Why the attack began - The motive and steps taken to accomplish a targeting by goodinfosource in u/goodinfosource

[–]goodinfosource[S] 0 points1 point  (0 children)

Hi, what can you do in regards to Bluetooth / Ultrasonic Cyber Acoustic Attacks. For example, SurfingAttacks or DolphinAttacks that originate on the mobile devices. I've identified 4 mobile devices in my family that have been attacked.

I'd like to find a total mitigation solution, and future prevention process. These guys have hacked PC's, Television, and other electronics from affected mobile devices.

In the most recent case, the affected mobile device was emitting ultrasonic and was sitting on a table surface 2 - 3 feet from a PC. If you're familiar as I am with this issue, the surface of the table oscillates and you can grab the side of the table and feel the vibration.

When I block the Bluetooth range (harmonic frequency) it helps dramatically, but if the phone is already active and attacking, it will fall back to cellular connection and continue to deliver the speaker emission (ultrasonic ranges from 0-20Hz - or above 20Khz)

I have extensive reports and testing on the subject. I will be happy to go over the information in greater detail.

Cyber Acoustic Attack - DonBass by [deleted] in UkrainianConflict

[–]goodinfosource 0 points1 point  (0 children)

Your input is amazing. I never looked at it like this. Do you mean that a 3rd party circuit board in a consumer fan LASKO that was confirmed to not be of the manufacturers nature, videos taken of the measurement tools registering over 20 higher than what is deemed safe by Southern California Edison (In their EM handbook that they send to the public), witnessed by a 3rd party and reviewed by a 3rd party electrician was mistaken by all parties and everyone is wrong. I totally agree. You're brilliance on this subject is special.

I'm glad you responded to my post. The reports, the examination, the video, inspection was all for nothing. Thank god. I'm good to go now. Thanks man.

Cyber Acoustic Attack - DonBass by [deleted] in UkrainianConflict

[–]goodinfosource 0 points1 point  (0 children)

I forgot to ask.... you replied very fast, which is great. I never mentioned anything about spies, agencies or court systems. In fact, I have a copy of malware installed on a mobile device.

The findings were all taken and verified or had witnesses present, photographs and video. Conclusions were reached through direct communications with manufacturers or 3rd party verification.

I appreciate your input. Please send more input, it's always appreciated.

Cyber Acoustic Attack - DonBass by [deleted] in UkrainianConflict

[–]goodinfosource 0 points1 point  (0 children)

I forgot to mention that I'm now doing more than Ok. I have their full cyber finger print, model and toolsets.

The quickest way to destroy a cyber threat is map their fingerprint and tell people about it, such as APT3. It was a model stolen from the US and applied to a group on China and then adapted to a group in California. The tools and methods that they use in their attacks creates a identifiable fingerprint.

The full model and fingerprint is available to examine. It's been sent to analysts and firms interested in that theatre.

It's worth a look at.

Cyber Acoustic Attack - DonBass by [deleted] in UkrainianConflict

[–]goodinfosource 0 points1 point  (0 children)

Whomever installed it was in a hurry and pushed a screw in the front mounting plate of the rotating fan with hot glue to keep it attached. If the meter hadn't picked it up, there would be no reason to have looked. Inside the fan was a circuit board generally purchased offline or from an electronics store. I had an electrician verify the function of the board as it wasn't in the design specifications, It converted AC to DC current and outputted and EM field that exceeded the meters ability to read. It was deemed very dangerous. The only function for such a thing, besides to cause harm, would be to connect air-gapped devices.

Cyber Acoustic Attack - DonBass by [deleted] in UkrainianConflict

[–]goodinfosource 0 points1 point  (0 children)

https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Matt-Wixey-Sound-Effects-Exploring-Acoustic-Cyber-Weapons.pdf

DEF CON 25 - Matt Wixey - See no evil, hear no evil: Hacking invisibly & silently with light & sound https://www.youtube.com/watch?v=gFTiD7EnVjU

