Unusual, Profitable High-Tech Security, Physical Survival (Preppers), Personal Safety, Countermeasures Device Types!
LONE STAR CONSULTING, INC.
of EL PASO, TEXAS


Customized Devices Application Form (CDAF)
All Customized Device (CD) Types Links by Topics

2024 Catalog now on 1G Flash Drive (only $39 (includes USA S/H))

Lone Star Consulting, Inc.: Click CDAF Link above for Our Address

VOICE (9-5 MST, M-F): [1-915-474-0334] (Prefer Email)


No Payment Clearance Period: U.S. Postal Money Order or Cash
Payment Clearance Period: Any Other Valid M.O., Check or Trade
Welcome to Lone Star Consulting, Inc. Products & Services Guide Website: www.lonestarconsultinginc.com/specproj.htm

Email => Tekmaster
tekmaster@lonestarconsultinginc.com

Who We Are + Privacy Policies
+ HTTPS Fallacies


Sitemap - Other Policies


Print, save, bookmark: www.lonestarconsultinginc.com/coaching.htm
USA Site - No cookies - No adware - No spyware - No trojans - No viruses - No worms - No spam - No popups
We Respect Your Privacy - We do NOT Monitor nor Track Your Activities Online, nor Share Your Data

BUYING FROM US IS SIMPLE: (1) Select the Unique Customized Device(s) You Want on This or Any Other Page, (2) Click on the green CDAF Link above, (3) Print and Complete the CDAF Form (one CDAF for each Device), (4) Scan your completed CDAF on a scanner. (4) Mail or Email as scanned-in (not photographed) JPG or GIF image Files to Us Your CDAF(s). We Respond to You Within 3 Days About Your Proposed CD Project.


High-Tech Security, Survival, Surveillance, Countermeasures Customized Device Types
Custom-Made Security, Physical Survival (Preppers), Personal Safety, Surveillance, Privacy, TSCM & Countermeasures Products and Services.

Unique, Original, Made-to-Order, Special Needs, Unusual, Strange, Weird Customized Device Types We Can Do For YOU! Backed by decades of Professional Design Experience!
Lone Star Consulting, Inc. - High-Tech Consulting


Print, save, bookmark: www.lonestarconsultinginc.com
... and tell your friends!

Short of money? We do encourage mutually-beneficial trades that can save YOU a lot of money (eg: electronic parts & test equipment, computer & photo equipment, et al) ==>

Welcome to Lone Star Consulting, Inc. Electronic implants,subliminal mind control,electronic attack,directed energy weapons research,ultrasonic attack,ultrasonic mind control,infrasonic attack,brainwashing,brainwave entrainment,brainwave signatures,behavior modification,brain stimulations,brain state monitoring,mind reading,manchurian candidates,electronic gangstalking

Hello! We support many technologies. For introduction into how to obtain hardware and our design philosophy, please click on our Home Page (includes hotlinks to all of our Device Types, listed by Topics and Titles): Home. Hotlinks by Topics and Titles also at: Site Map. When you are done, please use your Browser's Back Button to return here.

We Are Now on Social Media - Please Join With Us!
FACEBOOK and LINKEDIN
JOIN US ON FACEBOOK AS OUR SOCIAL MEDIA FRIEND AND/OR ON LINKEDIN AS OUR SOCIAL MEDIA CONNECTION! As you likely know, we recently joined FACEBOOK and LINKEDIN social media. To join us, you must first email us directly to LONE STAR CONSULTING, INC., and explain to us why you want to be social media-connected to us. NOTE: We never accept such requests when they solely come through our social media sites - we regularly receive 100s of such requests mostly from totally unknown people. We are very selective - your acceptance is much increased if you are a prior or current Client, or a relevant serious researcher, expert, scientist or engineer. We are constantly engaged in much exciting work that we would like to share with our social media friends and connections. Most of our discussions on Facebook and LinkedIn will relate to mind control, electronic attack, radionics, physical survival and energy through increasingly worsening times. One big benefit is that LONE STAR CONSULTING, INC. will provide free information found nowhere else (eg: research results), which may be very helpful to you. Another big benefit is that you will be able to share your experiences and needs with others who may be or were in similar situations (eg: you are experiencing certain types of mind control attacks, which may also be afflicting others in your area). We do not accept just anyone as our social media friend or connection - we seek a smaller but more focused and intense group. Interested in us friending you? Then email us here, and in your Subject Line, put: "Please Friend Me". In your email body, please explain in 100-500 words the benefits to both of us in becoming social media friends (Facebook) or social media connections (LinkedIn). Then tell your friends and connections about us! NOTE: With few exceptions, we are not going to post up our friends on Facebook and connections on LinkedIn until we have selected at least 500 Facebook friends or LinkedIn connections. We are not yet on Twitter or MySpace. - Thanks. John Williams, M.S.E.E.

Pinpoint Hotlinks to All Listed Device Types (on index.html page)
If you can't find the Topic or Title you are looking for below
by scrolling or using your Browser's Find/Search function, our ==>
sitemap.htm page has comprehensive hotlinks to all of our Topics, Titles

Short on Money to Get What YOU MUST HAVE?
Hard Economic Times makes it difficult for many good people to defend themselves against all kinds of dangers, including Mind Control and Electronic Attacks. WE CAN HELP YOU!
All of our devices are unique and professionally handmade in the USA. That is why they cost more than the mass-produced foreign-made electronic devices common to discount stores. Our resulting higher prices means that many good people may find our CD projects hard to afford. To make it much easier for stretched people to obtain our unique Customized Devices, we now offer our special Lay-Away and Barter and Collateral Plans (use them individually or in conjunction with each other) as added means to obtain our products and services. For more details, click on: Our Easy Payment Plans, then click on your browser's backbutton to return here.

ADD A NEW ELECTRONIC FREQUENCY COUNTER TO YOUR CUSTOMIZED DEVICES: Many of the Device-Types described herein automatically come with displays. These displays may consist of meter-type digital readouts, analog readouts or LEDs. Now you can add a new small and portable Electronic Frequency Counter (EFC) to any Customized Devices (CD) device you contract for with us (includes, but not limited to the Device-Types described herein) to detect and possibly locate EMF signals between 0.009 Hz and 99,999 Hz. This bandwidth is very important because whatever the transmitter carrier frequency is, for mind control purposes, the carrier must be modulated by ultra low (infrasonic) brainwave frequency signals and/or infrasonic control signals, or ultrasonic frequency data or control signals, which the EFC should detect, while ignoring other EMF signals which are not modulated by these types of signals, such as huge number of normal radio and TV signals. Be sure to specify an EFC for YOUR device CDAF (green link at top of webpage is CDAF). With an EFC, you can monitor the entire bands for infrasonic and ultrasonic EMF signals, as well as electromagnetic signals within this same bandwidth - including brain wave frequencies and many power, servo and control frequencies! This should greatly increase the finding of useful data and documentation, and is especially useful for tracking and analyzing mind control, electronic attack, radionics, power, servo, control and other signals. Since the EFC comes as a separate module which plugs into most of our CD devices, all you need is one EFC for all of your EFC-capable devices, PLUS you can use your EFC for other non-CD devices and uses. We can sell you the EFC by itself custom-modified with battery holder and ON/OFF switch, if you wish, and with any of these types of signal connections: RCA, phone plug, miniphone plug, BNC, USB, spade lug, flat lug, ring lug, banana, pin, barrel plug, bare wire ($349 + S/H ($9.90 USA S/H)). We can also include a detected signal amplifier, and low-band and/or high-band filter; just state on your CDAF for your Device. If you need the EFC by itself, please provide us your CDAF just for the EFC.

Introduction to this Page
Customized Devices Application Form (CDAF)

SECURITY EQUIPMENT:

The ULTIMO ULTRASONIC AI JAMMER WITH SWEEP: Today, many smart phones (eg: iPhones), audio assistants (eg: Alexa, Siri), smart speakers (eg: Echo), smart vehicles (eg: Tesla, Audi) and other smart devices are controlled (often thru hacking) on an artificial intelligence (AI) level not only by audio but also secretly by ultrasounds. Some of them in turn use AI-controlled ultrasounds and microwaves to control an almost endless number of other electronic devices within their reach (including medical devices), and/or detect occupancy of areas (often, to activate their built-in cameras). Many of these systems have proven vulnerable to secret ultrasonic hacking, unknown to you, which can have devastating results, such as turning security systems off, unlocking doors, turning ON stoves, surveilling conversations and images, invasion of privacy, etc. If you walk into any room naked, you do not want electronic devices, using AI and ultrasonics, to immediately and unknown to you to snap ON cameras and other devices, and transmit your images and sounds to remote viewers. AI + ultrasonics = Perfect tool for murderers, rapists, burglars, other home invaders, blackmailers, scammers and swindlers. Especially if you are engaged in very private activities you never want the public to see, such as gambling, smoking pot, counting money, working with valuable collectibles, calling your secret lover, discussing secrets, making travel plans, family and friends visitors, watching porn, etc. AI-controlled ultrasonic surveillance and attacks are especially menacing for TIs, where realtime knowledge of exactly where you are located (for targeting purposes), what you are doing, how you are reacting to their experiments, fine-tuning their experiments, and what kinds of mind control attacks work best against you are invaluable to perps.

By using the UUAIJ with sweep, an ultrasonic and AI jammer/AI countermeasure, you can much better protect yourself from such dangers. Point the UUAIJ in the direction of the ultrasonic transmitter(s), you not only jam its ultrasonic mind control, device control, and programming signals attacking your ultrasonic-sensitive devices, but also ultrasonic signals directly attacking your brain and body as mind control schemes. Point the UUAIJ towards your electronic devices which are vulnerable to ultrasonic hacking or maliciously transmit ultrasounds themselves, and you stop your devices not only from being hacked, but also from using their ultrasonic transmissions to control other area ultrasonic-receptive devices. In fact, having two UUAIJs operating simultaneously doing these jobs is an excellent idea.

WHY IS FREQUENCY SWEEPING SO CRITICAL?: A "sweeped ultrasonic signal" is a signal which freq often and automatically changes from high-to-low and/or from low-to-high within the ultrasonic bands so that many freqs of incoming signals are jammed without the operator having to constantly manually tune freqs (which the perp may be constantly changing on his/her end). Many different ultrasonic frequencies are used in AI-controlled ultrasonic transmitters. Jamming is best done when the jamming freq is the same or close to the offending freq. Our UUAIJ is very versatile in automatically jamming ultrasonic sounds thruout the practical air ultrasonic bands because its output is quickly sweeped. Sweeped signals are not the same as freq hopping. Sweeped signals change freqs on a continuous basis, so 100s or 1000s of individual freqs are produced during each sweeping cycle, while freq hopping is jumping from one discrete freq to another, missing many freqs. Sweeped jamming sounds are far more effective, energy efficient (as compared to broadband ultrasonic transmitters), faster and easier to use to disrupt malicious ultrasound signals than manually-tuned jamming sounds (which would require you to constantly know realtime the freqs of the offending signals, which freqs may be fast-changing). The UUAIJ uses multiple intertwining signal sweepings, making the resulting jamming signal random while covering all freqs within the air ultrasonic bands, so perps cannot develop a countermeasure to our UUAIJ. A sweeped jammer must have multiple intertwining sweeps to produce random freq outputs, because single-sweeped transmissions are predictable and thus easily countermeasured.

Also, it is critical that ultrasonic jammer have highly directional sounders, as does our, because a highly directional sounder directs nearly all of the jammer sound energy in the direction of the offending transmitter or AI-controlled electronic device (which makes the UUAIJ portable and much more electrical efficient), and minimizes interference with other ultrasonic devices you don't want to interfere with, and with pets sensitive to the UUAIJ output.

HOW THE UUAIJ WORKS: Operation is very simple. Point the sounder in the direction where the UUAIJ is to jam. Switch the toggle switch ON to send the sweeped jamming ultrasonic signal to the sounder output. When done, switch to OFF. The UUAIJ standard bandwidth is 16KHz - 40KHz (Cost Estimate is less for max freq less than 40KHz). We can go upto 100KHz in highest air freq, but Cost Estimate will be much higher above 40KHz because freqs above 40KHz have extreme attenuation rates in air, so require much more powerful output designs. We can also do underwater UUAIJs (ie: sonar), with water bandwidth freqs up to 1MHz.

Last Made $1995 [4 lb] for 16KHz - 40KHz bandwidth. Portable. Most popular with Clients and potential Clients expressing AI concerns!

The ULTIMO PROXIMITY DETECTOR & ALARM: The UPD&A works similar to a Porch Light Proximity Detector (PLPD), but our UPD&A is far more versatile and useful. PLPDs are designed to be mounted and operated at about head high, and to detect human beings. Our UPD&A can be mounted even below your ground level all the way to above your ceiling, and will detect anything that generates significant heat - including people, animals, and warm mechanical, electrical or heating machinery. While PLPDs just turn-ON a light, our UPD&A will turn-ON a light, and/or sound a loud alarm (you select), and for a duration you program it for typically between 1 - 10 secords (you can specify other time ranges if you wish). And while PLPDs offer a limited range of sensor directions, our UPD&A sensor is mounted on an adjustable flexible arm which you can point in any direction. And while PLPDs are typically 120VAC powered - forcing you to be tethered to a power socket, you can specify our UPD&A to be powered by 9VDC battery, by both 9VDC battery and 120VAC (with selector switch), or powered by 120VAC. And because you can select a loud alarm to sound off upon detection, our UPD&A can be used to frighten intruding humans and animals away so you get rid of them without confronting them. Our UPD&A comes with a sensitivity adjustment. Some of our UPD&A's very important uses:
          (1) You can detect and alarm (if you wish) potential home invaders, burglars, rapists, stalkers, peeping toms, spies, etc. who intrude on your property - even if they may be concealed from your view. While PLPDs are mostly limited to detecting humans and some large animals, they miss much smaller living things like rats, mice, cats, smaller dogs, raccoons, birds, bats, etc. which might be endangering you and/or infesting/damaging your property, but hard to detect because they operate at night. While people vary considerably in height and size, everyone's feet is on the ground, so by setting detection direction lower, you pick up much smaller people and animals.
          (2) Our UPD&A can be used on camping trips to detect people and animals (large and small) which visit your campsite when you are asleep or absent. Also great for detecting people nearby when you are doing your private business. Also great for outdoor activities of all kinds, and trips in general. Our UPD&A can be used to keep close to others in your group even when you temporarily can't see them; and for help finding lost or hidden children and pets.
          (3) While not designed to substitute for fire detectors, our UPD&A can pick up hot items, including fires, stoves, space heaters, etc.

          (4) Our UPD&A can be used to detect mechanical and electrical devices that produce heat or recently produced heat. Some examples: (A) To detect if robots are wondering around your area. (B) To detect if you have a device turned ON which should not be ON. (C) To detect to deternine whether or not a vehicle has been recently driven, or a gun has been recently fired, without touching it. (D) To detect if water or food you are heating is warm enough. (E) To detect if something is hot without getting burned. And its great for science projects.
          (5) Our UPD&A can be used to detect hot spots in your home or business to show where you are losing costly energy, building up too much heat or where there may be a wiring or plumbing defect.

          (6) Our UPD&A can be used to detect unusual hot spots on your body or pet's body to alert you to see your doctor or vet to examine, or to detect a possible electronic implant.
       Last made $885 [2 lb].

The ULTIMO HOME/BUSINESS SECURITY SYSTEM: Commonly available home security systems fail in these ways: (1) They are well-known, and criminals already know how to beat them. (2) Their one-size-fits-all mentality is seldom optimum for anyone. (3) Many are both complex and continuously expensive to operate. (4) Their operations are not versatile or selectable to suit different situations. This is where our customizing power results in optimum home security systems and business security systems. You choose these various devices, features and functions which suits YOU best, with any customized features and with any combination, arrangement and numbers of these you wish and that we can reasonably provide. You can even select and/or provide whichever devices and operation modes you want or leave the decisions of whatever you don't select and/or provide to us to select and/or provide:
          CAMERAS & AUDIO RECORDERS: We can do still cameras, video cameras, audio recorders, and/or many other types of electronic and mechanical devices as part of your system.
          ALARMS: We can do audio or ultrasonic alarms (eg: to repel animals or as a commo method), light alarms, and/or silent alarms. AUDIO ALARMS: Audio/ultrasonic volume can be just one level or adjustable by you, and sound can be beeping, wailing, white noise, steady tone, voice and/or music recording, data stream, etc. LIGHT ALARMS: can be steady light or flashing light; white or colored; directional or non-directional; single or multiple lights. SILENT ALARMS: Usually, a silent or buzzing display with flashing lights or steady lights that cannot be heard or seen by an intruder. Which light is ON usually indicates which device has been triggered.
          DETECTION METHODS: Most security systems use motion detection, which we also do. We can do automatic ultrasonic detection, thermal detection, noise detection, light detection, shadow detection, and/or thermal detection. Note that ultrasonic detection is highly directional, so you might require several detection devices to cover any one general area.
          SELECTABILITY: We can provide whatever type and degree of selectability you specify between devices and modes of operation. Devices and modes of operation can be selected to operate individually or simultaneously. Simple examples: (1) An alarm can activate as a light alone, as a sound alone, as both a light and sound, or as more than one light and/or sound. (2) Detection can trigger a camera, an alarm, both a camera and an alarm, or more than one camera and/or alarm.
          TIMING: ON Time timing can be selected for all devices or for each device individually programmable from seconds and/or for hours, with or without an option for a manual reset, whatever you specify.
          The number one concern of criminals is not getting caught. That is why cameras and alarms greatly help. They wake up neighbors, and alert passerbys and nearby police while lighting up the criminals - people who can then witness or apprehend the criminals for police, lawsuits, etc., and cameras and recorders can provide proofs of who did the crimes and exactly what the crimes were.
          Last made: No operation fees [prices and weights vary according to your specified devices, their features and functions, and customizations].

The AUTOMATED CONTROL SIGNAL & AUDIO REPLICATOR: If you develop, test, repair or optimize electromechanical equipment - especially with hard-to-reach control sections - the ACSAR may be exactly what you are looking for to digitally record (uses no tape/compact disk) and playback control signals to automatically replicate over-and-over the desired electromechanical actions! Or to test the vulnerability of your equipment (eg: security equipment) to unauthorized or unwanted attempts to cause or replicate undesired actions. The ACSAR is an incredibly versatile device that records and plays back many types of control signals used to control electromechanical devices to force them to repeat certain machine actions over and over. The ACSAR will record and accurately reproduce ANY digital or analog signal (Digital:min. pulse width > 0.01 msec. Analog: all significant frequency components < 50 KHz). You can even record/playback voice, music, other sounds, and ultrasound! For digital, you can record/playback whether the input signal is continuous/non-continuous (including burst), fixed rate/varied rate, fixed pulse width/varied pulse width, periodic/aperiodic, synchronous/asynchronous, pure digital/hybrid digital-analog, or modulated/unmodulated! You control record and playback rates and durations, input gains (ie: sensitivity), and output gains - all real time! Record and playback rates and durations need not be the same (they may differ if you wish - great feature for data analysis, special effects, equipment troubleshooting, and fast-forwarding), and you can pause or clear at any time! And you can end recording/playback after memory IC is filled (1-cycle), or continuously (continuous playback is great for repeated task, instructional and subliminal uses)! Maximum record duration is 10 minutes - plenty of capability and time to record even the most complex control signal or sound segment. Functional Description: Several antennas of different sizes and shapes are provided that serve as both control signal pick-up and playback (you may use whatever other passive antennas you wish to at your expense). Additional input for audio. Outputs include direct, capacitor-coupled, and transformer-coupled. And as a unique and invaluable special feature of the ACSAR, the antenna input connector can be switched between its input circuit section and output section so that the same antenna connected undisturbed to the same port can be used for both input and output (I/O) functions! For example: The silver dollar-size, very flat and thin spiral antenna is inserted into the machine (eg: through a slot, crack and other thin or non-straight opening, and between densely-packed PC cards) where no other antenna will fit. The Record button on the ACSAR is then pushed to electronically record the sequences of machine control signals that were used to trigger actions that you need repeated over and over. Then, each time the Playback button is pushed, the control signal is faithfully played back to the control circuitry through the spiral antenna to repeat the machine action. The signal can also be replayed in a lab setting at the same, reduced or increased speed, and analyzed. Powerful and versatile test equipment! Much exiting fun! And great for science projects. Last made $2185 [3 lb]. (Note: The recording and playing back of control signals is a complex process. Sensitivity and sampling rate controls are provided to cover a vast range of use conditions. Experimentation is required. Although we provide vast tunability in ACSAR-type devices, it may not record and play back some control signals to produce reliable replicated actions primarily due to antenna positioning problems caused by lack of or cramped equipment control circuitry access. While the I/O ports can be used for numerous types of inputs and outputs, the only external I/O devices provided are the antennas, unless otherwise and explicitly contracted for.)

