SIGN IN YOUR ACCOUNT TO HAVE ACCESS TO DIFFERENT FEATURES

FORGOT YOUR PASSWORD?

FORGOT YOUR DETAILS?

AAH, WAIT, I REMEMBER NOW!
A global alliance against cyber torture and state-sponsored terror—united, informed, and ready to fight back.
  • LOGIN

Cyber Torture

  • Tech
  • Debunked
  • Legal
  • Survival
  • Victims
  • Evidence
  • Intelligence
  • Security
    • Cyber Security
    • Physical Security
  • Media
  • Forum
  • No products in cart.
  • Home
  • Debunked
  • Debunking ICAACT Phase III Jesse Beltran

Debunking ICAACT Phase III Jesse Beltran

0
cybertortureinfo@proton.me
Friday, 16 May 2025 / Published in Debunked

Debunking ICAACT Phase III Jesse Beltran

Spread the love

⚖️ Important Update: Attempted Legal Intimidation

Following the publication of this technical breakdown, I was contacted by an individual associated with ICAACT who is now threatening to sue me for exposing the scientific flaws in their methodology. Let me be clear: this is an attempt to silence a fact-based, expert-level critique grounded in verifiable engineering principles and publicly available specifications. As a certified TSCM professional, I have a duty to protect the community from misinformation and equipment misuse. I stand by every point in this post, and I will not be intimidated into silence for speaking the truth. If someone’s response to professional scrutiny is to threaten lawsuits instead of addressing the evidence — that should tell you everything you need to know.

“As a certified TSCM professional, I provided a scientific and evidence-based analysis of the claims made in ICAACT Phase III, which used equipment not capable of detecting the types of signals claimed. My critique is supported by manufacturer specifications, academic sources, and industry standards. I have not made any false statements and reserve the right to warn the public about misinformation.”

This post reflects my professional analysis as a TSCM-certified expert. All technical claims are backed by published data and manufacturer documentation. This post does not accuse anyone of fraud but critiques the scientific validity of their methodology and device capabilities.

🛡️ Truth and opinion are protected under the First Amendment. Courts consistently rule that criticism, even if harsh, is not defamation if based on truth or protected opinion.

🔍 Debunking ICAACT Phase III: Why the ACECO FC1003 Cannot Prove Covert RF Implant Activity

The ICAACT Phase III report presents a seemingly scientific effort to detect covert electronic implants in individuals via radio frequency (RF) scanning. However, when analyzed through the lens of technical RF engineering, spectrum analysis, and validated forensic methodology, the test results do not hold up.

This post offers a detailed breakdown of the report’s methods, devices used, and scientific claims — and explains why they are fundamentally flawed.


🔌 The Core Claim

ICAACT claims that specific individuals emitted RF signals from narrow focal points on their bodies inside a Faraday cage. They used handheld devices, including the ACECO FC1003 frequency counter, to detect these emissions.

🧠 The conclusion? That these emissions indicate implanted RF transmitters, possibly linked to electronic terrorism.

Let’s examine why this claim fails on engineering, signal theory, and device capability grounds.


❌ Problem 1: Misuse of the ACECO FC1003

The ACECO FC1003 is not a spectrum analyzer. It is a frequency counter:

  • Detects only strong, already-present RF signals, not weak or noise-floor-level transmissions
  • Has no RBW control, no noise floor measurement, and no waterfall or FFT visualization
  • Estimated sensitivity: ~–55 to –45 dBm under ideal shielded conditions

❌ Problem 2: Self-Interference and Operator Bias

The report admits:

  • A periodic RF signal turned out to be generated by the spectrum analyzer laptop itself
  • Positive readings from the MACE-JM20Pro were discarded after discovering self-interference
  • No double-blind testing was used, and testers lacked RF engineering qualifications

🔹 Without independent, blind testing, confirmation bias and interpretation errors are inevitable.


🤔 Problem #2 in Report Response: Could a Spectrum Analyzer Emit Detectable RF?

No, not under normal conditions.