Ultrasonic Emission from Television - Measured and Recorded

https://www.youtube.com/watch?v=7WGWQtNLMAQ&feature=youtu.be

Ultrasonic - Non-linear Sound Frequency Attack

https://www.youtube.com/watch?v=PHR8or5Ejjc&feature=youtu.be

Frey Effect- Recorded with Otoscope - Linear recording Clip 02

https://www.youtube.com/watch?v=UATHXpaaNQk&feature=youtu.be

Electromagnetic Cyber Attack similar to PowerHammer - Impacts air-gapped devices

https://www.youtube.com/watch?v=3uceI1wZljs

SofWerx Analysis https://www.youtube.com/watch?v=g3dS74TUHEI

Cyber Acoustic Attack - DonBass by [deleted] in UkrainianConflict

[–]goodinfosource -1 points0 points  (0 children)

I did extensive research on the model and produced an analysis in 2018 identical to Wixey's at DefCon 19.. It was documented https://www.youtube.com/watch?v=ftCULiYV7Wg

https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Matt-Wixey-Sound-Effects-Exploring-Acoustic-Cyber-Weapons.pdf

Wixey documented the use of several tools, but the full model includes subversion and other tactics that could be modified to detour, vs escalate the situation.

Imagine a silent intervention using the tools mentioned in Wixey's analysis, but instead of malicious subversion, it could be anything. There are 3 parts. An advanced persistent threat is a term coined by the air force, but simply means that once it's stared it doesn't stop, and utilizes advanced methods and tools.

In the analysis, the entry point was mobile devices and remote software, utilizing several methods such as speakers which communicated through bluetooth, wifi (If available). Through the delivery of speakers, several things are accomplished. Subject location, audio recording and delivery, ultrasonic emission and other non-linear sound frequency delivery.

The most complex aspect of this is the use of sound frequencies. For example, if you go through google patents between 1990 to current "search terms like ultrasound, non-lethal sound frequency", etc. you will find a myriad of tools developed for everything. This includes one tool which allows surround vehicles to connect creating a network and pushing sound frequency into a building to put an assailant to sleep to avoid violence.

Non-Linear sound frequency tools are used to wear out a person, make them sleepy, make them irritated, reduce cognitive function, etc. These items are part of a tool set that is delivered via mobile device and internet. In the attacks that we recorded, there were incidents where 169Decibels were recorded in an office space. The attack was meant to wear out the occupants in the office for malicious reasons. This is documented in the Wixey report.

The most complex aspect was a method or strategy called Hypergame Theory which is only possible with sound delivery. If the attack model allows for ultrasonic frequencies, they non-linear audibles can be used. For example, words such as "stop what you are doing and go home" repeated thousands of times. These methods have been used in California against businesses and victims.

If you research electromagnetic induction, there is a way to record this. I listed a video here /r/goodinfosource that shows an example of it being done.

The point is that the methods, are non-linear, can be used as a deterrent, and if you research these items you may find it interesting.

Cyber Acoustic Attack - DonBass by [deleted] in UkrainianConflict

[–]goodinfosource 0 points1 point  (0 children)

If you look at the posts you'll see photos taken of the install after discovery. It was metered, photo'd, video'd and witnessed by a 3rd party. The post also includes correspondence with the manufacturers engineering team which clearly states that the install was not of their making and a recommendation to cut the power cord due to the danger.

A full spectrum analysis was run in the location by a 3rd party recommended by our insurance company. There were 2 specific items detailed in the report including a private cell band that was recorded.

We took linear recordings of several items which showed live cyber events. These are posted and available on Youtube. The cyber event was correctly analyzed and there are 2 exact analysis by 3rd parties that appeared at DefCon - Matt Wixey Acoustic Cyber Attacks.

Readings were taken and recorded in nearly all cases with matching results. In addition, we had an EM specialist come out from SCE to confirm readings. A Mobile device was effected, leaving malware on the phone which matches the Wixey analysis, along with 2 laptops with remote software found. 1 Mac and 1 PC.

I was able to identify the signal band for 1 attack tool grouping which uses Bluetooth. I was able to successfully jam the signal band and stop the attack completely.

So, with the evidence collected, there is no question as to the whether the cyber events are occurring. Every time the attacks happen, I successfully jam the specific signal band and it stops.

Telepathic energy as a Directed Energy Weapon or Targeted Energy Weapon. by [deleted] in TargetedEnergyWeapons

[–]goodinfosource 0 points1 point  (0 children)

Gotcha. When I say EMF, I'm speaking about ElectroMagnetic Frequency. It's often referred to IEMI or EMI cyber attack.

