MCE123 Logo

This website uses Cookies, and by using the website, you accept our Terms of Service, Privacy Policy, and other applicable policies set by our Legal Department.

You agree to stay up to date on any changes to our legal policies, as they are posted, by visiting our Legal Department. For your viewing convenience, we are not required to notify you again.

MCE123 - Technology Development

Press / Society Exploitation System

This is a concept for a system that integrates with surveillance systems, which makes it possible for an individual to advance his or her personal agenda in society, such as exploiting the Press, taking control of elements of the Government, controlling the Public’s opinions and feedback, and controlling activities in other organizations such as Private companies, Public companies, non-profits (501c3 and 501c4 alike), NGOs, and other types of organizations as well.

First, it starts by developing internal Classified intelligence that suggests there is a personal relationship, and this only works if there is a personal relationship – but the personal relationship isn’t fully materialized and is still in the planning stages, such as the two individuals are planning to get married.

The system monitors for loopholes in society and organizations, such as any references to specific information that correlates to the existence of a personal relationship.

Next, the system extorts the individuals that have made it known to the system that the personal relationship exists. The system intends to take control of the individuals, through pointing out that it was illegal to discuss the matters of the personal relationship, however instead of investigating into the misstep by the employee(s), the matter is handled in which the employee(s) are controlled by the system, which allows the advancement of the personal relationship through activities from the specific individuals.

This is especially necessary when it may not be entirely smart to talk about the personal relationship, after another employee has sexually harassed the person that the said personal relationship applies to. The reason is that the person who committed the unwanted sexual harassment could try to retaliate in such a case, against the person whom the person who was sexually harassed is seeing, or intends to see.

The system can also take advantage of loopholes in society and the Government, by offering to patch those loopholes, to make the Government and/or society stronger, while also introducing the personal relationship into society and/or the Government – because ultimately the loopholes existed because of the personal relationship.

The same types of activities can lead to taking control of Private or Public companies, non-profit organizations, and/or other organizations that also exhibit some form of extortion of exploitation of the personal relationship between the two individuals.

The individuals of the relationship could also offer to do volunteer work, to supplement their career in which they make money, if they are making enough to support themselves and/or if the volunteer work is super critical of the existence of the personal relationship.

This system could use Artificial Telepathy technologies, or other types of telepathic technologies, or other types of surveillance activities to collect data about the personal relationship existing before it has been announced.

The system could also use a personal recording device, or devices, such as the types of cameras that Police officers wear, to record the information / intelligence suggesting there is a personal relationship from the third party, for having evidence to bring it up as a case if need be.

Other types of surveillance systems which could be used to build a sequence of intelligence, or information, about the personal relationship, could be CCTV camera systems linked to the Intelligence Community, and/or other observations by officials.

The system could, for instance, use at least two agents that represent the Government, to follow around the target of the political / legal maneuvering activities to exploit or extort the personal relationship, such as for the purpose of extorting national security, and those agents could collect information pertaining to the intelligence or information that presents its self in the proximity of the person who is being targeted for the personal relationship.

MCE123 Intellectual Property Development

MCE123℠ invents original concepts for new high-tech technologies in our Technology Development department that can be purchased by other organizations to develop into physical products for a fee. Some of these concepts have already been physically developed by MCE123℠ Technology Development with our partners in the government, and are classified as national security technologies, in which we allow the government to develop the technologies as part of our company. We do allow these technologies to be purchased, however the technologies must be purchased from our company, as they are our technologies. There are government policies and government legislation that prevents the technologies from being purchased without MCE123℠ being paid for its works to invent the technologies as the government.

You must have our authorization to work on our products or services, regarding any invention you read about on our website. Please consult with the MCE123℠ Legal Department before taking any concepts from us, as we spend countless hours developing these concepts from scratch, and you must pay us to use these concepts, or even modify the concepts and use the concepts, even with significant modification. You must purchase all intellectual property relating to a technology concept before you begin work on any of our products or services. Failure to do so will result in Intellectual Property Theft lawsuits and cases to compensate our company for intellectual and monetary damages that we have incurred due to any third party developing any of our products.

This Intellectual Property is owned by MCE123℠ Technology Development. By viewing this Intellectual Property, you agree to the rights of the IP holder established under the Intellectual Property Rights Management agreement. To use the Intellectual Property, you must first obtain an Intellectual Property license, and you must pay royalties for each product that is produced using the Intellectual Property license.


DMCA.com Protection Status Site Protected by SiteLock