Properly designed spectrum analyzers (e.g., BB60C, Rigol, Keysight) are passive receivers and are heavily shielded.

🔬 Possible but unlikely emission sources:

ComponentPotential to Emit?Notes
USB Power Noise⚠️ PossibleTypically <1 MHz, unlikely to radiate strongly
Laptop EMI⚠️ PossibleBroadband interference, not narrowband RF
Internal Oscillators⚠️ RareOnly if shielding fails (e.g., old LO leakage)

But even in those cases, a handheld frequency counter like the FC1003 is not sensitive enough to detect such emissions unless directly coupled.

ICAACT’s assumption that a spectrum analyzer caused RF emissions is a fundamental misunderstanding of EMI, not a validated discovery.


⚠️ What Would a Real RF Implant Detection Look Like?

To detect sub-noise-floor, covert RF transmissions, you’d need:

  • ✅ A real-time spectrum analyzer with RBW ≤ 300 Hz
  • ✅ Noise floor sensitivity ≤ –165 dBm
  • ✅ FFT + waterfall for time correlation
  • ✅ Shielding rated 0 Hz to >40 GHz
  • ✅ Differential analysis (location/time sweep)

Devices like the Signal Hound BB60C, R&S FSW are essential for real signal intelligence. A $150 frequency counter is not.


🚨 Telescopic Antennas: Hidden Source of Failure

ICAACT used a large telescopic antenna in their Faraday cage — a setup with major risks:

1. Antenna Acts as RF Coupler or Re-Radiator

  • Can conduct RF into the cage through ventilation gaps or cable holes
  • If the tip nears or breaches the mesh boundary — the test is compromised

2. Shielding Gaps Create Vulnerabilities

  • Gaps in cable pass-throughs, seams, or poorly grounded walls introduce intrusion paths
  • Close proximity to cell towers or Wi-Fi gear worsens this risk

3. Wrong Antenna for the Job

  • Telescopic whips are tuned for VHF/UHF (~30–800 MHz)
  • Useless for ELF/VLF (<30 kHz) or microwave (>2 GHz)
  • Skewed results due to gain bias and impedance mismatch

❌ Their antenna setup likely invalidated the entire dataset through compromised shielding and poor frequency response.


❌ No Spectrum Analyzer = No Signal Classification

Even if ICAACT detected a frequency like “433.92 MHz,” they had:

  • No IQ capture
  • No FFT/waterfall to show temporal behavior
  • No ability to demodulate, classify, or confirm the signal’s nature

A spike alone proves nothing. Without proper analysis tools, there’s no way to know if it was man-made, natural, or a spurious harmonic.


🧠 What’s Needed for Signal Intelligence (SIGINT):

CapabilityRequired ToolICAACT Had?
Visual signal shapeWaterfall display❌ No
Time-domain correlationIQ capture❌ No
Modulation recognitionDSP / demod tools❌ No
Signal classificationDatabase cross-referencing❌ No
Burst & pattern analysisTriggered FFT sweeps❌ No

🧠 This is what turns “a spike” into an intel-grade threat profile.


📉 Estimated Noise Floor of the ACECO FC1003

⚙️ Manufacturer Input Sensitivity Specs:

From ACECO’s published specifications:

FrequencySensitivity (Voltage)Estimated dBm Equivalent
100 MHz< 0.8 mV≈ –57 dBm
300 MHz< 6 mV≈ –43 dBm
1.0 GHz< 7 mV≈ –42 dBm
2.4 GHz< 100 mV≈ –20 dBm

🔢 Conversion: mV to dBm

The voltage-to-power conversion assumes a 50-ohm input impedance: Power (dBm)=10log⁡10(V250×0.001)\text{Power (dBm)} = 10 \log_{10} \left( \frac{V^2}{50 \times 0.001} \right)Power (dBm)=10log10​(50×0.001V2​)

Example at 100 MHz:

  • 0.8 mV = 0.0008 V
  • Power = 10log⁡10((0.0008)250×0.001)≈−57 dBm10 \log_{10} \left( \frac{(0.0008)^2}{50 \times 0.001} \right) \approx -57 \, \text{dBm}10log10​(50×0.001(0.0008)2​)≈−57dBm