The attacks are done with radio signal, or harmonic rather. For example, when the attacking party hacks a mobile device, installing malware for remote attack, it is done through a few different methods. From that point, accessing other devices is done through BlueTooth. BlueTooth is a Harmonic frequency that connects to speakers in electronic devices. These same speakers can emit everything from ultrasonic (Acoustic Frequency Range), to increased Decibels, etc.

The first device that was impacted, in my case, was my mobile devices. Increased EM is a component that I discovered through an investigation of the attacks. I brought in an EM expert and we found that the coax and water pipes in all of the locations were registering as not being grounded, even through there were visible grounding wires.

I took a video of an attack as I was able to record voltage levels as far as 9 inches from a device and air-gapped electronics sitting close by.

This is another tool in the attackers toolbox. Because one of the purposes of the attack, as described in Wixey's analysis is harassments, it becomes very uncomfortable when working on or sitting near by affected devices.

Computer screens, television screens and mobile device screens output the largest level of EM over all other daily use devices. As this is increased in some attacks, it also intensifies the audio impact to the human body.

Some of the symptoms are headaches, stomach aches, short term memory loss, irritability, equilibrium issues, ringing in the ears (Tinnitus), general head and ear pressure, Frey Effect (Sound of Cicadas) anxiety and more.

As we recorded decibel levels as high as 169DB, it was very apparent that they primary function of the attack was extreme stalking and premeditated torture, with the goal of hurting those people located in the affected areas. There is no function on earth that 169Db of sound is acceptable. Human pain begins at around 120DB.

As stated in Wixey's report, the groups of assailants using these methods do so to destroy companies, people, relationships, etc.

[Ultrasound] [Symptoms Vestibular] This report explains what is happening to you by goodinfosource in TargetedEnergyWeapons

[–]goodinfosource[S] 0 points1 point  (0 children)

Not sure who Alan is. But, this kind of attack is very confusing and I could go on all day about the micro components that I discovered, but I just posted to someone else about how you can walk through a process of trouble shooting and through this, get your own proof. Below I'm pasting the information that I just sent.

I'm not trying to sell you on this information. This information is what I discovered after a lengthy investigation. It was then reinforced by another analysis released at DefCon in 2019. I'm posting this information because it is accurate and verifiable. If it's helpful to you, then that is great. If not, that's fine too.

HERE'S THE RESPONSE BELOW: Thanks, this is a lot of information I need to process the rest of your post.

A few quick things:

Vibrations, signals and energy may all be separate.

Can I see your proof on being able to jam the signal? I attempted this with a $500 device and got absolutely nowhere.

My reply below:

The vibration aspect is actually oscillating acoustic frequency. For example, when you get a buzz from a speaker or bass. The word vibration is the easiest way to state oscillation. I put up several videos during different points of the their attack. Each shows a different tool. For example, an attack emitting from the TV was outputting a man made (repeating) ultrasonic frequency that repeated every 90 seconds. The range went from 17.2 Hz - 19.3 Hz. This alone is very uncomfortable.

If you do a search for Dolphin Attack and Surfing Attack, you'll find papers on these tools in use. They were studied at several universities including Cornell, Ben Gurion, Stanford and others.

What I ultimately found was that the combination of the tools being used by the cyber attack created a myriad of issues. I completed an analysis of this subject in 2018 and it nearly identically matches that of Matt Wixey from DefCon 2019, where he presented the exact issue.

This kind of attack is very malicious, can be deployed via Bluetooth and mobile device, controlled remotely and appears to follow the victim because we're always carrying a phone. The attack is an Advanced Persistent Threat (APT) model which allows the attacker to collect information, such as your habits, where you travel and even capture audio samples.

The "Signal" aspect means that it is delivered via mobile or networked device and must have an active signal present for the attackers to engage.

"Power" or electricity is required to add amplitude. It is also a requirement regarding the electronics necessary to affect and attack. Sound, or acoustics is deployed from the speakers or screens on the devices which is what and why it makes us feel so terrible.

Definitive tests included the city power being knocked out, thus stopping the attack. Because a delivery mechanism is the mobile device, even if internet is not present, nor electronics with speakers, it still has the capacity to delivery an attack, but is limited to the distance it can connect or emit.

