Strahlenfolter Stalking - TI - Mind Control - Mindcontrol Devices - Lonestarconsultinginc.com

download Strahlenfolter Stalking - TI - Mind Control - Mindcontrol Devices - Lonestarconsultinginc.com

of 22

Transcript of Strahlenfolter Stalking - TI - Mind Control - Mindcontrol Devices - Lonestarconsultinginc.com

  • Mind Control Attacks (MC), Neurological Weapons Attacks, Electronic Attacks, Electronic Harassment(EH), Electronic Implants (EI) and Brain State Control / Brain State Monitoring, Brain Entrainment,

    Brainwashing, Brainwave Signatures, Mind Reading, Remote Neural Monitoring (RNM), Mind Probes,Behavioral Modification, Body Control, Brain Stimulation, Subliminal Mind Control Programming

    Technologies, Directed Energy Weapons Technologies, Microwave Attacks, Microwave Harassment,Circular Polarized Light Attacks, Carrier Current Attacks, Ultrasonic Attacks, Infrasonic Attacks,

    Fluorescent Lighting Attacks, Binaural Beats, Voice-to-Skull Technology (V2K, V2S), ELF Attacks, RemoteInfluencing, Implanted False Memories, Implanted Thoughts, Manchurian Candidates, Electronic Gang

    Stalking, Manifestations, Electronic Countermeasures Customized Device Types!

    LONE STAR CONSULTING, INC.of EL PASO, TEXAS

    =>Customized Devices Application Form (CDAF)All Customized Device (CD) Types (framed page) - All CD Types (unframed

    page) Mind Control, Electronic Attack, Unusual, Strange CD Types (this webpage)

    These 2014 Catalog Webpages Now on CDROM or Disk (only $15)Lone Star Consulting, Inc., 7250 N. Mesa, Suite C, PMB 70, El Paso, TX 79912

    VOICE (9-5 MST): [915 - 474 - 0334]Check, Money Order, Money Transfer Service (MTS), Trade

    or PayPal ([email protected])

    Contact Us

    tekmastersitemap -policies

    USA Site - No cookies - No adware - No spyware - No trojans - No viruses - No worms - No spam- No popups

    We Respect Your Privacy - We do NOT Monitor nor Track Your Activities Online, nor Share YourData

    BUYING FROM US IS SIMPLE: (1) Select the Unique Customized Device(s) You Want on This or AnyOther Page, (2) Click on the green CDAF Link above, (3) Print and Complete the CDAF Form (one CDAF foreach Device), (4) Mail or Email as a PDF File to Us Your CDAF(s). We Respond to You Within 3 Days AboutYour Proposed CD Project.

    High-Tech Mind Control Attacks, ElectronicAttacks, Countermeasures Customized Device

    TypesMind Control (Mindcon, MC), Neurological Weapons, SubliminalMind Control, Body Control (Bodycon), Behavior Modification,

    Brain Entrainment, Brainwashing, Brainwave Signatures, RemoteNeural Monitoring (RNM), Mind Reading (Mindread), Mind Probing,Remote Influencing, Voice-to-Skull Technology (V2K, V2S), ELF

    Attacks, Electronic Attacks, Electronic Harassment (EH), DirectedEnergy Weapons Systems, Electronic Implants (EI) and Brain

    State Control / Brain State Monitoring, Microwave Attacks,Microwave Harassment, Circular Polarized Light Attacks, Binaural

    Beats, Carrier Current Attacks, Ultrasonic Attacks, InfrasonicAttacks, Fluorescent Lighting Attacks, Brain Stimulations,

    Implanted Thoughts, Implanted False Memories, ManchurianCandidates, Electronic Gang Stalking, Manifestations, Electronic

    Countermeasures Products and Services.

    Unique, Original, Made-to-Order, Special Needs, Unusual, Strange,Weird Customized Device Types We Can Do For YOU! Backed by

    25+ years of Professional Design Experience!

    ... and tell yourfriends!

    AARON ALEXIS: Evidence of Mind Control, and Why MindControl and Electronic Attack Countermeasures are Critical

    BASED ON THE OPINIONS OF LONE STAR CONSULTING, INC.: Aaron Alexis was the Sept. 16, 2013,attacker in the Washington Navy Yard mass shootings. Earlier, Aaron Alexis had reported that three menhad followed him from the airport, who were projecting thoughts into his mind and keeping him sleep-

    deprived using a "microwave machine." Also, Aaron Alexis claimed that the Government was attackinghim with ELF signals (Extremely Low Frequency signals). Sound familiar? News reports during the shooting

    spree claimed that there were three shooters, but later said that Aaron Alexis was the only shooter.Earlier, Aaron Alexis visited two VA medical centers for mental therapy. We believe that Aaron Alexis

    was a VA Manchurian Candidate - a disgruntled loner Veteran targeted, programmed and triggered usingEMF mind control technology to do what he did. The three men who followed him were his handlers -programmers and "Queen of Diamonds" "trigger" men - John Doe #1, John Doe #2 and John Doe #3

    (supervisor of Doe #1 and #2) - typical set-up. And that the three originally suspected shooters were AaronAlexis, John Doe #1 and John Doe #2. Why the reported number of shooters changed to one shooter wasbecause while John Doe #1 and #2 were acting suspiciously (staying close enough to Aaron Alexis to controland monitor him), they never fired shots or acted threatenly themselves, so were later discounted. For

    decades now we have asserted that Manchurian Candidates are being trained in the U.S., and that the VAis complicit going back to the days where the VA used electroconvulsive "therapy" and lobotamies onVeterans. This was not the first horribly violent act in which John Does were implicated - recall Sirhan

    Sirhan, Timothy McVeigh, other cases. The moral here is that if you are a Targeted Individual (TI) of mindcontrol and electronic attacks - even if not a Veteran - you better take serious steps to ferret out theattacks and to countermeasure them - else you risk possibly becoming the next Aaron Alexis! Mind

    control and electronic attacks are usually extremely dangerous - even deadly. Our goal is to help TIs. Letus help you.

    The Government Never Stops Doing Mind Control and

    Search this Webpage (again)

    (most browsers; not case-sensitive; partial textOK)

    Lone Star Consulting, Inc. Devices:Subliminal,Mind Control,Electronic Attack,Entrainment,Behavior Mod 12.05.2014

    http://www.lonestarconsultinginc.com/mindcontrol-devices.htm 1 / 22

  • Electronic Attacks on TIsMany people wishfully believe that because our Government is stressed, or on sequester, or shut downwith only essential personnel working, it cuts back on its mind control and electronic attack programs.

    Mind control and electronic attacks come from governments (ours and many others), corporations,criminal and terrorist organizations, and technically-adept individuals for many reasons. Our Governmentnever shuts down, or even scales back, its mind control and electronic attack research and testing. Some

    say it even steps them up to better monitor and control people during bad times. Of course, whenGovernment is viewed as weakened, all the other perps know they can more freely operate against

    Americans because law enforcement intended to detect non-Government perps is also weakened. Neverforget that where government protection ends, YOU must do the rest to protect yourself.

    Our Mind Control and Electronic Attack CountermeasureDevices Now Come With Advanced Transient Suppression!

    Many people these days, especially Online, claim to sell mind control and electronic attackcountermeasures and detection devices. Clearly none of whom can match the relevant highly-

    specialized knowledge, experience, equipment, parts, specialized materials, tools and facilities of LoneStar Consulting, Inc. to actually be able to help mind control and electronic attack victims, and most of

    whom are clearly outright frauds. Further, we are the only ones we know of who now provide AdvancedTransient Suppression Technology (ATST) in our mind control and electronic attack countermeasure

    devices. All electronic devices can be damaged or destroyed by common high-voltage transients fromlightning and defective high-voltage equipment and power lines, electrical arcs and coronas, inductive

    kicks from high-voltage power interruptions, and static electric discharges. Also, based on what weknow, mind control and electronic attack predators are increasingly resorting to directional high-pulse

    burst transmitters (pulse-type directed energy transmitters), possibly even EMP, to wipeout costlycountermeasure devices deployed by mind control and electronic attack victims to protect themselves.

    Our unique countermeasure devices now come with 1,500 watts of ATST protection (at no extra cost) to foileven the most highly dedicated wipeout attack tactics, as well as to help protect you from the common

    forms of high-voltage transients.

    We Are Becoming Super Busy - Please Send Us Your CDAF Today!Due to an apparent serious upsurge of mind control and electronic attacks and more people learning about us, we are

    becoming loaded up with new projects. Please do not delay with your project(s). Upon deciding what you want us to dofor you, please click on green CDAF link at top of page and send us your CDAF(s). Note: Mostly due to ever-increasing

    parts costs and decreasing availabilities, we expect to raise our prices on some of our device-types in the coming weeksand months. Also, we may have to discontinue some device-types - later availabilities not guaranteed. Please send us

    your CD Project CDAF (green link at top of our webpages) today.