The ULTIMO SECURITY CAMERA FOILER KIT: Today, artificial intelligence (AI)-driven facial recognition software is commonly a camera app routinely abused by governments, businesses, and individual perps - virtually in all public places and most private places - to track and surveil Targeted Individuals (TIs). Commercial and virtually all personally-made pandemic face masks won't stop them (Reuters, 4/9/2020). Often, on a constant tracking and surveillance basis. With the coronavirus (Covid-19 - Corona Virus) pandemic, many facial recognition perps now have legal cover to invade your privacy and physically and/or electronically harass you for any real reason - and to very profitably sell or give away (eg: revenge porn) your images, locations, conversations and actions to anyone they wish to without your knowledge, permission or payment. These rapidly-spreading, often hidden and often tiny, AI-driven facial recognition cameras are structure-mounted, vehicle-mounted, personally carried and aircraft/drone-mounted - in some places, impossible to avoid. This poses grave dangers to your civil liberties, personal privacy, personal safety and security, well-being, and health.
          Perps use sophisticated AI facial recognition to constantly track, surveil and precision-target TIs to physically and/or electronically harass and even endanger their lives. And your precise location enables assassins, terrorists, rapists, kidnappers, extortionists, robbers and personal enemies to attack you when you are most vulnerable. And by precisely locating you outside of your home or business or away from your loved ones, perps know the best times to do kidnappings, home/business invasions, burglaries and bag jobs. They know what you are saying, who you associate with, your family members and friends, and your habits and routines. And we have often found that when a perp finds an easy target, he/she often invites other perps to, 'join the fun', thru social media, the dark web, and personal contacts.
          Virtually all handheld electronic devices now have built-in quality cameras on them, and many also use AI facial recognition apps on the taken images. And there is virtually no control of what they do with their real time surveillance images of you, including selling them and giving them to entities who want to gravely harm you.
          The solution is to wear devices which prevent facial recognition cameras from taking clear, undistorted, focused pictures and videos of you - stops all known facial recognition cameras from tracking you - likely sparing you from attacks. Also great as a gag to foil friends, family and looky-lous from taking pictures and video of you. Also, great for disguising your pet. Not provided for any illegal use or purpose; sold as per our policies.
          If you are a TI being tracked or surveilled, your very life is likely at stake - you MUST shake off your perp(s) NOW! And if you can shake off your perps, it will likely save you much money investing in very expensive countermeasures and/or transmitter-locating devices, and/or running away to try to avoid them.
          Our popular USCFK is a simple, lightweight, easy-to-use, very effective set of devices which defeats photos and videos taken by cameras, with or without facial recognition. The camera needs not be touched nor damaged in any way. Now - before it's to late - obtain our popular USCFK. We provide extensive User Manuals with all devices we sell, but with the USCFK User Manual, we have added a lot of additional info on how to thwart tracking and surveillance in general as well. Last made $399 [2 lb].

The ULTIMATE EAR-TO-GROUND LISTENER: You may have seen in an old cowboy movie or in actual life, a person (usually, Native American) placing an ear on the ground to listen to oncoming people, animals and/or vehicles. The reason why this usually works so well is because in many places the ground is a much better sound conductor than is the air (neurophonic effect), and there are usually far less extraneous noises than in the air which interferes with one's abilities to distinguish and interpret sounds. Thus, the ear-to-ground technique can often hear a person/animal/vehicle moving around in an area way beyond ability to see it - some times when even miles away. The UETGL uses a special sensor embedded into each shoe/boot heel to pick up and amplify ground sounds way beyond what even the sharpest ear can hear. Ultra versatile, the UETGL is great for Targeted Individuals (TIs), people in fear of being stalked or mugged, security personnel (eg: guards), survivalists, people who live/travel/work in seismic active areas (eg: earthquakes, volcanoes, tsunamis, sinkholes, landslides, avalanches), people who live/travel/work in fracking/digging/cave/tunnel/underground fluid/water leaks/flow areas, military, police, private investigators, hunters, ranchers, farmers, biologists, hikers, walkers, joggers, explorers, campers, roofers, etc. The UETGL picks up one channel of sound from each shoe - essentially, stereo. With the UETGL, you can adjust amplification from Sensitive to Ultra-Sensitive. Determining sound direction is usually easy: You stand still. If the sound is coming directly from your side, with your legs spread at least shoulder apart, the perceived sound echo will be greatest. Since each stereo channel results in a slightly different sound, you can usually perceive sound direction by which sound is dominant. You usually can detect the sound of a person/animal/vehicle with the UETGL way before you can with your ears, and usually way before the person/animal can hear your sounds. Sounds that get louder, usually means the sound source is approaching, while sounds that diminish usually means that the sound source is leaving. The UETGL comes with ear buds, so you can secretly listen for sounds. Note, for this device-type, you must provide us a pair of new shoes or boots with a heel at least 1" tall and 1" thick, at your expense. The shoe/boot must fit you comfortably and be 1/2 size too large, because we need to drill the heels to place the sensors. Not for shoes/boots that get wet. Last made $1295 [2 lb]. If you prefer to have our sensors embedded in a walking stick(s), pole(s), cane(s), chair leg(s), crutch(es) etc., we can also provide the UETGL those ways as well. As a partner to the UETGL, we can also provide you with a ground sound generating system which will help you detect unusual variations of reflected sounds produced by buried objects, structures and minerals by pulsing sounds into the ground that you then detect with the UETGL (at additional cost).

The SIGNAL & CODE INJECTOR: Similar to the AUTOMATED CONTROL SIGNAL & AUDIO REPLICATOR described above, the SCI produces a wide range of signals, included RF signals, and a huge number of code combinations of the signals, that one can use to non-invasively (ie: no electronic connection need be made) test your various equipment for vulnerabilities to outside signal interferences whether that interference be natural or manmade or be intentional or unintentional. The SCI does not come with a recording function as per the ACSAR. It does come with several controls that can be set and tuned to produce a very wide range of different kinds of signals and signal combinations (ie: codes), and the several antennas of the type used by the ACSAR, to subject your equipment to the most grueling exposure of possibly interfering signals to determine shielding and hardening against interfering signals that cause unauthorized accesses, jammings and other possible malfunctions. An external port is provided so that the SCI's signals can be multiplexed or modulated with other signals you produce from other equipment of yours. Unlike the ACSAR, the SCI does not come with a signal record feature. Last made $1595 [3 lb].

The AUTOMATED TEMPEST MODULE (NA): The atm module (a la "Terminator 2" movie and is originally described in the infamous and popular, "Automatic Teller Machines" manual) is an incredibly versatile device that records and plays back control signals produced by certain electromechanical devices to force them to repeat certain desired machine actions. Came with its most profitable settings! Came with the same type of small very flat and thin spiral antenna used with the ACSAR and SCI (above). Was available to everyone - not just Hollywood big-shots! Last made $1195 [3 lb].

The ULTIMO POWERED "SPIKE MIKE" / WALL MIKE: The highly-directional UPSM/WM was originally designed to be a very superior spike microphone / wall microphone for security and surveillance (spying) uses. As a spy mike / surveillance mike, one would simply secretly drill or punch a small hole through a wall and insert the mike tube from one side of the wall to the other side, usually flush with the second wall (sometimes concealed with a picture, furniture, hanging plant, decoration, wallpaper feature, etc.), to listen to and/or record audio on that side of the wall. However, there are practically endless uses of the UPSM/WM spike mike, also including locating and studying birds, insects and animals (especially those concealed in holes, underground, trees, and inside walls), picking up sounds from underneath doors and through window openings, fence openings, floor openings, ceiling openings, and for long distance highly-directional pickups.
          This powered mike is over 12" long for the deepest penetrations, diameter is 1/2", and terminates with a miniphone plug (you can specify different mike tube lengths (upto 24"), diameters (down to about 1/8"), and/or end connector type and/or gender (if commonly available)). This is a powered mike, which means that it can connect to Low-Z (eg: dynamic mike) or Hi-Z (eg: ceramic mike) amplifier and recorder inputs (recorder and amplifier not included). The UPSM/WM's bandwidth is audio plus far into the ultrasonic band (you can specify audio only or ultrasonic only). It has a special unique feature which sound-isolates about 90% of the mike tube from the mike itself so that sounds and noises which impinge on the tube's side are highly attenuated before reaching the mike, to minimize side audio pickup of spurious noise and mike positioning noise interferences, so that the received audio is much cleaner and clearer; plus it adds some flexibility to tube positioning. Last made $119 [1 lb].

The VERY FLAT & THIN SPIRAL ANTENNA: Unique and difficult to make/find thin, flat spiral antenna with many applications, including with three devices described above. We can do just about any flat, thin spiral antenna from dime-size to about 12" diameter size in any gauge of wire from 30-gauge to 10-gauge (26-gauge most common, the thicker the gauge the thicker the completed antenna), single-layer and multi-layer (multilayer has greater inductance but is also thicker), and copper or nichrome. Great not only for optimum antenna placement through thin slots, cracks, slits, orifices, openings and spaces in electronic equipment chassis and between PC boards for electronic diagnostic, electronic troubleshooting and electronic control purposes but also for medical, biomedical (eg: miniature Helmholtz coils, brainwave coils), biofeedback, remote control, electronic implants, magnetic field generation coils, small metal detector coils, magnetometer coils, communications antennas, surveillance antennas (eg: direction-finding antennas; and 'through-wall' type applications where the transmitter coil is on one side of a wall and the receiver coil is opposite on the other side), near-field TSCM monitoring, near-field TSCM monitoring, EM shields, works of art, jewelry, crafts, wall mountings, work mats, heating mats, coasters, conversational pieces, etc. We can also cover, coat, and/or mount the antenna using many different materials and fixtures. Last made $29 [1-2 lb] for a spiral antenna about the width and thickness of a credit card, about 400 microhenry.

The SLOT MACHINE MASTER (NA): Concerned about the vulnerabilities of slot machines? Are some unfairly "stuck" so that they seldom or never produce good payoffs? Are others "luckier"? Can certain output combinations predict future ones? The popular SMM transmits an RF signal that affects the outcome combinations of many slot machines. Now includes automatic scanning for all codes and a lock switch for locking into those codes that work for the machines of interest! The SMM is small and has an effective range of about 15 feet. Originally invented by a slot machine mechanic. The 2nd best word-of-mouth seller! Last made $595 [1 lb].

The VIDEO POKER MASTER (NA): Although its theory of operation and electronic design are much different than that of the SMM, the VPM functions similarly to the SMM but with respect to Video Poker Machines! Last made $599 [1 lb].

Introduction to this Page
Customized Devices Application Form (CDAF)

More NEAT SECURITY, SURVEILLANCE DEVICES:

The CHILD FINDER & BUMPER-BEEPER: Ever temporarily "lose" your child at a mall, park, etc.? You know what king of a gut-wrenching terror that is! The CF&BB can be secretly put in your child's pocket or pinned to clothing. You then monitor with a small FM radio widely commercially available. Any change in the signal will alert you to a change in his position. Now you can more easily find him should he wonder off or someone try to take him. The CF&BB is also great for wandering pets; wildlife studies; to monitor family members with bad problems; and to find cars (eg: your car gets stolen). The range of the CF&BB is up to about 0.5 miles. Comes with velcro for most attachments, and with magnets that quickly snap onto the bottom of the vehicle or other part. Transmitter only. Last made $295 [1 lb].

The ULTIMATE SURVIVALIST UNIVERSAL CLAMP MAKER MULTITOOL TOOL: The USUCMMT is designed for survivalists, preppers, travellers, hunters, fishermen, hikers, climbers, spelunkers/cavers, campers, boaters, ranchers, farmers, mechanics, engineers, technicians, crafters, EMTs, industrial workers, construction workers, and work site workers. When you are in an outdoor or remote location, for example a survival situation, especially for long periods of time, you will need to have and use clamps to clamp any number and types of things together from hoses and pipes, to bundles of wood, to tools, to mechanical parts, to electrical parts, to game, to injury braces, to broken equipment, to framing structures - you name it - virtually endless needs for clamps. Your clamping capability can even mean life or death in some situations for you and your loved ones. Your clamps must be tight - no leaks - strong, and secure, yet easily and efficiently applied and removed if needed. And preferably the clamps are re-usable, and will last and be tight for long time periods under various weather conditions, vibrations, and mechanical shocks.

One solution is to use plastic tie wraps, but problem is that the plastic tie wraps becomes brittle outdoors and over time, are often not strong enough, can't be tightened enough for all needs, and are seldom reusable. Another solution is to load up your vehicle or backpack with 100s of clamps of various sizes and shapes plus the various clamp tools they will require, but the problem is that for sure you are going to overlook a vital clamp function you needed to prepare for, even with 100 different clamp types and sizes you are not going to meet some of your outdoor clamping and indoor clamping needs, the amount of cost, space and weight required for 100s of clamps and various clamping tools would be enormous, you are likely to run out of some clamp types/sizes as it is nearly impossible to predict what clamps you will need days, weeks and months from now, and 100s of clamps and clamp tools would result in you not having space to bring other vital tools, equipment and supplies.

The USUCMMT is YOUR ONLY SOLUTION. The USUCMMT is a small steel tool, about 7" long and 1 lb - easily fits into your pocket, and is designed to make clamps as needed - on the fly tight clamps - of great range of sizes - virtually everything from about 1/2" minimum to 48+" (4+ feet) maximum diameter or thickness of mixed or matched sets of objects to be clamped that have virtually any crossectional shape. We have used our USUCMMTs here for decades - it is truly a very versatile and effective tool simple and easy to use and quickly applied - probably only second to a good Swiss knife type multitool as among the most important tools to take with you in your toolkit. For decades, our USUCMMTs have saved us $1000+ and countless trips to hardware and car parts stores. All that is required is the USUCMMT, a spool of wire (usually steel wire, but can also be brass wire, copper wire, aluminum wire, silver wire, gold wire), a cutter tool that will cut the wire (usually dikes), and a flexible tape measure. That's it!! The wire can be any diameter from about 1/32" to about 1/4" thick (maximum), and must be pliable yet strong enough to be formed into a clamp and can be used with the USUCMMT (we mostly use 1/10" dia wire). Wires can be bare or covered with insulation or coated, dry or wet. While almost all wires are round, the USUCMMT also works fine with many flat wires, square wires, oval wires, etc. Clampings can be made from fairly loose to very, very tight - your choice.

HOW THE USUCMMT WORKS:
          (1) You measure or compute the pre-clamp circumference (C) of the objects to be clamped together.
          (2) This wire will usually be wrapped doubled around the clamped objects (the USUCMMT will also work for single wires, but we found that clamping is much more strong, secure and leak-free under pressure if the wire is doubled). If you want one wrapping or layer of the doubled clamp wire, you cut off a length of wire of 2C + 8" (20.5cm). If you want 2 layers, you cut off a length of wire 4C + 8", for 3 layers, its 6C + 8". You can usually go up to about 4 layers, but in most cases you gain little more beyond 2 layers.
          (3) At the center of the wire, you bend the wire into a rounded "U" shape. Both free ends of the wire should be nearly even in length and parallel. For one layer, each free end will be about C + 4" long. This is your doubled wire.
          (4) You then wrap the doubled wire once (or twice for two layers) around the objects to be clamped together where you want to clamp them, starting with the "U" end. When you finish wrapping, tuck the wire free ends thru the "U" (each free end should now be about 4" long), then hand-pull each free end until the clamp is snug but not tight.
          (5) Then position the USUCMMT onto the clamp, and attach the wire free ends to the USUCMMT. Then turn the USUCMMTs large knob or wingnut to tighten the free ends to the desired tightness. The USUCMMT uses a screw action for uniformly tightening, which typically produces pulling force on the wire ends 10 - 100 times greater than that of using a pair of pliers - this very high and uniform strength is usually required for leak-free clamp tightness - major reason why pliers alone won't do this job, you require the USUCMMT.
          (6) Once tightened to your required level, push the USUCMMT forward to bend the wire free ends where they exit the "U" end to lock the clamp securely into place. Then remove the USUCMMT, and cut off excessive free end wire.

In a preppers / survivalist situation, if you are the guy or gal with the clamping tool and capabilities, you will certainly be highly valued by your group. Last made $695 [1 lb] for the popular 7" USUCMMT (4" last made $595; 10" last made $845), comes with illustrated User Manual, and comes in a case (eyeglasses case, which it fits nicely into; 10" version does not come with case). This sale is only for the USUCMMT, and its User Manual and case. Since many types of wires, wire cutters and tape measures are widely available in great varieties and relatively cheap, obtain those you need.

DATA CARD READER/SLAVE-WRITER: The DCRSW was designed so that you can simply, quickly, accurately, automatically copy the magnetic stripe data from any data card to any other! Great for producing high-quality copies! Unlike the typical "hacker" versions, our popular DCRSWs used professional Read and Write DATA Heads (NOT analog cassette heads that don't work for data!), professional data card slides, our proprietary ultra-low noise differential input/differential output instrumentation amp circuitry. And our DCRSW works for any combination of the standard 75 and 210 fci (flux changes/inch) data densities. User Manual included much info on reading and writing data card stripes. Works regardless of encryption scheme or data format used - even defeats magnetic "fingerprint"/signature security! 2-Track, Low-Coercivity Version, last made $1495 [2 lb]. 3-Track, High- & Low-Coercivity (HICO/LOCO) Version, last made $1995 [3 lb].

The DELUXO PANIC ALARM: For many people, not a day goes by without someone in your area being violently attacked in the workplace or home! Or if you live or work alone, you could get seriously injure or fall ill and no one is there to help! Acting immediately often saves lives and prevents rapes and robberies. Nothing does that better than a panic alarm. Manually dialing for help can take too long, while a pushbutton switch (PBS) can be placed closer to you than a phone, in a hidden place quickly, easily, and secretly activated! The DPA can give you full panic alarm protection! You can select any combination of built-in visual (flashing light) and audio buzzer alarm. In addition, the DPA has these built-in outputs (also all automatically activated) used in any combination you need: (1) +9 VDC. (2) Relay contact Close. (3) Relay Contact Open. (4) Speaker output - all to accommodate numerous types of external interfaces (eg: as a night alarm in motel rooms to detect someone trying to enter your room). PBS comes with extension cable, and can be mounted up to 9 ft. away from the DPA module, is protected from accidental activation, and requires only one finger to activate. Can be carried on you, or placed near you. Portable, last made $395 [1 lb]. For radio control between the button and the alarm master unit, range about 50 feet, add $100.

The ULTIMO RAT SQUEALER UNIVERSAL REPELLER: No person on Earth likes being attacked by feral rats! No matter how drunk or high on drugs. Great for warding off people who want to drink, do drugs, do vandalism, go to the bathroom, perform immoral acts, dump things, or engage in other unacceptable activities on your property. No matter how great the desire to home invade, burglarize, rape or rob. That old "reptilian" brain we all still have always kicks in the instant we hear a rat squeal. We designed the URSUR to automatically and randomly produce varying "rat squeal" type sounds to disrupt the loitering, trespassing, casing, snooping, surveillance, vandalism and other unwanted activities of those who threaten or endanger you, your family or property. The URSUR has many other uses, such as war and combat situations, where you are hiding yourself or something else (eg: weapons or supplies stash) in a room or other area, you hide the URSUR in a distant part of the room/area, usually behind but a bit offset from what you need to protect. When your enemy comes looking for you or your stuff, more than likely, they won't enter or they will quickly exit the room/area once they hear rat squeals coming from it. Or if they enter or stay in the room/area, they will be highly distracted and surprised with less risk. Can similarly be used to protect a property line, camp perimeter or home garden. Can also be used to more safely and non-lethally control the behavior of rats, rat predators (eg: bears, mountain lions, bobcats, coyotes, foxes, badgers, snakes, etc.) and rat prey (eg: mice, some birds, rabbits, some bugs, etc.), for example, to discourage unwanted cats and dogs, mice, birds, rabbits, skunks, raccoons, deer, etc. from plundering your crops or contaminating or destroying your property, or to attract possibly harmful predators away from your area. Also makes a great Halloween or haunted house feature. Can also be used to mark an area (while keeping unwanted people and animals out of it), trail or cave route you want to return to later. The URSUR can also be used to help protect your business during closed hours, your garage (vulnerable penetration point in many homes), your vehicle and your other property from invasions, burglaries, thefts and vandalism. May save you much fear from resorting to confrontations, violent attacks, retaliations, threats, lawsuits, police involvements, etc. - rats will be blamed and not likely you. Sounds are randomly generated. Sound volume level is adjustable. Built-in speaker. Electronically-synthesized sounds - no playback from a sound recorder. We can do a version where the URSUR is controlled by a proximity detector, sounding only when people/animals are near, similar to how porch lights work. We can also link its function with that of a public address (PA) system, and/or lights. The URSUR has the typical range of rat sounds - about a few dozen feet (since very loud rat sounds obviously do not come from rats, maximum sound output is designed to be realistic), so to cover a large area, you should contract for two or more. Last made $995 [3 lb] (price discount if you contract for more than one).