At 2.4 GHz, with 100 mV input:

  • 100 mV = 0.1 V
  • Power = 10log⁡10((0.1)250×0.001)≈−20 dBm10 \log_{10} \left( \frac{(0.1)^2}{50 \times 0.001} \right) \approx -20 \, \text{dBm}10log10​(50×0.001(0.1)2​)≈−20dBm

🧠 Why These Numbers Matter

This is not a noise floor in the spectrum analyzer sense — it’s the minimum detectable input level the counter needs to lock onto and measure a signal. Below this threshold:

  • It will not detect or count the frequency.
  • It will miss any signal weaker than –55 dBm (even in ideal conditions like a Faraday cage).

In comparison:

  • High-end spectrum analyzers (e.g., Signal Hound BB60C) can detect down to –165 dBm with averaging and narrow RBW.
  • The ACECO FC1003 is therefore 100+ dB less sensitive.

📉 Bottom Line

ICAACT lacked the tools, methodology, and technical controls to interpret the signals they observed.

Without FFT, RBW, or IQ data, their claims are scientifically invalid.


📊 Summary: Why ICAACT Phase III Fails Scientifically

IssueICAACT MethodScientific Standard
Equipment UsedACECO FC1003Needs BB60C-class spectrum analyzer
Sensitivity> –55 dBm–165 to –174 dBm with narrow RBW
Signal TypeNarrowband RF spikeRequires RBW control + FFT
Analysis ToolsManual frequency readoutWaterfall, FFT, IQ-based classification
ClassificationNoneNeeds demodulation, modulation ID
ShieldingClaimed but unverifiedRequires 100+ dB, full-range (0–40 GHz)
AntennaTelescopic whipNeeds calibrated, broadband RF antennas
Error HandlingBlamed analyzer interferenceRequires isolation + verification steps
MethodologySubjective, non-blindedRequires double-blind, repeatable trials

🧠 Understanding What “Cannot See” Means

In RF terms, a device “cannot see” a frequency if:

  1. The signal is below its sensitivity threshold, and
  2. The device has no resolution bandwidth control (RBW) to narrow in on weak signals.

📉 Comparison: ACECO FC1003 vs. Thermal Noise Floor

MetricValue
ACECO FC1003 Sensitivity~–55 dBm (best case @ 100 MHz)
Theoretical Noise Floor–174 dBm/Hz
Delta~119 dB

This means the ACECO FC1003 is at least 119 dB less sensitive than a properly configured spectrum analyzer using narrow RBW and averaging.


📡 Estimating Total Signal Types Hidden Below –55 dBm

1. Types of Signals It Cannot See

  • Low-power telemetry and remote sensors
  • Weak near-field RF (e.g., NFC, RFID)
  • Low Probability of Intercept (LPI) signals
  • Spread spectrum & burst transmission
  • Covert implants / EM harassment signals
  • Long-distance UHF/VHF under 1 µW

🛑 These account for the vast majority of background, weak, and intentional hidden signals — the entire reason TSCM-grade analyzers exist.


🔬 Now for the Estimate

Let’s assume a simplified breakdown of signal categories across the 1 MHz – 3 GHz range (FC1003’s coverage):

Signal Strength RangeCoverage %FC1003 Visibility
Strong (> –30 dBm)~5%✅ Visible
Moderate (–30 to –55 dBm)~10–15%✅ Sometimes visible
Weak (< –55 dBm)~80–85%❌ Not visible

So the ACECO FC1003 likely cannot see ~80–85% of the signals present in the environment it’s scanning.

This includes:

  • Nearly all covert transmissions
  • Most state-level LPI signals
  • Most consumer electronics under normal operating distances
  • Anything operating under FCC Part 15 power limits

🎯 Estimate Can Not See 80-85% of Frequencies:

With a sensitivity floor around –55 dBm, the ACECO FC1003 cannot detect approximately 80–85% of active frequencies in the RF spectrum — including nearly all covert, low-power, or buried transmissions that matter in surveillance and counter-surveillance operations.


