Smart Phone EMF App No Value to TIs


Targeted Individuals are desperate to find verifiable proof they are electronically targeted. Unfortunately, many turn to cell phone EMF meter apps… which are useless for the purpose. Here is the right way to do it.

 x

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
x

What you will learn reading this post…

  x
• Smart phone EMF Apps don’t work they way you think;
• What will work for TI needs;
• The types of threats a meter can see, and cannot see;
• Some common false assumptions TIs make that impact understanding
  x

Smart phone EMF Apps can’t ‘see’ targeting signals

  x
Unknown-10.jpegSmart phones have built-in EMF (b) detectors, which some App makers have taken advantage of to simulate EMF meters. Not quite the same thing. Cell phone detectors are designed to measure the Earth’s natural DC magnetic field in three axis. This allows them to compare sudden changes to ‘compute’ movement of the phone for game interaction. NOTHING MORE, unless you are looking for a large buried iron-bearing rock; same technology as a metal detector, just less sensitive. The detectors can also be used in other Apps, such as levels and compasses.
  x
To see targeting EMF and RF, you need a meter designed to measure RF and fields generated by 60 cycle electrical equipment, and the kind of EMF they generate. Such meters, unlike cell phones, are intended to be aimed directionally at a given source; they can show you where a signal originates. This is perhaps the best reason to own one. Some are type B (preferred), and some are not, to make them cheaper, and somewhat less useful.
  x
Preferably, it should have a very broad band of frequency sensitivity, because there are many kinds of targeting tech, most of which can generate symptoms which mislead the victim into false presumptions about which kind of an attack they are dealing with. A meter with a broad band can better define the type of attack correctly. Unfortunately, low cost meters will not see bands broad enough to deal directly deal with or identify microwave the way a TI would like. Some meters, such as those mentioned herein, can still read and quantify their energy, however.