    We Are Now on Social Media - Please Join With Us!FACEBOOK and LINKEDIN

    JOIN US ON FACEBOOK AS OUR SOCIAL MEDIA FRIEND AND/OR ON LINKEDIN AS OUR SOCIAL MEDIA CONNECTION!As you likely know, we recently joined FACEBOOK and LINKEDIN social media. To join us, you must first email us

    directly to LONE STAR CONSULTING, INC., and explain to us why you want to be social media-connected to us. NOTE:We never accept such requests when they solely come through our social media sites - we regularly receive 100s of such

    requests mostly from totally unknown people. We are very selective - your acceptance is much increased if you are aprior or current Client, or a relevant serious researcher, expert, scientist or engineer. We are constantly engaged in much

    exciting work that we would like to share with our social media friends and connections. Most of our discussions onFacebook and LinkedIn will relate to mind control, electronic attack, radionics, physical survival and energy through

    increasingly worsening times. One big benefit is that LONE STAR CONSULTING, INC. will provide free information foundnowhere else (e.g. research results), which may be very helpful to you. Another big benefit is that you will be able to shareyour experiences and needs with others who may be or were in similar situations (e.g. you are experiencing certain types

    of mind control attacks, which may also be afflicting others in your area). We do not accept just anyone as our socialmedia friend or connection - we seek a smaller but more focused and intense group. Interested in us friending you? Thenemail us here, and in your Subject Line, put: "Please Friend Me". In your email body, please explain in 100-500 words thebenefits to both of us in becoming social media friends (Facebook) or social media connections (LinkedIn). Then tell yourfriends and connections about us! NOTE: With few exceptions, we are not going to post up our friends on Facebook andconnections on LinkedIn until we have selected at least 500 Facebook friends or LinkedIn connections. We are not yet on

    Twitter or MySpace. - Thanks. John J. Williams, M.S.E.E.

    Short of money? We do encourage mutually-beneficial trades that can save YOU a lot of money (e.g.electronic parts & test equipment, computer & modern computers, etc.) ==>

    Hello! We support many technologies. For introduction into how to obtain hardware and our designphilosophy, please go to our Home Page: Home. Hotlinks to all of our Device Types: Devices.

    Hotlinks to all of our high-tech Topics, Titles: Site Map. When you are done, please use your Browser'sBack Button to return here.

    Lone Star Consulting, Inc. Devices:Subliminal,Mind Control,Electronic Attack,Entrainment,Behavior Mod 12.05.2014

    http://www.lonestarconsultinginc.com/mindcontrol-devices.htm 2 / 22

  • Can you spot electronic implants, and the wire?This is the actual CT-Scan of the chin, neck and upper back area of one Gary D. Simmons of Australia, aformer Navy diver who had been assigned to several clandestine operations, reprinted with permissionfrom Simmons and Consumertronics.net. According to Mr. Simmons, one 'object' is in the spine at the

    jaw level; the hole in the back of the neck shows a 'wire' running down towards a second 'object' locatedbetween the trachea and the spine; there is yet a third 'object' below the jaw. I see other strange

    'objects.' Do you? Furthermore, he states these were the results of a surgical operation and an officialprogram in which he and about 100 other elite Navy divers were subjected to as part of, 'medical and

    mind drug experiments,' which he claims caused many premature deaths among them!For more info on this image and amazing story => www.harold-holt.net (click on Page 2 hotlink on its bottom), then return HERE!.

    DO NOT LET THIS KIND OF TRAVESTY HAPPEN TO YOU!Recently, Lone Star Consulting, Inc. has received frantic calls involving great fears and concerns aboutan apparent recent alarming, shocking and frightening upsurge in mind control (mindcon), body control(bodycon) and other electronic attack and electronic harassment incidents (often also referred to as "directedenergy weapons attacks" or "psionic attacks"). Clearly, these forms of electronic harassmentattacks greatly increased since 9/11, and especially recently due to economicchaos. With chaos, electronic attacks are more likely ignored by the authorities,and victims become more hassled with other issues and more cautious aboutspending money even to protect themselves. Clearly, some electronic attackersare now electronically attacking their victims with impunity - more openelectronic harassment attacks, accelerated electronic attacks, and more severeelectronic attacks than ever before! Are you such a victim? It is more important than everbefore for YOU to address these issues NOW! Lone Star Consulting, Inc. provides as a free public serviceby providing the free mind control / electronic attack tutorial, link below (as well as many very exciting andunique related device types described below) for those interested in electronic mind control (including RFID),electronic attacks, direct energy attacks, electronic harassment, brainwashing, brain entrainment (e.g.binaural beats), brain signatures, mind reading, voices in the head (e.g. voice-to-skull or V2K/V2S technology(Frey Effect / microwave hearing effect), and voice-of-God technology), Tempest brain monitoring, electronic bodycontrol, electronic implants and brain state control / brain state monitoring, Manchurian Candidates, andsimilar technologies and their countermeasures.

    Microwaves, and ultrasonic sounds and infrasonic sounds require the specialized device-types weprovide (described below) to detect and countermeasure them because they can't be sensed by normalhuman senses and their directions (many are highly directional), bandwidths and ON times must be firstdetermined before they can be documented or countermeasured (note that infrasonic sounds appear to beomnidirectional, thus location-finding can be very difficult, and infrasounds are thus also very hard to countermeasure,especially if source is distant). You may need to prove the existence and specific timing and location of themind control and electronic attacks (within the applicable statutes of limitation), and then correlate yourmanifestations with these attacks against you. Even then, to obtain substantial results you would have toshow that you mitigated the mind control and electronic attacks to minimize your injuries, such as byjamming it (which requires specialized electronic attack and mind control countermeasures equipment of the types wealso provide), and/or shielding against it. And if you do all of this yourself as soon as you can, you stand amuch better chance of getting law enforcement to take a serious look at your case as well. In virtually allcases, YOU, AND YOU ALONE, must obtain justice in these types of cases (see our Mind Control webpage forspecialized equipment). You might fairly ask, "How can I document mind control and electronic attacks usingyour specialized equipment?" Permanent directional-recording and time-stamped recording circuitry arevery expensive because they add complications to any device made by anyone. However, there is acheap, easy and very credible way to do this. Use a video camera and make a videotape or video disk ofyour experiences, which will document your equipment set-ups, and its responses. Most moderncellphones have videotaping capabilities. Leave a visible TV ON in the background and an accurate clockso that you can also time- and date-stamp your videos. And/or have a reliable and credible witness(es)with you.

    NOTE: Some believe that claims of mind control are false. Consider: Recently, MIT developed thetechnology of remotely and electronically implanting fake memories (implanted false memories) and

    implanting thoughts into brains. And this is just the mind control research allowed to be published! Formuch more, click on our "Free Mind Control and Electronic Attack Tutorial" link below. Ithas much more real and helpful mind control and electronic attack information than any other website we

    know of. The mind control and electronic attack books and manuals of Consumertronics(www.consumertronics.net/mindcontrol.htm) also contain important mind control and electronic attack

    information, including many circuit diagrams and other figures not found in our Free Tutorial.

    Lone Star Consulting, Inc. Devices:Subliminal,Mind Control,Electronic Attack,Entrainment,Behavior Mod 12.05.2014

    http://www.lonestarconsultinginc.com/mindcontrol-devices.htm 3 / 22

  • Lone Star Consulting, Inc. Free Mind Control / Electronic Attack Tutorial(If you go to read Free Mind Control Tutorial, when done, hit Browser's Back Button to return here)

    Dedicated to Defeating Mind Control Tactics / Mind Control Strategies and Electronic Attack Tactics /Electronic Attack Strategies of all Types

    DISCLAIMER: OUR MEDICAL POLICIES REGARDING ALL OF OUR OFFERS FOUND EVERYWHERE: Whilewe do recognize as a simple fact of life that once a buyer buys any device from a seller, the seller has nocontrol over what the buyer may actually use the device for nor does the seller assume any responsibilityto anyone if the device is misused or abused, and that people have the right to choose whatever form ofmedical care they prefer, we are not licensed to practice medicine, and therefore we cannot and do notprovide any medical advice, medical opinion, make medical claims or scientific claims, nor tell you whatthe causes are for any medical-like manifestation; nor anything we may provide you is to be used for amedical prevention, diagnostic, treatment, cure or medically-assistive reason; nor to in any manner stop,interfere with, change or replace any medical procedure or drug prescribed or likely to be prescribed foryou by any trusted licensed medical entity. All medically-related statements which may be made by us arelay, anecdotal and personal opinion type statements only. If you are suffering from medical-typemanifestations, we always recommend that you first obtain a complete medical exam from trusted medicalprofessionals (at your expense) to eliminate all medically-caused manifestations. Furthermore, we cannotproduce a device which is intended or likely to be used as a weapon, to retaliate against anyone or whichinflicts injury, pain or suffering to any person or animal, or which is otherwise illegal, unethical or immoral.So please do not try to contract us for any device to treat, cure, diagnose, prevent or assist a medicalcondition, is likely to harm any person, animal, or property of others, or likely to be illegal, unethical orimmoral.

    HOW TO PICK THE RIGHT DEVICE TYPE FOR YOU: If not a medical condition, yourmanifestations may be caused by several different electronic attack / mind control scenarios. You mustanalyze your situation, by asking yourself and answering these questions: (1) When do thesemanifestations occur? (2) Where do they occur? (3) Do the manifestations follow you all over? (4) Dothey occur all together, or do you get one or some sometimes and another or others other times? (5) Isthere anything you are doing which changes their intensity and/or frequency either up or down? (6) Whatis your body position when they occur? (7) What activities are you engaged in at the time? (8) Do youhave any idea where the offending transmitter may be located and/or who operates it? (9) If you place aheavy wool blanket or sweater over your head, do they still occur? (10) If you place a large and deepsteel pot over your head, do they still occur? (11) Have you observed any unusual or strange behavior bythose suspected? (12) Is their behavior a predictor of a current, past or an upcoming attack? (13) Is yourbehavior a predictor of a current, past or an upcoming attack? (14) Is there anyone else around you or ina similar situation who you know of also experiencing similar manifestations? (15) Do other people, petsor other animals around you act differently just before or while you are experiencing yourmanifestations? (16) Are you receiving electrical shocks when you touch metal surfaces or run water?(17) What have the police, FBI, FCC, your doctor, etc. tell you about your manifestations? Please notethat as policy we cannot recommend any device type as a device type which will stop yourmanifestations - this decision is left totally up to you. While we do guarantee that any device we provideyou will electronically function as specified, since we have no way of being able to ascertain yoursituation ourselves, we cannot guarantee that the device will lessen or stop your manifestations.

