ELECTRONIC ASSAULT DETECTION EXPERIMENTS.pdf

(966 KB) Pobierz
351871896 UNPDF
COUNTERMEASURE
AND DETECTION
EXPERIMENTS
IN THE FIGHT TO EXPOSE AND STOP THE
CRIME OF ORGANIZED STALKING AND
ELECTRONIC HARASSMENT
Eleanor White
WORK IN PROGRESS - frequent updates, check the page number/date/time
stamp to see if you have the latest version.
** NOT COPYRIGHTED **
Page 1 (Sep 5, 2009 13:24)
351871896.003.png
LIST OF SECTIONS
Page numbers are not given here, as this booklet will be updated frequently when new
information becomes available and maintaining page numbers in the contents is more work
than I'm able to provide.
Purpose of This Booklet and Cautionary Notes
I. ELECTRONIC ASSAULT COUNTERMEASURE EXPERIMENTS
1. Julianne McKinney's Successful 7-Radio Anti-V2S Countermeasure
2. Eleanor White's EM Shielding Experiment (Total Bed Enclosure)
3. The “McKinney Patch” Counteracts Extreme Fatigue
4. Signal Evasion Experiments
5. Flexible Shielding Material Experiments
6. Faraday Cage Experiments
7. Electrically Charged Shielding Experiments
8. Active Device Countermeasure Experiments
9. Water as Shielding Experiments
10. Gel Packs as Shielding Experiments
11. Rubber as Shielding Experiments
12. Grounding Experiments
13. Sheet Metal as Shielding Experiments
99. Miscellaneous Countermeasure Experiments
II. ELECTRONIC ASSAULT DETECTION EXPERIMENTS
1. Sawtooth ELF waveform observed by Eleanor White
2. Eleanor White's EEG and GSR Experiments
3. Goldfish Apparently Shunning Restaurant Perpetrators?
4. Electromagnetic Detector Experiments
5. Sleep Study Experiments
6. Specific Test Equipment Experiments
99. Miscellaneous Detection Experiments
III. PROPOSED EXPERIMENTS
1. Recording EEG With Matching Log of Times and Effects
Page 2 (Sep 5, 2009 13:24)
A1. Glossary
A2. Sources
A3. Tips
1. Determining if Your Camera or Camcorder is Sensitive to Infrared
2. Using “D-submini” Pins for Experimental Wiring
Page 3 (Sep 5, 2009 13:24)
Purpose of This Booklet and Cautionary Notes
The purpose of this booklet is to record the countermeasure and detection experiments
performed by targets of organized stalking and electronic harassment for use by targets of
organized stalking and electronic harassment (OS/EH.)
Note CAREFULLY: At time of last update, we have no countermeasure or detection method
which is assured of fully stopping electronic assaults, or convincingly detecting the electronic
assaults. By “convincingly” I mean a detected assault is accepted as proof of assault by
public officials. As a result, countermeasure and detection experiments continue to be
speculative, and targets should not invest resources (money, time, strength or hope) in any
experiment where the target cannot afford total loss of resources.
There is no guarantee that if one target has success, other targets will experience the same
level of success.
Reports of experiments are welcome for addition here. Please try to keep the report to one or
two pages. Photos are welcome.
All submissions must be COPYRIGHT FREE. Copyrighting, in this unusual OS/EH crime
environment, hampers the free distribution of information.
Submissions about test equipment readings should include the make and model of the tester,
and very importantly, the SCALE SETTINGS used. If you don't have that information you may
still submit, but it is far more helpful when the settings you used are available.
This e-booklet titled “Tech Talk” is recommended for reference by experimenters who may not
have technology education and experience:
Note also that some targets report electronic assaults which cannot be done using as-taught-
in-school technologies. Classified (secret) technology is beyond the scope of this booklet,
however, these reports of advanced technology make caution very important in deciding how
to spend one's resources on experiments.
Do not assume, for example, that because you spend thousands of dollars on a top quality
shielded enclosure which can stop conventional electromagnetic signals that you will find
relief from the electronic attacks. Do not assume that because you buy or rent an expensive
spectrum analyzer, you are guaranteed to find signals which officials will accept as proof you
are being electronically assaulted.
Experimentation, I believe, is definitely worth the expense and effort, because historically,
many scientific discoveries happened accidentally. But the odds are steeply slanted against
the OS/EH experimenter, and all who do experiment should keep that in mind.
Page 4 (Sep 5, 2009 13:24)
351871896.004.png
I. ELECTRONIC ASSAULT COUNTERMEASURE EXPERIMENTS
1. Julianne McKinney's Successful 7-Radio Anti-V2S Countermeasure
** CAUTION **
Experiment reports from targets contain both descriptions of the experiment,
and sometimes their conclusions as to what was detected and/or why the
results were as noted. I recommend treating only the experiment descriptions
as fact, and any conclusions by the experimenters as their personal opinion.
(That includes my own entries.) If a countermeasure is reported to work, I
accept the target's word for that.
When assaulted by constant voice to skull transmissions, Julianne set up 7 radios, on
different stations, to mask the word content of the voice to skull transmissions. Over time, this
has caused her harassers to reduce the amount of such harassment, as when a target is not
forced to follow what the voice to skull transmission is saying, the impact is far less.
Other targets have reported varying degrees of success with less than 7 radios.
Here are some audio files containing jumbled voices which can be downloaded to your PC,
and possibly then uploaded to your MP3 player so you can carry this type of V2S masking in
your travels and in some work situations:
** Please save a COPY to your hard drive for repeated playing.
2. Eleanor White's EM Shielding Experiment (Total Bed Enclosure)
** CAUTION **
Experiment reports from targets contain both descriptions of the experiment,
and sometimes their conclusions as to what was detected and/or why the
results were as noted. I recommend treating only the experiment descriptions
as fact, and any conclusions by the experimenters as their personal opinion.
(That includes my own entries.) If a countermeasure is reported to work, I
accept the target's word for that.
In the late 1990s, at a cost of about $3,000, Eleanor White built an enclosure of sufficient
size to completely enclose her bed. In addition, Eleanor did a series of signal measurement
experiments using a frequency counter, an oscilloscope, and common radio receivers
covering the AM and FM broadcast bands, and the HF (shortwave) band.
Page 5 (Sep 5, 2009 13:24)
351871896.005.png 351871896.006.png 351871896.001.png 351871896.002.png
Zgłoś jeśli naruszono regulamin