The ULTIMO MOSQUITO-SOUNDS / FLY-SOUNDS / BEE-SOUNDS REPELLER: No person and few animals on Earth can withstand the annoying buzzing sounds of mosquitos, gnats, flies or bees! No matter how drunk or high on drugs. Great for warding off people who want to drink, do drugs, sell drugs, sex traffic, do vandalism, business/home invade, rob, riot, go to the bathroom, loiter, camp on your property, stalk you, case your property, surveil you, snoop around, make loud sounds, smoke, dump things, or engage in other illegal and unacceptable activities on your property. Also wards off some animal and insect pests. In addition to being very annoying, mosquito/fly/gnat/bee sounds make some people swat the air around their heads - not a desired attention-getter for people up to no good. We designed the UMSFSBSR to automatically produce high-frequency buzzing sounds to disrupt nearby bad actions that may threaten or endanger you, your family, your neighbors, your employees, and your visitors or your property. Used to much more safely and non-lethally control behavior of dangerous people and annoying animals. Since the UMSFSBSR is high-frequency, it mostly affects children to middle-aged adults (because they usually have better high-pitch hearing than elders), and some animals and insects. Also makes a great Halloween or haunted house feature. And for riot control. Can also be used to mark an area (while keeping unwanted people and animals out of it), trail or cave route you want to return to later. The UMSFSBSR can also be used to help protect your home or business when you are not there, your garage (vulnerable penetration point in many homes), your vehicles and your other property from property crimes. May save you much fear from resorting to confrontations, violent attacks, retaliations, threats, lawsuits, police involvements, etc. - insects will be blamed and not likely you. We have done limited testing of the UMSFSBSR to test to see if it can be used to repel real mosquitos and flies, perhaps as an effective substitute for insect repellant chemicals. Largely depending on tuning, in some cases it repelled mosquitos and flies, in some cases it attracted them (which can be used to draw them away from your area), and in other cases, the effects were not clear or mixed (there is likely a species-related connection to effects, as well as tuning and volume), so if you use the UMSFSBSR to repel real mosquitos, flies, gnats, bees and/or other small pests, some experimentation may be done to optimize. Sounds are randomly generated. Sound volume level is adjustable. Built-in speaker. Electronically-synthesized sounds - no playback from a sound recorder. We can do a version where the UMSFSBSR is controlled by a proximity detector, sounding only when people/animals are near, similar to how porch lights work. We can also link its function with that of a public address (PA) system, and/or lights. We can also do versions that produce mouse squealing sounds, and spirit-like sounds. The UMSFSBSR has the typical range of mosquito/fly/gnat/bee sounds - about 20 feet (since very loud insect sounds obviously do not come from insects, maximum sound output is designed to be realistic), so to cover a large area, you should contract for several. Last made $995 [2 lb] (price discount if you contract for more than one).

The ULTIMO RANDOM CLICKER UNIVERSAL REPELLER: Random clicking sounds which sounds like camera shutters are very disconcerting to most loiterers and criminals with bad intentions. No matter how drunk or high on drugs. And no matter how great the desire to home invade, burglarize, rape or rob. Great for warding off people who want to drink, do drugs, do vandalism or engage in other illicit activities on your property. We designed the URCUR to automatically produce random, short-duration clicking sounds to disrupt the loitering, trespassing, casing, snooping, surveillance, vandalism and other unwanted activities of those who threaten or endanger you, your family or property. The URCUR can also be used to help protect your business during closed hours, your garage (vulnerable penetration point in many homes), your vehicle and your other property from invasions, burglaries, thefts and vandalism. May save you from resorting to confrontations, violence, retaliations, lawsuits, etc. Sound level is adjustable. Built-in speaker. Electronically-synthesized sounds - no tape/compact disk recorder. The URCUR has the typical range of camera shutter sounds - about two dozen feet (since very loud camera sounds obviously do not come from modern cameras, maximum sound output is designed to be realistic), so to cover a large area, you should contract for several. Last made $795 [2 lb].

The AUDIO & RANDOM ACTION CRIMINAL FOILER: Burglars, home invaders, rapists and child abductors are becoming increasingly sophisticated, brazen and brutal in their attacks! Many criminals today use sophisticated lockpicking equipment which they easily and anonymously obtain Online. While TV CSI program crime scene investigators routinely solve complex crimes in an hour's time, in the real world, unprocessed rape kits and burglary evidence pile up in many jurisdictions, and you can't even get a police officer to the crime scene - even for losses in the $1,000s and serious injury - unless you have surefire evidence of the perpetrators, such as a very unlikely positive ID or license plate number. Police departments are being increasingly stretched beyond their capabilities, due to budget squeezes and their dual roles of fighting crime and terrorism. And because of bulging jails and prisons and lenient judges, more and more dangerous criminals are not being sentenced to prison or are being released early. It is now not uncommon for burglars, home invaders, car thieves - even child molesters and rapists - to be free even after several felony convictions (eg: In Santa Fe, NM, some convicted felons are "sentenced" to Tai Chi classes; and recall that the "Railroad Killer" a few years back, Resindez, had earlier multiple convictions of felony crimes in northern New Mexico where he was apparently routinely released from jail and where convicted felons can sit on juries!).
           Fact is today people are being forced to protect themselves from home burglaries, business burglaries, home invasions, rapes and home child abductions. Now, the tired method of using timers to predictably turn lights/radios ON and OFF at preset times and durations is a sure give-away to sophisticated criminals that there is either no one present or everyone is asleep - ripe pickings for crime. The optimally effective alternative is our A&RACF, which produces both RANDOM and/or AUDIO activation of the electric power to lights, radios, TVs, tape/compact disk / digital recorders, etc in both onset times and durations. The A&RACF comes with an audio detector and amplifier circuit with gain tunable up to about 100,000, plus a random sequence generator circuit. Each or both features can be selected with toggle switches to activate a built-in outlet (110-120 VAC power) and/or other relay-controlled DC and/or contact closure output(s) (all customized features specified by the customer) to power your lights, radios, TVs, recorders, etc. The A&RACF also includes its special charge-accumulation circuitry that produces a random amount of duration times that the outlet stays activated for any audio or random-activated onset. For audio-activated, the ON duration is directly proportional to the intensity of the detected sound or noise - duration is greatest when the sound/noise is loud (eg: broken glass, gunshot, explosion, shouting) and/or prolonged (eg: nearby conversations). For random-activated, duration is directly proportional to the size of the generated random number. Furthermore, the A&RACF also comes with an amplified audio output and closure relay that can be wired to a recorder to record sounds (whether or not the random and/or audio-activated feature is selected) during those periods that adequate audio is being detected. Thus, the criminals casing your home or business are much less likely to know whether or not the building is occupied or there is someone alert in the building, nor when the next activation will occur or its duration, and they stand a much greater chance of getting caught if they do cause you problems (Note that while nothing can guarantee that a person or property won't be victimized by crime, we believe that the A&RACF will go a long way in foiling even sophisticated criminals).
           AC loads up to a total of 10 Amps are switched, so even several lights, radios, TVs, recorders, etc can be activated at once (no light, radio, TV, recorder or device, other than the A&RACF itself, are included; these device types usually come with 120VAC switching and no battery-operated versions are available for 120 VAC switching).
           The A&RACF is also great for controlling pests both large and small. Random and sound-based light-activations are very stressful for rodents (mice, rats, squirrels, raccoons, deer repellant), insects and spiders (arachnids) - light activations they cannot predict, time or get used to, so they tend to avoid and abandon those areas.
           The A&RACF with 120 VAC switching, last made $695 [3 lb]. With two independent pairs of 120VAC outlets - one for random-action control and one for audio-action control - the A&RACF-II, last made $845 [3 lb]. Two separate A&RACF device types built into the same box and using the same power, last made $1245 [5 lb]. Two separate A&RACF-II device types built into the same box and using the same power, last made $1595 [6 lb].

The ULTIMO WATER LEAK DETECTOR & WATER LEAK LOCATOR (UWLD&L-b) - WATER LEAK PINPOINTER + OTHER USES: Does your home or business have a possible water leak problem? Indications are usually high and escalating water bills, sounds of running water late at night when no one is up using water, unusual but usually sudden sounds coming out of the plumbing (eg: compressed air sounds, vibrations), loss of water pressure, air bubbles, soil, bugs, rust or root pieces in the water, creaky or settling sounds of the building, sticky doors that weren't sticky before, dampness, and/or cracks which suddenly appear in floors, walls, ceilings, foundation, driveway, one or more unexplained increases in your water usage, notification from your water provider that you usage is unexpectedly high, etc. Leaking pipes, joints, and fixtures and appliances are common these days, and many private and public properties all over America have serious water leaks, and not usually covered by home insurance. While in most homes and businesses, water pipes are routed under the floor, in many they may also be routed through the walls and even the attic crawl space. Leaking water can cause tremendous damages to structures - even catastrophic settling and cracking of the building or its foundation - which can cost you $1,000s and even $10,000s to repair - even destroy the building itself - not to mention wasting invaluable and ever-decreasing drinking water and very high water bills. Water leaks occur because of plumbing aging, vibrations and tremors (eg: heavy vehicle traffic (especially heavy vehicles like trains, trucks, buses), construction and industrial or military activities, road work or city sewer/water line work nearby or over the water line, and from earthquakes, flooding, nearby explosions, exposure of water line to hazards, sonic booms, avalanches and other earth movements, corrosive soils or water (eg: caliche), or simply through aging and/or poor materials and workmanship, etc.), defective materials, defective workmanship, corrosion, frozen and burst water lines or faucets, soil settlement, erosion, overpressurization from the city or other water utility company, hard water, and plant roots attracted by a small leak and making it into a bigger water leak or multiple leaks. We once experienced a serious water leak under our driveway caused by a pea-size stone pressed up against the water line - every time someone drove on the driveway, microvibrations rubbed the two together until a hole was rubbed into the line within a few years time.
           You can usually easily, quickly and at no-cost test your water system for water leaks: You turn OFF all water uses inside the building the best you can (watch out for leaky faucets, running toilets, icemaker, swamp cooler, etc.), you then look at the water meter and if it is still turning, in most cases you have a leak somewhere in your plumbing system which you should get repaired - and usually quickly. Usually, the faster the meter turns, the greater the leak and the emergency to repair it. Even a moderate leak dozens of feet from a building can structurally damage the building. Small leaks can turn into major leaks and floods within minutes or a few hours, or within days, weeks and months - depending on many factors. However, while the turn-OFF test will tell you that you likely have a water leak somewhere on your side of the water meter, it won't tell you exactly where the leak is at in typically complex business and home plumbing systems, so you are faced with either finding the specific location of the leak within a few feet using special leak-finding equipment (preferably using this our UWLD&L-b device), or tearing up most or all of your yard or driveway where the water line passes under to frantically locate the water leak in the old-fashioned greatly laborious, expensive and time-consuming brute-force way - often at $1,000s in expenses for brute force searches for water leaks and to fill-in and restore all what the diggers dug up. Since locating the water leak usually requires fast action on your part, it is far cheaper to have the UWLD&L-b device on hand, rather than finding yourself forced into having most or all of your entire yard or driveway dug up and then refilled. Once you use the UWLD&L-b device to help pinpoint your leak location, of course if you can't do the plumbing work yourself, then seriously consider having a professional plumber to do the job for you.
           Municipalities almost never check for water leaks on private property (local plumbers don't like the competition), and some don't even have water leak locator equipment to pinpoint their own municipal water leaks as evidence by the large stretches of streets often dug up to locate and repair water leaks. Many small town and rural area plumbers do not carry water leak locator equipment - only equipment to test water lines in general - they can usually determine what water line the leak is in but not exactly where it is in that line, which may be dozens - even 100s of feet long. Plumbers who do carry water leak locators typically charge $200 - $300 to do this job EACH TIME they test your water lines, it can take days for them to come out and test your water lines - even in emergency situations - and then you have to depend upon them to accurately tell you the location of the water leak. And some plumbers will charge a double charge if they detect a leak in your system but you don't hire them (at great additional expense) to do the plumbing repairs - even if they can't pinpoint your leak. We could find no plumbers or equipment rental shops in a city of 500,000+ who would rent their leak detectors to us or let us verify the leak ourselves using their leak detection equipment. Some plumbers subcontract out for water leak detectors at your added expense - worse, often resulting in multiple finger-pointing contractors. Since plumbers charge far more for tearing up your entire yard and/or home or business and replacing an entire line or large line section rather than pinpointing the leak and replacing only that very small part of the plumbing with the leak, crooked plumbers will still claim that they can't pinpoint the water leak using their water leak locator equipment, so you end up not only paying for the entire job but also their expensive leak testing efforts. Plumbers charge a lot, but on top of that, they usually do not restore the site they damaged to reach the plumbing - some won't even clean up their debris - all that is left to the owners, which is often also very costly, back-breaking and time-consuming work. Also, if you can pinpoint your leak and do a spot repair of it, you can avoid the scarring of a much larger area resulting if the leak is not pinpointed and the entire line must be replaced, which gross repair can substantially reduce the value of your property and exaggerate to prospective buyers and renters how bad your leak situation was. The cost for a plumber to replace your entire yard line and/or building line and for you to clean up the debris and restore the site can cost you many $1,000s. However, by pinpointing the leak by using the UWLD&L-b and just repairing the leak, your costs are usually a few $100s, often less. Detecting leaks is one vital area of life where if you don't want the job to put you in the poor house, you often must do the job yourself!
           If you are a renter, don't think that you don't need to report leaks to your landlords. Failure to report leaks can result in you being sued, losing damage deposit money, evicted AND forced to look for a new home, not to mention that many renters these days pay their own water bills, and also the great waste of drinking water. Also, the costs to landlords to repair leaks plus the resulting damages due to late reporting, one way or the other, the renter ends up paying for - usually with higher rents - so smart renters do their due diligence and promptly report leaks to their landlords, and perhaps ask them to consider the UWLD&L-b to save them - subsequently you - considerable expenses. If you are an owner or landlord, you definitely MUST have the UWLD&L-b on hand to immediately address all suspected leak situations.
           The 41.5" long UWLD&L-b is simple and easy to use. The UWLD&L-b is a system which is used mostly in earthen areas over or near water lines to detect and pinpoint the most likely locations of water leaks. The UWLD&L-b is simple and fast to operate; it has two pointed parallel probes at the end, which you push into the earth along the water line path, usually to a depth of 2" - 10" (depending on depth of water line, soil hardness and rocks in the soil). The UWLD&L-b detects and measures the resistance between the probes, using the provided digital multimeter, which you simply plug the UWLD&L-b into. If the soil resistance between the probes drop, then the soil is more conductive at that spot. Because soil conductivity is affected by how wet the soil is, resistance dips almost always point to water leak origins. For use in hard surface areas (eg: paved areas, such as concrete slabs, asphalt) non-accessible through soil, you drill pairs of small holes into the pavement (drills and bits not included) to insert the probes. The provided User Manual describes how to operate the UWLD&L-b in the most labor-saving and efficient way to quickly zero in on water leaks learned from many tests. Note that while the probes are 11" long, you can detect water leaks as deep as about 4 feet (many soils) because when water leaks into soil it tends to percolate upward often to substantial distances due to the pull of the sun on the surface moisture and water cohesion force (you can verify this by placing one end of a vertical dry towel in a bowl of water and watch the water percolate up the towel), as well as percolate laterally outward and downward (in addition, if the leak is in the form of a spray, the water can be forced to shoot dozens of feet in the soil).
           We are selling several of these UWLD&L-b devices. They are all handmade with minor variations between them, so the one you get may not be the exact one in the images (eg: the meter in image comes in yellow and red color).
           The UWLD&L-b is not limited to finding water leaks in fresh water lines, but can also be used to find leaks in swimming pools, sprinkler systems, irrigation systems, water pumps, valves, faucets, sewer systems, septic systems, fire hydrants, and water storage tanks - works well with virtually every type of underground water situation as long as some of its wetness is close enough to the surface to touch the probe points. For sewer line leaks and septic tank line leaks, the UWLD&L-b should also help you find areas where roots have invaded your sewer line or septic line.
           The UWLD&L-b has other possible non-leak uses: For examples, it can be used to detect possible sources of shallow underground water sources, and to detect buried metal objects ranging from metal pipes to buried coins, jewelry and treasures, and conductive minerals - even underground gold nuggets, gold veins and gold-rich soils. When resistance plunges for relatively short movements of the probes or to near zero ohms resistance, it often indicates close proximity to or contact with a metal object or conductive mineral (while great in conjunction with a metal detector, the UWLD&L-b can work well in areas where metal detectors don't do well). When used with a voltage source instead of the multimeter (voltage source not provided), which may be as simple as a single battery connected to it, the UWLD&L-b can be used to stimulate plant roots, and even to electrically stimulate earthworms to surface for gardening and fishing uses. The UWLD&L-b can also be used to puncture the ground to aerate the soil, to quickly pick up trash blown onto your yard and plants, to pick high fruit from trees, to gig fish, and even to ward off feral animals. You can also use the UWLD&L-b to test for soil wetness for gardening and agriculture purposes to determine how well and uniform your irrigation system is providing water for your plants, your fishing worm bed, etc., to help you determine when, how often and how much to water. Also, the the small test lead probes which are included with the digital meter are also pointed and work well for testing soil wetness of potted plants and in small or confined garden areas.
           The UWLD&L-b has so many important uses that everyone should keep one handy. And since leaks can occur at any time and are usually near-emergency and sometimes emergency situations, you really need to have a UWLD&L-b right on hand so that you can immediately address suspected leaks. Last made, $395 [10 lb].
           Note: Since we do not have control over your soil and leak conditions (both of which can be highly variable and complex situations) nor how you will use this device, we cannot guarantee the UWLD&L-b will pinpoint your water leaks, and we assume no liability for false positives, false negatives, locating or failure to locate a water leak that caused or will cause damages, failure to identify the exact location of a water leak, or for anything else related to your use or abuse of the UWLD&L-b device or your leak problems. Also, the UWLD&L-b detects only water leaks (not tested or approved for non-water leaks) that wets soil. Also, we are not licensed plumbers, so we don't provide plumbing services, claims, advice or opinions.
           HYPERSENSITIVE SOUND ALARM (HSA): Another very effective way to detect and locate water leaks (hydrophone) (plus non-water leaks: Air leaks, gas leaks, fuel leaks, chemical leaks, etc.), is by using The Hypersensitive Sound Alarm (which also has many other critical uses ranging from detecting people trapped in cave-ins and collapsed mines, buildings, tunnels, ditches, wells, avalanches, landslides, etc. (active earthquake zones, mining areas, avalanche areas, tsunami areas, war zones, terrorist target areas), hidden pest infestations, unknown and strange sounds, animal studies, home security / burglar alarm system, seismic activity, etc.). The HSA produces a highly amplified audio output and a sound alert output, and is described on our audio.htm webpage. Water leaks and other leaks under pressure usually make spurting, spraying, gurgling or PSSS-type sounds; such low-intensity underground sounds usually cannot be heard by the naked ear - especially when the sounds are faint and your ears are 5+ feet off the ground. Since both soil conductivities and the conduction of sounds in the earth widely vary due to many soil and water leak factors, one device may work better than the other, and ideally one would use both devices for detecting and pinpointing water leaks or underground water sources.

NOTE #1: The UWLD&L-b differs from the UWLD&L (previous model) because of its 4 major functional improvements: (1) Metal body construction of the tube to make it stronger. (2) Handle for easier pushing, and for carrying, hanging and storing the device. (3) Foot extension (foot pedal) for easier pushing. (4) Greater overall length for greater comfort, especially for taller people (about 41.5" vs 36").

NOTE #2: Gold carpenter's level shown on left and HSA are not included. The probe ends are very sharply pointed. Be very careful when using tool to not injure or damage anyone or anything. Safety shoes, leather gloves, and protective eyewear and head wear are highly recommended. The foot extension should only be used if the soil is particularly tough to penetrate and a probe is not stopped by a rock or other hard object. Be careful when using tool so you don't lose your balance and fall. If you use tool to penetrate into a sticky soil, such as clay soil, don't go too deep and slowly work the probes out without bending, jerking or twisting them.

The DWELLING SECURITY SYSTEM: We live in increasingly dangerous and brutal times! Whether you own, reside in or work in a single-family house or mobile home, apartment, motel/hotel, dorm, RV, cabin or tent, securing your dwelling (and business) against unauthorized access protects you and your loved ones from home invasion, burglary, robbery, vandalism, arson, assault, rape and even murder! Motels/hotels are especially unsafe - the DSS is your ideal travel companion! The DSS instantly detects, alarms and alerts you to anyone roughly tampering with your home, business, building site, doors, windows, walls, ceilings, floors, shop, laboratory, garage, barn, hangar, basement, attic, safe room, safes, vaults, lock boxes, security boxes, vending machines, vehicles, trailers, planes, boats, motorcycles, bicycles, tool boxes, sheds, storage units, storage areas, machines, tools, shop equipment, farm equipment, industrial equipment and other equipment, and materials, from vibrations caused by rough short-duration handling, banging, jiggling, explosions, shootings, hammering, chiseling, drilling, grinding, cutting into, pry bar attacks, chopping, tire jacking, stepping on, and glass breaking. The DSS also detects long duration, small amplitude signals typical of torches, thermic lances, and smaller drills, grinders and cutting disks).