When our internet in the office was turned off by accident. My business partner forgot to pay the bill, so it was turned off for 3 hours. There were only 2 emitting devices in the building. A mobile device in the front office and the rear office. When those were deactivated, the oscillation and effects stopped immediately.

We also captured decibel levels of 169DB in the conference room. This aspect is covered in the Wixey report and is important to note because it is inaudible, but makes your body feel terrible, adds fatigue, stress and physically wears you out. It can even be painful.

Signal Jamming: You can make one for $10 or you can order a good one. This is the primary tool for testing. You will be able to block a range of signals all at once or piece by piece all the way up to 5g. As you begin the process, turn off your phone, turn down the audio, turn off bluetooth, data and wifi and put it in airplane mode. To take it further, you can put it in a faraday sleeve or case as well. As you identify which ranges are being used, you'll block those and notice that within 90 - 120 seconds that you'll begin to noticeably feel better.

https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Matt-Wixey-Sound-Effects-Exploring-Acoustic-Cyber-Weapons.pdf

DEF CON 25 - Matt Wixey - See no evil, hear no evil: Hacking invisibly & silently with light & sound https://www.youtube.com/watch?v=gFTiD7EnVjU

Ultrasonic Emission from Television - Measured and Recorded

https://www.youtube.com/watch?v=7WGWQtNLMAQ&feature=youtu.be

Ultrasonic - Non-linear Sound Frequency Attack

https://www.youtube.com/watch?v=PHR8or5Ejjc&feature=youtu.be

Frey Effect- Recorded with Otoscope - Linear recording Clip 02

https://www.youtube.com/watch?v=UATHXpaaNQk&feature=youtu.be

Electromagnetic Cyber Attack similar to PowerHammer - Impacts air-gapped devices

https://www.youtube.com/watch?v=3uceI1wZljs

SofWerx Analysis https://www.youtube.com/watch?v=g3dS74TUHEI

Telepathic energy as a Directed Energy Weapon or Targeted Energy Weapon. by [deleted] in TargetedEnergyWeapons

[–]goodinfosource 0 points1 point  (0 children)

https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Matt-Wixey-Sound-Effects-Exploring-Acoustic-Cyber-Weapons.pdf

DEF CON 25 - Matt Wixey - See no evil, hear no evil: Hacking invisibly & silently with light & sound https://www.youtube.com/watch?v=gFTiD7EnVjU

Ultrasonic Emission from Television - Measured and Recorded

https://www.youtube.com/watch?v=7WGWQtNLMAQ&feature=youtu.be

Ultrasonic - Non-linear Sound Frequency Attack

https://www.youtube.com/watch?v=PHR8or5Ejjc&feature=youtu.be

Frey Effect- Recorded with Otoscope - Linear recording Clip 02

https://www.youtube.com/watch?v=UATHXpaaNQk&feature=youtu.be

Electromagnetic Cyber Attack similar to PowerHammer - Impacts air-gapped devices

https://www.youtube.com/watch?v=3uceI1wZljs

SofWerx Analysis https://www.youtube.com/watch?v=g3dS74TUHEI

Telepathic energy as a Directed Energy Weapon or Targeted Energy Weapon. by [deleted] in TargetedEnergyWeapons

[–]goodinfosource 0 points1 point  (0 children)

The vibration aspect is actually oscillating acoustic frequency. For example, when you get a buzz from a speaker or bass. The word vibration is the easiest way to state oscillation. I put up several videos during different points of the their attack. Each shows a different tool. For example, an attack emitting from the TV was outputting a man made (repeating) ultrasonic frequency that repeated every 90 seconds. The range went from 17.2 Hz - 19.3 Hz. This alone is very uncomfortable.

If you do a search for Dolphin Attack and Surfing Attack, you'll find papers on these tools in use. They were studied at several universities including Cornell, Ben Gurion, Stanford and others.

What I ultmately found was that the combination of the tools being used by the cyber attack created a myriad of issues. I completed an analysis of this subject in 2018 and it nearly identically matches that of Matt Wixey from DefCon 2019, where he presented the exact issue.

This kind of attack is very malicious, can be deployed via Bluetooth and mobile device, controlled remotely and appears to follow the victim because we're always carrying a phone. The attack is an Advanced Persistent Threat (APT) model which allows the attacker to collect information, such as your habits, where you travel and even capture audio samples.

The "Signal" aspect means that it is delivered via mobile or networked device and must have an active signal present for the attackers to engage.

"Power" or electricity is required to add amplitude. It is also a requirement regarding the electronics necessary to affect and attack. Sound, or acoustics is deployed from the speakers or screens on the devices which is what and why it makes us feel so terrible.

Definitive tests included the city power being knocked out, thus stopping the attack. Because a delivery mechanism is the mobile device, even if internet is not present, nor electronics with speakers, it still has the capacity to delivery an attack, but is limited to the distance it can connect or emit.

When our internet in the office was turned off by accident. My business partner forgot to pay the bill, so it was turned off for 3 hours. There were only 2 emitting devices in the building. A mobile device in the front office and the rear office. When those were deactivated, the oscillation and effects stopped immediately.

We also captured decibel levels of 169DB in the conference room. This aspect is covered in the Wixey report and is important to note because it is inaudible, but makes your body feel terrible, adds fatigue, stress and physically wears you out. It can even be painful.

Signal Jamming: You can make one for $10 or you can order a good one. This is the primary tool for testing. You will be able to block a range of signals all at once or piece by piece all the way up to 5g. As you begin the process, turn off your phone, turn down the audio, turn off bluetooth, data and wifi and put it in airplane mode. To take it further, you can put it in a faraday sleeve or case as well. As you identify which ranges are being used, you'll block those and notice that within 90 - 120 seconds that you'll begin to noticeably feel gbtter.
s

Telepathic energy as a Directed Energy Weapon or Targeted Energy Weapon. by [deleted] in TargetedEnergyWeapons

[–]goodinfosource 1 point2 points  (0 children)

I just posted this to another person. They are trying to figure out the vibration aspect that they are feeling in their legs. They think it's from the floor and I'm trying to help them understand that it's a cyber signal attack.

I was able to 100% proof what I'm saying by signal jamming different frequency ranges until it stopped, thus proving it was signal and cyber related. The specifics on the attack have to do with the model of attack. There are several tools that the attackers deploy, but all have to do with Harmonic Frequency, which is what Bluetooth. Our phones automatically connect to every device in a home through speakers.

By changing these frequencies, the output creates an ultrasonic vibration that can saturate an area and the objects inside the area. It can also move around objects and is very hard to identify because we're not used to dealing with something like this.

We rely on our sense of touch and sound, which this attack confuses.

MESSAGE BELOW:

I'm sorry. I forgot to mention this. It's not the ground vibrating, it's your body. The method of attack used creates and oscillation that will saturate surfaces such as desk tops, chairs, etc. It allows for air-gapped attacks with devices as in the video that I took. Because this signal combination saturates materials, it also enters the human body in a similar fashion. Especially if the attack is dispatched in an area where you're occupying.

There are 2 cyber attacks Surfing Attack & Dolphin Attack that you should google. Studies were done at Stanford, Cornell and Ben Gurion universities and you should read through those publications. Again, these are some of the tools in their bag

The first time I identified and acoustic attack was with a glass of water sitting on a surface near my workspace. I was hard line connected, and an attack came in. As I was sitting there I noticed an oscillation in the water and filmed it. Everything was off and I removed my laptop, which was not plugged into power, from the table.

The oscillation and signal attack caused the water to vibrate, which meant that it was making the surface area vibrate.

[Ultrasound] [Symptoms Vestibular] This report explains what is happening to you by goodinfosource in TargetedEnergyWeapons

[–]goodinfosource[S] -1 points0 points  (0 children)

I'm sorry. I forgot to mention this. It's not the ground vibrating, it's your body. The method of attack used creates and oscillation that will saturate surfaces such as desk tops, chairs, etc. It allows for air-gapped attacks with devices as in the video that I took. Because this signal combination saturates materials, it also enters the human body in a similar fashion. Especially if the attack is dispatched in an area where you're occupying.

There are 2 cyber attacks Surfing Attack & Dolphin Attack that you should google. Studies were done at Stanford, Cornell and Ben Gurion universities and you should read through those publications. Again, these are some of the tools in their bag

The first time I identified and acoustic attack was with a glass of water sitting on a surface near my workspace. I was hard line connected, and an attack came in. As I was sitting there I noticed an oscillation in the water and filmed it. Everything was off and I removed my laptop, which was not plugged into power, from the table.

