Telephones, Cellphones, Faxes, Modems, Answering Machines, Zons, Beepers, Phone Bugs, Phone Taps, Phone Color Boxes Device-Types
LONE STAR CONSULTING, INC.
of EL PASO, TEXAS


Customized Devices Application Form (CDAF)
All Customized Device (CD) Types Links by Topics

2024 Catalog now on 1G Flash Drive (only $39 (includes USA S/H))

Lone Star Consulting, Inc.: Click CDAF Link above for Our Address

VOICE (9-5 MST, M-F): [1-915-474-0334] (Prefer Email)


No Payment Clearance Period: U.S. Postal Money Order or Cash
Payment Clearance Period: Any Other Valid M.O., Check or Trade
Welcome to Lone Star Consulting, Inc. Products & Services Guide Website: www.lonestarconsultinginc.com/specproj.htm

Email => Tekmaster
tekmaster@lonestarconsultinginc.com

Who We Are + Privacy Policies
+ HTTPS Fallacies


Sitemap - Other Policies


Print, save, bookmark: www.lonestarconsultinginc.com/coaching.htm
USA Site - No cookies - No adware - No spyware - No trojans - No viruses - No worms - No spam - No popups
We Respect Your Privacy - We do NOT Monitor nor Track Your Activities Online, nor Share Your Data

BUYING FROM US IS SIMPLE: (1) Select the Unique Customized Device(s) You Want on This or Any Other Page, (2) Click on the green CDAF Link above, (3) Print and Complete the CDAF Form (one CDAF for each Device), (4) Scan your completed CDAF on a scanner. (4) Mail or Email as scanned-in (not photographed) JPG or GIF image Files to Us Your CDAF(s). We Respond to You Within 3 Days About Your Proposed CD Project.


Hi-Tech Telephones, Cellphones, Faxes, Answering Machines, Voice Mail, Phone Bugs, Phone Taps, Modems, Pagers / Beepers, Zons Customized Device Types
Custom-Made Telephones, Cellphones, Faxes, Answering Machines, Voice Mail, Pagers, Beepers, Modems, Zons & Phone Bugs Products and Services

Unique, Original, Made-to-Order, Special Needs, Unusual, Strange, Weird Customized Device Types We Can Do For YOU! Backed by decades of Professional Design Experience!
Lone Star Consulting, Inc. - High-Tech Consulting


Print, save, bookmark: www.lonestarconsultinginc.com
... and tell your friends!

Short of money? We do encourage mutually-beneficial trades that can save YOU a lot of money (eg: electronic parts & test equipment, computer & photo equipment, et al) ==>

Welcome to LONE STAR CONSULTING, INC.!

Hello! We support many technologies. For introduction into how to obtain hardware and our design philosophy, please click on our Home Page (includes hotlinks to all of our Device Types, listed by Topics and Titles): Home. Hotlinks by Topics and Titles also at: Site Map. When you are done, please use your Browser's Back Button to return here.

Pinpoint Hotlinks to All Listed Device Types (on index.html page)
If you can't find the Topic or Title you are looking for below
by scrolling or using your Browser's Find/Search function, our ==>
sitemap.htm page has comprehensive hotlinks to all of our Topics, Titles


ADD A NEW ELECTRONIC FREQUENCY COUNTER TO YOUR CUSTOMIZED DEVICES: Many of the Device-Types described herein automatically come with displays. These displays may consist of meter-type digital readouts, analog readouts or LEDs. Now you can add a new small and portable Electronic Frequency Counter (EFC) to any Customized Devices (CD) device you contract for with us (includes, but not limited to the Device-Types described herein) to detect and possibly locate EMF signals between 0.009 Hz and 99,999 Hz. This bandwidth is very important because whatever the transmitter carrier frequency is, for mind control purposes, the carrier must be modulated by ultra low (infrasonic) brainwave frequency signals and/or infrasonic control signals, or ultrasonic frequency data or control signals, which the EFC should detect, while ignoring other EMF signals which are not modulated by these types of signals, such as huge number of normal radio and TV signals. Be sure to specify an EFC for YOUR device CDAF (green link at top of webpage is CDAF). With an EFC, you can monitor the entire bands for infrasonic and ultrasonic EMF signals, as well as electromagnetic signals within this same bandwidth - including brain wave frequencies and many power, servo and control frequencies! This should greatly increase the finding of useful data and documentation, and is especially useful for tracking and analyzing mind control, electronic attack, radionics, power, servo, control and other signals. Since the EFC comes as a separate module which plugs into most of our CD devices, all you need is one EFC for all of your EFC-capable devices, PLUS you can use your EFC for other non-CD devices and uses. We can sell you the EFC by itself custom-modified with battery holder and ON/OFF switch, if you wish, and with any of these types of signal connections: RCA, phone plug, miniphone plug, BNC, USB, spade lug, flat lug, ring lug, banana, pin, barrel plug, bare wire ($349 + S/H ($9.90 USA S/H)). We can also include a detected signal amplifier, and low-band and/or high-band filter; just state on your CDAF for your Device. If you need the EFC by itself, please provide us your CDAF just for the EFC.

Introduction to this Page
Customized Devices Application Form (CDAF)

PHONE, CELLPHONE, FAX, MODEM SYSTEMS:

The ULTIMO LINEMAN's TEST SET: The infamous Lineman's Test Set was and is still used by some phone snoops and phreakers to eavesdrop on phone conversations, make free Long Distance (LD) phone calls, avoid all risks of identification from Automatic Number Identification (ANI), Caller ID and Call Trace, diagnose phone system problems, and to run one's own ANIs on the phone lines one may encounter. The ULTS is the cordless version for much greater convenience and personal security, but of course not sold for any of the traditional Lineman's Test Set illegal uses. The ULTS comes with alligator clips and RJ-11 connectors for quick connections either to a standard RJ-11 phone connector or clipped to bare leads, screws or punch block tabs. And the ULTS's base unit is converted for battery operation for field uses. And the ULTS comes with a mike mute switch so no sounds or noises on user side is picked up. Works with cordless telephones and corded telephones. Very popular. Last made $345 [3 lb]. Popular options: 4x range extension, add $69. Black Box Interface: Much increased stealthiness (as no DC loading of the phone line results from its use), and detects when the phone line is in use without interfering with normal phone service, add $79.

The BUG & TAP DETECTOR & BLASTER: Phone conversations are not secure. Some bugs and taps (eg: an infinity bug) can turn your phone into a room mike while it is hung up. The BTDB will detect all but the most sophisticated types of bugs and taps. Bugs and taps can then usually be blasted off the line with the push of a button (high-voltage pulse train). [2 lb], last made $229. Bug & Tap Detector function only. Works with corded and cordless phones. Last made $59 [1 lb].

The CALL LENGTH LIMITER: If you've ever opened up a phone bill and was shocked to find that the charges were far beyond your wildest fears, then you know how important it is to limit the length of phone calls - one way or the other! The CLL will not permit a phone call to exceed the length you select for it. Comes with a simple rotary switch for selecting times, and it gives off a beep and light flash 10 seconds before automatic call termination. Works with cordless phones and corded hones. Last made $95 [1 lb].

The CALL WAITING SIMULATOR: With the CWS, you simply push Button #1 and it produces the telltale sounds of Call Waiting. Push Button #2 and the CWS suspends the current call as if you really did have Call Waiting. Works with corded and cordless telephones. Last made $59 [1 lb].

The DTMF DECODER: Ever recorded the dialing of a phone number on a touch-tone phone and tore your hair out trying to guess the number? Play back the recorded dial tones through the DTMFD and it scroll-displays the dialed number. Or view the number displayed real time when the phone or any extension is being dialed, or after you Redial. Great for use with authorized surveillance operations (not a Caller ID). Works with cordless and corded telephones. Last made $199 [2 lb].

The INCOMING CALL SIMULATOR: Functionally same as the CWS above, except that it simulates the ringing of another phone in the office. Works with corded phones and cordless phones. Last made $59 [1 lb].

The MISSING CALL + OFF-HOOK INDICATOR: The MCI lights an LED when it receives a ring signal, and another LED if the handset was lifted Off-Hook (ie: the call was answered). Plugs into any phone outlet. Ideal for those times when you must step out while expecting a call, when you need to observe for unauthorized and/or unreported phone uses, and when you need to ferret out some types of bugs and taps, and as a ringer substitute. Works with cordless telephones and corded telephones. Last made $95 [1 lb]. To add LED blinks to equate to the number of times the phone rang or went Off-Hook, add $35 for each required.

