Jit Guide - Equipment List
Jit Guide - Equipment List
Equipment List
JIT/20180829/006/G/KH/V1
Abstract
Victims of the Secret Services are attacked by a plethora of weapons and are also often
3 subjected to torture via covert non-consensual implants made from military biotechnology.
Examples are radio-frequency emitting microchips that form a Body Area Network, eye
implants for image transmission and ear implants for voice transmission, known as Voice-to-
6 Skull technology. This document contains the recommended gadgets and devices for
collecting audio-visual evidence and detecting Directed Energy Weapon attacks as well as
non-consensual body implants. Different ways of shielding from attacks are suggested.
9 The device recommended to detect attacks is the radiation detector EMFields Acousticom2
(p.16). It is the smallest, simplest and most versatile device with the broadest frequency
spectrum and a very valuable audio output. The more advanced GigahertzSolutions HF 35C
12 (p.17), also with audio output, measures a narrower range of frequencies but can determine
the direction of the radiation. The spectrum analyser Aaronia HF-4040 (p.18) is for more
advanced analysis of the frequency distribution by experienced users. Each of these devices
15 measures different aspects of the attacks.
Many victims found radio-frequency emitting body implants using the Aceco FC6002MKII
(p.19). Eye implants become visible using a UV torch emitting UV-light with ca. 400nm
18 wavelength (p.21).
Further information can be found on the website of the Joint Investigation Team
https://jointinvestigation.org and Dr. Katherine Horton's website https://stop007.org.
21 The Equipment List is available with product links to vendors in USD, GBP and EUR at:
https://stop007.org/home/equipment-detection/
Page 2 of 24 First Aid for Victims JIT/20180829/006/G/KH/V1
Quick Guide
Logbooks p.3
3 Gadgets p.4
Shielding p.10
Security p.13
6 Measurement p.16
Table of Contents
1 Logbooks.................................................................................................................................3
2 Audio Recorder.......................................................................................................................4
Recording Conversations.......................................................................................................4
Notify the Other Party That They Are Being Recorded.........................................................4
Covert Recordings..................................................................................................................4
Storing Records of Conversations..........................................................................................5
Carry Two and Carry Batteries...............................................................................................5
Audio Recorders Better Than Recording With Mobile Phones.............................................5
Recording Pulsed Energy Projectiles.....................................................................................5
3 Telephone Pickup Microphone................................................................................................6
4 Digital Camera (not Wi-Fi enabled!)......................................................................................6
5 Power Bank for Mobile Phones and Digital Cameras ...........................................................7
6 Dash-Cam to Record Attacks Driving....................................................................................7
7 Action Cam for Cycling..........................................................................................................8
8 Webcam...................................................................................................................................8
9 Aluminium Foil (also Projectile Detection)............................................................................9
10 Metal Panels..........................................................................................................................9
11 Metal Shed...........................................................................................................................10
12 Faraday Cages.....................................................................................................................10
13 Home Safe...........................................................................................................................11
14 Surveillance System............................................................................................................11
15 Lava Lamp (for Continuous Surveillance)..........................................................................12
16 Electromagnetic Radiation Meter (DEW Attacks)..............................................................13
17 Directional Radiation Meter (Sources)...............................................................................14
18 Radiation Spectrum Analyser..............................................................................................15
19 Bug Detector (RF Body Chips)...........................................................................................15
20 Frequency Counter (Body Chip Frequencies).....................................................................17
21 Thermal Camera (Body Implants, Weapons)......................................................................18
22 UV-Light Torch (Eye Implants, Contamination)................................................................18
23 Geiger Counter (Radioactivity Attacks, X-Ray Surveillance)............................................19
24 Gas Detector (Gas Poisoning).............................................................................................20
JIT/20180829/006/G/KH/V1 First Aid for Victims Page 3 of 24
1 Logbooks
• $2–$8
3 • Use bound books, not wire-bound pages that can be removed.
• Number each page, e.g. number the front of the right hand page as 1,3,5,7 etc.
• Note down attacks, symptoms, V2K abuse and threats every day.
6 • Your handwriting authenticates the document.
• Write the date on every page and write the time of the incident, symptom or attack.
• Number the logbooks in series and photograph them, to prove it if some disappear.
9 • Use a type of ink that cannot be erased, e.g. ball point pen and not ink or pencils.
Logbooks are vital because they document the abuse over long periods of time, can assist
your memory for court cases and can themselves be used as evidence in court cases. It can be
12 very tough to write up what happens day by day and you might not always have the time or
emotional strength. Nevertheless, it is important to maintain the discipline and do it regularly
because it is top class evidence for court cases and can translate into millions of dollars in
15 damage payments for you and your family. If you miss out a number of days or weeks, simply
start writing into your logbook again and continue documenting what you can. Logbooks do
not have to be complete or daily for them to be used as powerful evidence in court.
18 You can also note down the existence of photographs, data files, videos or audio recordings. If
data files disappear or are deleted you still have an entry about their previous existence.
Get bound logbooks like the one shown above which allow you to write a date at the top and
21 the times of the offences or other special marks and highlights in a column on the side of the
page. Using such an index, lots of pages can be scanned quickly for relevant information.
You can regularly scan or photograph your logbook to create a digital copy. But it is of utmost
24 importance that you also generate hard-copy evidence in your own handwriting in logbooks in
addition to digital data. Your handwriting is very hard to forge and your logbook cannot be
hacked remotely by the intelligence agencies. Don't worry if a book is stolen, it can be
27 requested back as the Intelligence Agencies collect items and rarely through something away.
Page 4 of 24 First Aid for Victims JIT/20180829/006/G/KH/V1
GADGETS
2 Audio Recorder
3 • $ 30 – $ 50
• 4GB internal memory at least (storage for many hours of audio)
• microSD slot for extra memory is optional and not necessary as
6 4GB of internal memory is already a lot and regular backups to
another storage device should be done in any case. (Save the
microSD for video recording devices where it is essential due to
9 the file sizes.)
• USB connector for data transfer and backup to a computer
• voice/noise activation
12 • recording quality should be adjustable (e.g. “talk” and “lecture”)
• 2 AAA batteries allow recording over long periods (e.g. over night)
2.2 Notify the Other Party That They Are Being Recorded
Before recording a conversation, you should inform the other party that you are doing
24 so. In many jurisdictions this is a requirement in order to use the recording in court.
However, if it is a threatening situation, or you feel that the other party will not grant you
permission because they are trying to cover up wrongdoing, then it is always better to record
27 covertly than not to record at all. That is because you are trying to prove serious crimes
against yourself and (especially in the case of the Secret Services) the other side can behave in
extremely criminal, conniving and unpredictable ways.
30 There are examples where courts permitted the use of covert recordings when they helped to
uncover serious wrongdoing.
24 It is important that the digital camera does not have Wifi/WLAN to ensure that it cannot be
manipulated remotely. The Secret Services still have ways to sabotage the device, however, it
is not quite as easy as when they can simply access it via Wifi/WLAN.
27 Make sure that you photograph or film gang-stalkers whenever you can. This is important
because these people are involved in targeted murder and the Secret Services are training
these people to form extended networks and active death squads.
30 Photograph (for court bundles) and film (for further evidence) every incident of injuries,
sabotage, vandalism or break-ins. If you experience regular break-ins, it might be worth to
film your flat before you leave your home so that in case of subsequent housebreaking you
33 can show the before-and-after states. This is particularly important if you are alone or if your
police service is corrupt.
JIT/20180829/006/G/KH/V1 First Aid for Victims Page 7 of 24
A dash-cam is very important as you might experience targeted attempts to involve you in a
car accident or dangerous driving around you. Gang-stalking and threat theatre also happens a
3 lot while driving. Moreover, when being attacked with directed energy weapons, it helps to be
able to record the number plates around you on an ongoing basis to collect evidence for court.
This is the case even though it is (by design) extremely hard to prove who attacked you.
