipment." The "upgrading hardware." The "upgrading products." The "upgrading services." The "urgently needed." The "USSR controlled offensive behavior."

V-Z: The "V2K attacks." The "V2K electronic attacks." The "V2K harassment." The "V2K mind control attacks." The "V2K technology." The "vehicle tracking transmitters." The "Velostat materials." The "victim of electronic attack." The "victim of mind control attacks." The "victim of subliminal mind control attacks." The "victims of mind control attacks." The "victims of mind control support groups." The "victims of subliminal mind control attacks." The "virtual reality devices." The "virtual reality using artificial intelligence." The "visual cortex." The "visual hallucinations caused by electronic attacks." The "visual hallucinations caused by mind control attacks." The "voice-of-Allah mind control technology." The "voice-of-Allah weapons." The "voice-of-Allah weapon systems technology." The "voice-of-God mind control technology." The "voice-of-God weapons." The "voice-of-God weapon systems technology." The "voice to skull attacks." The "voice to skull electronic attacks." The "voice to skull harassment." The "voice to skull mind control attacks." The "voice to skull technology." The "voices from the walls." The "voices in the head." The "voices in your head." The "voices ordering you what to do." The "voices telling you what to do." The "weird phenomena." The "weird sights." The "weird sounds." The "weird voices." The "world is in a heightened state of paranoia." The "zero-evidence attacks." The "zero-evidence weapons." The "zero-evidence weaponry."

This webpage is filled with mind control information and electronic attack information relevant to mind control strategies, electronic attack strategies, mind control tactics, electronic attack tactics, mind control techniques, electronic attack techniques, mind control weapons, electronic attack weapons, mind control countermeasures, electronic attack countermeasures, and mind control detectors and electronic attack detectors.

Great LONE STAR CONSULTING, INC. Products and Services!
Copyright © 2001-2024, LONE STAR CONSULTING, INC. Absolutely all Rights Reserved


       IMAGE SPONSORED BY:
 Consumertronics
 Lone Star Consulting, Inc.
 ABQ-Techzonics
       REPRINT POW-MIA IMAGE=>
                ON YOUR WEBSITE

NOTE 1: We make no medical, legal, scientific, engineering, supernatural or paranormal claims including but not limited to claims about the existence, extent, intentions, purposes and capabilities of space aliens, ghosts, spirits, psychic powers, psionics, mental telepathy, precognition, auras, clairvoyance, remote viewing and pschokinesis - all related CD projects we do are based on our proprietary theories SHOULD they actually exist AND if the customer does not clearly specify in his/her CDAF another theory he/she wants the CD device design to be based upon.

NOTE 2: By policy, we never recommend for or against, approve or disapprove, sponsor, endorse, support, guarantee, or take any responsibility for any of the content of any non-Lone Star Consulting, Inc. webpage, website, advertisement, publication or other statement EVEN IF WE HAVE PROVIDED A HOTLINK TO IT. And by policy, we never recommend for or against, approve or disapprove, sponsor, endorse, support, guarantee, or take any responsibility for any company, person, product or service EVEN IF WE HAVE PROVIDED A HOTLINK TO IT. For more information on our policies, please refer to our policies.htm webpage.
Webmaster's Test Links only - not for visitor use: Source-A Source-D Source-E Source-F Source-G Source-H Source-I Source-J Source-K Source-L Source-M Source-N Source-P Source-Q Source-R