The OFF-HOOK ALARM: Have you ever waited for an important call only to later realize to your horror that the anxiously- awaited caller called but couldn't get through because an extension was left Off-hook, or because of a bad phone line or connection? Great if you have kids or pets who are so playful that they refuse to let you keep your phones on-hook when not used. The OHA starts to loudly beep if the phone is Off-hook for more than 2 minutes with no detected voice. Works with corded and cordless telephones. Last made $69 [1 lb].

RED BOX & BLUE BOXES: RBs were traditionally designed to make free payphone calls, while BBs make free long-distance calls. RB's still work in most places! Although of great historical and sentimental value that goes back to the hippies of the 1960's BBs do not now work on most U.S. However, they're still both a blast to experiment with and to show off. While other "hacker" boxes are primitively designed, our boxes use state-of-the art circuitry that duplicates the precise frequencies AND waveforms used by telecos. Lots of fun to experiment with (but pay for all of your calls)!Works with corded and cordless telephones. The PHO-PRO RED BOX last made $295. The PHO-PRO BLUE BOX last made $395. The COMBO RB/BB PURPLE BOX last made $595. [1 lb] each. HISTORICAL DIAGRAMs (per phone box type) only: $500.00.

The REMOTELY ACTIVATED INTERFACE: Concerned about feeding your pets, remotely activating/deactivating security equipment, turning ON the heating/cooling/coffee, etc during or just before you get home from home or business absence? With the RAI, you simply call home (using a Touch-Tone phone) anywhere in the world; when your answering machine (not supplied) responds, you enter the 2-key code, and the RAI instantly activates for 1-300 seconds. While activated, the RAI produces 12 VDC, 120 VAC, and relay closure outputs (all up to 5 amps each) to activate relays, motors, solenoids, and/or additional electronic devices. Works with cordless telephones and corded telephones. Last made $245 [3 lb].

The SHRIEK MODULE: No longer must you suffer with the fear, indignity, insult, and inconvenience of obscene and harassing phone calls! Caller ID is ineffective against many smart harassers who block their calls or call out of area. The SM produces an ear-piercing shriek simply by pushing a switch. Its shriek is so loud that it can cause excruciating pain to the caller. Because the SM is electronically connected directly to the phone line, its resulting sound is far louder than that possible with any whistle or other audio device that is attenuated by the phone circuitry. In addition to its use as a powerful weapon against harassers of all kinds. The SM:

A real lifesaver. Last made $195 [1 lb].

The 2-LINE TO 1-LINE CONVERTER: If your home or business has 2 phone lines and you have a bucket-full of 1-line equipment, this nifty device will allow you to instantly switch from one phone line to the other so your 1-line equipment can access either line. Saves you the great cost of buying a lot of 2-line equipment. Works with cordless telephones and corded telephones. Last made $39 [1 lb].