You have to know what you are looking for

 x
You must choose your meter based on the kind of attack(s) you suffer. You can’t scan for an attack which does not exist, either because you think its one kind of attack, but its another, or because there is no such technology in play. The real problem is, that very few TI’s actually know precisely what kind of attacks signals are levied against them… save V2S and microwave burns, which are pretty unmistakable. Out of 12,000 TIs I’ve dealt with over several decades, I can count the number who correctly understood the technical truth of their problem on one hand. And  there are several reasons why that is true.
For one thing, many symptoms can often be the same regardless of tech employed. I break symptoms down in my book, MC Realities. For another, the enemy will invariably seek to insure you get it wrong, by leaving false clues or having fake TI personna give you bad advice, and by employing professional dissinformation methods, to include phony retired intelligence agents who ‘come clean’ and ‘expose’ the technology. Never happened. They do this because they know you can’t fight them if you respond with the wrong weapons/methods, and because it makes you look insane to professionals from whom you might seek help (i.e., Cops, Lawyers, PIs, Doctors). Then, well meaning TI’s spread that disinformation as gospel, and muddy the waters further with their own versions. Here is a great example:
x
A lot of TIs think Remote Neural Monitoring is an attack tech that reads their mind or puts thoughts into one’s head, or that it has something to do with satellites, and fully a half-dozen other things it does or relates to. The Web is awash with countless pages saying RNM is mind control of this, that, or another flavor, but not one of them is an authoritative source citing the truth. NO, it is not, does not. RNM as a term relates to nothing a TI ought worry about, at least currently; it is based on use of a room full of super computer power directly wired to countless electrodes physically attached to the head of the subject, and does not directly read thoughts. It instead catalogs the brain wave patterns ALONG WITH the user’s verbalized thoughts.
  x
Subsequently, the computer can then compare brainwaves against known thoughts to find matches. It cannot put thoughts into the user’s head, and it hardly qualifies for field use against unwitting persons as political control technology. Some efforts along this line have also managed low quality video depictions of what the subject was seeing. In order to do that, they had to remove the skull cap of the victim, a Cat, and put over 1,000 probes directly into the brain, causing the Cat to die fairly soon afterwards. The term RNM has been misused and spread by TIs mislead by disinformation or persons who did not understand what they were reading in a scientific report, or description thereof in media. The term RNM was never even used in the scientific papers, but popped up in a news article summarizing the paper. From there, it was hijacked to become a fiction.
 x
Note: there is ALSO a patent often cited as proof of RNM, even in other patents, and in books by disinformationalists — which would SEEM to be as claimed, and which is the basis for ‘satelite targeting’ claims (along with ‘exposed truth’ by ‘ex intelligence types’). But in fact, the baseline patent, as well as any relying upon it, are bogus, in that it/they cannot work as described. It must be presumed the patent office took their word for it; if the reviewing staff at the patent office were not technically up on radio frequency technology, they might not have spotted the flaw. Patent #US3591134 A Apparatus and Method for Remotely Monitoring and Altering Brain Waves… essentially beams two radio waves at the brain, and expects the brain’s own radio frequencies to be modulated onto the them, and then captured by a radio receiver for processing, analyzing, and optionally then modifying and beaming them back yet again into the brain to alter thought.
x
CAN’T WORK: radio waves don’t modulate one another. If they did, all radio waves would carry the signals of all other radio waves, and AM/FM radios would not work, they would be confused. Modulation is achieved by electronic circuitry BEFORE broadcast; exactly what AM and FM radio does; audio is modulated onto the broadcast frequency, and decoded in the radio. If this patent, and remaining patents based upon it actually worked, they would be picking up not only the original signal, but modulated signals from every radio signal out there, and every brain within range, and be unable to separate one from another. Exactly this protest has been made on this patent, and the patent is no longer in force. It is presumed someone thought they had a great idea, and patented it without proof of concept, because they could not afford to develop working prototypes, and in hopes someone who could afford it, would pay them for patent rights, to do so. The same is likely true of the patents based upon it. Who knows? Perhaps the patent was actually itself a disinformation effort.
x
And while we are on topic, satelite targeting also does not exist, at least not the way most TIs believe. A Satelite is too expensive to target an individual, for one thing. To do so, it would need to be tasked, taking it away from other duties. No TI is so important to justify billions of dollars in hardware just on them, especially given the number of TIs who so beleive. More importantly, its simply not possible. You might be able to broadcast subliminal information or EEG entrainment signals to the entire service area of a Satellite, but not an individual, unless the individual had a satellite dish and decoder built into his head to isolate signals meant for him, alone. Moreover, a satellite could never read an individual’s brainwaves unless the he had a very LARGE and specifically aimed dish in his head.
If a TI were to worry about mind reading or having thoughts put into their head, such does not quite exist, though it can be simulated such that the target presumes it so. That requires an implant, and is not likely to be easily discovered with an EMF meter. All it does is read your brain’s EEG signals for that little voice in your head, which is you talking to yourself. That voice is also used by your EGO to cause you to react badly to stimuli. An implant which reads your brain’s EEG signals representing the 26 phonemes used to make up words can relay that by radio to a computer which can translate it to text in real time. The operator can then respond if desired via the implant using incorporated V2S ‘bonefone’ technology, or perhaps, simulate your own internal voice making you think ‘you’ thought that thought. There is no information or evidence suggesting the later capability exists; it is mere theory, but it is plausible. This implant is known and documented technology.
 x
From my book, MC Realities: I direct you to a Dec. 18, 2000 article from the Albany Times Union, by Andrew Brownstein — a piece entitled University of Albany Suspends Mind Control Implant Research Project. This reveals current working capabilities are well beyond those demonstrated thus far. Excerpts begin — as dramatic a smoking gun as I’ve ever seen… “The University at Albany, N.Y., has shut down a research project investigating the claims of individuals who believe that they were surgically implanted with communications devices which can read and transmit their thoughts. Professor Kathryn Kelley, a fully tenured psychology professor at the University at Albany, has focused her work in recent years on surgically implanted mind control devices. A brief statement released in August by university spokeswoman Mary Fiess said, ‘The university imposed the suspension [of Kelley’s research] because of serious concerns that the experiment did not meet the standards governing such projects on campus. While we work to gather all the facts in this case, we cannot comment further.” …In 1995, gunman Ralph Tortorici held a class of 37 students hostage at the University at Albany, claiming that the government had planted microchips in his body. Tortorici, who shot one of the students during a struggle, reportedly hanged himself in his state prison cell last summer.
920x920.jpgx
In spring of 1998, according to the Times Union, the university’s Psychology Department first became aware of Kelley’s interest in mind control technology when she posted a note on her office door announcing a lecture called ‘The Psychology of Invading the Self.’ The note reportedly described implant research funded by the National Security Agency and the Department of Defense with an annual budget of $2 billion. The note stated the devices were typically implanted in ‘uninformed, nonconsensual subjects” who were usually ‘federal prisoners and political dissidents.’  The newspaper has since had the article disappear from their files, but other newspaper articles reference the event, which is where I obtained the image.
 x
But there is also an attack tech somewhat similar to RNM’s claimed methodolgy which does not use an implant: EEG entrainment. It operates in the ELF (Extra Low Frequency) RF spectrum at brain wave frequencies, typically 7-15 Hz. This is the tech used to control your wake/sleep/alertness and moods, by sending brainwave patterns as radio signals stronger than your brain’s, causing the brain to ‘adopt’ them. Very few EMF detectors operate this low, and so, are not likely to be able to document such use. I have one, but I had to pay $12,000 for it… and for that money, got a lot more functionality, as well.
 x
At the high end of the spectrum, microwave energies used to cause pain and other dirty tricks can operate beyond the UHF frequencies, between 3 and 300 GHz. Cell phones and wi-fi systems operate in the single digit GHz, but attack signals tend to be somewhere above 6Ghz, and well into double digits. Military systems can be over 50GHz, and into the hundreds. Again, low cost EMF meters cannot ‘see’ these higher frequencies, typically stopping at 3GHz. My $12K system can see to 12GHz, and is therefore still inadequate for all situations. But many meters, like the Trifield (.com) can at least see the ENERGY put out by such systems, and can therefore still be useful to know they are in use. They just can’t specify the frequency involved.
x
 x