Tilt is detected as a change of position from ANY initial position (the DSS is smart). Alarm activation time is adjustable from about 2 sec. to 2 min. (with manual + auto resets). The DSS is versatile, and power-stingy. And the DSS can be used for any other activity in which Tilt, Touch or Continuity detection is needed, such as part of an electronic game. Last made $595 [4 lb].

The FLASH BLASTER: Concerned about personal security but don't want to use a gun to prevent attack or property invasion? Bothered by pests but don't want to use poisons or traps on them? The FB flashes simultaneously up to 4 photo flash units by manual switch, on a timed periodic basis or randomly. The FB works on these principles:

The FB came enabled for 4 outputs and includes one photoflash unit. Last made $395 [2 lb]. Each additional flash, last made $35 [1 lb].

The LONG-RANGE EAVESDROPPER: The LRE is a highly directional, long-range audio surveillance device -great for all you "animal watchers"! We invented some very unique technology that makes the LRE exceptionally directional and sensitive (comparable to parabolic mikes), and unlike any current similar device. Built into a common portable object, you can secretly eavesdrop on low-level audio targets up to 50 feet away. Last made $395 [3 lb].

The TOP SECRET EYE SPY: This is the ultimate device for secret home and office video observation! Worried about how your child got all of those black and blue marks? Is your spouse being "naughty"? Are your employees trustworthy? Interested in secrets? The hidden Eye Spy is hard to detect. The Eye Spy is a complete high-quality video camera system about the size of a golf ball that produces a sharp and focused image that is recorded directly by your VCR or displayed on a TV monitor (neither supplied), or both simultaneously. Includes all cabling for direct VCR plug-in. In a hurry? For instant use, order our Eye Spy hidden into a beautiful decorative sports car replica. Can sit on a shelf and record anything in the room without being detected. Basic unit last made $399 [1 lb]. Hidden into an object you supply, last made $499 [1+ lb] (describe object ahead of time).

The UNIVERSAL GARAGE DOOR & SECURITY GATE OPENER (NA): Lost your garage door/security gate opener? Need another one? Need to open more than one? This nifty device will automatically scan all of the 1000s of possible codes used by many garage and security gates quickly. Last made $299 [1 lb].

Analog & Digital VOICE CHANGERs/DISGUISERs: Effective against threats of violent crime caused by strangers, disgruntled mates, stalkers, crackpots, etc, and against bill collectors who harass and prey upon vulnerable people. Analog Voice Changers/Disguisers smoothly amplify certain parts of the voice bandwidth while smoothly attenuating other parts without changing voice pitch or voice formant (as opposed to the inexpensive commercial digital models which make your voice sound electronic, artificial, robotic, and like a chipmunk). Each VC model comes with a high-quality mike, easily attached to the phone's handset. If you have a soft and/or high-pitched voice, the Low-Pitched VC converts it into a loud, gruff, low-pitched voice (with little loss of clarity) that quickly impresses the caller that there is a man in the house. If your voice is too-low pitched or gruff, the High-pitched VC will serve your needs. The Hi-Lo Programmable VC should help in either case, and is the most versatile unit. (Note: Not recommended for monotonic voices because their frequency content is too limited for much analog filter manipulation of the voice). The LO-PITCHED VC last made $95. The HI-PITCHED VC last made $125. The HI-LO PROGRAMMABLE VC last made $195. The NASA VERSION VC last made $155 (invented by NASA but improved by us; excellent voice clarity; male/female switch). Each [1 lb]. We can also do natural-sounding high quality Digital Voice Changers/Disguisers, which can be specified to provide much more versatility (eg: voice rate/pitch changes, delay, echo, digital recording/playback, digital editing, mixing, triggered playbacks (eg: door/phone greetings, burglar alarms), and/or subliminal integration). Started at $395.

The WILLIAMS's VAN ECK SYSTEM: The incredible WVES lets you remotely monitor TV and computer monitor video displays (from their EM emanations) using a TV or multisync monitor and the very special SYNREST device. Range up to about 1 KM. Just imagine all of the fascinating activities others are having on computers and TVs! You were missing all of the fun and PROFIT-until now!

The UNIVERSAL VAN ECK TEMPEST JAMMER: If you are using a TV or computer monitor that emanates enough electromagnetic "noise" to where your display can be externally captured and reproduced by a Van Eck receiver, then you are vulnerable to Van Eck Tempest spying. The UVETJ is designed to interfere with this intelligent "noise" from any monitor subject to Van Eck spying. This includes TV, multisync, EGA, VGA, SVGA, XGA, WXGA, MDA, CGA, RS170, RS343, Mac, Sun/SGI, etc monitors by jamming horizontal scan components with random noise thereby scrambling the Van Eck-received image (horizontal scan rates of 15 KHz - 130 KHz). The ideal Van Eck jammer! Last made $1295 [2 lb]. (Note: Not all monitors emanate enough EM "noise" for known Van Eck Tempest systems to effectively monitor from a distance; the full capabilities of most Van Eck systems are unknown to us as most are done as highly classified Black Project type equipment; this device-type usually has little or no effect on the monitor it is protecting but only on a Van Eck receiver display; while this device type produces the appropriate random noise field within the 15KHz - 130 KHz bandwidth, it has not been tested on every monitor type or variation above, every monitor setting, every monitor configuration, or with every known Van Eck Tempest system; our RF policies apply).

WIRING HITCHHIKING HARASSER ELIMINATORS: Are your home/business wiring, piping, etc. or even car wiring hijacked to electronically harass or surveil you by hitchhiking signals onto them? Because power and telephone lines, and metal pipe (eg: plumbing), metal tubing (eg: wire shielding) and metal linear structures (eg: rebar, girders, conduit, trim, rails, fencing) surround you virtually everywhere you go in any building, electronic surveillance devices, equipment control devices, mind control devices and electronic attack devices can be connected to them in virtually every room and even outside the building for some distances - these omnipresent conductors serve as the optimum means to connect up, transmit and distribute these very harmful electronic surveillance, mind control and electronic attack signals throughout the building (sometimes called "carrier current" attacks - carrier currents caused by carrier current transmitters) - optimum conductors for virtually endless varieties of bugs, taps, harassment, control and line blaster devices. Our WHHE devices both test and filter out harmful hitchhiking signals!
       Since these conductors are so prevalent in virtually every building, added with the technologies of time multiplexing signals and frequency multiplexing signals, literally dozens - even 100s - of these types of very harmful signals can be operational on any day and night against you - usually no matter what rooms you are in. Your home or business is just several huge signal distribution networks plus transmitting and receiving antenna arrays. And all such wiring, piping, etc. can usually be just as easily abused for electronic surveillance, mind control and electronic attacks even if you turn OFF or disconnect them from their normal uses (eg: turning Off AC power, disconnecting phones). This is nothing new - both power and phone wiring have been lawfully used for decades to carry high-band voice, control signals, and data (eg: faxes, modems, DSL, zons, intercoms, alarm systems for phone lines, and intercoms and alarm systems for power lines) - proven technologies using common household AC wiring and phone wiring. Furthermore, because generic power and phone wiring and piping in all or part of one's home and business are often unshielded, they can be both easily accessed and connected up to AND used as a huge transmitting and/or receiving radio antennas to communicate with anything from electronic implants - to guys parked in the street - to cellphone towers down the road - to control centers 100s miles away - to ships at sea - to satellites - to electronically harass, control and/or interfere with your life! For examples: (1) Signals on them can be transmitted wireless for miles, and (2) Physical access to the wiring, piping, etc. is not even required; because the wiring, piping, etc. is unshielded, signals can often be inductively coupled into or out of power lines, phone lines, piping, etc. (eg: inductively-coupled phone line taps are decades old technology). Offending microwave signals can also be reflected off of ungrounded or not fully grounded metal bodies.
       Since these virtually endless varieties of bugs, taps, harassment, control and line blaster devices can take on virtually any appearance and/or be hidden in just about anything inside of or near your building, they can be very difficult to detect through physical searches (short of tearing down all of your walls and ceilings where the lines and piping run, and disassembling all of your equipment). For example, these devices can be easily concealed inside TVs, radios, computers, cellphones, landline phones, electronic handheld devices, etc. - fully operating even when the TV, radio, phone, etc. itself is not turned ON. Or hidden in an outlet, inside of your wall or in your attic - even inside your car. If you share walls, floors or ceilings with other apartments, the devices can be on their side, or even outside your building. Since not all of these harmful devices are RF devices, the non-RF ones cannot be detected using TSCM field strength testing used for wireless systems. Nor can strictly receiving devices be TSCM-detected. And usually nor can transmitting devices which transmit in bursts, randomly or pre-dawn hours, nor when the perpetrator believes the area is being electronically swept and turns Off transmitters until the TSCM crew leaves. In short, your phone and power wiring, piping, etc. can be easily and secretly tapped into using hardwired, inductive-coupling and/or reflection techniques just about any place they are routed internal or external to your home/business. To understand just how frustrating it is even for experts to really troubleshoot an area, rent the Gene Hackman movie, "The Conversation" - and that was early 1970s' relatively crude, clunky and huge electronic surveillance systems!
       The high-band signal frequencies used on power and phone lines, piping, etc. (which can be time multiplexed and/or frequency multiplexed to support several such systems) are usually 5+ times higher than the standard 60 Hz / 50 Hz (power wiring) or 3200 Hz maximum (phone wiring) bandwidth normally used on them. The usable bandwidth of many power and phone lines exceed 2 MHz for loops up to about 6,000 ft (1.14 miles) and much higher over much shorter loops - very usable for electronic surveillance, mind control and electronic attack. Metal piping, tubing, fencing, rails and other structures can conduct signals far higher in frequency than even power and phone lines (because most power and phone lines, pipes, etc. are unshielded, electrically noisy and inductive and leaky to high freqs, most high-band signals are under 200 KHz). Loading these unshielded conductors with all kinds of multiplexed and high-band signals they were not designed for may cause the wiring, piping, etc. itself and their terminations to resonate with strange sounds and noises which seem to emanate from walls and ceilings often on quasi-random and directional bases (eg: strange sounds you can hear when standing in one position but not in another nearby position, and/or at some times and not at other times, and/or during certain conditions of humidity and/or temperature but not at other conditions), often throughout most of a building, and often similar to the vibrating and humming of an old or defective power transformer. They can also vibrate and hum in the ultrasonic and infrasonic bandwidths when signals mix and produce sum and difference frequency components. The weird sounds can also sound like a distant motor running, distant voices, whispering and mumbling, spiritual and God-like voices, high-pitched voices, low-pitched voices, chattering, music, animal sounds, whistles, echoes, pulsing, pounding, popping, finger-snapping, digital data sounds, zinging sounds, whooshing sounds, theremin sounds, etc., especially when real time complex signal mixings of possibly several signals at once result in partially demodulated and/or multiply-mixed high-band signals. These weird noises can literally drive some people nuts! If you are hearing sounds, noises or even voices or digital data signals or control signals coming from your walls, ceilings or appliances or inappropriately while you are on the phone, you may not be imagining it. Also, high frequencies imposed on power wiring can adversely affect induction motors (especially compressor motors common to refrigerators, freezers and air conditioners), causing them to operate roughly, chatter noisily and possibly stall out (because induction motor speed is proportional to the frequency of its power source, multiple frequencies can harm them), and can cause lights to vary in intensity or flicker. Modulated high frequencies on phone lines can cause malfunction of phone and computer equipment (eg: loss of broadband sync, inability or slowdown in using DSL or even dial-up, faxes, zons, etc. because of a "noisy line").
       We offer 4 types of WHHE systems to test for and protect against offending EMF signals: (1) The WHHE1 is for AC power lines, (2) The WHHE2 is for phone lines, (3) The WHHE3 is for motor vehicle wiring, and (4) The WHHE4 is for non-electrical metal structures, such as pipes, tubes, appliances, fencing, rails and other metal structures, and unpowered wiring. For minimal recommended protection, you must typically have at least one of each WHHE type. For optimal and continuous protection, you must have two WHHE1 (one for each 120VAC power leg), one WHHE2 for each landline phone line, one WHHE3 for each vehicle, and one WHHE4 for each non-electrical ungrounded or improperly grounded metal structure within about 25 yards of you.
       The WHHE1 is designed to plug directly into any 120 VAC wall outlet (3-wire or 2-wire, 60 Hz or 50 Hz) located virtually anywhere to both detect and eliminate these higher frequencies on your AC power wiring (and to also cause an improvement in your power factor if it is typically inductive or lagging power factor (PF)) (Note: If you have an intercom, digital or other communications system which uses home/business electric power wiring to transmit/receive signals, the WHHE1 will also filter out those signals if used at same time). For example, voice, data signals, and/or control signals at 10 KHz, 50 KHz, 90 KHz, ..., 1890 KHz, 1930 KHz and 1970 KHz could all be frequency multiplexed onto a single 60 Hz power line simultaneously. That is, as long as a WHHE1 is not connected, because the WHHE1 wipes out all frequencies much above 60 Hz - wiping out those electronic attack and electronic surveillance high-band signals in one fell swoop! You may specify the WHHE1 to be non-battery powered (used only on powered AC lines to also power it), or battery-powered (used on both powered and unpowered AC lines). Note that the WHHE1's filtering functions cannot be duplicated using commercial power strips with built-in transient suppression. Power strips with transient suppression only filter out transients which are both high-voltage AND high-frequency, and then only for those devices connected to the power strip - not the VAC power lines connected to your AC outlets and located behind your walls in your home or business. Only the WHHE1 can filter out unwanted signals at your outlets and home/business wiring (as well as devices plugged into power strips). Even for devices plugged into transient-protected power strips, the designed protection is for transients which are both high-voltage AND high-frequency - much less effective against hitchhiking voice, control and data signals (which usually result in small RMS voltage level increases way below voltage levels required to switch in transient suppression).
             TEST: There is a test that will likely result in positive indication of hitchhiked signals on your AC power lines, but test requires about 2 months to complete: Obtain 3 same make and model plug-in digital clocks (not battery-powered clocks), and place them in widely-separated rooms but on the same 120VAC leg. Synchronize each clock to your cellphone or other battery-operated super accurate time source. At the end of one month, check the times on each of your 3 clocks against the device you synchronized them with. Most of these types of clocks are timed by the frequency of your AC line voltage (60 Hz in the US, 50 Hz many other places). However, with most of them, the timing is also advanced by signals and electrical noise interference on your line to various degrees based on their specific electronic designs and interference properties. If there is much communications or control signals on the line, the clocks will run faster than normal. Therefore, if at the end of the month, any of your clocks are more than a couple of minutes fast, more than likely, you have a serious problem with hitchhiked signals on your line for which we strongly recommend the WHHE1 to countermeasure. Since the electrical noise on most AC lines typically rarely reaches levels that would advance most clock timing, normally, noise by itself would contribute to about a minute or two at most in one month's time to advancing timing. If any of your clocks run too slowly, the clock is probably defective. And which clock has advanced the greatest is usually the clock closest to the hitchhiking signal input point where it gets the strongest signal. Then run this test again, with all of the clocks on the other AC leg. Note: This test is not proof of either the existence or absence of hitchhiking signals during the test month because of clock defects and nominal electronic differences; clock timing may use crystals and not line frequency; low intensity, very high frequency, and/or low duty cycle (eg: burst signals, infrequent or occasional attacks) hitchhiking signals that don't significantly increment clock timing; very noisy line, etc., but it often is a very good indication.
       The WHHE2 is designed to plug directly into any normal landline phone line in the building, and works whether the phone is On Hook or Off Hook to eliminate higher frequencies on your phone wiring (Note: If you use DSL, modem or other digital phone line communications system, those signals will also be filtered out if used at same time). We offer 3 versions of the WHHE2: (1) WHHE2-HB: The High-Band (HB) version (the default version if you don't specify) filters out phone line freqs starting at about 4000 Hz and above. While the HB will filter out all signals at all times when toggled ON much above the normal phone voice BW of 300-3200 Hz, it will not filter out normal speech signals in the voice BW, resulting in possible but very unlikely unauthorized voice-band transmissions when phone is on-hook. (2) WHHE2-LB: The Low-Band (LB) version filters out phone line freqs starting at about 50 Hz and above. While the LB filters out voice and data signals at all times when toggled ON, it must be turned OFF when you need to talk on the phone or use it to transmit data or it will also filter out your and the other party's voices. Note that the LB version may negatively impact ring with some phones. (3) WHEE2-CMP: The Composite (CMP) version allows you to toggle between the HB and LB versions for maximum security - when you are talking on the phone, you set it at HB, when you are sending data online, you turn OFF both HB and LB, and when phone is on-hook, you set it at LB. The WHHE2 uses the common standard RJ-11 phone connector. The WHH2 always comes battery-powered.
       The WHHE3 is designed for 12VDC battery systems (eg: vehicle battery wiring) because car battery wiring can also be - some say often - used to conduct unwanted and harmful signals which can be used for electronic surveillance, mind control and electronic attack. You can specify whether you want its cable to have cigarette lighter, battery clamp or other type of terminating connector you specify (Note: Any and all vehicle underhood connection work must be done by your automechanic at your expense and always in a legal and safe manner, and we assume no liability for the installation, removal and use of a WHHE3 device on any vehicle). You may specify the WHHE3 to be non-battery powered (used only on powered 12VDC lines to also power it), or battery-powered (used on both powered and unpowered 12VDC lines).
       The WHHE4 is designed to test and protect unpowered wiring, metal piping, metal tubing, metal fencing, metal railing, metal structures, and other unpowered conductors up to about 25 feet long by testing for and filtering out signal types they carry above 60 Hz. These include offending signals hardwired or induced onto metal structures, and to some extent, reflected signals. Protecting against reflected signals is designed to protect you from perps transmitting RF signals at unprotected reflective surfaces near you for its scattering effects or angular advantages, which then reflect onto you to do their dirty work; the WHHE4 grounds out air-transmitted offending RF signals it protects in your area. The WHHE4 can test and filter out great varieties of conductors which do or do not have known or accessible signal return paths (WHHE1, WHHE2 and WHHE3 test and protect circuits which have electrical return paths paired with them, eg: AC power line neutral, phone Ring wire, car battery ground). The WHHE4 comes with two cables, each about 12.5 feet long, and each terminated by alligator clips (or some other type of connector you specify). One cable is connected to the unpowered metal wiring, piping, tubing, fencing, structure, etc. If this metal is accompanied by an accessible metal electrical return path (eg: wire, piping, tubing, fencing, structure, etc.), the other cable is connected to it, else it is connected to nearby grounded metal, in which case an earth ground rod may be required (earth ground rod not provided, available in hardware stores). The WHH4 always comes battery-powered. Note: Not all plumbing or tubing (or fencing or structures) is continuous metal all the way into a good earth ground. Sometimes plastic plumbing or standoffs are used, which breaks any ground connection. Even if the plumbing pipe is continuous metal all the way to where buried in earth, pipe joints can be corroded enough or use enough teflon tape to break the electrical connection, the pipe can be laid in dry ground or concrete, and/or the pipe itself can be corroded enough to break its ground connection. In fact, plumbing pipe is never a reliable earth ground. National Electrical Code: 'True earth ground physically consists of a conductive rod or pipe driven into the earth to a minimum depth of 8 feet.' Plumbing pipe is never "driven into the earth" and plumbing, tubing, fencing and structures are seldom buried at least 8 feet deep. If unpowered metal is not itself solidly grounded to earth (easily determined) - not just wet-season or intermittently grounded - it makes a great conductor for offending electronic signals.
       Each WHHE device comes with a signal indicator LED and the DETECT/PROTECT toggle switch. One toggled position is the DETECT Mode in which the LED will flicker and/or brighten if there is a high-band signal on the line, piping, etc. The other toggled position is the PROTECT Mode which will filter out all types of high-band signals, transients and line noise interference hitchhiking signals to remove them from your line, piping, etc. The DETECT Mode continuously tests your conductor to determine if there is any unusual signal or other electrical activity on it. The toggle switch is especially protected with a snubber circuit designed to prevent contact arcing during switches. If the WHHE device conflicts with some other known and OK equipment or function connected to your wiring in the PROTECT Mode, then don't operate that WHHE in its PROTECT Mode when normally using such equipment or function (no known interferences in the DETECT Mode).
       EXTRA PROTECTION: WHHE devices are designed to further protect your lines from possibly destructive high-voltage pulses, transients and line noise which can sometimes also occur, whether natural or manmade (eg: helps protect you from a perpetrator trying to wreck your phone or power system - even your computer - using a phone or power line blaster to deliver high-voltage transients, pulses and electrical noise to your system and equipment; and helps protect lines and equipment against damage caused by nearby lightning strike or transients, pulses and line noise). (Note that while electronic filters may eliminate 99.9+% of a signal - so much of the signal that the tiny remaining signal is lost in the line noise - no electronic filter wipes out absolutely 100% of a signal; always experiment with WHHE device first to make sure that it does not interfere with the normal use of your lines and equipment.). This very substantial added transient protection feature includes a gas discharge lightning arrestor (surge arrestor - not normally found even in expensive transient-suppressed power strips), a MOV (varistor), and the filter capacitor itself - all of which adds substantial protection from lightning strikes, line blasters, and powerful pulsed mind control and electronic attack devices hitchhiked onto your lines, piping, etc.
         Plus, if specified, WHHE devices come with an output connector which permits you to directly view hitchhiking signals on an oscilloscope or hear them on a speaker or earphones (if signal is in the audio band; oscilloscope, speaker and earphones are not included). By being able to observe and/or hear the signals which should not be on your line, piping, etc., you can often tell exactly what is being communicated or controlled, and correlate the hitchhiking signals with conversations, other activities, and unexplained manifestations.
       Note that since most home and office electric power systems are 220-240 VAC and standard outlet wiring is 110-120 VAC, there are two isolated AC power "legs" that power the various 110-120 VAC outlets and functions throughout the building. Therefore, to simultaneously and continuously DETECT and PROTECT both AC power legs, you need two WHHE1 devices. Also note that if your landline phone system has more than one phone line, each phone line is isolated from each other, so therefore to simultaneously and continuously DETECT and PROTECT all phone lines, you need a WHHE2 for each and every phone line. All WHHE device-types are small, portable, easy to use, uses standard connectors, and the WHHE2 and WHHE4 are 9VDC battery-powered (WHHE1 and WHHE3 operate off of their power line voltages but we can also make them to operate off of 9VDC battery to also test unpowered 120VAC power lines (WHHE1) and car battery wiring (WHHE3)). CAUTION: Do not use any WHHE device in the PROTECT Mode to do a denial-of-service attack against anyone legitimately using a phone system or power line for some normal high-band activity, for example, by interfering with or defeating DSL, modems, faxes, zons, intercoms, alarm systems, etc.
       Non battery-powered WHHE1, WHHE3. Last made $395 [1 lb] each.
       Battery-powered WHHE1, WHHE2-HB, WHHE2-LB, WHHE3. Last made $445 [1 lb] each.
       Battery-powered WHHE2-CMP, WHHE4. Last made $495 [2 lb].