    Short on Money to Get What YOU MUST HAVE?Hard Economic Times makes it difficult for many good people to defend

    themselves against all kinds of dangers, including Mind Control Attacks andElectronic Harassment. WE CAN HELP YOU!

    All of our devices are unique and professionally handmade in the USA. That is why they cost more than the mass-produced foreign-made electronic devices common to discount stores. Our resulting higher prices means that manygood people may find our CD projects hard to afford. To make it much easier for stretched people to obtain ourunique Customized Devices, we now offer our special Lay-Away and Barter and Collateral Plans (use them individuallyor in conjunction with each other) as added means to obtain our products and services. For more details, click on: OurEasy Payment Plans, then click on your browser's backbutton to return here.

    Introduction to this PageCustomized Devices Application Form (CDAF) Webpage

    MIND CONTROL, ELECTRONIC HARASSMENTELECTRONIC ATTACK DETECTION, COUNTERMEASURES:

    (For our device types related to many other ultrasonic and infrasonic uses from pest control to commo => audio.htm)We make no device intended for medical use and we make no medical, supernatural, paranormal or psychic claims (details

    below)

    The ULTIMO EMF & ULTRASONIC HEAD SHIELD PROTECTOR: Ferromagnetic headshields (brain shields) are the best and most cost effective methods to protect the human brain from being read andtampered with using electromagnetic fields or ultrasonics. This (UEMF&UHSP) is our most advanced and improvedversion of our popular head shield / brain shield. The UEMF&UHSP is head shielding (brain shielding) whichprotects the head and brain of the protected Targeted Individual from virtually all of the exposure he/sheexperiences from EMFs (Electrical Fields and Magnetic Fields) and ultrasonic attacks to the brain (those which maycause remote mind control / thought control, behavior control, thought monitoring, voice-to-skull (V2K, V2S), mindreading, remote neural monitoring (RNM), forced "voice of God" hallucinations, mind games, disorientation, painmanipulation, etc.), brain scans, brain tracking and brainwave signature readings. And if you are afflicted by a headimplant(s), it also protects against the electronic implant(s) from communicating with outside devices using radiofrequencies (e.g. microwaves, RF) and ultrasounds. Caution: You cannot adequately shield your head by wearing a head covering with aluminum foil becauseyour face is still exposed, and aluminum foil does not shield against dangerous magnetic fields. In fact, such acartoonish aluminum foil cap / aluminum foil beanie much worsens frontal attacks because the offensive signalspass through your brain from your face to the back of the skull, and then reflect off of the metallized cap/beanie topass through your skull and brain again from back to front in a much more focused form because the roundedshape of the metallized cap/beanie is very similar to that of a parabolic dish and thus will likely focus electric fieldsand ultrasounds in or near the brain's frontal lobe, the cognitive center of the brain. Here is how this UEMF&UHSP CD project works: (1) Send us your CDAF (green link at top of page). (2) Whenwe respond with time and cost estimates and you agree to these estimates, obtain* a padded motorcycle helmet,

    Lone Star Consulting, Inc. Devices:Subliminal,Mind Control,Electronic Attack,Entrainment,Behavior Mod 12.05.2014

    http://www.lonestarconsultinginc.com/mindcontrol-devices.htm 4 / 22

  • football helmet, aviator helmet or similar of your choice which best fits your head well and comfortably and that youlike (at your expense; some bike helmets may not work well) for your helmet head shield / brain shield (helmet should be newor in excellent used condition). If you intend to sleep with the helmet On (many reports of TIs being electronically attackedduring sleep), obtain a helmet also safe and comfortable for you to sleep in. (3) Ship to us* (at your expense) yourchosen helmet. (4) We will then custom-modify it here with both EMF and ultrasonic shielding. (5) Upon successfulcompletion, we will then return your customized helmet shield protector to you. *NOTE: We can also buy the helmetfor you - especially nice if you live overseas, to avoid delays and large extra S/H. Just provide us the make, model,size, style and color of the helmet (and helmet seller URL if you can) you want in your CD Application Form (CDAF). To shield the front of your helmet to protect your head from frontal attacks, we place a metal screen in thenormally open helmet visor area (screening is used so that you can breathe and see; the helmet's visor should be removable).This screening material will to some degree limit visibility (like looking through a window screen ). Therefore, we do notrecommend that you wear the helmet when driving, operating equipment or doing anything else that requiresoptimum vision or balance (however, if you do fall or bump into things with the helmet On, it should at least provide your headconsiderable protection from injury). Also, we do not recommend that you stand or walk with the helmet On during timesyou may be unsteady on your feet. Do not wear this shielded helmet protector without an assistant standing by ifyou have or develop a breathing disorder or panic attack disorder which the helmet may aggravate during use. Lastmade $1295 [3 lb (depends on helmet you select)].

    The ULTIMO MINI HEAD SHIELD CAP: The UMHSC is a smaller, lighter and less conspicuousversion of the UEMF&UHSP, as described above. While the UEMF&UHSP is extremely effective to protect TIs fromEMF and ultrasonic attacks to the head, some consider it to be too conspicuous to be worn in public, and haveasked for a cut-down version which can be secretly worn in public without being conspicuous. The UMHSC is theanswer! The UMHSC also shields against both EMF and ultrasonic attacks because it uses the same shieldingmaterials as the UEMF&UHSP. The UMHSC consists of two caps or hats, a larger cap/hat worn on top of a smallersame-version cap/hat. In between the two caps/hats, we install the shielding materials. The bottom cap/hatcomfortably fits your head while the larger top cap/hat conceals the shielding material between the two, which iscemented to the two caps/hats. If both caps/hats have a bill (e.g. baseball caps) or rim, we cut off the bottom bill orrim unless you tell us not to in your CD Application Form (CDAF). Because the UMHSC does not cover the face area and perhaps some of the sides and back of the head(head coverage depends upon the caps or hats you pick), while it is effective for the covered areas, the UMHSC is notgoing to be able to protect the non-covered areas. However, even this limited head shielding should be effectiveagainst brainwave signature reading (used to locate TIs for targeting) and mind reading (where a clean EMF signal istransmitted thru the frontal brain and received by a receiver on the opposite side to demodulate out the brainwave signals), as wellas reducing the effectiveness of other forms of electronic attacks enough to prevent any or at least enough of themanifestations to thwart or discourage the perps doing the attacks. Here is how this UMHSC CD project works: (1) Send us your CDAF (green link at top of page). (2) When werespond with time and cost estimates and you agree to these estimates, obtain* two same-version non-elastic capsor hats of your choice. The bottom cap/hat should fit your head snugly and comfortably, and the top cap/hat shouldbe of the same type but 2-5 sizes larger (at your expense; there should be 3/8" - 3/4" of all-around spacing between the twocaps/hats; both caps/hats should be new or in excellent used condition). If you intend to sleep with the caps/hats On (manyreports of TIs being electronically attacked during sleep), obtain caps/hats also safe and comfortable for you to sleepin. (3) Ship to us* (at your expense) your chosen caps/hats. (4) We will then custom-modify them here with both EMFand ultrasonic shielding. (5) Upon successful completion, we will then return your customized cap/hat shieldprotector UMHSC to you. *NOTE: We can also buy the caps/hats for you - especially nice if you live overseas, toavoid delays and extra S/H. Just provide us the make, model, size, style and color of the caps/hats (and cap/hat sellerURL if you can) you want in your CDAF. Last made $795 [2 lb]. For optimum head protection, we strongly recommend that you contract both for theUEMF&UHSP and the UMHSC to better meet your various activities (only one CDAF required to contract for both).

    MIND CONTROL & ELECTRONIC ATTACK ANALYSIS REPORT: Are you a TargetedIndividual (TI) being attacked by perpetrators using mind control and electronic attack devices? There are so manysignals out there being absorbed by your brain and body, while most are not malicious, how can you tell for surewhich signals are harmful or malicious to you? Due to popular demand, we are now offering our MC&EAAR service.How this works is that you provide us your data points on the signals you receive using either a detection device weprovided you as an earlier separate unique CD Project (see below for detailed descriptions of our popular mindcontrol and electronic attack detection device types) or from your own signal detection equipment. We thenobjectively analyze your data points, and provide you a written report on our analysis of your data points. Your"data points" consists of the detected signal details and the resulting manifestations which you believe were causedby the detected signals. "Detected signal details" consists of the signal frequency, signal strength or signal power(e.g. LED bar readouts, volts/meter, dbm, gauss), direction (if you used a directional antenna) and duration, and thedate and time of signal detection. "Resulting manifestations" consists of the physical, electronic, electrical and/orequipment manifestations you experienced shortly after or during a signal exposure, the duration of themanifestations, and date and time of manifestations. One "data point" consists of one line of detected signal detailsfor each detected signal followed by one line of your observed resulting manifestations. Please also include themake and model of your detection device, a sketch(es) of the layout of the place where you experience thesesignals showing your equipment setup, and any other relevant information which you believe would assist our mindcontrol and electronic attack analysis for you. Last made $995 [1-5 lb] for up to 100 data points (if your data points exceed 100, add $75 for each additional 10data points) you need analyzed. (NOTE: We provide a 10% discount for our MC&EAAR services if your detection deviceis one which we provided you earlier as a separate CD Project (detailed descriptions of our popular mind control andelectronic attack detection device-types below); the estimated costs by us is for the analysis and report only, it is not aretainer of any kind and does not include any mind control or electronic attack expert witness services or any otherservices (if you require additional services from us, you must provide us a new CDAF form for each additional service forus to consider), it does not include any hardware of any kind, and it does not include any onsite visits (we do notpersonally meet with Clients) or travel by anyone; our analysis is solely based on the information provided to us by theClient with his/her CDAF and assumes that the Client's information is 100% accurate and complete; Client assumes fullresponsibility for the accuracy and completeness of all of his/her information; our analysis shall be objective, unbiasedand with an open mind even if it differs with the Clients own opinions or analysis; we will not identify any allegedperpetrator(s) or their motives or intentions as that is beyond the scope of our direct knowledge; and Client's costs aretotally non-refunable once we have completed our analysis).

