đ¨ Debunking the âFrequency Scan Reportâ Scammers
What You Really Need to Know About RF Detection
Thereâs been a recent surge of individuals online claiming they can perform âfrequency scan reportsâ to detect invisible RF attacks on people. As someone who takes signal intelligence (SIGINT) and RF forensics seriously, I want to clear up a growing pile of misinformation.
Roughly seven individuals are currently pushing these claims â and most of them are either completely misinformed or running scams. Letâs break it down.
â 1. The Frequency Counter in a Shielded Room Myth
One of these self-proclaimed experts claims they can detect âtargeted frequenciesâ using a frequency counter in a shielded environment.
đŤ This is dangerously misleading.
Hereâs why:
- Frequency counters only show the strongest nearby signal, such as AM/FM radio, Wi-Fi, Bluetooth, or cellular â not covert or modulated signals.
- Targeted signals are often subtle, near the noise floor, or modulated, making them invisible to simple counters.
- To detect covert RF threats, you need:
- A spectrum analyzer with sub-kHz resolution bandwidth (RBW)
- A waterfall display to visualize signal behavior over time
- IQ capture for demodulation and replay
A frequency counter is not enough â itâs like trying to find encrypted files using a calculator.
𧢠2. The â$40K Weapons-Grade Analyzerâ Scam
Another figure in the community uses a 40-year-old analyzer that âused to cost $40K.â Today, itâs worth under $400 â and it shows.
The red flags:
- â No waterfall display
- â No IQ capture
- â No signal classification or verification
They simply point to a frequency spike and make claims â without proof, demodulation, or validation.
Thatâs not SIGINT. Thatâs waving around old test gear and pretending itâs a lie detector.
đ 3. The RF Explorer and âBodyguard Courseâ Crowd
Another popular scammer is using the RF Explorer, a cheap hobbyist tool. Combined with a low-level âbodyguardâ TSCM course, it gives the illusion of expertise.
Why this setup is useless:
- â No real RBW control
- â No IQ data capture
- â No logging or replay ability
- â No spread-spectrum detection
RF Explorer is designed for hobbyists, not professional threat detection. Anyone using this to diagnose âRF attacksâ is misleading people â and possibly endangering them.
â ď¸ 4. Even the Legit TSCM Guy Misses the Mark
One individual does have real TSCM credentials and uses an REI OSCOR in a shielded lab. Sounds good, right?
But hereâs the catch:
đ REI OSCOR Specs:
- Minimum RBW: 12.2 kHz
- Sweep range: 10 kHz â 24 GHz
- Sweep speed: ~1 sec per full pass
Thatâs fine for finding bugs or emitters â but not covert, low-bandwidth, bursty, or frequency-hopping signals.
You need RBW < 1 kHz and synchronized IQ capture to find these. OSCOR will miss them entirely.
This is like trying to hear a whisper with earmuffs on.
đ§ What Real SIGINT Requires
If someoneâs claiming they can detect directed energy or covert RF harassment, their toolkit better include:
- â Sub-kHz Resolution Bandwidth (RBW)
- â Real-Time Spectrum Analysis
- â Waterfall / Spectrogram View
- â IQ Capture & Replay Tools
- â Signal Classification Libraries
- â Proper Geolocation + Antenna Profiling
If they canât show this â theyâre not doing real SIGINT. Period.
đ Final Thoughts
If someone is claiming to detect âweapons-grade RF attacksâ with:
- A frequency counter
- An ancient analyzer
- A cheap RF Explorer
- A low-end TSCM course certificate
…then they are either unqualified or deliberately misleading people.
Donât fall for it.
If they:
- Canât provide IQ logs
- Donât know what RBW or SNR thresholds mean
- Canât explain modulation or demodulation
- Donât offer visual proof from a waterfall display
Then theyâre offering junk science and false hope.
đ§Ş Demand Real Tech. Demand Real Methodology.
Because your health, safety, and credibility deserve better.