presented at MITRE SEMINAR
National Security and Corporate Propriety are at risk from the careless distribution of data.
Thomas V. Sobczak conceived an organization and logic necessary to define solutions that
create or explain information envisaged as proprietary and secret. During the last twenty
years Sobczak has gathered and sold misplaced solutions and secrets to Government and
Business. This article will make you aware of the vulnerabilities of democracy.
BECOMING A PUNDIT
The quantity and quality of available information concerning any topic are frightening.
Anyone with access to Bulletin Board Systems (BBS), the INTERNET, News Groups or
University File Transfer Protocol (FTP) sites, or those willing to pay for information stored
in proprietary databases, can share access to vast repositories of incidental information.
Facts can be collected, organized, and structured using information models to define
solutions and corporate or national secrets.
The rapid expansion on the Internet triggers egoists and egotists to share secrets with the
world. In most cases incremental comments are useless without a "Big Picture." Intelligent
people establish "Big Picture" boundaries. In many cases' data considered proprietary and
secret in the United States may be readily available offshore. The global economy
contributes to insensitivity to proprietary facts and secrets. Those conducting Google-hack
type searches do no more than play a lottery. Most results are negative. Secrecy is
preserved through ignorance.
Hobbyists use commercially off the shelf (COTS) hardware/software to clone systems.
Segment Indexed Integrated Databases (SIID) has validated available information
concerning mechanisms that disrupt automation. These initial efforts validate the premise
of hi-tech system vulnerability. During desert storm Sobczak provided US Southern
Command (SOCOM) information about use of Radio Frequencies (RF), with manufacture
manuals, to detonate mines produced in Germany and Italy. He provided access to
"in-country" Kiwaiti hackers and to command and control communications in Iraq. The
Thompson CSF backbone integrating Iraqi Command and Control was readily available
for spying. This large telephone switch was programmed using AT&T's COSMOS
Programming Language. French and American Hackers defined weakness and created
code to corrupt the switch. SOCOM failed to take advantage of this weakness. General
Schoonmaker, than a Colonel, bypassed this opportunity. SIID identified RF conditions that
cause both cruise and Patriot Missile to divert from a target. The accuracy of this research
was later supported in Desert Storm after action reports.
Segment Integrated Indexed Databases (SIID) is a method/system that uses applied
science joined by Office Suite software to integrate dissimilar data originally hosted on
dissimilar hardware. The SIID system allows islands of specific information to be isolated,
merged and manipulated for the benefit of users within any enterprise or those seeking to
A large share of money spent to research new technologies results in warehoused
solutions. Many researchers do not know how to market their creations. The waste of
intellectual property is an extravagance taken for granted by those funded with
Government largess. Useful research is seldom relocated. The program explained herein
was created to benefit projects with limited resources. The SIID system began by finding
answers for Federal Program Managers attempting to look for solutions their contractors
have missed. Examples of how the system works set the stage for insecurity.
The Federal Government has tools that, when used non-traditionally, allow knowledge
integration to occur in a less complex manner than is presently evolving as data
warehouses. Available methods that aid integration include the Work Breakdown Structure
(WBS), Group Technology (GT), Classification and Coding (GTCC), Integrated Definition
(IDEF), etc. An artificial intelligence engine offered a means to drive the initial SIID prior
to integration using Office Suites. NASA CLIPS was the original Artificial Intelligence (AI)
engine used to trigger integration. The AI engine was freely given by the Johnson Space
Flight Center and Langley.
SIID methodology is manufacturing technology refashioned to be generic. SIID begins by
using a Work Breakdown Structure (family tree). It expands by using Integrated
definition(IDEF) logic. Group Technology Classification and Coding (GTCC) cement
organization, i.e., Grouping like items or ideas. The difference is that SIID can group ideas
rather than physical components. Focus and control become evident as the relations
between facts and their intended use emerge. An SIMPLIMATRIX (Simplified Matrix),
produces the data structure that suggests new conclusions. Duplication and redundancy
are eliminated when logic and common sense keywords are applied to narrow the focus.
SIID knowledge engineering uses code structure constructed logical relations that allow
information-caching from dissimilar data base (file) structures hosted on dissimilar
SIID precisely puts items of data in a classification matrix. Eight dissimilar databases
integrated within the first SIID model produced a diverse universe of technological
information. The process involved writing software to extract data as a flat file, convert it
to ASCII format, and transmit the ASCII to a host machine. Sobczak identified and merged
equivalent data, structured the merged result and manipulated/integrated the result using
newly assigned common format tags (key words). The source DBMS and its host hardware
were irrelevant to the process once we leech the data. The modern SIID uses hundreds
of search engines in dozens of nations to identify and collect related facts.