    WIRING HITCHHIKING HARASSER ELIMINATORS: Are your home/business wiring, piping, etc.or even car wiring hijacked to electronically harass or surveil you by hitchhiking signals onto them? Because powerand telephone lines, and metal pipe (e.g. plumbing), metal tubing (e.g. wire shielding) and metal linear structures (e.g.rebar, girders, conduit, trim, rails, fencing) surround you virtually everywhere you go in any building, electronicsurveillance devices, equipment control devices, mind control devices and electronic attack devices can beconnected to them in virtually every room and even outside the building for some distances - these omnipresentconductors serve as the optimum means to connect up, transmit and distribute these very harmful electronicsurveillance, mind control and electronic attack signals throughout the building (sometimes called "carrier current"

    Lone Star Consulting, Inc. Devices:Subliminal,Mind Control,Electronic Attack,Entrainment,Behavior Mod 12.05.2014

    http://www.lonestarconsultinginc.com/mindcontrol-devices.htm 5 / 22

  • attacks - carrier currents caused by carrier current transmitters) - optimum conductors for virtually endless varieties ofbugs, taps, harassment, control and line blaster devices. Our WHHE devices both test and filter out harmfulhitchhiking signals! Since these conductors are so prevalent in virtually every building, added with the technologies of timemultiplexing signals and frequency multiplexing signals, literally dozens - even 100s - of these types of very harmfulsignals can be operational on any day and night against you - usually no matter what rooms you are in. Your homeor business is just several huge signal distribution networks plus transmitting and receiving antenna arrays. And allsuch wiring, piping, etc. can usually be just as easily abused for electronic surveillance, mind control and electronicattacks even if you turn OFF or disconnect them from their normal uses (e.g. turning Off AC power, disconnectingphones). This is nothing new - both power and phone wiring have been lawfully used for decades to carry high-bandvoice, control signals, and data (e.g. faxes, modems, DSL, zons, intercoms, alarm systems for phone lines, andintercoms and alarm systems for power lines) - proven technologies using common household AC wiring and phonewiring. Furthermore, because generic power and phone wiring and piping in all or part of one's home and businessare often unshielded, they can be both easily accessed and connected up to AND used as a huge transmittingand/or receiving radio antennas to communicate with anything from electronic implants - to guys parked in the street- to cellphone towers down the road - to control centers 100s miles away - to ships at sea - to satellites - toelectronically harass, control and/or interfere with your life! For examples: (1) Signals on them can be transmittedwireless for miles, and (2) Physical access to the wiring, piping, etc. is not even required; because the wiring,piping, etc. is unshielded, signals can often be inductively coupled into or out of power lines, phone lines, piping,etc. (e.g. inductively-coupled phone line taps are decades old technology). Offending microwave signals can also bereflected off of ungrounded or not fully grounded metal bodies. Since these virtually endless varieties of bugs, taps, harassment, control and line blaster devices can take onvirtually any appearance and/or be hidden in just about anything inside of or near your building, they can be verydifficult to detect through physical searches (short of tearing down all of your walls and ceilings where the lines andpiping run, and disassembling all of your equipment). For example, these devices can be easily concealed insideTVs, radios, computers, cellphones, landline phones, electronic handheld devices, etc. - fully operating even whenthe TV, radio, phone, etc. itself is not turned ON. Or hidden in an outlet, inside of your wall or in your attic - eveninside your car. If you share walls, floors or ceilings with other apartments, the devices can be on their side, or evenoutside your building. Since not all of these harmful devices are RF devices, the non-RF ones cannot be detectedusing TSCM field strength testing used for wireless systems. Nor can strictly receiving devices be TSCM-detected.And usually nor can transmitting devices which transmit in bursts, randomly or pre-dawn hours, nor when theperpetrator believes the area is being electronically swept and turns Off transmitters until the TSCM crew leaves. Inshort, your phone and power wiring, piping, etc. can be easily and secretly tapped into using hardwired, inductive-coupling and/or reflection techniques just about any place they are routed internal or external to yourhome/business. To understand just how frustrating it is even for experts to really troubleshoot an area, rent theGene Hackman movie, "The Conversation" - and that was early 1970s' relatively crude, clunky and hugeelectronic surveillance systems! The high-band signal frequencies used on power and phone lines, piping, etc. (which can be time multiplexedand/or frequency multiplexed to support several such systems) are usually 5+ times higher than the standard 60 Hz /50 Hz (power wiring) or 3200 Hz maximum (phone wiring) bandwidth normally used on them. The usable bandwidthof many power and phone lines exceed 2 MHz for loops up to about 6,000 ft (1.14 miles) and much higher overmuch shorter loops - very usable for electronic surveillance, mind control and electronic attack. Metal piping, tubing,fencing, rails and other structures can conduct signals far higher in frequency than even power and phone lines(because most power and phone lines, pipes, etc. are unshielded, electrically noisy and inductive and leaky to high freqs, most high-band signals are under 200 KHz). Loading these unshielded conductors with all kinds of multiplexed and high-bandsignals they were not designed for may cause the wiring, piping, etc. itself and their terminations to resonate withstrange sounds and noises which seem to emanate from walls and ceilings often on quasi-random and directionalbases (e.g. strange sounds you can hear when standing in one position but not in another nearby position, and/or atsome times and not at other times, and/or during certain conditions of humidity and/or temperature but not at otherconditions), often throughout most of a building, and often similar to the vibrating and humming of an old ordefective power transformer. They can also vibrate and hum in the ultrasonic and infrasonic bandwidths whensignals mix and produce sum and difference frequency components. The weird sounds can also sound like adistant motor running, distant voices, whispering and mumbling, spiritual and God-like voices, high-pitched voices,low-pitched voices, chattering, music, animal sounds, whistles, echoes, pulsing, pounding, popping, finger-snapping, digital data sounds, zinging sounds, whooshing sounds, theremin sounds, etc., especially when real timecomplex signal mixings of possibly several signals at once result in partially demodulated and/or multiply-mixedhigh-band signals. These weird noises can literally drive some people nuts! If you are hearing sounds, noises oreven voices or digital data signals or control signals coming from your walls, ceilings or appliances orinappropriately while you are on the phone, you may not be imagining it. Also, high frequencies imposed on powerwiring can adversely affect induction motors (especially compressor motors common to refrigerators, freezers and airconditioners), causing them to operate roughly, chatter noisily and possibly stall out (because induction motor speedis proportional to the frequency of its power source, multiple frequencies can harm them), and can cause lights to varyin intensity or flicker. Modulated high frequencies on phone lines can cause malfunction of phone and computerequipment (e.g. loss of broadband sync, inability or slowdown in using DSL or even dial-up, faxes, zons, etc. because ofa "noisy line"). We offer 4 types of WHHE systems to test for and protect against offending EMF signals: (1) The WHHE1 isfor AC power lines, (2) The WHHE2 is for phone lines, (3) The WHHE3 is for motor vehicle wiring, and (4) TheWHHE4 is for non-electrical metal structures, such as pipes, tubes, appliances, fencing, rails and other metalstructures, and unpowered wiring. For minimal recommended protection, you must typically have at least one ofeach WHHE type. For optimal and continuous protection, you must have two WHHE1 (one for each 120VAC powerleg), one WHHE2 for each landline phone line, one WHHE3 for each vehicle, and one WHHE4 for each non-electrical ungrounded or improperly grounded metal structure within about 25 yards of you. The WHHE1 is designed to plug directly into any 120 VAC wall outlet (3-wire or 2-wire, 60 Hz or 50 Hz) locatedvirtually anywhere to both detect and eliminate these higher frequencies on your AC power wiring (and to also causean improvement in your power factor if it is typically inductive or lagging power factor (PF)) (Note: If you have anintercom, digital or other communications system which uses home/business electric power wiring to transmit/receivesignals, the WHHE1 will also filter out those signals if used at same time). For example, voice, data signals, and/orcontrol signals at 10 KHz, 50 KHz, 90 KHz, ..., 1890 KHz, 1930 KHz and 1970 KHz could all be frequencymultiplexed onto a single 60 Hz power line simultaneously. That is, as long as a WHHE1 is not connected, becausethe WHHE1 wipes out all frequencies much above 60 Hz - wiping out those electronic attack and electronicsurveillance high-band signals in one fell swoop! You may specify the WHHE1 to be non-battery powered (usedonly on powered AC lines to also power it), or battery-powered (used on both powered and unpowered AC lines). Notethat the WHHE1's filtering functions cannot be duplicated using commercial power strips with built-in transientsuppression. Power strips with transient suppression only filter out transients which are both high-voltage ANDhigh-frequency, and then only for those devices connected to the power strip - not the VAC power lines connectedto your AC outlets and located behind your walls in your home or business. Only the WHHE1 can filter outunwanted signals at your outlets and home/business wiring (as well as devices plugged into power strips). Even fordevices plugged into transient-protected power strips, the designed protection is for transients which are both high-voltage AND high-frequency - much less effective against hitchhiking voice, control and data signals (which usually