How you use a meter is important

You should hold the meter flat looking down on it, and aim it at a suspect source. Stand and rotate rather slowly to find hot spots which represent suspect sources, for closer study. Move in on these — the closer you are, the more accurate and higher the reading will be; RF energy readings normally fall off at the square of the distance. Learn more about meters, use, and related issues not covered, here, from this earlier post. It includes, for example, information about stray voltage, smart meters, and relates the importance to a TI of EGO in the matter. Some information in that post is duplicated, here, to insure it is not overlooked.
 x
TrifieldMeterI very much like and used to sell the TriField — get the cheaper one, the more expensive one is trickier to use by a novice. I also used and sold the MicroAlert, same source, because you can set it for an attack threshold and it will automatically sound an alarm (pulsing beeps). When I was under attack, my bird actually learned to ‘beep’ back at it, it went off so often. Had to move the bird so I wouldn’t get the two confused; at that high a pitch, I couldn’t tell the source direction.microalert2
 x
Don’t aim meters upward unless there is something there you find suspect; the sky is full of RF energy which will invalidate reading usefulness. Take a reading of the suspect item and then compare by aiming at the same upward angle elsewhere, and subtract that reading to get the difference, which is the actual number of concern. Again, get as close as you can.
 x
Keep your fingers away from the business end of a meter, or your body will alter the reading. This is the trick used by fake implant finders. They choose a meter that has an audible threshold alarm like the Smart Alert, but fancier and more technical looking so they, as ‘experts,’ seem ‘smarter and more capable.’ They set the threshold such that they can move a finger set it off on cue, to ‘find’ an implant. “$50, please, shall I continue looking?”
 x
The truth is, meters are hardly useful to find implants. Unless the implant is broadcasting a radio signal, it is not seen at all. If it is broadcasting, it will be extremely difficult to find it while transmitting for numerous reasons, and unlikely unable to tell the implant signal from ambient RF, much less locate it on the body with any useful accuracy. The best way to find implants is with an MRI whole-body scan, but the trick there is to a) get someone to do a scan for the purpose, and b) get them to tell you they found something unusual. The medical community is not friendly to TI issues any more than are Police — which is to say, they will more likely send you to a psychiatrist for help.
 x
RFMeter-HF35C-L.jpgIf you want to find perp attack sources at distance, spend more and get a meter that accepts or includes a Yagi antenna, which dramatically narrows the angle of view and increases sensitivity at distance (again, signals fall off at the square of the distance). Where the meters mentioned above are well under $200, a meter such as the HF35C (German made: Gigahertz Solutions) with Yagi will tend to start at just under $400, but will be limited to high frequency ranges, only, and will STILL not see well into the microwave bands. So if you bought it or something as good, you should likely also get a TriField or similar, for lower ranges.
 x
Note: Almost always, an attack from distance will involve use of a Yagi system by the enemy. If you use a Yagi, your accuracy in angle of view may be good enough that you can use binoculars to spot their antenna. Scan the whole page of these examples of Yagi, and if you EVER find one of these directly aimed at your home, it is almost guaranteed to be an attack device; no such antenna should be aimed anywhere except at a radio/TV or Wifi broadcast source. They might just be after your wifi, but that is still an attack on you.
 x
In such a case, if you can get eye-witness or video document high RF coming from it, you have potential legal-quality evidence of targeting. Increase the usefulness in court by getting an RF expert to agree in testimony that it is a dangerously high reading, and ideally, to covertly himself identify its frequency and strength with more expensive equipment.
 x
The cheapest way to get a higher microwave readings is still over $1,000; The HFW59D, and you are still limited to 10 GHz. So you see that cost vs. performance into the higher GHz is quite a bell curve. But once you get much beyond a thousand dollars or more, you start to get into actual signal processors, and they tend to have a lot of useful features, such as data recording, safe level warnings, time/date stamps, computer interface, and so forth. And while those things are nice, they add such a complexity that even I balk at the notion, and I’ve taught digital electronics I and II at college level, and developed microwave-based security systems. I keep coming back to the TriField as the best overall low-cost single device solution for TIs at large.
 x
Be aware that there are ‘toys’ on the market which can look like better deals. I’ve seen a $129 meter claiming 8GHz, but it turns out to be nothing much more than an old cell phone using the signal strength indicator of the cell phone, and is non directional in capability; you can see the signal, but can’t tell where it comes from. You can spot this device, because it uses the old stubby cell phone antenna, instead of an actual EMF sensor. I would avoid any device using a cell phone antenna.
Advertisements

About Author H. Michael Sweeney

Author of privacy/security/abuse of power, Founder Free Will Society, PALADINs (Post Apocalyptic Local Area Defense Information Network)

Posted on May 31, 2017, in Uncategorized. Bookmark the permalink. Leave a comment.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: