In USA, there is Freedom of Information Act FOIA, anyone uses Google search or search USPTO opne or public patents is legal, a US patent publicted by USPTO which describes a kind of technology is not secret, but it is an open knowledge. Of course, the patent is a kind of intellecture property, anyone can not infrige or counterfeiting according US law. But any engineer should admit the patented technology is real technology, unless those people who never accept high engineering education , they do not know what is a patented technology. For this reason, I filed the invention machnie to USPTO, any American engineer or European countriies engineer, including Chinese engineer should admit such US patened technology.
Thank you for telling me IEEE has technology to detect microwave hearing effect = Frey effect with some RF detector near emmitor, this is only very ordinary meter , because microwave hearing effect is ordinary physical phenomenon. Do you what should be detect on a vctim's end who is harassing by V2K ? V2K transfers harasser's human talking voice to a victim via satellite. Here a US patent to explain what is V2K harassment:
US patent 4858612A Hearing Device, Inventor: Philip L. Stocklin; Date of Publication: 1989-08-22, A method and apparatus for simulation of hearing in mammals by introduction of a plurality of microwaves into the region of the auditory cortex is shown and described. A microphone is used to transform sound signals into electrical signals which are in turn analyzed and processed to provide controls for generating a plurality of microwave signals at different frequencies. The multifrequency microwaves are then applied to the brain in the region of the auditory cortex. By this method sounds are perceived by the receiver.
US patent 6011991A: Communication system and method including brain wave analysis and/or use of brain activity.
The technology describes how communicate human brain thoughts and cause language like effect remotely via satellite.
A system and method for enabling human beings to communicate by way of their monitored brain activity. The brain activity of an individual is monitored and transmitted to a remote location (e.g. by satellite). At the remote location, the monitored brain activity is compared with pre-recorded normalized brain activity curves, waveforms, or patterns to determine if a match or substantial match is found. If such a match is found, then the computer at the remote location determines that the individual was attempting to communicate the word, phrase, or thought corresponding to the matched stored normalized signal.
Dear indira ramesh: my invented machine's basic princeple is victim's psychological reaction is different from the remote harasser using device of V2K and RNM. my invented machine uses a series of videos plus texts specially attacking remote operator or harasser to cause psychological responses from remote harsser or operator, so my machine recieve these responses from remote harsser or operator, my invented machine use automatic analyze to find these different psychological reactions or response between victim and remote harasser or operator, then make a clear identification: Who is a victim and who is a remote harsser or operator., then machine will give a certificate of victim to a victim.
Transmitting Undetectable Signals Into Our Minds.2 messagesgretta fahey <email@example.com>Wed, May 12, 2021 at 6:11 PMTo: firstname.lastname@example.org, Social Democrats <email@example.com>, firstname.lastname@example.org, email@example.com, firstname.lastname@example.org, email@example.com, firstname.lastname@example.orgTo Whom it Concerns,I strongly believe that most Irish people who use smart phones, watch high definition television and live in built up areas where the smart grid is strongest are being…See More
Facebook Jeremy Paul (with B&W photo.. for video/ voice chat via Messenger
Yes.... there needs to be more public forum on this matter so as to bring that much pressure on the Govts to force…"