    Lone Star Consulting, Inc. Devices:Subliminal,Mind Control,Electronic Attack,Entrainment,Behavior Mod 12.05.2014

    http://www.lonestarconsultinginc.com/mindcontrol-devices.htm 6 / 22

  • result in small RMS voltage level increases way below voltage levels required to switch in transient suppression). TEST: There is a test that will likely result in positive indication of hitchhiked signals on your AC power lines, but test requiresabout 2 months to complete: Obtain 3 same make and model plug-in digital clocks (not battery-powered clocks), and place them inwidely-separated rooms but on the same 120VAC leg. Synchronize each clock to your cellphone or other battery-operated superaccurate time source. At the end of one month, check the times on each of your 3 clocks against the device you synchronized themwith. Most of these types of clocks are timed by the frequency of your AC line voltage (60 Hz in the US, 50 Hz many other places).However, with most of them, the timing is also advanced by signals and electrical noise interference on your line to various degreesbased on their specific electronic designs and interference properties. If there is much communications or control signals on the line,the clocks will run faster than normal. Therefore, if at the end of the month, any of your clocks are more than a couple of minutes fast,more than likely, you have a serious problem with hitchhiked signals on your line for which we strongly recommend the WHHE1 tocountermeasure. Since the electrical noise on most AC lines typically rarely reaches levels that would advance most clock timing,normally, noise by itself would contribute to about a minute or two at most in one month's time to advancing timing. If any of your clocksrun too slowly, the clock is probably defective. And which clock has advanced the greatest is usually the clock closest to the hitchhikingsignal input point where it gets the strongest signal. Then run this test again, with all of the clocks on the other AC leg. Note: This test isnot proof of either the existence or absence of hitchhiking signals during the test month because of clock defects and nominalelectronic differences; clock timing may use crystals and not line frequency; low intensity, very high frequency, and/or low duty cycle(e.g. burst signals, infrequent or occasional attacks) hitchhiking signals that don't significantly increment clock timing; very noisy line,etc., but it often is a very good indication. The WHHE2 is designed to plug directly into any normal landline phone line (works with corded phones andcordless phones), and works whether the phone is On Hook or Off Hook to eliminate higher frequencies on yourphone wiring (Note: If you use DSL, modem or other digital phone line communications system, those signals will alsobe filtered out if used at same time). We offer 3 versions of the WHHE2: (1) WHHE2-HB: The High-Band (HB)version (the default version if you don't specify) filters out phone line freqs starting at about 4000 Hz and above. Whilethe HB will filter out all signals at all times when toggled ON much above the normal phone voice BW of 300-3200Hz, it will not filter out normal speech signals in the voice BW, resulting in possible but very unlikely unauthorizedvoice-band transmissions when phone is on-hook. (2) WHHE2-LB: The Low-Band (LB) version filters out phoneline freqs starting at about 50 Hz and above. While the LB filters out voice and data signals at all times whentoggled ON, it must be turned OFF when you need to talk on the phone or use it to transmit data or it will also filterout your and the other party's voices. Note that the LB version may negatively impact ring with some phones. (3)WHEE2-CMP: The Composite (CMP) version allows you to toggle between the HB and LB versions for maximumsecurity - when you are talking on the phone, you set it at HB, when you are sending data online, you turn OFFboth HB and LB, and when phone is on-hook, you set it at LB. The WHHE2 uses the common standard RJ-11phone connector. The WHH2 always comes battery-powered. The WHHE3 is designed for 12VDC battery systems (e.g. vehicle battery wiring) because car battery wiring canalso be - some say often - used to conduct unwanted and harmful signals which can be used for electronicsurveillance, mind control and electronic attack. You can specify whether you want its cable to have cigarettelighter, battery clamp or other type of terminating connector you specify (Note: Any and all vehicle underhoodconnection work must be done by your automechanic at your expense and always in a legal and safe manner, and weassume no liability for the installation, removal and use of a WHHE3 device on any vehicle). You may specify theWHHE3 to be non-battery powered (used only on powered 12VDC lines to also power it), or battery-powered (used onboth powered and unpowered 12VDC lines). The WHHE4 is designed to test and protect unpowered wiring, metal piping, metal tubing, metal fencing, metalrailing, metal structures, and other unpowered conductors up to about 25 feet long by testing for and filtering outsignal types they carry above 60 Hz. These include offending signals hardwired or induced onto metal structures,and to some extent, reflected signals. Protecting against reflected signals is designed to protect you from perpstransmitting RF signals at unprotected reflective surfaces near you for its scattering effects or angular advantages,which then reflect onto you to do their dirty work; the WHHE4 grounds out air-transmitted offending RF signals itprotects in your area. The WHHE4 can test and filter out great varieties of conductors which do or do not haveknown or accessible signal return paths (WHHE1, WHHE2 and WHHE3 test and protect circuits which have electricalreturn paths paired with them, e.g. AC power line neutral, phone Ring wire, car battery ground). The WHHE4 comeswith two cables, each about 12.5 feet long, and each terminated by alligator clips (or some other type of connectoryou specify). One cable is connected to the unpowered metal wiring, piping, tubing, fencing, structure, etc. If thismetal is accompanied by an accessible metal electrical return path (e.g. wire, piping, tubing, fencing, structure, etc.),the other cable is connected to it, else it is connected to nearby grounded metal, in which case an earth ground rodmay be required (earth ground rod not provided, available in hardware stores). The WHH4 always comes battery-powered.Note: Not all plumbing or tubing (or fencing or structures) is continuous metal all the way into a good earth ground. Sometimes plasticplumbing or standoffs are used, which breaks any ground connection. Even if the plumbing pipe is continuous metal all the way towhere buried in earth, pipe joints can be corroded enough or use enough teflon tape to break the electrical connection, the pipe canbe laid in dry ground or concrete, and/or the pipe itself can be corroded enough to break its ground connection. In fact, plumbing pipeis never a reliable earth ground. National Electrical Code: 'True earth ground physically consists of a conductive rod or pipe driveninto the earth to a minimum depth of 8 feet.' Plumbing pipe is never "driven into the earth" and plumbing, tubing, fencing andstructures are seldom buried at least 8 feet deep. If unpowered metal is not itself solidly grounded to earth (easily determined) - notjust wet-season or intermittently grounded - it makes a great conductor for offending electronic signals. Each WHHE device comes with a signal indicator LED and the DETECT/PROTECT toggle switch. Onetoggled position is the DETECT Mode in which the LED will flicker and/or brighten if there is a high-band signal onthe line, piping, etc. The other toggled position is the PROTECT Mode which will filter out all types of high-bandsignals, transients and line noise interference hitchhiking signals to remove them from your line, piping, etc. TheDETECT Mode continuously tests your conductor to determine if there is any unusual signal or other electricalactivity on it. The toggle switch is especially protected with a snubber circuit designed to prevent contact arcingduring switches. If the WHHE device conflicts with some other known and OK equipment or function connected toyour wiring in the PROTECT Mode, then don't operate that WHHE in its PROTECT Mode when normally usingsuch equipment or function (no known interferences in the DETECT Mode). EXTRA PROTECTION: WHHE devices are designed to further protect your lines from possibly destructivehigh-voltage pulses, transients and line noise which can sometimes also occur, whether natural or manmade (e.g.helps protect you from a perpetrator trying to wreck your phone or power system - even your computer - using a phoneor power line blaster to deliver high-voltage transients, pulses and electrical noise to your system and equipment; andhelps protect lines and equipment against damage caused by nearby lightning strike or transients, pulses and linenoise). (Note that while electronic filters may eliminate 99.9+% of a signal - so much of the signal that the tiny remaining signal is lostin the line noise - no electronic filter wipes out absolutely 100% of a signal; always experiment with WHHE device first to make surethat it does not interfere with the normal use of your lines and equipment.). This very substantial added transient protectionfeature includes a gas discharge lightning arrestor (surge arrestor - not normally found even in expensive transient-suppressed power strips), a MOV (varistor), and the filter capacitor itself - all of which adds substantial protectionfrom lightning strikes, line blasters, and powerful pulsed mind control and electronic attack devices hitchhiked ontoyour lines, piping, etc. Plus, if specified, WHHE devices come with an output connector which permits you to directly view hitchhikingsignals on an oscilloscope or hear them on a speaker or earphones (if signal is in the audio band; oscilloscope, speakerand earphones are not included). By being able to observe and/or hear the signals which should not be on your line,piping, etc., you can often tell exactly what is being communicated or controlled, and correlate the hitchhikingsignals with conversations, other activities, and unexplained manifestations. Note that since most home and office electric power systems are 220-240 VAC and standard outlet wiring is110-120 VAC, there are two isolated AC power "legs" that power the various 110-120 VAC outlets and functionsthroughout the building. Therefore, to simultaneously and continuously DETECT and PROTECT both AC power

    Lone Star Consulting, Inc. Devices:Subliminal,Mind Control,Electronic Attack,Entrainment,Behavior Mod 12.05.2014

    http://www.lonestarconsultinginc.com/mindcontrol-devices.htm 7 / 22

  • legs, you need two WHHE1 devices. Also note that if your landline phone system has more than one phone line,each phone line is isolated from each other, so therefore to simultaneously and continuously DETECT andPROTECT all phone lines, you need a WHHE2 for each and every phone line. All WHHE device-types are small,portable, easy to use, uses standard connectors, and the WHHE2 and WHHE4 are 9VDC battery-powered (WHHE1and WHHE3 operate off of their power line voltages but we can also make them to operate off of 9VDC battery to also testunpowered 120VAC power lines (WHHE1) and car battery wiring (WHHE3)). CAUTION: Do not use any WHHE devicein the PROTECT Mode to do a denial-of-service attack against anyone legitimately using a phone system or powerline for some normal high-band activity, for example, by interfering with or defeating DSL, modems, faxes, zons,intercoms, alarm systems, etc. Non battery-powered WHHE1, WHHE3. Last made $395 [1 lb] each. Battery-powered WHHE1, WHHE2-HB, WHHE2-LB, WHHE3. Last made $445 [1 lb] each. Battery-powered WHHE2-CMP, WHHE4. Last made $495 [2 lb].

