In USA, there is Freedom of Information Act FOIA, anyone uses Google search or search USPTO opne or public patents is legal, a US patent publicted by USPTO which describes a kind of technology is not secret, but it is an open knowledge. Of course, the patent is a kind of intellecture property, anyone can not infrige or counterfeiting according US law. But any engineer should admit the patented technology is real technology, unless those people who never accept high engineering education , they do not know what is a patented technology. For this reason, I filed the invention machnie to USPTO, any American engineer or European countriies engineer, including Chinese engineer should admit such US patened technology.
Thank you for telling me IEEE has technology to detect microwave hearing effect = Frey effect with some RF detector near emmitor, this is only very ordinary meter , because microwave hearing effect is ordinary physical phenomenon. Do you what should be detect on a vctim's end who is harassing by V2K ? V2K transfers harasser's human talking voice to a victim via satellite. Here a US patent to explain what is V2K harassment:
US patent 4858612A Hearing Device, Inventor: Philip L. Stocklin; Date of Publication: 1989-08-22, A method and apparatus for simulation of hearing in mammals by introduction of a plurality of microwaves into the region of the auditory cortex is shown and described. A microphone is used to transform sound signals into electrical signals which are in turn analyzed and processed to provide controls for generating a plurality of microwave signals at different frequencies. The multifrequency microwaves are then applied to the brain in the region of the auditory cortex. By this method sounds are perceived by the receiver.
US patent 6011991A: Communication system and method including brain wave analysis and/or use of brain activity.
The technology describes how communicate human brain thoughts and cause language like effect remotely via satellite.
A system and method for enabling human beings to communicate by way of their monitored brain activity. The brain activity of an individual is monitored and transmitted to a remote location (e.g. by satellite). At the remote location, the monitored brain activity is compared with pre-recorded normalized brain activity curves, waveforms, or patterns to determine if a match or substantial match is found. If such a match is found, then the computer at the remote location determines that the individual was attempting to communicate the word, phrase, or thought corresponding to the matched stored normalized signal.
Dear indira ramesh: my invented machine's basic princeple is victim's psychological reaction is different from the remote harasser using device of V2K and RNM. my invented machine uses a series of videos plus texts specially attacking remote operator or harasser to cause psychological responses from remote harsser or operator, so my machine recieve these responses from remote harsser or operator, my invented machine use automatic analyze to find these different psychological reactions or response between victim and remote harasser or operator, then make a clear identification: Who is a victim and who is a remote harsser or operator., then machine will give a certificate of victim to a victim.
"Sie wissen immer noch nicht, wie Sie eine Menge Geld verdienen können, dann klicken Sie auf den
bob casino spielautomaten, es ist ein großartiges Online-Casino, wo Sie eine Menge Geld verdienen können, ich bin sicher, Sie werden…"
EVERYTHING THROUGH OUT THE WORLD WOULD BE THE PROPERTY OF THE STATE WHICH IS ALSO KNOWN AS THE CROWN CORPORATION. THEY ARE PLANNING TO MAKE US PENNYLESS SLAVES BUT MOST ARE UNDER MIND CONTROL PROGRAMMING TO THE POINT OF APATHY.Viruses are not contageous. The so-called covid-19 vaccine is a slow acting poison. Those who have received it will die within years. Many who believe that they have received the so called covid-19 vaccine have not actually received it because many nurses who are in full…See More