🚨 Debunking the “Frequency Scan Report” Scammers
What You Really Need to Know About RF Detection
There’s been a recent surge of individuals online claiming they can perform “frequency scan reports” to detect invisible RF attacks on people. As someone who takes signal intelligence (SIGINT) and RF forensics seriously, I want to clear up a growing pile of misinformation.
Roughly seven individuals are currently pushing these claims — and most of them are either completely misinformed or running scams. Let’s break it down.
❌ 1. The Frequency Counter in a Shielded Room Myth
One of these self-proclaimed experts claims they can detect “targeted frequencies” using a frequency counter in a shielded environment.
🚫 This is dangerously misleading.
Here’s why:
- Frequency counters only show the strongest nearby signal, such as AM/FM radio, Wi-Fi, Bluetooth, or cellular — not covert or modulated signals.
- Targeted signals are often subtle, near the noise floor, or modulated, making them invisible to simple counters.
- To detect covert RF threats, you need:
- A spectrum analyzer with sub-kHz resolution bandwidth (RBW)
- A waterfall display to visualize signal behavior over time
- IQ capture for demodulation and replay
A frequency counter is not enough — it’s like trying to find encrypted files using a calculator.
🧢 2. The “$40K Weapons-Grade Analyzer” Scam
Another figure in the community uses a 40-year-old analyzer that “used to cost $40K.” Today, it’s worth under $400 — and it shows.
The red flags:
- ❌ No waterfall display
- ❌ No IQ capture
- ❌ No signal classification or verification
They simply point to a frequency spike and make claims — without proof, demodulation, or validation.
That’s not SIGINT. That’s waving around old test gear and pretending it’s a lie detector.
📉 3. The RF Explorer and “Bodyguard Course” Crowd
Another popular scammer is using the RF Explorer, a cheap hobbyist tool. Combined with a low-level “bodyguard” TSCM course, it gives the illusion of expertise.
Why this setup is useless:
- ❌ No real RBW control
- ❌ No IQ data capture
- ❌ No logging or replay ability
- ❌ No spread-spectrum detection
RF Explorer is designed for hobbyists, not professional threat detection. Anyone using this to diagnose “RF attacks” is misleading people — and possibly endangering them.
⚠️ 4. Even the Legit TSCM Guy Misses the Mark
One individual does have real TSCM credentials and uses an REI OSCOR in a shielded lab. Sounds good, right?
But here’s the catch:
📊 REI OSCOR Specs:
- Minimum RBW: 12.2 kHz
- Sweep range: 10 kHz – 24 GHz
- Sweep speed: ~1 sec per full pass
That’s fine for finding bugs or emitters — but not covert, low-bandwidth, bursty, or frequency-hopping signals.
You need RBW < 1 kHz and synchronized IQ capture to find these. OSCOR will miss them entirely.
This is like trying to hear a whisper with earmuffs on.
🧠 What Real SIGINT Requires
If someone’s claiming they can detect directed energy or covert RF harassment, their toolkit better include:
- ✅ Sub-kHz Resolution Bandwidth (RBW)
- ✅ Real-Time Spectrum Analysis
- ✅ Waterfall / Spectrogram View
- ✅ IQ Capture & Replay Tools
- ✅ Signal Classification Libraries
- ✅ Proper Geolocation + Antenna Profiling
If they can’t show this — they’re not doing real SIGINT. Period.
🛑 Final Thoughts
If someone is claiming to detect “weapons-grade RF attacks” with:
- A frequency counter
- An ancient analyzer
- A cheap RF Explorer
- A low-end TSCM course certificate
…then they are either unqualified or deliberately misleading people.
Don’t fall for it.
If they:
- Can’t provide IQ logs
- Don’t know what RBW or SNR thresholds mean
- Can’t explain modulation or demodulation
- Don’t offer visual proof from a waterfall display
Then they’re offering junk science and false hope.
🧪 Demand Real Tech. Demand Real Methodology.
Because your health, safety, and credibility deserve better.