    The ULTIMO EM TRANSMITTER DIRECTION FINDER: If you are being electronicallyattacked, electronically harassed, electronically controlled, electronically tracked, and/or electronically surveilledthrough some wireless means, the signal is either electromagnetic (EM) or ultrasonic (see below) in nature. Thereare all kinds of commercial EM scanners which will allow you to scan for the presence of EM signals. However, theyalmost never come with directional antennas (they usually have only an omnidirectional whip antenna) so that whileusing the whip antenna you can pick up EM signals and display the strongest EM signal coming to you from anydirection, they cannot determine signal direction - only signal frequency and signal strength. Furthermore, since thestandard whip antennas used in commercial scanners detect signals from all directions, a stronger EM signal(s)with a nearby center frequency(ies) (e.g. licensed ham and/or commercial radio stations and/or TV stations) to anelectronic attack signal will cause the scanner with the standard whip antenna to detect it/them instead of theoffending signal. However, because our UEMTDF comes with our proprietary highly directional antennas, whenpointed in the offending signal's direction, often result in the clear detection and direction finding of offendingsignals - even when more powerful non-malevolent (e.g. licensed commercial stations, ham, cb) transmitters areoperating in the same area, at the same time and at nearby frequencies. This is critical because electronic attacktransmitters are often designed to operate in the "electronic shadows" of stronger legit signals, such as commercialTV stations and radio stations, to electronically hide them from scanner/whip antenna detection. Furthermore,commercial scanners come with no instructions on how to interpret the received signals in the realm of electronicattack, mind control and body control technologies. Because of the variety of directional antennas that we includeand our User Manual insights about their uses, the UEMTDF can be used to detect and determine the direction ofnot only relatively distant external signals, but also nearby and even internal signals transmitted, for example, froman electronic implant(s) (for modern electronic implants and most other localized transmitters, it is usually very helpfulto be able to detect both internal signals and external signals because modern electronic implants, room bugs, vehicletracking transmitters, possibly telecoils/magnetic induction loop systems, etc. are often in two-way communications withmuch larger external transceivers which control them; electronic implant control is often based on the receivedbiomedical data supplied by the electronic implants - data which is often biological result of previous control signalinstructions from the external transceivers often in a closed-loop feedback type system). Other nearby signals theUEMTDF is designed to both detect and find include room bugs and tracking transmitters often concealed onvehicles, clothes and portable objects. The UEMTDF comes with a commercial scanner of our choice based on thedescription of your needs, plus 5 unique directional antennas of our design, plus description of both how to use thedirectional antennas and how to interpret as best we know the detected radio signals, including "radio static" that isoften missed even by professional bug sweepers (detection is contingent upon the existence of a transmittertransmitting an adequate RF signal at the same time and direction you are trying to detect it). NOTE: We will refund25% of your payment for this device-type if within 60 days of you contracting for one you also contractfor a PERSONAL EMF JAMMER (PEMFJ)-type device because you needa highly directional RF signaldetector to try to ascertain the frequency, direction and timing of the harassing or attacking EMF so thatwe can optimally design the PEMFJ for you, and also so that you can prove to yourself that your PEMFJis transmitting radio signals. Last made $1195 [3 lb]. ANTENNAS LIMITED TIME SPECIAL OFFER: We recently made major changes in ourantenna designs, applicable to all new UEMTDF and UEMTT (below) CD projects. While we got good reports fromour earlier antenna variations, our two largest antennas were relatively bulky and heavy, limiting portable use ofthem by some users. Our newest antennas are much smaller and lighter and thus easier to use. As a specialconsumer service, if you purchased from us an UEMTDF or UEMTT device-type since Oct. 18, 2007, we willprovide you this new set of our unique 5 directional antennas for estimated $395 per set of 5, plus the return to usof all of your original antennas in good condition. Your cost for these new antenna types is less than half of theircost component for new UEMTDF or UEMTT CD projects. To obtain these new antennas, please promptly emailus your interest in this deal, and complete a new CDAF for them (green link at top of page, evaluation fee waived),and send it to us with your payment (non-refundable 1/3rd downpayment minimum) and original antenna set of 5antennas. Please allow 30 days from our receipt of your mailing. Note 1: This is not a refund offer or system exchange offer- but an antenna exchange offer only - so please do not send anything else back to us. Note 2: First posted Oct. 19, 2009, we maydiscontinue this offer at any time without prior notice or liability, so if interested in this deal, please email us promptly, we will honorthose who earlier emailed us showing interest and then provided us his/her CDAF, payment and antennas within 30 days of email.Note 3: All of our policies fully apply as usual.

    The ULTIMO EM TRANSMITTER TRIANGULATOR: The UEMTT consists of two matchingUEMTDF systems (above), plus additional instructions on triangulating EM transmitters. While the UEMTDF willprovide you EM transmitter signal strength, signal frequency and signal direction, it will not directly specificallylocate the signal transmitter. To best determine specific location of transmitter, you need to triangulate the signal,and that requires two UEMTDF systems. In addition to the User Manual, for all triangulation device-types we sell,we also provide a tutorial on signal triangulation with a completely worked-out example problem using our simplealgebraic plug-in formulas. NOTE: We will refund 25% of your payment for this device-type if within 60 daysof you contracting for one you also contract for a PERSONAL EMF JAMMER (PEMFJ)-type devicebecause you needa highly directional RF signal detector to try to ascertain the frequency, direction andtiming of the harassing or attacking EMF so that we can optimally design the PEMFJ for you, and also sothat you can prove to yourself that your PEMFJ is transmitting radio signals.Last made $1995 [6 lb].

    The PERSONAL EMF JAMMER: John Williams's extensive researches into EM weaponry and EMharassing devices (and Radionics) - including on-site investigations of cases - have resulted in a high level ofunderstanding and insights into EM weaponry and electronic countermeasures (EM weapons countermeasures),such as EM jammers and EM zappers. The technology for powerful and invisible EM attacks clearly exists - attacksaimed at harassing, controlling, crippling, and "poisoning"! Do you:

    Hear popping and/or clicking sounds you can't identify?Hear voices and/or sounds coming from behind and/or above the ear and/or accompanied by radio-like staticnoises (usually caused by RF interference)?Experiencing worsening and/or more frequent bouts of insomnia, irritability, eye pain, dizziness, headaches,nausea, itching, respiratory and/or sinus problems?

    Lone Star Consulting, Inc. Devices:Subliminal,Mind Control,Electronic Attack,Entrainment,Behavior Mod 12.05.2014

    http://www.lonestarconsultinginc.com/mindcontrol-devices.htm 8 / 22

  • Are you affected by any other unexplained manifestations in your life?Do any of these occur or increase in rate of occurrences and/or intensities when you are near metal surfaces(especially large concave or flat hard and smooth metal surfaces, e.g. cars, appliances, equipment, large tools,sheet metal, electrical wires / electrical cables, any other concave or flat hard and smooth metal surfaces EM signalscan reflect off of), especially if perceived sounds appear to come from the direction of these surfaces or fromcorners in these surfaces?

    And you are certain that these manifestations are not caused by any medical condition. You may be the victim of anelectromagnetic attack!

    PEMFJ-type devices, as with all RF transmitting devices we design and build, is based on our RF policies definedon our policies webpage (policies.htm). The PEMFJ is designed to send out strings of pulses in a narrow bandwidth(0.1% of center frequency, up to less than 100KHz maximum BW) designed to jam (within the immediate area of one'sbody) offending EM transmitters, surveillance devices, microwave controllers, et al - even the newest EM devices.Portable and worn or carried on or near the body. Note that EM signal jammers are never designed to operate aselectronic weapons or to jam legally licensed transmitters. Jammers transmit no intelligence but only a high-frequency carrier signal typically modulated by white noise or pink noise to mask out the offending signals of anelectronic weapon (if you could hear the EM white noise, it would sound much like distant rain; EM pink noise soundssimilar to white noise but has higher or lower composite pitch, depending on filtering). In contrast, electronic transmitterweapons transmit definite control signals or data signals which are usually designed to cause harmfulmanifestations in a person(s) (usually a targeted person), animal(s), and/or equipment. Since the bandwidth thatharmful EMFs can occupy is enormous, it is important to determine where in this enormous electromagneticspectrum lies the signals harmful to you. Therefore, you should first strongly consider as a Customized Devices thepurchase of a directional signal strength or signal triangulation device so that you can ferret out the offendingsignals red-handed, detect their frequency(ies) (bandwidth) and include those details in with your PEMFJ-typeCDAF - see our popular THE ULTIMO EM TRANSMITTER TRIANGULATOR and THE ULTIMO EMTRANSMITTER DIRECTION FINDER -type devices above for a special deal. Last made $1495 [2 lb] (roughprice when the bandwidth of offending signal was provided; if frequency was not provided, we select the frequency based on the bestof our abilities resulting in less probability that we selected the right frequency and device may be substantially more expensive; wecannot do a wideband PEMFJ or a PEMFJ for certain frequencies).

    The ULTIMO ULTRASONIC TRANSMITTER TRIANGULATOR: If you are beingelectronically harassed, electronically controlled or electronically attacked through some wireless means, the signalis either ultrasonic or electromagnetic (see above) in nature. The UUTT consists of two matching UUDAs (seeULTRA ULTRASONIC DETECTOR & AMPLIFIER (ULTRASONIC DIRECTION FINDER) described below, alongwith several other related ultrasonic type devices) so that you can not only determine an offending ultrasonic signalstrength but also the ultrasonic transmitter's specific location using the signal triangulation methods we describe. Inaddition to the User Manual, for all triangulation device-types we sell, we also provide a tutorial on signaltriangulation with a completely worked-out example problem using our simple algebraic plug-in formulas. NOTE:We will refund 25% of your payment for this device-type if within 60 days of you contracting for one youalso contract for an ULTRA ULTRASONIC JAMMER (UUJ), ULTRA ULTRASONIC SHRIEKER (UUS), orULTRA ULTRASONIC COUNTERMEASURE (UUC)-type device because you needa highly directionalultrasonic signal detector to try to ascertain the frequency, direction and timing of the harassing orattacking ultrasound so that we can optimally design the UUJ, UUS, and/or UUC for you, and also so thatyou can prove to yourself that your UUJ, UUS, and/or UUC transmits ultrasound.Last made $995 [3 lb].

    The ULTRA ULTRASONIC DETECTOR & AMPLIFIER (ULTRASONIC DIRECTIONFINDER): The UUDA is designed to detect and amplify the presence of ultrasonic sounds in your environment -from weakest to strongest (gain tunable 5,000 - 500,000), from 15 KHz - 225+ KHz. Automatic gain control (AGC) isused to extra-boost weak sounds over much stronger ones. Directional and tunable. Ideal for detecting ultrasonicbugs, ultrasonic pain field generators, ultrasonic spurious emitters, ultrasonic communications (will demodulatesome), ultrasonic range finders, ultrasonic depth finders, ultrasonic medical devices, ultrasonic mind controldevices, etc. The UUDA also comes with an ultra wideband ultrasonic transducer housed in a special highlydirectional feedhorn assembly that allows you to determine the direction where the offending ultrasonic signal iscoming from. NOTE: We will refund 25% of your payment for this device-type if within 60 days of youcontracting for one you also contract for an ULTRA ULTRASONIC JAMMER (UUJ), ULTRA ULTRASONICSHRIEKER (UUS), or ULTRA ULTRASONIC COUNTERMEASURE (UUC)-type device because you needahighly directional ultrasonic signal detector to try to ascertain the frequency, direction and timing of theharassing or attacking ultrasound so that we can optimally design the UUJ, UUS, and/or UUC for you, andalso so that you can prove to yourself that your UUJ, UUS, and/or UUC transmits ultrasound.Last made$595 [2 lb].

    The ULTRA ULTRASONIC JAMMER: John Williams's extensive researches into ultrasonic weaponryand ultrasonic harassing devices (and Radionics) - including on-site investigations of cases - have resulted in ahigh level of understanding and insights into ultrasonic weaponry and electronic countermeasures (ultrasonicweapons countermeasures), such as ultrasonic jammers and ultrasonic zappers. Ultrasonic transmitters haveseveral important uses. These include warding off feral dogs and dangerous pests (insects to rodents), and forultrasonic communications, control, electronic weaponry (e.g. ultrasonic mind control / ultrasonic attack) and variousultrasonic laboratory applications. "Ultrasonic Jammers" are typically powerful ultrasonic transmitters designed toblock or interfere with any intelligence or data transmitted by other ultrasonic transmitters operating in that band, ifany, and to disrupt their ultrasonic control, communications, weaponry, and lab functions. Note that ultrasonic signaljammers are never designed to operate as electronic weapons. Jammers transmit no intelligence but only a high-frequency carrier signal typically modulated by white noise or pink noise to mask out the offending signals of anelectronic weapon (if you could hear ultrasonic white noise, it would sound much like distant rain; ultrasonic pink noisesounds similar to white noise but has higher or lower composite pitch, depending on filtering). In contrast, electronictransmitter weapons, which we do not create, transmit definite control signals or data signals which are usuallydesigned to cause harmful manifestations in a person(s) (usually a targeted person), animal(s), and/or equipment.

    John Williams' extensive researches into ultrasonic weaponry and harassing devices (and infrasonic weaponry)have resulted in a high level of understanding and insights into ultrasonic weaponry and electroniccountermeasures. The technology for powerful and invisible ultrasonic attacks clearly exists - attacks aimed atharassing, controlling, crippling, and "poisoning"! Do you:

    Hear popping and/or clicking sounds you can't identify?Hear voices and/or sounds coming from behind and/or above the ear, and/or unexplained echo sounds(usually due to multipathing)?Hear projected sounds or projected voices (sound projections and voice projections are sounds and voiceswhich appear to come off of surfaces or out of things or areas where that type of sound or voice cannot reasonablybe coming from), especially if you cannot identify the actual producer of the sounds and voices (e.g. person,

    Lone Star Consulting, Inc. Devices:Subliminal,Mind Control,Electronic Attack,Entrainment,Behavior Mod 12.05.2014

    http://www.lonestarconsultinginc.com/mindcontrol-devices.htm 9 / 22

  • animal, thing, speaker, sounder, etc.)?Hear highly directional sounds or voices (sounds or voices which volume changes greatly when you suddenlymove only a few feet away left/right or back/forth, or only can be heard by you)?Are you affected by any other unexplained manifestations in your life?Do any of these occur or increase in rate of occurrences and/or intensities when you are near metal, ceramic,hard wood, hard plastic and wallboard surfaces (especially large concave or flat hard and smooth surfaces, e.g.cars, appliances, equipment, large tools, sheet metal, walls, any other concave or flat hard and smooth surfacessound can reflect off of), especially if perceived sounds appear to come from the direction of these surfaces orfrom corners in these surfaces?

    And you are certain that these manifestations are not caused by any medical condition. You may be the victim of anultrasonic attack!

    Our popular UUJ also usually makes the best animal, pest and intruder defense systems because their-highpowered ultrasonic cacophone outputs are most disturbing to them. The UUJ is designed to protect yourself fromunwanted ultrasonic surveillance and control, ultrasonic harassment, and painful, debilitating and dangerousultrasonic pain field generator and other ultrasonic weaponry attacks. Tunable frequency is a critical featurebecause different ultrasonic frequencies are used for different ultrasonic applications. Don't confuse the UUJ withcommercial "ultrasonic pest controllers," as some of these transmit virtually no ultrasonic tones - only feint beepsmodulated at about 10 KHz - while others transmit only one steady ultrasonic tone or short periodic ultrasonicbeeps and therefore do not affect many different types of pests who are not sensitive to their one ultrasonic tone.However, the UUJ is tunable over a wide bandwidth of ultrasonic frequencies (about 15 KHz to about 200 KHz) tooptimize it for its many ultrasound uses. See above for special deal in getting an ultrasonic detector with theUUJ.Last made $695 [2 lb].

    The ULTIMO LED MIND CONTROL DETECTOR: A relatively recent powerful form of mind controland electronic attack is becoming increasingly popular. LEDs (Light-Emitting Diodes) are omnipresent in manydifferent types of common electronic equipment for decades now, especially increasingly so with the advent of high-intensity energy-efficient LED bulbs, LED lamps and other LED lighting systems. LEDs are semiconductor lightemitters which can be precisely programmed for specific wavelengths, colors, tones and modulations, and havebeen used for years to program astronauts sleep cycles in the Space Station. LED light usually appears asconstant (0 Hz frequency) or blinking or flashing at very low rates (usually for alarm reasons). Older LEDs generallyhave such small bandwidths as to be nearly useless for mind control and electronic attack uses, even LEDs used insome LED biofeedback devices. However, some newer LEDs can be effectively modulated with signals up to about100Mb/s - way beyond the modulation bandwidth required for mind control and way beyond the modulationbandwidths of all other common light sources - not to mention cheap and commonly available - making them idealfor mind control and electronic attack. Most electronic devices which have LEDs are now foreign-made, so whichLEDs are now programmed and how are mostly unknown. You can't 100% block LED effects using dark sunglasses, and if the LEDs are intense, even closing your eyes may not help much. And LEDs can be intenselyflashing you at such high frequencies and/or in the ultraviolet band even when they appear to be Off to the eye (e.g.the signal output LEDs used in TV controllers)! Because LED modulations can be very high bandwidth, just byglancing at the modulated LED light may be enough to entrain your brain, and some manifestations can be delayed,making it difficult to determine the cause. Mind control and electronic attack signals conveyed directly into the brain through the eyes and optic nervepathways can be very destructive in several ways (e.g. direct interferences with nerve pulses, disruption orsuppression of melatonin production, disruption of circadian rhythms, etc.). We now believe that many mind controland electronic attacks are being conducted through modulated LEDs flashing at such high rates that your eyescannot detect these fast flashes but your brain does on a subliminal basis. You have no way of knowing without theULEDMCD which LEDs may be attacking you and which are benign. And that while most of these LED mind controlmethods are clearly for commercial reasons (e.g. telling you to buy a certain product or avoid competitors), others are useddirectly for nefarious mind control and electronic attack applications. Modulated LEDs are also widely used forVisible Light Communications systems (VLC), including for the activation, programming and controlling of otherelectronic devices themselves directly involved in surveillance and spying, and mind control and electronic attack. Inaddition, flashing LEDs are believed to trigger or cause epileptic seizures, blinding headaches, chaotic thoughts,thought interferences, forced thoughts, perception alterations, insomnia, sleep disruptions, hallucinations, eyedamage, temporary color blindness and distortions, loss of balance, depression, fibromyalgia attacks, behavioralmodification, obsessive-compulsive behavior, and even psychopathic behaviors in some vulnerable people. Youcan be exposed to LED mind control or other electronic attack totally unaware of this type of electronic attack. Sinceyour eyes won't likely detect it, you need a specialized device like the ULEDMCD to detect and alarm to LED mindcontrol. The ULEDMCD detects LEDs which are outputting high-frequency signals (30Hz - 200KHz), indicative ofsome mind control, electronic attack and communications devices, and alarms you when detected. If detected andyou own the offending device, you can tape over the offending LED with black electrical tape or paint over it withdark nail polish, disconnect the LED, report the device or take some other kind of action. The ULEDMCD last madewas $595 [2 lb].