SIID uses search engines to transition information and technology. The evolution of
database architecture forms the basis for joining various islands of information. An early
SIID effort involved simplifying the transfer of data between IBM, Honeywell and DEC
hardware. This undertaking cost to the Air Force Wright Laboratory was almost three (3)
million dollars. Data distribution occurred in a traditional and pedestrian fashion. The USAF
Integrated Computer Aided Manufacturing (ICAM) Project Office awarded a small contract
to Dr. Thomas V. Sobczak. He used it to formalize a set of rules for data integration that
he termed SEGMENT INDEXED INTEGRATED DATABASES (SIID). The initial SIID logic
showed a way to collect scientific research outputs and structure relevant technology
integration. SIID has since expanded to be ubiquitous.
A sample of American Internet search engines currently used as components of an SIID
SIID uses search engines in England, France, Germany, Italy, China, Australia, Japan, Sweden,
Norway, Israel, etc. Their results add alternate source data to expand SIID. Several require
translation into American English Idiom.
CONCEPTUALIZING NEW KNOWLEDGE
Our example uses the topic "the PROPHET." (AS/MLC-40) Twenty domestic search
engines returned 17,000+ hits. The Prophet Mohammed dominated the results. Topics fall
victim to society. The term PROPHET modified by (and/+) SIGINT was substituted. A more
manageable 312 hits were revealed. It is important to note that the documents located had
many titles. The word PROPHET was included somewhere in the document. Results also
pointed toward Foreign Military Sales sites (Domestic and foreign) and to manufacturers
in the United States and six foreign nations. What is considered proprietary or secret in the
United States is not treated as secret abroad.
A work breakdown structure of ideas was constructed using the search of results (classified
information is excluded.) An SIID search, almost always, identifies problems of semantics
and dozens of tangential topics. Upon adding key words to Search Engine results, more
focused results were merged and sorted. The initial results make the "Tower of Babel"
seem ordered. Each service and agency lays claim to knowledge by creating a thought to
be unique vocabulary. This purposeful confusion forced development of a common word
structure for ease of future identification and integration. Sobczak created logic that
adapted to crossovers, i.e., valid word placement in more than one contextual level of the
WBS. We re-titled every citation so that it contained both SIID keywords and generic
keywords. Sorting using the SIID title achieved commonality of meaning. An early
assumption required three unrelated references to a concept before it would be assumed
The PROPHET + SIGINT Work Breakdown Structure (WBS) relationships partially include:
LEVEL (1) (2) (3) (4)
Tobyhanna Army Depot
Delfin Systems Corp.
Thompson Racal Defence
Intelligence School and Center
Fort Lewis, WA
XXX Intelligence Battalion
Foreign Military Sales
UNITED KINGDOM BATES
Studies under the blanket funding for Prophet
ASAS-RWS and -L
In all about one hundred thirty (130) keywords were identified down four indenture levels
with little effort.
Many terms appear at different levels in a topic stratum. The idea of Group Technology
(GT) is applied creatively. In place of grouping like physical parts, SIID groups like ideas.
The result is akin to a Japanese Bonsai tree in shape. It allowed any use of a term, at any
level in the WBS strata to be found and tracked as one rather than multiple entities. The
net result of this procedure eliminates duplicate ideas made different only by their location
in the organization's strata. The SIID data base management system (SDBMS) index
references fewer terms.
DISORGANIZATION FOR PROFIT
The Executive Departments and the Congress misstate their purposes. Congress trumpets
attempts to control and/or eliminate excess procurement. Yet, Members want funds for
businesses in their districts. The Military, as is apparent from the PROPHET model, seeks
noncompetitive procurement. Sole-source contracting and MIPR (Internal funds transfers)
occur with frequency in PROPHET.
Contracting vagaries proliferate. PROPHET has a five-block approach. The SIID suggests
actions that forestall competition. In place of one Signals Intelligence/Electronic Warfare
system, contracting gluttons create Block One, Electronic Support; Block two, Electronic
Attack; Block Three, Modern Signals (The Agile Signals); Block Four, SIGINT/MASINT
Fusion; and Block Five, Micro-sensors and Robotic Sensor Extensions. Other sole source
comes about by the creation of undefined studies. In the case of PROPHET, the
LEVIATHON studies were created.