WIRING HITCHHIKING HARASSER ELIMINATORS: Are your home/business wiring, piping, etc. or even car wiring hijacked to electronically harass or surveil you by hitchhiking signals onto them? Because power and telephone lines, and metal pipe (eg: plumbing), metal tubing (eg: wire shielding) and metal linear structures (eg: rebar, girders, conduit, trim, rails, fencing) surround you virtually everywhere you go in any building, electronic surveillance devices, equipment control devices, mind control devices and electronic attack devices can be connected to them in virtually every room and even outside the building for some distances - these omnipresent conductors serve as the optimum means to connect up, transmit and distribute these very harmful electronic surveillance, mind control and electronic attack signals throughout the building (sometimes called "carrier current" attacks - carrier currents caused by carrier current transmitters) - optimum conductors for virtually endless varieties of bugs, taps, harassment, control and line blaster devices. Our WHHE devices both test and filter out harmful hitchhiking signals!
       Since these conductors are so prevalent in virtually every building, added with the technologies of time multiplexing signals and frequency multiplexing signals, literally dozens - even 100s - of these types of very harmful signals can be operational on any day and night against you - usually no matter what rooms you are in. Your home or business is just several huge signal distribution networks plus transmitting and receiving antenna arrays. And all such wiring, piping, etc. can usually be just as easily abused for electronic surveillance, mind control and electronic attacks even if you turn OFF or disconnect them from their normal uses (eg: turning Off AC power, disconnecting phones). This is nothing new - both power and phone wiring have been lawfully used for decades to carry high-band voice, control signals, and data (eg: faxes, modems, DSL, zons, intercoms, alarm systems for phone lines, and intercoms and alarm systems for power lines) - proven technologies using common household AC wiring and phone wiring. Furthermore, because generic power and phone wiring and piping in all or part of one's home and business are often unshielded, they can be both easily accessed and connected up to AND used as a huge transmitting and/or receiving radio antennas to communicate with anything from electronic implants - to guys parked in the street - to cellphone towers down the road - to control centers 100s miles away - to ships at sea - to satellites - to electronically harass, control and/or interfere with your life! For examples: (1) Signals on them can be transmitted wireless for miles, and (2) Physical access to the wiring, piping, etc. is not even required; because the wiring, piping, etc. is unshielded, signals can often be inductively coupled into or out of power lines, phone lines, piping, etc. (eg: inductively-coupled phone line taps are decades old technology). Offending microwave signals can also be reflected off of ungrounded or not fully grounded metal bodies.
       Since these virtually endless varieties of bugs, taps, harassment, control and line blaster devices can take on virtually any appearance and/or be hidden in just about anything inside of or near your building, they can be very difficult to detect through physical searches (short of tearing down all of your walls and ceilings where the lines and piping run, and disassembling all of your equipment). For example, these devices can be easily concealed inside TVs, radios, computers, cellphones, landline phones, electronic handheld devices, etc. - fully operating even when the TV, radio, phone, etc. itself is not turned ON. Or hidden in an outlet, inside of your wall or in your attic - even inside your car. If you share walls, floors or ceilings with other apartments, the devices can be on their side, or even outside your building. Since not all of these harmful devices are RF devices, the non-RF ones cannot be detected using TSCM field strength testing used for wireless systems. Nor can strictly receiving devices be TSCM-detected. And usually nor can transmitting devices which transmit in bursts, randomly or pre-dawn hours, nor when the perpetrator believes the area is being electronically swept and turns Off transmitters until the TSCM crew leaves. In short, your phone and power wiring, piping, etc. can be easily and secretly tapped into using hardwired, inductive-coupling and/or reflection techniques just about any place they are routed internal or external to your home/business. To understand just how frustrating it is even for experts to really troubleshoot an area, rent the Gene Hackman movie, "The Conversation" - and that was early 1970s' relatively crude, clunky and huge electronic surveillance systems!
       The high-band signal frequencies used on power and phone lines, piping, etc. (which can be time multiplexed and/or frequency multiplexed to support several such systems) are usually 5+ times higher than the standard 60 Hz / 50 Hz (power wiring) or 3200 Hz maximum (phone wiring) bandwidth normally used on them. The usable bandwidth of many power and phone lines exceed 2 MHz for loops up to about 6,000 ft (1.14 miles) and much higher over much shorter loops - very usable for electronic surveillance, mind control and electronic attack. Metal piping, tubing, fencing, rails and other structures can conduct signals far higher in frequency than even power and phone lines (because most power and phone lines, pipes, etc. are unshielded, electrically noisy and inductive and leaky to high freqs, most high-band signals are under 200 KHz). Loading these unshielded conductors with all kinds of multiplexed and high-band signals they were not designed for may cause the wiring, piping, etc. itself and their terminations to resonate with strange sounds and noises which seem to emanate from walls and ceilings often on quasi-random and directional bases (eg: strange sounds you can hear when standing in one position but not in another nearby position, and/or at some times and not at other times, and/or during certain conditions of humidity and/or temperature but not at other conditions), often throughout most of a building, and often similar to the vibrating and humming of an old or defective power transformer. They can also vibrate and hum in the ultrasonic and infrasonic bandwidths when signals mix and produce sum and difference frequency components. The weird sounds can also sound like a distant motor running, distant voices, whispering and mumbling, spiritual and God-like voices, high-pitched voices, low-pitched voices, chattering, music, animal sounds, whistles, echoes, pulsing, pounding, popping, finger-snapping, digital data sounds, zinging sounds, whooshing sounds, theremin sounds, etc., especially when real time complex signal mixings of possibly several signals at once result in partially demodulated and/or multiply-mixed high-band signals. These weird noises can literally drive some people nuts! If you are hearing sounds, noises or even voices or digital data signals or control signals coming from your walls, ceilings or appliances or inappropriately while you are on the phone, you may not be imagining it. Also, high frequencies imposed on power wiring can adversely affect induction motors (especially compressor motors common to refrigerators, freezers and air conditioners), causing them to operate roughly, chatter noisily and possibly stall out (because induction motor speed is proportional to the frequency of its power source, multiple frequencies can harm them), and can cause lights to vary in intensity or flicker. Modulated high frequencies on phone lines can cause malfunction of phone and computer equipment (eg: loss of broadband sync, inability or slowdown in using DSL or even dial-up, faxes, zons, etc. because of a "noisy line").
       We offer 4 types of WHHE systems to test for and protect against offending EMF signals: (1) The WHHE1 is for AC power lines, (2) The WHHE2 is for phone lines, (3) The WHHE3 is for motor vehicle wiring, and (4) The WHHE4 is for non-electrical metal structures, such as pipes, tubes, appliances, fencing, rails and other metal structures, and unpowered wiring. For minimal recommended protection, you must typically have at least one of each WHHE type. For optimal and continuous protection, you must have two WHHE1 (one for each 120VAC power leg), one WHHE2 for each landline phone line, one WHHE3 for each vehicle, and one WHHE4 for each non-electrical ungrounded or improperly grounded metal structure within about 25 yards of you.
       The WHHE1 is designed to plug directly into any 120 VAC wall outlet (3-wire or 2-wire, 60 Hz or 50 Hz) located virtually anywhere to both detect and eliminate these higher frequencies on your AC power wiring (and to also cause an improvement in your power factor if it is typically inductive or lagging power factor (PF)) (Note: If you have an intercom, digital or other communications system which uses home/business electric power wiring to transmit/receive signals, the WHHE1 will also filter out those signals if used at same time). For example, voice, data signals, and/or control signals at 10 KHz, 50 KHz, 90 KHz, ..., 1890 KHz, 1930 KHz and 1970 KHz could all be frequency multiplexed onto a single 60 Hz power line simultaneously. That is, as long as a WHHE1 is not connected, because the WHHE1 wipes out all frequencies much above 60 Hz - wiping out those electronic attack and electronic surveillance high-band signals in one fell swoop! You may specify the WHHE1 to be non-battery powered (used only on powered AC lines to also power it), or battery-powered (used on both powered and unpowered AC lines). Note that the WHHE1's filtering functions cannot be duplicated using commercial power strips with built-in transient suppression. Power strips with transient suppression only filter out transients which are both high-voltage AND high-frequency, and then only for those devices connected to the power strip - not the VAC power lines connected to your AC outlets and located behind your walls in your home or business. Only the WHHE1 can filter out unwanted signals at your outlets and home/business wiring (as well as devices plugged into power strips). Even for devices plugged into transient-protected power strips, the designed protection is for transients which are both high-voltage AND high-frequency - much less effective against hitchhiking voice, control and data signals (which usually result in small RMS voltage level increases way below voltage levels required to switch in transient suppression).
             TEST: There is a test that will likely result in positive indication of hitchhiked signals on your AC power lines, but test requires about 2 months to complete: Obtain 3 same make and model plug-in digital clocks (not battery-powered clocks), and place them in widely-separated rooms but on the same 120VAC leg. Synchronize each clock to your cellphone or other battery-operated super accurate time source. At the end of one month, check the times on each of your 3 clocks against the device you synchronized them with. Most of these types of clocks are timed by the frequency of your AC line voltage (60 Hz in the US, 50 Hz many other places). However, with most of them, the timing is also advanced by signals and electrical noise interference on your line to various degrees based on their specific electronic designs and interference properties. If there is much communications or control signals on the line, the clocks will run faster than normal. Therefore, if at the end of the month, any of your clocks are more than a couple of minutes fast, more than likely, you have a serious problem with hitchhiked signals on your line for which we strongly recommend the WHHE1 to countermeasure. Since the electrical noise on most AC lines typically rarely reaches levels that would advance most clock timing, normally, noise by itself would contribute to about a minute or two at most in one month's time to advancing timing. If any of your clocks run too slowly, the clock is probably defective. And which clock has advanced the greatest is usually the clock closest to the hitchhiking signal input point where it gets the strongest signal. Then run this test again, with all of the clocks on the other AC leg. Note: This test is not proof of either the existence or absence of hitchhiking signals during the test month because of clock defects and nominal electronic differences; clock timing may use crystals and not line frequency; low intensity, very high frequency, and/or low duty cycle (eg: burst signals, infrequent or occasional attacks) hitchhiking signals that don't significantly increment clock timing; very noisy line, etc., but it often is a very good indication.
       The WHHE2 is designed to plug directly into any normal landline phone line (works with corded phones and cordless phones), and works whether the phone is On Hook or Off Hook to eliminate higher frequencies on your phone wiring (Note: If you use DSL, modem or other digital phone line communications system, those signals will also be filtered out if used at same time). We offer 3 versions of the WHHE2: (1) WHHE2-HB: The High-Band (HB) version (the default version if you don't specify) filters out phone line freqs starting at about 4000 Hz and above. While the HB will filter out all signals at all times when toggled ON much above the normal phone voice BW of 300-3200 Hz, it will not filter out normal speech signals in the voice BW, resulting in possible but very unlikely unauthorized voice-band transmissions when phone is on-hook. (2) WHHE2-LB: The Low-Band (LB) version filters out phone line freqs starting at about 50 Hz and above. While the LB filters out voice and data signals at all times when toggled ON, it must be turned OFF when you need to talk on the phone or use it to transmit data or it will also filter out your and the other party's voices. Note that the LB version may negatively impact ring with some phones. (3) WHEE2-CMP: The Composite (CMP) version allows you to toggle between the HB and LB versions for maximum security - when you are talking on the phone, you set it at HB, when you are sending data online, you turn OFF both HB and LB, and when phone is on-hook, you set it at LB. The WHHE2 uses the common standard RJ-11 phone connector. The WHH2 always comes battery-powered.
       The WHHE3 is designed for 12VDC battery systems (eg: vehicle battery wiring) because car battery wiring can also be - some say often - used to conduct unwanted and harmful signals which can be used for electronic surveillance, mind control and electronic attack. You can specify whether you want its cable to have cigarette lighter, battery clamp or other type of terminating connector you specify (Note: Any and all vehicle underhood connection work must be done by your automechanic at your expense and always in a legal and safe manner, and we assume no liability for the installation, removal and use of a WHHE3 device on any vehicle). You may specify the WHHE3 to be non-battery powered (used only on powered 12VDC lines to also power it), or battery-powered (used on both powered and unpowered 12VDC lines).
       The WHHE4 is designed to test and protect unpowered wiring, metal piping, metal tubing, metal fencing, metal railing, metal structures, and other unpowered conductors up to about 25 feet long by testing for and filtering out signal types they carry above 60 Hz. These include offending signals hardwired or induced onto metal structures, and to some extent, reflected signals. Protecting against reflected signals is designed to protect you from perps transmitting RF signals at unprotected reflective surfaces near you for its scattering effects or angular advantages, which then reflect onto you to do their dirty work; the WHHE4 grounds out air-transmitted offending RF signals it protects in your area. The WHHE4 can test and filter out great varieties of conductors which do or do not have known or accessible signal return paths (WHHE1, WHHE2 and WHHE3 test and protect circuits which have electrical return paths paired with them, eg: AC power line neutral, phone Ring wire, car battery ground). The WHHE4 comes with two cables, each about 12.5 feet long, and each terminated by alligator clips (or some other type of connector you specify). One cable is connected to the unpowered metal wiring, piping, tubing, fencing, structure, etc. If this metal is accompanied by an accessible metal electrical return path (eg: wire, piping, tubing, fencing, structure, etc.), the other cable is connected to it, else it is connected to nearby grounded metal, in which case an earth ground rod may be required (earth ground rod not provided, available in hardware stores). The WHH4 always comes battery-powered. Note: Not all plumbing or tubing (or fencing or structures) is continuous metal all the way into a good earth ground. Sometimes plastic plumbing or standoffs are used, which breaks any ground connection. Even if the plumbing pipe is continuous metal all the way to where buried in earth, pipe joints can be corroded enough or use enough teflon tape to break the electrical connection, the pipe can be laid in dry ground or concrete, and/or the pipe itself can be corroded enough to break its ground connection. In fact, plumbing pipe is never a reliable earth ground. National Electrical Code: 'True earth ground physically consists of a conductive rod or pipe driven into the earth to a minimum depth of 8 feet.' Plumbing pipe is never "driven into the earth" and plumbing, tubing, fencing and structures are seldom buried at least 8 feet deep. If unpowered metal is not itself solidly grounded to earth (easily determined) - not just wet-season or intermittently grounded - it makes a great conductor for offending electronic signals.
       Each WHHE device comes with a signal indicator LED and the DETECT/PROTECT toggle switch. One toggled position is the DETECT Mode in which the LED will flicker and/or brighten if there is a high-band signal on the line, piping, etc. The other toggled position is the PROTECT Mode which will filter out all types of high-band signals, transients and line noise interference hitchhiking signals to remove them from your line, piping, etc. The DETECT Mode continuously tests your conductor to determine if there is any unusual signal or other electrical activity on it. The toggle switch is especially protected with a snubber circuit designed to prevent contact arcing during switches. If the WHHE device conflicts with some other known and OK equipment or function connected to your wiring in the PROTECT Mode, then don't operate that WHHE in its PROTECT Mode when normally using such equipment or function (no known interferences in the DETECT Mode).
       EXTRA PROTECTION: WHHE devices are designed to further protect your lines from possibly destructive high-voltage pulses, transients and line noise which can sometimes also occur, whether natural or manmade (eg: helps protect you from a perpetrator trying to wreck your phone or power system - even your computer - using a phone or power line blaster to deliver high-voltage transients, pulses and electrical noise to your system and equipment; and helps protect lines and equipment against damage caused by nearby lightning strike or transients, pulses and line noise). (Note that while electronic filters may eliminate 99.9+% of a signal - so much of the signal that the tiny remaining signal is lost in the line noise - no electronic filter wipes out absolutely 100% of a signal; always experiment with WHHE device first to make sure that it does not interfere with the normal use of your lines and equipment.). This very substantial added transient protection feature includes a gas discharge lightning arrestor (surge arrestor - not normally found even in expensive transient-suppressed power strips), a MOV (varistor), and the filter capacitor itself - all of which adds substantial protection from lightning strikes, line blasters, and powerful pulsed mind control and electronic attack devices hitchhiked onto your lines, piping, etc.
         Plus, if specified, WHHE devices come with an output connector which permits you to directly view hitchhiking signals on an oscilloscope or hear them on a speaker or earphones (if signal is in the audio band; oscilloscope, speaker and earphones are not included). By being able to observe and/or hear the signals which should not be on your line, piping, etc., you can often tell exactly what is being communicated or controlled, and correlate the hitchhiking signals with conversations, other activities, and unexplained manifestations.
       Note that since most home and office electric power systems are 220-240 VAC and standard outlet wiring is 110-120 VAC, there are two isolated AC power "legs" that power the various 110-120 VAC outlets and functions throughout the building. Therefore, to simultaneously and continuously DETECT and PROTECT both AC power legs, you need two WHHE1 devices. Also note that if your landline phone system has more than one phone line, each phone line is isolated from each other, so therefore to simultaneously and continuously DETECT and PROTECT all phone lines, you need a WHHE2 for each and every phone line. All WHHE device-types are small, portable, easy to use, uses standard connectors, and the WHHE2 and WHHE4 are 9VDC battery-powered (WHHE1 and WHHE3 operate off of their power line voltages but we can also make them to operate off of 9VDC battery to also test unpowered 120VAC power lines (WHHE1) and car battery wiring (WHHE3)). CAUTION: Do not use any WHHE device in the PROTECT Mode to do a denial-of-service attack against anyone legitimately using a phone system or power line for some normal high-band activity, for example, by interfering with or defeating DSL, modems, faxes, zons, intercoms, alarm systems, etc.
       Non battery-powered WHHE1, WHHE3. Last made $395 [1 lb] each.
       Battery-powered WHHE1, WHHE2-HB, WHHE2-LB, WHHE3. Last made $445 [1 lb] each.
       Battery-powered WHHE2-CMP, WHHE4. Last made $495 [2 lb].