    The ULTIMO MODULATED LED CONTROLLER: The UMLEDC produces a very wide range ofprogrammable LED modulations, some of which may counteract mind control (not just LED mind control), seasonaleffective disorders, some sleep disorders and circadian rhythm disorders (circadian disorders are believed by some tobe one cause of breast cancer in women), some mood disorders, biofeedback, relaxation therapy - an excellent LEDlight therapy device. But unlike other cheapo LED devices, the UMLEDC comes with critical programmablefeatures: (1) UMLEDC modulations are programmable (30Hz - 200KHz). (2) UMLEDC output waveforms, duty cycles and intensities are also programmable. Output waveforms canbe sinewave or pulsed, or based on audio, infrasound or ultrasound you connect into it. Pulse duty cycles can bevaried 10% - 90%. (3) UMLEDC comes with input connectors used by recorders, mikes and other electronic devices tomodulate the LED light with audio, infrasounds and ultrasounds if you wish (input devices to the UMLEDC are notincluded). With the UMLEDC, a huge amount of modulated-LED experimentation is possible (never use the UMLEDC as amind control device, and the UMLEDC is not sold as a mind control device, nor as a medical device nor medicallyassistive device). The UMLEDC can also be used as part of Visible Light Communications Systems (VLC). TheUMLEDC last made was $1195 [3 lb]. Since your eyes won't likely detect the LED modulated outputs, you need aspecialized device like the ULEDMCD (described above) to detect the outputs of its LED and output intensity. TheUMLEDC plus the ULEDMCD last made was $1645 [5 lbs].

    The ULTRA ULTRASONIC SHRIEKER: The UUS produces high-level, irritating ultrasound shrieking(adjustable) by manual switch, or randomly. The UUS has these uses:

    An effective way to rid yourself of some insect and rodent pests which operate in the quiet. By setting off

    Lone Star Consulting, Inc. Devices:Subliminal,Mind Control,Electronic Attack,Entrainment,Behavior Mod 12.05.2014

    http://www.lonestarconsultinginc.com/mindcontrol-devices.htm 10 / 22

  • RANDOM high-pitched ultrasonic shrieks, the pest cannot adapt to when the next startling ultrasonic shriek willoccur. Random ultrasonic output is critical. For example, the Sunbeam Model SB101-3 "Ultrasonic PestRepellers" (a non-random ultrasonic emitter) admits on its package, "In some cases, over time, certainrodents may become used to ultrasound and may return to their nesting or feeding areas even in thepresence of an ultrasound product." When the ultrasound is random, it is much more difficult for its target toget used to because the target cannot predict or expect when the next ultrasonic burst will occur, and thereforeit cannot prepare or adapt itself for it to minimize its scary or disruptive effects on the target.May be effective against people who harass you with loud "music" systems, partying, fighting, sports activities,loitering, crime casing, etc, when you've tried every reasonable method to obtain the peace and quiet youdeserve. Note: Not sold as some kind of "ultrasonic weapon system" to harass people or to bother neighbors, but only for possible non-lethal self-defense uses.

    The UUS is directional, and is enabled for 4 outputs. The UUS is portable, and easy to place/mount and use. 15-200 KHz. See above for special deal in getting an ultrasonic detector with the UUS.Last made $695 [2 lb].

    The ULTRA ULTRASONIC COUNTERMEASURE: Outraged over ultrasonics in yourenvironment? Sickened over ultrasonic surveillance and ultrasonic control signals? About once every 4 seconds,the UUC automatically samples to detect ambient ultrasonic signals (if any) for about 1 second, then based on anydetected ambient signal, generates and transmits the ultrasonic jamming signal towards the ambient signal's sourcefor about 3 seconds. After which it repeats this process until turned Off. Thereby, the UUC is effective even if theambient ultrasonic signal is relatively short-lived, and/or it frequency hops and/or changes directions. Tuning istotally automatic - no fussing with tuning controls! In addition, the UUC lights an LED proportional to the detectedultrasonic signal intensity and another proportional to its frequency , making you aware of any ambient ultrasonicsignals and optimize your pointing of the UUC for maximum ultrasonic countermeasure effects - critical sinceultrasonic signals are highly directional. Input gain is set at an extremely high gain of about 1,000,000 so that evenvery weak ultrasonic signals can be picked up. Effective ultrasonic bandwidth is from about 15 KHz to about 200KHz (frequencies above 200 KHz generally attenuate so greatly in air to be effective only for very short ranges).See above for special deal in getting an ultrasonic detector with the UUC.Last made $1795 [2 lb].

    The HYPERSENSITIVE SOUND ALARM - Ultrasensitive Sound Detector: Have youtried to track down these low, fleeting, distant or faint sounds yourself only frustratingly not being able to hear wellenough or react fast enough to catch them or to determine their sources? Or hired expensive "surveillance experts,""bug-sweepers" or "ghost busters" with same zero results or a bunch of BS? The HSA works by using a highly-directional microphone, super-amplification circuitry, a fast latching circuit (reacts in milliseconds), both a LED andloud beeping alarms (which comes with a volume control and can be disconnected for a silent alarm / secret alarmindication instead) to detect and continuously alert you to low, fleeting, distant and faint sounds in the mike'spointing direction at and within the sound band the HSA is tuned for (if you specified an HSA band). HSA DETECTS CRITICAL LOW-VOLUME, SHORT DURATION BEEPS FROMOTHER ALARM SYSTEMS: Are you missing sounds from alarms or alerts which are so weak and/orshort-duration that you are distracted or sleep through them? Bothered by strange sounds / weird sounds whichseem to come at random or odd times, especially while you are asleep? Unfortunately, many critical alarm systemsput out a few faint beeps and then shut off - critical beeps you can easily miss because you are soundly asleep,temporarily out of the area or distracted by other noises and activities. The HSA is designed to detect such faintand short-duration sounds and continuously put out a loud alarm until you shut it off, it times out (if you set it for a timeduration) or its battery depletes (if you specified battery operation). To remotely monitor the HSA, you can use a babyalarm with it (baby alarm is not included with the HSA unless explicitly contracted for). We believe that for all critical sounds,as many people as possible who consider that sound to be important should be able to monitor it. However, babyalarms are NOT substitutes for the HSA because baby alarms themselves neither detect low-level and short-duration sounds nor do they lock onto any sound. And unlike the HSA, baby alarms are not highly directional (theyalso pick much unrelated ambient noises such as traffic, neighbors, equipment, animals, etc.). This means that if you try to usea baby alarm to substitute for the HSA, and you are even briefly distracted or step out of the baby alarm receiverarea, or you sleep deeply, or the faint short-duration sound is masked by a louder sound picked up by the typicalomnidirectional baby monitor mike, you will likely miss the critical low-volume and/or short-duration critical sound.Also, if the source of the sound or the sound itself you are trying to monitor is expected to soon change but the newsound is also expected to be low-volume and/or short-duration, or there are other faint short-duration sounds youare also interested in, know that the very versatile HSA does a great job detecting and alarming to all types of low-volume and short-duration sounds - the HSA has countless low-volume, short-duration sound uses. THE HSA IS VIRTUALLY IDEAL BUSINESS AND HOME INVASION ALARMS:The HSA, especially the Entire Audio Band (20 Hz - 20 KHz) and the All-Band Audio Plus Ultrasonic (20 Hz - 80 KHz)versions, is a far better preventer of and home alarm system / business alarm system for burglaries and homeinvasions than traditional home alarm systems / business alarm systems because while traditional business / homealarm systems don't typically activate until the criminal has already damaged or invaded or is in the process ofdamaging or invading your property, the HSA (with the HSA inside your home or business) can alarm you even if thecriminal or feral animal is just milling around the outside of your home, business, or nearby car or other property. Asthe result, traditional alarms can activate too late to save you, your loved ones or property. The HSA is also greatagainst criminals casing your home or business, snoops, peeping toms, knob-turners, lay-and-wait ambushers,home-invading creeps, vandals, snatch-and-grab thieves, gas thieves, and unwanted door-to-door solicitors - itssilent alarm / secret alarm feature can quietly alert you to a current or recent invader or snoop without also alertingthe invader or snoop. And as part of a baby monitor, home watch, business watch and nanny watch system. Whenyou or your kids come home to an empty house, is your home really empty? One of the most vulnerable parts ofpeople's homes is their garage - an HSA in your garage can alarm you if someone is trying to break into yourgarage or has enterred through an open garage door. Basements are also vulnerable to home invaders, burglars,murderers and rapists. We all live in an increasingly dangerous world, increased security is now a must. HSA DETECTS DISTANT & REMOTE SOUNDS: The HSA is also highly recommended fordetecting and listening to remote and distant sounds, and may be a real lifesaver in finding lost children andanimals. Also great for bird watchers and other animal researchers, for trackers, for hunters, and for military andpolice uses. With the HSA, you can detect and hear people and animals at much greater distances and long beforethey can hear you - giving you great advantages in many situations. HSA DETECTS FAINT SOUNDS FROM COLLAPSES, CAVE-INS,AVALANCHES, EARTHQUAKES, TSUNAMIS, WA