Mind Control Attacks (MC), Neurological Weapons Attacks, Electronic Attacks, Electronic Harassment (EH), Electronic Implants (EI) and Brain State Control / Brain State Monitoring, Brain Entrainment, Brainwashing, Brainwave Signatures, Mind Reading, Remote Neural Monitoring (RNM), Mind Probes, Behavioral Modification, Body Control, Brain Stimulation, Subliminal Mind Control Programming Technologies, Directed Energy Weapons Technologies, Microwave Attacks, Microwave Harassment, Microwave Mind Control, EMF attacks, EMF Mind Control, Circular Polarized Light Attacks, Carrier Current Attacks, Fluorescent Lighting Attacks, Voice-to-Skull Technology (V2K, V2S), ELF Attacks, Artificial Intelligence, StingRay Devices, Remote Monitoring, Implanted Thoughts, Implanted Fake Memories, Manchurian Candidates, Electronic Gang Stalking, Manifestations, Electronic Countermeasures Customized Device Types!
LONE STAR CONSULTING, INC.
of EL PASO, TEXAS

=>Customized Devices Application Form (CDAF)
All Customized Device (CD) Types (framed page) - All CD Types (unframed page)
Mind Control, Electronic Attack, Unusual, Strange CD Types (this webpage)
These 2017 Catalog Webpages Now on 1G Flash Drive (only $19.95)
Lone Star Consulting, Inc.: (See Our CDAF Page or Sitemap Page for Address)

VOICE (9-5 MST): [915 - 474 - 0334]

Check, Money Order, Money Transfer Service (MTS), Trade
Welcome to Lone Star Consulting, Inc. Electronic implants,subliminal mind control,electronic attack,directed energy weapons research,ultrasonic attack,ultrasonic mind control,infrasonic attack,brainwashing,brainwave entrainment,brainwave signatures,behavior modification,brain stimulations,brain state monitoring,mind reading,manchurian candidates,electronic gangstalking

Contact Us
Email tekmaster@lonestarconsultinginc.com - www.lonestarconsultinginc.com
tekmaster


sitemap - policies
USA Site - No cookies - No adware - No spyware - No trojans - No viruses - No worms - No spam - No popups
We Respect Your Privacy - We do NOT Monitor nor Track Your Activities Online, nor Share Your Data

Our Mind Control and Electronic Attack Webpages:
ELECTROMAGNETIC, MICROWAVE, RF, ELECTRICAL, IMPLANTS MIND CONTROL ELECTRONIC ATTACKS (this page)
SOUND, AUDIO, ULTRASONIC, INFRASONIC MIND CONTROL ELECTRONIC ATTACKS

BUYING FROM US IS SIMPLE: (1) Select the Unique Customized Device(s) You Want on This or Any Other Page, (2) Click on the green CDAF Link above, (3) Print and Complete the CDAF Form (one CDAF for each Device), (4) Mail or Email as a PDF File to Us Your CDAF(s). We Respond to You Within 3 Days About Your Proposed CD Project.

High-Tech Mind Control Attacks, Electronic Attacks, Countermeasures Customized Device Types
Mind Control (Mindcon, MC), Neurological Weapons, Subliminal Mind Control, Body Control (Bodycon), Behavior Modification, Brain Entrainment, Brainwashing, Brainwave Signatures, Remote Neural Monitoring (RNM), Mind Reading (Mindread), Mind Probing, Remote Influencing, Voice-to-Skull Technology (V2K, V2S), ELF Attacks, Electronic Attacks, Electronic Harassment (EH), Directed Energy Weapons Systems, Electronic Implants (EI) and Brain State Control / Brain State Monitoring, Microwave Attacks, Microwave Harassment, Microwave Mind Control, EMF Attacks (Electromagnetic Attacks), EMF Mind Control (Electromagnetic Mind Control), Circular Polarized Light Attacks, Carrier Current Attacks, Fluorescent Lighting Attacks, Brain Stimulations, Implanted Fake Memories, Implanted Thoughts, Manchurian Candidates, Electronic Gang Stalking, Manifestations, Electronic Countermeasures Products and Services.

Unique, Original, Made-to-Order, Special Needs, Unusual, Strange, Weird Customized Device Types We Can Do For YOU! Backed by 25+ years of Professional Design Experience!
Lone Star Consulting, Inc. consulting services


Print, save, bookmark: www.lonestarconsultinginc.com
... and tell your friends!

AARON ALEXIS: Evidence of Mind Control, and Why Mind Control and Electronic Attack Countermeasures are Critical
BASED ON THE OPINIONS OF LONE STAR CONSULTING, INC.: Aaron Alexis was the Sept. 16, 2013, attacker in the Washington Navy Yard mass shootings. Earlier, Aaron Alexis had reported that three men had followed him from the airport, who were projecting thoughts into his mind and keeping him sleep-deprived using a "microwave machine." Also, Aaron Alexis claimed that the Government was attacking him with ELF signals (Extremely Low Frequency signals). Sound familiar? News reports during the shooting spree claimed that there were three shooters, but later said that Aaron Alexis was the only shooter. Earlier, Aaron Alexis visited two VA medical centers for mental therapy. We believe that Aaron Alexis was a VA Manchurian Candidate - a disgruntled loner Veteran targeted, programmed and triggered using EMF mind control technology to do what he did. The three men who followed him were his handlers - programmers and "Queen of Diamonds" "trigger" men - John Doe #1, John Doe #2 and John Doe #3 (supervisor of Doe #1 and #2) - typical set-up. And that the three originally suspected shooters were Aaron Alexis, John Doe #1 and John Doe #2. Why the reported number of shooters changed to one shooter was because while John Doe #1 and #2 were acting suspiciously (staying close enough to Aaron Alexis to control and monitor him), they never fired shots or acted threatenly themselves, so were later discounted. For decades now we have asserted that Manchurian Candidates are being trained in the U.S., and that the VA is complicit going back to the days where the VA used electroconvulsive "therapy" and lobotamies on Veterans. This was not the first horribly violent act in which John Does were implicated - recall Sirhan Sirhan, Timothy McVeigh, other cases. The moral here is that if you are a Targeted Individual (TI) of mind control and electronic attacks - even if not a Veteran - you better take serious steps to ferret out the attacks and to countermeasure them - else you risk possibly becoming the next Aaron Alexis! Mind control and electronic attacks are usually extremely dangerous - even deadly. Our goal is to help Targeted Individuals. Let us try to help you.


The Government Never Stops Doing Mind Control and Electronic Attacks on TIs
Mind control and electronic attacks come from governments (ours and many others), corporations, criminal and terrorist organizations, and technically-adept individuals for many reasons. The U.S. Government spends ever-increasing $Billions every year of tax money on developing mind control and electronic attack weapon systems. This money is scattered thruout Government, and much of it is spent in secret. Most of its mind control and electronic attack technology shortly leaks out to corporations, individuals, and hackers working for foreign governments and criminal/terrorist organizations. And the U.S. Government has a long, sordid history of secretly doing its weapons experimentation on unsuspecting and uninformed American populations. Many people wishfully rationalize that because the U.S. Government is stressed by great debt, or on sequester, or shut down with only essential personnel working, it cuts back on its mind control and electronic attack programs like most other programs. The U.S. Government never shuts down, or even scales back, its mind control and electronic attack research, development, testing and its abuses. Some say it even steps them up to better monitor and control people during bad times. Of course, when U.S. Government law enforcement is viewed as weakened, all the other perps know they can more freely operate against Americans because less Government law enforcement personnel and resources will be available to detect, much less arrest, perps is also weakened.
STINGRAY TARGETING DEVICES (STDs): One of several major examples is the Government's widespread abuse of StingRay technology. StingRay devices mimic cellphone towers by capturing and controlling all cellphone uses in its long reach, and capable of targeting any number of those cellphone users it captures for, "special treatment". At least 13 major Federal law enforcement and surveillance agencies routinely deploy StingRay devices in their "toolkit", including but not limited to, the military branches, FBI, CIA and IRS, plus 100s of state, local and other non-Federal entities, clearly also including private entities. Government agency internal regulations regarding StingRay uses, if any, are secret and vary from none to little. StingRay devices are smaller than a small shoe box, and can be placed almost anywhere, including buildings, vehicles, drones, planes, telephone posts, and even hidden behind non-metallic surfaces, including walls, curtains, pictures, signs and inside valises, backpacks and packages. The purchaser of a StingRay device signs a contract that states that he/she/it will never disclose nor admit to having a StingRay device, so do not expect Government officials and others to even admit generally to mind control or electronic attack - much less do anything about it. StingRay devices are used in secret to track and eavesdrop onto targeted cellphone conversations. More advanced devices using this technology can lock onto brainwave signatures to electronically verify who the cellphone user is, and track that TI, even if he/she switches phones, and even deliver mind control and electronic attack signals to the cellphone user.

ARTIFICIAL INTELLIGENCE DEVICES (AIDs): These days, other governments are now doing even much more mind control and electronic attack research, development, testing and deployment than even the U.S. Government. Especially China, Russia and North Korea. In fact, China is clearly now doing an ultra ambitious "Manhattan Project"-level effort to develop and deploy mind control and electronic attack programs based on Artificial Intelligence (AI). Some say so that the Chinese now have the technology to monitor, surveil and control every human being on Earth down to the brain function level. The idea is to turn everyone into a Manchurian Candidate. Russia and North Korea are clearly similarly engaged. And of course, whatever is developed by governments soon ends up in the hands of other governments, global corporations, criminals, terrorists and tech hackers down the street and 10,000 miles away. The time will come soon when "ransomware" is not going to just apply to computers, but to virtually all human brains attacked, scrambled and shut down by artificial intelligence mind control weapons. Many are reporting Artificial Intelligence attacks against them even today.

Never forget: When the Government and law enforcement fails or refuses to protect you, YOU must protect yourself!

CRITICAL IMPORTANCE OF RESEARCH DONATIONS: Mind control and electronic attacks are the scourge of this century! An horrific scourge that very few in law enforcement will even consider addressing, forcing TIs to go on their own. However, we at Lone Star Consulting, Inc., constantly do research in mind control and electronic attack technologies - for decades now. Clearly, new attack methods are constantly being developed by the perps. Our sophisticated scientific research is very costly to do (try buying a new spectrum analyzer lately?), and is paid for by both Clients who purchase devices from us and those who are smart enough to know that our research findings can translate into detection and countermeasure devices which can be applied to their specific problems and the problems of so many other TIs like them. These donors help support our research with their generous donations. In short, both paid projects and donations are highly welcomed and needed. So please contract for a Customized Devices (CD) project with us. And please donate as much as you can and as soon as you can. For those who provide us substantial donations, we will often steer our research in directions that may specifically help them. Furthermore, if we can find a way to legally provide valued donors the devices of interest to them that we do not normally provide to the general public, even if it requires a special development on our part, we will do our reasonable best to accommodate their specific needs. How much we are able to bend over backwards for a donor depends on the type of research, the device types the donor is interested in, and the relative magnitude of his/her donations compared to other donors also seeking our help relevant to the same research. We very strongly appreciate our valuable supporters, so please donate.

Our Mind Control and Electronic Attack Countermeasure Devices Now Come With Advanced Transient Suppression!
Many people these days, especially Online, claim to sell mind control and electronic attack countermeasures and detection devices. Clearly none of whom can match the relevant highly-specialized knowledge, experience, equipment, parts, specialized materials, tools and facilities of Lone Star Consulting, Inc. to actually be able to help mind control and electronic attack victims, and most of whom are clearly outright frauds. Further, we are the only ones we know of who now provide Advanced Transient Suppression Technology (ATST) in our mind control and electronic attack countermeasure devices. All electronic devices can be damaged or destroyed by common high-voltage transients from lightning and defective high-voltage equipment and power lines, electrical arcs and coronas, inductive kicks from high-voltage power interruptions, and static electric discharges. Also, based on what we know, mind control and electronic attack predators are increasingly resorting to directional high-pulse burst transmitters (pulse-type directed energy transmitters), possibly even EMP, to wipeout costly countermeasure devices deployed by mind control and electronic attack victims to protect themselves. Our unique countermeasure devices now come with our ATST protection against up to 1,500 watts of burst energy attack power (at no extra cost) to foil even the most highly dedicated wipeout attack tactics, as well as to help protect you from common forms of high-voltage transients.

We Are Becoming Super Busy - Please Send Us Your CDAF Today!
Due to an apparent serious upsurge of mind control and electronic attacks and more people learning about us, we are becoming loaded up with new projects. Please do not delay with your project(s). Upon deciding what you want us to do for you, please click on green CDAF link at top of page and send us your CDAF(s). Note: Mostly due to ever-increasing parts costs and decreasing availabilities, we expect to raise our prices on some of our device-types in the coming weeks and months. Also, we may have to discontinue some device-types - later availabilities not guaranteed. Please send us your CD Project CDAF (green link at top of our webpages) today.

We Are Now on Social Media - Please Join With Us!
FACEBOOK and LINKEDIN
JOIN US ON FACEBOOK AS OUR SOCIAL MEDIA FRIEND AND/OR ON LINKEDIN AS OUR SOCIAL MEDIA CONNECTION! As you likely know, we recently joined FACEBOOK and LINKEDIN social media. To join us, you must first email us directly to LONE STAR CONSULTING, INC., and explain to us why you want to be social media-connected to us. NOTE: We never accept such requests when they solely come through our social media sites - we regularly receive 100s of such requests mostly from totally unknown people. We are very selective - your acceptance is much increased if you are a prior or current Client, or a relevant serious researcher, expert, scientist or engineer. We are constantly engaged in much exciting work that we would like to share with our social media friends and connections. Most of our discussions on Facebook and LinkedIn will relate to mind control, electronic attack, radionics, physical survival and energy through increasingly worsening times. One big benefit is that LONE STAR CONSULTING, INC. will provide free information found nowhere else (e.g. research results), which may be very helpful to you. Another big benefit is that you will be able to share your experiences and needs with others who may be or were in similar situations (e.g. you are experiencing certain types of mind control attacks, which may also be afflicting others in your area). We do not accept just anyone as our social media friend or connection - we seek a smaller but more focused and intense group. Interested in us friending you? Then email us here, and in your Subject Line, put: "Please Friend Me". In your email body, please explain in 100-500 words the benefits to both of us in becoming social media friends (Facebook) or social media connections (LinkedIn). Then tell your friends and connections about us! NOTE: With few exceptions, we are not going to post up our friends on Facebook and connections on LinkedIn until we have selected at least 500 Facebook friends or LinkedIn connections. We are not yet on Twitter or MySpace. - Thanks. John J. Williams, M.S.E.E.

Short of money? We do encourage mutually-beneficial trades that can save YOU a lot of money (e.g. electronic parts & test equipment, computer & modern computers, etc.) ==>

Electronic implants,electronic attack,subliminal mind control,ultrasonic attack,infrasonic attack,brainwashing,brainwave entrainment,mind-body,body-mind,devices services,custom made devices,special projects services,high-tech,security,survival,hardware,circuits,hi-tech,designs,electronics,electrodes,magnetic fields,emf,spy agencies,plans,professional consultants,consulting services

Hello! We support many technologies. For introduction into how to obtain hardware and our design philosophy, please go to our Home Page: Home. Hotlinks to all of our Device Types: Devices. Hotlinks to all of our high-tech Topics, Titles: Site Map. When you are done, please use your Browser's Back Button to return here.


Can you spot electronic implants, and the wire?
This is the actual CT-Scan of the chin, neck and upper back area of one Gary D. Simmons of Australia, a former Navy diver who had been assigned to several clandestine operations, reprinted with permission from Simmons and Consumertronics.net. According to Mr. Simmons, one 'object' is in the spine at the jaw level; the hole in the back of the neck shows a 'wire' running down towards a second 'object' located between the trachea and the spine; there is yet a third 'object' below the jaw. I see other strange 'objects.' Do you? Furthermore, he states these were the results of a surgical operation and an official program in which he and about 100 other elite Navy divers were subjected to as part of, 'medical and mind drug experiments,' which he claims caused many premature deaths among them!
For more info on this image and amazing story => www.harold-holt.net (click on Page 2 hotlink on its bottom), then return HERE!.
DO NOT LET THIS KIND OF TRAVESTY HAPPEN TO YOU!

Recently, Lone Star Consulting, Inc. has received frantic calls involving great fears and concerns about an apparent recent alarming, shocking and frightening upsurge in mind control (mindcon), body control (bodycon) and other electronic attack and electronic harassment incidents (often also referred to as "directed energy weapons attacks" or "psionic attacks"). Clearly, these forms of electronic harassment attacks greatly increased since 9/11, and especially recently due to political and economic chaos. With chaos, electronic attacks are more likely ignored by the authorities, and victims become more hassled with other issues and more cautious about spending money even to protect themselves. Clearly, some electronic attackers are now electronically attacking their victims with impunity - more open electronic harassment attacks, accelerated electronic attacks, and more severe electronic attacks than ever before! If you do not believe that mind control and electronic attack devices are real and effective weapons - research these topics Online. Even so, what you will find is just a small bit of what is actually being done in these frightening and devastating technologies - no longer science fiction, even some now beyond science fiction. Most of the R&D is being done on top secret bases (eg: black projects) by our Government, various other governments, corporations, universities, criminal and terrorist organizations and individuals for numerous reasons. Today, virtually anyone who is a competent electrical engineer or electronic technician can design and make at least a crude mind control electronic attack weapon. One of many examples: We know that there were widespread uses of mind control devices in close states on election day in 2016 near polling places mostly by foreign perpetrators, which clearly dictated the final election results. Are you such a TI victim? It is more important than ever before for YOU to address these issues NOW! Our Government will likely never admit to these technologies, nor recent advancements in them, so it will do little or nothing to help you. As a TI, you are on your own! We believe we can help you. Lone Star Consulting, Inc. provides as a free public service by providing the free mind control / electronic attack tutorial, link below (as well as many very exciting and unique related device types described below) for those interested in electronic mind control (including RFID), electronic attacks, direct energy attacks, electronic harassment, brainwashing, brain entrainment (e.g. binaural beats), brain signatures, mind reading, voices in the head (e.g. voice-to-skull or V2K/V2S technology (Frey Effect / microwave hearing effect), and voice-of-God technology), Tempest brain monitoring, electronic body control, electronic implants and brain state control / brain state monitoring, Manchurian Candidates, and similar technologies and their countermeasures:

Lone Star Consulting, Inc. Free Mind Control / Electronic Attack Tutorial
(If you go to read Free Mind Control Tutorial, when done, hit Browser's Back Button to return here)

Microwaves (and ultrasonic sounds and infrasonic sounds) require the specialized device-types we provide (described below) to detect and countermeasure them because they can't be sensed by normal human senses and their directions (many are highly directional), bandwidths and ON times must be first determined before they can be documented or countermeasured (note that infrasonic sounds appear to be omnidirectional, thus location-finding can be very difficult, and infrasounds are thus also very hard to countermeasure, especially if source is distant). You may need to prove the existence and specific timing and location of the mind control and electronic attacks (within the applicable statutes of limitation), and then correlate your manifestations with these attacks against you. Even then, to obtain substantial results you would have to show that you mitigated the mind control and electronic attacks to minimize your injuries, such as by jamming it (which requires specialized electronic attack and mind control countermeasures equipment of the types we also provide), and/or shielding against it. And if you do all of this yourself as soon as you can, you stand a much better chance of getting law enforcement to take a serious look at your case as well. In virtually all cases, YOU, AND YOU ALONE, must obtain justice in these types of cases (see our Mind Control webpage for specialized equipment). You might fairly ask, "How can I document mind control and electronic attacks using your specialized equipment?" Permanent directional-recording and time-stamped recording circuitry are very expensive because they add complications to any device made by anyone. However, there is a cheap, easy and very credible way to do this. Use a video camera and make a videotape or video disk of your experiences, which will document your equipment set-ups, and its responses. Most modern cellphones have videotaping capabilities. Leave a visible TV ON in the background and an accurate clock so that you can also time- and date-stamp your videos. And/or have a reliable and credible witness(es) with you.
             TIs often ask us (after reeling off several major bad manifestations they suffer from), 'What type of EMF causes these things?' We tell them, there are so many different popular modern wireless technologies today for possible mind control and electronic attack exploitation, that it boggles the mind. Just to name some: 1G/2G/3G/4G/5G (Cellular Bands), 802.15.4 (2.4GHz), Bluetooth (2.4GHz), LoRa (<1GHz), LTE Cat 0/1 (Cellular Bands), NB-IoT (Cellular Bands), SIGFOX (<1GHz), Weightless (<1GHz), WIFI (2.4GHz and 5GHz, <1GHz), WirelessHART (2.4GHz), ZigBee (2.4GHz), Z-Wave (908.42MHz), plus others and more to come. The Cellular Bands are the 824 - 896MHz, and 1850 - 1990MHz bands. NO NEED TO THROW YOUR ARMS UP IN DESPAIR! We offer excellent solutions. For example, a major reason why so many of our TI Clients contract for our Shielded Helmet and Shielded Cap (described below) is that it makes little difference which wireless technology is afflicting them, what frequency it is on, where the external transmitter is located at, how the signals are modulated, what the perp's transmission schedule is, or even if the signals are or are not intentionally malicious, our Shielded Helmet and Shielded Cap will do excellent jobs to protect your brain because very little, if any, of these harmful signals will reach your brain. Nor does the type of wireless technology used against you much impact the functions of our EM Direction Finder and EM Triangulator (described below).
             QUESTIONS ABOUT EMF SHIELDING MATERIALS: Over the years, many TIs have asked us about EMF shielding. Many of them made grossly erroneous statements about EMF shielding, based on misinformation and disinformation they heard elsewhere. The biggest error is about aluminum foil shielding - which we call the "aluminum foil beanie myth" (decades ago, it was called the "tin foil hat" myth). Many believe that aluminum foils and copper foils greatly shields against BOTH the electric and the magnetic components of EMF fields. The second biggest mistake is to believe that some plastics impregnated with carbon (go by various names) also shield against mind control and electronic attacks; these carbon-impregnated materials did worse in our tests than even aluminum and copper to shield against EMFs. Costly carbon impregnated materials (eg: carbon composities) do work well in shielding against static electricity (but not as good as aluminum foil or copper foil), but very poorly against EMFs (their resistances are relatively high and vary wildly based on formulation and condition):
             (A) No shielding material, no matter what type, arrangement or thickness shields against 100% of an EMF signal; but 99.999+% shielding is possible). We know of no case where a weak offending signal caused mind control or electronic attack - all effective mind control and electronic attack EMF signals are of at least moderate intensity - therefore, even if you are being attacked by an intense EMF signal, with excellent shielding you can reduce it to a pipsqueak, thereby protecting yourself from being attacked. You need shielding much more effective than just aluminum foil.
             (B) How well a metal shields against any signal depends on whether the signal is electric or magnetic, the intensity of the EMF signal, the frequency and waveform of the EMF signal (especially above 10MHz), the EMF shielding metals, the arrangements of the EMF shielding metals, the thicknesses of the EMF shielding, and the distance the EMF shield is to the transmitter (to a smaller degree).
             (C) The goal of the EMF shielding is to MINIMIZE SIGNAL STRENGTH of the EMF signal passing thru it, so that the offending external transmitter's signal is attenuated (ie: reduced) as much as possible by your EMF metal shielding to protect YOUR brain and/or body. Attenuating a mind control signal by just a little clearly does not help you, and an aluminum foil beanie acts like a parabolic dish reflector (possibly injuring you even much more by focusing EMF signal reflections onto critical parts of your brain, see below).
             (D) EMF shielding is a very complex technology, but we try to make it simpler here:
                 (1) From our research, about 99% of all EMF mind control and electronic attack signals are at frequencies between 50MHz and 2.4GHz.
                 (2) In most situations, reflection losses are less than 10% of absorption losses in metal sheeting (but are much greater than 10% in the special non-sheeting shielding metals we use).
                 (3) The losses stated below are the absorption losses only of aluminum and iron metal sheeting to show you how far greater iron (a ferromagnetic metal) shields against EMF when compared to aluminum (a non-ferromagnetic metal; copper is a slightly better shield than aluminum).
                 (4) METAL TYPE/THICKNESS/SIGNAL FREQUENCY vs EMF ABSORPTION LOSSES (DB):
                               (A) ALUMINUM: Thickness: 0.1mm (about 4 mils, the thickness of some aluminum foils): Signal of 100MHz: 192db; 1GHz: 412db. --- Thickness: 1mm (about 40 mils): 100MHz: 1,149db; 1GHz: 3,361db.
                               (B) IRON: Thickness: 0.1mm: Signal of 100MHz: 1,247db; 1GHz: 3,986db (NOTE: Nearly 10 times more protection in decibels than aluminum!) --- Thickness: 1mm: 100MHz: 12,4651db; 1GHz: 39,419db (NOTE: Nearly 12 times more protection in decibels than aluminum!).
                 (5) This clearly shows that iron provides far greater EMF shielding than does aluminum (non-ferromagnetic metal). It is not even close!
                 (6) Mu-metal shields much better than even iron but is more expensive. Mu-metal saturates at lower magnetic field levels than iron, thereby making mu-metal less protective in very intense magnetic fields (eg: electric power stations, high-voltage power lines, large electric transformers). For mind control attacks using magnetic field signals, the magnetic field intensity is almost always below the metal saturation point because mind control does not require very high-powered signals - just moderately powered signals of the right frequency and waveform (however, some perps may use EMF signals so intense that they can cause dangerous heating of the skin and/or internal organs, possibly even burning them).
                 (7) Some of our device-types (below) employ shielding, and all of our EMF shielding device-types include mostly ferromagnetic metals, optimally arranged for maximum EMF shielding effectiveness.
             ELECTRONIC PATCHES (ELECTRONIC IMPLANT VARIATION): Electronic Implants are almost always internal devices, around now for decades, that come in various sizes (some now are tiny), shapes, favored implant locations, and functions and capabilities. These electronic implant capabilities include radio and/or ultrasonic transmission by and/or to the electronic implant, or no transmission or reception ability at all (almost all of these types are pre-programmed using AI to last for months and years). Most now clearly include built-in GPS to track you 24/7. Most are active, but some are passive. A new variation of the ELECTRONIC IMPLANT is the ELECTRONIC PATCH (also called, ELECTRONIC TATTOO, and SMART STAMP), which is usually applied externally but may also be applied internally. The Electronic Patch is a small, flexible and stretchable electronic circuit with a strong but non-irritating adhesive, quickly and usually secretly externally applied to the body in places not normally viewable by you or those close to you. The external-type electronic patch is as thin as a human hair, about the size of a postage stamp, and of the same color and texture as normal skin to mimic human skin. Electronic Patches can come with the same capabilities and functions (above) as traditional Electronic Implants. Electronic patches are designed to last for days, weeks and even months. External electronic patches require no surgery. With modern electronic implants and electronic patches, your data (including body signals, locations, etc.) are automatically and non-periodically transmitted to the Internet "cloud" in RF bursts that appear to be electronic noise. Electronic patches can also receive signals, and/or be pre-programmed. As with modern internal electronic implants, the transducers used in electronic patches can now be chosen from a menu of transducers by perps to suit their particular needs, so a huge and increasing number of variations are possible. Electronic patches can also be applied to things external to you, such as inside or outside of books, magazines, clothing, electronic devices, equpment, tools, vehicles, etc., almost always for surveillance and tracking purposes, and as transceivers for electronic implants and electronic patches applied to your body.