6 You don't actually need to prove who attacked you since you cannot be expected as the victim
to do all the forensics yourself. That is the job of the police services and the Intelligence
Agencies.
9 What is important is to get the number plates around you. Then it is obvious that there are
money flows and telecommunication connecting the stalkers and attackers from which one
can work out which of the cars surrounding you at any one point in time are involved in
12 stalking. As attacks on you driving are part of illegal warfare and crimes against humanity, the
investigation will have all the time in the world to work out who the guilty parties were.
15 • $ 50 – $ 150
• Most come with different types of helmet-mounts.
• Very good correcting vibrations during cycling.
18 • Large microSD card is important for longer trips.
If you cycle regularly for leisure, sport or into work, it is very important to get an action cam
and record the trips. Just like when driving a car, stalkers and attackers might try to involve
21 you in a car accident or blame for example the scratching of a scar on you to damage you
financially. To avoid this, an action cam can help record the journey. As most models are
helmet-mounted, it is also ideal for recording gang-stalkers and street theatre as it will capture
24 anything that you are looking at when you are turning your head.
8 Webcam
• $ 20 – $ 30
27 • Plug & Play USB connector, most work as soon as
connected
• Can disconnect the camera via the USB cable so you
30 have certainty that it is not on when you don't expect it to
be
• Note: Model shown indicates with a green LED when the
33 camera is on, but this can be overridden by the Secret Services. So you should
disconnect the USB to be sure the camera is off.
It is advised that you tape up the camera that is built into your laptop (if your model has such
JIT/20180829/006/G/KH/V1 First Aid for Victims Page 9 of 24
a camera in the frame around the display). Instead use a camera that can be connected via a
USB cable. This way, you avoid that the camera is recording you when you don't want it to
3 record. (Although, be aware that the Secret Services can still record you by other means.)
Note: In principle, the same applies to the in-built microphone of your laptop or computer,
however, that is harder to disable as it requires you to open the laptop cover and remove the
6 microphone or damage its connector.
Page 10 of 24 First Aid for Victims JIT/20180829/006/G/KH/V1
SHIELDING
9 Aluminium Foil (also Projectile Detection)
3 • $2–$4
• Available in every supermarket.
• The thicker the better.
6 • Large quantities needed depending on the attacks.
• Copper foils is very good too but much more
expensive!
9 The term “tin-foil” hat was an expression coined by the CIA to discredit those who were
trying to protect themselves against the CIA's early day human experimentation on the
American population. The psyop campaign was successful as many people still smugly use
12 the term to discredit victims. By doing so, they betray their lack of understanding of basic
physics, which states that electromagnetic waves are reflected at the metal surface.
Alu foil still offer the best protection against attack beams. In the case of burning with
15 microwaves, foil protects completely. With more sophisticated attacks like Pulsed Energy
Projectiles several layers like 6-8 or more are needed to protect body parts and the foil can be
used to make them audible for evidence, see p.5. Pulsed Energy Shots can punch little holes
18 into the shielding and thereby render it useless. Other wave forms appear to pass through
several layers of sheet metal. Back-reflections can also be a problem as modern military
weapons like pulsed microwave lasers are so powerful and highly collimated that they can be
21 reflected 100 times and keep beam intensity.
10 Metal Panels
• $ 10 – $ 30
24 • Both steel and aluminium are effective for shielding.
• Copper is also effective but very expensive.
• Sizes of 100 cm x 60 cm and larger are useful as shielding
27 panels.
• Sheet metal is better than metal mesh due to the high
frequency and powerful wave forms used in the military
30 assaults.
Sheet metal is not as flexible as aluminium foil but offers better protection due to its
thickness. It can be used to build make-shift bunkers and shielded areas, or be placed under
33 bed mattresses to protect from electromagnetic machine-gunning from flats below. It can be
obtained easily at DIY stores, building material stores and scrap yards.
For complete protection against the highest energy Pulsed Energy Projectiles several sheets
JIT/20180829/006/G/KH/V1 First Aid for Victims Page 11 of 24
are required, it appears. As the expense of shielding can be substantial, metal panels are ideal
because they can be purchased piece by piece over time as the victims can afford them.
3 Please be careful when handling sheet metal as the edges can be sharp and cause bad cut
injuries! Use protective (builder) gloves at all times and fix metal panels securely,
especially around sleeping areas!
6 11 Metal Shed
• $ 300 – $ 500
• Protects work/sleep area from microwave attacks.
9 • Protects against burning and related types of attack.
• Does not protect against V2K, neurotech and
highest-energy Pulsed Energy Projectiles.
12 • Does protect against some medium intensity Pulsed
Energy Projectiles which can be heard as loud
impact sounds on the roof and the sides of the shed.
15 Metal sheds are a good way to protect work areas and sleeping quarters for the most assaulted
victims. Microwave burning and a large number of other attack modes are blocked, allowing
the victim to rest and work.
18 Medium-intensity Pulsed Energy Projectile barrage can be made audible as loud impact
sounds on the side of the shed. This is excellent for collecting evidence.
While commercially available metal sheds cannot protect against the highest-energy Pulsed
21 Energy Projectiles from military weaponry, it still offers a great amount of protection and
relief for victims. The shed can also be used to lean extra metal shielding panels from the
outside and inside against the walls for added protection. The roof can be covered with extra
24 shielding panels.
Please note the following:
1. V2K, neurotech and implant torture cannot be blocked by metal sheds or even Faraday
27 cages. Sheds are not perfect Faraday cages and even Faraday cages in the form of
commercially available nets only offer a certain decibel dampening of electromagnetic
raidation.
30 2. When using metal sheds be aware that they are not designed for human inhabitation.
Like everything else, it is an emergency measure to protect your life.
3. Ensure that you air the metal shed regularly. A shed of the standard size 8 x 6 ft can be
33 used to sleep in for 6-8 hours. It is not advised to sleep in sheds of smaller size with
the shed doors closed as the air volume is not enough to provide oxygen for breathing
over long periods. The air should be exchanged at regular intervals when working
36 inside any type of shed for longer periods. Ensure that no mould from condensation
moisture starts growing on the walls.
Page 12 of 24 First Aid for Victims JIT/20180829/006/G/KH/V1
12 Faraday Cages
• $ 1000 - $ 2000
3 • High quality Faraday Cages tend to be very expensive.
• Ground with a clamp connector for full protection.
SECURITY
13 Home Safe
3 • $ 200 – $ 500
• With key access or electronic number pad
• Can be hidden in furniture, walls or be free standing
6 • Good line of defence against run-of-the-mill Intel
break-ins
While a safe cannot protect your belongings against skilled Intel housebreaking, it serves as a
9 buffer against the regular break-ins which appear to be done for low level harassment and in
many cases every time as the victim leaves the house. It can be safely assumed that the Intel
agencies have backdoors or other means to break into electronic safes and can also pick
12 standard keys. Nevertheless, a safe helps to prove that the break-ins are of a sophisticated and
unusual nature.
You can photograph the safe contents every time before closing the safe. Keep your old
15 logbooks in there. Should one of your logbooks disappear, you have the photo to prove that it
was in the safe before and can track down when it disappeared. This creates evidence for
court cases that point the finger right back at the Secret Services as no normal burglar would
18 break into a home and then a safe just to remove old logbooks.
14 Surveillance System
• $ 80 – $ 400
21 • Motion detection is important.
• WLAN access means it's remotely hackable.
• Even without WLAN it can be jammed.
24 • Continuous filming can show such interruptions.
A surveillance system is a good idea to have throughout the night and when you leave the
house. There are two types of surveillance camera, wired and wireless. The latter can of
27 course be hacked, but has the advantage that you can sometimes log into the device remotely
and check your home when you are out and about. In any case, ensure that your surveillance
system has sufficient storage. Individual cameras have local storage of up to 128 GB, if you
30 buy a set of cameras interconnected with a central unit the storage space can be 1TB and
higher.
