Virtual Environments
Virtual environments, such as "The Virtual Environment" or "The Avatar Environment" or "The Avatar Software" shall not be used to conduct war crimes or damaging mind control, including, however not limited to causing mental health issues or causing psychological conditions. These software products are generally described as a real-world "Sims" environment, in which real people are controlled using artificial intelligence and mind control computer software, which is configured by government employees.
These environments have been used to target innocent civilians in public, using visual spatial targeting systems, configured with an offensive operative's command and control (C2) systems that control space weapons that cause medical conditions to individuals on the ground. These environments, for an example, have been used to cause Schizophrenia to Patrick R. McElhiney.
These environments generally show people as virtual 3d models or avatars, and allows people to communicate online, as if they are communicating by talking on the telephone, or video conferencing. Other abuses of these environments including spying software, which allows individuals to spy on individuals by using tools such as the looking glass or the minoculars, which are spy interfaces in these virtual environments.
Government computer programs, such as "The Virtual Environment" or "The Avatar Environment" or "The Avatar Software" shall not be used to cause others or computer software to speak to people as stuffed animals, or as avatars, or as gravatars. The government is responsible for compensary damages to pay any legal citizen that has had their mental health negatively affected by "The Virtual Environment" or "The Avatar Environment" or "The Avatar Software".
Use of these software programs without a physical contract that the individual can wrip up, is categorically illegal, because they work by linking the software directly to the brain, not to a computer screen. Stealth modes or invisible modes or hidden modes or secret modes shall not be used to conceal or hide illegal activities within these computer programs, nor should a person's raw thoughts be visible to the public world.
Valid uses of these virtual environments would be positive development of each individual's life, and allowing positive communications between individuals, such as developing an individual's personal love life by allowing a potential couple to communicate covertly, to allow them to think about family planning before they actually become sexually involved with one another, and also business communications, to allow business to business communications, covertly, to allow businesses to develop themselves in their communities, so businesses know what other businesses need, so they can work on products and services ahead of time, and then overtly communicate with the same businesses about developing these solutions, to further support economic development.
Novel uses of virtual environment software would be to allow businesses to develop future staff by making them take educational programs, and preparing to go to work for the businesses later, to make a valuable career that supports their ability to have a family and raise children, and even start their own business.
Virtual environments shall not be created using hidden control panels or control centers with control staff within the U.S. military or the U.S. Intelligence Community, to conduct illegal leud acts such as sexual operations (SEXOPS) or psychological operations (PSYOPS) through the Central Intelligence Agency (CIA) or any other part of the U.S. Intelligence Community.
Virtual environments shall not be accessible to The Pentagon Program or any similar offensive command computer software that has any history of conducting satellite war crimes, including, however not limited to mind control, or laser war crimes, or radio frequency war crimes, to human beings.
Legal Protection for Unique Computer Voice Signatures
Unique voice signatures used by computer systems shall be protected from copyright infringement, allowing the original system or the original user to use the voice, only, to prevent legal fraud and legal abuses associated with voice transcription errors or voice transcription fraud, or any other type of fraud associated with misusing or misappropriating comments made by others misusing unique voice signatures. Therefore, unique voice signatures cannot be mimicked or copied out of systems to exploit systems or systems operators. The original voice signature owner shall be returned their original voice signature, and any misuse of the voice signature shall be investigated to determine who or what misused the voice signature, and how the misuses occurred, including any cyber security issues relating to how the unique voice signature was stolen and misused by others. These system weaknesses shall be communicated to systems designers and systems administrators to make changes to their systems to ensure that their unique voice signature is not stolen and misused in the future.
Legal Protection for Unique Computer Avatar or Unique Computer Gravatar
Parody and misuses of unique computer avatars or unique computer gravatars is unlawful, at best, and shall be categorically illegal to conduct, including for any purposes of misappropriating or malforming the intentions of systems administrators, including, however not limited to any misuses that represent the legal definition of libel, slander, or defamation of character.
Government Work in Homes
Government employees should not conduct official business in homes using AI programs in The Virtual Environment. It is distracting to others in off hours, and government works should not be forced into homes, so that residents do not need to worry about their responsibilites in their homes.