NOTE: Some believe that claims of mind control are false. Consider: Recently, MIT developed the technology of remotely and electronically implanting fake memories (implanted false memories) and implanting thoughts into brains. And this is just the mind control research allowed to be published! For much more, click on our "Free Mind Control and Electronic Attack Tutorial" link below. It has much more real and helpful mind control and electronic attack information than any other website we know of. The mind control and electronic attack books and manuals of Consumertronics (www.consumertronics.net/mindcontrol1.htm) also contain important mind control and electronic attack information, including many circuit diagrams and other figures not found in our Free Tutorial.
Lone Star Consulting, Inc. Free Mind Control / Electronic Attack Tutorial
(If you go to read Free Mind Control Tutorial, when done, hit Browser's Back Button to return here)

Dedicated to Defeating Mind Control Tactics / Mind Control Strategies and Electronic Attack Tactics / Electronic Attack Strategies of all Types

DISCLAIMER: OUR MEDICAL/DENTAL POLICIES REGARDING ALL OF OUR OFFERS FOUND EVERYWHERE: NOTE: The term, "Medical" and related terms in all of our webpages, include ALL medical fields, including, but not limited, to ALL dental fields. While we do recognize as a simple fact of life that once a buyer buys any device from a seller, the seller has no control over what the buyer may actually use the device for nor does the seller assume any responsibility to anyone if the device is misused or abused, and that people have the right to choose whatever form of medical care they prefer, we are not licensed to practice medicine, and therefore we cannot and do not provide any medical advice, medical opinion, make medical claims, nor scientific claims, nor tell you what the causes are for any medical-like manifestation; nor anything we may provide you is to be used for a medical prevention, diagnostic, treatment, cure or medically-assistive reason; nor to in any manner stop, interfere with, change or replace any medical procedure or drug prescribed or likely to be prescribed for you by any trusted licensed medical entity. All medically-related statements which may be made by us are lay, anecdotal and personal opinion type statements only. If you are suffering from medical-type manifestations, we always recommend that you first obtain a complete medical exam from trusted medical professionals (at your expense) to eliminate all medically-caused manifestations. Furthermore, we cannot produce a device which is intended or likely to be used as a weapon, to retaliate against anyone or which inflicts injury, pain or suffering to any person or animal, or which is otherwise illegal, unethical or immoral. So please do not try to contract us for any device to treat, cure, diagnose, prevent or assist a medical condition, is likely to harm any person, animal, or property of others, or likely to be illegal, unethical or immoral.

HOW TO PICK THE RIGHT DEVICE TYPE FOR YOU: If not a medical condition, your manifestations may be caused by several different electronic attack / mind control scenarios. You must analyze your situation, by asking yourself and answering these questions: (1) When do these manifestations occur? (2) Where do they occur? (3) Do the manifestations follow you all over? (4) Do they occur all together, or do you get one or some sometimes and another or others other times? (5) Is there anything you are doing which changes their intensity and/or frequency either up or down? (6) What is your body position when they occur? (7) What activities are you engaged in at the time? (8) Do you have any idea where the offending transmitter may be located and/or who operates it? (9) If you place a heavy wool blanket or sweater over your head, do they still occur? (10) If you place a large and deep steel pot over your head, do they still occur? (11) Have you observed any unusual or strange behavior by those suspected? (12) Is their behavior a predictor of a current, past or an upcoming attack? (13) Is your behavior a predictor of a current, past or an upcoming attack? (14) Is there anyone else around you or in a similar situation who you know of also experiencing similar manifestations? (15) Do other people, pets or other animals around you act differently just before or while you are experiencing your manifestations? (16) Are you receiving electrical shocks when you touch metal surfaces or run water? (17) What have the police, FBI, FCC, your doctor, etc. tell you about your manifestations? Please note that as policy we cannot recommend any device type as a device type which will stop your manifestations - this decision is left totally up to you. While we do guarantee that any device we provide you will electronically function as specified, since we have no way of being able to ascertain your situation ourselves, we cannot guarantee that the device will lessen or stop your manifestations.

Short on Money to Get What YOU MUST HAVE?
Hard Economic Times makes it difficult for many good people to defend themselves against all kinds of dangers, including Mind Control Attacks and Electronic Harassment. WE CAN HELP YOU!
All of our devices are unique and professionally handmade in the USA. That is why they cost more than the mass-produced foreign-made electronic devices common to discount stores. Our resulting higher prices means that many good people may find our CD projects hard to afford. To make it much easier for stretched people to obtain our unique Customized Devices, we now offer our special Lay-Away and Barter and Collateral Plans (use them individually or in conjunction with each other) as added means to obtain our products and services. For more details, click on: Our Easy Payment Plans, then click on your browser's backbutton to return here.

ADD A NEW ELECTRONIC FREQUENCY COUNTER TO YOUR CUSTOMIZED DEVICES: Many of the Device-Types described herein automatically come with displays. These displays may consist of meter-type digital readouts, analog readouts or LEDs. Now you can add a new small and portable Electronic Frequency Counter (EFC) to any Customized Devices (CD) device you contract for with us (includes, but not limited to the Device-Types described herein) which processes or produces a sinewave, square wave or triangular wave between 0.009 Hz and 99,999 Hz. Be sure to specify an EFC for YOUR device CDAF (green link at top of webpage is CDAF; only $99 extra for the EFC, $49 extra to modify each device to be EFC-capable). With an EFC, you can monitor the entire effective air bandwidth for infrasonic, audio and ultrasonic sounds, as well as electromagnetic signals within this same bandwidth - including brain wave frequencies and many power, servo and control frequencies! This should greatly increase your data and documentation, and is especially useful for tracking and analyzing mind control, electronic attack, radionics, audio, power, servo, control and other signals. Since the EFC comes as a separate module which plugs into your CD devices, all you need is one EFC for all of your EFC-capable devices, PLUS you can use your EFC for other non-CD devices and uses. We can sell you the EFC by itself custom-modified with battery holder and ON/OFF switch, if you wish, and with any of these types of signal connections: RCA, phone plug, miniphone plug, BNC, USB, spade lug, flat lug, ring lug, banana, pin, barrel plug, bare wire ($249 + S/H ($6.90 USA S/H)).

Introduction to this Page
Customized Devices Application Form (CDAF) Webpage

MIND CONTROL, ELECTRONIC HARASSMENT
ELECTRONIC ATTACK DETECTION, COUNTERMEASURES:
We make no device intended for medical use and we make no medical, supernatural, paranormal or psychic claims (details below)

MIND CONTROL & ELECTRONIC ATTACK ANALYSIS REPORT: Are you a Targeted Individual (TI) being attacked by perpetrators using mind control and electronic attack devices? There are so many signals out there being absorbed by your brain and body, while most are not malicious, how can you tell for sure which signals are harmful or malicious to you? Due to popular demand, we are now offering our MC&EAAR service. How this works is that you provide us your data points on the signals you receive using either a detection device we provided you as an earlier separate unique CD Project (see below for detailed descriptions of our popular mind control and electronic attack detection device types) or from your own signal detection equipment. We then objectively analyze your data points, and provide you a written report on our analysis of your data points. Your "data points" consists of the detected signal details and the resulting manifestations which you believe were caused by the detected signals. "Detected signal details" consists of the signal frequency, signal strength or signal power (e.g. LED bar readouts, volts/meter, dbm, gauss), direction (if you used a directional antenna) and duration, and the date and time of signal detection. "Resulting manifestations" consists of the physical, electronic, electrical and/or equipment manifestations you experienced shortly after or during a signal exposure, the duration of the manifestations, and date and time of manifestations. One "data point" consists of one line of detected signal details for each detected signal followed by one line of your observed resulting manifestations. Please also include the make and model of your detection device, a sketch(es) of the layout of the place where you experience these signals showing your equipment setup, and any other relevant information which you believe would assist our mind control and electronic attack analysis for you.
             Last made $995 [1-5 lb] for up to 100 data points (if your data points exceed 100, add $75 for each additional 10 data points) you need analyzed. (NOTE: We provide a 10% discount for our MC&EAAR services if your detection device is one which we provided you earlier as a separate CD Project (detailed descriptions of our popular mind control and electronic attack detection device-types below); the estimated costs by us is for the analysis and report only, it is not a retainer of any kind and does not include any mind control or electronic attack expert witness services or any other services (if you require additional services from us, you must provide us a new CDAF form for each additional service for us to consider), it does not include any hardware of any kind, and it does not include any onsite visits (we do not personally meet with Clients) or travel by anyone; our analysis is solely based on the information provided to us by the Client with his/her CDAF and assumes that the Client's information is 100% accurate and complete; Client assumes full responsibility for the accuracy and completeness of all of his/her information; our analysis shall be objective, unbiased and with an open mind even if it differs with the Clients own opinions or analysis; we will not identify any alleged perpetrator(s) or their motives or intentions as that is beyond the scope of our direct knowledge; and Client's costs are totally non-refunable once we have completed our analysis).

The ULTIMO EMF & ULTRASONIC HEAD SHIELD PROTECTOR (Shielded Helmet): Ferromagnetic head shields (brain shields) are the best and most cost effective methods to protect the human brain from being read and tampered with using electromagnetic fields or ultrasonics. This (UEMF&UHSP) is our most advanced and improved version of our popular head shield / brain shield. The UEMF&UHSP is head shielding (brain shielding) which protects the head and brain of the protected Targeted Individual from virtually all of the exposure he/she experiences from EMFs (Electrical Fields and Magnetic Fields) and ultrasonic attacks to the brain (those which may cause remote mind control / thought control, behavior control, thought monitoring, voice-to-skull (V2K, V2S), mind reading, remote neural monitoring (RNM), forced "voice of God" hallucinations, mind games, disorientation, pain manipulation, etc.), brain scans, brain tracking and brainwave signature readings. And if you are afflicted by a head implant(s) (including electronic patch-type implants), it also protects against the electronic implant(s) from communicating with (ie: both transmitting to and receiving from) outside devices using radio frequencies (e.g. microwaves, RF) and ultrasounds (we can also include infrasonic protection).
             If you are experiencing attack-caused manifestations to your body, the Shielded Helmet (or Shielded Cap, see herein) should help tremendously if the perp's malicious signals are irritating parts of your brain that control those parts of the body undergoing the attack. However, the Shielded Helmet (or Shielded Cap) may not substantially affect the manifestations of attacks to your body where the tissue or organ is being directly attacked by the perp and not thru the brain connection to the tissue or organ, in which case, see The Ultimo Full-Body Shielded Raincoat herein.
             CAUTION: You cannot adequately shield your head by wearing a head covering with aluminum foil because your face is still exposed, and aluminum foil does not shield against dangerous magnetic fields. In fact, such a cartoonish aluminum foil cap / aluminum foil beanie much worsens frontal attacks because the offensive signals pass through your brain from your face to the back of the skull, and then reflect off of the metallized cap/beanie to pass through your skull and brain again from back to front in a much more focused form because the rounded shape of the metallized cap/beanie is very similar to that of a parabolic dish and thus will likely focus EMF fields and ultrasounds in or near the brain's frontal lobe, the cognitive center of the brain.
        Here is how this UEMF&UHSP CD project works:
          (1) Send us your CDAF (green link at top of page).
          (2) When we respond with time and cost estimates and you agree to these estimates, obtain a padded motorcycle helmet, football helmet, aviator helmet or similar of your choice (or we can obtain the helmet for you at added cost, see below) which best fits your head well and comfortably and that you like (at your expense; some bike helmets may not work well) for your helmet head shield / brain shield (helmet should be new or in excellent used condition). If you intend to sleep with the helmet On (many reports of TIs being electronically attacked during sleep), obtain a helmet also safe and comfortable for you to sleep in. NOTE-1: We can also buy the helmet for you - especially nice if you live overseas (to avoid delays and large extra S/H), just for convenience, and/or to avoid possibly tipping off your perp. Just provide us the make, model, size, style and color of the helmet (and helmet seller URL if you have a preference) you want in your CD Application Form (CDAF). NOTE-2: If possible, provide us a helmet that looks like a Gringo helmet (it does not have to be Gringo helmet). We find that Gringo-like helmets are sturdy, come closest for us to provide the Client maximum shielding, and is easier for us to work with.
          (3) Ship to us (at your expense) your chosen helmet (if you obtain the helmet).
          (4) We will then custom-modify it here with both EMF and ultrasonic shielding.
          (5) Upon successful completion, we will promptly ship to you your customized Head Shield Protector - Shielded Helmet - to you.
        To shield the front of your helmet to protect your head from frontal attacks, we place a metal screen in the normally open helmet visor area (screening is used so that you can breathe and see; the helmet's visor should be removable). This screening material will to some degree limit visibility (like looking through a window screen ). Therefore, we do not recommend that you wear the helmet when driving, operating equipment, jogging, climbing, balancing, water sports or doing anything else that requires optimum vision or balance (however, if you do fall or bump into things with the helmet On, it should at least provide your head considerable protection from injury). Also, we do not recommend that you stand or walk with the helmet On during times you may be unsteady on your feet. Do not wear this shielded helmet protector without an assistant standing by if you have or develop a breathing disorder or panic attack disorder which the helmet may aggravate in some people.
             Last made $1295 [3 lb (depends on helmet you select)].
                Note #1: Add The ULTIMO SOLFEGGIO FREQUENCY HARMONIZER (see below). We highly recommend that, along with your Shielded Helmet, you also contract with us for the USFH installed into the Shielded Helmet to much increase the positive effects of the Shielded Helmet.
                Note #2: ADD INFRASONIC PROTECTION TO YOUR SHIELDED HELMET: The Shielded Helmet is designed to protect you from EMFs and ultrasounds, however, the Shielded Helmet will also protect you from some infrasounds. While this infrasound protection is modest, it is still much better than having no protection. Infrasound attacks appear to be less common than ultrasonic attacks, but we are increasingly getting alarming reports on it. Robust protection against infrasounds is difficult and costly because it requires even more special materials, due to the physics of infrasound. To also robustly protect you against infrasounds, please contract with us for extra infrasound protection (in your CDAF, specify to add robust infrasonic protection). Note: Once a Shielded Helmet's shielding is installed, we cannot later retrofit it for robust infrasound protection. Last made, the added cost is $195.

The ULTIMO MINI HEAD SHIELD CAP (Shielded Cap): The UMHSC is a smaller, lighter and less conspicuous version of the UEMF&UHSP, as described above. While the UEMF&UHSP is extremely effective to protect TIs from EMF and ultrasonic attacks to the head, some consider it to be too conspicuous to be worn in public, and have asked for a cut-down version which can be secretly worn in public without being conspicuous. The UMHSC is the answer! The UMHSC also shields against both EMF and ultrasonic attacks because it uses the same shielding materials as the UEMF&UHSP. The UMHSC consists of two caps or hats, a larger cap/hat worn on top of a smaller same-version cap/hat. In between the two caps/hats, we install the shielding materials. The bottom cap/hat comfortably fits your head while the larger top cap/hat conceals the shielding material between the two, which is cemented to the two caps/hats. If both caps/hats have a bill (e.g. baseball caps) or rim, we cut off the bottom bill or rim unless you tell us not to in your CD Application Form (CDAF).
             Because the UMHSC does not cover the face area and perhaps some of the sides and back of the head (head coverage depends upon the caps or hats you pick), while it is very effective for the covered areas, the UMHSC is not going to be able to protect the non-covered areas. However, even this limited head shielding should be effective against brainwave signature reading (used to locate TIs for targeting) and mind reading (where a clean EMF signal is transmitted thru the frontal brain and received by a receiver on the opposite side to demodulate out the brainwave signals), as well as reducing the effectiveness of other forms of electronic attacks enough to prevent any or at least enough of the manifestations to thwart or discourage the perps doing the attacks.
             If you are experiencing attack-caused manifestations to your body, the Shielded Cap (or Shielded Helmet, see herein) should help tremendously if the perp's malicious signals are irritating parts of your brain that control those parts of the body undergoing the attack. However, the Shielded Cap (or Shielded Helmet) may not substantially affect the manifestations of attacks to your body where the tissue or organ is being directly attacked by the perp and not thru the brain connection to the tissue or organ, in which case, see The Ultimo Full-Body Shielded Raincoat herein.
             Here is how this UMHSC CD project works: (1) Send us your CDAF (green link at top of page). (2) When we respond with time and cost estimates and you agree to these estimates, obtain* two non-elastic caps (no shower caps) or hats of your choice. The bottom cap/hat should fit your head snugly and comfortably but not tightly. The top cap/hat must be 2-5 sizes larger (caps/hats obtained at your expense; there should be 1/2" - 1" of all-around spacing between the two caps/hats; both caps/hats should be new or in excellent used condition, and good quality). While we prefer that the bottom cap/hat is a baseball cap, other cap and hat types are also OK with us. For the top hat, to maximize shielding materials capacity and thus protection for the Client, we prefer a large dome hat, such as a floppy hat, sun hat, cowboy hat, helmet liner or hard hat (if in doubt about either top hat or bottom hat type, please clear with us first). Describe your caps/hats type(s) in your CDAF. If you intend to sleep with the caps/hats On (many reports of TIs being electronically attacked during sleep), obtain caps/hats which are also safe and comfortable for you to sleep in. (3) Ship to us* your chosen caps/hats. (4) We will then custom-modify them here with both EMF and ultrasonic shielding. (5) Upon successful completion, we will then return your customized cap/hat shield protector UMHSC to you. *NOTE: Your caps/hats are obtained and shipped to us at your expense. We can also buy the caps/hats for you - especially nice if you live overseas, to avoid delays and extra S/H (our cost is added to your CD Project). Just provide us the make, model, size, style and color of the caps/hats (and cap/hat seller URL if you can) you want for us to obtain for you in your CDAF.
             Last made $795 [2 lb]. For optimum head protection, we strongly recommend that you contract both for the UEMF&UHSP and the UMHSC to better meet your various activities (only one CDAF required to contract for both). This rough estimate is for when both caps/hats are baseball caps, both caps/hats are provided by you, spacing between caps does not exceed 3/4", and you don't want parts of the top hat also shielded (e.g. shielding its brim for extra protection).

Lone Star Consulting, Inc. Beanie or cap with aluminum foil shielding,electronic implants,subliminal mind control,electronic attack,directed energy weapons research,ultrasonic attack,ultrasonic mind control,infrasonic attack,brainwashing,brainwave entrainment,brainwave signatures,brainwave entrainment,behavior modification,brain stimulations,brain state monitoring,mind reading,manchurian candidates,electronic gangstalking
Lone Star Consulting, Inc. Shielded Helmat and Shielded Cap,electronic implants,subliminal mind control,electronic attack,ultrasonic attack,directed energy weapons research,ultrasonic mind control,infrasonic attack,brainwashing,brainwave entrainment,brainwave signatures,behavior modification,brain stimulations,brain state monitoring,mind reading,manchurian candidates,electronic gangstalking

The ULTIMO SOLFEGGIO FREQUENCY HARMONIZER: Our USFH device-type is a system which accurately produces the six (6) legendary Solfeggio frequencies, plus four (4) additional freqs some have associated with the Solfeggio Scale. These 10 Solfeggio Scale freqs were and are claimed to be used in ancient and soulful Gregorian Chants - which has mesmerizing effects (hypnotic effects) since Medieval times - but actually originating from natural sounds (e.g. ocean, rain, wind, etc.). The Gregorian Chants literally digs down deep into the very souls of people to produce unbounded euphoria, spiritualism, health, growth, connections, concentration, relaxation and rejuvenation. Today, the Solfeggio Frequencies are also used to greatly reduce or nullify the bad and negative effects of mind control and electronic attacks - great countermeasures against mind control and electronic attacks by jamming and overcoming negative energies transmitted into your brain as signals or triggered inside your brain due to previous mind control entrainment. We highly recommend that you ask us to build your USFH into a Shielded Helmet for you (see above) to much enhance the Shielded Helmet's capabilities to protect and rehabilitate your brain from mind control and electronic attacks. The Shielded Helmet creates the ultimate electronic quiet zone so that the Solfeggio Frequencies can produce maximum positive effects on your brain - just as you enjoy and benefit from great music a lot more in a peaceful quiet room than one filled with chaos and noise.
             The 10 vibrant Solfeggio Frequencies and purported benefits, and uniquely and accurately tunable by the USFH:
                SL (174 Hz - Love, Security, Warmth).
                RES (285 Hz - Restoration, Revitalization, Energy).
                SA (333 Hz - Sexual Attraction, Athleticism).
                UT (396 Hz - Liberates Guilt, Quells Fears).
                RE (417 Hz - Undoing Bad Situations, Facilitating Beneficial Changes).
                MI (528 Hz - Transformation, Miracles, DNA Repair).
                FA (639 Hz - Connecting, Re-Connecting, Nurturing Relationships).
                SOL (741 Hz - Improves Cognitive Powers, Awakening Intuition, Psychic Powers).
                LA (825 Hz - Achieving a Spiritual Plane, Spiritualism, Soul Ascendency).
                PP (963 Hz - Prophetic Powers, Communicating with God).
             Certain frequencies have long been known to have vital positive effects on people's lives and well-being. Other frequencies are dissonant, annoying and even harmful to people. This is why you like music. And why you hate the screeching of chalk on a blackboard. Back in the day, we used to talk about "vibes", sayings such as, "she has good vibes", "he gives off bad vibes", etc. "Vibes" clearly is just short for subconscious vibrations, otherwise known as frequencies, tones, oscillations and pulsations. We also talked about "clicking", such as, "I really clicked with her" - biological frequency synchronization. Today, we talk about "making connections", "soul mates" and "soul works" - again, vibrations' critical roles. This is why some natural sounds (such as those integrated into Gregorian Chants), like ocean waves, rain, wind, etc. help us meditate, relax, sleep better and concentrate more. The USHF basically produces purified and enhanced tonal forms of these natural sounds.
             Almost all Solfeggio devices these days are silly tuning forks. No one is going to be hitting a tuning fork every minute to produce an audio tone which can be produced automatically and continuously using electronics, even while you sleep or doing other things. And if you want to change the tone, you have to pick up another tuning fork. And if you touch the tuning fork against anything, its sound distorts and dies right away. The USFH is extremely versatile because it is designed to produce all of the 10 Solfeggio-related freqs in both sound and electromagnetic energy, and in several waveforms (sinusoidal triangle wave, square wave, and pulses (tunable from 10% duty cycle to 90% duty cycle) - you select). And it allows you to tune in all of the Solfeggio freqs.
             MIND CONTROL & ELECTRONIC ATTACK COUNTERMEASURE: The USFH is not only great for meditation, relaxation, sleeping, restoration, and recovery from illness or injury, but it is also great for neutralizing the effects of negative energies by jamming and overcoming them using both sound and EM fields, such as those negative sound and/or EMF signals produced by mind control and electronic attack devices. The big advantages of the USFH over more targeted mind control / electronic attack-type jammers is that you don't have to know what the offending freqs are, where they are coming from, when they are turned On, or when or how often the perp switches freqs. You just turn the USFH On, and keep it on or near you.
             The USFH, as with all of our devices, comes with a User Manual. The USFH includes quality headphones (unless the USFH is built into the Shielded Helmet or some other device), which while designed to be used on the head, can also be placed on other body parts, such as an arm or leg to play the Solfeggio tones through other parts of your body (we can even modify headphones for special applications, such as chest and stomach placements). The USFH also includes non-invasive electromagnetic coils.
             Last made $1495 [3 lb].
                Note #1: With two USFH units, you have a truly superb and delux Solfeggio binaural beats system or other dual-tone system by setting one USFH device to play one tone and the other USFH device to play another tone. Binaural beats systems are used in brain entrainment, neurological, psychological, physiological, psychic, therapeutic, learning, creativity, and hearing research. Binaural beats systems are another countermeasure against mind control and electronic attacks.
                Note #2: As with all of our device types, the USFH is a unique Customized Devices project, so we are not limited to the freqs suggested above. You can substitute any or all of these freqs just by specifying in your CDAF your freqs, limited to the 100 - 10,000 Hz range and to no more than 15 freqs (additional costs may apply).
                Note #3: While we can modify the Shielded Helmet for a USFH, we cannot do that with the Shielded Cap. Also, it is much cheaper and faster to contract for the Shielded Helmet and USFH together, compared to first contracting for the Shielded Helmet, and then later having us retrofit it with the USFH because that requires removing some shielding and then replacing it once the USFH is installed.

The STEALTH PAINT "ELIXIR": The SPE is the top secret Lone Star Consulting, Inc.'s proprietary formulation of certain paint pigments and additives which are easily applied to the outside and/or inside surfaces consisting of woods, drywall, plastics, adobe, metals, composites, concrete, cement, mortar, asphalt, brick, stone, ceramics, etc. The SPE is specially designed to greatly cut down on direct, reflected and scattered microwaves, including radar returns. The SPE is a stealth coating material that can be used to paint homes, businesses, other above and below ground structures, vehicles, watercraft, some aircraft, composite surfaces, other shielding materials, etc. (even if previously painted or coated), to help protect people inside them from surveillance, targeting, mind control and electronic harassment, dangerous microwaves, and ground-penetrating radar (legal uses only). The SPE is great shielding against EMFs, but is minor shielding against ultrasounds, sounds and infrasounds.

How much Stealth Paint one needs to cover a surface depends on the following:
...(A) The Area to be covered (for best protection of rooms, walls, ceilings and floors (except bottom level floor) should be 100% coated). How many square meters or square feet are your surfaces you need to cover?
...(B) How many coats of Stealth Paint do you need to apply? The more coats, the more protection.
...(C) How absorbent to paint is your surface? For absorbent surfaces, you will need more paint coatings.