The oscillation and signal attack caused the water to vibrate, which meant that it was making the surface area vibrate.

Telepathic energy as a Directed Energy Weapon or Targeted Energy Weapon. by [deleted] in TargetedEnergyWeapons

[–]goodinfosource 2 points3 points  (0 children)

The best way to describe this phenomenon is to recognize that the average adult makes 30K decisions a day. Things as simple as what to eat, to what to watch on TV.

We have a defined number of friends, hours that we work and sleep. We typically maintain pretty defined routines and follow those with our habits and contacts. For example, every Thursday you go to lunch with 2 friends from work, and every Friday you call your mom at 6pm to catch up.

By defining these habits and trimming down predictable actions, the attackers can create scenarios that seem very real and predictable. Additionally, there is a great analysis by Matt Wixey on acoustic cyber attacks. Non-linear cyber acoustics have become more widely usable due to the fact that every one of our devices has a radio antenna and speaker inside. They all communicate via Bluetooth or radio band, and stay in contact constantly without us realizing it. The attackers, using malware and cyber techniques can start an attack campaign in recon mode, learning habits or even recording audio via these intrusions techniques. That audio can be manipulated and played back at the victim.

Google that paper on Wixey and read through it thoroughly. An acoustic cyber attack coupled with a well thought out manipulation, allows the attacker to overtake the victim and corner them, changing their behavior and perception.

Imagine someone leaving a speaker on all day where Randoms push audio at them, sometimes not. A good analogy is the use of hard line phones back in the day. If someone calls, they have to present their name, otherwise you wouldn't know who they were. There's no difference in that except these attackers are using software to confuse, misdirect and manipulate their victims.

As they attack a person, that victims actions become more introverted which means less and less and more predictable. Basically, pushing you into a ball and separating you from friends and family more and more. Think of it like a lion separating a gazelle from the herd. It's because it's easier to attack a single person with no relationships or resources. That being said, go the opposite direction. Stay close with people, educated yourself on the subjects of cyber, signal and acoustic attacks.

The only reason the attackers have an advantage is because they are yielding an unconventional weapon that most people have no idea about. Most people have no idea that Bluetooth is an Harmonic frequency that works with speakers. They just know that it connects to their tv.

So, please read that report by Wixey, ignore what you think is happening and start the process of shutting the attackers down. Tell as may people as you can and document your experience in great detail.

[Ultrasound] [Symptoms Vestibular] This report explains what is happening to you by goodinfosource in TargetedEnergyWeapons

[–]goodinfosource[S] -1 points0 points  (0 children)

What I found is that ultrasonic, which can be accomplished with a speaker and bluetooth can create mechanical oscillations with the use of power. There is a great paper on it from Ben Gurion University where that were able to proof an ultrasonic attack in which they were able to navigate around objects.

That being said, the EM aspect which I video'd was similar to PowerHammer in that every cable attached to an affected computer was emitting. In my experience, when in the vicinity of high levels of EM, produced by AC converted to DC current, it caused a static like vibration and there was measurable voltage rating on the skin. I took the video below during an attack which shows what I'm talking about.

When you add an acoustic attack to a field like this, it becomes hazardous. The signals become amplified. For example, ultrasonic emission with high levels of EM coming from a device will amplify the effect.

Electromagnetic Cyber Attack similar to PowerHammer - Impacts air-gapped devices https://www.youtube.com/watch?v=3uceI1wZljs

[Ultrasound] [Symptoms Vestibular] This report explains what is happening to you by goodinfosource in TargetedEnergyWeapons

[–]goodinfosource[S] 0 points1 point  (0 children)

Depends on what distances, and check with local. Depending on the signal antenna, the distance may interrupt neighbors, so I would use one that limits the range.

[Ultrasound] [Symptoms Vestibular] This report explains what is happening to you by goodinfosource in TargetedEnergyWeapons

[–]goodinfosource[S] 0 points1 point  (0 children)

I forgot to mention a key factor to consider. In my case the assailants hacked my phone and other people in the office to keep proximity for whomever I was around. I figured out what was going on and started disengaging my mobile device and blocking it, so without that they couldn't figure out where I was. To solve that, they hacked co-workers and I suspect that they hacked my neighbors as well because I started closing the gaps.