In the search of twenty-one databases, the only appearance of LEVIATHON happens in
the R-2A Exhibit, i.e., Army RTD&E Budget Item Justification. LEVIATHON is a best kept
secret. If others know of its existence, they might ask to compete. Should one read the
R-2A, he would suspect that involved contractors hired a retiring executive who went back
to the well to gain job security for his new employer from old friends. Should someone ask
about LEVIATHON, he will find it classified for National Security Reasons.
USING COMMON SENSE
Free spirit researchers rebel at man-made rules put in the path of their search for free
access to anything in electronic format. They menace American technological supremacy
by carrying academic freedom to the extreme. Individuals given the proper stimuli, reach
out beyond the system and exceed the norms governing creativity. Unstructured solutions
exist as a fact of our everyday lives. Often, we know them by terms appropriate to the
industry in which we toil. A SIID spotlights data availability.
Creative minds are frustrated by rules that place creativity at a premium and then deny the
fact and attainment of creativity. Frustrated researchers channel their abilities and search
for satisfaction in other directions. One result is the manipulation of proprietary information.
There are no secrets. Knowledge of any topic can be located, collected and misused.
Thousands of experiments and reports exist but belong to no specific author. They are
available at minimum or no-cost. One can review files of Freeware and Shareware, News
Groups, Chats, BLOGS, or sales/marketing literature on-line in order to view hundreds of
facts and no-cost solutions (miscellaneous trivia).
A plethora of available information allows a novice to collect, trade and succeed without
experiencing the consequences of failure. Professionally prepared information comes
available from people who satisfy their egos or insecurities by sharing too much proprietary
information while providing copies of otherwise unattainable documents. Military
Intelligence becomes a oxymoron when well secured primary web sites stop head-on
access but permit linking behind the firewall from other poorly secured web sites. Using
human engineering can gain an Army Knowledge Online ID and Password. Conservatism
allows you to function unknown to those responsible for securing data.
Managers can locate volumes of detail and trivia revealed beyond the generally available
training, operations and maintenance manuals provided by system integrators, equipment
manufacturers, and Logisticians. In our PROPHET example the ABCA Parts List, System
Training Plan for the Prophet (AS/MLC-40) and the Third Infantry Division (Mechanized)
After Action Report, among many, are freely available. In a paperless society thousands
of e-mail entries are stored electronically (and insecurely) as reference resources. We
located several hundred pieces of correspondence within and without CECOM referencing
C++ for PROPHET and MMI (a laptop computer used by brigade intelligence).
Thousands of federally funded outputs (Reports, Studies, Thesis and Dissertation) are
located in thousands of File Transfer Protocol (FTP) based libraries. Hobbyist Bulletin
Boards house results that lay fallow. A researcher needs a pencil and pad to keep a record
of the search path taken. Our earliest SIID studies were slowed by tangential reading about
topics of momentary interest. Many later studies were made easier by several hundred
structures cataloged since the first SIID.
In a manner similar to a lawyer examining a contractual agreement and annotating it for
all possibilities, the information collector or spy, identify every foible and weakness that
human nature allows. A serious investigator can learn a great deal from the volume and
quality of research leavings available for sharing. Ego stroking goes far to amplify results.
Targeting the sources of identifiable original research is as easy as reading a technical
magazine for a keyword topic, followed by accessing the directory of knowledge located
by a search engine Sobczak has defined dozen's of Bulletin Board System (BBS) data
sources by a self developed quality rating system. Upper end BBS, chat rooms, and private
news groups are frequented by advanced degree and experienced professionals. Special
interest groups rival post-post-graduate seminars.
As PhD's specialize, so does the prudent investigator. When a person attains super
privilege (access to everything) and the proper level of involvement, information is passed
about freely. The USAF Weapons Laboratory High Powered Electro Magnetic Pulse
project, the Rifle Laser pulse weapon (Eye Patch)at Harry Diamond Labs, or the CECOM
Prophet EW sensor project (used as an example above) can be isolated and defined down
to, at minimum, a third tier subcontractor or code specific level by persistent researchers.
Unlimited access to Army Knowledge Online (AKO) eases the way. Monitoring
Program/project cost overruns is an easy way to locate problems (potential topics for
further research). Congress and its Budget Office provide indices of secrets.