Page 14 of 24 First Aid for Victims JIT/20180829/006/G/KH/V1
Surveillance camera can be operated either with motion detection and continuously. The
former saves on storage space but has the disadvantage that if the motion detection or the
3 operation of the camera is impaired remotely with a jammer then the camera is not going to
record anything and you will not know about it. In contrast, if the surveillance camera is
recording continuously then there is always something on the image and any interruption in
6 operation will show up in the footage.
The one caveat with continuous surveillance is that a sophisticated trick is to use surveillance
footage showing a still image where nothing is happening and using it to overwrite the time
9 window during which an intruder is entering your home. This is a very advanced way of
circumventing the surveillance system but is feasible as soon as your surveillance unit can be
hacked into remotely, for example because it is connected to the internet or because it
12 communicates with the local base station over WLAN.
Should your attackers be so sophisticated to pull off such a feat and should you have
important valuables in your home that warrant extra security precautions one possibility to
15 check the integrity of your surveillance footage is to include a continuous random process that
cannot be predicted. For example by including continuously running lava lamps in the frame
recorded by your surveillance cameras, see below.
• $ 15 – $ 30
• Can be any colour or shape.
21 • It is important that it produces bubbles continuously.
• Make sure it can run for hours without overheating.
A lava lamp is a not just a fascinating feature or a design gimmick, it can also be used to
24 ensure the integrity of your surveillance footage if you are recording a continuous surveillance
video. The idea behind it is the following: While continuous surveillance is the safest type of
video surveillance as jamming immediately shows up as an interruption or blacking out of
27 film footage, it comes with the one weakness that it can be overridden by looping surveillance
footage. In other words, if your surveillance footage just shows a still image of for example
the landing and the entrance door, then several minutes of that still image can be taken and
30 looped to paste over the entry of an intruder.
This is a more advanced trick that intruders can use, but given that most victims are exposed
to the full deception arsenal of the Secret Services, it's not as far fetched as it might seem at
33 first. This is particularly the case if your surveillance system is accessible over WLAN as it
can be hacked remotely.
The workaround is to have a lava lamp in the surveillance footage. The lava is forming
36 continuous bubbles in an unpredictable way that is steadily changing due to the turbulence in
the fluid generated by the heat. It becomes very hard to loop footage without a significant
break in the smooth motion of the rising lava or a sudden change in its size and shape.
JIT/20180829/006/G/KH/V1 First Aid for Victims Page 15 of 24
The effort involved in detecting such manipulation is of course substantial. However, should
you suffer a covert housebreaking in which valuables or important evidence is removed, it can
3 be forensic evidence that is worth gold.
To facilitate this type of forensic cross check make sure that the rising lava in the lamp is
clearly visible for the surveillance camera.
Page 16 of 24 First Aid for Victims JIT/20180829/006/G/KH/V1
18 Please put cell phones into airplane/flight mode for measurements as they emit high
radiation.
For most victims the cheaper Acousticom 2 is sufficient to detect several different types DEW
21 attacks. It is important to learn first what miscellaneous types of harmless backgrounds sound
like, for example WLAN routers, cordless telephones, remote controls and mobile phones.
The first shocking realisation for most people is to find out how much their mobile phone or
24 WLAN router radiates. Also, the average microwave oven can have enormous radiation
leakage. Using this device, it can also be shown that most of the microwave radiation from
microwave ovens and WLAN routers can pass through the walls of the home.
27 With time, very good evidence can be collected with this device. It is recommended that
measurements are filmed and that potential sources of very high backgrounds are switched off
when using this device (e.g. routers, WiFi/WLAN communication from laptops, mobile
30 phones).
The only downside of this device is that it does not have good directionality in the
measurement, so that you cannot detect precisely where the radiation or the electromagnetic
33 pulses are coming from.
