This writing pertains to some of the laws, security issues, and privacy issues that have been determined thus far in regards to professional research and development by MCE123 Technology Development. This writing is meant to provide categories of guidance for understanding some of the various laws, security issues, and privacy issues that pertain to the use of geospatial telepathic surveillance technology, rather than define what the laws are at this time. Due to the thoughts of each person being their own intellectual property unless if consent was given to obtain the thoughts, there are issues that pertain to both the verification and understanding of thoughts on a psychological level in regards to the technology, there are issues of privacy of each and every transcription separately, and there are additional layers of laws, security issues, and privacy issues that pertain to the thoughts, transcriptions, portions of such, the way that the information is gathered and stored, the way that the technology interfaces with other technology, other laws that pertain to privacy, compartmentalization of portions of the information, and the differentiation of thoughts from reality. The actual differences between one person compared to another may differ greatly, and the use of geospatial telepathic surveillance technology pertains to both technological issues and the technology protected under military intelligence laws, and medical issues protected under mental health records. At this time, access to geospatial telepathic surveillance technology is at the discretion of the U.S. Intelligence Community and the U.S. Department of Defense, pursuant to national security issues and on-going studies of how the use of the technology can apply to legal uses in civilian society, while at the same time recognizing the issues that pertain to security, including issues that pertain to potentials of misuse of the technology in a military combat mode, and as such the technology is under strict control of military intelligence jurisdiction pursuant to the protection of the national security of the United States of America.
TORT LAW
INTELLECTUAL PROPERTY OF THOUGHTS
The individual right to retain intellectual property rights to their thoughts, such that the use of technology by third parties without an established contract is a violation of the intellectual property rights, such that no exploitation as such had been authorized by legal contract.
INTELLECTUAL PROPERTY OF INDIVIDUAL MIND
The individual right to retain intellectual property rights to their mental capacity, such that the use of technology by third parties to study their intellectual capabilities without an established contract is a violation of the intellectual property rights, such that no exploitation as such had been authorized by legal contract.
INTELLECTUAL PROPERTY OF INTELLECTUAL PROCESSES
The rights of the individual and the organization(s) of proprietary, internal, securitized, privatized, and other types of intellectual process types that pertain to intellectual property, such that the intellectual processes pertain to both individual rights of privacy pursuant to the use of the individual’s mind for the intellectual processes, pursuant to the uniqueness of each and every human mind, and the organization’s ownership of the intellectual processes, such that the intellectual processes had not occurred without the organization, and the ownership of such intellectual processes had been defined internally, and the use of such technology by third parties to study the intellectual processes without an established contract of both the individual and the organization is a violation of the intellectual property rights of such in addition to the INTELLECTUAL PROPERTY OF THOUGHTS, such that no exploitations as such had been authorized by legal contracts, both with the individual and the organization.
INTELLECTUAL PROPERTY OF CREATIVITY
The rights of the individual to creativity of thoughts, such that the creativity would not have occurred in any other individual mind, and the theft of the thoughts through the use of such technology without an established contract is a violation of the intellectual property rights, such that no exploitation had been authorized by legal contract.
CONTRACT CLAUSE, U.S. Constitution
The right of the individual surveillance target to require a contract prior to any use of such technology for commercial, professional, marketing, promotional, and other uses that are impersonal and seek to take the thoughts of the individual for the profit of third-party entities.
The right of the individual to establish a contract that defines the surveillance activities that shall be conducted through the use of the technology.
The right of the individual to define how the records from the surveillance target shall be stored, secured, what processes of authorization are required to access the transcriptions and the records through the use of such technology, each record type respectively.
CIVILIAN LAW ENFORCEMENT LAW
If there is a permissible purpose that is established for limited access to information, and such permissible purpose and the limitations of such accesses to information shall be determined by the U.S. Intelligence Community pursuant to the military intelligence classification laws, then the information that is accessed must be done so only through non-disclosure of the information, such that the information may not pertain to reality since the thoughts were not disclosed in public. Any use of the information to target any person due to their thoughts that were detected by satellite surveillance technology, and such that there has been 1) no public detection of such thoughts being conveyed verbally, and 2) no public detection of any physical threat that correlates to the thoughts, may result in a military trial in a military intelligence court and a mistrial of civilian and criminal court uses of any of the information by civilian law enforcement for interrogation of any person to attempt to build human intelligence in the physical reality based on signals intelligence that is classified under military law, such that the reference to the information may not be made under civilian and criminal law, and the information is under classification the entire time because the information, under civilian and criminal procedure laws, was gathered in violation of the U.S. Constitution pursuant to the military classification.
A mistrial of civilian and criminal court uses of any of the information does not remove the victim’s rights to use the civilian and criminal court, while the prosecution of civilian law enforcement originating from and/or correlating to the thoughts, such as interrogation based on psychological findings, would violate military intelligence classification laws without proof of a direct targeted physical threat.