Once you derive your total Area figure above (Area X Number of Coatings), go to a paint store. Look at commercial oil-based paint containers (ie: cans), which state on the can's label what area the can will cover. This figure is clearly exaggerated; we have found usually by about 20%, so your should multiple the label square foot by 0.8 (80%). Then compute how many store paint cans you would need if you used the store's paint to coat your total Area. Determine the weight of the contents of each can (if not on the label, weigh a full can and an empty can, and subtract the two weights for the weight of the can's contents only). Multiply the number of cans you will need by 1.05 (105%; the 5% for paint wasted by spillage, drippings, evaporation, etc.). Then multiply that figure with the weight of the paint per can to derive total required SPE weight. The total required SPE weight is what you will need to order from us; email us this weight figure (on email Subject Line, put STEALTH PAINT INQUIRY), and we will provide you total price and S/H (some discounts in both price and S/H for larger quantities). This is not an exact calculation, but should be a close estimate of the SPE you will need.

Then, at your end and at your cost, you will thoroughly mix your SPE into a mixing liquid of your choice and in the proportion you believe optimum for your use to turn it into liquid stealth paint elixir. Many types of mixing liquids will do, but not water or anything containing water (nor any gasoline, diesel fuel nor other highly inflammable, explosive or toxic liquid). Do not use water because the mixing liquid must act as a binder. The mixing liquid should be oil-based paint, oil-paint oil, damar varnish, egg tempera (ie: egg yolk), other coating, glue, caulk, filler, linseed oil or similar (some careful experimentation may be required to find the best mixing liquid and ratios for your particular surfaces). The mixing liquid converted into liquid SPE must also be able to set and dry within a few days at most.

Enough Stealth Paint Elixir powder for 1 gallon of paint. Last made $95 [2 lbs]. NOTE: We cannot ship liquid paint thru the mail; so we provide the Stealth Paint Elixir in powder form only.

The ULTIMO SHIELDED WRAP (Shields Against Implants): The UFBSW is ideal for TIs with an electronic implant(s) which transmits to an outside receiver(s) and/or receives from an outside transmitter(s), and who have a good idea of the location of the implant inside his/her body. For the UFBSW, we provide you an adjustable rectangular shielded wrap made of the same shielding materials as the Shielded Helmet and the Shielded Cap (see above) - your body is shielded against both electromagnetic and ultrasonic type attack signals. Tell us where you believe that the implant is located inside your body, and the average diameter of the body part that has the implant(s). Ideally, the UFBSW is centered around the implant(s), and its width is 2-4 times the average diameter of the body part where the implant is located (you choose the UFBSW width) (Note: There may not be the available room on the body part to even allow for a UFBSW width 2 times the average body part diameter (eg: the implant is located in the upper arm or upper thigh); the UFBSW will still shield well but not as ideally if a wider UFBSW had been possible). Length of the shielded wrap is 4 times this average body part diameter (to allow for adjustability for size and tightness) for a single-layer wrap, and 7-times this average diameter for a double-layer wrap (provides substantially better shielding). You multiply the width and length together to provide us the wrap area, for which the cost is based. The wrap is secured with velcro. Just like the Shielded Helmet and Shielded Cap, the UFBSW shields only that part of your body it covers. Estimated cost and weight based on our last made experience varies according to the area size of the UFBSW, but we base estimated cost of $249 per square foot of UFBSW area + $99 per UFBSW Customized Design Project.

The ULTIMO FULL-BODY SHIELDED RAINCOAT: For the UFBSR, we cover the inside of a raincoat with the same shielding materials as the Shielded Helmet and the Shielded Cap (see above) - your body is shielded against both electromagnetic and ultrasonic type attack signals. You provide us with an oversized raincoat (the raincoat must be a larger size than what you normally wear - ideally, 1"-2" clearance in all directions from you body with the exception of the length, which should be 2"-4" longer than your usual length) at your expense. We then install the shielding material on its inside. Just like the Shielded Helmet and Shielded Cap, the UFBSR shields only that part of your body it covers. Some TIs have asked us about protection of the entire body or non-head parts of the body, because with the Shielded Helmet or Shielded Cap, all of the non-head parts of the body are still left exposed to direct attack. If you are experiencing attack-caused manifestations to your body, the Shielded Helmet or Shielded Cap should help tremendously if the perp's malicious signals are irritating parts of your brain that control those parts of the body undergoing the attack. However, the Shielded Helmet or Shielded Cap may not substantially affect the manifestations of attacks to your body where the unshielded tissue or organ is being directly attacked by the perp, and not thru the brain connection to that tissue or organ. In your CDAF, please specify whether the raincoat you want shielded does or does not include a hood. We can also include the Ultimo Sofeggio Harmonizer (described herein) but only on a hooded raincoat. The raincoat must be vinyl, heavy-duty and not transparent. Last made $3995 for no-hood raincoat [7 lb] or $5495 for hooded raincoat (for this price, hood must be an integral part of the raincoat - not a detachable part). We can also do shielded ponchos, shielded blankets, shielded coats, shielded jackets; email us if interested in a shielded poncho, shielded blanket, shielded coat or shielded jacket.

The ULTIMO BODY SIGNAL BLOCKER: Some scoff at the notion that perp's can put electronic signals onto your body to identify you and perform functions on your body. Researchers have already successfully developed smart phone apps in which the the smart phone transmits thru a conductor on it, touched by a hand, an electronic security signal that travels thru the body and is then emitted from the other hand touching a security conductor on the door or other lock, which then 100% identifies the person trying to unlock, unlocks the door or other lock so the person can get in - a signal that the person cannot feel and is unaware of. This new technology is proof that perps can impinge malicious signals onto your body to both identify you, to control what you do, to injure you, and to surveil you. Whenever a perp attacks you using an electromagnetic signal, in almost all cases, the attack is passing thru your skin, resulting in some of the attack signals being inside your body and on your skin. When you walk on a nylon rug barefoot, and then touch a door handle with your hand, you may get a painful static electric shock caused by a spark discharge. That is because the static electricity you got onto your feet from your foot skin-nylon rug contact is transferred to all over your body. Likewise, even though a perp may target a small part of your body, clearly all of your body and skin bears some of the same signals the perp puts onto that part of your skin he/she directly irradiated. And likewise, any natural signals that is on your skin when a perp's signals first hits your skin will clearly initially protect you by disrupting and defeating the perp's malicious signals trying to enter your body - until the perp's signals overwhelm and replace them, which usually takes only a fraction of a second because the perp's signals will likely be the strongest signals affecting you. Often, the TI will either actually feel this change (eg: your skin feels crawly) or get a vague sense that something is not quite right. The UBSB, attached to your skin with electrodes, generates strong random output signals into your body and skin that jams the perp's signals to overcome them. When the UBSB output signals go low, whatever signals on your skin at that time are drained to earth ground - shorted out. When the UBSB output signals go high, they disrupt the perp's malicious signals. Therefore, the UBSB is designed to act like a full-body skin-level jammer which cannot be overcome by the perp changing attack frequencies (or deploying multiple frequencies or malicious signals from multiple directions), or by changing attack directions or timings. Since the UBSB output signals are random, the perp cannot modify or invent a device to defeat them, for example, by synchronizing with them. Includes our famous Soft-Pinch Electrodes for maximum electrode comfort. Note that while the UBSB provides substantial protection from electromagnetic attacks, it does not protect against ultrasonic attacks, as does the Shielded Wrap and the Shielded Raincoat. Adjustable signal intensity. Last made $1995 [2 lb].

The ULTIMO EM TRANSMITTER DIRECTION FINDER (Ultrasonic Detector/Amplifier): If you are being electronically attacked, electronically harassed, electronically controlled, electronically tracked, and/or electronically surveilled through some wireless means, the signal is either electromagnetic (EM) or ultrasonic (see below) in nature. There are all kinds of commercial EM scanners which will allow you to scan for the presence of EM signals. However, they almost never come with directional antennas (they usually have only an omnidirectional whip antenna) so that while using the whip antenna you can pick up EM signals and display the strongest EM signal coming to you from any direction, they cannot determine signal direction - only signal frequency and signal strength. Furthermore, since the standard whip antennas used in commercial scanners detect signals from all directions, a stronger EM signal(s) with a nearby center frequency(ies) (e.g. licensed ham and/or commercial radio stations and/or TV stations) to an electronic attack signal will cause the scanner with the standard whip antenna to detect it/them instead of the offending signal. However, because our UEMTDF comes with our proprietary highly directional antennas, when pointed in the offending signal's direction, often result in the clear detection and direction finding of offending signals - even when more powerful non-malevolent (e.g. licensed commercial stations, ham, cb) transmitters are operating in the same area, at the same time and at nearby frequencies. This is critical because electronic attack transmitters are often designed to operate in the "electronic shadows" of stronger legit signals, such as commercial TV stations and radio stations, to electronically hide them from scanner/whip antenna detection. Furthermore, commercial scanners come with no instructions on how to interpret the received signals in the realm of electronic attack, mind control and body control technologies. Because of the variety of directional antennas that we include and our User Manual insights about their uses, the UEMTDF can be used to detect and determine the direction of not only relatively distant external signals, but also nearby and even internal signals transmitted, for example, from an electronic implant(s) (for modern electronic implants and most other localized transmitters, it is usually very helpful to be able to detect both internal signals and external signals because modern electronic implants, room bugs, vehicle tracking transmitters, possibly telecoils/magnetic induction loop systems, etc. are often in two-way communications with much larger external transceivers which control them; electronic implant control is often based on the received biomedical data supplied by the electronic implants - data which is often biological result of previous control signal instructions from the external transceivers often in a closed-loop feedback type system). Other nearby signals the UEMTDF is designed to both detect and find include room bugs and tracking transmitters often concealed on vehicles, clothes and portable objects. The UEMTDF comes with a commercial scanner of our choice based on the description of your needs, plus 3 unique directional antennas of our design (used to be 5 antennas, but thru our antenna research, we now have 3 for Client convenience that work better than the original 5), plus description of both how to use the directional antennas and how to interpret as best we know the detected radio signals, including "radio static" that is often missed even by professional bug sweepers (detection is contingent upon the existence of a transmitter transmitting an adequate RF signal at the same time and direction you are trying to detect it). NOTE: We will refund 25% of your payment for this device-type if within 60 days of you contracting for one you also contract for a PERSONAL EMF JAMMER (PEMFJ)-type device because you needa highly directional RF signal detector to try to ascertain the frequency, direction and timing of the harassing or attacking EMF so that we can optimally design the PEMFJ for you, and also so that you can prove to yourself that your PEMFJ is transmitting radio signals. Last made $1195 [3 lb].
            ANTENNAS LIMITED TIME SPECIAL OFFER: We recently made major changes in our antenna designs, applicable to all new UEMTDF and UEMTT (below) CD projects. While we got good reports from our earlier antenna variations, our two largest antennas were relatively bulky and heavy, limiting portable use of them by some users. Our newest antennas are much smaller and lighter and thus easier to use. As a special consumer service, if you purchased from us an UEMTDF or UEMTT device-type since Oct. 18, 2007, we will provide you this new set of our unique directional antennas for estimated $395 per antenna set, plus the return to us of all of your original antennas in good condition. Your cost for these new antenna types is less than half of their cost component for new UEMTDF or UEMTT CD projects. To obtain these new antennas, please promptly email us your interest in this deal, and complete a new CDAF for them (green link at top of page, evaluation fee waived), and send it to us with your payment (non-refundable 1/3rd downpayment minimum) and original antenna set of antennas. Please allow 30 days from our receipt of your mailing. Note 1: This is not a refund offer or system exchange offer - but an antenna exchange offer only - so please do not send anything else back to us. Note 2: First posted Oct. 19, 2009, we may discontinue this offer at any time without prior notice or liability, so if interested in this deal, please email us promptly, we will honor those who earlier emailed us showing interest and then provided us his/her CDAF, payment and antennas within 30 days of email. Note 3: All of our policies fully apply as usual.

The ULTIMO EM TRANSMITTER TRIANGULATOR: The UEMTT consists of two matching UEMTDF systems (above), plus additional instructions on triangulating EM transmitters. While the UEMTDF will provide you EM transmitter signal strength, signal frequency and signal direction, it will not directly specifically locate the signal transmitter. To best determine specific location of transmitter, you need to triangulate the signal, and that requires two UEMTDF systems. In addition to the User Manual, for all triangulation device-types we sell, we also provide a tutorial on signal triangulation with a completely worked-out example problem using our simple algebraic plug-in formulas. NOTE: We will refund 25% of your payment for this device-type if within 60 days of you contracting for one you also contract for a PERSONAL EMF JAMMER (PEMFJ)-type device because you needa highly directional RF signal detector to try to ascertain the frequency, direction and timing of the harassing or attacking EMF so that we can optimally design the PEMFJ for you, and also so that you can prove to yourself that your PEMFJ is transmitting radio signals.Last made $1995 [6 lb].

The PERSONAL EMF JAMMER: John Williams's extensive researches into EM weaponry and EM harassing devices (and Radionics) - including on-site investigations of cases - have resulted in a high level of understanding and insights into EM weaponry and electronic countermeasures (EM weapons countermeasures), such as EM jammers and EM zappers. The technology for powerful and invisible EM attacks clearly exists - attacks aimed at harassing, controlling, crippling, and "poisoning"! Do you:

And you are certain that these manifestations are not caused by any medical condition. You may be the victim of an electromagnetic attack!

PEMFJ-type devices, as with all RF transmitting devices we design and build, is based on our RF policies defined on our policies webpage (policies.htm). The PEMFJ is designed to send out strings of pulses in a narrow bandwidth (0.1% of center frequency, up to less than 100KHz maximum BW) designed to jam (within the immediate area of one's body) offending EM transmitters, surveillance devices, microwave controllers, et al - even the newest EM devices. Portable and worn or carried on or near the body. Note that EM signal jammers are never designed to operate as electronic weapons or to jam legally licensed transmitters. Jammers transmit no intelligence but only a high-frequency carrier signal typically modulated by white noise or pink noise to mask out the offending signals of an electronic weapon (if you could hear the EM white noise, it would sound much like distant rain; EM pink noise sounds similar to white noise but has higher or lower composite pitch, depending on filtering). In contrast, electronic transmitter weapons transmit definite control signals or data signals which are usually designed to cause harmful manifestations in a person(s) (usually a targeted person), animal(s), and/or equipment. Since the bandwidth that harmful EMFs can occupy is enormous, it is important to determine where in this enormous electromagnetic spectrum lies the signals harmful to you. Therefore, you should first strongly consider as a Customized Devices the purchase of a directional signal strength or signal triangulation device so that you can ferret out the offending signals red-handed, detect their frequency(ies) (bandwidth) and include those details in with your PEMFJ-type CDAF - see our popular THE ULTIMO EM TRANSMITTER TRIANGULATOR and THE ULTIMO EM TRANSMITTER DIRECTION FINDER -type devices above for a special deal. Last made $1495 [2 lb] (rough price when the bandwidth of offending signal was provided; if frequency was not provided, we select the frequency based on the best of our abilities resulting in less probability that we selected the right frequency and device may be substantially more expensive; we cannot do a wideband PEMFJ or a PEMFJ for certain frequencies).

The ULTIMO MAGNETIC BODY RESONANT FREQUENCY DETECTOR: The body's magnetic resonant frequency is reputed to be an electronic signature that many perps use to target and pursue Targeted Individuals (TIs) - body resonant frequency tracking. The UMBRFD allows you to determine what your body's magnetic resonant frequency is. Once you know what magnetic frequency your body resonates at, you can try various means of shielding to suppress it by further using the UMBRFD to ascertain which shielding works best. The UMBRFD is simple and easy to use. You hang our special magnetic field detector around your neck. It comes with a very special antenna, small tuner and EMF signal strength detector. You adjust the tuner until you obtain a frequency output at its highest intensity as digitally displayed on the signal strength detector. That should be the frequency of magnetic resonance of your body - your body resonant frequency. To use the UMBRFD, you must first be inside something that greatly shields you from external RF signals, such as a metal shed, quonset hut, building with a lot of metal in its structure, deep basement or cave, or in a remote area where RF signals are weak (your cellphone should show one bar or less), and with all RF transmitting electronic devices turned Off (Fermi Cage or Faraday Cage would be ideal, but few people have access to them). Also, some believe that one's body resonant frequency changes as one's health changes, so detection of body resonant frequency changes may be a warning to obtain a medical examination (we are not medically licensed professionals so we can not and do not provide medical advice, opinion or claim). Also, by finding the magnetic resonances of other people in your life, you may be able to find people that you share the most compatible "vibes" with. Note: The human magnetic field is very weak, so not all people have a detectable magnetic resonance frequency of the body. For us to provide you this device-type, we need to know the circumference of your head (simply snugly wrap a string or ribbon one time around your head, then measure its length). Last made was $1295 [2 lbs].

WIRING HITCHHIKING HARASSER ELIMINATORS: Are your home/business wiring, piping, etc. or even car wiring hijacked to electronically harass or surveil you by hitchhiking signals onto them? Because power and telephone lines, and metal pipe (e.g. plumbing), metal tubing (e.g. wire shielding) and metal linear structures (e.g. rebar, girders, conduit, trim, rails, fencing) surround you virtually everywhere you go in any building, electronic surveillance devices, equipment control devices, mind control devices and electronic attack devices can be connected to them in virtually every room and even outside the building for some distances - these omnipresent conductors serve as the optimum means to connect up, transmit and distribute these very harmful electronic surveillance, mind control and electronic attack signals throughout the building (sometimes called "carrier current" attacks - carrier currents caused by carrier current transmitters) - optimum conductors for virtually endless varieties of bugs, taps, harassment, control and line blaster devices. Our WHHE devices both test and filter out harmful hitchhiking signals!
       Since these conductors are so prevalent in virtually every building, added with the technologies of time multiplexing signals and frequency multiplexing signals, literally dozens - even 100s - of these types of very harmful signals can be operational on any day and night against you - usually no matter what rooms you are in. Your home or business is just several huge signal distribution networks plus transmitting and receiving antenna arrays. And all such wiring, piping, etc. can usually be just as easily abused for electronic surveillance, mind control and electronic attacks even if you turn OFF or disconnect them from their normal uses (e.g. turning Off AC power, disconnecting phones). This is nothing new - both power and phone wiring have been lawfully used for decades to carry high-band voice, control signals, and data (e.g. faxes, modems, DSL, zons, intercoms, alarm systems for phone lines, and intercoms and alarm systems for power lines) - proven technologies using common household AC wiring and phone wiring. Furthermore, because generic power and phone wiring and piping in all or part of one's home and business are often unshielded, they can be both easily accessed and connected up to AND used as a huge transmitting and/or receiving radio antennas to communicate with anything from electronic implants - to guys parked in the street - to cellphone towers down the road - to control centers 100s miles away - to ships at sea - to satellites - to electronically harass, control and/or interfere with your life! For examples: (1) Signals on them can be transmitted wireless for miles, and (2) Physical access to the wiring, piping, etc. is not even required; because the wiring, piping, etc. is unshielded, signals can often be inductively coupled into or out of power lines, phone lines, piping, etc. (e.g. inductively-coupled phone line taps are decades old technology). Offending microwave signals can also be reflected off of ungrounded or not fully grounded metal bodies.
       Since these virtually endless varieties of bugs, taps, harassment, control and line blaster devices can take on virtually any appearance and/or be hidden in just about anything inside of or near your building, they can be very difficult to detect through physical searches (short of tearing down all of your walls and ceilings where the lines and piping run, and disassembling all of your equipment). For example, these devices can be easily concealed inside TVs, radios, computers, cellphones, landline phones, electronic handheld devices, etc. - fully operating even when the TV, radio, phone, etc. itself is not turned ON. Or hidden in an outlet, inside of your wall or in your attic - even inside your car. If you share walls, floors or ceilings with other apartments, the devices can be on their side, or even outside your building. Since not all of these harmful devices are RF devices, the non-RF ones cannot be detected using TSCM field strength testing used for wireless systems. Nor can strictly receiving devices be TSCM-detected. And usually nor can transmitting devices which transmit in bursts, randomly or pre-dawn hours, nor when the perpetrator believes the area is being electronically swept and turns Off transmitters until the TSCM crew leaves. In short, your phone and power wiring, piping, etc. can be easily and secretly tapped into using hardwired, inductive-coupling and/or reflection techniques just about any place they are routed internal or external to your home/business. To understand just how frustrating it is even for experts to really troubleshoot an area, rent the Gene Hackman movie, "The Conversation" - and that was early 1970s' relatively crude, clunky and huge electronic surveillance systems!
       The high-band signal frequencies used on power and phone lines, piping, etc. (which can be time multiplexed and/or frequency multiplexed to support several such systems) are usually 5+ times higher than the standard 60 Hz / 50 Hz (power wiring) or 3200 Hz maximum (phone wiring) bandwidth normally used on them. The usable bandwidth of many power and phone lines exceed 2 MHz for loops up to about 6,000 ft (1.14 miles) and much higher over much shorter loops - very usable for electronic surveillance, mind control and electronic attack. Metal piping, tubing, fencing, rails and other structures can conduct signals far higher in frequency than even power and phone lines (because most power and phone lines, pipes, etc. are unshielded, electrically noisy and inductive and leaky to high freqs, most high-band signals are under 200 KHz). Loading these unshielded conductors with all kinds of multiplexed and high-band signals they were not designed for may cause the wiring, piping, etc. itself and their terminations to resonate with strange sounds and noises which seem to emanate from walls and ceilings often on quasi-random and directional bases (e.g. strange sounds you can hear when standing in one position but not in another nearby position, and/or at some times and not at other times, and/or during certain conditions of humidity and/or temperature but not at other conditions), often throughout most of a building, and often similar to the vibrating and humming of an old or defective power transformer. They can also vibrate and hum in the ultrasonic and infrasonic bandwidths when signals mix and produce sum and difference frequency components. The weird sounds can also sound like a distant motor running, distant voices, whispering and mumbling, spiritual and God-like voices, high-pitched voices, low-pitched voices, chattering, music, animal sounds, whistles, echoes, pulsing, pounding, popping, finger-snapping, digital data sounds, zinging sounds, whooshing sounds, theremin sounds, etc., especially when real time complex signal mixings of possibly several signals at once result in partially demodulated and/or multiply-mixed high-band signals. These weird noises can literally drive some people nuts! If you are hearing sounds, noises or even voices or digital data signals or control signals coming from your walls, ceilings or appliances or inappropriately while you are on the phone, you may not be imagining it. Also, high frequencies imposed on power wiring can adversely affect induction motors (especially compressor motors common to refrigerators, freezers and air conditioners), causing them to operate roughly, chatter noisily and possibly stall out (because induction motor speed is proportional to the frequency of its power source, multiple frequencies can harm them), and can cause lights to vary in intensity or flicker. Modulated high frequencies on phone lines can cause malfunction of phone and computer equipment (e.g. loss of broadband sync, inability or slowdown in using DSL or even dial-up, faxes, zons, etc. because of a "noisy line").
       We offer 4 types of WHHE systems to test for and protect against offending EMF signals: (1) The WHHE1 is for AC power lines, (2) The WHHE2 is for phone lines, (3) The WHHE3 is for motor vehicle wiring, and (4) The WHHE4 is for non-electrical metal structures, such as pipes, tubes, appliances, fencing, rails and other metal structures, and unpowered wiring. For minimal recommended protection, you must typically have at least one of each WHHE type. For optimal and continuous protection, you must have two WHHE1 (one for each 120VAC power leg), one WHHE2 for each landline phone line, one WHHE3 for each vehicle, and one WHHE4 for each non-electrical ungrounded or improperly grounded metal structure within about 25 yards of you.
       The WHHE1 is designed to plug directly into any 120 VAC wall outlet (3-wire or 2-wire, 60 Hz or 50 Hz) located virtually anywhere to both detect and eliminate these higher frequencies on your AC power wiring (and to also cause an improvement in your power factor if it is typically inductive or lagging power factor (PF)) (Note: If you have an intercom, digital or other communications system which uses home/business electric power wiring to transmit/receive signals, the WHHE1 will also filter out those signals if used at same time). For example, voice, data signals, and/or control signals at 10 KHz, 50 KHz, 90 KHz, ..., 1890 KHz, 1930 KHz and 1970 KHz could all be frequency multiplexed onto a single 60 Hz power line simultaneously. That is, as long as a WHHE1 is not connected, because the WHHE1 wipes out all frequencies much above 60 Hz - wiping out those electronic attack and electronic surveillance high-band signals in one fell swoop! You may specify the WHHE1 to be non-battery powered (used only on powered AC lines to also power it), or battery-powered (used on both powered and unpowered AC lines). Note that the WHHE1's filtering functions cannot be duplicated using commercial power strips with built-in transient suppression. Power strips with transient suppression only filter out transients which are both high-voltage AND high-frequency, and then only for those devices connected to the power strip - not the VAC power lines connected to your AC outlets and located behind your walls in your home or business. Only the WHHE1 can filter out unwanted signals at your outlets and home/business wiring (as well as devices plugged into power strips). Even for devices plugged into transient-protected power strips, the designed protection is for transients which are both high-voltage AND high-frequency - much less effective against hitchhiking voice, control and data signals (which usually result in small RMS voltage level increases way below voltage levels required to switch in transient suppression).
                TEST: There is a test that will likely result in positive indication of hitchhiked signals on your AC power lines, but test requires about 2 months to complete: Obtain 3 same make and model plug-in digital clocks (not battery-powered clocks), and place them in widely-separated rooms but on the same 120VAC leg. Synchronize each clock to your cellphone or other battery-operated super accurate time source. At the end of one month, check the times on each of your 3 clocks against the device you synchronized them with. Most of these types of clocks are timed by the frequency of your AC line voltage (60 Hz in the US, 50 Hz many other places). However, with most of them, the timing is also advanced by signals and electrical noise interference on your line to various degrees based on their specific electronic designs and interference properties. If there is much communications or control signals on the line, the clocks will run faster than normal. Therefore, if at the end of the month, any of your clocks are more than a couple of minutes fast, more than likely, you have a serious problem with hitchhiked signals on your line for which we strongly recommend the WHHE1 to countermeasure. Since the electrical noise on most AC lines typically rarely reaches levels that would advance most clock timing, normally, noise by itself would contribute to about a minute or two at most in one month's time to advancing timing. If any of your clocks run too slowly, the clock is probably defective. And which clock has advanced the greatest is usually the clock closest to the hitchhiking signal input point where it gets the strongest signal. Then run this test again, with all of the clocks on the other AC leg. Note: This test is not proof of either the existence or absence of hitchhiking signals during the test month because of clock defects and nominal electronic differences; clock timing may use crystals and not line frequency; low intensity, very high frequency, and/or low duty cycle (e.g. burst signals, infrequent or occasional attacks) hitchhiking signals that don't significantly increment clock timing; very noisy line, etc., but it often is a very good indication.
       The WHHE2 is designed to plug directly into any normal landline phone line (works with corded phones and cordless phones), and works whether the phone is On Hook or Off Hook to eliminate higher frequencies on your phone wiring (Note: If you use DSL, modem or other digital phone line communications system, those signals will also be filtered out if used at same time). We offer 3 versions of the WHHE2: (1) WHHE2-HB: The High-Band (HB) version (the default version if you don't specify) filters out phone line freqs starting at about 4000 Hz and above. While the HB will filter out all signals at all times when toggled ON much above the normal phone voice BW of 300-3200 Hz, it will not filter out normal speech signals in the voice BW, resulting in possible but very unlikely unauthorized voice-band transmissions when phone is on-hook. (2) WHHE2-LB: The Low-Band (LB) version filters out phone line freqs starting at about 50 Hz and above. While the LB filters out voice and data signals at all times when toggled ON, it must be turned OFF when you need to talk on the phone or use it to transmit data or it will also filter out your and the other party's voices. Note that the LB version may negatively impact ring with some phones. (3) WHEE2-CMP: The Composite (CMP) version allows you to toggle between the HB and LB versions for maximum security - when you are talking on the phone, you set it at HB, when you are sending data online, you turn OFF both HB and LB, and when phone is on-hook, you set it at LB. The WHHE2 uses the common standard RJ-11 phone connector. The WHH2 always comes battery-powered.
       The WHHE3 is designed for 12VDC battery systems (e.g. vehicle battery wiring) because car battery wiring can also be - some say often - used to conduct unwanted and harmful signals which can be used for electronic surveillance, mind control and electronic attack. You can specify whether you want its cable to have cigarette lighter, battery clamp or other type of terminating connector you specify (Note: Any and all vehicle underhood connection work must be done by your automechanic at your expense and always in a legal and safe manner, and we assume no liability for the installation, removal and use of a WHHE3 device on any vehicle). You may specify the WHHE3 to be non-battery powered (used only on powered 12VDC lines to also power it), or battery-powered (used on both powered and unpowered 12VDC lines).
       The WHHE4 is designed to test and protect unpowered wiring, metal piping, metal tubing, metal fencing, metal railing, metal structures, and other unpowered conductors up to about 25 feet long by testing for and filtering out signal types they carry above 60 Hz. These include offending signals hardwired or induced onto metal structures, and to some extent, reflected signals. Protecting against reflected signals is designed to protect you from perps transmitting RF signals at unprotected reflective surfaces near you for its scattering effects or angular advantages, which then reflect onto you to do their dirty work; the WHHE4 grounds out air-transmitted offending RF signals it protects in your area. The WHHE4 can test and filter out great varieties of conductors which do or do not have known or accessible signal return paths (WHHE1, WHHE2 and WHHE3 test and protect circuits which have electrical return paths paired with them, e.g. AC power line neutral, phone Ring wire, car battery ground). The WHHE4 comes with two cables, each about 12.5 feet long, and each terminated by alligator clips (or some other type of connector you specify). One cable is connected to the unpowered metal wiring, piping, tubing, fencing, structure, etc. If this metal is accompanied by an accessible metal electrical return path (e.g. wire, piping, tubing, fencing, structure, etc.), the other cable is connected to it, else it is connected to nearby grounded metal, in which case an earth ground rod may be required (earth ground rod not provided, available in hardware stores). The WHH4 always comes battery-powered. Note: Not all plumbing or tubing (or fencing or structures) is continuous metal all the way into a good earth ground. Sometimes plastic plumbing or standoffs are used, which breaks any ground connection. Even if the plumbing pipe is continuous metal all the way to where buried in earth, pipe joints can be corroded enough or use enough teflon tape to break the electrical connection, the pipe can be laid in dry ground or concrete, and/or the pipe itself can be corroded enough to break its ground connection. In fact, plumbing pipe is never a reliable earth ground. National Electrical Code: 'True earth ground physically consists of a conductive rod or pipe driven into the earth to a minimum depth of 8 feet.' Plumbing pipe is never "driven into the earth" and plumbing, tubing, fencing and structures are seldom buried at least 8 feet deep. If unpowered metal is not itself solidly grounded to earth (easily determined) - not just wet-season or intermittently grounded - it makes a great conductor for offending electronic signals.
       Each WHHE device comes with a signal indicator LED and the DETECT/PROTECT toggle switch. One toggled position is the DETECT Mode in which the LED will flicker and/or brighten if there is a high-band signal on the line, piping, etc. The other toggled position is the PROTECT Mode which will filter out all types of high-band signals, transients and line noise interference hitchhiking signals to remove them from your line, piping, etc. The DETECT Mode continuously tests your conductor to determine if there is any unusual signal or other electrical activity on it. The toggle switch is especially protected with a snubber circuit designed to prevent contact arcing during switches. If the WHHE device conflicts with some other known and OK equipment or function connected to your wiring in the PROTECT Mode, then don't operate that WHHE in its PROTECT Mode when normally using such equipment or function (no known interferences in the DETECT Mode).
       EXTRA PROTECTION: WHHE devices are designed to further protect your lines from possibly destructive high-voltage pulses, transients and line noise which can sometimes also occur, whether natural or manmade (e.g. helps protect you from a perpetrator trying to wreck your phone or power system - even your computer - using a phone or power line blaster to deliver high-voltage transients, pulses and electrical noise to your system and equipment; and helps protect lines and equipment against damage caused by nearby lightning strike or transients, pulses and line noise). (Note that while electronic filters may eliminate 99.9+% of a signal - so much of the signal that the tiny remaining signal is lost in the line noise - no electronic filter wipes out absolutely 100% of a signal; always experiment with WHHE device first to make sure that it does not interfere with the normal use of your lines and equipment.). This very substantial added transient protection feature includes a gas discharge lightning arrestor (surge arrestor - not normally found even in expensive transient-suppressed power strips), a MOV (varistor), and the filter capacitor itself - all of which adds substantial protection from lightning strikes, line blasters, and powerful pulsed mind control and electronic attack devices hitchhiked onto your lines, piping, etc.
            Plus, if specified, WHHE devices come with an output connector which permits you to directly view hitchhiking signals on an oscilloscope or hear them on a speaker or earphones (if signal is in the audio band; oscilloscope, speaker and earphones are not included). By being able to observe and/or hear the signals which should not be on your line, piping, etc., you can often tell exactly what is being communicated or controlled, and correlate the hitchhiking signals with conversations, other activities, and unexplained manifestations.
       Note that since most home and office electric power systems are 220-240 VAC and standard outlet wiring is 110-120 VAC, there are two isolated AC power "legs" that power the various 110-120 VAC outlets and functions throughout the building. Therefore, to simultaneously and continuously DETECT and PROTECT both AC power legs, you need two WHHE1 devices. Also note that if your landline phone system has more than one phone line, each phone line is isolated from each other, so therefore to simultaneously and continuously DETECT and PROTECT all phone lines, you need a WHHE2 for each and every phone line. All WHHE device-types are small, portable, easy to use, uses standard connectors, and the WHHE2 and WHHE4 are 9VDC battery-powered (WHHE1 and WHHE3 operate off of their power line voltages but we can also make them to operate off of 9VDC battery to also test unpowered 120VAC power lines (WHHE1) and car battery wiring (WHHE3)). CAUTION: Do not use any WHHE device in the PROTECT Mode to do a denial-of-service attack against anyone legitimately using a phone system or power line for some normal high-band activity, for example, by interfering with or defeating DSL, modems, faxes, zons, intercoms, alarm systems, etc.
       Non battery-powered WHHE1, WHHE3. Last made $395 [1 lb] each.
       Battery-powered WHHE1, WHHE2-HB, WHHE2-LB, WHHE3. Last made $445 [1 lb] each.
       Battery-powered WHHE2-CMP, WHHE4. Last made $495 [2 lb].