Introduction to this Page
Customized Devices Application Form (CDAF)

HIGH-TECH SECURITY AND SURVIVAL BOOKS, MANUALS, SOFTWARE, CONSULTING SERVICES: PLEASE NOTE, we are NOT CONSUMERTRONICS.NET (P.O. Box 23097, Albuquerque, NM 87192) (www.consumertronics.net) - famous for their many frank and controversial high-tech survival books, manuals and software. The two businesses are totally separate entities. Neither one owns the other nor is a subsidiary of the other. If you wish to do business with CONSUMERTRONICS.NET, please contact them DIRECTLY.

OFF-THE-SHELF AND OVER-THE-COUNTER HARDWARE OF ALL TYPES: PLEASE NOTE, we are NOT TECHZONICS.COM (a subsidiary of Consumertronics) - famous for their huge variety of hardware offerings, especially electronic parts. The two businesses are totally separate entities. Neither one owns the other nor is a subsidiary of the other. If you wish to do business with TECHZONICS.COM, please contact them DIRECTLY.

(More on these privacy and other policies on our www.lonestarconsultinginc.com/policies.htm) webpage.

ITEMS WANTED TO BUY/TRADE
Can't spare the bucks to pay for your order? Want some of the items listed above but have some of your own that you would like to use as trade? Don't fret - you can still get what you want for little or no out-of-pocket-$ if you have an item(s) of trade we are interested in! If you don't want to trade, we may consider buying what you offer. Either way, let us know.
Most of the specific items we are interested in are described on (email us first as there are some differences): www.consumertronics.net/items4trade.htm (Consumertronics Publisher of High-Tech Survival and Security Books, Manuals and Software, and Consultants).

Introduction to this Page
Customized Devices Application Form (CDAF)

Customers, Clients, Contributors:
Relevant Topics, Titles to the Many Device Types We Do

SINGLE WORDS: The blackbox. The bluebox. The cellphone. The cellphones. The cheesebox. The cordless. The consultants. The consulting. The Consumertronics. The Consumertronics.net. The countermeasures. The duplex. The hacker. The organgebox. The payphone. The payphones. The phone. The phones. The phonebox. The phoneboxes. The phreaker. The phreakers. The phreaking. The redbox. The silverbox. The telecos. The telephone. The telephones. The telephonic. The tone. The tones. The tutorials. The voice.

A: The "acrylic box." The "all system security." The "analog voice." The "aqua box."

Answering Machine: The "answering machine abuse." The "answering machine abuses." The "answering machine accessory." The "answering machine accessories." The "answering machine boxes." The "answering machine boxing." The "answering machine bugs." The "answering machine bypasses." The "answering machine casing." The "answering machine charges." The "answering machine cheats." The "answering machine circuits." The "answering machine descramblers." The "answering machine circuit designs." The "answering machine color boxes." The "answering machine companies." The "answering machine costs." The "answering machine countermeasures." The "answering machine crime." The "answering machine crimes." The "answering machine defeats." The "answering machine designs." The "answering machine device." The "answering machine devices." The "answering machine equipment." The "answering machine fraud." The "answering machine fraud countermeasures." The "answering machine frauds." The "answering machine hacks." The "answering machine hackers." The "answering machine harassment." The "answering machine hardware." The "answering machine invasion of privacy." The "answering machine operation." The "answering machine operators." The "answering machine pirates." The "answering machine phreaker." The "answering machine phreakers." The "answering machine phreaking." The "answering machine privacy." The "answering machine products." The "answering machine scam." The "answering machine scams." The "answering machine security." The "answering machine security system." The "answering machine service." The "answering machine services." The "answering machine social engineering." The "answering machine science project." The "answering machine science projects." The "answering machine scramblers." The "answering machine special projects." The "answering machine spoofs." The "answering machine spoofing." The "answering machine spying." The "answering machine system abuses." The "answering machine stalking." The "answering machine strategy." The "answering machine strategies." The "answering machine surveillance." The "answering machine survival." The "answering machine systems." The "answering machine system bypasses." The "answering machine system countermeasures." The "answering machine system crime." The "answering machine system crimes." The "answering machine system defeats." The "answering machine system privacy." The "answering machine system vulnerability." The "answering machine system vulnerabilities." The "answering machine tactic." The "answering machine tactics." The "answering machine taps." The "answering machine tapping." The "answering machine technique." The "answering machine techniques." The "answering machine technology." The "answering machine technologies." The "answering machine tempest methods." The "answering machine tutorials." The "answering machine vulnerability." The "answering machine vulnerabilities." The "automatic number identification." The "awesome circuit designs." The "awesome circuits." The "awesome devices." The "awesome electronic devices." The "awesome electronic gadgets." The "awesome electronics." The "awesome equipment." The "awesome gadgets." The "awesome hardware." The "awesome products." The "awesome projects." The "awesome science projects." The "awesome special projects."