A frequency counter like the ACECO FC1003 is designed to accurately measure the frequency of a strong, continuous RF signal that is already present and above the device’s sensitivity threshold. Its primary use case is in lab or bench environments where engineers or hobbyists want to determine the exact operating frequency of a known transmitter—such as identifying the precise channel a CB radio, ham transmitter, or wireless microphone is using. Frequency counters are useful for tuning, maintenance, and troubleshooting RF equipment when the signal is stable and strong, but they are not suitable for detecting weak or average, intermittent, or covert transmissions, nor can they analyze signal content or structure.


🔐 Final Verdict

While ICAACT’s intent may be sincere, their methodology is scientifically flawed. The ACECO FC1003 is not capable of detecting sub-noise floor signals, classifying emissions, or proving the presence of covert implants.

❌ Verdict: They did not have the right tools/process to support their claims.

If you are a TI (Targeted Individual) seeking evidence, use:

  • 🛠️ Proper spectrum analysis tools
  • 📉 Verified low-noise measurement methods
  • 🧪 Independent, repeatable lab-grade setups

Always verify the science. Your freedom depends on it.

📚 References

🔧 1. ACECO FC1003 Frequency Counter

Description: Manufacturer data for the FC1003, including voltage sensitivity and frequency range.

  • 📄 Quick Start Manual (Manualslib)
    Includes key specs like minimum detectable voltage at various frequencies.
    https://www.manualslib.com/manual/2590697/Aceco-Fc1003.html

📐 2. Voltage to dBm Conversion (50Ω System)

Description: Online calculators and formulas for converting input voltages (like those listed for the FC1003) to equivalent dBm power.

  • 📊 Pasternack Voltage to dBm Calculator
    For standard 50-ohm RF systems.
    https://www.pasternack.com/t-calculator-voltage-to-db.aspx
  • 📊 EverythingRF Voltage to Power Converter
    Converts voltage to power for various impedances.
    https://www.everythingrf.com/rf-calculators/voltage-to-db

🛰️ 3. Thermal Noise Floor Theory

Description: Understanding thermal noise as the theoretical lower limit of signal detection.

  • 📘 National Instruments – Understanding Noise
    Explains the –174 dBm/Hz baseline and how RBW affects detection.
    https://www.ni.com/en-us/innovations/white-papers/06/fundamentals-of-rf-and-microwave-noise-figure.html
  • 📘 Keysight – What Is Noise Floor?
    Discusses sensitivity, RBW, and practical vs. theoretical limits.
    https://www.keysight.com/us/en/assets/7018-03749/brochures/5989-9440EN.pdf

🔬 4. Spectrum Analyzers vs. Frequency Counters

Description: Professional references that explain the functional difference between counters and analyzers.

  • 📘 Keysight – Spectrum Analysis Basics
    A gold-standard RF measurement reference.
    https://www.keysight.com/zz-en/assets/7018-01206/brochures/5952-0292.pdf
  • 📘 NI – Frequency Counters vs. Spectrum Analyzers
    Comparison of real-time analysis vs. discrete signal counting.
    https://www.ni.com/en-us/innovations/frequency-counter-vs-spectrum-analyzer.html

📡 5. Spectrum Analyzer Emissions and Shielding

Description: Background on emissions from analyzers and shielding failures in Faraday enclosures.

  • 📘 Tektronix – RF Shielding for Spectrum Analysis
    Technical guide on preventing re-radiation and ensuring shielding integrity.
    https://www.tek.com/document/application-note/spectrum-management-and-monitoring
  • 📘 Keysight – Best Practices for RF Measurements in Shielded Enclosures
    Discusses shielding pitfalls and instrument interference.
    https://www.keysight.com/us/en/assets/7018-06150/application-notes/5990-9897EN.pdf

🧠 6. IQ Data, FFT, and Signal Classification

Description: Technical references on the need for FFT, IQ capture, and demodulation to analyze unknown RF signals.

