SIGN IN YOUR ACCOUNT TO HAVE ACCESS TO DIFFERENT FEATURES

CREATE AN ACCOUNT FORGOT YOUR PASSWORD?

FORGOT YOUR DETAILS?

AAH, WAIT, I REMEMBER NOW!

CREATE ACCOUNT

ALREADY HAVE AN ACCOUNT?
A global alliance against cyber torture and state-sponsored terror—united, informed, and ready to fight back.
  • LOGIN

Cyber Torture

  • Tech
  • Debunked
  • Legal
  • Survival
  • Victims
  • Evidence
  • Intelligence
  • Security
    • Cyber Security
    • Physical Security
  • Media
  • Forum
  • No products in cart.
  • Home
  • Debunked
  • Scam Scan Reports

Scam Scan Reports

0
cybertortureinfo@proton.me
Wednesday, 23 April 2025 / Published in Debunked

Scam Scan Reports

Spread the love

🚨 Debunking the “Frequency Scan Report” Scammers

What You Really Need to Know About RF Detection

There’s been a recent surge of individuals online claiming they can perform “frequency scan reports” to detect invisible RF attacks on people. As someone who takes signal intelligence (SIGINT) and RF forensics seriously, I want to clear up a growing pile of misinformation.

Roughly seven individuals are currently pushing these claims — and most of them are either completely misinformed or running scams. Let’s break it down.


❌ 1. The Frequency Counter in a Shielded Room Myth

One of these self-proclaimed experts claims they can detect “targeted frequencies” using a frequency counter in a shielded environment.

🚫 This is dangerously misleading.

Here’s why:

  • Frequency counters only show the strongest nearby signal, such as AM/FM radio, Wi-Fi, Bluetooth, or cellular — not covert or modulated signals.
  • Targeted signals are often subtle, near the noise floor, or modulated, making them invisible to simple counters.
  • To detect covert RF threats, you need:
    • A spectrum analyzer with sub-kHz resolution bandwidth (RBW)
    • A waterfall display to visualize signal behavior over time
    • IQ capture for demodulation and replay

A frequency counter is not enough — it’s like trying to find encrypted files using a calculator.


🧢 2. The “$40K Weapons-Grade Analyzer” Scam

Another figure in the community uses a 40-year-old analyzer that “used to cost $40K.” Today, it’s worth under $400 — and it shows.

The red flags:

  • ❌ No waterfall display
  • ❌ No IQ capture
  • ❌ No signal classification or verification

They simply point to a frequency spike and make claims — without proof, demodulation, or validation.

That’s not SIGINT. That’s waving around old test gear and pretending it’s a lie detector.


📉 3. The RF Explorer and “Bodyguard Course” Crowd

Another popular scammer is using the RF Explorer, a cheap hobbyist tool. Combined with a low-level “bodyguard” TSCM course, it gives the illusion of expertise.

Why this setup is useless:

  • ❌ No real RBW control
  • ❌ No IQ data capture
  • ❌ No logging or replay ability
  • ❌ No spread-spectrum detection

RF Explorer is designed for hobbyists, not professional threat detection. Anyone using this to diagnose “RF attacks” is misleading people — and possibly endangering them.


⚠️ 4. Even the Legit TSCM Guy Misses the Mark

One individual does have real TSCM credentials and uses an REI OSCOR in a shielded lab. Sounds good, right?

But here’s the catch:

📊 REI OSCOR Specs:

  • Minimum RBW: 12.2 kHz
  • Sweep range: 10 kHz – 24 GHz
  • Sweep speed: ~1 sec per full pass

That’s fine for finding bugs or emitters — but not covert, low-bandwidth, bursty, or frequency-hopping signals.

You need RBW < 1 kHz and synchronized IQ capture to find these. OSCOR will miss them entirely.

This is like trying to hear a whisper with earmuffs on.


🧠 What Real SIGINT Requires

If someone’s claiming they can detect directed energy or covert RF harassment, their toolkit better include:

  • ✅ Sub-kHz Resolution Bandwidth (RBW)
  • ✅ Real-Time Spectrum Analysis
  • ✅ Waterfall / Spectrogram View
  • ✅ IQ Capture & Replay Tools
  • ✅ Signal Classification Libraries
  • ✅ Proper Geolocation + Antenna Profiling

If they can’t show this — they’re not doing real SIGINT. Period.


🛑 Final Thoughts

If someone is claiming to detect “weapons-grade RF attacks” with:

  • A frequency counter
  • An ancient analyzer
  • A cheap RF Explorer
  • A low-end TSCM course certificate

…then they are either unqualified or deliberately misleading people.

Don’t fall for it.

If they:

  • Can’t provide IQ logs
  • Don’t know what RBW or SNR thresholds mean
  • Can’t explain modulation or demodulation
  • Don’t offer visual proof from a waterfall display

Then they’re offering junk science and false hope.


🧪 Demand Real Tech. Demand Real Methodology.

Because your health, safety, and credibility deserve better.

What you can read next

V2k Recording Scam Debunked
Debunking Smart Meters
Drones are Not Attacking You

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Intra-oral Electronic Tracking Device
  • Long‑Range Tracking
  • AI Designed Human Tracking at a Distance
  • Advanced Detection of Retroreflectors
  • Retroreflectors

Recent Comments

  1. cybertortureinfo@proton.me on Only Real Use Case for a HackRF
  2. David Terry on Only Real Use Case for a HackRF
  3. test on The Community has Been Sold Out
  4. CRAIG LAFOREST on Debunking ICAACT Phase III Jesse Beltran
  5. Patricia Gatten on The Community has Been Sold Out

Recent Posts

  • Intra-oral Electronic Tracking Device

    Spread the loveComprehensive Report on US Paten...
  • Long‑Range Tracking

    Spread the love🔭 The Human Radar: Long‑Range Tr...
  • AI Designed Human Tracking at a Distance

    Spread the loveAi Designed these so its probabl...
  • Advanced Detection of Retroreflectors

    Spread the loveAdvanced Detection of Retrorefle...
  • Retroreflectors

    Spread the love🛰️🔦 The Truth About Retroreflect...

Recent Comments

  • cybertortureinfo@proton.me on Only Real Use Case for a HackRF
  • David Terry on Only Real Use Case for a HackRF
  • test on The Community has Been Sold Out
  • CRAIG LAFOREST on Debunking ICAACT Phase III Jesse Beltran
  • Patricia Gatten on The Community has Been Sold Out

Archives

  • May 2025
  • April 2025

Categories

  • Cyber Security
  • Debunked
  • Evidence
  • Intelligence
  • Legal
  • Media
  • Physical Security
  • Survival
  • Tech
  • Uncategorized
  • Victims

SIGN UP TO OUR NEWSLETTER

Subscribe to our newsletter and receive our latest news straight to your inbox.

SOCIAL MEDIA

TOP