Most systems can be thrown into disorder or the curtain can be raised to allow a view of
ongoing disorder. Most secrets are vulnerable to exploitation.
EXAMPLES FROM TWENTY YEARS OF ORIGINAL RESEARCH
SIID studies identify and focus knowledge to create new products and markets. Waldes
Kohinoor (NY) found they owned a tin-zinc over-coating that made cadmium plate
environmentally acceptable. They created a new Corporate Division. Solarex Corporation
(MD) found a new use for previously scrapped photovoltaic slivers. The poor quality sliver
tiles were connected in series on the roofs of university buildings to produce sufficient
electricity to generate ninety percent of the building's electrical requirements.
Sobczak-acquainted the Strategic Defense Initiative (SDI) Civilian Security Chief about the
vulnerability of SDI HP 3000 computers, located in the Pentagon Basement, to an
incursion. His military counterpart had refused to acknowledge any vulnerability. The story
was featured in Federal Computer Week. This occurred tangentally to another study.
Segment Indexed Integrated Databases (SIID) has been used for the benefit of the USAF
to locate and develop solutions to problems thought to be without solution. We evaluated
the AFWL/ML/IMC/MM program (Air Force Wright Laboratories Material Laboratory
Integrated Manufacturing Control /Material Management). GE developed a $3,000,000+
solution. The test model was implemented by Northrup costing an additional $1,000,000.
Sobczak modeled an IMC/MM SIID, based on USAF Integrated Computer Aided
Manufacturing (ICAM) specifications. He duplicated, using a paper model, the $3,000,000
project using Commercial Off the Shelf (COTS) hardware and software costing $39,000.
Sobczak was hired by ASD/B1B/MOS (Aeronautical Systems Division B-1B Supersonic
Bomber Program Manufacturing Operations Support) to research a solution to soft metal
cutting problems caused when trimming titanium burned wing skins. His soft metals
manufacturing SIID identified a high pressure-water based cutting solution used to make
aluminum storm windows in Germany. The $200,000 solution replaced a $9,000,000
research investment by the prime contractor. Sobczak developed a COTS SIID for
WPAFB/AFRL/XPX (Air Force Research Laboratory Experimental Programs) that
eliminated a custom designed heads up display for the preliminary Stealth Fighter Aircraft.
In 1990, Sobczak demonstrated at the School of Aerospace Medicine Radiation Sciences
Division (USAF/SAM/RSD) the ease with which overlaid chip embedded code controlling
a VDT snap back mechanism affects operators. The tests included: Capture and
modification of the refresh rate (snap back mechanism) of a video tube; disorientation of
people using: Light and Sound, stimulating vibration in a tooth filling to cause Pain and
Inner Ear `voices, and the triggering of an involuntary nerve synapse. Aggressive uses of
collected data are endless. Anything from a dish antenna driver through a radar guidance
system can be manipulated or destroyed. Our research determined most commercial
sensors are not protected. Monitored signal inputs can be used to produce a negative
psychological effect. Aggressors might target our example's (PROPHET) programming.
74,000 lines of C++ code for SIGINT provide a target. 200,000 lines of Application code
for the MMI interface NT/4 to the PROPHET are equally at risk.
A SIID study of Radio Frequencies located extensive scientific research about
psychological operations originating in Russia. These targeted equipment operators. SIID
identified specific areas of research and tracked occurrences. By judicious trading he
obtained direct dial telephone numbers of Medical School computers and Government data
repositories engaged in defining psychological manipulation. It is feasible to affect brain
cells by software produced low frequency waves. Sobczak's goal was to alter psychological
states (create mood changes) and to transmit stimuli that trigger suggestions and/or
commands directly into the brain. SIID results showed the way.
Defense and the CIA had become paranoid about loss of mind manipulation leadership.
MK ULTRA (ARTICHOKE), MKDELTA, MKNAOMI, MKRESEARCH, BLUEBIRD (renamed
ARTICHOKE by DCI) and some continuations of the earlier CHATTER Project (1947) were
authorized to regain mind manipulation leadership. Sobczak gained access to the research
produced in these projects. He focused this unfocused research.
SIID research proved that electromagnetic fields raising body temperature by less than 1
degree Celsius result in somatic change. Chemical, physiological and behavioral changes
occur within "windows" of frequency and energy continua. The SIID suggests brain cells
will be reachable diversely, flexibly and routinely in the not too distant future. Sobczak
showed SAM/RSD a means to use software to affect people.