MILITARY INTELLIGENCE LAW
INTELLECTUAL PROPERTY & MILITARY INTELLIGENCE
The U.S. Intelligence Community has the legal authority to obtain access to such technologies for the use of surveillance of psychology, understanding of human intelligence, and conduct studies that pertain to the hiring of employees. This jurisdiction occurs at a minimum of a CLASSIFIED level of law, and may occur at higher levels of classification as required. Pursuant to compartmentalization of intelligence sources, the information may be categorized and compartmentalized by thought category and classification type, such that thoughts that pertain to a SECRET classification level shall not appear at a CLASSIFIED level of law. Intellectual Property is maintained because the information privacy regulations of the U.S. Intelligence Community have a greater strictness than civilian Intellectual Property, and the military records are in a separate jurisdiction of law that does not conflict with civilian laws.
STORAGE, ACCESS & DISSEMINATION OF PERSONALLY IDENTIFIABLE INTELLIGENCE
There shall be no collection or storage of Personally Identifiable Intelligence (PII) gathered through the use of surveillance technology, including while not limited to psychological data and imagery that is collected by the surveillance satellites while gathering the information for the psychological study of the information of thoughts. While the information may inadvertently be gathered and stored as a result of the use of the surveillance technology, since the physical imagery technologies themselves are not specific about what information is and is not collected, there are limitations of access pursuant to Special Compartmentalized Intelligence (SCI) military classification and the multiple types of intelligence gathered. Any unnecessary access of such information may result in a revocation of military classification license. Any disclosure of such information may result in civil, criminal, and/or military prosecution, based on the extent of the damages caused to the victim, and any security breaches that occur as a result of the dissemination of the Special Compartmentalized Intelligence (SCI).
MILITARY COMBAT LAW
There shall be no releases of information pertaining to command of military operations gathered through satellite technology, such as psychological thought intelligence gathering, such that the information could pose a danger to the operation of such military force, and any disseminative conspiracy of such information could result in a grave danger. Such information is protected under Special Compartmentalized Information, pursuant to the unspoken thoughts that occurred in the mind, and the collection of such military intelligence, and the use of military surveillance technology to gather the military intelligence. These technologies cannot be used to orchestrate or direct or conduct or commit military acts.
PERSONAL PRIVACY
INTELLIGENCE PERTAINING TO SEXUAL RELATIONSHIPS
While intelligence pertaining to sexual relationships may inadvertently be collected, since the physical technologies of satellite surveillance are not selective about the information collected, the technologies are not limited to specific intelligence gathering activities such as intelligence pertaining to sexual relationships. Psychological information pertaining to sexual relationships may be studied internal to military classification laws if the specific sexual relationships are authorized for the studies by the individuals, while the intelligence data gathered remains under military classification laws under all circumstances, and the intellectual property of the data gathered remains under military classification laws and may not be correlated to national security breaches, war, violence, crime, and other types of inciting linguistic activities, also see MCE123 Security Department – Media Security for additional information regarding the privacy of information pertaining to sexual relationships. The characteristics of one sexual relationship shall not translate to another sexual relationship, such that each sexual relationship is separate and unique, and the characteristics of an individual’s sex life may not be extorted by the public, such that the activities of the intelligence collection and dissemination would be in violation of the use of surveillance technology, pursuant to the privacy of the surveillance targets and the privacy of the data under military classification. Violations of an individual’s privacy of their sex life by the public use of surveillance technology would violate International Humanitarian Laws.
SHARING OF INFORMATION WITH SEXUAL PARTNER, REQUIREMENTS OF AUTHORIZATION, LIMITATIONS, CONTROL OF INDIVIDUAL
The sharing of information with a sexual partner, if both individuals possess military intelligence classification, is legal with a minimum of an authorization granted by both individuals to share their information, such as for the purpose of a study of their sexual relationship. Limitations include that the information is protected under classified military laws, and that the individual that pertains to the records retains control of their records in the future if the sexual relationship ends, such that the monitoring may not continue by any previous sexual partner based simply on the history of there being a sexual relationship, such that the surveillance data is collected instantaneously in such cases of collection of information. The policies of the use of the technology, as defined under military classification laws and the U.S. Intelligence Community, shall have supremacy to all regulations established by any individuals, such that the records are classified and may not be released to any third party against policy established by the U.S. Intelligence Community, and the U.S. Intelligence Community has a right to revoke access to the records at any time if the individual(s) do not comply with the laws that pertain to the access and sharing of the information under military classification laws.
ELECTRONIC TELEPATHIC INFORMATION SHARING AND SEXUAL RELATIONSHIPS
Two individuals that consent to the use of the psychological surveillance network may use the technology to share dreams, ideas, and thoughts pertaining to their sexual relationship. The use may be monitored for internal studies of such technological capabilities, and such information may be made available for sexual relationship studies within the confines of classified military laws with consent from both individuals. The information pertaining to electronic telepathic information sharing may not be disclosed for any purpose to third parties, and the information pertaining to electronic telepathic information sharing and sexual relationships is separate from individual thoughts about sexual relationships, such that the electronic telepathic information sharing of sexual relationships between two individuals will not be listed in the records of the individuals, and would need to be requested separately with authorization from both individuals, and can only be used for the purpose of the improvement of the sexual relationship of the two individuals. Also see MCE123 Security Department – Media Security regarding patterns of regulations that certain types of linguistics may not be used through the media to convey sexual relationships.