B-E: The "beige box." The "black box." The "black boxes." The "black boxing." The "Blacklisted 411 Magazine." The "blast box." The "blotto box." The "blue box." The "blue boxes." The "blue boxing." The "bridging heads." The "brown box." The "bud box." The "bugged answering machine." The "bugged cellphone." The "bugged fax." The "bugged payphones." The "bugged phones." The "bugged telephones." The "bugging answering machines." The "bugging cellphones." The "bugging faxes." The "bugging payphones." The "bugging phones." The "bugging telephones." The "busy tone." The "call blocking." The "call forwarding." The "caller id." The "caller id defeats." The "caller id security." The "caller id vulnerabilities." The "caller identity." The "caller identity defeats." The "caller identity security." The "caller identity vulnerabilities." The "call waiting." The "Captain Crunch." The "cell towers." The "central office terminal." The "chartreuse box." The "cheese box." The "chrome box." The "clear box." The "color box." The "cool circuit designs." The "cool circuits." The "cool devices." The "cool electronic devices." The "cool electronic gadgets." The "cool electronics." The "cool equipment." The "cool gadgets." The "cool hardware." The "cool products." The "cool projects." The "cool science projects." The "cool special projects." The "copper box." The "crime fighting." The "crimson box." The "dark box." The "dayglo box." The "dial tone." The "digital lines." The "digital phone lines." The "digital signal level." The "digital voice." The "diverter box." The "DLOC box." The "dual tone multi-frequency tones." The "dumpster diving." The "dumpster diving." The "electronic serial number." The "extender box."

Cellphone: The "cellphone abuse." The "cellphone abuses." The "cellphone accessory." The "cellphone accessories." The "cellphone areas." The "cellphone bands." The "cellphone bill." The "cellphone bills." The "cellphone boxes." The "cellphone boxing." The "cellphone bugs." The "cellphone bypasses." The "cellphone casing." The "cellphone charges." The "cellphone cheats." The "cellphone circuits." The "cellphone circuit designs." The "cellphone color box." The "cellphone color boxes." The "cellphone company." The "cellphone companies." The "cellphone costs." The "cellphone countermeasures." The "cellphone coverage." The "cellphone crime." The "cellphone crimes." The "cellphone defeats." The "cellphone descramblers." The "cellphone designs." The "cellphone device." The "cellphone devices." The "cellphone equipment." The "cellphone frequencies." The "cellphone fraud." The "cellphone fraud countermeasures." The "cellphone frauds." The "cellphone hacks." The "cellphone hackers." The "cellphone harassment." The "cellphone hardware." The "cellphone invasion of privacy." The "cellphone long distance." The "cellphone operation." The "cellphone operators." The "cellphone pirates." The "cellphone phreaker." The "cellphone phreakers." The "cellphone phreaking." The "cellphone privacy." The "cellphone products." The "cellphone relays." The "cellphone receivers." The "cellphone scam." The "cellphone scams." The "cellphone scramblers." The "cellphone security." The "cellphone security system." The "cellphone service." The "cellphone services." The "cellphone sites." The "cellphone social engineering." The "cellphone science project." The "cellphone science projects." The "cellphone sites." The "cellphone special projects." The "cellphone spoofs." The "cellphone spoofing." The "cellphone spying." The "cellphone system abuses." The "cellphone stalking." The "cellphone strategy." The "cellphone strategies." The "cellphone surveillance." The "cellphone survival." The "cellphone systems." The "cellphone system bypasses." The "cellphone system countermeasures." The "cellphone system crime." The "cellphone system crimes." The "cellphone system defeats." The "cellphone system privacy." The "cellphone system vulnerability." The "cellphone system vulnerabilities." The "cellphone system security." The "cellphone tactic." The "cellphone tactics." The "cellphone taps." The "cellphone tapping." The "cellphone technique." The "cellphone techniques." The "cellphone technology." The "cellphone technologies." The "cellphone tempest methods." The "cellphone tones." The "cellphone towers." The "cellphone transmissions." The "cellphone tutorials." The "cellphone vulnerability." The "cellphone vulnerabilities."

Cellular: The "cellular abuse." The "cellular abuses." The "cellular accessory." The "cellular accessories." The "cellular areas." The "cellular bands." The "cellular bill." The "cellular bills." The "cellular boxes." The "cellular boxing." The "cellular bugs." The "cellular bypasses." The "cellular casing." The "cellular charges." The "cellular cheats." The "cellular circuits." The "cellular circuit designs." The "cellular color box." The "cellular color boxes." The "cellular company." The "cellular companies." The "cellular costs." The "cellular countermeasures." The "cellular coverage." The "cellular crime." The "cellular crimes." The "cellular defeats." The "cellular descramblers." The "cellular designs." The "cellular device." The "cellular devices." The "cellular equipment." The "cellular frequencies." The "cellular fraud." The "cellular fraud countermeasures." The "cellular frauds." The "cellular hacks." The "cellular hackers." The "cellular harassment." The "cellular hardware." The "cellular invasion of privacy." The "cellular long distance." The "cellular operation." The "cellular operators." The "cellular pirates." The "cellular phreaker." The "cellular phreakers." The "cellular phreaking." The "cellular privacy." The "cellular products." The "cellular relays." The "cellular receivers." The "cellular scam." The "cellular scams." The "cellular scramblers." The "cellular security." The "cellular security system." The "cellular service." The "cellular services." The "cellular sites." The "cellular social engineering." The "cellular science project." The "cellular science projects." The "cellular sites." The "cellular special projects." The "cellular spoofs." The "cellular spoofing." The "cellular spying." The "cellular system abuses." The "cellular stalking." The "cellular strategy." The "cellular strategies." The "cellular surveillance." The "cellular survival." The "cellular systems." The "cellular system bypasses." The "cellular system countermeasures." The "cellular system crime." The "cellular system crimes." The "cellular system defeats." The "cellular system privacy." The "cellular system vulnerability." The "cellular system vulnerabilities." The "cellular system security." The "cellular tactic." The "cellular tactics." The "cellular taps." The "cellular tapping." The "cellular technique." The "cellular techniques." The "cellular technology." The "cellular technologies." The "cellular tempest methods." The "cellular tones." The "cellular towers." The "cellular transmissions." The "cellular tutorials." The "cellular vulnerability." The "cellular vulnerabilities."

Cellular Phone: The "cellular phone abuse." The "cellular phone abuses." The "cellular phone accessory." The "cellular phone accessories." The "cellular phone areas." The "cellular phone bands." The "cellular phone bill." The "cellular phone bills." The "cellular phone boxes." The "cellular phone boxing." The "cellular phone bugs." The "cellular phone bypasses." The "cellular phone casing." The "cellular phone charges." The "cellular phone cheats." The "cellular phone circuits." The "cellular phone circuit designs." The "cellular phone color box." The "cellular phone color boxes." The "cellular phone company." The "cellular phone companies." The "cellular phone costs." The "cellular phone countermeasures." The "cellular phone coverage." The "cellular phone crime." The "cellular phone crimes." The "cellular phone defeats." The "cellular phone descramblers." The "cellular phone designs." The "cellular phone device." The "cellular phone devices." The "cellular phone equipment." The "cellular phone frequencies." The "cellular phone fraud." The "cellular phone fraud countermeasures." The "cellular phone frauds." The "cellular phone hacks." The "cellular phone hackers." The "cellular phone harassment." The "cellular phone hardware." The "cellular phone invasion of privacy." The "cellular phone long distance." The "cellular phone operation." The "cellular phone operators." The "cellular phone pirates." The "cellular phone phreaker." The "cellular phone phreakers." The "cellular phone phreaking." The "cellular phone privacy." The "cellular phone products." The "cellular phone relays." The "cellular phone receivers." The "cellular phone scam." The "cellular phone scams." The "cellular phone scramblers." The "cellular phone security." The "cellular phone security system." The "cellular phone service." The "cellular phone services." The "cellular phone sites." The "cellular phone social engineering." The "cellular phone science project." The "cellular phone science projects." The "cellular phone sites." The "cellular phone special projects." The "cellular phone spoofs." The "cellular phone spoofing." The "cellular phone spying." The "cellular phone system abuses." The "cellular phone stalking." The "cellular phone strategy." The "cellular phone strategies." The "cellular phone surveillance." The "cellular phone survival." The "cellular phone systems." The "cellular phone system bypasses." The "cellular phone system countermeasures." The "cellular phone system crime." The "cellular phone system crimes." The "cellular phone system defeats." The "cellular phone system privacy." The "cellular phone system vulnerability." The "cellular phone system vulnerabilities." The "cellular phone system security." The "cellular phone tactic." The "cellular phone tactics." The "cellular phone taps." The "cellular phone tapping." The "cellular phone technique." The "cellular phone techniques." The "cellular phone technology." The "cellular phone technologies." The "cellular phone tempest methods." The "cellular phone tones." The "cellular phone towers." The "cellular phone transmissions." The "cellular phone tutorials." The "cellular phone vulnerability." The "cellular phone vulnerabilities."