Exploration of the relationship of computing devices to a cross-membrane phenomenon
is not documented anywhere in American unclassified publications. The relationships were
glaring within the SIID structure. SIID provides a high risk but enormous payback potential
to secure systems from energy aggression that subverts operator ability to function.
Sobczak extended the key factors he located to determine how a computer-based soliton
(earlier called an exciton) might be created in software and triggered to affect people. The
potential for an ultimate virus was defined. The results were leaked by Vint Hill Farms and
immediately objected to by Business Week magazine in an editorial.
Kill potential of RF transmitted software code is a topic of discussion within the electronic
hobbyist culture in both western, eastern and pacific rim countries. Sobczak has monitored,
collected and structured text dealing with signal manipulation, jamming, transceiver
substitution and attempts at entering and controlling an electronic system via RF
transmissions. Sobczak has located volumes of malicious codes used as the medium to
be injected into computers and circuits.
SIID research determined Russian mathematicians had been concerned with solitons
(initially referred to as excitons) long before Americans became interested. It is conceivable
that researchers, Davydov, Drazin and Boris Ponomarev, functioning under the wing of Uri
Andropov achieved workable results that warranted further testing. Did the Russians use
RF to attack the Moscow Embassy? We paid State Department staffers bonuses just in
case this happened.
In 1991 Sobczak showed AIR-055 how SIID found an FLTSATCOM link could be used to
port UNIX "do loops" and REXX code to Harris hardened but poorly secured Digital
Equipment VAX computers on an operational aircraft carrier. Sobczak created an
integrated software security solution (V-PHAGE) modeled on the NSA
compartmentalization model using SIID results.
When he was Chairman of the Manufacturing Controls Division of the Computer and
Automated Systems (CASA) Division of the Society of Manufacturing Engineers (SME) Dr.
Sobczak created an SIID to simplify the application of manufacturing terms across Industry.
His successful SIID was adopted and published by the SME and by the International Labor
Organization (ILO) of the United Nations as the first draft Manufacturing Terminology World
Standard. The Society of Manufacturing Engineers has recognized and published Dr.
Sobczak's Manufacturing Terms Baseline under the title: A Glossary of Terms Used in
Computer Aided Manufacturing. By tagging like ideas Sobczak reduced 16,000 terms to
a manageable 4,300 definitions without loss of content or context.
COMMON SENSE IS UNCOMMON
Unfocused investigators create undocumented research. Problems can be solved using
inventive results from chance sources. Sobczak defines the universe of original
investigation created outside Government and/or commercial industries. SIID locates pure
and applied research to create results that produce salient solutions or new intelligence.
Based on using the Internet and Public Domain Bulletin Board Systems (PDBBS), hobbyist
researchers (usually PhD level and beyond) employ COTS components and software to
manipulate state-of-the-art technology. Imagine integrating the theories of a thousand
Einstein or Edison clones.
The window of opportunity to stop an impending attack by hobbyist terrorists is ignored.
Programmatic time bombs are hidden among the millions of lines of trusted computer code
that functions as a part of any modern electronic environments such as JSTARS and BMO.
Code reuse saves money but it works for our enemies.
Decision makers ignore the concepts that led to success by the American colonists in the
prosecution of our revolutionary war. Early Americans did not follow tradition. They made
new rules to fit the situation at hand. Provocateurs have thrown away the rules defenders
expect. IP spoofing is a simple example. Future spoofing will include a virtual node to
enhance sniffing and the volume of collectibles.
We believe it is significant:
1. When unanticipated technologies are introduced with no prior knowledge or preparation
by a guardian, the unanticipated aggression will achieve decisive results.
2. The probability of American involvement against western technology in localized
incursions (Somalia, Bosnia, Afghanistan, Iraq) is high due to the large and growing
inventory of surplus, previously used, systems available worldwide. Modern battle plans
do not anticipate this probability. They are vulnerable to the threat posed.
3. Electronic Warfare systems available to an American Manager are not useful against
re-engineered western technology. The use of tactics and counter force to insure
operations requires training. Training is not readily available. The probability of defense
against an incursion is greatly reduced. It may be nil.
4. Western equipments and schema are geared to aggression conceived in the former
Soviet Union and Eastern Bloc. They are ineffective to assure survivability among random,
Modern systems depend heavily on electronic technology. SIID studies suggest this
technology itself constitutes a vulnerability. It is foolish to consider facing unanticipated
aggression without the advantage of knowing enemy strategies and methods. Constructing
non-traditional SIID models, necessary to developing hardware and training programs to
assure survival of the unsuspecting against hobbyists and terrorists, is not happening.