The ULTIMO MECHANICAL EM TRANSMITTER LOCATOR: "Mechanical" means here that the UMEMTL is totally non-electronic. Altho it has electronic components, it uses no batteries nor AC power (includes a battery-powered meter). The UMEMTL is a portable, very wideband and highly directional EMF transmitter locator used to locate nearby offending EMF transmitters, within about 900 feet of you (almost all EMF type mind control and electronic attacks we know of were within 100 feet of the TI).
        EMF signals have both electric and magnetic components. In the far field (usually begins within a few feet from the transmitting antenna), the electric component signal strength attenuates at a rate of the SQUARE of the distance from the antenna, while the magnetic component attenuates by the CUBE of the distance. This means the magnetic component signal intensity virtually disappears within about 1000 feet of the antenna while the electric component is still relatively strong. Which means that when the magnetic component is detected, the transmitter is well within the range of nearly all mind control and harassment EMF signal transmitters.
        You point the UMEMTL in the direction(s) you believe the offending signal(s) is coming from. If and when the UMEMTL indicates a magnetic-component signal, you adjust its pointing direction and tuner to maximize the indication, which then should give you the direction of the offending transmitter(s). In many cases, determining the direction of a nearby transmitter pinpoints its most likely location. However, two UMEMTL finders are recommended for crowded areas (eg: urban areas, large groups of people, structures and/or vehicles), for you to exactly locate the offending transmitter(s) thru triangulation (described in its User Manual addendum). In addition to locating continuous wave signal transmitters, the UMEMTL will also locate nearby burst, frequency hopping (multi-frequency), spread spectrum and pulse signal transmitters - transmitter types very difficult to locate using traditional electronic EMF direction finders. The UMEMTL also works well to locate multi-directional, simultaneously-transmitting, moving, skyborne, underfoot and implant transmitters. Not recommended for locating transmitters with EMF signals less than about 100KHz and spaces enclosed by ferromagnetic materials (eg: iron).
        If you are under attack by an EMF transmitter, the attacking transmitter(s) will very likely be within a few 100 feet of you, even though it may be controlled by signals coming 100+ miles from you (eg: satellites, cellphones). By stopping the attacking transmitter(s), you stop the attacks by it. Most places are swamped with 100+ EMF signals (mostly commercial TV and radio signals), and almost all from distant transmitters) so distant that there is virtually no magnetic component. And these distant transmitters typically produce many reflections over their distances, which further worsens both detection and direction-finding of offending transmitters. With our UMEMTL detecting only magnetic component signals, it automatically filters out the multitude of the distant transmitters, by doing so makes finding the nearby attacking transmitter(s) much easier than traditional EMF direction finders. Even if the attacking transmitter was located many miles away with its reflections all over the place, pinpointing its location would be virtually impossible and greatly time-consuming.
        Includes connectors where you can connect up frequency meter, oscilloscope or spectrum analyzer to determine and record frequency, waveform and modulating signals (if any). Frequency meter, oscilloscope and/or spectrum analyzer are not included unless specified in your CDAF. Last made $697 [6 lb].

The ULTIMO EM TRANSMITTER DIRECTION FINDER: If you are being electronically attacked, electronically harassed, electronically controlled, electronically tracked, and/or electronically surveilled through some wireless means, the signal is either electromagnetic (EM) or ultrasonic (see below) in nature. There are all kinds of commercial EM scanners which will allow you to scan for the presence of EM signals. However, they almost never come with directional antennas (they usually have only an omnidirectional whip antenna) so that while using the whip antenna you can pick up EM signals and display the strongest EM signal coming to you from any direction, they cannot determine signal direction - only signal frequency and signal strength. Furthermore, since the standard whip antennas used in commercial scanners detect signals from all directions, a stronger EM signal(s) with a nearby center frequency(ies) (eg: licensed ham and/or commercial radio stations and/or TV stations) to an electronic attack signal will cause the scanner with the standard whip antenna to detect it/them instead of the offending signal. However, because our UEMTDF comes with our proprietary highly directional antennas, when pointed in the offending signal's direction, often result in the clear detection and direction finding of offending signals - even when more powerful non-malevolent (eg: licensed commercial stations, ham, cb) transmitters are operating in the same area, at the same time and at nearby frequencies. This is critical because electronic attack transmitters are often designed to operate in the "electronic shadows" of stronger legit signals, such as commercial TV stations and radio stations, to electronically hide them from scanner/whip antenna detection. Furthermore, commercial scanners come with no instructions on how to interpret the received signals in the realm of electronic attack, mind control and body control technologies. Because of the variety of directional antennas that we include and our User Manual insights about their uses, the UEMTDF can be used to detect and determine the direction of not only relatively distant external signals, but also nearby and even internal signals transmitted, for example, from an electronic implant(s) (for modern electronic implants and most other localized transmitters, it is usually very helpful to be able to detect both internal signals and external signals because modern electronic implants, room bugs, vehicle tracking transmitters, possibly telecoils/magnetic induction loop systems, etc. are often in two-way communications with much larger external transceivers which control them; electronic implant control is often based on the received biomedical data supplied by the electronic implants - data which is often biological result of previous control signal instructions from the external transceivers often in a closed-loop feedback type system). Other nearby signals the UEMTDF is designed to both detect and find include room bugs and tracking transmitters often concealed on vehicles, clothes and portable objects. The UEMTDF comes with a commercial scanner of our choice based on the description of your needs, plus 5 unique directional antennas of our design, plus description of both how to use the directional antennas and how to interpret as best we know the detected radio signals, including "radio static" that is often missed even by professional bug sweepers (detection is contingent upon the existence of a transmitter transmitting an adequate RF signal at the same time and direction you are trying to detect it). NOTE: We will refund 25% of your payment for this device-type if within 60 days of you contracting for one you also contract for a PERSONAL EMF JAMMER (PEMFJ)-type device because you needa highly directional RF signal detector to try to ascertain the frequency, direction and timing of the harassing or attacking EMF so that we can optimally design the PEMFJ for you, and also so that you can prove to yourself that your PEMFJ is transmitting radio signals. Last made $1195 [3 lb].
         ANTENNAS LIMITED TIME SPECIAL OFFER: We recently made major changes in our antenna designs, applicable to all new UEMTDF and UEMTT (below) CD projects. While we got good reports from our earlier antenna variations, our two largest antennas were relatively bulky and heavy, limiting portable use of them by some users. Our newest antennas are much smaller and lighter and thus easier to use. As a special consumer service, if you purchased from us an UEMTDF or UEMTT device-type since Oct. 18, 2007, we will provide you this new set of our unique 5 directional antennas for estimated $395 per set of 5, plus the return to us of all of your original antennas in good condition. Your cost for these new antenna types is less than half of their cost component for new UEMTDF or UEMTT CD projects. To obtain these new antennas, please promptly email us your interest in this deal, and complete a new CDAF for them (green link at top of page, Evaluation Fee waived), and send it to us with your payment (non-refundable 1/3rd downpayment minimum) and original antenna set of 5 antennas. Please allow 30 days from our receipt of your mailing. Note 1: This is not a refund offer or system exchange offer - but an antenna exchange offer only - so please do not send anything else back to us. Note 2: First posted Oct. 19, 2009, we may discontinue this offer at any time without prior notice or liability, so if interested in this deal, please email us promptly, we will honor those who earlier emailed us showing interest and then provided us his/her CDAF, payment and antennas within 30 days of email. Note 3: All of our policies fully apply as usual.

The ULTIMO EM TRANSMITTING ELECTRONIC IMPLANT LOCATOR: The UEMTEIL is the same as the UEMTDF described above, but includes only our very Special Antenna we developed to optimize the location of EM transmitting electronic implants (Note: Not all electronic implants transmit EM signals; the UEMTEIL is not intending for electronic implants which do not transmit EM signals)*. While the small antenna included with the UEMTDF is sensitive to EM-transmitting implants, it is also designed to detect and find the direction of very high frequency external signals, whereas our UEMTEIL's Special Antenna is optimally designed for detecting and locating electronic implants, and is therefore much more sensitive to detecting EM transmitting implants (but still may pickup powerful external signals). Last made $995 [2 lb]. For the Special Antenna only (designed to fit your UEMTDF's signal strength meter), last made only $95 [1 lb], but only if included with your UEMTDF, if you contracted for your UEMTDF now or within the last 60 days.
       *HOW TO TEST FOR TRANSMITTING ELECTRONIC IMPLANTS: You likely have a transmitting electronic implant if your perp seems to have real time knowledge of your biological manifestations. Another test that usually works very well (depending much on your radio's signal frequency and direction) is to hold a portable radio at arms length, then bring it close to various parts of your body. A change in radio sound likely indicates that you have a transmitting electronic implant. Tune your radio to different radio stations and repeat the test; the radio frequency producing the greatest change is usually either near to the transmitting implant frequency or to an harmonic of it. NOTE-1: Because they are so inexpensive, electronic implants are now believed to be fairly common; you may be shocked or surprised as to how many people (and even animals) have them. NOTE-2: This test can produce false positives and false negatives, and we are not certain as to why.

The ULTIMO EM TRANSMITTER TRIANGULATOR: The UEMTT consists of two matching UEMTDF systems (above), plus additional instructions on triangulating EM transmitters. While the UEMTDF will provide you EM transmitter signal strength, signal frequency and signal direction, it will not directly specifically locate the signal transmitter. To best determine specific location of transmitter, you need to triangulate the signal, and that requires two UEMTDF systems. In addition to the User Manual, for all triangulation device-types we sell, we also provide a tutorial on signal triangulation with a completely worked-out example problem using our simple algebraic plug-in formulas. NOTE: We will refund 25% of your payment for this device-type if within 60 days of you contracting for one you also contract for a PERSONAL EMF JAMMER (PEMFJ)-type device because you needa highly directional RF signal detector to try to ascertain the frequency, direction and timing of the harassing or attacking EMF so that we can optimally design the PEMFJ for you, and also so that you can prove to yourself that your PEMFJ is transmitting radio signals. Last made $1995 [6 lb].

The PERSONAL EMF JAMMER (or Personal Signal Jammer): John Williams's extensive researches into EM weaponry and EM harassing devices (and Radionics), such as EM jammers and EM zappers.

"Signal Jammer" is also referred to as: Signal zapper, signal blocker, signal scrambler, signal crammer, signal obstructor, signal squasher, signal destroyer, signal deactivator.

PEMFJ-type devices, as with all RF transmitting devices we design and build, is based on our RF policies defined on our policies webpage (policies.htm). The PEMFJ is designed to send out strings of pulses in a narrow bandwidth (selected center freq 1MHz - 3GHz; BW is 0.1% center freq or 10KHz, whichever is greatest) designed to jam (within the immediate area of one's body) offending EM transmitters, surveillance devices, microwave controllers, et al - even the newest EM devices. Portable and worn or carried on or near the body. Note that EM signal jammers are never designed to operate as electronic weapons or to jam legally licensed transmitters. Jammers transmit no intelligence but only a high-frequency carrier signal typically modulated by white noise or pink noise to mask out the offending signals of an electronic weapon (if you could hear the EM white noise, it would sound much like distant rain; EM pink noise sounds similar to white noise but has higher or lower composite pitch, depending on filtering). In contrast, electronic transmitter weapons transmit definite control signals or data signals which are usually designed to cause harmful manifestations in a person(s) (usually a targeted person), animal(s), and/or equipment. Since the bandwidth that harmful EMFs can occupy is enormous, it is important to determine where in this enormous electromagnetic spectrum lies the signals harmful to you. Therefore, you should first strongly consider as a Customized Devices the purchase of a directional signal strength or signal triangulation device so that you can ferret out the offending signals red-handed, detect their frequency(ies) (bandwidth) and include those details in with your PEMFJ-type CDAF - see our popular THE ULTIMO EM TRANSMITTER TRIANGULATOR and THE ULTIMO EM TRANSMITTER DIRECTION FINDER -type devices above for a special deal. Last made $1499 [2 lb] (rough price when the bandwidth of offending signal was provided; if frequency is not provided, we select the frequency based on the best of our abilities resulting in less probability that we selected the right frequency and device may be substantially more expensive; we cannot do a wideband PEMFJ, nor a PEMFJ for certain frequencies (eg: security frequencies, military frequencies, first responder frequencies, airline frequencies, etc.)).

The ULTRA ULTRASONIC MIKE JAMMER: Perps sometimes use ultrasonic devices to interfere with audio mikes. Using certain ultrasonic waveforms, perps can even sabotage normal conversations, resulting in audio hallucinations (audio ghosting), temporary deafness, and to modify audio between a source (eg: person or device) and his/her/its listeners so listeners hear sounds that the source did not make but appear to be coming from the source, or not hear sounds that the source made, or the sounds from a source sound like gibberish, garbled, incoherent or just makes no sense, or with sound dropouts or unexpected volume changes.
        If you are being surveilled by concealed mikes in your area, or your TV, TV controller/remote control or other electronic device has a voice-control feature or a secretly embedded mike, mike carried on the other person(s), or there is a digital assistant/personal assisant in your area, it is very likely that your conversations are no longer private. Popular digital assistant / personal assistant devices include Apple Siri, Amazon Echo Alexa (Intelligent Personal Assistant), and Google Now. And who knows who they might be selling your conversations to. We have learned well from the book of perp dirty tricks to protect our Clients from surveillance by room and personal mikes, by using ultrasounds to jam the mikes. And jammed sound-activated surveillance mikes are forced ON continuously, running down batteries and filling recorders with hours or days of wasted recordings.
        Mikes are a major technique used by perps to not only track TIs to better target them for EMF and ultrasonic mind control and electronic attacks or physical attacks, but to also gather intelligence on them which reveal how effective their attacks are. Example 1: You say, 'I suddenly got this sharp pain in my head!', just as your perp uses a new form of attack, then the perp knows thru your feedback that his/her new form of attack is working great against you, and to continue and amplify it. Example 2: You say, 'Susan, let's have lunch today at 2PM, the XYZ Cafe', then the perp knows where to find you (and Susan) at 2PM to set up in that area. The perp will also know that you (and Susan) won't be home between about 1:30PM and 3:30PM - perfect for home invasions. And by analyzing when voices are present or absent, perps can determine your locations, schedules and plans, and those of your loved ones, as well as obtaining your personal, private and financial data.
        Modern mikes pick up audio-modulated ultrasonic sounds, along with straight audio. The typical mike pre-amp filters out the ultrasonic part, so random audio noise modulating the ultrasonic carrier is stripped from the carrier, which then mixes with the straight audio signal, thereby jamming it. Signal aliasing and heterodyning (from signal mixing interference) also contribute to audio noise. A conversation between two people in a quiet room ends up being recorded as a very loud and noisy crowd - worthless for intelligence and harassment purposes. And no way for the perp to process the noisy audio to isolate individual voices.
       
Very few people can hear the audio produced by an ultrasonic mike jammer, so seldomly are speakers aware of ultrasonic jamming, nor does our UUMJ affect their ability to normally speak to and hear each other. Not all mikes and mike pre-amps operate the same, so while some are wildly interfered with using the UUMJ, others are less interfered with. The volume AND the amount of modulation of the UUMI are adjustable for a large range of mike and mike pre-amp types to optimize jamming.
        We provide you a mike-jamming UUMJ device, which you can wear (eg: necklace, bracelet, belt, etc.), carry on or with you (eg: concealed in your clothes, purse, book, valise, etc.), or place in your area to jam room and personal mikes. Your conversations are private once again. If the UUMJ is worn by you or carried on or with you, it will protect your audio privacy no matter where you go. Note that the UUMJ is not the same as our Ultra Ultrasonic Jammer (UUJ; see below), which purpose is to jam ultrasonic attacks launched directly against your brain and body for mind control and electronic attack purposes.
        The UUMJ consists of a group of ultrasonic sounders in a strategically designed configuration by us. It also includes a portable battery-powered (we can also do 120VAC-powered) electronic signal generator which powers the ultrasonic sounders. The audio waveform is randomly generated by it to produce the powerful audio noise used to modulate the ultrasonic carrier. Random audio noise is critical because it makes it virtually impossible for perps to process recordings to recover your actual conversation.
        Ultrasound is highly directional, so distance and direction play a larger part. Normal audio is not highly directional. In fact, while audio is more intense and easier for mikes to optimally pick up when face-on and near to the audio source, audio can also be picked up by sensitive mikes located in non-optimum places - it is critical that the placement of sounders in the UUMJ is very strategically done to maximally jam all mikes. We can integrate the ultrasonic sounders into just about any object you specify or provide to us. Or leave object choice totally up to us. In your CDAF, you specify how many UUMJ ultrasonic sounders you want (3 min., 15 is practical max., 5 ideal), and what kind of object to place them in (eg: necklace, bracelet, belt, clothes, purse, book, valise, etc.), and whether or not you will provide us this object (which must be new or like new, in excellent condition, clean, and large and sturdy enough to hold the sounders).
        Our popular UUMJ can also be configured to make a great animal, pest and intruder defense system, because its high powered ultrasonic cacophonous outputs can be very disturbing to them.
        Last made, using 5 powerful ultrasonic sounders in a Client-provided necklace, $795 [2 lb].

The ULTRA ULTRASONIC JAMMER: Ultrasonic transmitters have several important uses. These include warding off feral dogs and dangerous pests (insects to rodents), and for ultrasonic communications, control, electronic weaponry (eg: ultrasonic mind control / ultrasonic attack) and various ultrasonic laboratory applications. "Ultrasonic Jammers" are typically powerful ultrasonic transmitters designed to block or interfere with any intelligence or data transmitted by other ultrasonic transmitters operating in that band, if any, and to disrupt their ultrasonic control, communications, weaponry, and lab functions. Note that ultrasonic signal jammers are never designed to operate as electronic weapons. Jammers transmit no intelligence but only a high-frequency carrier signal typically modulated by white noise or pink noise to mask out the offending signals of an electronic weapon (if you could hear ultrasonic white noise, it would sound much like distant rain; ultrasonic pink noise sounds similar to white noise but has higher or lower composite pitch, depending on filtering). In contrast, electronic transmitter weapons, which we do not create, transmit definite control signals or data signals which are usually designed to cause harmful manifestations in a person(s) (usually a targeted person), animal(s), and/or equipment.

John Williams' extensive researches into ultrasonic weaponry and harassing devices (and infrasonic weaponry) have resulted in a high level of understanding and insights into ultrasonic weaponry and electronic countermeasures. The technology for powerful and invisible ultrasonic attacks clearly exists - attacks aimed at harassing, controlling, crippling, and "poisoning"! Do you:

And you are certain that these manifestations are not caused by any medical condition. You may be the victim of an ultrasonic attack!