The ULTIMO LED MIND CONTROL DETECTOR: A relatively recent powerful form of mind control and electronic attack is becoming increasingly popular. LEDs (Light-Emitting Diodes) are omnipresent in many different types of common electronic equipment for decades now, especially increasingly so with the advent of high-intensity energy-efficient LED bulbs, LED lamps and other LED lighting systems. LEDs are semiconductor light emitters which can be precisely programmed for specific wavelengths, colors, tones and modulations, and have been used for years to program astronauts sleep cycles in the Space Station. LED light usually appears as constant (0 Hz frequency) or blinking or flashing at very low rates (usually for alarm reasons). Older LEDs generally have such small bandwidths as to be nearly useless for mind control and electronic attack uses, even LEDs used in some LED biofeedback devices. However, some newer LEDs can be effectively modulated with signals up to about 100Mb/s - way beyond the modulation bandwidth required for mind control and way beyond the modulation bandwidths of all other common light sources - not to mention cheap and commonly available - making them ideal for mind control and electronic attack. Most electronic devices which have LEDs are now foreign-made, so which LEDs are now programmed and how are mostly unknown. You can't 100% block LED effects using dark sun glasses, and if the LEDs are intense, even closing your eyes may not help much. And LEDs can be intensely flashing you at such high frequencies and/or in the ultraviolet band even when they appear to be Off to the eye (e.g. the signal output LEDs used in TV controllers)! Because LED modulations can be very high bandwidth, just by glancing at the modulated LED light may be enough to entrain your brain, and some manifestations can be delayed, making it difficult to determine the cause.
            Mind control and electronic attack signals conveyed directly into the brain through the eyes and optic nerve pathways can be very destructive in several ways (e.g. direct interferences with nerve pulses, disruption or suppression of melatonin production, disruption of circadian rhythms, etc.). We now believe that many mind control and electronic attacks are being conducted through modulated LEDs flashing at such high rates that your eyes cannot detect these fast flashes but your brain does on a subliminal basis. You have no way of knowing without the ULEDMCD which LEDs may be attacking you and which are benign. And that while most of these LED mind control methods are clearly for commercial reasons (e.g. telling you to buy a certain product or avoid competitors), others are used directly for nefarious mind control and electronic attack applications. Modulated LEDs are also widely used for Visible Light Communications systems (VLC), including for the activation, programming and controlling of other electronic devices themselves directly involved in surveillance and spying, and mind control and electronic attack. In addition, flashing LEDs are believed to trigger or cause epileptic seizures, blinding headaches, chaotic thoughts, thought interferences, forced thoughts, perception alterations, insomnia, sleep disruptions, hallucinations, eye damage, temporary color blindness and distortions, loss of balance, depression, fibromyalgia attacks, behavioral modification, obsessive-compulsive behavior, and even psychopathic behaviors in some vulnerable people. You can be exposed to LED mind control or other electronic attack totally unaware of this type of electronic attack. Since your eyes won't likely detect it, you need a specialized device like the ULEDMCD to detect and alarm to LED mind control. The ULEDMCD detects LEDs which are outputting high-frequency signals (30 Hz - 200 KHz), indicative of some mind control, electronic attack and communications devices, and alarms you when detected. If detected and you own the offending device, you can tape over the offending LED with black electrical tape or paint over it with dark nail polish, disconnect the LED, report the device or take some other kind of action. The ULEDMCD last made was $595 [2 lb].

The ULTIMO MODULATED LED CONTROLLER: The UMLEDC produces a very wide range of programmable LED modulations, some of which may counteract mind control (not just LED mind control), seasonal effective disorders, some sleep disorders and circadian rhythm disorders (circadian disorders are believed by some to be one cause of breast cancer in women), some mood disorders, biofeedback, relaxation therapy - an excellent LED light therapy device. But unlike other cheapo LED devices, the UMLEDC comes with critical programmable features:
               (1) UMLEDC modulations are programmable (30 Hz - 200 KHz).
               (2) UMLEDC output waveforms, duty cycles and intensities are also programmable. Output waveforms can be sinewave or pulsed, or based on audio, infrasound or ultrasound you connect into it. Pulse duty cycles can be varied 10% - 90%.
               (3) UMLEDC comes with input connectors used by recorders, mikes and other electronic devices to modulate the LED light with audio, infrasounds and ultrasounds if you wish (input devices to the UMLEDC are not included).
            With the UMLEDC, a huge amount of modulated-LED experimentation is possible (never use the UMLEDC as a mind control device, and the UMLEDC is not sold as a mind control device, nor as a medical device nor medically assistive device). The UMLEDC can also be used as part of Visible Light Communications Systems (VLC). The UMLEDC last made was $1195 [3 lb]. Since your eyes won't likely detect the LED modulated outputs, you need a specialized device like the ULEDMCD (described above) to detect the outputs of its LED and output intensity. The UMLEDC plus the ULEDMCD last made was $1645 [5 lbs].

The ULTIMO TDCS BRAIN STIMULATOR: Transcranial Direct Current Stimulation (TDCS) - "DC brain polarization" - is a painless, non-invasive, low-risk, silent, efficient and relatively inexpensive method of applying small direct currents to the brain cortex through the skull using skin-contact electrodes. The positive electrode boosts, increases or amplifies function of brain region closest to it, while the negative electrode inhibits or suppresses brain function. TDCS has been found to boost cognitive performance and learning and increase IQ, memory and reaction times, as well as to treat several mental disorders. Along with its many important positive uses, TDCS can be used to do mind control, as well as to reverse the effects of mind control, as well as to make the subject more or less susceptible to other forms of mind control. TDCS mind control can be used in conjunction with Transcranial Magnetic Stimulation (TMS) mind control. A mere 30 minutes of secret TDCS stimulation while a person is asleep or unconscious (e.g. knocked out, drugged or undergoing surgery) can result in permanent mind control and behavioral control changes - without the use of electronic implants and with no evidence that TDCS entrainment was ever done. TDCS can be used to produce robotic victims and even Manchurian Candidates. And TDCS is now widely used by the United States Air Force to train pilots in half the usual time. See The Ultimo TDCS Brain Stimulator (Radionics.htm webpage) for details on this popular TDCS device.

The BRAIN SIGNATURE WAVEFORM DETECTOR: One method believed to be used to track and target individuals for subliminal mind control, behavioral modification, entrainment, electronic attack and electronic harassment (electromagnetic / ultrasonic) purposes is by monitoring their purportedly unique set of brain Alpha (8 Hz - 12 Hz - Awake, mild/moderate stimulation), Beta (15 Hz - 25 Hz - Awake, moderate/excited stimulation), Delta (0.5 Hz - 4 Hz - Stage 3 Sleep, Stage 4 Sleep), Theta (4 Hz - 8 Hz - Stage 1 Sleep and REM Sleep), and Spindles (12 Hz - 15 Hz - Stage 2 Sleep, often with K-Complex) waveforms. The BSWD is a device that lets you experimentally research this phenomenon for yourself. User Manual includes a tutorial on how this technology is purported to work. Includes a RF receiver and the BSWD signal processor, and a high-quality oscilloscope to view your detected waveforms (as well as the many other uses oscilloscopes can be used for). NOTE: This system requires that you have but does not include a cellphone and active cellphone service because your low-frequency brainwaves are extracted from the very slightly modulated cellphone frequencies that pass through your head during normal cellphone calls. Last made $7945 [20 lb].

The ULTIMO SYSTEMIC MOBIUS COIL: The USMC is an induction coil specially and uniquely wound in a mobius pattern. We believe that this particular coil configuration - as opposed to an ordinary (non-mobius) electrical coil - produces unusual beneficial results relevant to jamming mind control and electronic attack signals and therapeutic effects (NOTE: not sold as a medical device or medically-assistive device). Comes with an electronic waveform generator with selections for waveforms, frequencies, duty cycles and intensities. You specify inside mobius coil diamater from 3" to 24" to fit where you want the coil to fit (e.g. head, wrist, arm, foot, calf, leg, hips, waist, chest, etc.). Coil can be compressed into an oval shape if you wish or used in its round shape. Last made $795 + $49 per inch coil diameter (battery-powered only, add $50 for 120VAC powered only, add $150 for both 120VAC and battery powered). Caution: Some believe that some or all ElectroMagnetic Fields are harmful to health, so check with your trusted licensed doctor first to use this or any other EMF device or if you have medical-like manifestations.

The ULTIMO BRAINWAVE ANALYSIS & BIOFEEDBACK / BIOCONTROL DEVICE: The UBA&BBD permits both the extensive analysis of brainwaves and the extensive use of brainwave biofeedback and brainwave control functions. Its brainwave input stage detects and amplifies brain signals. Brainwave amplification gain is tunable (up to about 1,000,000) so that even very faint brainwaves can be accessed. Once amplified, a bank of bandpass filters are then used to break out the Delta (0.5 Hz - 4 Hz - Stage 3 Sleep, Stage 4 Sleep or deep sleep), Theta (4 Hz - 8 Hz - Stage 1 Sleep and REM Sleep), Alpha (8 Hz - 12 Hz - awake, mild/moderate stimulation, relaxed but alert), Spindles (12 Hz - 15 Hz - Stage 2 Sleep, often with K-Complex), Beta (15 Hz - 30 Hz - awake, alert, excited stimulation) rhythms, which actual signal outputs are provided for you to monitor in any combination using a meter, oscilloscope or chart recorder. Each of these outputs is internally connected to a signal accumulator stage, which accumulates each rhythm over periods of seconds and minutes to provide ultimate brain stage and stage transitional data. And because normally you want biofeedback and biocontrol functions controlled by accumulated signal energies so as not to be triggered by spurious or transient values (which may not be indicative of the brain stage) but by the actual stage that the brain is in (e.g. conscious, meditative, REM sleep, deep sleep, etc). An output is also provided for each accumulated signal. In addition, inputs, sensitivity control pots and outputs are provided for control functions, which include normally-open (NO) and normally-closed (NC) relay functions, +9 VDC battery, and 120 VAC (only with devices powered by 120 VAC) control outputs. For the ultimate in brainwave, entrainment, mind control, and behavioral modification research versatility, four jumpers are provided that permit you to jumper between actual signal and/or accumulated signal outputs to NO relay, NC relay, battery and/or VAC biocontrol circuit inputs, with the sensitivity of each biocontrol function controlled by its sensitivity pot. Finally, with the UBA&BBD, you can observe and record individual brainwave signals in any combination of alpha, beta, delta, theta and/or spindles, and you can use any of their actual and/or accumulated signal outputs to control NO relay, NC relay, battery and/or VAC outputs. Last made $1695 [2 lb] (battery-powered only), $1895 (120 VAC-powered only), and $1995 (both battery and 120 VAC powered). Does not include any meter, oscilloscope or chart recorder.

The NEUROPHONE DEVICE: Incredible, unique and visionary device that converts speech and other complex and highly redundant audio frequency signals into a much more concentrated and compact form that can be transmitted over a much narrower bandwidth, and over greater distances through various materials. The ND is of particular interest to:

The ND comes single-channel. Versatile, fascinating and useful. Modern IC Version, last made $995 [4 lb]. Transistorized (traditional, but using modern transistors) Version, last made $895 [5 lb]. Plans for transistorized version - still available - $195.

The OMNIMAX TENS SYSTEM: TENS (Transcutaneous Electrical Nerve Stimulator) devices ideally function to relieve chronic pain and nerve-related disorders (e.g. twitching muscles), to accelerate the healing processes, to relax nerves, to promote rest and sleep, as in invigorator, to minimize snoring, for Radionics research, as a general lab stimulator (e.g. for stimulus and response research and pain research) - much more! Lesser TENS devices meet only few of these functions (and even then only on a limited basis). Don't confuse the OTS with the other $600 - $900 TENS devices (e.g. Myostim systems), that uses only 1 transistor (no IC) per channel! You can program and fine-tune the OTS to produce practically limitless variations of electronic signal outputs to suit YOUR particular needs - the OTS puts virtually all other TENS devices to shame! Features programmable high-voltage output (25 - 150 Vpp); programmable frequency (20 Hz - 200 KHz); selectable sine, square wave, pulse (5 - 95% of period) and triangular waveform outputs; programmable duty cycle (5 - 100%); programmable triangular wave, positive sawtooth wave, and negative sawtooth wave automatic frequency sweep control or manual frequency control (you select); and selectable for periodic waveform, burst, white noise or pink noise output - great for jamming nerve impulses. The OTS is so extremely versatile and powerful that we ourselves have used these devices for personal transcranial stimulation (e.g. transcranial direct current stimulation, transcranial alternating current stimulation, transcranial radio frequency stimulation, and transcranial magnetic stimulation), personal transcutaneous stimulation (e.g. personal pain blocking, personal hair growth stimulation), plant growth, metal deposition / metal plating, ultrasonic / sonar, high voltage, and pest repellant research, and to test electronic component specifications (one person suggested that we make them as penis stimulators - regardless of his "findings," we do NOT sell any device as penile stimulators or for any other medical use). Great as a general electronics laboratory function generator to meet virtually every signal waveform and type an electronics circuit design or application calls for. You can then experiment with these numerous possible combinations of output voltage levels, frequencies, waveforms, durations and duty cycles to produce results that are optimum for YOU. If there does exist an electronic combination that will optimally satisfy YOUR needs for a few pennies of electrical energy, will that not be a great improvement on your quality of life over whatever current methods you are using to try to obtain similar results, if indeed you are using another method to try to obtain similar results? 1-Channel: Last made $1695 [2 lb]. 2-Channel (2 independent channels, same case & power supply): Last made $2995 [3 lb].
              The ULTRA OMNIMAX SYSTEM is a full blown OMNIMAX SYSTEM-type device as stated above, but which also includes an audio bandwidth input with several forms of pulse modulation of it to produce modulated pulse outputs for mind control research, PLUS outputs for small high-inductance magnetic coil electrodes (including the small magnetic coil electrodes) which can be used for Transcranial Magnetic Stimulation research (TMS), with the User Manual containing detailed information on both the mind control research and TMS research-type features of this truly mind-boggling device-type. 1-Channel: Last made $2395 [3 lb]. 2-Channel (2 independent channels, same case & power supply): Last made $4495 [5 lb].

The UNKNOWN & UNSEEN ENTITY DETECTOR: A device type sometimes referred to by others as unknown presence detectors, unseen presence detectors, spirit detectors, ghost detectors, ghost busters, alien detectors, and alien buster detectors. Yet another one of our all time most exciting and incredible devices! Concerned about nearby hidden people (e.g. rapists, muggers, home invaders, stalkers, peeping-toms) or animals, or spirits or ghosts which can disturb the ambient static electric field and/or the electromagnetic field? Detect them with the U&UED! The U&UED is an ultra-sensitive device which will detect the presence or nearness of virtually anything which produces or disturbs this omnipresent Static Field (U&UED1) or Electromagnetic Field (U&UED2) (the U&UED-Combo is both a U&UED1 and U&UED2 combined in the same box using the same power supply). Static field and electromagnetic field disturbances are not normally detectable with the human senses alone (some animals are very sensitive to these electric field disturbances). Worried that someone is hiding in your home, business or vehicle? Or some feral animal is laying in wait to surprise and attack you? The U&UED may help to detect and warn you! With Sensitivity Adjustment to boost dynamic range. (NOTE #1: We do NOT claim that ghosts and spirits actually exist; our designs are based on our proprietary theories should they exist. NOTE #2: Works best under dry conditions, the environment should be less than 50% Relative Humidity because high humidity adversely affects disturbances in electrostatic fields; and avoid using the U&UED near large metal surfaces, large bodies of water and AC power and radio emitters and other manmade strong electrical disturbances as proximity to these entities may cause this device type to not properly function). The U&UEDs are the same types of devices used by paranormal researchers, UFO and alien researchers, and "ghost busters." Last made $695 [2 lb] each, $1285 combined (U&UED-Combo).

The AUTOMATIC WRITING MACHINE: Some people appear to be very sensitive to signals coming from God, angels, space aliens, ancient ancestors, departed spirits and even animals, which sensitivity manifests itself into automatic writing. However, most people lack this inate sensitivity, but would still like to engage in automatic writing based on incoming signals. Basically, how the AWM works is that you hold it in the palm of your hand and a pen or pencil in the fingers of same hand prepared for writing. You lay down a blank sheet of paper. You turn ON the AWM. You then attempt to draw freehand an horizontal straight line across the paper about at your normal writing speed. The AWM picks up signals from the air using its wideband antenna, highly amplifies them, and then transforms them into mechanical vibrations. These vibrations then cause your pen or pencil to vibrate in the vertical axis to modulate your attempted straight line into what now appears to be writing. Practice and experimentation are required for best results. Also may help to reveal mind control and surveillance attempts against you. Also makes a really fun game, and a great science project. Last made $685 [2 lb]. $100 added for highly directional antenna.

The ULTIMO NOISE COMMUNICATOR SYSTEM: Used to be that control signals, voice and data could only be communicated using clear signals. Not any more! The UNCS is a system, consisting of both an ultrasonic transmitter and ultrasonic receiver, used to demonstrate that noise can be used to communicate intelligent signals. Electronic, electrical, audio, ultrasonic and infrasonic noise can be intentionally used to produce a control signal, voice signal or data signal itself. Our research shows that noise - virtually regardless of what mode it is transmitted in and what band it occupies within that mode (but almost always high band) - can itself be used to transmit information! Noise communications is in fact a state-of-the-art method of secret communications. Noise is a particularly effective means of further stealthing mind control and electronic attacks as well as communications because even if a victim is able to correlate noise bursts with his/her manifestations, authorities can easily write off his/her allegations, such as, 'It's just a bunch of radio static that just happened to correlate with X's manifestations - everyone knows that noise can't control anything or transmit data.' Sometimes the intelligent information in the noise will give it a quality where it will sound voice-like (quasi-voice) or data-like - you may even be able to discern what the voice is actually saying if you listen very carefully - and it can also be subliminal (e.g. using ultrasound noise to conceal audio signals). In other cases, it will just sound like noise bursts, and often totally overlooked as a possible source of voice, data or control signal, or go undetected by normal senses because both the noise and signal are ultrasonic. Last made $9985 [4 lb].