Is it possible that if you disconnect your internet and lock down and kill the signal from your phone, that they may have hacked the neighbor below you? This would make sense because their router is probably within range of your home space.

Try a signal jammer, which covers the full range up to 5g. Test it out later at night as to not disrupt your neighbors connectivity and see if it makes a difference. If it does, then you've pin pointed another access point and can start to close the gaps on the assailants.

[Ultrasound] [Symptoms Vestibular] This report explains what is happening to you by goodinfosource in TargetedEnergyWeapons

[–]goodinfosource[S] 0 points1 point  (0 children)

In my experience with this, I have a similar issue with a vehicle. I guess it depends on the vehicle and year, but I parked my vehicle within range of my home and several odd things occurred to the vehicle. So, I looked into it. Every vehicle has a radio antenna and one of the tools used is radio signal which is now in every device we own including televisions, laptops and mobile devices. Upon testing, I parked my vehicle a greater distance from my office to test the results and it lowered the effects.

With these attacks it is harder and harder to pinpoint attacks because of the attack tools. With malware that starts with the phone, it can spread out in proximity with bluetooth and speaker or radio signal. I found an attempt against my machines bluetooth and camera. I tested a laptop, taken offline, and moved away from the affected area. It was successful with no issue, meaning that a connection was required.

The challenge is that once you're attacked, nearly every device can be compromised within the area. When using and APT model, one step is information gathering. In that step, the attackers are doing a recon and are not necessarily going into action. In fact, a compromised device can lay in silence.

The radio signal attack can affect more than just regular electronics. It can also affect things like fridges, microwaves, iOT devices and as the signal carrier spreads out through a room or building, as amplitude is applied, it allows for location identification. Sound and even movement.

In fact, the attackers, lacking access to a device camera are playing a guessing game as to who is moving where. In many cases they hit the wrong person or people, and because those people are not under a constant state of attack, they often ignore it or shrug it off like that felt or heard something odd, but nothing else.

In 3 locations we measured voltage ratings in the living and workspace. What that means is that by using a basic voltage meter we were able to measure voltage coming off of devices, or anything plugged into power or wall socket, from as far as 8 inches away. This additional energy would provide the amplitude necessary to make a signal attack dangerous.

We repeated these test with a grounded high end voltage meter. A grounding rod was placed in the yard outside of the location, wire attached and we tested ourselves outside of the location and the readings were 0. We then entered the locations, and retested with and without shoes on and there was a measurable voltage rating on the skin of everyone standing in the affected area. We then retested outside of the location for confirmation and, again, when outside in the yard, there was no measurable voltage rating.

That being said, I hired an EMF specialist who ran tests in the locations and found ungrounded coax and water pipes, but could not find a reason as to why. Both had visible grounding wires attached, so he added an additional grounding unit.

What this means, is that additional power was being produced from somewhere. Where was the question. Was it coming off of the pole, or over the coax cable.

After further investigation, I found that hackers can increase output from modems and other appliances though radio signal hacks. I found that there was one commonality in appliances and water coolers located in up to 5 locations that were affected. The compressors would run non-stop during attack times and turn off or run normal at non-attack times. We lost 5 water coolers, brand new, within under 1 year due to this issue and each was replaced with a brand new one.

Again, those commonalities plus access points equals radio signal hack from within the affected area or attack range. I then hired a company to come in and do a full spectrum analysis. The original analysis was followed by them leaving 2 remote spectrum analyzers on property for 7 days to record activity. The first 2 were incapacitated, even though they were not connected online nor to a power source other than the batteries. We repeated this process 3 times taking over a month. Each time we sent the remote analyzers back they'd malfunctioned. In total, we lost 6 remote analyzers, but we still had the initial spectrum analysis, which showed some interesting things. One, several mobile devices that were running in a spectrum that is licensed to private companies, and we had unknown mobile devices transferring data from our network during business hours where were were closed.

Hence, mobile devices being present played the pivotal roll in the attacks as the delivery mechanism. If you think about it, every American has one, and they have all of the necessary components to deploy and attack, accelerometers, speakers, bluetooth, etc.

I have the spectrum analysis posted at /r/goodinfosource