Our popular UUJ also usually makes the best animal, pest and intruder defense systems because their-high powered ultrasonic cacophone outputs are most disturbing to them. The UUJ is designed to protect yourself from unwanted ultrasonic surveillance and control, ultrasonic harassment, and painful, debilitating and dangerous ultrasonic pain field generator and other ultrasonic weaponry attacks. Tunable frequency is a critical feature because different ultrasonic frequencies are used for different ultrasonic applications. Don't confuse the UUJ with commercial "ultrasonic pest controllers," as some of these transmit virtually no ultrasonic tones - only feint beeps modulated at about 10 KHz - while others transmit only one steady ultrasonic tone or short periodic ultrasonic beeps and therefore do not affect many different types of pests who are not sensitive to their one ultrasonic tone. However, the UUJ is tunable over a wide bandwidth of practical ultrasonic frequencies (about 15 KHz to about 50 KHz) to optimize it for its many ultrasound uses. See above for special deal in getting an ultrasonic detector with the UUJ (see mindcontrol1.htm webpage for Ultrasonic Detector and Ultrasonic Triangulator descriptions).Last made $695 [2 lb].

The STEALTH PAINT "ELIXIR": The SPE is the top secret Lone Star Consulting, Inc.'s proprietary formulation of certain paint pigments and additives which are easily applied to the outside and/or inside surfaces consisting of woods, drywall, plastics, adobe, metals, composites, concrete, cement, mortar, asphalt, brick, stone, ceramics, etc. The SPE is specially designed to greatly cut down on direct, reflected and scattered microwaves, including radar returns. The SPE is a stealth coating material that can be used to paint homes, businesses, other above and below ground structures, vehicles, watercraft, some aircraft, composite surfaces, other shielding materials, etc. (even if previously painted or coated), to help protect people inside them from surveillance, targeting, mind control and electronic harassment, dangerous microwaves, and ground-penetrating radar (legal uses only). The SPE is great shielding against EMFs, but is minor shielding against ultrasounds, sounds and infrasounds.

How much Stealth Paint one needs to cover a surface depends on the following:
...(A) The Area to be covered (for best protection of rooms, walls, ceilings and floors (except bottom level floor) should be 100% coated). How many square meters or square feet are your surfaces you need to cover?
...(B) How many coats of Stealth Paint do you need to apply? The more coats, the more protection.
...(C) How absorbent to paint is your surface? For absorbent surfaces, you will need more paint coatings.

Once you derive your total Area figure above (Area X Number of Coatings), go to a paint store. Look at commercial oil-based paint containers (ie: cans), which state on the can's label what area the can will cover. This figure is clearly exaggerated; we have found usually by about 20%, so your should multiple the label square foot by 0.8 (80%). Then compute how many store paint cans you would need if you used the store's paint to coat your total Area. Determine the weight of the contents of each can (if not on the label, weigh a full can and an empty can, and subtract the two weights for the weight of the can's contents only). Multiply the number of cans you will need by 1.05 (105%; the 5% for paint wasted by spillage, drippings, evaporation, etc.). Then multiply that figure with the weight of the paint per can to derive total required SPE weight. The total required SPE weight is what you will need to order from us; email us this weight figure (on email Subject Line, put STEALTH PAINT INQUIRY), and we will provide you total price and S/H (some discounts in both price and S/H for larger quantities). This is not an exact calculation, but should be a close estimate of the SPE you will need.

Then, at your end and at your cost, you will thoroughly mix your SPE into a mixing liquid of your choice and in the proportion you believe optimum for your use to turn it into liquid stealth paint elixir. Many types of mixing liquids will do, but not water or anything containing water (nor any gasoline, diesel fuel nor other highly inflammable, explosive or toxic liquid). Do not use water because the mixing liquid must act as a binder. The mixing liquid should be oil-based paint, oil-paint oil, damar varnish, egg tempera (ie: egg yolk), other coating, glue, caulk, filler, linseed oil or similar (some careful experimentation may be required to find the best mixing liquid and ratios for your particular surfaces). The mixing liquid converted into liquid SPE must also be able to set and dry within a few days at most.

Enough Stealth Paint Elixir powder you mix into 1 gallon of your paint (the paint is not included). Last made $95 [2 lbs]. NOTE: We cannot ship liquids thru the mail; so we provide the Stealth Paint Elixir in powder form only.

The UNKNOWN & UNSEEN ENTITY DETECTOR: A device type sometimes referred to by others as unknown presence detectors, unseen presence detectors, spirit detectors, ghost detectors, ghost busters, alien detectors, and alien buster detectors. Yet another one of our all time most exciting and incredible devices! Concerned about nearby hidden people (eg: rapists, muggers, home invaders, stalkers, peeping-toms) or animals, or spirits or ghosts which can disturb the ambient static electric field and/or the electromagnetic field? Detect them with the U&UED! The U&UED is an ultra-sensitive device which will detect the presence or nearness of virtually anything which produces or disturbs this omnipresent Static Field (U&UED1) or Electromagnetic Field (U&UED2) (the U&UED-Combo is both a U&UED1 and U&UED2 combined in the same box using the same power supply). Static field and electromagnetic field disturbances are not normally detectable with the human senses alone (some animals are very sensitive to these electric field disturbances). Worried that someone is hiding in your home, business or vehicle? Or some feral animal is laying in wait to surprise and attack you? The U&UED may help to detect and warn you! With Sensitivity Adjustment to boost dynamic range. (NOTE #1: We do NOT claim that ghosts and spirits actually exist; our designs are based on our proprietary theories should they exist. NOTE #2: Works best under dry conditions, the environment should be less than 50% Relative Humidity because high humidity adversely affects disturbances in electrostatic fields; and avoid using the U&UED near large metal surfaces, large bodies of water and AC power and radio emitters and other manmade strong electrical disturbances as proximity to these entities may cause this device type to not properly function). The U&UEDs are the same types of devices used by paranormal researchers, UFO and alien researchers, and "ghost busters." Last made $695 [2 lb] each, $1285 combined (U&UED-Combo).

The HYPERSENSITIVE SOUND ALARM - Ultrasensitive Sound Detector: Have you tried to track down these low, fleeting, distant or faint sounds yourself only frustratingly not being able to hear well enough or react fast enough to catch them or to determine their sources? Or hired expensive "surveillance experts," "bug-sweepers" or "ghost busters" with same zero results or a bunch of BS? The HSA works by using a highly-directional microphone, super-amplification circuitry, a fast latching circuit (reacts in milliseconds), both a LED and loud beeping alarms (which comes with a volume control and can be disconnected for a silent alarm / secret alarm indication instead) to detect and continuously alert you to low, fleeting, distant and faint sounds in the mike's pointing direction at and within the sound band the HSA is tuned for (if you specified an HSA band).
           HSA DETECTS CRITICAL LOW-VOLUME, SHORT DURATION BEEPS FROM OTHER ALARM SYSTEMS: Are you missing sounds from alarms or alerts which are so weak and/or short-duration that you are distracted or sleep through them? Bothered by strange sounds / weird sounds which seem to come at random or odd times, especially while you are asleep? Unfortunately, many critical alarm systems put out a few faint beeps and then shut off - critical beeps you can easily miss because you are soundly asleep, temporarily out of the area or distracted by other noises and activities. The HSA is designed to detect such faint and short-duration sounds and continuously put out a loud alarm until you shut it off, it times out (if you set it for a time duration) or its battery depletes (if you specified battery operation). To remotely monitor the HSA, you can use a baby alarm with it (baby alarm is not included with the HSA unless explicitly contracted for). We believe that for all critical sounds, as many people as possible who consider that sound to be important should be able to monitor it. However, baby alarms are NOT substitutes for the HSA because baby alarms themselves neither detect low-level and short-duration sounds nor do they lock onto any sound. And unlike the HSA, baby alarms are not highly directional (they also pick much unrelated ambient noises such as traffic, neighbors, equipment, animals, etc.). This means that if you try to use a baby alarm to substitute for the HSA, and you are even briefly distracted or step out of the baby alarm receiver area, or you sleep deeply, or the faint short-duration sound is masked by a louder sound picked up by the typical omnidirectional baby monitor mike, you will likely miss the critical low-volume and/or short-duration critical sound. Also, if the source of the sound or the sound itself you are trying to monitor is expected to soon change but the new sound is also expected to be low-volume and/or short-duration, or there are other faint short-duration sounds you are also interested in, know that the very versatile HSA does a great job detecting and alarming to all types of low-volume and short-duration sounds - the HSA has countless low-volume, short-duration sound uses.
           THE HSA IS VIRTUALLY IDEAL BUSINESS AND HOME INVASION ALARMS: The HSA, especially the Entire Audio Band (20 Hz - 20 KHz) and the All-Band Audio Plus Ultrasonic (20 Hz - 80 KHz) versions, is a far better preventer of and home alarm system / business alarm system for burglaries and home invasions than traditional home alarm systems / business alarm systems because while traditional business / home alarm systems don't typically activate until the criminal has already damaged or invaded or is in the process of damaging or invading your property, the HSA (with the HSA inside your home or business) can alarm you even if the criminal or feral animal is just milling around the outside of your home, business, or nearby car or other property. As the result, traditional alarms can activate too late to save you, your loved ones or property. The HSA is also great against criminals casing your home or business, snoops, peeping toms, knob-turners, lay-and-wait ambushers, home-invading creeps, vandals, snatch-and-grab thieves, gas thieves, and unwanted door-to-door solicitors - its silent alarm / secret alarm feature can quietly alert you to a current or recent invader or snoop without also alerting the invader or snoop. And as part of a baby monitor, home watch, business watch and nanny watch system. When you or your kids come home to an empty house, is your home really empty? One of the most vulnerable parts of people's homes is their garage - an HSA in your garage can alarm you if someone is trying to break into your garage or has enterred through an open garage door. Basements are also vulnerable to home invaders, burglars, murderers and rapists. We all live in an increasingly dangerous world, increased security is now a must.
           HSA DETECTS DISTANT & REMOTE SOUNDS: The HSA is also highly recommended for detecting and listening to remote and distant sounds, and may be a real lifesaver in finding lost children and animals. Also great for bird watchers and other animal researchers, for trackers, for hunters, and for military and police uses. With the HSA, you can detect and hear people and animals at much greater distances and long before they can hear you - giving you great advantages in many situations.
           HSA DETECTS FAINT SOUNDS FROM COLLAPSES, CAVE-INS, AVALANCHES, EARTHQUAKES, TSUNAMIS, WAR ZONES, MINING ACCIDENTS, TERRORIST ATTACKS: The HSA can also be highly effective for detecting people trapped in cave-ins and collapsed buildings, bridges, tunnels, mines, ditches, wells, avalanches, landslides, etc., and is highly recommended for people and emergency services in active earthquake zones, mining areas, avalanche areas, tsunami areas, war zones, and likely terrorist target areas. If someone is trapped or buried, you want the HSA to be right on hand to immediately search for them by detecting their movements, shouts, cries and digging in the rubble. You also want to detect hidden broken gas lines, broken water lines and broken steam lines. Highly directional and ultra sensitive, so you don't need to be near or right over the source of the sounds - a big advantage in rubble situations.
           HSA DETECTS WATER LEAKS, AIR LEAKS, GAS LEAKS, FUEL LEAKS, CHEMICAL LEAKS: Water leaks can be devastating to your property, not to mention seriously drive up your water bills and waste valuable drinking water. Need to detect water leaks or overflows in your buried plumbing, walls, ceilings and floors, and through soil, concrete slabs, asphalt, wallboard, ceiling tiles, floor tiles, carpets, wood, plastic and other materials? The HSA can be used to non-destructively pinpoint the locations of underground water leaks and ceiling, floor and wall water leaks (water lines, sprinkler systems, faucets and other valves, hydrants, swimming pools and water tanks). Water leaking under pressure usually makes spurting, spraying, gurgling or PSSS-type sounds, such low-intensity buried sounds usually cannot be heard by the naked ear - especially when your ears are 5+ feet off the ground, which the HSA serves as an excellent hydrophone. Air leaks, gas leaks, fuel leaks and chemical leaks can make similar faint but distinctive sounds which the HSA can also detect. Many plumbers and equipment rental places do not have leak pinpointing devices, and plumbers which do virtually never rent them out, and charge you $200 - $300 EACH TIME they use them on your property (some double the price if they find a leak and you do not hire them to make the repairs). If you can't pinpoint your leak in a yard line, building line or valve, you may be forced to replace the entire line at huge expense, not to mention the extra expense of removing the debris from the torn up area, repairing it, and suffering a loss on your property because it now will likely be heavily scarred due to replacing the entire line. However, if the HSA can pinpoint your leak, you can usually restrict your repairs just to that small area at much less cost and damage. For leak detection, contract for The Entire Audio Band Version of the HSA with the Delux Water Leak Detection Mike. The Delux Water Leak Detection Mike is a mike consisting of a long padded cone (to concentrate leak sounds) attached to a three-foot plastic tube handle - an electronic stethoscope. You place the cone on the surface in various places as you walk along the line's route, and listen for distinctive leak sounds, where the sounds are loudest usually indicates exact location of leak. The Delux Water Leak Detection Mike also works great as a long distance surveillance mike, but is not sold for that purpose. In addition, also consider getting the Long-Reach Mike, which is a mike in a five-foot thin plastic tube handle which can reach deep into small spaces and pipes, and which usually much enhances received leak sounds when inserted into a steel pipe driven into the ground near the leak.
               Note that another very effective way to detect and locate water leaks is by using the soil conductivity method of our less expensive Ultimo Water Leak Detector & Locator, described on our misc-electronics.htm webpage, and pinpointing water leaks by detecting dips in soil resistance due to the water leak wetting the soil (not effective for air leaks, gas leaks, fuel leaks or chemical leaks, or water not leaking into soil). Since soil and water leak conditions vary widely, and one may work better than the other to detect your water leaks, you ideally should have both the HSA and the UWLD&L on hand to detect water leaks.
               Note: Since we neither have control over your soil and leak conditions nor how you will use this device, we cannot guarantee the HSA will pinpoint your leaks, and we assume no liability for false positives, false negatives, locating a leak after damage has already occurred or is imminent, failure to identify the exact location of a leak, or for anything else related to your use of the HSA device or your leak problems. Also, we are not plumbers, so we don't make plumbing repairs or provide plumbing advice or opinions.
           HSA HAS MANY OTHER IMPORTANT USES: Hearing sounds or voices in your head or your thoughts being repeated back to you which are not caused by a medical condition and appear to be emanating from external sources you can't seem to pinpoint or seem to be impossible sources of sound? Plagued by sounds no one else can hear or directed towards you alone? Or by weird sounds, voices or other disturbances which emanate from underground, walls, attic, basement, crawl space, garage, shed, bedroom, other room, large appliances, vehicles and/or equipment? Great for car owners and auto mechanics to ferret out those strange vehicle vibrations, squeaks, rattles and buzzes. Or underground streams or other liquid flows? Or as part of a baby monitor or nanny watch system. Or infestations of insects or rodents busily eating or nesting behind your walls, attic, floor, basement or other hidden places? Or as an electronic geophone / seismic activity detector. Or are you into ghost-busting, spirit hunting, space alien hunting, or animal detection or research (eg: bird watching, hunting, bats, dolphins, whales, burrowing animals, mice, rats, termites, ants, etc.)? The HSA can be used in all of these other applications as well.
           HSA FEATURES: The HSA is simple and easy to operate and comes with the HSA Module, the Hypersensitive Mike, the buzzer sounder, quality headphones, AC power adapter (for AC power operation), two new 9VDC alkaline batteries (portable DC operation), cabling, and user manual. The HSA Module comes with a Sensitivity Pot so that you can set the sensitivity (ie: input gain) from high sensitivity to ultra high sensitivity, a Duration Pot to set the duration of the alarm signal, and an output Alarm Volume Pot to control alarm loudness. In addition to a powerful beeper, the HSA also has a LED which also lights when the alarm is activated, even if you disconnect the beeper for silent indication. The HSA also comes with an output port where you can listen to and/or record the filtered highly-amplified sound (if in the audio band) and/or view the detected signal on an oscilloscope. If you need remote monitoring (eg: the people doing the monitoring are in a different area or office than the HSA), you can easily use the HSA in conjunction with a wireless baby monitor, home watch / home alarm system, internet monitoring system / internet surveillance system, real time spy camera, or some other applicable legal transmitter/receiver system (the HSA neither includes any of these extra systems, nor interfaces to them, nor any recorder, oscilloscope, spectrum analyzer, etc.).
           The HSA has two modalities of operation: (1) Feedback Modality, and (2) Non-Feedback Modality. In the Feedback Modality, the alarm signal is also fed back into the sound detection circuitry, which continuously retriggers the alarm until you shut off power to it. In the Non-Feedback Modality, the alarm signal is not fed back, in which case, the alarm activates for periods primarily set by the Duration Pot.
           The highly-directional mike is almost always required to determine actual sound directions - often critically important to determining sound origins with minimal false alarms, and thus determining what or who is making the sounds. By also selecting the band where your sounds of interest lay in, you can also greatly minimize false alarms by isolating your specific sounds of interest - especially useful where and when they are buried in much ambient noise and/or are remote or distant.
           If ultrasonics is important to you, we also do ultrasonic HSA device types. Don't be fooled by similar devices which can't perform above 40 KHz. We also offer HSA infrasonic versions (ie: sounds below 20 Hz), but because infrasound is spread out and infrasound direction is usually not detectable using electronic detectors, the mike provided is built-in and much more omnidirectional.
           Note that for all critical uses of the very versatile HSA, be sure to repeatedly test it in non-critical situations as similar as possible to your actual critical use, and then use the HSA as a backup system to any existing system you may have to alert you. Most important are the, (1) Adjustment for input sound amplification (multiturn Sensitivity Pot) to maximize true positive indications while minimizing false indications, (2) Pointing of the directional mike so that you maximize sensitivity in the direction that the sound of interest comes from, and (3) Setting of the output sound level so that you will be reliably alerted while not disturbing others not wanting to be disturbed. As with all of our devices, we are not licensed medical personnel, so we never make medical claims or provide medical advice, medical device, or medical opinion.
           The HSA is the absolute ultimate in low and short-duration sound detection capabilities! Should detecting low and short duration, remote, distant or faint sounds (audio, ultrasonic and/or infrasonic sounds) and alarming you when detected is what you require, the HSA is ideal for you! Last made $395 [2 lb] for the Bass Version (20 - 500 Hz), Midrange Version (500 Hz - 4 KHz) and Treble Version (4 - 20 KHz), $545 [2 lb] for the Ultrasonic Version (20 - 80KHz), $695 [2 lb] for Near Infrasound Band Version (2 - 20 Hz, built-in omnidirectional mike), $895 [2 lb] for Far Infrasound Band Version (0.2 - 2 Hz, built-in omnidirectional mike), $595 [2 lb] for the Entire Audio Band Version (20 Hz - 20 KHz - recommended for maximum versatility and where you are not certain which band the sound mostly lies in or if the sound covers multiple audio bands (ie: wideband audio sound)), $995 [3 lb] for the All-Band Audio Plus Ultrasonic Version (20 Hz - 80 KHz, with major band-selection switch - recommended for both wideband audio sound and mind control and electronic attacks, ultrasonic communications, and animal detection and research where the animal produces or responds to ultrasonic signals), and $795 [2-3 lb] for any other audio and/or ultrasonic band version you specify (each specified band must be between 1% and 25% of upper frequency in width and be at least 500 Hz wide, and must entirely reside between 20 Hz and 200 KHz; add $95 more for each band you specify above first band; 4 bands max; bands may overlap and you may have gaps between your selected bands). Both the plug-in mikes and plug-in alarm sounders have 4-foot cables (flexible, lightweight, high-quality coaxial cables). While the provided mike is highly directional, we can substitute this mike for a more omnidirectional mike (same cost; covers a much greater area but is not nearly as directional), and we can provide additional mikes (eg: more omnidirectional mike along with the usual highly-directional mike), $95 [1 lb] per mike extra for all mikes, except the Delux Water Leak Detection Mike, which is $195 extra [3 lb]. While the alarm sounder is rated at 70-80 db, we can substitute it for an even much louder 90-110 db alarm sounder ($45 extra), or provide the 90-110 db alarm sounder as an extra sounder ($75 [1 lb] extra) (as with all alarm sounders, take cautions to not disturb your neighbors and others without their permissions, and place and tune the HSA system to minimize false alarms). Since you can control volume to the alarm sounder, you can also set the volume to either type of alarm sounder to very low if you wish for a much more localized alarming. Should you also need a relay contact output, add $50 for the relay output. Should you need a stop-clock function (freezes a clock display when alarm sounds; clock is included but requires a relay contact output) - great for documenting activations, add $75. As with all of our Customized Devices, we will of course consider any other variations in features and capabilities you specify on your CDAF.