SCANNERS - The DEVICE! (NA): Ever want to forcibly, yet secretly, project YOUR THOUGHTS into other people and/or animals as an overpowering EM signal? After years of secret experimentation, John Williams developed Scanners - The Device! The ultra-high gain, ultra-low noise and distortion brainwave (and other biologic signal) amplifier coupled to a powerful and effective, yet highly directional, EM transmitter is an absolute must for all serious students and practitioners of Psychic or Mind Control Lab, Weaponry and Countermeasure applications. Range is about 50 feet. Can be attached to a helmet or hat or on/inside clothes, carried in the hand, or concealed inside or behind any nonmetallic object less than about 6" thick. The SD is so controversial, we simply can no longer make it for the general public! Last made $1299 [2 lb]. HISTORICAL DIAGRAMs only: $1,000.00.

The ULTIMATE WEAPONS & LAB DEVELOPMENT SYSTEM (NA): The UW&LDS is a very powerful, effective, highly directional and totally quiet system used in theoretical and applied research into EM weaponry and psychological and physiological manifestations (e.g. behavioral modification and mind control). The UW&LDS uses programmable modulated GHz waveforms. Hand-held and portable. Range exceeds 1 KM. User manual includes operation details, insights and tips. The UW&LDS is a complete EM weapons/lab device experimental development system. Last made $3455 [12 lb]. CAUTION: The UW&LDS is one bad device! It can produce boresight waveforms that are extremely dangerous - and again, buyer assumes all liability for its use and abuse! As with all of our devices, do NOT use in any illegal, unethical or immoral way whatsoever!

The LONG-RANGE INFRARED DETECTOR : Detect the presence of things that generate heat without having to see or hear them first! The LRITD is an ultra-sensitive infrared (IR) detector that will alert you to heat sources up to about 200 feet away. The LRITD includes LED beeper indicators as well as switched 9 VDC and relay closure outputs (e.g. for burglar alarm uses). The LRITD can also be used to detect when a heat source leaves an area (e.g. to monitor a child or pet). And to verify when equipment is turned or left ON or OFF because most operating equipment generate some heat. Can sometimes be used to verify which rooms and areas are occupied by people or animals when they are not visible to you. And helps you detect the presence of hidden operating equipment, such as surveillance devices. And helps you detect the loss of heat from your home, business, or buried/concealed hot water lines and hot water line leaks to help save heating costs. Uses a unique, rugged, and highly effective method of concentrating heat in its detector unit for much greater sensitivity. Particularly sensitive to the 7-14nm IR range of human and (most) animal body heat. Last made $495 [2 lb].

Introduction to this Page
Customized Devices Application Form (CDAF) Webpage

More WILD, WEIRD, WACKY STUFF:
(NOTE: We make no paranormal or medical claims for any CD device; paranormal devices are mostly based on theories which are typically never "provable" to some powerful but corrupt/ignorant skeptics.)

The ULTRASONIC GALVANIC SKIN RESPONSE CORRELATOR: We believe that the Galvanic Skin Response (GSR) is a good indication of anomalies that reside beneath the skin where the galvanic skin response is taken from, and that galvanic skin responses will be very close to each other when the taken on two corresponding positions on symmetrical parts of the body of a healthy person. In other words, for example, if there is an anomaly located unseen under the skin of the right foot but not under the left foot skin in the same foot area, galvanic measurements will likely be different for both foot areas (same part of foot; amount of galvanic skin response difference largely depends on type, size, position and depth of anomaly; both areas should have same amount of skin wetness) because the two feet are fairly symmetrical to each other; however, if there is no anomaly in either foot, then the galvanic measurements, while usually not identical, should be close to each other. We define an "anomaly" (e.g. tumors, infections, impaired blood flows, nerve disorders, strained/torn muscles, strained/torn ligaments, strained/torn tendons, cracked/broken bones, lesions, subcutaneous electronic implants, etc.).
             The UGSRC includes two of our proprietary Super Soft-Pinch Electrodes. When attached to the skin, the input is fed into an ultra high input impedance ultra high gain amplifier (with AGC and adjustable gain to about 1,000,000), with the results displayed on meter (included). AGC - Automatic Gain Control - is important because it much extends the dynamic range of the amplifier, allowing for full amplification of very weak signals but little amplification of very strong signals.
             What makes the UGSRC especially important and totally unique is that it includes an ultrasonic pulser - a special ultrasonic output transducer. The purpose of the ultrasonic transducer is to "thump" or "ping" tissues and organs (i.e. stimulate tissues and organs) located under the skin with ultrasonic pulses (adjustable pulse rate), which pulses are believed to cause an electrical reaction by some anomalies. This reaction may result in a much heightened or amplified galvanic skin response, if so, causing a much greater difference in the galvanic skin response between the side with the anomaly and the side without the anomaly. And furthermore, this reaction may also result in a much much heightened or amplified galvanic skin response from the same electrode placement over an anomaly between the ultrasonic transducer being ON and being OFF, thereby making the UGSRC very useful in electrically ferreting out and pinpointing those well-hidden anomalies, and also for unilaterally testing non-symmetrical parts of the body as well. The ultrasonic transducer is usually placed between the two galvanic electrodes.
             Galvanic skin responses (GSRs) are also traditionally used to detect and expose lying (e.g. polygraphs / lie detectors), psychology research (e.g. reactions to stress and to disturbing thoughts and memories), biomedical research, biofeedback research, paranormal research / psychic research, mind control and electronic attack, and for "ghostbusting." GSRs are ever popularly used by a large religion to ferret out and compensate for stresses in people's lives. We also believe that the UGSRC can be used to test and/or stimulate animals and plants as well. The UGSRC is great for those into researching their own bodies, gadgeteers, experimenters, science researchers / science projects and Science Fairs. Practically endless uses.
UGSRC last made $1995 [2 lb].
             (NOTE: We are not licensed medical professionals, so neither can we make any medical claims nor can we provide medical opinion or medical advice; should you believe that you have an anomaly under your skin, promptly contact your own doctor (at your own expense); since this is a newer technology, we do not have tables that correlate galvanic skin responses to specific anomalies so we have no diagnostic information relating to any particular galvanic skin response for anomalies that may result from any medical condition so the UGSRC is NOT intended to be a diagnostic tool - see your doctor; since the UGSRC can only detect those anomalies that cause differences or changes in the galvanic skin response, it cannot detect anomalies, if any, which do not produce galvanic skin response differences or changes; the lack of a significant difference or change in galvanic skin response does not mean that there is no anomaly; external electromagnetic fields and electronic beams (e.g. from a direct energy electronic attack) which impact one side of the body more than the other can result in different galvanic skin responses in absence of any anomaly and thus the UGSRC may also be a useful tool in detecting exposures to ambient EM fields; and differences in galvanic skin responses can result from no known, understood or provable internal or external causations).

The ULTIMO "MONTAUK CHAIR": The infamous Montauk Chair is reputed to be based on the the design of a special chair which was used by space aliens to perform mind control. The original Montauk Chair was reputedly copied from a chair recovered from a UFO crash site - a UFO believed to have been used to perform alien abductions. The Ultimo "Montauk Chair" (UMC) comes with an headrest and an antenna array, which is adjusted to be poised just above the head and is shaped similar to a half-unfolded umbrella or Asian conical hat (i.e. "coolie hat"). The mind control / body control electronics are stowed in a shelf underneath The Ultimo "Montauk Chair". We cannot include any mind control / body control electronics (as policy, we can only provide mind control and electronic attack detection devices and countermeasures) with The Ultimo "Montauk Chair," but it does include its mind control electronic function diagrams (no mind control circuit diagrams), and its transducers (e.g. embedded coils, antennas, sounders, etc.), including their technical specs and all of their cabling and connectors, so that one can design and implement his/her own system. The Ultimo "Montauk Chair" is not limited to mind control and body control but can also be used for relaxation therapy, pleasure therapy, meditation, learning therapy, dream creativity, dream research, sleep research, radionics research, biofeedback research, entertainment, seances, etc., any or all of which we can include as part of your unique CD project at extra costs. In fact, our Ultimo "Montauk Chair" is ideal for our Transcranial Direct Current Stimulation (TDCS) device-types (ULTIMO TDCS BRAIN STIMULATOR (UTDCSBS)) and the Transcranial Magnetic Stimulation (TMS) device-types we also do as CD projects (see our radionics.htm webpage for the UTDCSBS description).
              As part of the Client's CDAF application, the Client specifies the chair which we buy and convert into our Ultimo "Montauk Chair", because people vary in size and shape, as well as preferences for style, material and color. There are a few restrictions: (1) The chair must either have a sturdy headrest or the back of the chair must be strong enough for us to install a sturdy headrest. (2) The chair must have some area, preferably underneath, where a shelf of at least 1/2 cubic feet can be built to stow electronics (no dimension less than 4"). (3) The chair must be padded (some padding will be opened up by us and then resealed for placement of transducers, including coils, antennas and sounders). (4) The chair must have a minimum of metal in it near or above seat level as metal may interfere with its operation. (5) The chair must not weigh more than 60 lb. The Client selects a chair of his/her preference, and then emails us the make, model, dimensions, and type and color of chair materials. If we cannot find that chair make and model in our area, we will then try to find a chair most close to the Client's specified dimensions, type and color. Last made $6985 [Weight and thus Shipping costs vary depending on Client's size and chair preferences, and shipping address] (for a new chair with a built-in headrest not exceeding $200 in chair's base price).

The 6TH SENSE COMMUNICATOR: One popular product. The SSC consists of a bio-transceiver, which has electrodes (attached with an elastic band or tape). The electrodes may be attached to the heads of the source and receiver, to the head of one and the body of the other, or to each of their bodies, depending upon use. Examples: For bio-commo, the electrodes are attached to the head. For healing, one device's electrodes are attached to the head (or body) of the healer (source), while the other is attached to the relevant part of the body of the subject (receiver). What the SSC does is to highly amplify signals produced by the head/body of the source and transmit them to the head/body of the receiver. Thus, the receiver can actually experience the electrical activity generated by the source's brain. More than one SSC can be used at the same time to involve more than one source and/or receiver. And the source and receiver can be the same person or animal. Sure to give you endless hours of experimentation, exploration, learning, fascination, pleasure and amusement. Last made $395 [2 lb]. For two units (required for full-duplex operation), last made $695 [3 lb]. Last made $275 [1 lb] for each additional unit.

The TELEPATHIC AMPLIFIER : Some people are reputed to possess awesome telepathic powers (we do not claim that telepathic powers exist, or if they do exist, in what form, to what extent, who has them, or how used). "Telepathy" is a highly-specialized form of nonverbal and non-sensory communication believed used in some forms of subliminal mind control, mind-reading, remote viewing, secret communications, brainwashing, brainwave entrainment, behavioral modification, electronic attacks, and alien attacks. After much research, we now believe that we have pinned down the exact mechanism behind mental telepathy powers. For those who do not now possess adequate telepathic powers to effectively and reliably use them, and for those who have established telepathic powers and wish to increase range, the TA is a must! Note that our telepathic powers theory is strictly proprietary and a trade secret, and the result of many costly hours devoted to this research; however, we are also willing to seriously consider any Telepathic Amplifier device-types based on customer theory(ies). Last made $695 [3 lb], based on our theory.

The ALIEN BUSTER BLASTER : Sometimes referred to by others as a space alien jammer, space alien buster jammer or space alien blaster. Some know or believe that space aliens (ETs or extraterrestrials) exist, possess advanced mental telepathic powers, and secretly communicate, eavesdrop, control, harass and attack mental telepathically. How can one escape capture if the abductor knows and controls one's every move and thought? Often, UFO abductees believe that they can't escape alien abduction since their space alien captors know or can predict their every move by telepathically reading their minds and controlling their actions, and telepathically communicating this info to their "gang" members for electronic gang stalking. At least until now! Based on our proprietary telepathic research, the ABB jams and disrupts space alien telepathic communications as how we believe they occur (if they do occur). If so, creating a Telepathic-Free Environment for its believed victims protects them from telepathic mind reading, telepathic mind control, telepathic harassment, telepathic attacks, telepathic interference, and telepathic surveillance / telepathic tracking / telepathic location-finding by space aliens should the source of the attacks be telepathic and of space alien origin. Note that our space alien telepathic theory is strictly proprietary and a trade secret, and the result of many hours of space alien and mental telepathy research (and not provable because to prove space alien telepathic attacks using double-blind scientific studies requires recruiting provable space aliens to attack uninformed victims in scientific laboratory settings witnessed by Government scientists - all of which are not reasonably possible or likely legal to even attempt - the very reason why most victims of claimed space alien attacks cannot prove their attacks to others and must act on their own to protect themselves, and why we never make any claims about the existence of space aliens, space alien actions or intentions, or mental telepathy or any other paranormal phenomenon). We are also willing to seriously consider any Alien Buster Blaster device-types based on Client theory(ies) of space alien mental telepathy, if it can be reasonably implemented using electronics. Last made $595 [2 lb], based on our theory.
              NOTE: While we ourselves believe that space aliens exist, are walking the Earth right now, and are stalking and electronically attacking (or possessing or controlling) people, we do NOT claim that space aliens exist (or ghosts or spirits), or space aliens are walking the Earth, and if so, are stalking and electronically attacking people, because it is difficult to prove that someone is being electronically mind controlled or attacked and much more difficult to prove whether or not the attackers are humans or space aliens as their mind control signals could be very similar.

The SUPER SOFT-PINCH ELECTRODES (Pair): The SSPE electrodes are a very special non-invasive external electrode pair (non-invasive electrodes) which gently, yet securely, pinches onto fingers, toes, ears, nose, loose skin, plant parts, rough and uneven surfaces, etc., and do not require any skin penetration, gel, saline solution, pad, tape or elastic band to work. The Soft-Pinch Electrodes are very versatile spring-operated and bifurcated on both sides (2-tine fork-like). Because these electrodes are bifurcated, other electrodes can be connected to them in series or even groups if you wish using screws. Can be used as experimental and monitoring radionic electrodes, biomedical electrodes (bio electrodes), biofeedback electrodes (BF electrodes), paranormal electrodes, electronic attack electrodes, and mind control electrodes. Can be used on people, animals, plants, and even inert objects. Not intended as medical electrodes. Can be used as stimulating electrodes or recording electrodes - even for some high-voltage uses (used by us for voltages upto 250V, but always carefully test first). Not only are these electrodes very gentle and hold on well, but they can be quickly connected, disconnected and moved around on the surface being used on. SSPE electrodes have very supple and flexible 1/8" dia. leads, yet lasts for 10+ years under normal use and are highly insulative and water and oil resistant. The SSPE comes in any length you specify, 2' - 60' foot range (combined lengths of both SSPE electrodes), and each SSPE electrode can be of the same or different lengths and/or use the same or different end connectors as you specify (because these are Soft-Pinch Electrodes, we recommend 1-2 feet extra for slack). Last made $12.95 for 2' [1 lb], +$4.95 for each additional combined-length foot you require (specify length of each lead, and your end connector(s) - BNC, banana plugs, pin plugs, spade lugs, "eye" lugs, alligator clips, etc., lugs and 3' lead lengths (6' total) are assumed if you don't specify). For an image of Soft-Pinch Electrodes and more details, see ABQ-Techzonics Test Equipment webpage, then search for this Item there (search for "SSPE"), then return here to Lone Star Consulting, Inc. to obtain all you need (Note: As policy, we never recommend for or against another company, product or service).

The VELOSTAT ELECTRODES (Pair, with Meter): "Velostat" is a plastic material impregnated with carbon for conductivity that is commonly used in antistatic bags that hold electronic parts. Velostat works great to both shield against and detect static electric fields, which can develop on the body due to skin exposures to static electricity and EMFs, so therefore, our Velostat Electrodes can give you a very good indication of your ambient electrical exposure environment, and thus allow you to find ways to best shield against or escape high static electric and EMF exposure areas. No other electrodes can duplicate Velostat Electrode functions. The VE electrodes are a very special non-invasive external electrode pair (non-invasive electrodes) which gently, yet securely, attaches to bare skin, and do not require any skin penetration, gel, saline solution, or pad to work. Depending on skin adhesion (moist skin is best), tape or elastic bands may be needed. Can be used as experimental and monitoring radionic electrodes, biomedical electrodes (bio electrodes), biofeedback electrodes (BF electrodes), paranormal electrodes, electronic attack electrodes, and mind control electrodes. Can be used on people, animals, plants, and even inert objects. Not intended as medical electrodes. Can be used as stimulating electrodes or recording electrodes - even for some high-voltage uses (used by us for voltages upto 90V, but always carefully test first). The carbon-impregnated Velostat Electrodes come with a multimeter so that you can monitor yourself thruout your day, if you wish, to help you detect high-exposure periods and high-exposure places. Not only are these electrodes very gentle and hold on well, but they can be quickly connected, disconnected and moved around on the surface being used on. The VE comes in any length you specify, 2' - 60' foot range (combined lengths of both VE electrodes), and each VE electrode can be of the same or different lengths and/or use the same or different end connectors as you specify (because these are Velostat Electrodes, we recommend 1-2 feet extra for slack). Last made $29.95 for 2' [1 lb], + $4.95 for each additional combined-length foot you require (specify length of each lead, 3' lead lengths (6' total) are assumed if you don't specify).

The VERY FLAT & THIN SPIRAL ANTENNAS: Unique and difficult to make/find thin, flat spiral antenna with many applications, including with three devices described above. We can do just about any flat, thin spiral antenna from dime-size to about 12" diameter size in any gauge of wire from 30-gauge to 10-gauge (26-gauge most common, the thicker the gauge the thicker the completed antenna), single-layer and multi-layer (mutlilayer has greater inductance but is also thicker), and copper or nichrome. Great not only for optimum antenna placement through thin slots, cracks, slits, orifices, openings and spaces in electronic equipment chassis and between PC boards for electronic diagnostic, electronic troubleshooting and electronic control purposes but also for medical, biomedical (e.g. miniature Helmholtz coils, brainwave coils), biofeedback, remote control, electronic implants, magnetic field generation coils (e.g. telecoils/magnetic induction loop systems), small metal detector coils, magnetometer coils, communications antennas, surveillance antennas (e.g. direction-finding antennas; and 'through-wall' type applications where the transmitter coil is on one side of a wall and the receiver coil is opposite on the other side), near-field TSCM monitoring, EM shields, works of art, jewelry, crafts, wall mountings, work mats, heating mats, coasters, conversational pieces, etc. We can also cover, coat, and/or mount the antenna using many different materials and fixtures. Last made $29 [1-2 lb] for a spiral antenna about the width and thickness of a credit card, about 400 microhenry.

The PROGRAMMABLE LIGHT & SOUND DETECTOR: Do you need to activate something the instant that a light or sound is detected? For examples, as part of a burglar alarm system, proximity detector, or lamp, appliance, power tool, or process controller. The PL&SD/ detects light and/or sound and produces both a relay closure and 9 VDC outputs. Output durations and light and sound sensitivities are adjustable. Last made $195 [3 lb].

Introduction to this Page
Customized Devices Application Form (CDAF) Webpage

Like what we offer and have a website? Then please put free hotlink to our home page => Lonestarconsultinginc.com


HIGH-TECH SECURITY AND SURVIVAL BOOKS, MANUALS, SOFTWARE, CONSULTING SERVICES: PLEASE NOTE, we are NOT CONSUMERTRONICS.NET (P.O. Box 23097, Albuquerque, NM 87192) (www.consumertronics.net) - well known for their many frank and controversial high-tech survival books, manuals and software. These two businesses are totally separate entities. Neither one owns the other or is a subsidiary of the other. If you wish to do business with CONSUMERTRONICS.NET, please contact them DIRECTLY. (More on these privacy and other policies on our www.lonestarconsultinginc.com/policies.htm) webpage.

ITEMS WANTED TO BUY/TRADE
Can't spare the bucks to pay for your order? Want some of the items listed above but have some of your own that you would like to use as trade? Don't fret - you can still get what you want for little or no out-of-pocket-$ if you have an item(s) of trade we are interested in! If you don't want to trade, we may consider buying what you offer. Either way, let us know.
Most of the specific items we are interested in are described on (email us first as there are some differences): www.consumertronics.net/items4trade.htm (Consumertronics Publisher of High-Tech Survival and Security Books, Manuals and Software, and Consultants).

Introduction to this Page
Customized Devices Application Form (CDAF) Webpage

Introduction to this Page

Customers, Clients, Contributors:
Relevant Topics, Titles to the Many Device Types We Do

SINGLE WORDS: The abductees. The abductions. The abductors. The advice. The advise. The aliens. The analysis. The analyze. The attacks. The aura. The auras. The automatons. The biofeedback. The biocontrol. The blasters. The body-mind. The brainwash. The brainwashed. The brainwashing. The brainwaves. The breadboarding. The build. The calibrated. The calibrations. The circuits. The coaching. The consultants. The consulting. The control. The controllers. The countermeasures. The create. The customized. The customizing. The debug. The debugging. The designs. The develop. The development. The devices. The diathermy. The document. The documenting. The EEG. The electrical. The electricity. The electroencephalograph. The electroencephalogram. The electronics. The energy. The engineer. The engineering. The enigmas. The entities. The entrainment. The equipment. The evaluate. The evaluation. The extrasensory. The extraterrestrials. The fakery. The faking. The flashers. The formats. The fortean. The frauds. The gangstalking. The ghosts. The ghostbusters. The ghostbusting. The harassments. The hardware. The healing. The hypnosis. The hypnotic. The implants. The infrared. The instructions. The instruments. The integrate. The inventions. The ir. The jammers. The jamming. The lasers. The levitator. The lonestarconsultinginc.com.

The magnetometers. The maintenance. The medical. The meditation. The merchandise. The mind-body. The modify. The modification. The modifications. The neurophone. The neurophones. The neurophonic. The offers. The pemf. The phenomena. The phenomenon. The phobias. The pitch. The plans. The presence. The privacy. The products. The professional. The program. The prototyping. The psychokineses. The psychokinetic. The psionics. The radionics. The repair. The repairs. The reports. The reporting. The RFID. The robotic. The robots. The schematics. The security. The Sedona. The services. The shrieker. The specialized. The stimulations. The stimulators. The spying. The surveillance. The survival. The technical. The telepathic. The telepathy. The tens. The testing. The therapy. The theremin. The transponders. The troubleshoot. The troubleshooting. The tutorials. The UFOs. The unexplained. The updated. The upgraded. The uv. The zappers.

A: The "abducted by aliens." The "abducted by ETs." The "abducted by space aliens." The "abducted by UFOs." The "active electrodes." The "advanced brainwaves." The "advanced brainwave control techniques." The "advanced brainwave signature." The "advanced electronic attack techniques." The "advanced mind control techniques." The "alien abductions electromagnetic manifestations." The AI technology,The "alien artifacts." The "alien busters." The "alien capabilities." The "alien contacts." The "alien countermeasures." The "alien defenses." The "alien detection." The "alien detectors." The "alien detecting." The "alien electronic attacks." The "alien electronic implants." The "alien encounters." The "alien implant control." The "alien implant programming." The "alien implants." The "alien mind control powers." The "alien mysteries." The "alien phenomena." The "alien phenomenon." The "alien sightings." The "alien spies." The "alien transponders." The "alien weapons research." The "alien weapons systems research." The "alien weapons technologies." The "alpha brain waves." The "alpha brain wave control." The "alpha brainwaves." The "alpha brainwave control." The "alpha brainwave monitoring." The "alpha brainwave signals." The "alpha frequencies." The "alpha waves." The "altered states." The "aluminum foil shielding." The "analog circuits." The "animal attacks." The "animal behavior modification." The "animal control." The "animal mind control attacks." The "animal obedience training." The "animal subliminal mind control attacks." The "animal training."

The "artificial intelligence computers." The "artificial intelligence devices." The "artificial intelligence electronic attacks." The "artificial intelligence methods." The "artificial intelligence methods."The "artificial intelligence mind control attacks." The "artificial intelligence techniques." The "artificial intelligence technologies." The "artificial intelligence weapons." The "astral projections." The "attack signals." The "auditory cortex." The "auditory hallucinations caused by electronic attacks." The "auditory hallucinations caused by mind control attacks." The "aura detecting." The "aura detectors." The "aura phenomenon." The "automatic learning."

The "avoid electronic attacks." The "avoid electronic brain entrainment." The "avoid electronic entrainment." The "avoid electronic harassment." The "avoid electronic implant control." The "avoid electronic implant programming." The "avoid electronic implants." The "avoid directed energy weapons." The "avoid electronic mind control attacks." The "avoid electronic spying." The "avoid electronic subliminal mind control attacks." The "avoid electronic surveillance." The "avoid electronic torture." The "avoid mind control attacks." The "avoid pyschological control." The "avoid psychological entrainment." The "avoid subliminal mind control attacks." The "awesome circuit designs." The "awesome circuits." The "awesome devices." The "awesome electronic devices." The "awesome electronic gadgets." The "awesome electronics." The "awesome equipment." The "awesome gadgets." The "awesome hardware." The "awesome products." The "awesome projects." The "awesome science projects." The "awesome special projects."

B: The "BCI." The "beam death rays." The "beam torture weapons research." The "beam weapons systems research." The "beam weapons technologies." The "behavior control devices." The "behavior control technologies." The "behavior manipulation weapons systems research." The "behavior weapons systems research." The "behavioral control." The "behavioral modification." The "behavioral modifications countermeasures." The "behavioral programming." The "behavioral weapons systems research." The "beta brain waves." The "beta brain wave control." The "beta brainwaves." The "beta brainwave control." The "beta brainwave monitoring." The "beta brainwave signals." The "beta frequencies." The "beta waves." The "biocontrol devices." The "biocontrol experimentation." The "bioelectric signals." The "bioelectromagnetic signals." The "biofeedback devices." The "biofeedback experimentation." The "bioluminescence phenomenon."