Cordless Phone: The "cordless phone abuse." The "cordless phone abuses." The "cordless phone accessory." The "cordless phone accessories." The "cordless phone bands." The "cordless phone bill." The "cordless phone bills." The "cordless phone boxes." The "cordless phone boxing." The "cordless phone bugs." The "cordless phone bypasses." The "cordless phone casing." The "cordless phone charges." The "cordless phone cheats." The "cordless phone circuits." The "cordless phone circuit designs." The "cordless phone color box." The "cordless phone color boxes." The "cordless phone companies." The "cordless phone costs." The "cordless phone countermeasures." The "cordless phone crime." The "cordless phone crimes." The "cordless phone defeats." The "cordless phone descramblers." The "cordless phone designs." The "cordless phone device." The "cordless phone devices." The "cordless phone equipment." The "cordless phone frequencies." The "cordless phone fraud." The "cordless phone fraud countermeasures." The "cordless phone frauds." The "cordless phone hacks." The "cordless phone hackers." The "cordless phone harassment." The "cordless phone hardware." The "cordless phone invasion of privacy." The "cordless phone operation." The "cordless phone operators." The "cordless phone pirates." The "cordless phone phreaker." The "cordless phone phreakers." The "cordless phone phreaking." The "cordless phone privacy." The "cordless phone products." The "cordless phone receivers." The "cordless phone scam." The "cordless phone scams." The "cordless phone scramblers." The "cordless phone security." The "cordless phone security system." The "cordless phone service." The "cordless phone services." The "cordless phone sites." The "cordless phone social engineering." The "cordless phone science project." The "cordless phone science projects." The "cordless phone special projects." The "cordless phone spoofs." The "cordless phone spoofing." The "cordless phone spying." The "cordless phone system abuses." The "cordless phone stalking." The "cordless phone strategy." The "cordless phone strategies." The "cordless phone surveillance." The "cordless phone survival." The "cordless phone systems." The "cordless phone system security." The "cordless phone tactic." The "cordless phone tactics." The "cordless phone taps." The "cordless phone tapping." The "cordless phone technique." The "cordless phone techniques." The "cordless phone technology." The "cordless phone technologies." The "cordless phone tempest methods." The "cordless phone tones." The "cordless phone tutorials." The "cordless phone vulnerability." The "cordless phone vulnerabilities."

Fax: The "fax abuse." The "fax abuses." The "fax accessory." The "fax accessories." The "fax attacks." The "fax boxes." The "fax boxing." The "fax bugs." The "fax bypasses." The "fax casing." The "fax charges." The "fax cheats." The "fax circuits." The "fax commo." The "fax communications." The "fax crime countermeasures." The "fax descramblers." The "fax circuit designs." The "fax color boxes." The "fax companies." The "fax compression." The "fax costs." The "fax counterfeiting." The "fax countermeasures." The "fax crime." The "fax crimes." The "fax decryption." The "fax defeats." The "fax designs." The "fax device." The "fax devices." The "fax encryption." The "fax equipment." The "fax fraud." The "fax fraud countermeasures." The "fax frauds." The "fax hacks." The "fax hackers." The "fax harassment." The "fax hardware." The "fax interceptions." The "fax invasion of privacy." The "fax machines." The "fax machine designs." The "fax machine modifications." The "fax modems." The "fax on demand services." The "fax operation." The "fax operators." The "fax pirates." The "fax phreaker." The "fax phreakers." The "fax phreaking." The "fax privacy." The "fax products." The "fax protocols." The "fax scam." The "fax scams." The "fax scramblers." The "fax security." The "fax security system." The "fax servers." The "fax service." The "fax services." The "fax social engineering." The "fax science project." The "fax science projects." The "fax special projects." The "fax spoofs." The "fax spoofing." The "fax spying." The "fax stalking." The "fax strategy." The "fax strategies." The "fax surveillance." The "fax survival." The "fax systems." The "fax system bypasses." The "fax system countermeasures." The "fax system crime." The "fax system crimes." The "fax system defeats." The "fax system privacy." The "fax system vulnerability." The "fax system vulnerabilities." The "fax system security." The "fax tactic." The "fax tactics." The "fax taps." The "fax tapping." The "fax technique." The "fax techniques." The "fax technology." The "fax technologies." The "fax tempest methods." The "fax tones." The "fax tutorials." The "fax vulnerability." The "fax vulnerabilities."

Fax Machine: The "fax machine abuse." The "fax machine abuses." The "fax machine accessory." The "fax machine accessories." The "fax machine boxes." The "fax machine boxing." The "fax machine bugs." The "fax machine bypasses." The "fax machine casing." The "fax machine charges." The "fax machine cheats." The "fax machine circuits." The "fax machine descramblers." The "fax machine circuit designs." The "fax machine color boxes." The "fax machine companies." The "fax machine costs." The "fax machine countermeasures." The "fax machine crime." The "fax machine crimes." The "fax machine defeats." The "fax machine designs." The "fax machine device." The "fax machine devices." The "fax machine equipment." The "fax machine fraud." The "fax machine fraud countermeasures." The "fax machine frauds." The "fax machine hacks." The "fax machine hackers." The "fax machine harassment." The "fax machine hardware." The "fax machine invasion of privacy." The "fax machine operation." The "fax machine operators." The "fax machine pirates." The "fax machine phreaker." The "fax machine phreakers." The "fax machine phreaking." The "fax machine privacy." The "fax machine products." The "fax machine scam." The "fax machine scams." The "fax machine security." The "fax machine security system." The "fax machine service." The "fax machine services." The "fax machine social engineering." The "fax machine science project." The "fax machine science projects." The "fax machine scramblers." The "fax machine special projects." The "fax machine spoofs." The "fax machine spoofing." The "fax machine spying." The "fax machine system abuses." The "fax machine stalking." The "fax machine strategy." The "fax machine strategies." The "fax machine surveillance." The "fax machine survival." The "fax machine systems." The "fax machine system bypasses." The "fax machine system countermeasures." The "fax machine system crime." The "fax machine system crimes." The "fax machine system defeats." The "fax machine system privacy." The "fax machine system vulnerability." The "fax machine system vulnerabilities." The "fax machine tactic." The "fax machine tactics." The "fax machine taps." The "fax machine tapping." The "fax machine technique." The "fax machine techniques." The "fax machine technology." The "fax machine technologies." The "fax machine tempest methods." The "fax machine tones." The "fax machine tutorials." The "fax machine vulnerability." The "fax machine vulnerabilities."

F-G: The "family radio service." The "fiber optic cable." The "fight crime." The "free long distance calls." The "free long distance phone calls." The "free long distance telephone calls." The "free payphone calls." The "free overseas calls." The "free phone calls." The "free telephone calls." The "full-duplex." The "general mobile radio service." The "gold box." The "green box."

H: The "half-duplex." The "high tech consultants." The "hi-tech consultants." The "high tech consulting." The "hi-tech consulting." The "high tech devices." The "hi-tech devices." The "high tech equipment." The "hi-tech equipment." The "high tech hardware." The "hi-tech hardware." The "high tech offers." The "hi-tech offers." The "high tech products." The "hi-tech products." The "high tech services." The "hi-tech services." The "high tech security consultants." The "hi-tech security consultants." The "high tech security consulting." The "hi-tech security consulting." The "high tech security devices." The "hi-tech security devices." The "high tech security equipment." The "hi-tech security equipment." The "high tech security hardware." The "hi-tech security hardware." The "high tech security offers." The "hi-tech security offers." The "high tech security products." The "hi-tech security products." The "high tech security services." The "hi-tech security services." The "high tech survival consultants." The "hi-tech survival consultants." The "high tech survival consulting." The "hi-tech survival consulting." The "high tech survival devices." The "hi-tech survival devices." The "high tech survival equipment." The "hi-tech survival equipment." The "high tech survival hardware." The "hi-tech survival hardware." The "high tech survival offers." The "hi-tech survival offers." The "high tech survival products." The "hi-tech survival products." The "high tech survival services." The "hi-tech survival services." The "how to build a blackbox." The "how to build a black box." The "how to build a bluebox." The "how to build a blue box." The "how to build a cheesebox." The "how to build a cheese box." The "how to build an orangebox." The "how to build an orange box." The "how to build a phone box." The "how to build a phone color box." The "how to build a redbox." The "how to build a red box." The "how to build a silverbox." The "how to build a silver box." The "how to build blackboxes." The "how to build black boxes." The "how to build blueboxes." The "how to build blue boxes." The "how to build cheeseboxes." The "how to build cheese boxes." The "how to build orangeboxes." The "how to build orange boxes." The "how to build phone boxes." The "how to build phone color boxes." The "how to build redboxes." The "how to build red boxes." The "how to build silverboxes." The "how to build silver boxes."