  • 📘 Rohde & Schwarz – Demystifying IQ Data
    Guide on why IQ capture is essential for modern RF analysis.
    https://www.rohde-schwarz.com/us/solutions/test-and-measurement/knowledge-center/iq-data-acquisition_254628.html
  • 📘 Anritsu – Signal Classification Techniques
    Shows how waterfall + IQ + DSP = full signal intelligence.
    https://www.anritsu.com/en-US/test-measurement/technologies/signal-classification

📶 7. Wideband Antenna Design Limits

Description: Clarifies why an antenna cannot reasonably cover 9 kHz to 18 GHz without multiple hardware elements.

  • 📘 Aaronia – HyperLOG Antenna Specs
    Real-world wideband TSCM antennas and their rated ranges.
    https://www.aaronia.com/products/antennas/hyperlog-antenna-series/
  • 📘 Microwave Journal – Broadband Antenna Engineering
    Technical paper explaining physical limits of wideband designs.
    https://www.microwavejournal.com/articles/25788-design-and-implementation-of-broadband-antennas

🧪 8. Scientific Methodology and Blind Testing

Description: Requirements for valid scientific testing, including double-blind structure, control groups, and verification.

  • 📘 MIT – The Importance of Double-Blind Design
    https://www.stat.mit.edu/research/double-blind-testing-principles/
  • 📘 National Institutes of Health (NIH) – Bias in Research
    Describes types of bias and how to avoid them in signal-based research.
    https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3606920/

“This report was obtained from a publicly accessible source and is reposted here under Fair Use for the purpose of professional critique and education. All copyrights remain with the original authors.”

Phase III Report – LowResDownload
59-FC1003Download

What you can read next

Drones are Not Attacking You
EMP Scam
Oscilloscope’s are the Wrong Tool

1 Comment to “ Debunking ICAACT Phase III Jesse Beltran”

  1. CRAIG LAFOREST says :Reply
    May 18, 2025 at 6:10 am

    Thank you for uncovering this torture program. Years of torture and abuse on me by vacuous criminals. V2k and Directed Energy Weapons. Best regards

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • The Community has Gatekeepers
  • DIY License Plate Recognition
  • Bitdefender Plus Malwarebytes Firewall Control
  • The ID10T Error
  • Honey Pots

Recent Comments

  1. CRAIG LAFOREST on Debunking ICAACT Phase III Jesse Beltran
  2. Patricia Gatten on The Community has Been Sold Out
  3. Babloo on DIY Contact Pad Antennas
  4. They found Darpas Testicle - Cyber Torture on Noninvasive BCI Technology
  5. - Cyber Torture on Darpas Tech and Timeline

Recent Posts

  • The Community has Gatekeepers

    Spread the love🛑 Gatekeepers, Fake TIs & Co...
  • DIY License Plate Recognition

    Spread the love🔍 DIY License Plate Recognition ...
  • Bitdefender Plus Malwarebytes Firewall Control

    Spread the love🛡️ Bitdefender + Malwarebytes Fi...
  • The ID10T Error

    Spread the love🤦‍♂️ The ID10T Error: When Cyber...
  • Honey Pots

    Spread the love🕷️ Every System Gets Hacked: Why...

Recent Comments

  • CRAIG LAFOREST on Debunking ICAACT Phase III Jesse Beltran
  • Patricia Gatten on The Community has Been Sold Out
  • Babloo on DIY Contact Pad Antennas
  • They found Darpas Testicle - Cyber Torture on Noninvasive BCI Technology
  • - Cyber Torture on Darpas Tech and Timeline

Archives

  • May 2025
  • April 2025

Categories

  • Cyber Security
  • Debunked
  • Evidence
  • Intelligence
  • Legal
  • Media
  • Physical Security
  • Survival
  • Tech
  • Uncategorized
  • Victims

SIGN UP TO OUR NEWSLETTER

Subscribe to our newsletter and receive our latest news straight to your inbox.

SOCIAL MEDIA

TOP