The "body controls." The "body control conspiracies." The "body control countermeasure services." The "body control countermeasures." The "body control customized devices." The "body control detectors." The "body control devices." The "body control electrodes." The "body control electronic attacks." The "body control electronic implant control." The "body control electronic implant programming." The "body control electronic implants." The "body control electronics." The "body control experiments." The "body control methods." The "body control protection." The "body control satellites." The "body control shielding." The "body control slaves." The "body control stories." The "body control tactics." The "body control techniques." The "body control technology." The "body control technologies." The "body control consultants." The "body control consulting services." The "body control customized device services." The "body control customized devices." The "body control development services." The "body control designs." The "body control design services." The "body control devices." The "body control equipment." The "body control electronics." The "body control frequencies." The "body control hardware." The "body control implant control." The "body control implant programming." The "body control implants." The "body control countermeasure invention services." The "body control invention laboratory services." The "body control invention prototyping services." The "body control invention services." The "body control inventions." The "body control inventors." The "body control jamming issues." The "body control medical causations." The "body control medical manifestations." The "body control methods." The "body control products." The "body control prototype services." The "body control prototypes." The "body control prototyping services." The "body control R&D services." The "body control research, design and development services." The "body control research laboratories." The "body control research services." The "body control researchers." The "body control secrets." The "body control services." The "body control special projects services." The "body control shielding issues." The "body control special services." The "body control systems." The "body control tactics." The "body control techniques." The "body control testers." The "body control testing laboratories." The "body control testing services." The "body control troubleshooters." The "body control troubleshooting services." The "body control victims." The "body control weapons systems research." The "body/mind connection." The "body resonant frequency."

The "brain abnormalities caused by electronic attacks." The "brain abnormalities caused by mind control attacks." The "brain blasters." The "brain blaster technology." The "brain burn weapons systems research." The "brain burn weapons." The "brain circuits." The "brain control technologies." The "brain electrical circuits." The "brain electronic implants." The "brain entrainments." The "brain entrainment conspiracies." The "brain entrainment countermeasures." The "brain entrainment electronic implants." The "brain entrainment experiments." The "brain entrainment implant technologies." The "brain entrainment implant programming." The "brain entrainment implants." The "brain entrainment mind control attacks." The "brain entrainment processes." The "brain entrainment programming." The "brain entrainment secrets." The "brain entrainment systems." The "brain entrainment technologies." The "brain entrainment weapons." The "brain implant control." The "brain implant technologies." The "brain implants." The "brain inhibition experiments." The "brain inhibition techniques." The "brain inhibition technologies." The "brain inhibition technology." The "brain inhibitions." The "brain inhibitors." The "brain link." The "brain manipulation weapons systems." The "brain mapping." The "brain monitoring." The "brain scanners." The "brain scanning technology." The "brain signature scanning technology." The "brain state attacks." The "brain state control." The "brain state controllers." The "brain state electronic attacks." The "brain state entrainment." The "brain state methods." The "brain state mind control attacks." The "brain state monitoring." The "brain state programmers." The "brain state programming." The "brain state surveillance." The "brain state techniques." The "brain state technology." The "brain state weapons systems research." The "brain states." The "brain stimulation conspiracies." The "brain stimulation electronic implants." The "brain stimulation experiments." The "brain stimulation implant control." The "brain stimulation implant programming." The "brain stimulation implants." The "brain stimulation mind control attacks." The "brain stimulation processes." The "brain stimulation programming." The "brain stimulation secrets." The "brain stimulation systems." The "brain stimulation technologies." The "brain stimulation weapons." The "brain stimulations." The "brain stimulators." The "brain-to-computer interfaces (BCI)." The "brain trauma." The "brain wave signatures." The "brain wave signature detection technology." The "brain's circuits." The "brain's electrical circuits."

The "brainwave bandwidth." The "brainwave emotional clusters." The "brainwave entrainment conspiracies." The "brainwave entrainment electronic implants." The "brainwave entrainments." The "brainwave entrainment experiments." The "brainwave entrainment implant control." The "brainwave entrainment implant programming." The "brainwave entrainment implants." The "brainwave entrainment mind control attacks." The "brainwave entrainment processes." The "brainwave entrainment programming." The "brainwave entrainment secrets." The "brainwave entrainment systems." The "brainwave entrainment technologies." The "brainwave entrainment weapons." The "brainwave frequencies." The "brainwave signatures." The "brainwave signature detection technology." The "brainwashing countermeasures." The "brainwashing devices." The "brainwashing electronics." The "brainwashing experiments." The "brainwashing methods." The "brainwashing secrets." The "brainwashing systems." The "brainwashing technology." The "brainwashing torture." The "brainwashing weapons." The "brainwave analysis techniques." The "brainwave control." The "brainwave controlling." The "brainwave entrainment." The "brainwave modulation." The "brainwave monitoring." The "brainwave scanning." The "brainwave signature analysis." The "brainwave signature scanning." The "brainwave signatures." The "brain wave scanning." The "brain wave signature scanning." The "brain wave signatures." The "burn weapons systems research." The "burn weapons technology."

C: The "carbon impregnated Velostat." The "carrier current attacks." The "carrier current countermeasures." The "carrier currents." The "carrier current mind control attacks." The "carrier current transmitters." The "carrier current receivers." The "cellphone electronic attacks." The "cellphone mind control attacks." The "cellphone subliminal mind control attacks." The "cellular phone electronic attacks." The "cellular phone mind control attacks." The "cellular phone subliminal mind control attacks." The "cell phone electronic attacks." The "cell phone mind control attacks." The "cell phone subliminal mind control attacks." The "chronic pain syndrome." The "circuit customizing." The "circuit designs." The "circuit designing." The "circuit integration." The "circuit inventions." The "circuit inventing." The "circuit modifying." The "circuit modifications." The "circuit prototyping." The "circuit repairs." The "circuit repairing." The "circuit testing." The "circuit troubleshooting." The "circuit upgrades." The "circuit upgrading." The "circular polarized light attacks." The "Cointelpro operations." The "collateral damage from brainwashing experiments." The "collateral damage from electronic attack experiments." The "collateral damage from mind control experiments."

The "commercial satellite control of mind control devices." The "commercial satellite control signals." The "commercial satellite electronic attacks." The "commercial satellite mind control attacks." The "commercial satellite mind control systems." The "commercial satellite signals." The "commercial satellite spies." The "commercial satellite spying systems." The "commercial satellite subliminal mind control attacks." The "commercial satellite surveillance systems." The "commercial satellite tracking systems."

The "communicating telepathically." The "complex waveforms." The "constellation of manifestations." The "constellations of symptoms." The "constellation of manifestations." The "constellations of symptoms." The "cordless phone electronic attacks." The "cordless phone mind control attacks." The "cordless phone subliminal mind control attacks." The "control of the mind." The "control minds." The "controlled offensive behavior." The "cool circuit designs." The "cool circuits." The "cool devices." The "cool electronic devices." The "cool electronic gadgets." The "cool electronics." The "cool equipment." The "cool gadgets." The "cool hardware." The "cool products." The "cool projects." The "cool science projects." The "cool special projects." The "countermeasures against behavioral modification attacks." The "countermeasures against brain entrainment attacks." The "countermeasures against brainwashing attacks." The "countermeasures against body control attacks." The "countermeasures against directed energy weapons attacks." The "countermeasures against electronic attacks." The "countermeasures against electronic gang stalking attacks." The "countermeasures against electronic harassment." The "countermeasures against mind control attacks." The "countermeasures against mind reading attacks." The "countermeasures against subliminal mind control attacks." The "countermeasures technology." The "counter measures technology." The "CPL mind control attacks." The "creative dreaming - creative genius." The "creative genius creative dreaming."

Customized: The "custom-made circuits." The "custom-made consulting." The "custom-made designs." The "custom-made devices." The "custom-made equipment." The "custom-made hardware." The "custom-made inventions." The "custom-made merchandise." The "custom-made modifications." The "custom-made offers." The "custom-made products." The "custom-made product offers." The "custom-made repairs." The "custom-made services." The "custom-made solutions." The "custom-made upgrades." The "custom make circuits." The "custom make consulting." The "custom make designs." The "custom make devices." The "custom make equipment." The "custom make hardware." The "custom make inventions." The "custom make merchandise." The "custom make modifications." The "custom make offers." The "custom make products." The "custom make product offers." The "custom make repairs." The "custom make services." The "custom make solutions." The "custom make upgrades."

The "custom makes of circuits." The "custom makes of consulting." The "custom makes of designs." The "custom makes of devices." The "custom makes of equipment." The "custom makes of hardware." The "custom makes of inventions." The "custom makes of modifications." The "custom makes of merchandise." The "custom makes of offers." The "custom makes of products." The "custom makes of product offers." The "custom makes of repairs." The "custom makes of services." The "custom makes of solutions." The "custom makes of upgrades." The "customize circuits." The "customize consulting." The "customize designs." The "customize devices." The "customize equipment." The "customize hardware." The "customize inventions." The "customize merchandise." The "customize modifications."The "customize offers." The "customize products." The "customize product offers." The "customize repairs." The "customize services." The "customize solutions." The "customize upgrades."

The "customized circuits." The "customized consulting." The "customized designs." The "customized devices." The "customized equipment." The "customized hardware." The "customized inventions." The "customized merchandise." The "customized modifications."The "customized offers." The "customized products." The "customized product offers." The "customized repairs." The "customized services." The "customized solutions." The "customized upgrades." The "customizing circuits." The "customizing designs." The "customizing devices." The "customizing equipment." The "customizing hardware." The "customizing inventions." The "customizing merchandise." The "customizing offers." The "customizing modifications." The "customizing products." The "customizing product offers." The "customizing repairs." The "customizing services." The "customizing solutions." The "customizing upgrades."

D: The "DARPA programs." The "death ray beams." The "death rays." The "Defense Advanced Research Projects Agency (DARPA) programs." The "defense against aliens." The "defense against ghosts." The "defense against unknown entities." The "defense against unknown presences." The "delta brain waves." The "delta brain wave control." The "delta brainwaves." The "delta brainwave control." The "delta brainwave monitoring." The "delta brainwave signals." The "delta frequencies." The "delta waves." The "demodulate brainwaves." The "demodulated brainwaves." The "demodulation of brainwaves." The "demodulate modulated brainwaves." The "demodulated modulated brainwaves." The "demon governments." The "demons controlling your mind." The "demons inside your head." The "designing circuits." The "designing devices." The "designing equipment." The "designing hardware." The "designing products." The "designing services."

The "detect aliens." The "detect attacks." The "detect electronic attacks." The "detect EMF attacks." The "detect electromagnetic attacks." The "detect microwave attacks." The "detect brain entrainment attacks." The "detect brainwashing attacks." The "detect electronic attacks." The "detect electronic brain entrainment attacks." The "detect electronic entrainment attacks." The "detect electronic harassment." The "detect electronic implant control." The "detect electronic implant programming." The "detect electronic implants." The "detect electronic mind control attacks." The "detect electronic spying." The "detect electronic subliminal mind control attacks." The "detect electronic surveillance." The "detect electronic torture." The "detect ghosts." The "detect implant control." The "detect implant programming." The "detect implants." The "detect lightning conditions." The "detect mind control attacks." The "detect pain field generator attacks." The "detect subliminal mind control attacks." The "detect unknown entities." The "detect unknown presences."

The "device customizing." The "device designs." The "device designing." The "device inventions." The "device integration." The "device inventing." The "device modifying." The "device modifications." The "device prototyping." The "device repairs." The "device repairing." The "device testing." The "device troubleshooting." The "device upgrades ." The "device upgrading." The "digital circuits." The "direct energy weapons research, design and development." The "direct energy weapons technologies."

The "directed energy attack devices." The "directed energy attacks." The "directed energy behavioral modification techniques." The "directed energy body control techniques." The "directed energy brain entrainment techniques." The "directed energy brainwashing techniques." The "directed energy brainwave entrainment techniques." The "directed energy countermeasures." The "directed energy devices." The "directed energy harassment." The "directed energy mind control techniques." The "directed energy subliminal mind control attacks." The "directed energy techniques." The "directed energy technologies." The "directed energy weapon attacks." The "directed energy weapon harassment." The "directed energy weapons systems research." The "directed energy weaponry technologies." The "directed energy weapons countermeasures." The "directed energy technologies." The "directed energy torture weapons systems research." The "directed energy weapons conspiracies." The "directed energy weapons electronic implants." The "directed energy weapons experiments." The "directed energy weapons implant control." The "directed energy weapons implant programming." The "directed energy weapons implants." The "directed energy weapons mind control attacks." The "directed energy weapons processes." The "directed energy weapons programming." The "directed energy weapons secrets." The "directed energy weapons systems research." The "directed energy weapons technologies." The "directed energy weapons." The "directed energy weapons design and development." The "directed energy weapons development." The "directed energy weapons research, design and development." The "directed energy weapons systems technologies." The "directed energy weapons techniques." The "directed energy weapons technologies."

The "Discovery Channel's MythBusters program." The "Discovery Channel's MythBusters TV program." The "dsm iv."

EA-EL: The "emf attacks." The "emf brain stimulations." The "emf mind control attacks." The "electrical brain inhibitions." The "electrical brain stimulations." The "electrical electrodes." The "electrical experiments." The "electrical inhibition of the brain." The "electrical stimulation of the brain." The "electrode implanted." The "electrode implanting." The "electrode implant control." The "electrode implant programming." The "electrode implants." The "electrode recordings." The "electrode stimulations." The "electromagnetic attacks." The "electromagnetic blockers." The "electromagnetic countermeasures." The "electromagnetic defenses." The "electromagnetic detection." The "electromagnetic detectors." The "electromagnetic electrodes." The "electromagnetic eliminators." The "electromagnetic jammers." The "electromagnetic protectors." The "electromagnetic protection." The "electromagnetic repellents." The "electromagnetic repellers." The "electromagnetic repulsers." The "electromagnetic weapons.

The "electromagnetic attack blockers." The "electromagnetic attack countermeasures." The "electromagnetic attack defenses." The "electromagnetic attack detection." The "electromagnetic attack devices." The "electromagnetic attack electrodes." The "electromagnetic attack equipment." The "electromagnetic brain stimulations." The "electromagnetic attack hardware." The "electromagnetic attack detectors." The "electromagnetic attack eliminators." The "electromagnetic attack experiments." The "electromagnetic attack jammers." The "electromagnetic attack methods." The "electromagnetic attack protectors." The "electromagnetic attack protection." The "electromagnetic attack repellents." The "electromagnetic attack repellers." The "electromagnetic attack repulsers." The "electromagnetic attack secrets." The "electromagnetic attack techniques." The "electromagnetic attack technologies." The "electromagnetic attack weapons."

The "electromagnetic experiments." The "electromagnetic harassment blockers." The "electromagnetic harassment countermeasures." The "electromagnetic harassment defenses." The "electromagnetic harassment detection." The "electromagnetic harassment detectors." The "electromagnetic harassment eliminators." The "electromagnetic harassment jammers." The "electromagnetic harassment protectors." The "electromagnetic harassment protection." The "electromagnetic harassment repellents." The "electromagnetic harassment repellers." The "electromagnetic harassment repulsers." The "electromagnetic harassment weapons."

The "electromagnetic mind control blockers." The "electromagnetic mind control countermeasures." The "electromagnetic mind control defenses." The "electromagnetic mind control detection." The "electromagnetic mind control detectors." The "electromagnetic mind control eliminators." The "electromagnetic mind control jammers." The "electromagnetic mind control protectors." The "electromagnetic mind control protection." The "electromagnetic mind control repellents." The "electromagnetic mind control repellers." The "electromagnetic mind control repulsers." The "electromagnetic mind control weapons."

The "electromagnetic anti-terrorism." The "electromagnetic attacking." The "electromagnetic attack tutorial." The "electromagnetic attacks." The "electromagnetic circuits." The "electromagnetic design and development." The "electromagnetic detectors." The "electromagnetic devices." The "electromagnetic dowsing." The "electromagnetic entrainment." The "electromagnetic hardware." The "electromagnetic harassing devices." The "electromagnetic harassment." The "electromagnetic implant control." The "electromagnetic implant programming." The "electromagnetic implants." The "electromagnetic jammers." The "electromagnetic jamming issues." The "electromagnetic mind control attacks." The "electromagnetic pulse weapons of mass destruction." The "electromagnetic pulsed weapons of mass destruction." The "electromagnetic research." The "electromagnetic shielding issues." The "electromagnetic spying." The "electromagnetic stimulation of the brain." The "electromagnetic stimulations." The "electromagnetic stimulators." The "electromagnetic subliminal mind control attacks." The "electromagnetic surveillance." The "electromagnetic techniques." The "electromagnetic technologies." The "electromagnetic torment." The "electromagnetic torture weapons." The "electromagnetic victims." The "electromagnetic weapons devices." The "electromagnetic weapons programs." The "electromagnetic weapons research." The "electromagnetic weapons systems research." The "electromagnetic weapons systems technologies." The "electromagnetic weapons of mass destruction." The "electromagnetic zappers."

The "electronic attack bands." The "electronic attack bandwidth." The "electronic attack blockers." The "electronic attack countermeasure services." The "electronic attack countermeasures." The "electronic attack data." The "electronic attack defenses." The "electronic attack detection." The "electronic attack detectors." The "electronic attack eliminators." The "electronic attack exotic weapons." The "electronic attack information." The "electronic attack jammers." The "electronic attack lessons." The "electronic attack protectors." The "electronic attack protection." The "electronic attack repellents." The "electronic attack repellers." The "electronic attack repulsers." The "electronic attack weapons." The "electronic attack consultants." The "electronic attack consulting services." The "electronic attack customized device services." The "electronic attack customized devices." The "electronic attack development services." The "electronic attack designs." The "electronic brain inhibitions." The "electronic brain stimulations." The "electronic attack control design services." The "electronic attack devices." The "electronic attack equipment." The "electronic attack frequencies in ghz." The "electronic attack frequencies in mhz." The "electronic attack hardware." The "electronic attack countermeasure invention services." The "electronic attack invention laboratory services." The "electronic attack invention prototyping services." The "electronic attack invention services." The "electronic attack inventions." The "electronic attack inventors." The "electronic attack laboratory services." The "electronic attack laboratories." The "electronic attack medical causations." The "electronic attack medical manifestations." The "electronic attack merchandise." The "electronic attack methods." The "electronic attack paranoia." The "electronic attack psychosis." The "electronic attack product creation services." The "electronic attack product development services." The "electronic attack product services." The "electronic attack product researchers." The "electronic attack products." The "electronic attack prototype services." The "electronic attack prototypes." The "electronic attack prototyping services." The "electronic attack repair services." The "electronic attack R&D services." The "electronic attack research, design and development services." The "electronic attack research laboratories." The "electronic attack secrets." The "electronic attack research services." The "electronic attack researchers." The "electronic attack services." The "electronic attack sexual abuse." The "electronic attack skin lesions." The "electronic attack skin rashes." The "electronic attack special projects services." The "electronic attack special services." The "electronic attack spectrum." The "electronic attack strategies." The "electronic attack tactics." The "electronic attack techniques." The "electronic attack technologies." The "electronic attack testers." The "electronic attack testing laboratories." The "electronic attack tactics." The "electronic attack testing services." The "electronic attack tips." The "electronic attack troubleshooters." The "electronic attack troubleshooting services." The "electronic attack tutorial." The "electronic attacks using artificial intelligence."

The "electronic blockers." The "electronic body control attacks." The "electronic brain stimulation devices." The "electronic brain stimulations." The "electronic countermeasure services." The "electronic countermeasure invention services." The "electronic countermeasures against behavioral modification attacks." The "electronic countermeasures against brain entrainment attacks." The "electronic countermeasures against brainwashing attacks." The "electronic countermeasures against body control attacks." The "electronic countermeasures against directed energy weapons attacks." The "electronic countermeasures against electronic attacks." The "electronic countermeasures against electronic gang stalking attacks." The "electronic countermeasures against electronic harassment." The "electronic countermeasures against mind control attacks." The "electronic countermeasures against mind reading attacks." The "electronic countermeasures against subliminal mind control attacks." The "electronic countermeasures technology." The "electronic defenses." The "electronic demodulation of signals." The "electronic demodulation of brainwaves." The "electronic detection." The "electronic detectors." The "electronic eliminators." The "electronic experiments." The "electronic gang mobbing." The "electronic gang stalking countermeasures." The "electronic gang stalking." The "electronic gangstalking." The "electronic harass." The "electronic harassment blockers." The "electronic harassment countermeasures." The "electronic harassment countermeasures." The "electronic harassment defenses." The "electronic harassment detection." The "electronic harassment detection." The "electronic harassment detectors." The "electronic harassment eliminators." The "electronic harassment jammers." The "electronic harassment protectors." The "electronic harassment protection." The "electronic harassment repellents." The "electronic harassment repellers." The "electronic harassment repulsers." The "electronic harassment systems." The "electronic harassment techniques." The "electronic harassment technologies." The "electronic harassment weapons." The "electronic inhibition of the brain." The "electronic jammers."

The "electronic mind control blockers." The "electronic mind control countermeasures." The "electronic mind control defenses." The "electronic mind control detection." The "electronic mind control detectors." The "electronic mind control eliminators." The "electronic mind control jammers." The "electronic mind control protectors." The "electronic mind control protection." The "electronic mind control repellents." The "electronic mind control repellers." The "electronic mind control repulsers." The "electronic mind control weapons." The "electronic modulation with brainwaves."

The "electronic anti-terrorism." The "electronic attack devices." The "electronic attack electrodes." The "electronic attack equipment." The "electronic attack hardware." The "electronic attack experiments." The "electronic attack expose." The "electronic attacking." The "electronic attacks." The "electronic circuits." The "electronic circuit designs." The "electronic design and development." The "electronic designs." The "electronic detectors." The "electronic devices." The "electronic dowsers." The "electronic dowsing." The "electronic drugstore." The "electronic electrodes." The "electronic brain entrainment." The "electronic entrainment." The "electronic genital attacks." The "electronic genital stimulations." The "electronic hardware." The "electronic harassing." The "electronic harassment experiments."The "electronic human surveillance devices." The "electronic human tracking devices." The "electronic implant attacks." The "electronic implant brain entrainment." The "electronic implant control." The "electronic implant controllers." The "electronic implant electronic attack." The "electronic implant injection." The "electronic implant mind control attacks." The "electronic implant monitoring." The "electronic implant programmers." The "electronic implant programming." The "electronic implant surveillance." The "electronic implanted Manchurian Candidate." The "electronic implants."

The "electronic jammers." The "electronic jamming issues." The "electronic mind control attacks." The "electronic mind control devices." The "electronic mind reading devices." The "electronic protectors." The "electronic protection." The "electronic repellents." The "electronic repellers." The "electronic repulsers." The "electronic research." The "electronic sexual abuse." The "electronic sexual attacks." The "electronic shielding issues." The "electronic spying." The "electronic stimulation of the genitals." The "electronic stimulation devices." The "electronic stimulations." The "electronic stimulators." The "electronic subliminal mind control attacks." The "electronic surveillance." The "electronic techniques." The "electronics technologies." The "electronic terrorism." The "electronic torture weapons." The "electronic tracking." The "electronic torment." The "electronic torture." The "electronic tracking." The "electronic victims." The "electronic voice phenomena." The "electronic weapons countermeasures." The "electronic weapons devices." The "electronic weapons of torture." The "electronic weapons programs." The "electronic stimulation of the brain." The "electronic weapons research." The "electronic weapons systems research." The "electronic weapon system devices." The "electronic weapons systems technologies." The "electronic ventriloquism." The "electronic weapons of mass destruction."

The "electronically attack. " The "electronically attacked. " The "electronically control. " The "electronically controlled. " The "electronically harass. " The "electronically harassed." The "electronically-induced mind control devices." The "electronically surveil. " The "electronically surveilled. " The "electronically track. " The "electronically tracked." The "electrophonic hearing." The "electrophonic sounds." The "electrotelepathic attacks." The "electrotelepathic harassment."

EM-EZ: The "EM harassing devices." The "em jammers." The "em weaponry." The "em zappers." The "emf harassing devices." The "emf jammers." The "emf weaponry." The "emf weapons systems research." The "emf zappers." The "emotional brainwave clusters." The "emotional clusters of brainwaves." The "emotional trauma."

The "end aliens." The "end brain entrainment attacks." The "end brainwashing attacks." The "end electronic attacks." The "end electronic brain entrainment attacks." The "end electronic entrainment attacks." The "end electronic harassment." The "end electronic implant control." The "end electronic implant programming." The "end electronic implants." The "end electronic mind control attacks." The "end electronic spying." The "end electronic subliminal mind control attacks." The "end electronic surveillance." The "end electronic torture." The "end ghosts." The "end implant control." The "end implant programming." The "end implants." The "end lightning attacks." The "end mind control attacks." The "end pain field generator attacks." The "end subliminal mind control attacks." The "end brain entrainment attacks." The "end mind control harassment." The "end brain spying." The "end brainwave spying." The "end brainwave signature spying." The "end subliminal mind control attacks." The "end brain surveillance." The "end brainwave surveillance." The "end brainwave signature surveillance." The "end brain torture." The "end mind torture." The "end unknown entities." The "end unknown presences."

The "entrainment countermeasures." The "entrainment devices." The "entrainment electronics." The "entrainment experiments." The "entrainment methods." The "entrainment systems." The "entrainment technology." The "entrainment torture." The "environmental manifestations of body control attacks." The "environmental manifestations of directed energy attacks." The "medical manifestations of electronic attacks." The "environmental manifestations of electronic gang stalking." The "environmental manifestations of electronic harassment." The "environmental manifestations of mind control attacks." The "physiological effects of electronic attack." The "physiological manifestations of electronic attack." The "equipment customizing." The "equipment designs." The "equipment designing." The "equipment integration." The "equipment inventions." The "equipment inventing." The "equipment modifying." The "equipment modifications." The "equipment prototyping." The "equipment repairs." The "equipment repairing." The "equipment testing." The "equipment troubleshooting." The "equipment upgrades ." The "equipment upgrading." The "ET abductions." The "ET attacks." The "ET electronic attacks." The "ET implants." The "ET mind control powers." The "evoked potentials." The "experts in electronic attacks." The "experts in electronic mind control attacks." The "experts in mind control attacks." The "extra sensory pain fields." The "extra sensory perception." The "extra sensory persecution." The "extra sensory persuasion." The "extra sensory pleasure." The "extra sensory projection." The "extrasensory pain fields." The "extrasensory perception." The "extrasensory persecution." The "extrasensory persuasion." The "extrasensory pleasure." The "extrasensory projection." The "extra sensual pain fields." The "extra sensual perception." The "extra sensual persecution." The "extra sensual persuasion." The "extra sensual pleasure." The "extra sensual projection." The "extrasensual pain fields." The "extrasensual perception." The "extrasensual persecution." The "extrasensual persuasion." The "extrasensual pleasure." The "extrasensual projection." The "extra sexual pain fields." The "extra sexual perception." The "extra sexual persecution." The "extra sexual persuasion." The "extra sexual pleasure." The "extra sexual projection." The "extrasexual pain fields." The "extrasexual perception." The "extrasexual persecution." The "extrasexual persuasion." The "extrasexual pleasure." The "extrasexual projection."