The Acousticom and Acoustimeter both measure in the range of 200MHz - 8GHz and have an
audio output which you can turn on and off (see the Manual on the vendor's site). It is the
36 audio output that is worth gold as it allows you to identify attacks that have been modulated
down into the Hertz-range. It is those that are said to interfere with brain functions.
The unit Hertz means simply beats per second. So one beat per second is exactly one Hertz,
JIT/20180829/006/G/KH/V1 First Aid for Victims Page 17 of 24
which you will see written as 1Hz. Two beats per second are two Hertz or 2Hz. One beat
every two second is the same as half a beat per second, which is equal to 0.5Hz and so on.
3 The measurement range of this device starts at 200MHz, which is 200 Mega-Hertz or 200
times 1 million Hertz. This is 200 million beats per second. Similarly, 8GHz is the same as 8
billion beats per second. Humans cannot discern 200 million or 8 billion beats per second.
6 However, when the attackers use high-frequency waves in the Mega-Hertz (MHz) or Giga-
Hertz (GHz) range and modulate the overall signal down into the Hertz range (meaning that
they bundle the high-frequency waves into intensity variations that are changing a lot slower)
9 then you can hear it by ear using this device. It will show up as a beat pattern, a knocking or
a beeping sound. Signals in the Hertz range you can count by ear. Or if they are a bit too fast
for counting, you can use a musical metronome to time them and then read off the beats per
12 second from the metronome.
The advantage of this device because the audio output allows you to detect a very
important type of attack that can interfere with your brain function by just listening to
15 the audio.
A lot of the microwave attacks that hurt on the skin and in the joints, show up as a metallic
scratching or crackling sound. The best way to describe it is maybe like the sound of
18 metallic crickets. In those cases, it is that metallic sound that allows to identify the microwave
beam that is hitting the victim, even though the intensity doesn't always increase on the
display. That is probably the case because the attackers use a main frequency for those attacks
21 that is outside the frequency range of the device but has components that fall within the
detectable range.
24 • $ 300 – $ 400
• Gigahertz Solutions HF 35C
• Determines the direction of electromagnetic
27 radiation.
• Frequency band measured: 800 MHz – 2.7 GHz
• Measured power density: 0.1 – 1999 μW/m2
30 • Very easy to use and light to transport.
• Antenna can be detached.
Please put cell phones into air-plane/flight mode for measurements as they emit high
33 radiation.
The high frequency measuring device HF 35C manufactured by Gigahertz Solutions is
excellent for detecting the radiation of standard everyday devices such as mobile phones, cell
36 towers, microwaves, TV aerials and wireless routers. While the Acousticom and Acoustimeter
have a broader frequency range that they measure, this device can help you identify the
direction from which radiation is being emitted.
39 You can use this device to find the location of nearby cell towers and can even check the
Page 18 of 24 First Aid for Victims JIT/20180829/006/G/KH/V1
radiation leaks from kitchen microwaves. What is considered normal in a home, according to
a radiation expert, is a level of less than 100 μW/m2. A nearby cell tower should not be hitting
3 your home with around 400-500 μW/m2. You will find that wireless routers and cell phones
easily produce radiation far above 2000 μW/m2.
Anything above 1999 μW/m2 is saturating the device and it only shows a “1” at the left hand
6 side of the screen. You should not operate the device in a radiation environment that high for
longer than a moment or it can damage the device.
Please note:
9 1. Governmental communication TETRA is broadcasting on 380 MHz, so is outside the
range.
2. LTE and Dvbt broadcast on 450 MHz and are thus also outside the range.
12 3. Device makes HF E35C measures 27 MHz – 2.7 GHz and HF W35C the band 2.6 – 6
GHz.
21 Please put cell phones into airplane/flight mode for measurements as they emit high
radiation.
The Aaronia HF-4040 is a spectrum analyser measuring in the range of 100 MHz – 4 GHz.
24 The advantage of this device is that you can connect it to a laptop and use the free readout
software that comes with the device to record scans over several hours.