The SOUND SNAP SHOT DEVICE: Bothered by strange sounds / weird sounds that seem to come at random or odd times, especially while you are asleep? Hearing sounds or voices in your head or your thoughts being repeated back to you that are not caused by a medical condition and appear to be emanating from external sources you can't seem to pinpoint or seem to be impossible sources of sound? Plagued by sounds no one else can hear or directed towards you alone? Or by weird sounds or voices that emanate from walls, attic, basement, crawl space, garage, shed, bedroom, other room, large appliances and/or vehicles? Concerned about your home security or business security? Or are you into ghost-busting, spirit hunting, space alien hunting, or animal detection or research (eg: bats, dolphins, whales, burrowing animals, insects, etc.)? Or sounds which come from the insides of operating equipment to determine exactly how the equipment operates and problem areas?
           To both determine where irritating or mind control or electronic attack sounds are coming from and what is causing them, and to document their actual existence, you almost always need to record them where you can play them back repeatedly to various listeners and even analyze them for those who may be skeptical that such sounds actually exist and are not the figment of your imagination. You have probably already tried to record these sounds but with little luck. You may have even frustratingly tried many audio recorders but with the same failure-to-record results. Or hired expensive "surveillance experts," "bug-sweepers" or "ghost busters" with same zero results or a bunch of BS? The problems with both audio tape and digital recorders (including compact disk recorders) are that their mikes and amplifier stages are relatively narrow band, relatively insensitive, relatively low gain, and often have no AGC, so it is virtually impossible for them to pick up low-intensity, short-duration, audio, ultrasonic and infrasonic sounds. Even the most modern, popular and costly audio tape and digital recorders are not designed to record faint sounds, sound bursts, ultrasounds and infrasounds because they are designed to record only clearly audible voice and music in the audio band. All of the commonly available recorders we tested go no higher than about 22 KHz (mostly 15 - 20 KHz - some less than 8 KHz). The SSSD processes all of these unusual sounds to a format which commonly available modern digital recorders can easily record.
           If ultrasonics is important to you, we also do ultrasonic SSSD device types. In our opinion, to do credible ultrasonic research in free air (as opposed to skin-contact medical ultrasonics) requires sensitivity to at least 200 KHz - so don't be fooled by similar devices which can't perform above 40 KHz. Our SSSD is a specially-designed interface unit that plugs into the mike input of a digital recorder. The SSSD picks up the sound through its own handheld mike; the SSSD then amplifies and filters the sound, and then it outputs the much clearer, louder sound to the mike input of the digital recorder connected to it. The SSSD amplifies all detected sounds from 20 Hz to 200+ KHz - deep into the air ultrasonic band - using our best low-distortion, ultra-wide BW, ultra high gain automatic gain control (AGC) sound designs (AGC is invaluable because it results in maximum amplification of faint sounds but automatically adjusts for less amplification of louder sounds - much increasing dynamic range).
           With the SSSD device, we also include a new commercial high-memory capacity digital recorder we especially selected for this application after much research. This commercial digital recorder will digitally record continuously for a maximum of 287 - 288 hours, so that you don't miss sound bursts which are often missed by voice-activated / voice-operated (VOR/VOX) recorders. You now can continuously record while asleep, busy or away - even for days at a time. The SSSD comes with mike outputs with good impedance matching to record the amplified raw signal and the demodulated and downconverted signals (if ultrasonic and infrasonic are specified), which you can also use to observe with an oscilloscope. The SSSD also comes with a switch for you to select which major sound band you want to output, and an LED will indicate when there is detected sound in the band of your choice and its amplified intensity. Since not even popular digital recorders will record ultrasonic sounds, the SSSD will first downconvert ultrasonic sounds into the audio range so you can hear an audio frequency rendition of the ultrasonic sounds on a speaker or earphones, which pitch is proportional to ultrasound frequency. And if you specify infrasonic capabilities, the SSSD will also demodulate infrasonics to derive the actual infrasonic signals (eg: alpha, beta, delta, theta, spindle brainwave frequencies, control frequencies), which you can observe on an oscilloscope. In addition, the SSSD detects and outputs: (1) Audio signals by themselves, (2) Ultrasonic signals by themselves, (3) Infrasonic signals modulating audio carriers, (4) Infrasonic signals modulating ultrasonic carriers, and (5) Audio signals modulating ultrasonic carriers, (2) - (5) are highly characteristic of electronic attack and mind control technologies. If specifed for ultrasonic/infrasonic capabilities, the SSSD will detect and demodulate: FM / PRM / PFM (frequency modulation / pulse rate modulation / pulse frequency modulation), AM (amplitude modulation), and/or PWM (pulse width modulation) (FM and PRM/PFM are our standards, if you need to demodulate AM or PWM, specify in CDAF and additional charges will apply). The SSSD also includes: (1) An input gain pot so that you can control the input sensitivity of the device up to a gain of 100,000+, (2) A directional handheld mike sensitive to frequencies between 20 Hz and about 200 KHz to help detect direction of sound source and therefore possibly its specific location and transmitter (plug-in handheld mike is connected to SSSD through 4' flexible, lightweight coax cable), (3) A selector switch for you to select whether the SSSD output to the tape/compact disk recorder (which you can also connect to an oscilloscope) is normal audio output, or an audio output demodulated from an ultrasonic carrier, and (4) A mixer pot that allows you to tune for the optimum downconversion of ultrasonic signals (if ultrasound capability is specified.)
           The SSSD is the absolute ultimate in sound detection, processing and recording capabilities! Should detecting and recording low-intensity sounds, short-duration sounds, modulations, ultrasonic sounds, and/or modulating infrasonic sounds is what you require - full audio, full ultrasonic and full infrasonic capabilities described above - the SSSD is ideal for you. Last made $1995 [3 lb]. The SSSD-Lite is the same as the SSSD except it has no ultrasonic, infrasonic or modulation capabilities - only audio between 20 Hz and 20 KHz. Last made $1195 [2 lb]. Should you also need a relay contact output, add $50 for the relay output. Should you need a stop-clock function (freezes a clock display when alarm sounds; clock is included but requires a relay contact output) - great for documenting activations, add $75. As with all of our Customized Devices, we will of course consider any other variations in features and capabilities you specify on your CDAF. (unless explicitly contracted for on the CDAF to the contrary, all SSSD-type devices include digital recorder and exclude an oscilloscope, speaker and earphones).

The ULTIMO ULTRASONIC COMMUNICATOR & CONTROLLER: The UUC&C is an ultrasonic transmitter type device that permits you to secretly transmit your spoken speech, music, noise, etc modulated by an ultrasonic carrier, powerful and highly directional. Carrier frequency is tunable between 15 - 50 KHz for you to find the most effective frequency(ies) for your needs. Two audio input connectors: (1) Standard microphone input (mike provided), and (2) Standard recorder input (recorder not provided), which can be used separately or mixed together. Ideal for subliminal mind control, behavior control, behavior modification, power-of-suggestion and automatic learning experimentation; for secret commands, obedience training (eg: for dogs; feral and dangerous animals; cattle, sheep and other farm animals; zoo animals) and entrainment; and for secret communications (requires a compatible ultrasonic receiver type device, contracted for separately). In some cases, the UUC&C can also be used as an audio disrupter of offensively loud audio equipment used on your property. Five forms of modulation available: Amplitude Modulation (AM), Frequency Modulation (FM), Pulse Width Modulation (PWM), Pulse Rate Modulation (PRM), and Pulse Code Modulation (PCM), each of which has its own advantages and disadvantages. NOTE: Not to be used at athletic events, races or any other event or situation where its use would be illegal, unethical or immoral. Any modulation form (your choice): $995 [2 lb]. Any 2 mod. forms in same box (your choice), switch selectable: Last made $1595 [3 lb]. Any 3 mod, forms: Last made $1995 [4 lb]. Any 4 mod. forms: Last made $2295 [5 lb]. All 5 mod. forms: Last made $2545 [6 lb].

The ULTIMO NOISE COMMUNICATOR SYSTEM: Used to be that control signals, voice and data could only be communicated using clear signals. Not any more! The UNCS is a system, consisting of both an ultrasonic transmitter and ultrasonic receiver, used to demonstrate that noise can be used to communicate intelligent signals. Electronic, electrical, audio, ultrasonic and infrasonic noise can be intentionally used to produce a control signal, voice signal or data signal itself. Our research shows that noise - virtually regardless of what mode it is transmitted in and what band it occupies within that mode (but almost always high band) - can itself be used to transmit information! Noise communications is in fact a state-of-the-art method of secret communications. Noise is a particularly effective means of further stealthing mind control and electronic attacks as well as communications because even if a victim is able to correlate noise bursts with his/her manifestations, authorities can easily write off his/her allegations, such as, 'It's just a bunch of radio static that just happened to correlate with X's manifestations - everyone knows that noise can't control anything or transmit data.' Sometimes the intelligent information in the noise will give it a quality where it will sound voice-like (quasi-voice) or data-like - you may even be able to discern what the voice is actually saying if you listen very carefully - and it can also be subliminal (eg: using ultrasound noise to conceal audio signals). In other cases, it will just sound like noise bursts, and often totally overlooked as a possible source of voice, data or control signal, or go undetected by normal senses because both the noise and signal are ultrasonic. Last made $9985 [4 lb].

The SHRIEK MODULE: No longer must you suffer with the fear, indignity, insult, and inconvenience of obscene and harassing phone calls! Caller ID is ineffective against many smart harassers who block their calls or call out of area. The SM produces an ear-piercing shriek simply by pushing a switch. Its shriek is so loud that it can cause excruciating pain to the caller. Because the SM is electronically connected directly to the phone line, its resulting sound is far louder than that possible with any whistle or other audio device that is attenuated by the phone circuitry. In addition to its use as a powerful weapon against harassers of all kinds. The SM:

A real lifesaver. Last made $195 [1 lb].

The BUG & TAP DETECTOR & BLASTER: Phone conversations are not secure. Some bugs and taps (eg: an infinity bug) can turn your phone into a room mike while it is hung up. The BTDB will detect all but the most sophisticated types of bugs and taps. Bugs and taps can then usually be blasted off the line with the push of a button (high-voltage pulse train). Last made $229 [2 lb]. Bug & Tap Detector function only. Last made $59 [1 lb].

The ULTIMO LINEMAN's TEST SET: The infamous Lineman's Test Set was and is still used by some phone snoops and phreakers to eavesdrop on phone conversations, make free Long Distance (LD) phone calls, avoid all risks of identification from Automatic Number Identification (ANI), Caller ID and Call Trace, diagnose phone system problems, and to run one's own ANIs on the phone lines one may encounter. The ULTS is the cordless version for much greater convenience and personal security, but of course not sold for any of the traditional Lineman's Test Set illegal uses. The ULTS comes with alligator clips and RJ-11 connectors for quick connections either to a standard RJ-11 phone connector or clipped to bare leads, screws or punch block tabs. And the ULTS's base unit is converted for battery operation for field uses. And the ULTS comes with a mike mute switch so no sounds or noises on user side is picked up. Very popular. Last made $345 [3 lb]. Popular options: 4x range extension, add $69. Black Box Interface: Much increased stealthiness (as no DC loading of the phone line results from its use), and detects when the phone line is in use without interfering with normal phone service, add $79.

The SECRET COMMUNICATOR: The SC is an excellent, small secret RF device great for all types of fun. Person A taps a small, concealed switch hidden somewhere on their body. This sends Person B a secret signal (you come up with your own codes for your own uses) into a hidden, silent vibrator, also hidden on the body. Or the vibrator could be hidden elsewhere, and/or easily replaced with a small relay, lamp, buzzer, actuator, etc. Great for playing all kinds of games, competitions, magic tricks, parties, corporate meetings, love signals, secret rendezvous, plan executions, coordinated actions, covert activities, et al - virtually any kind of activity where secret signals are a must or desired. Last made $695 [1 lb].

The SUPER SLEUTH ULTRA HIGH GAIN SOUND AMPLIFIER & DETECTOR: The SSUHGSAD is an ultrasensitive sound amplifier, detector and pinpointer that operates in the audio range (20 Hz - 20 KHz). Gain is up to about 1,000,000. Comes with 3 tunable bands - bass, midrange and treble - you can independently tune to amplify or attenuate these frequency bands to bring out certain sounds and/or repress others that might be masking them. This device is great for picking up the faintest sounds - even when masked by other sounds. Can be built into a stethoscope or wand configuration if you specify it. While great for general sound amplification, it is especially useful for detecting, pinpointing and recording (tape/compact disk / digital recorder is not included) special sounds that you cannot ordinarily hear well enough or pinpoint, such as biological sounds (eg: wildlife (eg: birds, herd animals, predators, fish, game), hidden / buried animals / insects / crawling insects (eg: termites, ants, prairie dogs, moles)), biomedical sounds (eg: heartbeat, pulse, digestion, breathing), mechanical sounds (eg: engine noises, weird home and vehicle noises), water leaks, flooding, burning sounds, cooking sounds), natural sounds (eg: wind sounds, ocean sounds, storms, thunder, tornadoes, hurricanes, floods, earthquakes, tsunamis), distant sounds (eg: someone coming up your driveway, the mailman, the delivery, cable, phone, utility or repair guy, someone talking or yelling at a distance), unseen dangers (eg: wild animals, feral animals, burglars, peeping toms, stalkers, muggers, creeps, eavesdroppers), and for ghostbusting and ferreting out other hidden earthly and alien beings. The ultra-sensitive audio pickup of this device is mounted on a 6' pole - easy to point at suspected areas including bushes, trees, attics, crawl spaces, holes, underneath beds, underneath vehicles, darkened rooms, ground, underneath storm debris and other items, roof, nooks and crannies. Highly directional. Portable and battery-operated. Tunable sensitivity. For SSUHGSAD-type with 3 tunable bands, last made $695 [3 lb]. For SSUHGSAD-type with 6 tunable bands for ultra sound isolation and pinpointing, last made $895 [3 lb]. If you want two sections of these to form an electronically matched stereoscopic-type device with much increased sound direction pinpointing ability and sensitivity - sort of "bionic ears" - for 3 tunable bands, last made $1295 [3 lb], for 6 tunable bands, last made $1695 [5 lb].

The ULTRA ON DEVICES DETECTOR: Tired of hidden illegal recorders and other electronic devices monitoring or harassing you (analog and digital devices)? Most electronic equipment leak some audio and/or RF noise when turned ON - even if not radio transmitters. And as most are battery-operated, this leakage may be the only way to electronically detect their presence. Highly directional and sensitive electronic sniffer. Tunable gain to about 1,000,000. Last made $495 [2 lb].

The LONG-RANGE INFRARED DETECTOR: Detect the presence of things that generate heat without having to see or hear them first! The LRITD is an ultra-sensitive infrared (IR) detector that will alert you to heat sources up to about 200 feet away. The LRITD includes LED beeper indicators as well as switched 9 VDC and relay closure outputs (eg: for burglar alarm uses). The LRITD can also be used to detect when a heat source leaves an area (eg: to monitor a child or pet). And to verify when equipment is turned or left ON or OFF because most operating equipment generate some heat. Can sometimes be used to verify which rooms and areas are occupied by people or animals when they are not visible to you. And helps you detect the presence of hidden operating equipment, such as surveillance devices. And helps you detect the loss of heat from your home, business, or buried/concealed hot water lines and hot water line leaks to help save heating costs. Uses a unique, rugged, and highly effective method of concentrating heat in its detector unit for much greater sensitivity. Particularly sensitive to the 7-14nm IR range of human and (most) animal body heat. Last made $495 [2 lb].

Introduction to this Page
Customized Devices Application Form (CDAF)

HIGH-TECH SECURITY AND SURVIVAL BOOKS, MANUALS, SOFTWARE, CONSULTING SERVICES: PLEASE NOTE, we are NOT CONSUMERTRONICS.NET (P.O. Box 23097, Albuquerque, NM 87192) (www.consumertronics.net) - famous for their many frank and controversial high-tech survival books, manuals and software. The two businesses are totally separate entities. Neither one owns the other nor is a subsidiary of the other. If you wish to do business with CONSUMERTRONICS.NET, please contact them DIRECTLY.

OFF-THE-SHELF AND OVER-THE-COUNTER HARDWARE OF ALL TYPES: PLEASE NOTE, we are NOT TECHZONICS.COM (a subsidiary of Consumertronics) - famous for their huge variety of hardware offerings, especially electronic parts. The two businesses are totally separate entities. Neither one owns the other nor is a subsidiary of the other. If you wish to do business with TECHZONICS.COM, please contact them DIRECTLY.

(More on these privacy and other policies on our www.lonestarconsultinginc.com/policies.htm) webpage.

ITEMS WANTED TO BUY/TRADE
Can't spare the bucks to pay for your order? Want some of the items listed above but have some of your own that you would like to use as trade? Don't fret - you can still get what you want for little or no out-of-pocket-$ if you have an item(s) of trade we are interested in! If you don't want to trade, we may consider buying what you offer. Either way, let us know.
Most of the specific items we are interested in are described on (email us first as there are some differences): www.consumertronics.net/items4trade.htm (Consumertronics Publisher of High-Tech Survival and Security Books, Manuals and Software, and Consultants).

Introduction to this Page
Customized Devices Application Form (CDAF)

Customers, Clients, Contributors:
Relevant Topics, Titles to the Many Device Types We Do

SINGLE WORDS: The ammo. The ammunition. The assault. The battery. The brainwashing. The burglary. The chemistry. The CIA. The consultants. The consulting. The Consumertronics. The Consumertronics.net. The countermeasures. The cryptography. The disguises. The eavesdropping. The eavesdroppers. The FBI. The fireworks. The guns. The harassment. The IDs. The improvised. The interception. The jobs. The NSA. The polygraph. The polygraphs. The pranks. The privacy. The rape. The revenge. The rockets. The rocketry. The security. The silencers. The spying. The stalking. The surveillance. The survival. The theft. The tutorials.

A-B: The "amateur rocketry." The "art of concealment." The "assault and battery." The "assault weapons." The "assaulters and muggers." The "auto burglary." The "auto theft." The "auto theft countermeasures." The "avoid speeding tickets." The "awesome circuit designs." The "awesome circuits." The "awesome devices." The "awesome electronic devices." The "awesome electronic gadgets." The "awesome electronics." The "awesome equipment." The "awesome gadgets." The "awesome hardware." The "awesome products." The "awesome projects." The "awesome science projects." The "awesome special projects." The "banking and financial." The "basic survival." The "basic survival skills." The "basic survival training." The "booby traps." The "breaking and entering." The "bug sweep devices." The "bug sweep equipment." The "bug sweep experts." The "bug sweep hardware." The "bug sweep methods." The "bug sweep services." The "bug sweep systems." The "bug sweep techniques." The "bug sweep technology." The "bug sweep tips." The "bug sweeping devices." The "bug sweeping equipment." The "bug sweeping experts." The "bug sweeping hardware." The "bug sweeping methods." The "bug sweeping services." The "bug sweeping systems." The "bug sweeping techniques." The "bug sweeping technology." The "bug sweeping tips." The "building security." The "bulletproof vests." The "bumper beepers." The "burglar alarm systems." The "burglar alarms." The "burglars and home invaders." The "business security."

C: The "car burglary." The "car modifications." The "car theft." The "career advancement." The "career success." The "change identities." The "child finders." The "child security." The "civilian detainees." The "civilian internees." The "civil rights." The "clamps." The "clampings." The "computer countermeasures." The "computer equipment." The "computer hardware." The "computer method." The "computer methods." The "computer monitor security." The "computer monitors." The "computer privacy." The "computer privacy measures." The "computer security." The "computer security products." The "computer strategies." The "computer strategy." The "computer surveillance." The "computer survival." The "computer survival products." The "computer tactic." The "computer tactics." The "computer technique." The "computer techniques." The "constitutional rights." The "cool circuit designs." The "cool circuits." The "cool devices." The "cool electronic devices." The "cool electronic gadgets." The "cool electronics." The "cool equipment." The "cool gadgets." The "cool hardware." The "cool products." The "cool projects." The "cool science projects." The "cool special projects." The "counterintelligence technology." The "countermeasure equipment." The "countermeasure strategies." The "countermeasure tactics." The "countermeasure target." The "crime fighting." The "crime scene investigations." The "crime scene investigators." The "criminal countermeasures." The "criminal fraud." The "CSI detectives." The "CSI programs." The "crime scene science." The "crime scene technology."

D-G: The "data card readers." The "data protection." The "data privacy protection." The "data theft protection." The "data theft prevention." The "detained persons." The "direction finders." The "direction finding antennas." The "dirty trick." The "dirty tricks." The "doppler radar." The "dwelling security." The "electronic attack." The "electronic bug sweep technology." The "electronic harassment." The "electronic jamming." The "electronic security." The "ultrasonic shielding." The "electronic survival." The "equipment source list." The "fake qualifications." The "faking qualifications." The "fight auto theft." The "fight assault and battery." The "fight attack." The "fight auto burglary." The "fight auto theft." The "fight being fired." The "fight breaking and entering." The "fight car burglary." The "fight car theft." The "fight computer hacking." The "fight computer hackers." The "fight crimes." The "fight criminals." The "fight government abuse." The "fight hacking." The "fight hackers." The "fight harassment." The "fight home burglary." The "fight home invasion." The "fight ID theft." The "fight identity theft." The "fight invasion of privacy." The "fight police abuse." The "fight police brutality." The "fight privacy invasion." The "fight rape." The "fight robbery." The "fight scams." The "fight stalkers." The "fight stalking." The "fight swindles." The "fight swindlers." The "fight terrorism." The "fight terrorists." The "fight theft." The "fight the government." The "fight the police." The "fighting crime." The "fighting terrorism." The "financial and banking." The "find employment." The "find jobs." The "flash guns." The "flash weapons." The "forensic investigations." The "forensic investigators." The "forensic science." The "forensic technology." The "game without rules." The "garage door openers." The "gate openers." The "getting hired." The "getting promoted." The "guarantee job promotions." The "guarantee job security." The "guns and ammo." The "guns and ammunition." The "gun silencers."