F: The "fake alien abductions." The "federal electronic attack research programs." The "federal mind control human research programs." The "fight electronic terrorism." The "fighting electronic terrorism." The "fight terrorism." The "fighting terrorism." The "flash blasters." The "flashing LED mind controllers." The "flashing LED mind control devices." The "flashing LED mind control technologies." The "FMRI non-consensual lie detection." The "FMRI non-consensual lie detectors." The "free catalog." The "free estimates." The "free support." The "free technical information." The "free technical support." The "frequency following response." The "frequency instrument therapy." The "Frey Effect devices." The "Frey Effects technology." The "Functional Magnetic Resonance Imaging technology (FMRI)."

G: The "galvanic skin response devices." The "gamma brain waves." The "gamma brain wave control." The "gamma brainwaves." The "gamma brainwave control." The "gamma brainwave monitoring." The "gamma brainwave signals." The "gamma frequencies." The "gamma waves." The "gang stalking." The "gangstalking." The "ghost buster." The "ghost busters." The "ghost busting." The "ghostbuster devices." The "ghostbuster equipment." The "ghostbuster hardware." The "ghostbuster merchandise." The "ghostbuster offers." The "ghostbuster products." The "ghostbuster devices." The "ghostbuster equipment." The "ghostbuster hardware." The "ghostbuster merchandise." The "ghostbuster offers." The "ghostbuster products." The "ghost buster devices." The "ghost buster equipment." The "ghost buster hardware." The "ghost buster merchandise." The "ghost buster offers." The "ghost buster products." The "ghostbusting devices." The "ghostbusting equipment." The "ghostbusting hardware." The "ghostbusting merchandise." The "ghostbusting offers." The "ghostbusting products." The "ghost busting devices." The "ghost busting equipment." The "ghost busting hardware." The "ghost busting merchandise." The "ghost busting offers." The "ghost busting products." The "ghost countermeasures." The "ghost defenses." The "ghost detection." The "ghost detectors." The "ghost detecting."

The "government beams voices into your head." The "government controls your mind." The "government implant control." The "government implant programming." The "government electronic attacks." The "government electronic implants." The "government implants." The "government spies." The "government transponders." The "government brain entrainment experiments." The "government conspiracies." The "government mind control attacks." The "government mind control experiments." The "government sends voices into your head." The "government subliminal mind control experiments."

H: The "hall effect devices." The "hardware customizing." The "hardware designs." The "hardware designing." The "hardware integration." The "hardware inventions." The "hardware inventing." The "hardware modifying." The "hardware modifications." The "hardware prototyping." The "hardware repairs." The "hardware repairing." The "hardware research." The "hardware testing." The "hardware troubleshooting." The "hardware upgrades ." The "hardware upgrading." The "harassing signals." The "hearing aid telecoils and magnetic induction loop systems." The "hearing aid telecoils and magnetic loop systems." The "hearing voices in your head." The "hearing voices in your mind." The "hearing your own thoughts." The "harassment signals." The "head injuries." The "head trauma." The "heightened state of paranoia." The "hidden trauma."

The "high frequency brain stimulation." The "high-frequency hum detection." The "high-frequency hum detecting." The "high-frequency hum detectors." The "high frequency stimulation of the brain." The "high tech consultants." The "hi-tech consultants." The "high tech consulting." The "hi-tech consulting." The "high tech devices." The "hi-tech devices." The "high tech equipment." The "hi-tech equipment." The "high tech hardware." The "hi-tech hardware." The "high tech offers." The "hi-tech offers." The "high tech products." The "hi-tech products." The "high tech services." The "hi-tech services." The "high tech security consultants." The "hi-tech security consultants." The "high tech security consulting." The "hi-tech security consulting." The "high tech security devices." The "hi-tech security devices." The "high tech security equipment." The "hi-tech security equipment." The "high tech security hardware." The "hi-tech security hardware." The "high tech security offers." The "hi-tech security offers." The "high tech security products." The "hi-tech security products." The "high tech security services." The "hi-tech security services." The "high tech survival consultants." The "hi-tech survival consultants." The "high tech survival consulting." The "hi-tech survival consulting." The "high tech survival devices." The "hi-tech survival devices." The "high tech survival equipment." The "hi-tech survival equipment." The "high tech survival hardware." The "hi-tech survival hardware." The "high tech survival offers." The "hi-tech survival offers." The "high tech survival products." The "hi-tech survival products." The "high tech survival services." The "hi-tech survival services." The "high voltage brain stimulations." The "high voltage stimulation of the brain." The "Holodeck mind control techniques."

The "how to detect alien abductions." The "how to detect body control attacks." The "how to detect brain entrainment attacks." The "how to detect brainwashing attacks." The "how to detect direct energy attacks." The "how to detect direct energy weapons attacks." The "how to detect entrainment attacks." The "how to detect electrode implants." The "how to detect electromagnetic attacks." The "how to detect electromagnetic entrainment attacks." The "how to detect electromagnetic harassment." The "how to detect electromagnetic mind control attacks." The "how to detect electromagnetic subliminal mind control attacks." The "how to detect electromagnetic torture." The "how to detect electromagnetic weapons attacks." The "how to detect electronic attacks." The "how to detect electronic entrainment attacks." The "how to detect electronic harassment." The "how to detect electronic mind control attacks." The "how to detect electronic spying." The "how to detect electronic subliminal mind control attacks." The "how to detect electronic surveillance." The "how to detect electronic torture." The "how to detect electronic weapons attacks." The "how to detect implanted devices." The "how to detect implanted electrodes." The "how to detect implants." The "how to detect improvised weapons attacks." The "how to detect mind control attacks." The "how to detect subliminal mind control attacks." The "how to detect brain attacks." The "how to detect brain entrainment attacks." The "how to detect brain harassment." The "how to detect brain control attacks." The "how to detect brain spying." The "how to detect brainwave spying." The "how to detect brain surveillance." The "how to detect brainwave surveillance." The "how to detect brainwave signature surveillance." The "how to detect subliminal brain control attacks." The "how to detect brain torture." The "how to detect brain weapons attacks."

The "how to prevent alien abductions." The "how to prevent body control attacks." The "how to prevent brain entrainment attacks." The "how to prevent brainwashing attacks." The "how to prevent direct energy attacks." The "how to prevent direct energy weapons attacks." The "how to prevent entrainment attacks." The "how to prevent electrode implants." The "how to prevent electromagnetic attacks." The "how to prevent electromagnetic entrainment attacks." The "how to prevent electromagnetic harassment." The "how to prevent electromagnetic mind control attacks." The "how to prevent electromagnetic subliminal mind control attacks." The "how to prevent electromagnetic torture." The "how to prevent electromagnetic weapons attacks." The "how to prevent electronic attacks." The "how to prevent electronic entrainment attacks." The "how to prevent electronic harassment." The "how to prevent electronic mind control attacks." The "how to prevent electronic spying." The "how to prevent electronic subliminal mind control attacks." The "how to prevent electronic surveillance." The "how to prevent electronic torture." The "how to prevent electronic weapons attacks." The "how to prevent implanted devices." The "how to prevent implanted electrodes." The "how to prevent implants." The "how to prevent improvised weapons attacks." The "how to prevent mind control attacks." The "how to prevent subliminal mind control attacks." The "how to prevent brain attacks." The "how to prevent brain entrainment attacks." The "how to prevent brain harassment." The "how to prevent brain control attacks." The "how to prevent brain spying." The "how to prevent brainwave spying." The "how to prevent brainwave signature spying." The "how to prevent subliminal brain control attacks." The "how to prevent brain torture." The "how to prevent brain weapons attacks." The "how to prevent brain surveillance." The "how to prevent brainwave surveillance." The "how to prevent brainwave signature surveillance."

The "how to stop alien abductions." The "how to stop body control attacks." The "how to stop brain entrainment attacks." The "how to stop brainwashing attacks." The "how to stop direct energy attacks." The "how to stop direct energy weapons attacks." The "how to stop entrainment attacks." The "how to stop electrode implants." The "how to stop electromagnetic attacks." The "how to stop electromagnetic entrainment attacks." The "how to stop electromagnetic harassment." The "how to stop electromagnetic mind control attacks." The "how to stop electromagnetic subliminal mind control attacks." The "how to stop electromagnetic torture." The "how to stop electromagnetic weapons attacks." The "how to stop electronic attacks." The "how to stop electronic entrainment attacks." The "how to stop electronic harassment." The "how to stop electronic mind control attacks." The "how to stop electronic spying." The "how to stop electronic subliminal mind control attacks." The "how to stop electronic surveillance." The "how to stop electronic torture." The "how to stop electronic weapons attacks." The "how to stop implanted devices." The "how to stop implanted electrodes." The "how to stop implants." The "how to stop improvised weapons attacks." The "how to stop mind control attacks." The "how to stop subliminal mind control attacks." The "how to stop brain attacks." The "how to stop brain entrainment attacks." The "how to stop brain harassment." The "how to stop brain control attacks." The "how to stop brain spying." The "how to stop brainwave spying." The "how to stop brainwave signature spying." The "how to stop subliminal brain control attacks." The "how to stop brain torture." The "how to stop brain weapons attacks."

The "human auditory response to modulated electrical energy." The "human auditory response to modulated electromagnetic energy." The "human auditory response to modulated microwave energy." The "human auditory response to modulated microwaves." The "human auditory response to modulated pulsed energy." The "human auditory response to modulated pulsed RF energy." The "human auditory response to modulated RF energy." The "human auditory system response to modulated electrical energy." The "human auditory system response to modulated electromagnetic energy." The "human auditory system response to modulated microwave energy." The "human auditory system response to modulated microwaves." The "human auditory system response to modulated pulsed energy." The "human auditory system response to modulated pulsed RF energy." The "human auditory system response to modulated RF energy." The "human auditory response to electrical energy." The "human auditory response to electromagnetic energy." The "human auditory response to microwave energy." The "human auditory response to microwaves." The "human auditory response to pulsed energy." The "human auditory response to pulsed RF energy." The "human auditory response to RF energy." The "human auditory system response to electrical energy." The "human auditory system response to electromagnetic energy." The "human auditory system response to microwave energy." The "human auditory system response to microwaves." The "human auditory system response to pulsed energy." The "human auditory system response to pulsed RF energy." The "human auditory system response to RF energy."

I: The "implant controls." The "implant injections." The "implant programming." The "implanted brain controllers." The "implanted controllers." The "implanted devices." The "implanted electrodes." The "implanting electrodes." The "implanted electronic devices." The "implanted electronics." The "implanted fake memories." The "implanted false memories." The "implanted implants testing." The "implanted mind controllers." The "implanted receivers." The "implanted stimoceivers." The "implanted stimulation receivers." The "implanted thoughts." The "implanted transceivers." The "implanted transmitters." The "implanted weapons." The "induced altered states." The "induced mind control attacks."

The "inhibition of the brain." The "inhibitory responses." The "invasive electrodes." The "investigate aliens." The "investigate electronic attack." The "investigate electronic harassment." The "investigate electronic weapons." The "investigate fortean phenomena." The "investigate ghosts." The "investigate spirits." The "investigate mind control attacks." The "investigate brain harassment." The "investigate brain weapons." The "investigate unknown entities." The "investigate unknown presences."

J-K: The "jam behavioral modification attacks." The "jam brain entrainment attack." The "jam brainwashing attacks." The "jam body control attacks." The "jam directed energy weapons attacks." The "jam electronic attacks." The "jam electronic gang stalking attacks." The "jam electronic harassment." The "jam mind control attacks." The "jam mind reading attacks." The "jam subliminal mind control attacks." The "jam brain entrainment." The "jam electromagnetic attacks." The "jam electromagnetic entrainment." The "jam electromagnetic harassment." The "jam electromagnetic implant control." The "jam electromagnetic implant programming." The "jam electromagnetic implants." The "jam electromagnetic mind control attacks." The "jam electromagnetic spying." The "jam electromagnetic subliminal mind control attacks." The "jam electromagnetic surveillance." The "jam electromagnetic torture." The "jam electromagnetic weapons." The "jam electronic attacks." The "jam electronic brain entrainment." The "jam electronic entrainment." The "jam electronic harassment." The "jam electronic implant control." The "jam electronic implant programming." The "jam electronic implants." The "jam electronic mind control attacks." The "jam electronic spying." The "jam electronic subliminal mind control attacks." The "jam electronic surveillance." The "jam electronic torture." The "jam electronic weapons." The "jam emf." The "jam brain attacks." The "jam brain entrainment." The "jam brain harassment." The "jam brain control attacks." The "jam psychological control." The "jam psychological entrainment." The "jam satellite control." The "jam subliminal brain control attacks." The "jam mind control attacks." The "jam subliminal mind control attacks." The "jam brain spying." The "jam brainwave spying." The "jam brainwave signature spying." The "jam subliminal brain control attacks." The "jam brain surveillance." The "jam brainwave surveillance." The "jam brainwave signature surveillance." The "jam brain torture." The "jam brain weapons." The "jam signals." The "jamming signals." The "Jose Delgado experiments."

L: The "laser torture weapons systems research." The "laser weapons systems research." The "laser weapons technologies." The "LED mind controllers." The "LED mind control devices." The "LED mind control technologies." The "life coaching." The "life coaching services." The "lightning detectors." The "light therapy." The "lilly wave bipolar stimulation." The "lilly wave brain stimulation techniques." The "lilly wave devices." The "lilly wave nerve stimulation techniques." The "lilly wave phenomena." The "lilly wave stimulation techniques." The "lilly waves." The "lilly waveform brain stimulation techniques." The "lilly waveforms." The "living dead mind capture devices." The "living dead mind control devices." The "Lone Star Consulting, Inc." The "low-frequency hum detection." The "low-frequency hum detecting." The "low-frequency hum detectors."

M: The "made-to-order." The "made-to-order consulting." The "made-to-order devices." The "made-to-order equipment." The "made-to-order hardware." The "made-to-order merchandise." The "made-to-order offers." The "magnetic induction loop systems and telecoils for hearing aids." The "magnetic induction loop systems and hearing aid telecoils." The "magnetic loop systems and telecoils for hearing aids." The "magnetic loop systems and hearing aid telecoils." The "magnetic resonance imagery eavesdropping." The "magnetic resonance imagery mind control attacks." The "magnetic resonance imagery surveillance." The "magnetic resonance imagery technology." The "magnetic resonance imaging eavesdropping." The "magnetic resonance imaging mind control attacks." The "magnetic resonance imaging surveillance." The "magnetic resonance imaging technology." The "magnetic resonant frequency of the body." The "manchurian candidate." The "massive electronic attack dysfunction." The "massive electronic attack syndrome." The "massive electronic attack perpetrators." The "massive electronic attack victims." The "massive electronic attack nightmare dysfunction." The "massive electronic attack nightmare syndrome." The "massive electronic attack nightmare perpetrators." The "massive electronic attack nightmare victims." The "medical causations of body control attacks." The "medical causations of electronic attacks." The "medical causations of mind control attacks." The "medical diagnosis of mind control attacks." The "medical diagnosis of psychological diseases." The "MEAN perpetrators." The "MEAN Syndrome." The "MEAN victims." The "medical manifestations of brain entrainment." The "medical manifestations of brainwashing." The "medical manifestations of behavioral modification." The "medical manifestations of body control attacks." The "medical manifestations of brainwashing." The "medical manifestations of directed energy attacks." The "medical manifestations of electronic attacks." The "medical manifestations of electronic gang stalking." The "medical manifestations of electronic harassment." The "medical manifestations of mind control attacks." The "medical manifestations of mind reading attacks." The "medical manifestations of subliminal mind control attacks."

The "mental breakdowns." The "mental depression." The "mental illness." The "mental illnesses." The "mentally ill." The "mental powers." The "mental telepathy." The "mental terrorism." The "mental therapy." The "mental trauma." The "mental victims." The "mental weapons." The "mental zombies." The "mental control of animals." The "mental control of computers." The "mental control of people." The "mentally control animals." The "mentally control computers." The "mentally control people."

The "merely by thinking." The "metal detectors." The "metal electrodes." The "microwave brain stimulations." The "microwave attack devices." The "microwave attacks." The "microwave countermeasures." The "microwave hearing devices." The "microwave hearing technology." The "microwave magnetic resonance imagery techniques." The "microwave magnetic resonance imaging techniques." The "microwave mind control devices." The "microwave MRI techniques." The "microwave stimulation of the brain." The "microwave torture weapons systems research." The "microwave weapons systems research." The "microwave technologies."

The "military satellite control of mind control devices." The "military satellite control signals." The "military satellite direct energy attacks." The "military satellite electronic attacks." The "military satellite mind control attacks." The "military satellite mind control systems." The "military satellite signals." The "military satellite spies." The "military satellite spying systems." The "military satellite subliminal mind control attacks." The "military satellite surveillance systems." The "military satellite terrorism." The "military satellite terrorists." The "military satellite tracking systems."

The "mind-body connection." The "mind capture electronic attacks." The "mind capture devices." The "mind capture systems." The "mind capture techniques." The "mind capture technologies." The "mind capture weapons." The "mind connection." The "mind controls." The "mind control attacks using artificial intelligence." The "mind control bands." The "mind control bandwidth." The "mind control conspiracies." The "mind control conspiracy." The "mind control countermeasure services." The "mind control countermeasures." The "mind control data." The "mind control customized devices." The "mind control detectors." The "mind control devices." The "mind control electrodes." The "mind control electronic attacks." The "mind control electronic implant control." The "mind control electronic implant programming." The "mind control electronic implants." The "mind control electronics." The "mind control experiments." The "mind control consultants." The "mind control consulting services." The "mind control countermeasure invention services." The "mind control customized device services." The "mind control customized devices." The "mind control data." The "mind control development services." The "mind control designs." The "mind control design services." The "mind control devices." The "mind control equipment." The "mind control exotic weapons." The "mind control expose." The "mind control frequencies in ghz." The "mind control frequencies in mhz." The "mind control hardware." The "mind control implant control." The "mind control implant programming." The "mind control implants." The "mind control invention laboratory services." The "mind control invention prototyping services." The "mind control invention services." The "mind control inventions." The "mind control inventors." The "mind control jamming issues." The "mind control lab." The "mind control laboratories." The "mind control laboratory services." The "mind control lessons." The "mind control medical causations." The "mind control medical manifestations." The "mind control methods." The "mind control merchandise." The "mind control microwave attacks."

The "mind control paranoia." The "mind control plots." The "mind control psychosis." The "mind control product creation services." The "mind control product development services." The "mind control product services." The "mind control product researchers." The "mind control products." The "mind control prototype services." The "mind control prototypes." The "mind control prototyping services." The "mind control powers." The "mind control programming." The "mind control protection." The "mind control pulsed microwave attacks." The "mind control repair services." The "mind control R&D services." The "mind control research, design and development services." The "mind control research laboratories." The "mind control research services." The "mind control researchers." The "mind control satellites." The "mind control secrets." The "mind control services." The "mind control shielding issues." The "mind control special projects services." The "mind control special services." The "mind control spectrum." The "mind control systems." The "mind control slaves." The "mind control stories." The "mind control strategies." The "mind control tactics." The "mind control techniques." The "mind control technology." The "mind control technologies." The "mind control tips." The "mind control tutorial." The "mind control testers." The "mind control testing laboratories." The "mind control testing services." The "mind control troubleshooters." The "mind control troubleshooting services." The "mind control using artificial intelligence." The "mind control victims." The "mind control weapons systems research." The "mind control weapons technologies." The "mind control zombies."

The "mind games." The "mind probe attacks." The "mind probes." The "mind probing." The "mind processes." The "mind inhibitors." The "mind reading attacks." The "mind reading countermeasures." The "mind reading mind control attacks." The "mind reading devices." The "mind stimulators." The "mobius coil." The "mobius strip." The "modify behavior." The "modifying circuits." The "modifying devices." The "modifying equipment." The "modifying hardware." The "modifying products." The "modifying services." The "modulate brainwaves." The "modulated brainwaves." The "modulation of brainwaves." The "monitoring electrodes." The "Montauk Chair." The "motor control cortex." The "MRI eavesdropping." The "MRI mind control techniques." The "MRI surveillance." The "MRI technology." The "murder by electronic attack." The "murder by mind control attack." The "myth busters programs." The "myth busters researchers." The "MythBusters program." The "MythBusters television program." The "MythBusters TV program."

N-O: The "nanobot brain implants." The "nanobot conspiracy." The "nanobot devices." The "nanobot electronic attacks." The "nanobot electronic implants." The "nanobot implants." The "nanobot mind control techniques." The "nanobot techniques." The "nanobot technologies." The "neural processes." The "neural prosthesis." The "neural signals."

The "neurological attack bands." The "neurological attack bandwidth." The "neurological attack blockers." The "neurological attack countermeasure services." The "neurological attack countermeasures." The "neurological attack data." The "neurological attack defenses." The "neurological attack detection." The "neurological attack detectors." The "neurological attack eliminators." The "neurological attack exotic weapons." The "neurological attack information." The "neurological attack jammers." The "neurological attack lessons." The "neurological attack protectors." The "neurological attack protection." The "neurological attack repellents." The "neurological attack repellers." The "neurological attack repulsers." The "neurological attack weapons." The "neurological attack consultants." The "neurological attack consulting services." The "neurological attack customized device services." The "neurological attack customized devices." The "neurological attack development services." The "neurological attack designs." The "neurological attack control design services." The "neurological attack devices." The "neurological attack equipment." The "neurological attack frequencies in ghz." The "neurological attack frequencies in mhz." The "neurological attack hardware." The "neurological attack countermeasure invention services." The "neurological attack laboratory services." The "neurological attack laboratories." The "neurological attack medical causations." The "neurological attack medical manifestations." The "neurological attack merchandise." The "neurological attack methods." The "neurological attack paranoia." The "neurological attack psychosis." The "neurological attack product services." The "neurological attack product researchers." The "neurological attack products." The "neurological attack prototype services." The "neurological attack prototypes." The "neurological attack prototyping services." The "neurological attack repair services." The "neurological attack R&D services." The "neurological attack research, design and development services." The "neurological attack research laboratories." The "neurological attack secrets." The "neurological attack research services." The "neurological attack researchers." The "neurological attack services." The "neurological attack special projects services." The "neurological attack special services." The "neurological attack spectrum." The "neurological attack strategies." The "neurological attack tactics." The "neurological attack techniques." The "neurological attack technologies." The "neurological attack testers." The "neurological torture weapons." The "neurological attack testing laboratories." The "neurological attack tactics." The "neurological attack testing services." The "neurological attack tips." The "neurological attack troubleshooters." The "neurological attack troubleshooting services." The "neurological attack tutorial." The "neurological attacks using artificial intelligence." The "neurological attacks."

The "neurological interference." The "neurological weapons attack bands." The "neurological weapons attack bandwidth." The "neurological weapons attack blockers." The "neurological weapons attack countermeasure services." The "neurological weapons attack countermeasures." The "neurological weapons attack data." The "neurological weapons attack defenses." The "neurological weapons attack detection." The "neurological weapons attack detectors." The "neurological weapons attack eliminators." The "neurological weapons attack exotic weapons." The "neurological weapons attack information." The "neurological weapons attack jammers." The "neurological weapons attack lessons." The "neurological weapons attack protectors." The "neurological weapons attack protection." The "neurological weapons attack repellents." The "neurological weapons attack repellers." The "neurological weapons attack repulsers." The "neurological weapons attack weapons." The "neurological weapons attack consultants." The "neurological weapons attack consulting services." The "neurological weapons attack customized device services." The "neurological weapons attack customized devices." The "neurological weapons attack development services." The "neurological weapons attack designs." The "neurological weapons attack control design services." The "neurological weapons attack devices." The "neurological weapons attack equipment." The "neurological weapons attack frequencies in ghz." The "neurological weapons attack frequencies in mhz." The "neurological weapons attack hardware." The "neurological weapons attack countermeasure invention services." The "neurological weapons attack laboratory services." The "neurological weapons attack laboratories." The "neurological weapons attack medical causations." The "neurological weapons attack medical manifestations." The "neurological weapons attack merchandise." The "neurological weapons attack methods." The "neurological weapons attack paranoia." The "neurological weapons attack psychosis." The "neurological weapons attack product services." The "neurological weapons attack product researchers." The "neurological weapons attack products." The "neurological weapons attack prototype services." The "neurological weapons attack prototypes." The "neurological weapons attack prototyping services." The "neurological weapons attack repair services." The "neurological weapons attack R&D services." The "neurological weapons attack research, design and development services." The "neurological weapons attack research laboratories." The "neurological weapons attack secrets." The "neurological weapons attack research services." The "neurological weapons attack researchers." The "neurological weapons attack services." The "neurological weapons attack special projects services." The "neurological weapons attack special services." The "neurological weapons attack spectrum." The "neurological weapons attack strategies." The "neurological weapons attack tactics." The "neurological weapons attack techniques." The "neurological weapons attack technologies." The "neurological weapons attack testers." The "neurological weapons attack testing laboratories." The "neurological weapons attack tactics." The "neurological weapons attack testing services." The "neurological weapons attack tips." The "neurological weapons attack troubleshooters." The "neurological weapons attack troubleshooting services." The "neurological weapons attack tutorial." The "neurological weapons attacks using artificial intelligence." The "neurological weapons attacks."

The "neuromancing technology." The "neuromarketing technology." The "new world order mind control (mindcon)." The "new world order mind reading (mindread)." The "Nexus Magazine." The "non-invasive electrodes."

The "off the shelf devices." The "off the shelf hardware." The "outer limits." The "outer space alien abductions." The "outer space alien attacks." The "outer space alien blasters." The "outer space alien busters." The "outer space alien electronic attacks." The "outer space alien electronic implants." The "outer space alien implants." The "outer space alien mind control powers." The "outer space alien weapons systems research." The "outer space alien weapons." The "outer space aliens." The "outrageous circuit designs." The "outrageous circuits." The "outrageous devices." The "outrageous electronic devices." The "outrageous electronic gadgets." The "outrageous electronics." The "outrageous equipment." The "outrageous gadgets." The "outrageous hardware." The "outrageous products." The "outrageous projects." The "outrageous science projects." The "outrageous special projects." The "over the counter devices." The "over the counter hardware."