A scan samples frequencies in small bands starting at the lower frequency and scanning
27 upwards. You can set the limits of the scan yourself. A full scan from 100 MHz to the upper
edge of the range at 4GHz takes about 20 seconds. Unlike the previous device, the Aaronia-
HF allows one to see individual intensities for every frequency within the range. The antenna
30 allows to hone in on the source. The disadvantage is that one does not have audio output, so
spotting down-modulated signals is not possible as such signals appear divided into their
individual frequency components. Also, for pulsed signals, it is extremely hard to determine
33 where the signals are coming from.
JIT/20180829/006/G/KH/V1 First Aid for Victims Page 19 of 24
You can use this bug detector to find illegal implants by scanning the human body for
emissions in that range. Human bodies do not emit high frequencies, so if you detect anything
15 it indicates that there is a foreign body inside that is generating the high frequency emissions.
To set up the device, turn it on with the button on the top and turn up the dial to maximum to
check that a red signal appears on the LEDs on the front. That is important because when the
18 battery is too low to detect anything, no signal will appear even if the dial is turned to
maximum.
To look for chips, turn the dial back down until the last red bar just about disappears and
21 set the vibration alarm to ON. That way, an implant in the body that emits at the frequencies
the bug finder is sensitive to will immediately show up as a faint or full single bar on the front
LEDs. Very strongly emitting implants have two or more LED bars and set off the vibration
24 alarm.
You can show that the emissions are coming from a point of the body by moving the detector
repeatedly away from the location where it found a source and demonstrate that the signal
27 immediately disappears when the antenna is not pointing at the source. You can do this 5-10
times and repeat the experiment in different rooms or other locations and you will have
ultimate proof that the emission is coming from that point inside the body and not from
30 background sources.
1. Switch off cell phones and other emitters. When trying to detect body implants
33 inside the home, make sure you switch off all cell phones, WLAN routers, take the
battery out of cordless telephones and other disconnected emitters, and switch off the
main fuse to your home. These types of background radiation emit in the frequency
36 band scanned by the bug detector and can falsify your results. Use a Faraday Cage
when scanning yourself in a flat as neighbours' radiation passes through walls. Ideally
you scan yourself in a field or forest, but make sure to check radiation backgrounds
39 using for example the Acousticom 2 above. Note that hidden antennas and radar can
Page 20 of 24 First Aid for Victims JIT/20180829/006/G/KH/V1
cause large backgrounds in the most secluded places. Use a mirror to see the LED
display of the device when scanning your head.
3 2. The direction of the antenna is very important. This could be because the small
signal generators inside the implants are emitting in certain planes and if the antenna
isn’t aligned with the plane of the emitted electromagnetic wave it might not pick it
6 up. So move the bug detector around and try rotating the angle of the antenna above
every point. Repeat the measurements as often as you can to really pin down the
location of the implants.
9 3. The implants are not emitting continuously. There seem to be several minute
intervals between emissions where they go silent and no emissions can be detected.
Therefore, be patient and take your time. Sometimes you might have to wait for
12 several minutes. It is best to do the scans repeatedly and at random times to catch the
emissions.
4. Make sure that the bug detector is well charged. When the battery gets low, there is
15 no indicator on the device to tell you. The bug detector will simply remain silent and
not detect anything.
5. When the detector locks onto a signal it will detect it even at arms length. The
18 device is manufactured to detect bugs and similar emissions across a very wide range
of 1MHz-6GHz (from 1 million Hertz to 6 billion Hertz). When it finds a strong
emission, there seems to be a software algorithm that hones in on the frequency of the
21 source. As a result, when you leave the detector over the location of an implant for
longer than 10 seconds, it can happen that when you remove the detector from
the source, the alarm keeps going because it has honed in on the signal and can
24 then detect the emissions even half a meter away from the source. This might appear
to be due to backgrounds, but inside a Faraday cage without any backgrounds the
effect remains the same. Therefore, it must be a software feature intrinsic to the
27 device. This means that you have to make sure that the signal disappears entirely for
several seconds before starting to look for the next implant to ensure that you don’t
mix it up with the alarm from the previous source.