H-O: The "infinity box." The "internet phone scams." The "internet telephone calls." The "jack box." The "light box." The "line interface unit." The "lineman's handsets." The "lineman's test sets." The "line switch unit." The "long distance bill." The "long distance charges." The "long distance costs." The "lunch box." The "ma bell." The "magenta box." The "mauve box." The "missing calls." The "neon box." The "noise box." The "off-hook problems." The "olive box." The "orange box." The "orange boxes." The "orange boxing." The "outrageous circuit designs." The "outrageous circuits." The "outrageous devices." The "outrageous electronic devices." The "outrageous electronic gadgets." The "outrageous electronics." The "outrageous equipment." The "outrageous gadgets." The "outrageous hardware." The "outrageous products." The "outrageous projects." The "outrageous science projects." The "outrageous special projects."

PAA-PAX: The "party box." The "pearl box." The "pink box." The "purple box."

Pager: The "pager abuse." The "pager abuses." The "pager accessory." The "pager accessories." The "pager beeper manual." The "pager boxes." The "pager boxing." The "pager bugs." The "pager bypasses." The "pager casing." The "pager charges." The "pager cheats." The "pager circuits." The "pager descramblers." The "pager circuit designs." The "pager color boxes." The "pager companies." The "pager costs." The "pager countermeasures." The "pager crime." The "pager crimes." The "pager defeats." The "pager designs." The "pager device." The "pager devices." The "pager equipment." The "pager fraud." The "pager fraud countermeasures." The "pager frauds." The "pager hacks." The "pager hackers." The "pager harassment." The "pager hardware." The "pager invasion of privacy." The "pager operation." The "pager operators." The "pager pirates." The "pager phreaker." The "pager phreakers." The "pager phreaking." The "pager privacy." The "pager products." The "pager scam." The "pager scams." The "pager security." The "pager security system." The "pager service." The "pager services." The "pager social engineering." The "pager science project." The "pager science projects." The "pager scramblers." The "pager special projects." The "pager spoofs." The "pager spoofing." The "pager spying." The "pager system abuses." The "pager stalking." The "pager strategy." The "pager strategies." The "pager surveillance." The "pager survival." The "pager systems." The "pager system bypasses." The "pager system countermeasures." The "pager system crime." The "pager system crimes." The "pager system defeats." The "pager system privacy." The "pager system vulnerability." The "pager system vulnerabilities." The "pager tactic." The "pager tactics." The "pager taps." The "pager tapping." The "pager technique." The "pager techniques." The "pager technology." The "pager technologies." The "pager tempest methods." The "pager tones." The "pager tutorials." The "pager vulnerability." The "pager vulnerabilities."

Payphone: The "payphone abuse." The "payphone abuses." The "payphone bill." The "payphone bills." The "payphone boxes." The "payphone boxing." The "payphone bugs." The "payphone bypasses." The "payphone casing." The "payphone charges." The "payphone cheats." The "payphone circuits." The "payphone circuit designs." The "payphone color box." The "payphone color boxes." The "payphone color boxing." The "payphone color box defeats." The "payphone company." The "payphone companies." The "payphone costs." The "payphone color box countermeasures." The "payphone countermeasures." The "payphone crime." The "payphone crimes." The "payphone defeats." The "phone descramblers." The "payphone designs." The "payphone device." The "payphone devices." The "payphone equipment." The "payphone fraud." The "payphone fraud countermeasures." The "payphone frauds." The "payphone hacks." The "payphone hackers." The "payphone harassment." The "payphone hardware." The "payphone invasion of privacy." The "payphone long distance." The "payphone operation." The "payphone operators." The "payphone pirates." The "payphone phreaker." The "payphone phreakers." The "payphone phreaking." The "payphone privacy." The "payphone scam." The "payphone scams." The "phone scramblers." The "payphone security." The "payphone security system." The "payphone service." The "payphone services." The "payphone social engineering." The "payphone special projects." The "payphone spoofs." The "payphone spoofing." The "payphone spying." The "payphone system abuses." The "payphone stalking." The "payphone strategy." The "payphone strategies." The "payphone surveillance." The "payphone survival." The "payphone systems." The "payphone system bypasses." The "payphone system countermeasures." The "payphone system crime." The "payphone system crimes." The "payphone system defeats." The "payphone system privacy." The "payphone system vulnerability." The "payphone system vulnerabilities." The "payphone system security." The "payphone system security bypasses." The "payphone system security countermeasures." The "payphone system security defeats." The "payphone system security vulnerabilities." The "payphone tactic." The "payphone tactics." The "payphone taps." The "payphone tapping." The "payphone technique." The "payphone techniques." The "payphone technology." The "payphone technologies." The "payphone tempest methods." The "payphone tones." The "payphone tutorials." The "payphone vulnerability." The "payphone vulnerabilities."

PBX: The "pbx abuse." The "pbx abuses." The "pbx boxes." The "pbx boxing." The "pbx bugs." The "pbx bypasses." The "pbx casing." The "pbx charges." The "pbx cheats." The "pbx circuits." The "pbx descramblers." The "pbx circuit designs." The "pbx color boxes." The "pbx companies." The "pbx costs." The "pbx countermeasures." The "pbx crime." The "pbx crimes." The "pbx defeats." The "pbx designs." The "pbx device." The "pbx devices." The "pbx equipment." The "pbx fraud." The "pbx fraud countermeasures." The "pbx frauds." The "pbx hacks." The "pbx hackers." The "pbx harassment." The "pbx hardware." The "pbx invasion of privacy." The "pbx operation." The "pbx operators." The "pbx pirates." The "pbx phreaker." The "pbx phreakers." The "pbx phreaking." The "pbx privacy." The "pbx products." The "pbx scam." The "pbx scams." The "pbx security." The "pbx security system." The "pbx service." The "pbx services." The "pbx social engineering." The "pbx science project." The "pbx science projects." The "pbx scramblers." The "pbx special projects." The "pbx spoofs." The "pbx spoofing." The "pbx spying." The "pbx system abuses." The "pbx stalking." The "pbx strategy." The "pbx strategies." The "pbx surveillance." The "pbx survival." The "pbx systems." The "pbx system bypasses." The "pbx system countermeasures." The "pbx system crime." The "pbx system crimes." The "pbx system defeats." The "pbx system privacy." The "pbx system vulnerability." The "pbx system vulnerabilities." The "pbx tactic." The "pbx tactics." The "pbx taps." The "pbx tapping." The "pbx technique." The "pbx techniques." The "pbx technology." The "pbx technologies." The "pbx tempest methods." The "pbx tones." The "pbx tutorials." The "pbx vulnerability." The "pbx vulnerabilities."

Phone: The "phone abuse." The "phone abuses." The "phone accessory." The "phone accessories." The "phone bill." The "phone billing." The "phone bills." The "phone boxes." The "phone boxing." The "phone controllers." The "phone bug detectors." The "phone bugs." The "phone bypasses." The "phone call length limiters." The "phone cards." The "phone casing." The "phone charges." The "phone cheats." The "phone circuits." The "phone circuit designs." The "phone color box." The "phone color boxes." The "phone color boxing." The "phone color box defeats." The "phone company." The "phone companies." The "phone costs." The "phone color box countermeasures." The "phone countermeasures." The "phone crime." The "phone crimes." The "phone defeats." The "phone designs." The "phone device." The "phone devices." The "phone dtmf decoders." The "phone dtmf encoders." The "phone equipment." The "phone fraud." The "phone fraud countermeasures." The "phone frauds." The "phone hacks." The "phone hackers." The "phone harassment." The "phone hardware." The "phone invasion of privacy." The "phone line controllers." The "phone line privacy." The "phone line security." The "phone line simulators." The "phone lines." The "phone long distance."

The "phone operation." The "phone operators." The "phone pirates." The "phone phreaker." The "phone phreakers." The "phone phreaking." The "phone privacy." The "phone products." The "phone scam." The "phone scams." The "phone safety." The "phone security." The "phone security system." The "phone service." The "phone services." The "phone simulators." The "phone social engineering." The "phone science project." The "phone science projects." The "phone special projects." The "phone spoofs." The "phone spoofing." The "phone spying." The "phone system abuses." The "phone stalking." The "phone strategy." The "phone strategies." The "phone surveillance." The "phone survival." The "phone systems." The "phone system bypasses." The "phone system countermeasures." The "phone system crime." The "phone system crimes." The "phone system defeats." The "phone system privacy." The "phone system vulnerability." The "phone system vulnerabilities." The "phone system security." The "phone system security bypasses." The "phone system security countermeasures." The "phone system security defeats." The "phone system security vulnerabilities." The "phone tactic." The "phone tactics." The "phone tap detectors." The "phone taps." The "phone tapping." The "phone technique." The "phone techniques." The "phone technology." The "phone technologies." The "phone tempest methods." The "phone tones." The "phone tutorials." The "phone vulnerability." The "phone vulnerabilities."