PA-PO: The "pain field generator attacks." The "pain field generators." The "pain manipulation devices." The "pain manipulation technologies." The "pain manipulation weapons." The "panic attack." The "panic attacks." The "panic room." The "parametric applications." The "parametric transducers." The "paranormal activities." The "paranormal activity." The "paranormal investigators." The "paranormal phenomena." The "paranormal phenomenon." The "paranormal researchers." The "paranormal science." The "paranormal sightings." The "paranormal sounds." The "paranormal studies." The "paranormal stuff." The "paranormal things." The "personal electronic attack jammers." The "personal electronic jammers." The "personal jammers." The "personality disorder manifestations." The "personality profiling technology." The "phantom experiences." The "phantom manifestations." The "phantom pains." The "phantom sights." The "phantom sounds." The "phantom symptoms." The "phantom voices."

The "physical manifestations of body control attacks." The "physical manifestations of directed energy attacks." The "physical manifestations of electronic attacks." The "physical manifestations of electronic gang stalking." The "physical manifestations of electronic harassment." The "physical manifestations of mind control attacks." The "physiological effects of electronic attack." The "physiological manifestations of electronic attack." The "physiological problems." The "plasma torture weapons systems research." The "plasma weapons systems research." The "plasma weapons technologies." The "Psychotronic Influence System technology (PIS technology)." The "positive reinforcement." The "post traumatic stress disorder manifestations." The "power of suggestion." The "power of suggesting." The "psychological trauma." The "PTSD manifestations."

PR: The "precious metal electrodes." The "prevent aliens." The "prevent brain entrainment attacks." The "prevent brainwashing attacks." The "prevent electronic attacks." The "prevent electronic brain entrainment attacks." The "prevent electronic entrainment attacks." The "prevent electronic harassment." The "prevent electronic implant control." The "prevent electronic implant programming." The "prevent electronic implants." The "prevent electronic mind control attacks." The "prevent electronic spying." The "prevent electronic subliminal mind control attacks." The "prevent electronic surveillance." The "prevent electronic torture." The "prevent ghosts." The "prevent implant control." The "prevent implant programming." The "prevent implants." The "prevent lightning attacks." The "prevent mind control attacks." The "prevent pain field generator attacks." The "prevent subliminal mind control attacks." The "prevent brain attacks." The "prevent brain entrainment attacks." The "prevent brain harassment." The "prevent brain control attacks." The "prevent brain spying." The "prevent brainwave spying." The "prevent brainwave signature spying." The "prevent subliminal brain control attacks." The "prevent brain surveillance." The "prevent brainwave surveillance." The "prevent brainwave signature surveillance." The "prevent brain torture." The "prevent unknown entities." The "prevent unknown presences."

The "products and services." The "professional products." The "professional services." The "program behavior." The "prototyping circuits." The "prototyping devices." The "prototyping equipment." The "prototyping hardware." The "prototyping inventions." The "prototyping products." The "prototyping services." The "psi attacks." The "psi mind control attacks." The "psi technology." The "psi weapons systems research." The "psionic attacks." The "psionic mind control attacks." The "psionic technology." The "psionic torture weapons systems research." The "psionic weapons technology." The "psychiatric experiences." The "psychiatric manifestations of mind control attacks." The "psychiatric symptoms of mind control attacks."

Psychic: The "psychic activities." The "psychic activity." The "psychic advances." The "psychic amplifiers." The "psychic attacks." The "psychic behavioral modifications." The "psychic body control attacks." The "psychic brain entrainment." The "psychic brainwashing." The "psychic communications." The "psychic control." The "psychic controllers." The "psychic counterattacks." The "psychic countermeasures." The "psychic crisis." The "psychic cure." The "psychic cures." The "psychic delivery systems." The "psychic destruction." The "psychic detection." The "psychic detectors." The "psychic devices." The "psychic discoveries." The "psych dowsing." The "psychic emergency." The "psychic equipment." The "psychic entrainment." The "psychic experiments." The "psychic harassment." The "psychic hardware." The "psychic healing." The "psychic jamming issues." The "psychic jammers." The "psychic medical." The "psychic merchandise." The "psychic mind control attacks." The "psychic offers." The "psychic powers." The "psychic products." The "psychic radionics." The "psychic receptions." The "psychic remote control." The "psychic research." The "psychic researchers." The "psychic science projects." The "psychic services." The "psychic shielding issues." The "psychic signals. The "psychic subliminal mind control attacks." The "psychic survival." The "psychic survivalism." The "psychic systems." The "psychic therapies." The "psychic therapy." The "psychic transmissions." The "psychic treatments." The "psychic victim." The "psychic victims." The "psychic weapons systems research." The "psychic weapons technologies." The "psychic weaponry."

Psychological: The "psychological battlefields." The "psychological disorder." The "psychological disorders." The "psychological effects of mind control attacks." The "psychological entraining." The "psychological entrainment technology." The "psychological experiences." The "psychological manifestations of mind control attacks." The "psyops operations technology." The "psyops programs technology." The "psychological problems." The "psychological research." The "psychological researchers." The "psychological symptoms of mind control attacks." The "psychological torment." The "psychological torture." The "psychological victims." The "psychological war." The "psychological warfare operations (psyops operations)." The "psychological warfare programs (psyops programs)." The "psychological weapons."

Psychotronic: The "psychotronic activities." The "psychotronic activity." The "psychotronic advances." The "psychotronic amplifiers." The "psychotronic attacks." The "psychotronic behavioral modifications." The "psychotronic body control attacks." The "psychotronic brain entrainment." The "psychotronic brainwashing." The "psychotronic communications." The "psychotronic control." The "psychotronic controllers." The "psychotronic counterattacks." The "psychotronic countermeasures." The "psychotronic cure." The "psychotronic cures." The "psychotronic delivery systems." The "psychotronic destruction." The "psychotronic detection." The "psychotronic detectors." The "psychotronic devices." The "psychotronic discoveries." The "psychic dowsing." The "psychotronic equipment." The "psychotronic entrainment." The "psychotronic experiments." The "psychotronic harassment." The "psychotronic hardware." The "psychotronic healing." The "psychotronic jamming issues." The "psychotronic jammers." The "psychotronic medical." The "psychotronic merchandise." The "psychotronic mind control attacks." The "psychotronic offers." The "psychotronic powers." The "psychotronic products." The "psychotronic radionics." The "psychotronic receptions." The "psychotronic remote control." The "psychotronic research." The "psychotronic researchers." The "psychotronic science projects." The "psychotronic services." The "psychotronic shielding issues." The "psychotronic signals. The "psychotronic subliminal mind control attacks." The "psychotronic survival." The "psychotronic survivalism." The "psychotronic systems." The "psychotronic therapies." The "psychotronic therapy." The "psychotronic torture weapons systems research." The "psychotronic transmissions." The "psychotronic treatments." The "psychotronic victim." The "psychotronic victims." The "psychotronic weapons systems research." The "psychotronic weapons technologies." The "psychotronic weaponry." The "pulse electrodes." The "pulsed brain stimulations." The "pulsed electromagnetic weapons." The "pulsed electronic attack techniques." The "pulsed microwave attacks." The "pulsed microwave radiation attacks." The "pulsed mind control techniques." The "pulsed stimulation of the brain."

Q-R: The "racial profiling brainwave analysis." The "racial profiling brainwave signatures." The "racial profiling brainwave technology." The "radar countermeasures." The "radionics devices." The "radionics equipment." The "radionics hardware." The "radionics technology." The "radionics rife devices." The "radionics therapy." The "radio surveillance." The "recording electrodes." The "regrowth stimulations." The "regrowth stimulators."

The "remote behavioral modification weapons." The "remote body control weapons." The "remote brain monitoring." The "remote brainwave entrainment weapons." The "remote brainwashing weapons." The "remote control attacks." The "remote control devices." The "remote control techniques." The "remote controllers." The "remote behavioral modification attacks." The "remote body control attacks." The "remote electronic attack weapons." The "remote brainwave entrainment attacks." The "remote brainwashing attacks." The "remote electronic attacks." The "remote mind control attacks." The "remote subliminal mind control attacks." The "remote behavioral modification devices." The "remote body control devices." The "remote brainwave entrainment devices." The "remote brainwashing devices." The "remote electronic attack devices." The "remote mind control devices." The "remote mind control weapons." The "remote neural devices." The "remote neural monitoring devices." The "remote neural monitoring technologies." The "remote neural monitoring weapons." The "RNM devices." The "RNM technologies." The "RNM weapons." The "remote sensing attacks." The "remote sensing detection." The "remote sensing detectors." The "remote sensing countermeasures." The "remote sensing devices." The "remote sensing equipment." The "remote sensing hardware." The "remote sensing systems." The "remote sensing tactics." The "remote sensing techniques." The "remote sensing technology." The "remote sensing weapons systems research." The "remote sensor systems." The "remote sensors." The "remote subliminal mind control devices." The "remote behavioral modification techniques." The "remote body control techniques." The "remote brainwave entrainment techniques." The "remote brainwashing techniques." The "remote electronic attack techniques." The "remote mind control techniques." The "remote subliminal mind control techniques." The "remote subliminal mind control weapons."

The "remote control behavioral modification attacks." The "remote control body control attacks." The "remote control brainwave entrainment attacks." The "remote control brainwashing attacks." The "remote control electronic attacks." The "remote control mind control attacks." The "remote control subliminal mind control attacks." The "remote control brain attacks." The "remote control behavioral modification devices." The "remote control body control devices." The "remote control brainwave entrainment devices." The "remote control brainwashing devices." The "remote control electronic attack devices." The "remote control mind control devices." The "remote control subliminal mind control devices." The "remote control brain attack devices." The "remote control brain devices." The "remote control behavioral modification techniques." The "remote control body control techniques." The "remote control brainwave entrainment techniques." The "remote control brainwashing techniques." The "remote control electronic attack techniques." The "remote control mind control techniques." The "remote control subliminal mind control techniques." The "remote control behavioral modification weapons." The "remote control body control weapons." The "remote control brainwave entrainment weapons." The "remote control brainwashing weapons." The "remote control electronic attack weapons." The "remote control mind control weapons." The "remote control subliminal mind control weapons." The "remote control brain attack weapons." The "remote control brain weapons." The "remote control viewing methods." The "remote control viewing technologies." The "remote influencing technologies."

The "radar torture weapons." The "radar weapons systems research." The "radar weapons technologies." The "radiation intelligence." The "radio frequency magnetic resonance imagery." The "radio frequency functional magnetic resonance imaging." The "remote functional magnetic resonance imagery." The "remote functional magnetic resonance imaging." The "remote magnetic resonance imagery." The "remote magnetic resonance imaging." The "remote MRI Black Projects." The "remote MRI electronic attacks." The "remote MRI methods." The "remote MRI mind control techniques." The "remote MRI research." The "remote MRI techniques." The "remote MRI technology." The "remote MRI weapons systems research." The "REM sleep stage." The "rapid eye movement sleep stage." The "repairing circuits." The "repairing devices." The "repairing equipment." The "repairing hardware." The "repairing products." The "repairing services." The "reprogram behavior." The "reprogramming behavior." The "research designs." The "research hardware." The "research inventions." The "research products." The "research science project." The "research services." The "reverse engineer." The "research aliens." The "research electronic attack." The "research electronic harassment." The "research electronic weapons." The "research fortean phenomena." The "research ghosts." The "research spirits." The "research brain harassment." The "research unknown entities." The "research unknown presences."The "reverse engineering." The "rf brain stimulations." The "rf stimulation of the brain." The "RFID attacks." The "RFID behavioral control devices."The "RFID behavioral modifications." The "RFID countermeasures." The "RFID detection." The "RFID control." The "RFID devices." The "RFID electronics devices." The "RFID embedded devices." The "RFID entrainment devices." The "RFID implant control." The "RFID implant programming." The "RFID implanted devices." The "RFID implants." The "RFID jammers." The "RFID jamming issues." The "RFID mind control devices." The "RFID programming." The "RFID proliferation." The "RFID shielding issues." The "RFID techniques." The "RFID technology." The "RFID technologies." The "RFID targeting." The "RFID tracking." The "RFID strategy." The "RFID strategies." The "rife devices." The "rife hardware." The "room bug transmitters." The "Russian controlled offensive behavior."

SA-SO: The "satellite electronic attacks." The "satellite mind control attacks." The "satellite subliminal mind control attacks." The "satellite tracking." The "scalar waves." The "science project." The "science projects." The "secret communications methods." The "secret communications technologies." The "secret electronic attack technologies." The "secret mind control technologies." The "secret society brain entrainment experiments." The "secret society conspiracies." The "secret society mind control experiments." The "secret society subliminal mind control experiments." The "secret societies." The "secret technologies." The "secrets of body control attacks." The "secrets of brain entrainment." The "secrets of brainwave entrainment." The "secrets of brainwashing." The "secrets of directed energy weapons." The "secrets of electronic attack." The "secrets of electronic harassment." The "secrets of mind control attacks." The "secrets of subliminal mind control attacks." The "self-healing." The "self-healing devices." The "self-healing equipment." The "self-healing hardware." The "self-healing merchandise." The "self-healing offers." The "self-healing products." The "Semantic Stimuli Response Measurements Technology." The "sensory centers of the brain." The "severe altered states."

The "shield against electronic attacks." The "shield against electronic brain." The "shield against electronic entrainment." The "shield against electronic harassment." The "shield against electronic implant control." The "shield against electronic implant programming." The "shield against electronic implants." The "shield against electronic mind control attacks." The "shield against electronic spying." The "shield against electronic subliminal mind control attacks." The "shield against electronic surveillance." The "shield against electronic torture." The "shield against electronic weapons." The "shield against mind control attacks." The "shield against subliminal mind control attacks." The "shield against brain attacks." The "shield against brain entrainment." The "shield against brainwave entrainment." The "shield against brain harassment." The "shield against brain attacks." The "shield against brainwave spying." The "shield against subliminal mind control attacks." The "shield against brainwave surveillance." The "shield against brain torture." The "shield against brain weapons." The "Silent Sound Spread Spectrum programs (SSSS programs)." The "Silent Sound Spread Spectrum systems (SSSS systems)." The "Silent Sound Spread Spectrum technologies (SSSS technologies)." The "Silent Subliminal Presentation System technology." The "signal jamming issues." The "signal jamming devices." The "signal jamming hardware." The "signal shielding issues." The "signals intelligence." The "sixth sense." The "skin lesions caused by electronic attacks." The "skin rashes caused by electronic attacks." The "sleep inducer." The "Solfeggio Frequencies." The "Solfeggio Scale." The "sonic torture weapons." The "sonic weapons systems research." The "sonic weapons technologies." The "Super Soft-Pinch Electrodes." The "sounds from the walls." The "Soviet controlled offensive behavior." The "Soviet KGB electronic attack programs." The "Soviet KGB electronic attack technologies." The "Soviet KGB mind control programs." The "Soviet KGB mind control technologies." The "Soviet KGB Psychotronic Influence System program (PIS program)."

SP: The "deep space aliens." The "deep space alien abductions." The "deep space alien attacks." The "deep space alien blasters." The "deep space alien busters." The "deep space alien electronic attacks." The "deep space alien electronic implants." The "deep space alien implants." The "deep space alien mind control powers." The "deep space alien weapons systems research." The "deep space alien weapons." The "deep space aliens." The "special orders." The "special order consulting." The "special order devices." The "special order equipment." The "special order hardware." The "special order merchandise." The "special order offers." The "special order products." The "special order product offers." The "special order services." The "special project." The "special project consulting." The "special project devices." The "special project equipment." The "special project hardware." The "special project merchandise." The "special project offers." The "special project products." The "special project product offers." The "special project services." The "special projects." The "special projects consulting." The "special projects devices." The "special projects equipment." The "special projects hardware." The "special projects merchandise." The "special projects offers." The "special projects products." The "special projects product offers." The "special projects services."The "specialized consulting." The "specialized devices." The "specialized equipment." The "specialized hardware." The "specialized merchandise." The "specialized offers." The "spirit world."

SQ-ST: The "Squad programs (S-Quad programs)." The "Squad systems (S-Quad systems)." The "Squad technologies (S-Quad technologies)." The "SSRM Tek." The "Stage 1 sleep." The "Stage 2 sleep." The "Stage 3 sleep." The "Stage 4 sleep." The "stealth paint." The "stealth paint mixture." The "stealth techniques." The "stealth technology." The "stim electrodes." The "stimulating electrodes." The "stimulations of the brain." The "stimulator electrodes." The "StingRay devices." The "StingRay technology."

The "stop aliens." The "stop brain entrainment attacks." The "stop brainwashing attacks." The "stop electronic attacks." The "stop electronic brain entrainment attacks." The "stop electronic entrainment attacks." The "stop electronic harassment." The "stop electronic implant control." The "stop electronic implant programming." The "stop electronic implants." The "stop electronic mind control attacks." The "stop electronic spying." The "stop electronic subliminal mind control attacks." The "stop electronic surveillance." The "stop electronic torture." The "stop ghosts." The "stop implant control." The "stop implant programming." The "stop implants." The "stop lightning attacks." The "stop mind control attacks." The "stop pain field generator attacks." The "stop subliminal mind control attacks." The "stop brain attacks." The "stop brain entrainment attacks." The "stop brainwave entrainment attacks." The "stop brain harassment." The "stop brain control attacks." The "stop brain spying." The "stop brainwave spying." The "stop brainwave signature spying." The "stop brain subliminal mind control attacks." The "stop brain surveillance." The "stop brainwave surveillance." The "stop brainwave signature surveillance." The "stop brain torture." The "stop unknown entities." The "stop unknown presences." The "strange phenomena." The "strange sights." The "strange voices."

SU-SZ: The "subliminal ads." The "subliminal advertisements." The "subliminal advertising." The "subliminal advertising." The "subliminal brain entrainment experiments." The "subliminal brainwashing devices." The "subliminal brainwashing experiments." The "subliminal control of the mind experiments." The "subliminal effects." The "subliminal images." The "subliminal learning." The "subliminal messages." The "subliminal messaging." The "subliminal mind control attacks." The "subliminal mind control conspiracies." The "subliminal mind control conspiracies." The "subliminal mind control countermeasures." The "subliminal mind control devices." The "subliminal mind control experiments." The "subliminal mind control methods." The "subliminal mind control powers." The "subliminal mind control protection." The "subliminal mind control secrets." The "subliminal mind control slaves." The "subliminal mind control stories." The "subliminal mind control strategies." The "subliminal mind control systems." The "subliminal mind control tactics." The "subliminal mind control techniques." The "subliminal mind control technologies." The "subliminal mind control torture." The "subliminal mind control tutorial." The "subliminal mind control victims." The "subliminal mind control weapons." The "subliminal mind control zombies." The "subliminal mind readers." The "subliminal mind reading methods." The "subliminal mind reading techniques." The "subliminal mind reading technologies." The "subliminal mixers." The "subliminal perceptions." The "subliminal persuasion." The "subliminal programming." The "subliminal stimuli." The "supernatural phenomena." The "supernatural phenomenon." The "surface electrodes." The "surveillance camera designs." The "surveillance camera technology." The "surveillance cameras." The "surveillance devices." The "surveillance hardware." The "surveillance metal detectors." The "surveillance technology." The "surveillance transmitters."

T: The "Targeted Individuals support groups." The "Targeted Individuals under attack." The "Targeted Individuals under electronic attack." The "Targeted Individuals under mind control attacks." The "targets of government electronic attacks." The "targets of government electronic mind control attacks." The "targets of government mind control attacks." The "technical coaching." The "technical coaching services." The "technical consulting." The "technical life coaching." The "technical surveillance counter measures technology."

The "telecoils and magnetic induction loop systems for hearing aids." The "telecoils and magnetic loop systems for hearing aids." The "telepathic amplifiers." The "telepathic attack." The "telepathic brain entrainment." The "telepathic body control attacks." The "telepathic communications." The "telepathic control." The "telepathic countermeasures." The "telepathic detection." The "telepathic devices." The "telepathic eavesdropping." The "telepathic equipment." The "telepathic hardware." The "telepathic harassment." The "telepathic identification." The "telepathic interference." The "telepathic location finding." The "telepathic mind control attacks." The "telepathic mind reading attacks." The "telepathic powers." The "telepathic security." The "telepathic services." The "telepathic spying." The "telepathic subliminal mind control attacks." The "telepathic surveillance." The "telepathic technology." The "telepathic theories." The "telepathic tracking." The "telepathic weapons."

The "Tempest brain monitoring." The "Tempest monitoring of the brain." The "terroristic electronic attacks." The "terroristic electronic mind control attacks." The "terroristic mind control attacks." The "test circuits." The "test devices." The "test equipment." The "test hardware." The "test instruments." The "test products." The "test services." The "testing services." The "therapeutic devices." The "therapeutic electromagnetism." The "therapeutic electronics." The "therapeutic lights." The "therapeutic magnetism." The "therapeutic pulses." The "therapeutic pulse trains." The "therapeutic signals." The "therapeutic waveforms." The "thermal imaging." The "theta brain waves." The "theta brain wave control." The "theta brainwaves." The "theta brainwave control." The "theta brainwave monitoring." The "theta brainwave signals." The "theta frequencies." The "theta waves." The "thought center." The "thought control attacks." The "thought control electronics." The "thought control methods." The "thought control mind control methods." The "thought control technologies." The "thought control research." The "thought control science." The "thought control systems." The "thought control tactics." The "thought control techniques." The "thought control technology." The "thought reading mind control attacks." The "tin foil hat shielding." The "tinfoil hat shielding." The "TDCS stimulation technology." The "TMS stimulation technology." The "trance-formation devices." The "trance-formation techniques." The "transcranial electromagnetic evoked potentials." The "transcranial electromagnetic stimulation responses." The "transcranial electronic evoked potentials." The "transcranial electronic stimulation responses." The "transcranial magnetic evoked potentials." The "transcranial magnetic stimulation devices." The "transcranial magnetic stimulation technology." The "transcranial magnetic stimulation responses." The "transcranial direct current stimulation technology." The "transcranial electromagnetic stimulators." The "transcranial electronic stimulators." The "transcranial magnetic stimulators." The "transcutaneous electrical nerve stimulation responses." The "transcutaneous electrical nerve stimulators."

The "triangulate aliens." The "triangulate electronic attacks." The "triangulate electronic harassment." The "triangulate electronic mind control attacks." The "triangulate electronic spying." The "triangulate electronic subliminal mind control attacks." The "triangulate electronic surveillance." The "triangulate ghosts." The "triangulate lightning strikes." The "triangulate mind control attacks." The "triangulate subliminal mind control attacks." The "triangulate pain field generator attacks." The "triangulate unknown entities." The "triangulate unknown presences."

The "troubleshoot circuits." The "troubleshoot devices." The "troubleshoot equipment." The "troubleshoot hardware." The "troubleshoot instruments." The "troubleshoot products." The "troubleshoot services." The "troubleshooting services." The "tscm experts." The "tscm methods." The "tscm systems." The "tscm technology." The "tscm testing." The "twilight zone."

U: The "UFO abductions." The "UFO contacts." The "UFO Magazine." The "UFO visits." The "ultimate weapons."

The "ultraviolet therapy." The "under attack." The "unknown entity detection." The "unknown entity detecting." The "unknown entity detectors." The "unknown presence detection." The "unknown presence detecting." The "unknown presence detectors." The "upgrading circuits." The "upgrading devices." The "upgrading equipment." The "upgrading hardware." The "upgrading products." The "upgrading services." The "urgently needed." The "USSR controlled offensive behavior."

V-Z: The "V2K attacks." The "V2K electronic attacks." The "V2K harassment." The "V2K mind control attacks." The "V2K technology." The "vehicle tracking transmitters." The "Velostat materials." The "victim of electronic attack." The "victim of mind control attacks." The "victim of subliminal mind control attacks." The "victims of mind control attacks." The "victims of mind control support groups." The "victims of subliminal mind control attacks." The "virtual reality devices." The "virtual reality using artificial intelligence." The "visual cortex." The "visual hallucinations caused by electronic attacks." The "visual hallucinations caused by mind control attacks." The "voice-of-Allah mind control technology." The "voice-of-Allah weapons." The "voice-of-Allah weapon systems technology." The "voice-of-God mind control technology." The "voice-of-God weapons." The "voice-of-God weapon systems technology." The "voice to skull attacks." The "voice to skull electronic attacks." The "voice to skull harassment." The "voice to skull mind control attacks." The "voice to skull technology." The "voices from the walls." The "voices in the head." The "voices in your head." The "voices ordering you what to do." The "voices telling you what to do." The "weird phenomena." The "weird sights." The "weird sounds." The "weird voices." The "world is in a heightened state of paranoia." The "zero-evidence attacks." The "zero-evidence weapons." The "zero-evidence weaponry."

This webpage is filled with mind control information and electronic attack information relevant to mind control strategies, electronic attack strategies, mind control tactics, electronic attack tactics, mind control techniques, electronic attack techniques, mind control weapons, electronic attack weapons, mind control countermeasures, electronic attack countermeasures, and mind control detectors and electronic attack detectors.

Great LONE STAR CONSULTING, INC. Products and Services!
Copyright © 2001-2017, LONE STAR CONSULTING, INC. Absolutely all Rights Reserved


       IMAGE SPONSORED BY:
 Consumertronics
 Lone Star Consulting, Inc.
 ABQ-Techzonics
       REPRINT POW-MIA IMAGE=>
                ON YOUR WEBSITE

NOTE 1: We make no medical, legal, scientific, engineering, supernatural or paranormal claims including but not limited to claims about the existence, extent, intentions, purposes and capabilities of space aliens, ghosts, spirits, psychic powers, psionics, mental telepathy, precognition, auras, clairvoyance, remote viewing and pschokinesis - all related CD projects we do are based on our proprietary theories SHOULD they actually exist AND if the customer does not clearly specify in his/her CDAF another theory he/she wants the CD device design to be based upon.

NOTE 2: By policy, we never recommend for or against, approve or disapprove, sponsor, endorse, support, guarantee, or take any responsibility for any of the content of any non-Lone Star Consulting, Inc. webpage, website, advertisement, publication or other statement EVEN IF WE HAVE PROVIDED A HOTLINK TO IT. And by policy, we never recommend for or against, approve or disapprove, sponsor, endorse, support, guarantee, or take any responsibility for any non-Lone Star Consulting, Inc. company, product or service EVEN IF WE HAVE PROVIDED A HOTLINK TO IT. For more information on our policies, please refer to our policies.htm webpage.
Webmaster's Test Links only - not for visitor use: Source-A Source-D Source-E Source-F Source-G Source-H Source-I Source-J Source-K Source-L Source-M Source-N Source-P Source-Q Source-R