H: The "hacker files." The "hacker techniques." The "hackers and phreakers." The "harassment and revenge." The "hiding people." The "hiding places." The "hiding things." The "high voltage devices." The "high tech consultants." The "hi-tech consultants." The "high tech consulting." The "hi-tech consulting." The "high tech devices." The "hi-tech devices." The "high tech equipment." The "hi-tech equipment." The "high tech hardware." The "hi-tech hardware." The "high tech offers." The "hi-tech offers." The "high tech products." The "hi-tech products." The "high tech services." The "hi-tech services." The "high tech security consultants." The "hi-tech security consultants." The "high tech security consulting." The "hi-tech security consulting." The "high tech security devices." The "hi-tech security devices." The "high tech security equipment." The "hi-tech security equipment." The "high tech security hardware." The "hi-tech security hardware." The "high tech security offers." The "hi-tech security offers." The "high tech security products." The "hi-tech security products." The "high tech security services." The "hi-tech security services." The "high tech survival consultants." The "hi-tech survival consultants." The "high tech survival consulting." The "hi-tech survival consulting." The "high tech survival devices." The "hi-tech survival devices." The "high tech survival equipment." The "hi-tech survival equipment." The "high tech survival hardware." The "hi-tech survival hardware." The "high tech survival offers." The "hi-tech survival offers." The "high tech survival products." The "hi-tech survival products." The "high tech survival services." The "hi-tech survival services." The "home invaders." The "home invasion alarm systems." The "home invasion alarms." The "horizontal scan frequencies." The "horizontal scan rates." The "home burglary and home invasion." The "home invaders and burglars." The "home invasion and home burglary." The "home security." The "house security." The "human rights."

How to prevent: The "how to change your ID." The "how to change your identity." The "how to escape." The "how to hide." The "how to hide people." The "how to hide things." The "how to prevent auto theft." The "how to prevent assault and battery." The "how to prevent attack." The "how to prevent auto burglary." The "how to prevent auto theft." The "how to prevent being fired." The "how to prevent breaking and entering." The "how to prevent car burglary." The "how to prevent car theft." The "how to prevent computer hacking." The "how to prevent computer hackers." The "how to prevent crimes." The "how to prevent criminals." The "how to prevent government abuse." The "how to prevent hacking." The "how to prevent hackers." The "how to prevent harassment." The "how to prevent home burglary." The "how to prevent home invasion." The "how to prevent ID theft." The "how to prevent identity theft." The "how to prevent invasion of privacy." The "how to prevent police abuse." The "how to prevent police brutality." The "how to prevent privacy invasion." The "how to prevent rape." The "how to prevent robbery." The "how to prevent scams." The "how to prevent stalkers." The "how to prevent stalking." The "how to prevent swindles." The "how to prevent swindlers." The "how to prevent terrorism." The "how to prevent terrorists." The "how to prevent theft." The "how to prevent the government." The "how to prevent the police."

How to protect - How to stop: The "how to protect your family." The "how to protect your identity." The "how to protect your privacy." The "how to protect your property." The "how to protect yourself." The "how to stop auto theft." The "how to stop assault and battery." The "how to stop attack." The "how to stop auto burglary." The "how to stop auto theft." The "how to stop being fired." The "how to stop breaking and entering." The "how to stop car burglary." The "how to stop car theft." The "how to stop computer hacking." The "how to stop computer hackers." The "how to stop crimes." The "how to stop criminals." The "how to stop government abuse." The "how to stop hacking." The "how to stop hackers." The "how to stop harassment." The "how to stop home burglary." The "how to stop home invasion." The "how to stop ID theft." The "how to stop identity theft." The "how to stop invasion of privacy." The "how to stop police abuse." The "how to stop police brutality." The "how to stop privacy invasion." The "how to stop rape." The "how to stop robbery." The "how to stop scams." The "how to stop stalkers." The "how to stop stalking." The "how to stop swindles." The "how to stop swindlers." The "how to stop terrorism." The "how to stop terrorists." The "how to stop theft." The "how to stop the government." The "how to stop the police."

I: The "ID changes." The "identity changes." The "improvised commo." The "improvised communications." The "improvised explosives." The "improvised firearms." The "improvised radio." The "improvised security." The "improvised survival." The "improvised weapons." The "improvised weaponry." The "identity changes." The "identity fraud." The "identity security." The "identity theft." The "identity theft prevention." The "industrial security systems." The "intelligence agencies." The "interception of computers." The "interception of phone." The "interception of phones." The "interception of radio." The "internet privacy." The "internet privacy measures." The "internet security." The "internet security products." The "internet security solutions." The "internet security systems." The "internet survival." The "intrusion alarm systems."

J-M: The "jam radar." The "job promotions." The "job security." The "keep job." The "laser countermeasures." The "laser guidance." The "laser guided systems." The "lie detector." The "lie detectors." The "mac computer monitors tempest surveillance." The "mac monitors tempest surveillance." The "Machiavellian tactics." The "Machiavellian techniques." The "mda computer monitors." The "mda monitors." The "microwave bug sweep technology." The "microwave countermeasures." The "microwave equipment." The "microwave hardware." The "microwave method." The "microwave methods." The "microwave privacy." The "microwave privacy measures." The "microwave security." The "microwave security products." The "microwave strategies." The "microwave strategy." The "microwave survival." The "microwave survival products." The "microwave tactic." The "microwave tactics." The "microwave technique." The "microwave techniques." The "mind control." The "modern security." The "modern survival." The "muggers and assaulters." The "multisync computer monitors tempest surveillance." The "multisync monitors tempest surveillance." The "multitools."

N-PQ: The "natural rights." The "non-video tempest techniques." The "office dirty tricks." The "office guerilla warfare." The "office politics." The "office tactics." The "online fraud." The "outrageous circuit designs." The "outrageous circuits." The "outrageous devices." The "outrageous electronic devices." The "outrageous electronic gadgets." The "outrageous electronics." The "outrageous equipment." The "outrageous gadgets." The "outrageous hardware." The "outrageous products." The "outrageous projects." The "outrageous science projects." The "outrageous special projects." The "panic alarms." The "panic rooms." The "pbx security." The "pc computer monitors." The "pc monitors." The "peeping toms." The "personal privacy security." The "personal security." The "phone security." The "phony qualifications." The "physical security." The "physical survival." The "police abuse." The "police brutality." The "police practices." The "police radar." The "police tactics." The "prepared preppers." The "prepper survivalists." The "preppers."

Prevent - Prof: The "prevent assault and battery." The "prevent attack." The "prevent auto burglary." The "prevent auto theft." The "prevent being fired. The "prevent breaking and entering." The "prevent car burglary." The "prevent car theft." The "prevent computer hacking." The "prevent computer hackers." The "prevent crimes." The "prevent criminals." The "prevent government abuse." The "prevent hacking." The "prevent hackers." The "prevent harassment." The "prevent home burglary." The "prevent home invasion." The "prevent ID theft." The "prevent identity theft." The "prevent invasion of privacy." The "prevent police abuse." The "prevent police brutality." The "prevent privacy invasion." The "prevent rape." The "prevent robbery." The "prevent scams." The "prevent speeding tickets." The "prevent stalkers." The "prevent stalking." The "prevent swindles." The "prevent swindlers." The "prevent terrorism." The "prevent terrorists." The "prevent theft." The "prevent the government." The "prevent the police." The "prisoners of war." The "professional auto thieves."

Protect: The "protect yourself." The "protect yourself against assault and battery." The "protect yourself against attack." The "protect yourself against auto burglary." The "protect yourself against auto theft." The "protect yourself against breaking and entering." The "protect yourself against car burglary." The "protect yourself against car theft." The "protect yourself against computer hacking." The "protect yourself against computer hackers." The "protect yourself against crimes." The "protect yourself against criminals." The "protect yourself against government abuse." The "protect yourself against hacking." The "protect yourself against hackers." The "protect yourself against harassment." The "protect yourself against home burglary." The "protect yourself against home invaders." The "protect yourself against home invasion." The "protect yourself against home invasion." The "protect yourself against ID theft." The "protect yourself against identity theft." The "protect yourself against invasion of privacy." The "protect yourself against muggers." The "protect yourself against peeping toms." The "protect yourself against police abuse." The "protect yourself against police brutality." The "protect yourself against privacy invasion." The "protect yourself against rape." The "protect yourself against rapists." The "protect yourself against robbery." The "protect yourself against scams." The "protect yourself against sex offenders." The "protect yourself against stalkers." The "protect yourself against stalking." The "protect yourself against swindles." The "protect yourself against swindlers." The "protect yourself against terrorism." The "protect yourself against terrorists." The "protect yourself against theft." The "protect yourself against the government." The "protect yourself against the police."

The "protect yourself from assault and battery." The "protect yourself from attack." The "protect yourself from auto burglary." The "protect yourself from auto theft." The "protect yourself from breaking and entering." The "protect yourself from burglars." The "protect yourself from car burglary." The "protect yourself from car theft." The "protect yourself from computer hacking." The "protect yourself from computer hackers." The "protect yourself from crimes." The "protect yourself from criminals." The "protect yourself from government abuse." The "protect yourself from hacking." The "protect yourself from hackers." The "protect yourself from harassment." The "protect yourself from home burglary." The "protect yourself from home invaders." The "protect yourself from home invasion." The "protect yourself from ID theft." The "protect yourself from identity theft." The "protect yourself from invasion of privacy." The "protect yourself from muggers." The "protect yourself from peeping toms." The "protect yourself from police abuse." The "protect yourself from police brutality." The "protect yourself from privacy invasion." The "protect yourself from rape." The "protect yourself from rapists." The "protect yourself from robbery." The "protect yourself from scams." The "protect yourself from sex offenders." The "protect yourself from stalkers." The "protect yourself from stalking." The "protect yourself from swindles." The "protect yourself from swindlers." The "protect yourself from terrorism." The "protect yourself from terrorists." The "protect yourself from theft." The "protect yourself from the government." The "protect yourself from the police."

Q-SD: The "radar bug sweep technology." The "radio countermeasures." The "radio devices." The "radio dx devices." The "radio dx equipment." The "radio dx hardware." The "radio dx methods." The "radio dx systems." The "radio dx techniques." The "radio dx technology." The "radio dx tips." The "radio equipment." The "radio hardware." The "radio methods." The "radio privacy." The "radio privacy measures." The "radio security." The "radio security products." The "radio strategies." The "radio strategy." The "radio survival." The "radio survival products." The "radio systems." The "radio tactics." The "radio technique." The "radio techniques." The "radio technology." The "radio tips." The "radio tscm devices." The "radio tscm equipment." The "radio tscm hardware." The "radio tscm methods." The "radio tscm systems." The "radio tscm techniques." The "radio tscm technology." The "radio tscm tips." The "rf dx devices." The "rf dx equipment." The "rf dx hardware." The "rf dx methods." The "rf dx systems." The "rf dx techniques." The "rf dx technology." The "rf dx tips." The "rf devices." The "rf equipment." The "rf hardware." The "rf methods." The "rf systems." The "rf techniques." The "rf technology." The "rf tips." The "radar concealment." The "radar countermeasures." The "radar invisibility" The "radiation detection." The "radiation detector." The "radio bug sweep technology." The "rapists and sex offenders." The "revenge and pranks." The "rockets red glare." The "room bugs." The "room bug receivers." The "room bug transmitters." The "rural security." The "rural survival."

The "science project." The "science projects." The "secret alarms." The "secret hiding places." The "secret spying." The "secret surveillance." The "sex offenders and rapists." The "stalker surveillance."

Secure - Security: The "security and survival." The "security books." The "security checklist." The "secure communications." The "security communications." The "security companies." The "secure computer." The "security computers." The "security computing." The "security countermeasures." The "secure device." The "security devices." The "secure electronics." The "security electronics." The "secure equipment." The "security equipment." The "secure facility." The "security facility." The "security facts." The "secure frequencies."

The "security frequencies." The "security fraud." The "security gate openers." The "security guide." The "security guides." The "security guns." The "secure hardware." The "security hardware." The "security holes." The "secure information." The "security information." The "security manual." The "security manuals." The "security measures." The "security online." The "security personnel." The "security plans." The "security preparations." The "security problems." The "security products." The "secure radio." The "security radio." The "security research." The "security services." The "security skills." The "security solutions." The "security special projects." The "security strategies." The "security strategy." The "security system." The "security systems." The "security tactic." The "security tactics." The "security technique." The "security techniques." The "security toolkit." The "security tools." The "security training." The "security tutorial." The "security tutorials." The "security vulnerabilities." The "security weapons." The "security receivers." The "security transceivers." The "security transmitters."

The "security consultants." The "security consulting services." The "security customized device services." The "security customized devices." The "security development services." The "security designs." The "security design services." The "security devices." The "security equipment." The "security hardware." The "security invention laboratory services." The "security invention prototyping services." The "security invention services." The "security inventions." The "security inventors." The "security laboratory services." The "security laboratories." The "security merchandise." The "security product creation services." The "security product development services." The "security product services." The "security product researchers." The "security products." The "security prototype services." The "security prototypes." The "security prototyping services." The "security repair services." The "security R&D services." The "security research, design and development services." The "security research laboratories." The "security research services." The "security researchers." The "security services." The "security special projects services." The "security special services." The "security testers." The "security testing laboratories." The "security testing services." The "security troubleshooters." The "security troubleshooting services."

SE-SZ: The "self defense." The "self-defense." The "sex as a tool." The "sex as a weapon." The "silence is golden." The "silent alarms." The "solid propellant rockets." The "sound detectors." The "sound detection systems." The "special projects." The "speeding tickets." The "spy agencies." The "spy receivers." The "spy transceivers." The "spy transmitters." The "stealth mixture." The "stealth paint." The "stealth techniques." The "stealth technology." The "stealth aircraft. The "stealth auto." The "stealthed auto." The "stop auto thefts." The "stop assaults and batteries." The "stop attacks." The "stop auto burglary." The "stop auto theft." The "stop being fired." The "stop breaking and entering." The "stop business burglaries." The "stop business invasions." The "stop car burglaries." The "stop car thefts." The "stop computer hacking." The "stop computer hackers." The "stop crimes." The "stop criminals." The "stop government abuse." The "stop hacking." The "stop hackers." The "stop harassment." The "stop home burglaries." The "stop home invasions." The "stop ID theft." The "stop identity theft." The "stop invasion of privacy." The "stop police abuse." The "stop police brutality." The "stop privacy invasion." The "stop rape." The "stop robbery." The "stop scams." The "stop stalkers." The "stop stalking." The "stop swindles." The "stop swindlers." The "stop terrorism." The "stop terrorists." The "stop theft." The "stop the government." The "stop the police." The "suburban security." The "stop traffic tickets." The "stun guns." The "stun weapons." The "suburban survival." The "success manual." The "success tutorial." The "svga computer monitors." The "svga monitors." The "surveillance devices." The "surveillance equipment." The "surveillance receivers." The "surveillance tools." The "surveillance toolkit." The "surveillance transceivers." The "surveillance transmitters."

Survival: The "survival and security." The "survival books." The "survival checklist." The "survival communications." The "survival companies." The "survival computers." The "survival computing." The "survival countermeasures." The "survival devices." The "survival electronics." The "survival equipment." The "survival facility." The "survival facts." The "survival frequencies." The "survival fraud." The "survival guide." The "survival guides." The "survival guns." The "survival hardware." The "survival holes." The "survival information." The "survival manual." The "survival manuals." The "survival measures." The "survival online." The "survival personnel." The "survival plans." The "survival preparations." The "survival problems." The "survival products." The "survival radio." The "survival research." The "survival services." The "survival skills." The "survival solutions." The "survival special projects." The "survival strategies." The "survival strategy." The "survival system." The "survival systems." The "survival tactic." The "survival tactics." The "survival technique." The "survival techniques." The "survival toolkit." The "survival tools." The "survival training." The "survival tutorial." The "survival tutorials." The "survival vulnerabilities." The "survival weapons." The "survival receivers." The "survival transceivers." The "survival transmitters."

The "survival consultants." The "survival consulting services." The "survival customized device services." The "survival customized devices." The "survival development services." The "survival designs." The "survival design services." The "survival devices." The "survival equipment." The "survival hardware." The "survival invention laboratory services." The "survival invention prototyping services." The "survival invention services." The "survival inventions." The "survival inventors." The "survival laboratory services." The "survival laboratories." The "survival merchandise." The "survival preppers." The "survival product creation services." The "survival product development services." The "survival product services." The "survival product researchers." The "survival products." The "survival prototype services." The "survival prototypes." The "survival prototyping services." The "survival repair services." The "survival R&D services." The "survival research, design and development services." The "survival research laboratories." The "survival research services." The "survival researchers." The "survival services." The "survival special projects services." The "survival special services." The "survival testers." The "survival testing laboratories." The "survival testing services." The "survival tools." The "survival toolkit." The "survival troubleshooters." The "survival troubleshooting services." The "survivalist preppers." The "survivalists." The "svga computer monitors." The "svga monitors."

T-Z: The "tactical and survival specialties." The "technical security technology." The "technical surveillance counter measures technology." The "techno toolkit." The "techno tools." The "teleco security technology." The "telecom security technology." The "telco security technology." The "telecommunications security technology." The "telephone security." The "tempest detection." The "tempest devices." The "tempest equipment." The "tempest hardware." The "tempest methods." The "tempest techniques." The "theft prevention." The "threat of criminals." The "threat of the government." The "threat of terrorism." The "tools." The "tracking transmitter receivers." The "tracking transmitters." The "transmitter direction finders." The "transmitter direction finding antennas." The "transmitter triangulators." The "truck burglary." The "truck modifications." The "truck theft." The "tscm bug sweep technology." The "tscm countermeasures." The "tscm devices." The "tscm equipment." The "tscm hardware." The "tscm experts." The "tscm methods." The "tscm security systems." The "tscm systems." The "tscm technology." The "tscm testing." The "tv monitors." The "tv security." The "tv surveillance." The "typical security situations." The "typical survival situations."

The "ultimate success manual." The "ultrasonic attack." The "ultrasonic harassment." The "ultrasonic jamming." The "ultrasonic shielding." The "underground resistance." The "urban resistance." The "urban security." The "urban survival." The "wxga computer monitors." The "wxga monitors." The "van eck devices." The "van eck monitoring." The "van eck monitors." The "van eck receivers." The "van eck spying." The "van eck surveillance." The "van eck systems." The "van eck tempest devices." The "van eck tempest monitoring." The "van eck tempest monitors." The "van eck tempest receivers." The "van eck tempest spying." The "van eck surveillance." The "van eck tempest systems." The "vehicle bugs." The "vehicle bug transmitters." The "vehicle burglary." The "vehicle burglaries." The "vehicle modifications." The "vehicle security." The "vehicle spying transmitters." The "vehicle surveillance transmitters." The "vehicle thefts." The "vehicle tracking transmitter receivers." The "vehicle tracking transmitters." The "vibration alarm systems." The "vibration detection systems." The "voice changers." The "voice disguisers." The "Wavecom technology." The "wifi technology." The "Wireless Audio Video Everywhere Communicator technology." The "workstation computer monitors." The "workstation monitors." The "worst case scenario survival." The "xga computer monitors." The "xga monitors."

Great LONE STAR CONSULTING, INC. Products and Services!

Like what we offer and have a website? Then please put free hotlink to our home page => Lonestarconsultinginc.com

Copyright © 2001-2024, LONE STAR CONSULTING, INC. Absolutely all Rights Reserved


       IMAGE SPONSORED BY:
 Consumertronics
 Lone Star Consulting, Inc.
 ABQ-Techzonics
       REPRINT POW-MIA IMAGE=>
             ON YOUR WEBSITE

NOTE 1: We make no medical, legal, scientific, engineering, supernatural or paranormal claims including but not limited to claims about the existence, extent, intentions, purposes and capabilities of space aliens, ghosts, spirits, psychic powers, psionics, mental telepathy, precognition, auras, clairvoyance, remote viewing and pschokinesis - all related CD projects we do are based on our proprietary theories SHOULD they actually exist AND if the customer does not clearly specify in his/her CDAF another theory he/she wants the CD device design to be based upon.

NOTE 2: By policy, we never recommend for or against, approve or disapprove, sponsor, endorse, support, guarantee, or take any responsibility for any of the content of any non-Lone Star Consulting, Inc. webpage, website, advertisement, publication or other statement EVEN IF WE HAVE PROVIDED A HOTLINK TO IT. And by policy, we never recommend for or against, approve or disapprove, sponsor, endorse, support, guarantee, or take any responsibility for any company, person, product or service EVEN IF WE HAVE PROVIDED A HOTLINK TO IT. For more information on our policies, please refer to our policies.htm webpage.
Webmaster's Test Links only - not for visitor use: Source-A Source-D Source-E Source-F Source-G Source-H Source-I Source-J Source-K Source-L Source-M Source-N Source-P Source-Q Source-R