The "phone consultants." The "phone consulting services." The "phone customized device services." The "phone customized devices." The "phone development services." The "phone designs." The "phone design services." The "phone devices." The "phone equipment." The "phone hardware." The "phone invention laboratory services." The "phone invention prototyping services." The "phone invention services." The "phone inventions." The "phone inventors." The "phone laboratory services." The "phone laboratories." The "phone merchandise." The "phone product creation services." The "phone product development services." The "phone product services." The "phone product researchers." The "phone products." The "phone prototype services." The "phone prototypes." The "phone prototyping services." The "phone repair services." The "phone R&D services." The "phone research, design and development services." The "phone research laboratories." The "phone research services." The "phone researchers." The "phone services." The "phone special projects services." The "phone special services." The "phone testers." The "phone testing laboratories." The "phone testing services." The "phone troubleshooters." The "phone troubleshooting services."

PHR-PZ: The "phreaking countermeasures." The "phreaking phones." The "phreaking telephones." The "pulse amplitude modulated." The "pulse code modulated." The "pulse frequency modulated."

Q-T: The "rainbow box." The "razz box." The "red box." The "red boxes." The "red boxing." The "remote terminal." The "ring tone." The "scarlet box." The "science project." The "science project." The "shoulder surfing." The "silver box." The "silver boxes." The "silver boxing." The "social engineer." The "social engineering." The "special projects." The "static box." The "switch box." The "synchronous optical networks." The "tan box." The "tapped answering machine." The "tapped cellphone." The "tapped fax." The "tapped payphones." The "tapped phones." The "tapped telephones." The "tapping answering machines." The "tapping cellphones." The "tapping faxes." The "tapping payphones." The "tapping phones." The "tapping telephones." The "theft of services." The "theft of fax services." The "theft of pager services." The "theft of payphone services." The "theft of pbx services." The "theft of phone services." The "theft of telephone services." The "theft of voice mail services." The "toll free calls." The "toll free numbers." The "toll fraud devices." The "toll frauds." The "tolled calls." The "tron box." The "TV cable box."

Telephone: The "telephone abuse." The "telephone abuses." The "telephone accessory." The "telephone accessories." The "telephone bill." The "telephone bills." The "telephone boxes." The "telephone boxing." The "telephone bugs." The "telephone bypasses." The "telephone casing." The "telephone charges." The "telephone cheats." The "telephone circuits." The "telephone circuit designs." The "telephone color box." The "telephone color boxes." The "telephone color boxing." The "telephone color box defeats." The "telephone company." The "telephone companies." The "telephone costs." The "telephone color box countermeasures." The "telephone countermeasures." The "telephone crime." The "telephone crimes." The "telephone descramblers." The "telephone defeats." The "telephone designs." The "telephone device." The "telephone devices." The "telephone equipment." The "telephone fraud." The "telephone fraud countermeasures." The "telephone frauds." The "telephone hacks." The "telephone hackers." The "telephone harassment." The "telephone hardware." The "telephone invasion of privacy." The "telephone lines." The "telephone long distance." The "telephone operation." The "telephone operators." The "telephone pirates." The "telephone phreaker." The "telephone phreakers." The "telephone phreaking." The "telephone privacy." The "telephone products." The "telephone scam." The "telephone scams." The "telephone science project." The "telephone science projects." The "telephone security." The "telephone security system." The "telephone service." The "telephone services." The "telephone social engineering." The "telephone scramblers." The "telephone special projects." The "telephone spoofs." The "telephone spoofing." The "telephone spying." The "telephone stalking." The "telephone strategy." The "telephone strategies." The "telephone surveillance." The "telephone survival." The "telephone system." The "telephone system abuses." The "telephone system bypasses." The "telephone system countermeasures." The "telephone system crime." The "telephone system crimes." The "telephone system defeats." The "telephone system privacy." The "telephone system vulnerability." The "telephone system vulnerabilities." The "telephone system security." The "telephone system security bypasses." The "telephone system security countermeasures." The "telephone system security defeats." The "telephone system security vulnerabilities." The "telephone tactic." The "telephone tactics." The "telephone taps." The "telephone tapping." The "telephone technique." The "telephone techniques." The "telephone technology." The "telephone technologies." The "telephone tempest methods." The "telephone tones." The "telephone tutorials." The "telephone vulnerability." The "telephone vulnerabilities."

Voice Mail: The "voice mail abuse." The "voice mail abuses." The "voice mail boxes." The "voice mail boxing." The "voice mail bugs." The "voice mail bypasses." The "voice mail casing." The "voice mail charges." The "voice mail cheats." The "voice mail descramblers." The "voice mail circuit designs." The "voice mail color boxes." The "voice mail companies." The "voice mail costs." The "voice mail countermeasures." The "voice mail crime." The "voice mail crimes." The "voice mail defeats." The "voice mail designs." The "voice mail device." The "voice mail devices." The "voice mail equipment." The "voice mail fraud." The "voice mail fraud countermeasures." The "voice mail frauds." The "voice mail hacks." The "voice mail hackers." The "voice mail harassment." The "voice mail hardware." The "voice mail invasion of privacy." The "voice mail operation." The "voice mail operators." The "voice mail pirates." The "voice mail phreaker." The "voice mail phreakers." The "voice mail phreaking." The "voice mail privacy." The "voice mail products." The "voice mail scam." The "voice mail scams." The "voice mail security." The "voice mail security system." The "voice mail service." The "voice mail services." The "voice mail social engineering." The "voice mail science project." The "voice mail science projects." The "voice mail scramblers." The "voice mail special projects." The "voice mail spoofs." The "voice mail spoofing." The "voice mail spying." The "voice mail system abuses." The "voice mail stalking." The "voice mail strategy." The "voice mail strategies." The "voice mail surveillance." The "voice mail survival." The "voice mail systems." The "voice mail system bypasses." The "voice mail system countermeasures." The "voice mail system crime." The "voice mail system crimes." The "voice mail system defeats." The "voice mail system privacy." The "voice mail system vulnerability." The "voice mail system vulnerabilities." The "voice mail tactic." The "voice mail tactics." The "voice mail taps." The "voice mail tapping." The "voice mail technique." The "voice mail techniques." The "voice mail technology." The "voice mail technologies." The "voice mail tempest methods." The "voice mail tones." The "voice mail tutorials." The "voice mail vulnerability." The "voice mail vulnerabilities."

V-Z: The "violet box." The "voice frequency signals." The "voice quality." The "white box." The "wireless phone." The "wireless phones." The "wireless technology." The "wireless technologies." The "wireless telephone." The "wireless telephones." The "yellow box."

Great LONE STAR CONSULTING, INC. Products and Services!

Like what we offer and have a website? Then please put free hotlink to our home page => Lonestarconsultinginc.com

Copyright © 2001-2024, LONE STAR CONSULTING, INC. Absolutely all Rights Reserved


       IMAGE SPONSORED BY:
 Consumertronics
 Lone Star Consulting, Inc.
 ABQ-Techzonics
       REPRINT POW-MIA IMAGE=>
             ON YOUR WEBSITE

NOTE 1: We make no medical, legal, scientific, engineering, supernatural or paranormal claims including but not limited to claims about the existence, extent, intentions, purposes and capabilities of space aliens, ghosts, spirits, psychic powers, psionics, mental telepathy, precognition, auras, clairvoyance, remote viewing and pschokinesis - all related CD projects we do are based on our proprietary theories SHOULD they actually exist AND if the customer does not clearly specify in his/her CDAF another theory he/she wants the CD device design to be based upon.

NOTE 2: By policy, we never recommend for or against, approve or disapprove, sponsor, endorse, support, guarantee, or take any responsibility for any of the content of any non-Lone Star Consulting, Inc. webpage, website, advertisement, publication or other statement EVEN IF WE HAVE PROVIDED A HOTLINK TO IT. And by policy, we never recommend for or against, approve or disapprove, sponsor, endorse, support, guarantee, or take any responsibility for any company, person, product or service EVEN IF WE HAVE PROVIDED A HOTLINK TO IT. For more information on our policies, please refer to our policies.htm webpage.
Webmaster's Test Links only - not for visitor use: Source-A Source-D Source-E1 Source-E2 Source-F Source-G Source-H Source-I Source-J Source-K Source-L Source-M Source-N Source-P Source-Q Source-R