• $ ???
• Allows to determine the precise body chip frequencies.
33 • Can look up who licensed the frequency to get a list of
suspects.
Measuring the precise frequencies upon which the radio-frequency emitting body implants are
36 broadcasting allows one to look up who has licensed those frequencies. The licences are
usually held by the military, research universities and so called "high net-worth individuals".
JIT/20180829/006/G/KH/V1 First Aid for Victims Page 21 of 24
The list of licence holders is the list of suspects who are running the criminal human
experimentation and brutal torture of the victims.
• $ 500 – $ 600
9 • Shows heat generated by chip implants
• Works out of the box without further setup required
• Can be used to uncover other hot-spots as well
Ultraviolet light, also known as black light, can be used to detect contamination on furniture,
carpets, clothes and household objects. However, it can also reveal one of the most cruel and
3 insidious covert implants used by the Secret Services: eye implants consisting of transparent
thin-film technology placed on the lens of the eye with a small readout module typically
above the iris under the eye-lid. Eye implants have been found using UV light torches
6 emitting 385nm to 400nm.
Shine the UV light from a distance onto your face, if your iris and pupils reflect in an unusual
colour like turquoise, purple or show up as milky, it is an indication that a thin-film layer has
9 been placed on your eye as synthetic technology reflects light in a different colour to human
eyes.
Don't shine UV light directly into your eye! Limit time of exposure. Don't try to remove
12 eye implants yourself! Implants attach to eye tissue and cause damage. See an
ophthalmologist!
The device that measures radioactivity is called a good Geiger counter. It can be expensive
27 but lasts for years. The normal background of naturally occurring radiation in most places on
Earth is about 0.1 – 0.2 μSv/h. When exposed to X-ray imaging for surveillance purposes,
there are short bursts of much higher radioactivity. The precise dosage measured depends on
30 the amount of building material between the victim and the X-ray emitter but typically there
are short bursts of very high radioactivity 400 –1500 times above ambient backgrounds, i.e. at
around 80 – 150 μSv/h or higher.
33 Attacks with radioactivity are not typically complained about by victims, but they are that
much more insidious because they do occur but go unnoticed. Unlike electromagnetic waves
that can cause burning and pain, attacks with ionising radiation are not felt unless the victim
36 begins to suffer the severe effects of so called radiation poisoning which can be devastating
and even lethal.
It is well known from the aftermath of the nuclear bombs dropped around the world and
39 nuclear reactor disasters like Chernobyl that ionising radiation and radioactivity can cause
cancer, other health effects, genetic damage and death. The murder of the Russian Alexander
JIT/20180829/006/G/KH/V1 First Aid for Victims Page 23 of 24
Litvinenko in London through what was said to be poisoning with highly radioactive
polonium-210 shows that the Secret Services do employ radioactivity to destroy and kill their
3 victims.
For this reason, it is important that targets start collecting data about the radioactivity that they
are exposed in their homes and outdoors. This is crucial since X-rays are used in surveillance
6 freely and completely unregulated.
Unknown to most people, border crossings have large X-ray devices that can scan entire buses
and lorries at once. The author has seen an image showing a large bus filled with sitting
9 skeletons as the passengers received a full-body X-ray without their knowledge. The author
was exposed herself to very high X-ray radiation as her car was scanned by a surveillance
patrol. In America, the existence and patrolling of cities by X-ray surveillance vans has been
12 openly published in the press.
While this type of irradiation is such a severe health hazard that it requires strict regulation
and monitoring in the health industry, it is completely unregulated when used by a much more
15 uneducated and statistically speaking highly psychopathic segment of society: the police, the
military and the Secret Services. The outcome of that is clear. It results in prolific and wanton
mutilation of the civilian population which is entirely oblivious to the operation and abundant
18 use of X-ray surveillance equipment affecting themselves and their children. Plans to make
round-the-clock X-ray surveillance of cities the norm around the world contributes to soaring
cancer deaths.
• $ ???
• Industrial sites have gas detectors for health and safety.