American electronic countermeasures are behind the power curve based on text Sobczak
has located. Aggressors exhibit potential far beyond that for which they are given credit.
Sobczak has re-engineered a sampler of these off-the-wall technologies. American
security is at risk.
In the past twenty years Sobczak analyzed inputs from hundreds of web sites and several
thousand Bulletin Board Systems in the United States, Europe, the Pacific Rim, the
Mid-East, South America, and Russia on a limited basis. The imbalance of
communications facilities outside the United States makes the collection of aggressor
inputs more difficult. Conversely, American freedom gives aggressors an advantage. We
identified about one dozen sources willing to discuss data collection that benefits an
aggressor. Most enemy equipments are clones of western equipments. (See Booz, Allen
Hamilton Study available from the Government Printing Office and Papers from Monterey,
Fort Levenworth, Fort McNair and the Carlyle Barracks.)
Sobczak is extending SIID knowledge to the systems marketed in the third world. This is
being accomplished by polling military and INTERNET special interest groups to collect
data to round out our study universe. Bulletin Boards in Africa, Israel and Poland have
been most helpful in explaining the functioning of Russian and Eastern European
EXPOSING A UNIVERSE OF SECRETS
As you review the foregoing experiences, you can see the chance for small scale urban
terrorism. The November 24th, 1987 edition of the Baltimore Sun reported residents of
Frederick, MD had problems with unexplained operation of electronic garage door openers.
Device owners returned them and found in the store that the units worked perfectly.
Nearby, the U.S. Army operates a major communications center for both domestic and
international traffic. An Army spokesman stated their transmitters were not radiating signals
that would affect the garage door transceivers. When the transmitters were shut down, the
garage door openers worked properly. While the Army stated that they were not the
problem, the "problem" did disappear when the Army narrowed frequency bandwidth and
eliminated side lobes coming from the transmitting antenna. PROPHET used in Iraqi
Freedom can be manipulated by savvy terrorists. Without Unmanned aircraft (UAV) to
scout, the Third Infantry was forced to send a patrol to check any location generating radio
signals within the scope of the PROPHET technical package. The patrol was at risk of
being set up for ambush. The Secretary of Defense saved monies by eliminating Brigade
air intelligence at the expense of soldiers. (Somalia deja vu)
An aggressor has the capability to collect and/or modify RF and microwave signals if he
has an antenna attached to receiving equipment. Most commercial units include signal
amplification circuits to adjust for the ever growing background noise generated by normal
commercial stations and reception characteristics. You can read information generated on
a video display tub (VDU) in any locality as easily as you were tuning a mechanical TV
receiver. SIID suggests that those who retained their old black and white Television
receivers own an SIGINT weapon.
Consider the number of micro and single board computers in standard commercial
devices.. Next, imagine the possible effect of a hobbyist ELINT OR SIGINT operation. A
host of vulnerabilities is opened in the surveillance information gathering operation.
Terrorists have a wide-open way of monitoring the daily practices and transactions of
targets with complete impunity. Security is completely unguarded due to the lack of belief
in solutions created outside the system.
In our SIID observations, we have seen a wide spectrum of emitted signals with a strong
signal between 9.0 and 9.250 MHz for the display of standard text scrolling. Better signal
display was found at the lower frequencies of 9 MHz. Monitor frequencies were found in
the area of 11 through 19.5 - 20 MHz. Printer frequencies are in the range of 140 to 200
MHz. Disk operations were detected in the ranges of 88 to 250 MHz. Overall frequency
generation was from four through 500 MHz. The modem was found between 28 and 300
MHz. All in all, discovery of radiated or transmitted signals transmitting software code is
technology leading to tomorrow's insecurities. This logic is not addressed by the PROPHET
or any other EW design.
Malicious intent is a problem against civilian targets such as computer installations, bank
and operations support structures by overriding security systems and any other systems
that may be affected by manipulated frequencies.
This technology is well within the range of individuals intending to create mischief.
Equipment we have located using SIID is nothing of technical sophistication, just a few
simple block circuits integrated to produce the required result. All located equipments and
plans are available to free thinkers and aggressors capable of structuring searches and
search results. Most technologist intellectuals do not accept the fact that functioning
systems for intelligence collection have been designed by hackers and terrorists. Data is
freely available to corrupt systems.